Natural userinterface provides the possibility of interaction with software through direct actions of human body, such as gesture and voice. In the case of voice, it is possible for the user to interact with the syst...
详细信息
ISBN:
(纸本)9781450369718
Natural userinterface provides the possibility of interaction with software through direct actions of human body, such as gesture and voice. In the case of voice, it is possible for the user to interact with the system quickly and directly, making the interaction simple and thus providing accessibility. Several studies were conducted with voice as a form of interaction between the user and system. Nevertheless, these studies are generally analyzed from a quantitative perspective and few perform a detailed qualitative analysis. The goal of this paper was to evaluate qualitatively a exploratory study with voice-based interaction. For this, two steps of the Grounded Theory (GT) method were used to obtain solid results. From these results, guidelines were proposed for the creation of digital text by voice so that possible users have this possibility of interaction when they write their texts.
Cloud apps like Google Docs and Trello are popular because they enable real-time collaboration with colleagues, and they make it easy for us to access our work from all of our devices. However, by centralizing data st...
详细信息
ISBN:
(纸本)9781450369954
Cloud apps like Google Docs and Trello are popular because they enable real-time collaboration with colleagues, and they make it easy for us to access our work from all of our devices. However, by centralizing data storage on servers, cloud apps also take away ownership and agency from users. If a service shuts down, the software stops functioning, and data created with that software is lost. In this article we propose local-first software, a set of principles for software that enables both collaboration and ownership for users. Local-first ideals include the ability to work offline and collaborate across multiple devices, while also improving the security, privacy, long-term preservation, and user control of data. We survey existing approaches to data storage and sharing, ranging from email attachments to web apps to Firebase-backed mobile apps, and we examine the trade-offs of each. We look at Conflict-free Replicated Data Types (CRDTs): data structures that are multi-user from the ground up while also being fundamentally local and private. CRDTs have the potential to be a foundational technology for realizing local-first software. We share some of our findings from developing local-first software prototypes at the Ink & Switch research lab over the course of several years. These experiments test the viability of CRDTs in practice, and explore the userinterface challenges for this new data model. Lastly, we suggest some next steps for moving towards local-first software: for researchers, for app developers, and a startup opportunity for entrepreneurs.
The CASE tools (Computer-Aided software Engineering) aim to increase productivity during the software development process. However, their use by professionals is not as extensive as it could be. Among the reasons for ...
详细信息
ISBN:
(纸本)9781450369718
The CASE tools (Computer-Aided software Engineering) aim to increase productivity during the software development process. However, their use by professionals is not as extensive as it could be. Among the reasons for the low adoption of this kind of tool are their complexity and learning curve. The main goal of this paper is to investigate user interaction metaphors for CASE tools based on the touch screen technology. It is expected that after this study the usability of these tools could be improved, minimizing the learning curve.
In mobile crowdsourcing, workers are financially motivated to perform self-selected tasks to maximize their revenue. Unfortunately, the existing task scheduling approaches in mobile crowdsourcing fail to scale for mas...
详细信息
Generic, type-driven web-based editors have been an integral feature of the iTask Framework (iTasks) since its conception, and even predate it in the form of the iData library. Generic editors enable rapid prototyping...
ISBN:
(纸本)9781450389631
Generic, type-driven web-based editors have been an integral feature of the iTask Framework (iTasks) since its conception, and even predate it in the form of the iData library. Generic editors enable rapid prototyping, because they allow the generation of graphical userinterfaces from any first-order type. As applications mature, the need for increased control over the look and feel of editors arises. This can be accomplished by creating customised editors. Unfortunately defining custom editors is no trivial task in iTasks. The interface for creating custom editors from scratch is sufficiently powerful, but exposes many implementation details that make it complicated to use. In this paper we present a new interface and composition API for editors in iTasks. This new approach is based on an asymmetric typed interface for editors with separate type parameters for data that is consumed by, and data that is produced by, the web editors. We demonstrate the new possibilities by reconstructing a previously builtin editor as a composition of simpler editors and various other examples.
The Trusted Execution Environment (TEE) has been widely used to protect the security-sensitive sensing systems on Internet-of-Thing (IoT) devices. In the TEE systems, the execution environment is securely divided into...
