-
@JankaKoen will help improve the documented UI/UX design process by including a section on the _Research_ phase.
This section will exist on the main page of the UI/UX section and will most likely l…
-
@cmower, @tvercaut, @cbergeles
## Personal Details
* First author:
* [x] family-names: Huber
* [x] given-names: Martin
* [x] email: martin.huber@kcl.ac.uk
* [x] Department/Faculty: Sch…
-
What can developers learn from our experience?
- converting from initial "quick" application to a more sustainable application
- basic framework can help to think about future projects (grants, assets…
-
I know that since IOS 15, apps can display the profile picture of the sender in the notification.
Example from a Slack notification:
![image](https://github.com/androidseb25/iGotify-Notification-Assi…
-
Hello,
We are a cybersecurity research group from the CISPA Helmholtz Center for Information Security and Ca’ Foscari University of Venice. We recently conducted an analysis of the session manageme…
-
Hello ActiveDriverDB developers,
We are a cybersecurity research group from the CISPA Helmholtz Center for Information Security and Ca’ Foscari University of Venice. We recently conducted an analys…
-
**Goal:**
To assess the intuitiveness of the guest flow for users accessing the Home Unite Us platform on both mobile and desktop devices.
**Research Questions:**
How do users perceive the vis…
-
**Description/Motivation**
Anomaly prediction can be used to predict an anomaly before it occures. One of the applications is predictive maintenance.
This research topic could be examined as part of …
-
## Description
The goal is to understand the capabilities, limitations, and potential integration points of GCL to enhance our product offerings.
## Goals
- [ ] Conduct a comprehensive analysis of GC…
-
# Chained authentication flows
The abstraction of federated identity includes the principal, an RP, and an IDP (as defined in https://fedidcg.github.io/FedCM/). In enterprise and R & E (research a…