Research explorer tool

Date


School

People

Output Type

Download Available

217 results

My Grandfather's iPod: an investigation of emotional attachment to digital and non-digital artefacts.

Conference Proceeding
Turner, P., & Turner, S. (2011)
My Grandfather's iPod: an investigation of emotional attachment to digital and non-digital artefacts. In ECCE '11 Proceedings of the 29th Annual European Conference on Cognitive Ergonomics, 149-156. https://doi.org/10.1145/2074712.2074742
Motivation -- to explore the nature and dimensions of attachment to digital and non-digital artefacts and explicate any differences in emotional attachment between digital and...

Orbits: gaze Interaction for smart watches using smooth pursuit eye movements.

Conference Proceeding
Esteves, A., Velloso, E., Bulling, A., & Gellersen, H. (2015)
Orbits: gaze Interaction for smart watches using smooth pursuit eye movements. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology, (457-466). https://doi.org/10.1145/2807442.2807499
We introduce Orbits, a novel gaze interaction technique that enables hands-free input on smart watches. The technique relies on moving controls to leverage the smooth pursuit ...

Landscaping personification technologies: from interactions to relationships

Conference Proceeding
Benyon, D., & Mival, O. (2008)
Landscaping personification technologies: from interactions to relationships. In Proceedings of the Conference on Human Factors in Computing Systems, presented at CHI 2008, Florence, April 2008, 3657-3662. doi:10.1145/1358628.1358908
Personification technologies are technologies that encourage people to anthropomorphize. These technologies try to get people to form relationships with them rather than simpl...

Scientific names are ambiguous as identifiers for biological taxa: their context and definition are required for accurate data integration

Conference Proceeding
Kennedy, J., Kukla, R., & Paterson, T. (2005)
Scientific names are ambiguous as identifiers for biological taxa: their context and definition are required for accurate data integration. In B. Ludaescher, & L. Raschid (Eds.), Data Integration in the Life Sciences, 80-95. https://doi.org/10.1007/11530084_8
Biologists use scientific names to label the organisms described in their data; however, these names are not unique identifiers for taxonomic entities. Alternative taxonomic c...

Soundscape mapping: a tool for evaluating sounds and auditory environments

Conference Proceeding
McGregor, I., LePlâtre, G., Turner, P., & Flint, T. (2010)
Soundscape mapping: a tool for evaluating sounds and auditory environments. In Proceedings of the 16th International Conference on Auditory Display
This paper describes a soundscape mapping tool, and provides an illustration of its use in the evaluation of an in-car auditory interface. The tool addresses three areas: comm...

Sound and soundscape classification: Establishing key auditory dimensions and their relative importance

Conference Proceeding
McGregor, I., LePlâtre, G., Crerar, A., & Benyon, D. (2006)
Sound and soundscape classification: Establishing key auditory dimensions and their relative importance
This paper investigates soundscape classification by using two different forms of data gathering and two different populations. The first method involves a questionnaire compl...

Evaluating human-machine conversation for appropriateness.

Conference Proceeding
Webb, N., Benyon, D., Hansen, P., & Mival, O. (2010)
Evaluating human-machine conversation for appropriateness. In Proceedings of the Seventh conference on International Language Resources and Evaluation (LREC'10), 84-91
Evaluation of complex, collaborative dialogue systems is a difficult task.Traditionally, developers have relied upon subjective feedback from the user,and parametrisation over...

Enhancing intrusion detection via an active target host.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006
Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of netwo...

EniSpace: Evaluating Navigation in Information Space

Conference Proceeding
McCall, R., & Benyon, D. (1998)
EniSpace: Evaluating Navigation in Information Space. In P. De Bra, & J. J. Leggett (Eds.), Proceedings of WebNet World Conference on the WWW and Internet 1999, 1344-1345
Traditional methods of evaluating usability such as heuristic evaluation and cognitive walkthrough do not address all issues relating to navigation. This is despite the fact t...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...