Evaluating HCI Design with Interaction Modeling and Mockups a Case Study
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Analysis and Exploration for New Generation Debuggers Thomas Dupriez, Guillermo Polito, Stéphane Ducasse
Analysis and exploration for new generation debuggers Thomas Dupriez, Guillermo Polito, Stéphane Ducasse To cite this version: Thomas Dupriez, Guillermo Polito, Stéphane Ducasse. Analysis and exploration for new generation debuggers. International Workshop on Smalltalk Technology IWST’17, Sep 2017, Maribor, Slovenia. pp.5:1–5:6, 10.1145/3139903.3139910. hal-01585338 HAL Id: hal-01585338 https://hal.archives-ouvertes.fr/hal-01585338 Submitted on 11 Sep 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Analysis and exploration for new generation debuggers Thomas Dupriez Guillermo Polito Stephane´ Ducasse ENS Paris-Saclay - RMoD, Inria RMoD - Univ. Lille, CNRS, Centrale RMoD, Inria Lille-Nord Europe Lille-Nord Europe Lille, Inria, UMR 9189 - CRIStAL - [email protected] [email protected] Centre de Recherche en Informatique Signal et Automatique de Lille, F-59000 Lille, France [email protected] Abstract offer a different perspective to this problem: it should be Locating and fixing bugs is a well-known time consuming possible to adapt a debugger to a given domain or task. task. Advanced approaches such as object-centric or back- In this position paper we motivate the need to mature and in-time debuggers have been proposed in the literature, still develop more advanced techniques by showing a complex in many scenarios developers are left alone with primitive debugging scenario obtained from a real use case. -
Budgen, Software Design Methods
David Budgen The Loyal Opposition Software Design Methods: Life Belt or Leg Iron? o software design methods have a correctly means “study of method.”) To address, but future? In introducing the January- not necessarily answer, this question, I’ll first consider D February 1998 issue of IEEE Software,Al what designing involves in a wider context, then com- Davis spoke of the hazards implicit in pare this with what we do, and finally consider what “method abuse,”manifested by a desire this might imply for the future. to “play safe.”(If things go well, you can take the credit, but if they go wrong, the organization’s choice of method can take the blame.) As Davis argues, such a THE DESIGN PROCESS policy will almost certainly lead to our becoming builders of what he terms “cookie-cutter, low-risk, low- Developing solutions to problems is a distinguish- payoff, mediocre systems.” ing human activity that occurs in many spheres of life. The issue I’ll explore in this column is slightly dif- So, although the properties of software-based systems ferent, although it’s also concerned with the problems offer some specific problems to the designer (such as that the use of design methods can present. It can be software’s invisibility and its mix of static and dynamic expressed as a question: Will the adoption of a design properties), as individual design characteristics, these method help the software development process (the properties are by no means unique. Indeed, while “life belt” role), or is there significant risk that its use largely ignored by software engineers, the study of the will lead to suboptimum solutions (the “leg iron”role)? nature of design activities has long been established Robert L. -
Software Design Document 1
SOFTWARE DESIGN DOCUMENT 1. Introduction The following subsections of the Software Design Document (SDD) should provide an overview of the entire SDD. 1.1 Purpose This subsection should explain the purpose of the SDD and specify the intended audience for it. The SDD described the software structure, software components, interfaces and data necessary for the implementation phase. Each requirement in the SRS should be traceable to one or more design entities in the SDD. 1.2 Scope This subsection should relate the design document to the SRS and to the software to be developed. 1.3 Definitions, Acronyms and Abbreviations This subsection should provide the definitions of all terms, acronyms and abbreviations that are used in the SDD. 2. References This subsection should provide a complete list of all documents referenced in the SDD. It should identify these references by title, report number, date and publishing organization. It should also specify the sources from which these references are available. 3. Attributes of Design Entities There are some attributes common to all entities, regardless of the approach utilized, whether procedural or object-oriented. These are used in subsections 4 and later. 3.1 Identification The name of the entity should be specified. Two entities should not have the same name. 3.2 Type The type attribute should describe the nature of the entity. It may simply name the kind of entity, such as subprogram, module, procedure, process, data item, object etc. Alternatively, design entities can be grouped, in order to assist in locating an entity dealing with a particular type of information. -
A Quantitative Reliability, Maintainability and Supportability Approach for NASA's Second Generation Reusable Launch Vehicle
