Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
Abstract. Web accessibility and usability problems can make evaluation difficult for non-experts who may be unfamiliar with assistive technology. Developers often (i) lack easy acc...
Abstract. Demographic change in regard to an aging population with an increasing amount of diabetes patients will put a strain on health care rentability in all modern societies. E...
Existing development tools provide little out-of-the-box assistance in order to design and develop accessible ICT Java solutions for impaired users. Two new approximation simulatio...
We present a framework to adapt software to the needs of individuals with severe motion disabilities who use mouse substitution interfaces. Typically, users are required to adapt t...
Abstract. In order to allow blind and deafblind people to use and explore electronically available maps, we have developed a system that displays maps in a tactile way using a stan...
—Much effort has focused in recent years on developing more life-like robots. In this paper we propose a model of memory for robots, based on human digital memories, though our m...
This paper presents a measure for assessing the perceived hardness of a haptic surface based on associated physical variables. This metric, named extended rate-hardness (ERH), is e...
Abstract. We analyze the stability of previously proposed mobile robot teleoperation system [7]. Unlike to other approaches human-operator dynamics is included for the stability an...
We investigated the tactile perception of a liquid surface that can be clearly felt as a thin line by a hand moving in the liquid. Although this phenomenon was first reported by Me...