Date


Output Type

Download Available

52 results

Domesticating technology: in-home requirements gathering with frail older people?

Conference Proceeding
Dickinson, A., Goodman, J., Syme, A., Eisma, R., Tiwari, L., Mival, O., & Newell, A. (2002)
Domesticating technology: in-home requirements gathering with frail older people?. In Proceedings 10th International Conference on Human - Computer Interaction HCI. Crete, Greece, June 2003)
As technology becomes increasingly important as a means of supporting older people at home, the dangers of distress caused by the introduction of inappropriate technology beco...

Interoperable Services for Federations of Database System

Conference Proceeding
Roantree, M., Kennedy, J., & Barclay, P. J. (2002)
Interoperable Services for Federations of Database System. In A. Caplinskas, & J. Eder (Eds.), Advances in Databases and Information Systems: Fifth East-European Conference ADBIS' 2001
The problems associated with defining interoperable protocols for heterogenous information systems has been the subject of researchers for many years. While numerous solutions...

Problems of Perceiving Gloss on Complex Surfaces

Conference Proceeding
Methven, T. S., & Chantler, M. J. (2012)
Problems of Perceiving Gloss on Complex Surfaces. In Predicting Perceptions: Proceedings of the 3rd International Conference on Appearance, 43-47
Over the past 20 years, there have been many studies looking at how highlight disparity affects an observer's perception of glossiness. Most of these studies ha...

Landscaping personification technologies: from interactions to relationships

Conference Proceeding
Benyon, D., & Mival, O. (2008)
Landscaping personification technologies: from interactions to relationships. In Proceedings of the Conference on Human Factors in Computing Systems, presented at CHI 2008, Florence, April 2008 (3657-3662). https://doi.org/10.1145/1358628.1358908
Personification technologies are technologies that encourage people to anthropomorphize. These technologies try to get people to form relationships with them rather than simpl...

Scientific names are ambiguous as identifiers for biological taxa: their context and definition are required for accurate data integration

Conference Proceeding
Kennedy, J., Kukla, R., & Paterson, T. (2005)
Scientific names are ambiguous as identifiers for biological taxa: their context and definition are required for accurate data integration. In B. Ludaescher, & L. Raschid (Eds.), Data Integration in the Life Sciences, 80-95. https://doi.org/10.1007/11530084_8
Biologists use scientific names to label the organisms described in their data; however, these names are not unique identifiers for taxonomic entities. Alternative taxonomic c...

An embedded real-time pedestrian detection system using an infrared camera.

Conference Proceeding
Walczyk, R., Armitage, A., & Binnie, D. (2010)
An embedded real-time pedestrian detection system using an infrared camera. In IET Irish Signals and Systems Conference (ISSC 2009)https://doi.org/10.1049/cp.2009.1716
An FPGA-based implementation of a pedestrian detection system using thermal infrared imaging is presented. The main feature of the processing platform is its ability to detec...

Maker Movements, Do-It-Yourself Cultures and Participatory Design: Implications for HCI Research

Conference Proceeding
Smyth, M., Helgason, I., Kresin, F., Balestrini, M., Unteidig, A. B., Lawson, S., …Dourish, P. (2018)
Maker Movements, Do-It-Yourself Cultures and Participatory Design: Implications for HCI Research. In CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systemshttps://doi.org/10.1145/3170427.3170604
Falling costs and the wider availability of computational components, platforms and ecosystems have enabled the expansion of maker movements and DIY cultures. This can be cons...

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...

AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks

Conference Proceeding
Rotärmel, S., Farrenkopf, T., Guckert, M., & Urquhart, N. (2017)
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. In Y. Demazeau, P. Davidsson, J. Bajo, & Z. Vale (Eds.), Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection. , (355-358). https://doi.org/10.1007/978-3-319-59930-4_37
AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geograph...

PhotoPal: companionship, sharing and the digital echo.

Conference Proceeding
Mival, O., O'Keefe, B., Bradley, J., Roa-Seiler, N., & Benyon, D. (2008)
PhotoPal: companionship, sharing and the digital echo. In Proceedings of CHI Collocated Social Practices Surrounding Photos Workshop
This short paper introduces the research of the 14 partner, EU Framework 6 project, COMPANIONS. It focuses on the development of PhotoPal, a multimodal system harnessing the c...