A Quantitative Reliability, Maintainability and Supportability Approach for NASA's Second Generation Reusable Launch Vehicle Fayssai M. Safie, Ph. D. Marshall Space Flight Center Huntsville, Alabama Tel: 256-544-5278 E-mail: Fayssal.Safie @ msfc.nasa.gov Charles Daniel, Ph.D. Marshall Space Flight Center Huntsville, Alabama Tel: 256-544-5278 E-mail: Charles.Daniel @msfc.nasa.gov Prince Kalia Raytheon ITSS Marshall Space Flight Center Huntsville, Alabama Tel: 256-544-6871 E-mail: Prince.Kalia @ msfc.nasa.gov ABSTRACT The United States National Aeronautics and Space Administration (NASA) is in the midst of a 10-year Second Generation Reusable Launch Vehicle (RLV) program to improve its space transportation capabilities for both cargo and crewed missions. The objectives of the program are to: significantly increase safety and reliability, reduce the cost of accessing low-earth orbit, attempt to leverage commercial launch capabilities, and provide a growth path for manned space exploration. The safety, reliability and life cycle cost of the next generation vehicles are major concerns, and NASA aims to achieve orders of magnitude improvement in these areas. To get these significant improvements, requires a rigorous process that addresses Reliability, Maintainability and Supportability (RMS) and safety through all the phases of the life cycle of the program. This paper discusses the RMS process being implemented for the Second Generation RLV program. 1.0 INTRODUCTION The 2nd Generation RLV program has in place quantitative Level-I RMS, and cost requirements [Ref 1] as shown in Table 1, a paradigm shift from the Space Shuttle program. This paradigm shift is generating a change in how space flight system design is approached. -
3 System Design 71 NYS Project Management Guidebook
Section III:3 System Design 71 NYS Project Management Guidebook 3 SYSTEM DESIGN Purpose The purpose of System Design is to create a technical solution that satisfies the functional requirements for the system. At this point in the project lifecycle there should be a Functional Specification, written primarily in business terminology, con- taining a complete description of the operational needs of the various organizational entities that will use the new system. The challenge is to translate all of this information into Technical Specifications that accurately describe the design of the system, and that can be used as input to System Construction. The Functional Specification produced during System Require- ments Analysis is transformed into a physical architecture. System components are distributed across the physical archi- tecture, usable interfaces are designed and prototyped, and Technical Specifications are created for the Application Developers, enabling them to build and test the system. Many organizations look at System Design primarily as the preparation of the system component specifications; however, constructing the various system components is only one of a set of major steps in successfully building a system. The prepara- tion of the environment needed to build the system, the testing of the system, and the migration and preparation of the data that will ultimately be used by the system are equally impor- tant. In addition to designing the technical solution, System Design is the time to initiate focused planning efforts for both the testing and data preparation activities. List of Processes This phase consists of the following processes: N Prepare for System Design, where the existing project repositories are expanded to accommodate the design work products, the technical environment and tools needed to support System Design are established, and training needs of the team members involved in System Design are addressed. -
Interaction Design Studio - 711 Instructor: Patrick Thornton Email: [email protected] Thursday 6-8:45 Pm Location: Pac 1815 - Clarice Smith Performing Arts Center
Interaction Design Studio - 711 Instructor: Patrick Thornton Email: [email protected] Thursday 6-8:45 pm Location: Pac 1815 - Clarice Smith Performing Arts Center Course Description Interaction design is the process of defining products and the broad services built around them. When interacting with systems, people build expectations and mental models of how things work. They learn what they can and cannot achieve. This course is about how to design for interactions that will resonate with your audiences: How the features and functions of a product get translated into something people find usable, useful, and desirable. Through a series of lectures, discussions, in-class design practice, and projects, students will explore the role of interaction designers. Students will learn how to prototype interactive products, systems, and services, and how to defend their work through the cycle of brainstorming and shared critique. This is a studio class, focusing on production processes that are required to develop public-facing work. The studio is important both as a working space and a space for collaborative reflection. Studio practice also describes a working method. As such, the INST711 classroom will focus on two activities: ● Externalization: You will put your ideas and conceptualizations into tangible materials. ● Critique: You will both give and receive constructive feedback on your own work and the work of other students in class. Student Learning Outcomes On the successful completion of this course, students will be able to: ● Explain basic concepts, techniques, and knowledge of interaction design. ● Critically discuss common methods in the interaction design process ● Use visual thinking and communication techniques to develop design concepts ● Build prototypes at varying levels of fidelity and can evaluate them using appropriate methods ● Develop critiquing skills to analyze interaction design artifacts and concept design. -
