2016
Autores
Carvalho, Diana; Bessa, Maximino; Magalhães, Luis; Carrapatoso, Eurico;
Publicação
Proceedings of the XVII International Conference on Human Computer Interaction, Interacción 2016, Salamanca, Spain, September 13 - 16, 2016
Abstract
Novel input modalities such as touch, tangibles or gestures try to exploit human's innate skills rather than imposing new learning processes. However, no work has been reported that systematically evaluates how these interfaces influence users' performance, that is, assesses if one interface can be more or less appropriate for interaction regarding: (1) different age groups; and (2) different basic tasks, as content insertion or manipulation. This work presents itself as an exploratory evaluation about whether or not the users' efficiency is indeed influenced by different input modalities and age. We conducted a usability evaluation with 60 subjects to understand how different interfaces may influence the speed and accuracy of three specific age groups (children, young adults and older-adults) when dealing with a basic content insertion task. Four input modalities were considered to perform the task (keyboard, touch, tangibles and gestures) and the methodology was based on usability testing (speed, accuracy and user preference). Overall, results show that there is a statistically significant difference in speed of task completion between the age groups, and there may be indications that the type of interface that is used can indeed influence efficiency in insertion tasks, and not so much other factors like age. Also, the study raises new issues regarding the "old" mouse input versus the "new" input modalities. © 2016 ACM.
2016
Autores
Gonçalves, D; Bessa, M;
Publicação
2016 23 Encontro Portugues de Computacao Grafica e Interacao, EPCGI 2016
Abstract
2016
Autores
Melo, M; Bessa, M; Debattista, K; Chalmers, A;
Publicação
High Dynamic Range Video: Concepts, Technologies and Applications
Abstract
Mobile devices are now widespread and multimedia consumption on these devices has increased significantly in recent years. More and more high dynamic range (HDR) content is being produced and its imminent adoption by the broadcast community means that there will soon be a demand to visualize HDR content on mobile devices. Mobile devices, however, have certain differences compared to traditional viewing devices. In particular, they are usually used on-the-go, making the context variables such as ambient lighting levels, or reflections important variables that need to be considered. Furthermore, despite their evolution so far, mobile devices usually have additional hardware limitations such as power supply, display features, or local storage availability. This chapter provides an overview of the work that has been conducted so far in addressing HDR video for mobile devices in order to ensure an optimal experience.
2016
Autores
Pinto, A; Costa, R;
Publicação
ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL
Abstract
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP) while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner
2016
Autores
Pinto, A; Costa, R;
Publicação
AMBIENT INTELLIGENCE - SOFTWARE AND APPLICATIONS (ISAMI 2016)
Abstract
The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT). Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smart-phone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP). Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.
2016
Autores
Devezas, T; Devezas, JL; Nunes, S;
Publicação
Proceedings of the First International Workshop on Recent Trends in News Information Retrieval co-located with 38th European Conference on Information Retrieval (ECIR 2016), Padua, Italy, March 20, 2016.
Abstract
The overwhelming amount of news content published online every day has made it increasingly difficult to perform macro-level analysis of the news landscape. Visual exploration tools harness both computing power and human perception to assist in making sense of large data collections. In this paper, we employed three visualization tools to explore a dataset comprising one million articles published by news organizations and blogs. The visual analysis of the dataset revealed that 1) news and blog sources evaluate very differently the importance of similar events, granting them distinct amounts of coverage, 2) there are both dissimilarities and overlaps in the publication patterns of the two source types, and 3) the content's direction and diversity behave differently over time. Copyright © 2016 for the individual papers by the paper's authors.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.