Auditory User Interfaces


Book Description

Auditory User Interfaces: Toward the Speaking Computer describes a speech-enabling approach that separates computation from the user interface and integrates speech into the human-computer interaction. The Auditory User Interface (AUI) works directly with the computational core of the application, the same as the Graphical User Interface. The author's approach is implemented in two large systems, ASTER - a computing system that produces high-quality interactive aural renderings of electronic documents - and Emacspeak - a fully-fledged speech interface to workstations, including fluent spoken access to the World Wide Web and many desktop applications. Using this approach, developers can design new high-quality AUIs. Auditory interfaces are presented using concrete examples that have been implemented on an electronic desktop. This aural desktop system enables applications to produce auditory output using the same information used for conventional visual output. Auditory User Interfaces: Toward the Speaking Computer is for the electrical and computer engineering professional in the field of computer/human interface design. It will also be of interest to academic and industrial researchers, and engineers designing and implementing computer systems that speak. Communication devices such as hand-held computers, smart telephones, talking web browsers, and others will need to incorporate speech-enabling interfaces to be effective.










3D User Interfaces


Book Description

The Complete, Up-To-Date Guide to Building Great 3D User Interfaces for Any Application 3D interaction is suddenly everywhere. But simply using 3D input or displays isn’t enough: 3D interfaces must be carefully designed for optimal user experience. 3D User Interfaces: Theory and Practice, Second Edition is today’s most comprehensive primary reference to building state-of-the-art 3D user interfaces and interactions. Five pioneering researchers and practitioners cover the full spectrum of emerging applications, techniques, and best practices. The authors combine theoretical foundations, analysis of leading devices, and empirically validated design guidelines. This edition adds two new chapters on human factors and general human-computer interaction—indispensable foundational knowledge for building any 3D user interface. It also demonstrates advanced concepts at work through two running case studies: a first-person VR game and a mobile augmented reality application. Coverage Includes 3D user interfaces: evolution, elements, and roadmaps Key applications: virtual and augmented reality (VR, AR), mobile/wearable devices What 3D UI designers should know about human sensory systems and cognition ergonomics How proven human-computer interaction techniques apply to 3D UIs 3D UI output hardware for visual, auditory, and haptic/ tactile systems Obtaining 3D position, orientation, and motion data for users in physical space 3D object selection and manipulation Navigation and wayfinding techniques for moving through virtual and physical spaces Changing application state with system control techniques, issuing commands, and enabling other forms of user input Strategies for choosing, developing, and evaluating 3D user interfaces Utilizing 2D, “magic,” “natural,” multimodal, and two-handed interaction The future of 3D user interfaces: open research problems and emerging technologies




Cryptology and Network Security


Book Description

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.




Software Architecture


Book Description

Part of the new series, Advanced Topics in Science and Technology in China, this book aims to introduce the theoretical foundations, various sub-fields, current research, and practical methods of software architecture. First off, readers can acquire a basic knowledge of software architecture, including why software architecture is necessary. They are then shown how to describe a system’s architecture with formal language. The authors continue by delineating which architecture styles are popular in practice.




Information and Communications Security


Book Description

Annotation. This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised full papers presented together with an invited talk were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on access control, public key cryptography and cryptanalysis, security in distributed and mobile systems, cryptanalysis, authentication, fair exchange protocols, anonymity and privacy, software security, proxy cryptosystems, and intrusion detection systems.




Financial Cryptography


Book Description

This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998. The 28 revised papers presented were carefully selected and improved beyond the versions presented at the meeting. The book presents the state of the art in research and development in financial cryptography and addresses all current topics such as electronic payment systems, digital cash, electronic commerce, digital signatures, payment transactions, revocation and validation, WWW commerce, trust management systems, and watermarking.




Human Computer Interaction


Book Description




User Modeling, Adaptation and Personalization


Book Description

This book constitutes the proceedings of the third annual conference under the UMAP title, aptation, which resulted from the merger in 2009 of the successful biannual User Modeling (UM) and Adaptive Hypermedia (AH) conference series, held on Girona, Spain, in July 2011. The 27 long papers and 6 short papers presented together with15 doctoral consortium papers, 2 invited talks, and 3 industry panel papers were carefully reviewed and selected from 164 submissions. The tutorials and workshops were organized in topical sections on designing adaptive social applications, semantic adaptive social Web, and designing and evaluating new generation user modeling.