Buscar
Mostrando ítems 31-40 de 99
User - Smart Building Interactions: An Analysis of Privacy and Productivity Human Factors
(2022-11-21)
Smart buildings are increasingly becoming more common and changing the way we interact with our home, workplace, and cities. Consequently, it is important to study how human factors play a role in smart building-based ...
Trending Topic Extraction using Topic Models and Biterm Discrimination
(2017)
Mining and exploitation of data in social networks has been the focus of many efforts,
but despite the resources and energy invested, still remains a lot for doing given its
complexity, which requires the adoption of a ...
Towards the automation of a defect detection protocol for functional size measurements
(2018-04-23)
There is a need to develop formal protocols to verify the accuracy of software functional size measurements and to calibrate the measurement processes. These protocols offer a mechanism for accomplishing such verification ...
Prototipo de plataforma basada en herramientas de código abierto para apoyar las tareas de verificación y validación de proyectos de software en el Centro de Informática de la Universidad de Costa Rica
(2016-10)
El presente trabajo de investigación fue realizado en la Unidad de Calidad y Mejora Continua del Centro de Informática de la Universidad de Costa Rica, con el objetivo de construir, un prototipo de plataforma computacional ...
Web accessibility for people with reduced mobility: A case study using eye tracking
(2016)
Traditional web interfaces often rely on keyboard/mouse input to work. This characteristic forces people with reduced mobility to adapt or do not use the applications at all. This paper proposes a prototype to increase web ...
Development and Evaluation of Augmented Object Prototypes for Notifications in Collaborative Writing Environments
(2016)
In Ubiquitous Computing, augmented objects refer to those elements of
the real world which have been provided with computational capabilities to meet a
specific need. Meanwhile, Collaborative Writing Environments (CWE) ...
Constructing an architecture-based cybersecurity solution for a system
(2023-01-19)
Cybersecurity can be effectively managed with an architecture-based approach, composed with three viewpoints, namely system, security and process. Using models for describing a system and its security objectives enables a ...
An Empirical Validation of Function Point Structure and Applicability: A Replication Study
(2015-04)
Background: The complexity of providing accurate software size estimation and effort prediction models is well known in the software industry. Function point analysis (FPA) is currently one of the most accepted software ...