Formalising guidelines for the design of screen layouts
An important aspect of screen design is aesthetic evaluation of screen layouts. While it is conceivable to define a set of variables that characterise the key attributes of many alphanumeric display formats, such a task seems difficult for graphic displays because of their much greater complexity. T...
| Main Authors: | D. C. L., Ngo, L. S., Teo, Byrne, J. G. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
ELSEVIER SCIENCE BV, PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS
2000
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2721/ http://shdl.mmu.edu.my/2721/1/Formalising%20guidelines%20for%20the%20design%20of%20screen%20layouts.pdf http://dx.doi.org/10.1016/S0141-9382(00)00026-3 |
Similar Items
Screen design: composing with dynamic symmetry
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Enhanced Bio-Inspired Algorithm With Pedestrian Simulation
For Spatial Layout Design
by: Ibrahim, Najihah
Published: (2023)
by: Ibrahim, Najihah
Published: (2023)
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003)
by: Ngo, David Chek Ling, et al.
Published: (2003)
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)
by: Chek, David Ling Ngo, et al.
Published: (2000)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
Screen design: a dynamic symmetry grid based approach
by: Ch'ng, E
Published: (2003)
by: Ch'ng, E
Published: (2003)
A Privacy Framework And Guidelines For Psychiatric Behavioural Monitoring System
by: Ramli, Rusyaizila
Published: (2016)
by: Ramli, Rusyaizila
Published: (2016)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
A Menu Planning Model Using Hybrid Genetic Algorithm And Fuzzy Reasoning: A Study On Malaysian Geriatric Cancer Patients
by: Ngo , Hea Choon
Published: (2016)
by: Ngo , Hea Choon
Published: (2016)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Application of active force control and iterative learning in a 5-link biped robot
by: Kwek, L. C.
Published: (2003)
by: Kwek, L. C.
Published: (2003)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Design, development and implementation of a voice portal builder using next generation networks technology - A case study
by: G.S.V.R., Krishna Rao, et al.
Published: (2005)
by: G.S.V.R., Krishna Rao, et al.
Published: (2005)
Design, development and implementation of a voice email system using next generation networks technology - a case study
by: Rao, G.S.V.R.K., et al.
Published: (2005)
by: Rao, G.S.V.R.K., et al.
Published: (2005)
CPT212 – Design & Analysis of Algorithms
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CIT504 – ANALYSIS, DESIGN AND MANAGEMENT OF INFORMATION SYSTEMS
CSI503 – INFORMATION SYSTEM ANALYSIS AND DESIGN - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Automatic fingerprint center point determination by using modified directional field and morphology
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
Similar Items
-
Screen design: composing with dynamic symmetry
by: Ngo, D
Published: (2001) -
Measuring the aesthetic elements of screen designs
by: Ngo, D
Published: (2001) -
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003) -
Enhanced Bio-Inspired Algorithm With Pedestrian Simulation
For Spatial Layout Design
by: Ibrahim, Najihah
Published: (2023) -
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003)