Humanized Input: Techniques for Reliable Keyed Input |
Contents
HOW INPUTS ARE DESIGNED | 1 |
DEFAULT MESSAGES | 25 |
Design Assumptions | 32 |
Copyright | |
9 other sections not shown
Other editions - View all
Common terms and phrases
accept actual adjust alternative application approach Artificial Intelligence assumptions ation automatic batch blank characters check digit checkword COBOL consider cost data bank data entry default option delimiter detection and correction dozen duplicate edit eliminate equifinality error detection error rate estimate example explicit extra feedback field Figure fixed-field form-filling formal grammar FORTRAN frequency Gilb handling hardware human identifier ilities input design input systems instance interaction job control language keying keypunch keystrokes letters limit check machines mean method natural on-line operator order quantities pattern PL/C PL/I positional possible problem procedure punch punch card reason record reduce redundancy reliability repetition require scheme secondary storage self-checking sequence simple simulation situation Snark source document storage system design techniques telephone number tolerance Tom Gilb transaction update users variation verification Weinberg words zip code Zipf's Law