Filters








554,426 Hits in 6.1 sec

Exploiting spatial memory to design efficient command interfaces

Joey Scarr
2013 CHI '13 Extended Abstracts on Human Factors in Computing Systems on - CHI EA '13  
In order to inform the design of UIs that better support spatial memory, we are studying the human and interface factors that affect the growth and resilience of spatial knowledge, and producing a series  ...  However, spatial memory is rarely exploited by modern applications.  ...  I anticipate finishing my degree in early 2014. While I primarily identify as a computer scientist, I am strongly interested in the human factors that affect interaction.  ... 
doi:10.1145/2468356.2468711 dblp:conf/chi/Scarr13 fatcat:xjdv6yoppvhull3bn2uhiff2eq

Exploiting thermal reflection for interactive systems

Alireza Sahami Shirazi, Yomna Abdelrahman, Niels Henze, Stefan Schneegass, Mohammadreza Khalilbeigi, Albrecht Schmidt
2014 Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14  
They are robust to illumination changes and make it easy to separate human bodies from the image background.  ...  ABSTRACT Thermal cameras have recently drawn the attention of HCI researchers as a new sensory system enabling novel interactive systems.  ...  In contrast, we propose to exploit thermal reflection as a unique characteristic of thermal radiation and use it for interactive systems.  ... 
doi:10.1145/2556288.2557208 dblp:conf/chi/ShiraziAHSKS14 fatcat:z37lyxer4zbqjcfmpbkuelmmjm

Exploiting knowledge-in-the-head and knowledge-in-the-social-web

Ruogu Kang, Wai-Tat Fu, Thomas George Kannampallil
2010 Proceedings of the 28th international conference on Human factors in computing systems - CHI '10  
Specifically, experts found more general information than novices by better interpretation of social tags in the tagging system; and experts also found more domain-specific information by generating more  ...  is still important in guiding them to find and evaluate the information.  ...  All participants were skilled computer users with more than 10 years of computer usage experience (mean = 13.8).  ... 
doi:10.1145/1753326.1753386 dblp:conf/chi/KangFK10 fatcat:ez22xo7tkfcxlbqku4tcpg323a

AI4RFQ: Exploiting User Annotations Towards Automating the Extraction of Information and Requirements from Specification Documents

Rene Kaiser, Hermann Stern
2021 International Conference on Human Factors in Computing Systems  
CCS Concepts: • Human-centered computing → HCI design and evaluation methods; • Information systems → Search interfaces; • Applied computing → Document searching.  ...  We strive to participate in the 'Automation Experience at the Workplace' workshop to discuss this change in work practice for our target users in terms of a technical as well as a user experience dimension  ...  In the realm of a research project, we investigate success factors for creating and introducing human-centred AI-based systems.  ... 
dblp:conf/chi/KaiserS21 fatcat:luysgefxzzcohnn7ljkp6m7z4u

HoloBar: Rapid Command Execution for Head-Worn AR Exploiting Around the Field-of-View Interaction

Houssem Saidi, Emmanuel Dubois, Marcos Serrano
2021 Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems  
CCS CONCEPTS •Human-centered computing~Human computer interaction (HCI)~Interaction paradigms~Mixed / augmented reality; Gestural input.  ...  ABSTRACT Inefficient menu interfaces lead to system and application commands being tedious to execute in Immersive Environments.  ...  This value is in line with the limits of the human visual field [31] .  ... 
doi:10.1145/3411764.3445255 fatcat:zppzygtoejga3mskpks4tr3b3y

On exploiting the on-off characteristics of human speech to conserve energy for the downlink VoIP in WiMAX systems

Xiao-Hui Lin, Ling Liu, Hui Wang, Yu-Kwong Kwok
2011 2011 7th International Wireless Communications and Mobile Computing Conference  
To guarantee QoS requirements in real-time services such as VoIP, traditional energy saving strategies adopt constant listen-sleep intervals, ignoring the On-Off characteristics of human speech.  ...  Therefore, neglecting this fact can lead to unnecessary periodical listening in the silence duration, and, in turn, can result in excessive waste of battery energy.  ...  CONCLUSION In this paper, we adopted a hybrid energy conservation scheme for the downlink simplex VoIP in WiMAX system. We have also given an analysis model to evaluate the system performance.  ... 
doi:10.1109/iwcmc.2011.5982556 dblp:conf/iwcmc/LinLWK11 fatcat:qpgdvoo6ubatzcxjwzz7qbkoyy

On self-adaptive resource allocation through reinforcement learning

Jacopo Panerati, Filippo Sironi, Matteo Carminati, Martina Maggio, Giovanni Beltrame, Piotr J. Gmytrasiewicz, Donatella Sciuto, Marco D. Santambrogio
2013 2013 NASA/ESA Conference on Adaptive Hardware and Systems (AHS-2013)  
Typical Properties of Self-adaptive Computing Self-configuration The system requires limited or no human intervention in order to set-up.  ...  Typical Properties of Self-adaptive Computing Self-configuration The system requires limited or no human intervention in order to set-up.  ... 
doi:10.1109/ahs.2013.6604222 dblp:conf/ahs/PaneratiSCMBGSS13 fatcat:qqsbt5m2cbhh5mx7sktzks4sxq

