Mobile computing has been an active area of research for the past decade, but its importance will increase substantially in the decade to come. One problem faced by designers of mobile systems is that of maintaining t...
详细信息
In this paper we describe an evaluation of behavioral descriptors generated from an analysis of a large collection of Usenet newsgroup messages. The metrics describe aspects of newsgroup authors' behavior over tim...
详细信息
ISBN:
(纸本)1581134533
In this paper we describe an evaluation of behavioral descriptors generated from an analysis of a large collection of Usenet newsgroup messages. The metrics describe aspects of newsgroup authors' behavior over time;such information can aid in filtering, sorting, and recommending content from public discussion spaces like newsgroups. To assess the value of a variety of these behavioral descriptors, we compared 22 participants' subjective evaluations of authors whose messages they read to behavioral metrics describing the same authors. We found that many metrics, particularly the longevity and frequency of participation, the number of newsgroups to which authors contribute messages, and the amount they contribute to each thread, correlate highly with readers' subjective evaluations of the authors.
The Special Interest Group on computerhumaninteraction (SIGCHI) has had a successful history of 20 years of growth in its numbers and influence. To help guide the continued evolution of the academic discipline and p...
详细信息
ISBN:
(纸本)1581134541
The Special Interest Group on computerhumaninteraction (SIGCHI) has had a successful history of 20 years of growth in its numbers and influence. To help guide the continued evolution of the academic discipline and professional community, we invite several senior members to offer their visions for what the field of CHI actually accomplished over the past several decades, and what do we still need to accomplish? What do we need to do differently/ better/smarter? What haven't we tried because the technology, the money or the will wasn't there in the past, but perhaps is now? The CHI field is more than just technology. We understand that our work can have a profound effect on individuals, families, neighborhoods, corporations, and countries. We know that we can influence education, commerce, healthcare, and government. How can we contribute to bridging the digital divides in developed and developing countries? What agendas can we offer for the academic, research, industrial, and civic spheres for the next 20 years? How can we be more ambitious? How can we truly serve human needs?
We describe two experiments using three testbeds (real, virtual and vision-only) for comparison of user performance during 3-D peg-in-hole tasks. Tasks are performed using a six-degree-of-freedom (6-DOF) magnetic levi...
详细信息
ISBN:
(纸本)0769514898
We describe two experiments using three testbeds (real, virtual and vision-only) for comparison of user performance during 3-D peg-in-hole tasks. Tasks are performed using a six-degree-of-freedom (6-DOF) magnetic levitation haptic device. The experimental design allows a user to experience real and virtual forces using the same device. The first experiment compares real and virtual tasks. In the virtual task, a peg and hole are rendered haptically and visually. During the real task, a physical peg is attached to the underside of the haptic device. A hole in a plate attached to a force/torque sensor receives the peg. The second experiment compares a virtual haptic task to one performed using vision alone. Preliminary results indicate increased task time, more variation in force and position, and more failures occur with the virtual task than with the real task. More variation in force and position, and more failures occur with the vision-only task than with the virtual task. Users apply similar strategies for virtual and real tasks. Virtual haptic display, while worse than reality, contributes significantly to task performance when compared to vision alone.
The combination of personal mobile devices and mobile ad hoc networks for mobile collaboration was discussed. The possible application scenarios include informal social interactions in public places, opportunistic mee...
详细信息
ISBN:
(纸本)1581134541
The combination of personal mobile devices and mobile ad hoc networks for mobile collaboration was discussed. The possible application scenarios include informal social interactions in public places, opportunistic meetings in office settings and educational multi-user applications for use in classrooms. The success of ad hoc networks largely depends on the applications and social benefits they provide.
We propose a new network growing method to detect salient features in input patterns. The new method is based upon a previous network growing model (R. Kamimura and T. Kamimura, 2002) and introduced to overcome some p...
详细信息
We propose a new network growing method to detect salient features in input patterns. The new method is based upon a previous network growing model (R. Kamimura and T. Kamimura, 2002) and introduced to overcome some problems in the previous model. We have so far tried to build a model that can learn input patterns as efficiently as possible. To realize this efficiency, we impose upon networks a constraint that only connections into new competitive units must be updated to absorb as much information as possible from outside. However, one of the problems is that the previous improper feature extraction prevents networks from extracting appropriate features in the later learning stages. To overcome this problem, we relax the condition of the previous model, and we permit networks to update all connections for gradual feature extraction at the expense of computational efficiency. We applied the new method to a simple problem that the previous model cannot solve, and information education data analysis. In both problems, we found that the new method can appropriately extract features from input patterns.
In this paper, we propose a new information theoretic network growing algorithm. The new approach is called greedy information acquisition, because networks try to absorb as much information as possible in every stage...
详细信息
In this paper, we propose a new information theoretic network growing algorithm. The new approach is called greedy information acquisition, because networks try to absorb as much information as possible in every stage of learning. In the first stage, two competitive units compete with each other by maximizing mutual information. In the successive stages, new competitive units are gradually added and information is maximized. Through greedy information maximization, different sets of important features in input patterns can be cumulatively discovered in successive stages. We applied our approach to a language classification problem. Experimental results confirmed that different features in input patterns are gradually discovered.
This paper presents a working prototype system of a novel computer-human interface, named invisible messenger. It integrates visual face detection and tracking, and speaker array signal processing. By speaker array it...
详细信息
This paper presents a working prototype system of a novel computer-human interface, named invisible messenger. It integrates visual face detection and tracking, and speaker array signal processing. By speaker array it is possible to form acoustic focus at the arbitrary location that is measured by the face tracking. Thus the implemented system can whisper in a person's ear as if an invisible virtual messenger were standing by the person. In this paper, the authors describe both ideas behind the system and key technology for the implementation. In order to confirm the effectiveness of the system, the authors conduct experiments using it. This paper also reports the experiment. Experimental remits demonstrate the effectiveness of the proposed idea.
Widespread interest in discovering features and trends in time- series has generated a need for tools that support interactive *** paper introduces timeboxes: a powerful direct-manipulation metaphor for the specificat...
详细信息
Heuristic evaluation is widely used for single-user computer systems, but research is ongoing to find a valid set of heuristics that can be applied to synchronous multiuser, or collaborative, computing systems. I have...
详细信息
暂无评论