Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
In order to improve stimulus-response compatibility of touchpad in pen-based user interface, we present the tilt cursor, i.e. a cursor dynamically reshapes itself to providing the...
Human control of multiple robots has been characterized by the average demand of single robots on human attention or the distribution of demands from multiple robots. When robots ...
We present a study that explores the use of a commercially available eye tracker as a control device for video games. We examine its use across multiple g...
Abstract. Supporting work activities in healthcare is highly complex and challenging. This paper outlines the findings from a usability study of a commercial PC based electronic pa...