This paper demonstrates how a recently developed analytical usability evaluation method, the Sii framework, can by used to inspect semantic search interfaces for how they support people working with the large heteroge...
详细信息
This paper demonstrates how a recently developed analytical usability evaluation method, the Sii framework, can by used to inspect semantic search interfaces for how they support people working with the large heterogeneous datasets afforded by Linked Data. To enrich the discussion, an analysis of the Tabulator browser for Linked Data is presented and discussed in terms of the workshop's case study surrounding archivists. The analysis shows that while the Tabulator provides some strong support for sense-making, it would struggle to support such archivists in first defining their needs. In analyzing the Tabulator from the perspectives of the archivists, this paper demonstrates how the new Sii method can provide rigor and reason to the assessment of future design decisions made for Semantic Web user interactions.
Sentiment analysis often relies on a semantic orientation lexicon of positive and negative words. A number of approaches have been proposed for creating such lexicons, but they tend to be computationally expensive, an...
详细信息
Assistive environments employ multiple types of devices to monitor human actions and identify critical events for phys- ical safety. Some of the devices must be wireless in order to be nonintrusive. This introduces th...
详细信息
ISBN:
(纸本)9781605584096
Assistive environments employ multiple types of devices to monitor human actions and identify critical events for phys- ical safety. Some of the devices must be wireless in order to be nonintrusive. This introduces the problem of authenticat- ing these devices and building secure communication chan- nels among them. The traditional way is to assign a private key to a device for digital identification. In this paper, we present an approach to protect the private key by introduc- ing a third party and bilaterally and proactively generating a random number to refresh key shares based on Bellare and Miner's forward secure signature scheme. This improves the resilient mediated RSA solution because the entire private key is also updated periodically. In this way, if an attacker steals one key share, he only can use it for a limited period of time because it will be obsolete immediately after the next refresh operation. Even if he compromises both key shares simultaneously, the digital signatures generated by previous private keys are still secure. Our scheme is proven to be intrusion resilient based on the CDH assumption in the ran- dom oracle model. The construction is also quite efficient. Copyright 2009 ACM.
Peer-to-peer (P2P) technology is an emerging approach to overcoming the limitations of the traditional client server architecture. However, building a highly available P2P system is quite challenging, in particular a ...
详细信息
in this article we describe the Sweep-Shake system, a novel, low interaction cost approach to supporting the spontaneous discovery of geo-located information. By sweeping a mobile device around their environment, user...
详细信息
ISBN:
(纸本)9781605582818
in this article we describe the Sweep-Shake system, a novel, low interaction cost approach to supporting the spontaneous discovery of geo-located information. By sweeping a mobile device around their environment, users browse for interesting information related to points of interest. We built a mobile haptic prototype which encourages the user to explore their surroundings to search for location information, helping them discover this by providing directional vibrotactile feedback. Once potential targets are selected, the interaction is extended to offer an hierarchy of information levels with a simple method for filtering and selecting desired types of data for each geo-tagged location. We describe and motivate our approach and present a short field trial to situate our design in a real environment, followed by a more detailed user study that compares it against an equivalent visual-based system.
In this article we describe and evaluate a novel, low interaction cost approach to supporting the spontaneous discovery of geo-tagged information while on the move. Our mobile haptic prototype helps users to explore t...
详细信息
We present a hybrid user interface and gesture-based direct visual editing techniques for quick and rough object creation and manipulation in three-dimensional (3D) virtual environments (VEs). The user interface inclu...
详细信息
We present a hybrid user interface and gesture-based direct visual editing techniques for quick and rough object creation and manipulation in three-dimensional (3D) virtual environments (VEs). The user interface includes a novel table-prop to resemble an architect's physical workbench. A tracked pinch glove and a stylus pen provide both rough and fingertip level precise spatial input. For quick placement, objects do not float in space, but instead obey a set of constrained physics laws. Experimental results indicate our design is effective for architectural massing study. Our work contributes to the hardware system design and novel gesture-based interaction techniques, which have the potential to bring VEs into practical use in architecture.
A human pose estimation method from monocular image captures is presented. The objective is to develop a human-computer interface (HCI) for virtual sport activities. In the proposed technique, a graphical 3D human mod...
详细信息
Problem-based learning is a pedagogy that employs open-ended problems as a means of increasing student motivation and interaction in addition to achieving the intended educational goals. We present product-based learn...
详细信息
Problem-based learning is a pedagogy that employs open-ended problems as a means of increasing student motivation and interaction in addition to achieving the intended educational goals. We present product-based learning as an extension of collaborative problem-based learning by focusing on the design and development of a product as a solution to a proposed problem. In this approach, the instructor becomes an active member of the project team, working with the students to achieve the product vision. Through this method, students take control of their own learning while working together towards group success. Such a course design allows students to become active learners in achieving learning objectives, while at the same time providing project management and team-working experience. We explain the concept of product-based learning and demonstrate the process through the design and development of an educational software application. This project shows that the product-based method can promote positive attitudes, social interaction, and intentional learning in students while motivating them to achieve the intended learning objectives.
The rapid growth of socio-technical systems, social media and social networking websites has raised the importance of understanding the determinants of their success. The pressure to understand success is increased by...
详细信息
The rapid growth of socio-technical systems, social media and social networking websites has raised the importance of understanding the determinants of their success. The pressure to understand success is increased by the shift from playful discretionary applications to mission critical applications in government, business, and civic settings. These include homeland defense, energy sustainability, environmental conservation, disaster response, and community safety. Information visualization tools and statistical methods can both be helpful, but their utility grows when they are well-integrated. This talk will demonstrate novel tools for network evolution and offer a framework for thinking about motivating technology-mediated social participation.
暂无评论