咨询与建议

限定检索结果

文献类型

  • 1,795 篇 会议
  • 219 篇 期刊文献
  • 6 篇 学位论文

馆藏范围

  • 2,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,957 篇 工学
    • 1,774 篇 计算机科学与技术...
    • 939 篇 软件工程
    • 195 篇 电气工程
    • 71 篇 控制科学与工程
    • 51 篇 信息与通信工程
    • 26 篇 机械工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 电子科学与技术(可...
    • 4 篇 仪器科学与技术
    • 4 篇 测绘科学与技术
    • 4 篇 交通运输工程
    • 3 篇 土木工程
    • 3 篇 网络空间安全
  • 527 篇 医学
    • 507 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 57 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 11 篇 公共管理
    • 4 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 29 篇 理学
    • 15 篇 数学
    • 9 篇 生物学
    • 5 篇 物理学
    • 5 篇 化学
    • 4 篇 系统科学
  • 24 篇 教育学
    • 14 篇 教育学
    • 10 篇 心理学(可授教育学...
  • 15 篇 法学
    • 15 篇 社会学
  • 4 篇 经济学
    • 3 篇 应用经济学
  • 4 篇 艺术学
    • 3 篇 艺术学理论
  • 2 篇 文学
  • 2 篇 农学

主题

  • 2,020 篇 human-centered c...
  • 711 篇 human computer i...
  • 634 篇 interaction para...
  • 632 篇 virtual reality
  • 508 篇 visualization
  • 201 篇 mixed / augmente...
  • 192 篇 computing method...
  • 191 篇 visualization de...
  • 162 篇 visualization te...
  • 127 篇 hci design and e...
  • 124 篇 user studies
  • 112 篇 applied computin...
  • 103 篇 visualization ap...
  • 98 篇 empirical studie...
  • 94 篇 computer graphic...
  • 84 篇 interaction tech...
  • 83 篇 interaction devi...
  • 76 篇 interaction desi...
  • 72 篇 visual analytics
  • 71 篇 human computer i...

机构

  • 38 篇 univ tokyo
  • 24 篇 univ cent florid...
  • 22 篇 purdue univ w la...
  • 19 篇 tech univ munich...
  • 18 篇 georgia inst tec...
  • 18 篇 univ florida gai...
  • 16 篇 univ minnesota m...
  • 16 篇 ucl england
  • 16 篇 clemson univ cle...
  • 14 篇 univ stuttgart s...
  • 13 篇 univ konstanz co...
  • 13 篇 univ toronto on
  • 13 篇 northeastern uni...
  • 13 篇 univ hamburg ham...
  • 13 篇 univ south austr...
  • 13 篇 ludwig maximilia...
  • 12 篇 hong kong univ s...
  • 12 篇 beihang univ sta...
  • 12 篇 beijing inst tec...
  • 12 篇 tokyo inst techn...

作者

  • 23 篇 latoschik marc e...
  • 20 篇 steinicke frank
  • 20 篇 billinghurst mar...
  • 19 篇 narumi takuji
  • 16 篇 weng dongdong
  • 16 篇 mousas christos
  • 16 篇 rosenberg evan s...
  • 16 篇 roth daniel
  • 15 篇 bowman doug a.
  • 15 篇 liu yue
  • 15 篇 bruder gerd
  • 14 篇 borst christoph ...
  • 14 篇 steed anthony
  • 13 篇 matsumoto keigo
  • 13 篇 kim kangsoo
  • 12 篇 kiyokawa kiyoshi
  • 12 篇 lecuyer anatole
  • 12 篇 liang hai-ning
  • 12 篇 woo woontack
  • 11 篇 holz christian