Software Design Document (SDD) Template
Software Design Document (SDD) Template Software design is a process by which the software requirements are translated into a representation of software components, interfaces, and data necessary for the implementation phase. The SDD shows how the software system will be structured to satisfy the requirements. It is the primary reference for code development and, therefore, it must contain all the information required by a programmer to write code. The SDD is performed in two stages. The first is a preliminary design in which the overall system architecture and data architecture is defined. In the second stage, i.e. the detailed design stage, more detailed data structures are defined and algorithms are developed for the defined architecture. This template is an annotated outline for a software design document adapted from the IEEE Recommended Practice for Software Design Descriptions. The IEEE Recommended Practice for Software Design Descriptions have been reduced in order to simplify this assignment while still retaining the main components and providing a general idea of a project definition report. For your own information, please refer to IEEE Std 10161998 1 for the full IEEE Recommended Practice for Software Design Descriptions. 1 http://www.cs.concordia.ca/~ormandj/comp354/2003/Project/ieeeSDD.pdf Downloaded from http://www.tidyforms.com (Team Name) (Project Title) Software Design Document Name (s): Lab Section: Workstation: Date: (mm/dd/yyyy) Downloaded from http://www.tidyforms.com Software Design Document TABLE OF CONTENTS 1. INTRODUCTION 2 1.1 Purpose 2 1.2 Scope 2 1.3 Overview 2 1.4 Reference Material 2 1.5 Definitions and Acronyms 2 2. -
Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future Steven Alter University of San Francisco, [email protected]
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of San Francisco The University of San Francisco USF Scholarship: a digital repository @ Gleeson Library | Geschke Center Business Analytics and Information Systems School of Management February 2013 Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future Steven Alter University of San Francisco, [email protected] Follow this and additional works at: http://repository.usfca.edu/at Part of the Business Administration, Management, and Operations Commons, Management Information Systems Commons, and the Technology and Innovation Commons Recommended Citation Alter, Steven, "Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future" (2013). Business Analytics and Information Systems. Paper 35. http://repository.usfca.edu/at/35 This Article is brought to you for free and open access by the School of Management at USF Scholarship: a digital repository @ Gleeson Library | Geschke Center. It has been accepted for inclusion in Business Analytics and Information Systems by an authorized administrator of USF Scholarship: a digital repository @ Gleeson Library | Geschke Center. For more information, please contact [email protected]. Research Article Work System Theory: Overview of Core Concepts, Extensions, and Challenges for the Future Steven Alter University of San Francisco [email protected] Abstract This paper presents a current, accessible, and overarching view of work system theory. WST is the core of an integrated body of theory that emerged from a long-term research project to develop a systems analysis and design method for business professionals called the work system method (WSM). -
Devops for Hybrid Cloud: an IBM Point of View
IBM Cloud July 2017 Thought Leadership White Paper DevOps for hybrid cloud: an IBM point of view How DevOps for hybrid cloud can help organizations succeed with digital reinvention 2 DevOps for hybrid cloud: an IBM point of view Introduction The IBM point of view on DevOps makes the following DevOps started as a culture and set of practices to support assumptions: collaboration and communication across development and oper- ations, and to apply automation to key phases of the software ●● DevOps covers the end-to-end software delivery lifecycle delivery process. It has been popularized by successful new including an expanded set of stakeholders such as business companies developing business models and related applications owners and end users, and practices such as design thinking empowered by the cloud (cloud-native applications). More and user analytics. recently, large, established enterprises have recognized the need ●● DevOps adoption is expanding in large organizations as they to deliver innovation faster to stay relevant and capitalize on enable existing IT applications for cloud (cloud-enabled industry disruption, while also improving operational metrics for applications). New methods enable organizations to success- application quality and cost. DevOps and cloud have emerged as fully implement DevOps as they move to cloud. essential parts of their IT strategy as they improve core compe- ●● Hybrid cloud architecture is becoming the norm for both tency in continuous delivery of software-driven innovation. cloud-enabled and cloud-native applications. Hybrid cloud provides flexibility in deployment, enabling organizations to choose the right platform to run their workloads. ●● DevOps solutions can vary as teams across large organizations Business as usual have different goals, processes, culture and tools. -
