Within the last year
Within the past 3 years
1 - 2 of 2 articles
A study of transaction logs from NLM's ELHILL system provided data on system feature usage and user search behavior. Several hypotheses were tested regarding the use of a pattern analysis methodology to represent and evaluate user behavior. Different classes of users (frequent, moderate,...
This is a book that is intended not just to be read but to be used-through discussion, study, and prolonged reflection. The major concern of the book is, as the title implies, how humans interact with computers. The authors construct an empirically based cognitive theory of a skilled...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.