Identifying, Applying and Evaluating Gestural Interaction in Ubiquitous and Pervasive Computing

نویسندگان

  • Michael Wright
  • Eamonn O'Neill
  • Chun-Jung Lin
  • Darren Cosker
  • Peter Johnson
چکیده

We describe our ongoing research into gesture as an interaction technique for ubiquitous and pervasive computing. The goal of our research is to, 1. identify, through studies on user generated gestures, a gesture set for ubiquitous and pervasive computing which is both useful and useable across a range of devices, services and contexts 2. apply this gesture set to a range of gesture recognition systems and collect data on both user performance and preference as well as system performance 3. explore the trade off between the requirement for gestures which users regard as a good fit to the tasks they are performing, and gestures which are recognizable by the system 4. explore how both the user and the system adapt to each other over time We report our previous work where a series of linked empirical studies and system development enabled us to gain an insight into the identification, application and evaluation of gesture [2]. Furthermore, we report our ongoing and future research which aims to propose two complementary frameworks. The first aims to identify gestures based on end user consensus and preference. The second is to enable data regarding user and system performance and preference to be used to evaluate the identified gestures taking into account, 1. the trade off between the need for high system performance and high user performance and preference and 2. the co-adaptation of the user and the system over time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Directional Stroke Recognition Technique for Mobile Interaction in a Pervasive Computing World

This paper presents a common gestural interface to mobile and pervasive computing devices. We report our development of a novel technique for recognizing input strokes on a range of mobile and pervasive devices, ranging from small devices with low processing capabilities and limited input area to computers with wall-sized displays and an input area as large as can be accommodated by motion-sens...

متن کامل

Flow-driven Interactions for Adaptive Pervasive Applications

The era of ubiquitous and pervasive computing technology opens the world for new pervasive applications and services within the physical surroundings. Often users find themselves dealing and interacting with multiple applications simultaneously to achieve certain goals to satisfy certain motive. Currently, pervasive computing applications are individually created and tailored with little or no ...

متن کامل

First, do no harm: user studies in pervasive healthcare research

Pervasive Computing can help address some of the critical healthcare issues facing modern society, such as an aging population, increased obesity and escalating costs. While interaction concerns are of primary importance in pervasive computing, patient safety and the complexity of the domain demand special attention to these issues when designing and evaluating healthcare applications. Several ...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012