Inferring Capabilities of Intelligent Agents from Their External Traits

Bart P. Knijnenburg, Martijn C. Willemsen
2016 ACM transactions on interactive intelligent systems (TiiS)  
We show that users of the more human-like agent form an anthropomorphic use image of the system: they act as if the system is human, and try to exploit typical human-like capabilities.  ...  We investigate the usability of human-like agent-based interfaces. In an experiment we manipulate the capabilities and the "human-likeness" of a travel advisory agent.  ...  Figure 1 . 1 Pps use more human-like and capability-exploiting responses towards systems with human-like cues (HLC) and human-like and capability-exploiting cues (HLCEC), than towards systems with computer-like  ... 
doi:10.1145/2963106 fatcat:4aslbvphjvgi3en43uu6b7kk5u

Intelligent Autonomous Systems: A Layered Architecture in the Age of Multicore Processing [chapter]

Guna Seetharaman
2011 Communications in Computer and Information Science  
Such reductions may overly simplify approaches to model and exploit redundancy in manners that human perception is able to in a bidirectional inferencing process.  ...  Research in intelligent autonomous systems has historically been constrained by access to scalable high-performance computing.  ...  Such reductions may overly simplify approaches to model and exploit redundancy in manners that human perception is able to in a bidirectional inferencing process.  ... 
doi:10.1007/978-3-642-22606-9_2 fatcat:rwcqncgn5vdivp3we5dxbtcdgy

Opportunities in Opportunistic Computing

Marco Conti, Mohan Kumar
2010 Computer  
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply.  ...  However, we believe that exploiting the natural cooperation that exists in human social relations is the catalyst for opportunistic computing.  ...  Thus, exploiting the properties of human social links to build an electronic social device network offers a promising direction for developing efficient and effective pervasive computing systems that can  ... 
doi:10.1109/mc.2010.19 fatcat:6ykgb46wlbca5jtjlzbwcnjdfm

Opportunities in opportunistic computing

Marco Conti, Mohan Kumar
2009 Computer  
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply.  ...  However, we believe that exploiting the natural cooperation that exists in human social relations is the catalyst for opportunistic computing.  ...  Thus, exploiting the properties of human social links to build an electronic social device network offers a promising direction for developing efficient and effective pervasive computing systems that can  ... 
doi:10.1109/mc.2009.378 fatcat:mq3mdzqszvhzfcelxdpu7i7wjm

Sustaining Economic Exploitation of Complex Ecosystems in Computational Models of Coupled Human-Natural Networks

Neo Martinez, Perrine Tonnin, Barbara Bauer, Rosalyn Rael, Rahul Singh, Sangyuk Yoon, Ilmi Yoon, Jennifer Dunne
2021 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Here, we describe the first extension of this field to include coupled human-natural systems.  ...  Recent elucidation of the famously coined "devious strategies for stability in enduring natural systems" has opened up a new field of computational analyses of complex ecological networks where the nonlinear  ...  Computational analyses of ecological systems that ignore humans have illuminated powerful structural regularities in the consumer-resource networks that comprise food webs (Dunne 2006 , Dunne et al. 2008  ... 
doi:10.1609/aaai.v26i1.8174 fatcat:zjyogxgwpjcanimblo6tk726aq

Three Dimensional Animation for Performance Debugging Utilizing Human Cognitive Ability [chapter]

Noritaka Osawa, Toshitsugu Yuba
1997 Human-Computer Interaction INTERACT '97  
In visualizing perfocmance data, it is important to exploit the human cognitive ability of recognizing slight differences in shapes, positions and velocities of familiar objects.  ...  It animates performance data based on dynamic system modeling where the data is mapped to a dynamic system model, the model is simulated and the result of simulation is made visible in 3 dimensions.  ...  Thus we have considered utilizing or exploiting the human ability to easily recognize balanced states, unbalanced states and natural (unfocced) movement in a dynamic system.  ... 
doi:10.1007/978-0-387-35175-9_17 fatcat:7x3hls4akrbx7mwnxq6e7bjivi

Recommender Systems

Hannes Werthner, Hans Hansen, Franceso Ricci
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
Many early recommender systems were designed to support simple, information search oriented human-computer interactions with two phases: user model construction and recommendation generation.  ...  Research on recommender systems has overlapped many computer science and information systems topics, especially Information Retrieval and Artificial Intelligence were of major importance.  ...  Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07) 0-7695-2755-8/07 $20.00 © 2007  ... 
doi:10.1109/hicss.2007.459 dblp:conf/hicss/WerthnerHR07 fatcat:g24x7z4ykbewtdfvif4segjx2u

Lifelong Computing [article]

Danny Weyns, Thomas Bäck, Renè Vidal, Xin Yao, Ahmed Nabil Belbachir
2021 arXiv   pre-print
However, dealing with unanticipated changes, such as anomalies, novelties, new goals or constraints, requires system evolution, which remains in essence a human-driven activity.  ...  Depending on the domain at hand, some activities of lifelong computing systems can be supported by humans.  ...  As illustrated in Figure 1 , lifelong computing systems differ fundamentally from traditional computing systems and learning algorithms by using lifelong computing algorithms in lieu of humans to adapt  ... 
arXiv:2108.08802v1 fatcat:wflkryh4drgxxl6umi3avebnre
« Previous Showing results 1 — 15 out of 554,426 results