语言

  • 2,011 篇 英文
  • 7 篇 其他
  • 1 篇 德文
  • 1 篇 中文
检索条件"主题词=Human-centered computing"
2020 条 记 录,以下是1801-1810 订阅
排序:
Evaluation of Optical See-Through Head-Mounted Displays in Training for Critical Care and Trauma  25
Evaluation of Optical See-Through Head-Mounted Displays in T...
收藏 引用
25th IEEE Conference on Virtual Reality and 3D User Interfaces (IEEE VR)
作者: Azimi, Ehsan Winkler, Alexander Tucker, Emerson Qian, Long Sharma, Manyu Doswell, Jayfus Navab, Nassir Kazanzides, Peter Johns Hopkins Univ Baltimore MD 21218 USA Juxtopia LLC Baltimore MD USA Tech Univ Munich Munich Germany
One major cause of preventable death is a lack of proper skills for providing critical care. Conventional training for advanced emergency medical procedures is often limited to a verbal block of instructions and/or an... 详细信息
来源: 评论
Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis
Looking for a Black Cat in a Dark Room: Security Visualizati...
收藏 引用
15th IEEE Symposium on Visualization for Cyber Security (VizSec)
作者: Bakirtzis, Georgios Simon, Brandon J. Fleming, Cody H. Elks, Carl R. Virginia Commonwealth Univ Elect & Comp Engn Med Coll Virginia Campus Richmond VA 23284 USA Virginia Commonwealth Univ Syst Engn & Mech & Aerosp Engn Richmond VA USA
Today, there is a plethora of software security tools employing visualizations that enable the creation of useful and effective interactive security analyst dashboards. Such dashboards can assist the analyst to unders... 详细信息
来源: 评论
EmbeddingVis: A Visual Analytics Approach to Comparative Network Embedding Inspection  13
EmbeddingVis: A Visual Analytics Approach to Comparative Net...
收藏 引用
13th IEEE Conference on Visual Analytics Science and Technology (VAST)
作者: Li, Quan Njotoprawiro, Kristanto Sean Haleem, Hammad Chen, Qiaoan Yi, Chris Ma, Xiaojuan Hong Kong Univ Sci & Technol Dept Comp Sci & Engn Hong Kong Peoples R China Tencent Technol Shenzhen Co Ltd WeChat Shenzhen Guangdong Peoples R China
Constructing latent vector representation for nodes in a network through embedding models has shown its practicality in many graph analysis applications, such as node classification, clustering, and link prediction. H... 详细信息
来源: 评论
Activity Segmentation and Identification based on Eye Gaze Features  18
Activity Segmentation and Identification based on Eye Gaze F...
收藏 引用
11th ACM International Conference on Pervasive Technologies Related to Assistive Environments (PETRA)
作者: Segmentation, Activity Gollan, Benedikt Ferscha, Alois Heftberger, Josef Austria FG MbH Res Studios Pervas Comp Applicat Vienna Austria JKU Linz Insitute Pervas Comp Linz Austria Fischer Sports GmbH Ried Austria
In coherence with the ongoing digitalization of production processes, human Computer Interaction (HCI) technologies have evolved rapidly in industrial applications, providing abundant numbers of the versatile tracking... 详细信息
来源: 评论
Ordering Perceptions about Perceptual Order
Ordering Perceptions about Perceptual Order
收藏 引用
IEEE Scientific Visualization Conference (SciVis)
作者: Bujack, Roxana Turton, Terece L. Rogers, David H. Ahrens, James P. Los Alamos Natl Lab Los Alamos NM 87545 USA
One of the most important properties that inherently defines a good colormap is perceptual order. In the literature, we find a wide range of recommendations and hypotheses regarding order. Properties such as monotonic... 详细信息
来源: 评论
Transformative Experiences Become More Accessible Through Virtual Reality
Transformative Experiences Become More Accessible Through Vi...
收藏 引用
IEEE Workshop on Augmented and Virtual Realities for Good (VAR4Good)
作者: Stepanova, Ekaterina R. Quesnel, Denise Riecke, Bernhard Simon Fraser Univ Burnaby BC Canada
Virtual Reality (VR) has immersive powers that can teleport an immersant into a virtual world and provide them with an experience of being somewhere that they may not have been able to go to. These powers of VR are mo... 详细信息
来源: 评论
An AR-Guided System for Fast Image-Based Modeling of Indoor Scenes  25
An AR-Guided System for Fast Image-Based Modeling of Indoor ...
收藏 引用
25th IEEE Conference on Virtual Reality and 3D User Interfaces (IEEE VR)
作者: Andersen, Daniel Popescu, Voicu Purdue Univ W Lafayette IN 47907 USA
We present a system that enables a novice user to acquire a large indoor scene in minutes as a collection of images that are sufficient for five degrees-of-freedom virtual navigation by image morphing. The user walks ... 详细信息
来源: 评论
Object Size Perception in Immersive Virtual Reality: Avatar Realism Affects the Way We Perceive  25
Object Size Perception in Immersive Virtual Reality: Avatar ...
收藏 引用
25th IEEE Conference on Virtual Reality and 3D User Interfaces (IEEE VR)
作者: Ogawa, Nami Narumi, Takuji Hirose, Michitaka Univ Tokyo Tokyo Japan Univ Tokyo JST PREST Tokyo Japan
How does the representation of an embodied avatar influence the way in which a human perceives the scale of a virtual environment? It has been shown that the scale of the external environment is perceived relative to ... 详细信息
来源: 评论
Employing Synergistic Interactions of Virtual Reality and Psychedelics in Neuropsychopharmacology
Employing Synergistic Interactions of Virtual Reality and Ps...
收藏 引用
IEEE Workshop on Augmented and Virtual Realities for Good (VAR4Good)
作者: Moroz, Matthew Carhart-Harris, Robin L. Univ Nevada Reno NV 89557 USA Imperial Coll London London England
The increased prevalence of various psychiatric disorders continue to concern [54, 71, 96]. Promising results are starting to emerge from recent experimental interventions employing VR [32, 81], and psychedelics [14, ... 详细信息
来源: 评论
Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics
Eventpad: Rapid Malware Analysis and Reverse Engineering usi...
收藏 引用
15th IEEE Symposium on Visualization for Cyber Security (VizSec)
作者: Cappers, Bram C. M. Meessen, Paulus N. Etalle, Sandro van Wijk, Jarke J. Eindhoven Univ Technol Eindhoven Netherlands Radboud Univ Nijmegen Nijmegen Netherlands
Forensic analysis of malware activity in network environments is a necessary yet very costly and time consuming part of incident response. Vast amounts of data need to be screened, in a very labor-intensive process, l... 详细信息
来源: 评论