Buscar
Mostrando ítems 121-130 de 37687
Elevated prevalence of high-risk HPV in healthy oral mucosa of users and nonusers of drugs in Northeastern Brazil
(2019-01-01)
Variable rates of HPV infection have been reported in healthy oral mucosa worldwide. The main objective of this study was to detect and genotype HPV infection in users and nonusers of drugs with clinically healthy mucosa ...
User Experience in Communication and Collaboration Platforms: A Comparative Study Including Discord, Microsoft Teams, and Zoom
(2022-03)
Due to the measures imposed to prevent the spread of the virus during the COVID-19 pandemic, how education and work communications are carried have changed. An increase in video conferencing and meeting applications is ...
Estudo de usuários: recurso para a difusão do arquivo da Universidade Federal de Ciências da Saúde de Porto Alegre
(Universidade Federal de Santa MariaBrasilUFSMCentro de Ciências Sociais e Humanas, 2010-07-17)
The paper presents the results of a scientific research about the study of user as a resource for broadcasting the Archive of Universidade Federal de Ciências da Saúde de Porto Alegre. This study aimed identify the profile ...
Guía para uso de Duplicheker
(2023)
Research on information needs of user communitiesLa investigación sobre las necesidades de información en comunidades de usuarios
(Instituto de Investigaciones Bibliotecológicas y de la Información, 2009)
Accessibility and Usability of Websites Intended for People with Disabilities: A Preliminary Study
(Springer, 2016-01-01)
This paper reports a preliminary study evaluating accessibility and usability of a Brazilian government website - the national digital catalogue of assistive technology (CNPTA). Although since 2004 e-government information ...
Offloading personal security applications to the Network Edge: A mobile user case scenario
(INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS INC., 2016-09-05)
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user ...