User Interaction Design for Secure Systems
User Interaction Design for Secure Systems Ka-Ping Yee Report No. UCB/CSD-02-1184 May 2002 Computer Science Division (EECS) University of California Berkeley, California 94720 Supported by NSF award #EIA-0122599 ITR/SI: Societal Scale Information Systems: Technologies, Design and Applications User Interaction Design for Secure Systems Ka-Ping Yee [email protected] Computer Science Department University of California, Berkeley Abstract Perhaps the most spectacular class of recent security problems is the e-mail virus, which is a good real-life The security of any computer system that is configured example of a security violation in the absence of software and operated by human beings critically depends on the errors. At no point in the propagation of the virus does information conveyed by the user interface, the decisions any application or system software do anything other of the computer users, and the interpretation of their than exactly what its programmers would expect: the e- actions. We establish some starting points for reasoning mail client correctly displays the message and correctly about security from a user-centred point of view, by decodes the attached virus program; the system correctly modelling a system in terms of actors and actions and executes the virus program. Rather, the problem has introducing the concept of the subjective actor-ability occurred because the expectations of the programmer state. We identify ten key principles for user interaction became inconsistent with what the user would want. design in secure systems and give case studies to Our purpose here is to present a way of thinking about illustrate and justify each principle, describing real-world this type of issue. -
Software Reliability and Dependability: a Roadmap Bev Littlewood & Lorenzo Strigini
Software Reliability and Dependability: a Roadmap Bev Littlewood & Lorenzo Strigini Key Research Pointers Shifting the focus from software reliability to user-centred measures of dependability in complete software-based systems. Influencing design practice to facilitate dependability assessment. Propagating awareness of dependability issues and the use of existing, useful methods. Injecting some rigour in the use of process-related evidence for dependability assessment. Better understanding issues of diversity and variation as drivers of dependability. The Authors Bev Littlewood is founder-Director of the Centre for Software Reliability, and Professor of Software Engineering at City University, London. Prof Littlewood has worked for many years on problems associated with the modelling and evaluation of the dependability of software-based systems; he has published many papers in international journals and conference proceedings and has edited several books. Much of this work has been carried out in collaborative projects, including the successful EC-funded projects SHIP, PDCS, PDCS2, DeVa. He has been employed as a consultant to industrial companies in France, Germany, Italy, the USA and the UK. He is a member of the UK Nuclear Safety Advisory Committee, of IFIPWorking Group 10.4 on Dependable Computing and Fault Tolerance, and of the BCS Safety-Critical Systems Task Force. He is on the editorial boards of several international scientific journals. 175 Lorenzo Strigini is Professor of Systems Engineering in the Centre for Software Reliability at City University, London, which he joined in 1995. In 1985-1995 he was a researcher with the Institute for Information Processing of the National Research Council of Italy (IEI-CNR), Pisa, Italy, and spent several periods as a research visitor with the Computer Science Department at the University of California, Los Angeles, and the Bell Communication Research laboratories in Morristown, New Jersey. -
Lmc 6313 Principles of Interaction Design
Principles of Interaction Design – LMC 6313 Syllabus Course Number: LMC 6313 Location: Skiles 346 Times: T/Th – 3:00p-3:50p F (lab) – 11:15a-2:00p Instructor: Dr. Anne Sullivan Instructor Email: [email protected] Office Hours: By Appointment (Mondays are the best bet) Office Location: TSRB 317C TA: Takeria Blunt TA Email: [email protected] Course Website: http://canvas.gatech.edu Course Description: What is interaction, what is design, where did these notions come from, and where are they going? Through the activities in this course, you will return to questions of what kind of designer you are and wish to be, what you believe in, and how that will extend to your research and practice. You will also develop your own critical take on the material in the class and sharpen your voice and arguments about your perspectives. Interaction design wasn’t invented from scratch as a singular, monolithic practice. It was born out of the intersection of a number of disciplines from within design and human-computer interaction, and also from art, media, architecture, politics, and philosophy, and beyond. There are many different definitions of what it is and where we fit into it, and no two people we meet in this class will likely have the same definition. And that’s the way it should be. Through my suggestions and yours, we will also turn to design questions in digital culture, film, tv, fiction, gaming, music, art and beyond as we together frame our understandings. As you read, The syllabus, dates, times, assignments, and details are subject to change by instructor notification through Canvas or email.