To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
Students are starting to use networked visual argumentation tools to discuss, debate, and argue with one another about topics presented by a teacher. However, this development give...
Bruce M. McLaren, Oliver Scheuer, Maarten De Laat,...
In problem solving a goal/subgoal is either solved by generating needed information from current information, or further decomposed into additional subgoals. In traditional problem...
B. Chandrasekaran, Unmesh Kurup, Bonny Banerjee, J...
Many Vision-Based Human-Computer Interaction (VB-HCI) systems are based on the tracking of user actions. Examples include gazetracking, head-tracking, finger-tracking, and so fort...
Guangqi Ye, Jason J. Corso, Darius Burschka, Grego...
We present experimental work which explores how the match (or mismatch) between the input space of the hands and the output space of a graphical display influences twohanded input...