详细信息
ISBN:
(纸本)9781450375900
The Trusted Execution Environment (TEE) has been widely used to protect the security-sensitive sensing systems on Internet-of-Thing (IoT) devices. In the TEE systems, the execution environment is securely divided into a normal domain and a higher privileged secure domain which executing sensing systems through hardware. One common way to achieve the protection is implementing the sensitive functions of the sensing systems as trusted applications (TAs) in the well-isolated secure domain. users in rich OS have to call TAs through the client applications (CAs), and the invocations must pass through the rich OS kernel. However, an untrusted rich OS may launch man-in-the-middle attacks on the communication between the CAs and TAs, and the misuse of cross-domain communication channel is becoming one severe threat on the TEE systems. In this paper, we develop a defense system named TrustICT to construct a lightweight trusted interaction channel between CAs and TAs without modifying existing TEE architecture. The main idea is to block attacks on the cross-domain interactions via dynamically setting the access permission of domain-shared memory, locking it from kernel mode and unlocking it only to legal CAs in the user mode. Particularly, we propose a multi-core scheduling strategy to defeat potential attacks from all privileged cores. Compared to existing cryptography-based methods, TrustICT dramatically reduces the system overhead since it does not require time-consuming cryptographic computation or sophisticated real-time kernel protection. We implement a prototype of TrustICT on a Freescale ***6Quad platform with the OP-TEE software system and evaluate its impacts on rich OS and the cross-domain transactions.
This paper presents an obstacle detection and alert system for the pedestrians who use smartphone AR applications. The system analyzes the input camera image to extract feature points and determines whether the featur...
详细信息
ISBN:
(纸本)9781450370011
This paper presents an obstacle detection and alert system for the pedestrians who use smartphone AR applications. The system analyzes the input camera image to extract feature points and determines whether the feature points come from obstacles ahead in the path. With the obstacle detector, two experiments were made. The first investigated the obstacle alert interfaces, and the second investigated the orientation guide interfaces that instruct users to hold their smartphones with some angles/orientations appropriate to capture the environment. Then, the best interfaces identified from the experiments were integrated and tested to examine their usability and user experiences.
Group pattern mining from spatio-temporal trajectories of moving objects have gained significant attentions due to the prevalence of location-acquisition devices and tracking technologies. In this work, we propose a n...
详细信息
The human-computer interaction (HCI) is a research field that supports the userinterface development. Furthermore, HCI influences the intelligent userinterface (IUI) area. IUI is a userinterface that uses intellige...
详细信息
ISBN:
(纸本)9781450372824
The human-computer interaction (HCI) is a research field that supports the userinterface development. Furthermore, HCI influences the intelligent userinterface (IUI) area. IUI is a userinterface that uses intelligent technology to reach the communication between humans and machines. The construction of IUI is not easy and requires the knowledge of different methods, techniques and technologies from many domains (such as, HCI, artificial intelligence, ergonomics, software engineering, etc.). In this way, the existence of a process is an important tool for IUI developers. The literature presents design processes and frameworks for userinterface, but most of them do not offer any knowledge regarding the methods, techniques, and technologies that can be used to support the activities involved. Thus, this work proposes a development process for IUIs which offers recommendations about methods, techniques, and technologies. We hope that this process will help analysts and designers who work in IUI area.
software maintenance is a costly task and error-prone for both software developers and users as well. By knowing how and what software requirements need to be changed, end users could perform maintenance assisted by t...
详细信息
ISBN:
(纸本)9781450372374
software maintenance is a costly task and error-prone for both software developers and users as well. By knowing how and what software requirements need to be changed, end users could perform maintenance assisted by tools. However, current literature lacks for tools that support automated maintenance in real-world scenarios and allow users interaction via natural language. Even worse, the current tools are unable to understand the semantic of requests, as well as perform the necessary transformations in the maintenance software. This paper, therefore, proposes Hermes, a natural language interface model for software transformation. It combines computational linguistics techniques and logic programming to perform automated maintenance requests in software. Hermes interacts with end user through state of the art language parsers and domain ontologies by interpreting the semantics of changes requests to build a typed graph that change the software. Hermes was evaluated through an empirical study with 8 participants to investigate its performance, the level of acceptance, and usability. The collected data show that Hermes was accurate, producing a high elevated correctness number of hits by finding correct transformations and has been highly accepted by the users. The results are encouraging and show the potential for using Hermes to properly produce software maintenance requests.
暂无评论