Conference Paper

A 2-Way Laser-Assisted Selection Scheme for Handhelds in a Physical Environment.

DOI: 10.1007/978-3-540-39653-6_16 Conference: UbiComp 2003: Ubiquitous Computing, 5th International Conference, Seattle, WA, USA, October 12-15, 2003, Proceedings
Source: DBLP

ABSTRACT We present a 2-way selection method to select objects in a physical environment with a novel feedback and transfer of control mechanism. A modulated laser pointer signal sent from a handheld device triggers a photosen- sitive tag placed in the environment. The tag responds via a standard wireless channel directly to the handheld with information regarding an object it repre- sents. We describe a prototype implementation for a Motorola iDEN i95cl cell phone, discuss the interaction challenges and application possibilities for this physical world selection that extends a common handheld device. We also compare this solution to related attempts in the literature.

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this, chapter, the use of RFID technology for supporting all animal related activities (identification, tracking, monitoring e.a.) is described. Following, this approach, the chapter provides a comprehensive coverage of the use of RFID in relation to domestic, farm and wild animals, the particularities that this use has in each case, while on the other hand provides example-prototype uses for each case. Legislation issues, as these are addressed globally, are also tackled, giving an overview of the existing legislative framework for the use of RFID as regards animals.
    The Internet of Things, From RFID to the Next-Generation Pervasive Networked Systems, Edited by Lu Yan, Yan Zhang, Laurence T. Yang, Huansheng Ning, 01/2008: chapter RFID application in animal monitoring: pages 165-184; Taylor and Francis (Auerbach Publications)., ISBN: 1420052810
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Models of human motor behavior are well known as an aid in the design of user interfaces (UIs). Most current models apply primarily to desktop interaction, but with the development of non-desktop UIs, new types of motor behaviors need to be modeled. Distal pointing—pointing directly at a target that is remotely situated with respect to the input device—is such a motor behavior. A model of distal pointing would be particularly useful in the comparison of different interaction techniques, because the performance of such techniques is highly dependent on user strategy, making controlled studies difficult to perform. Inspired by Fitts’ law, we studied four possible models and concluded that movement time for a distal pointing task is best described as a function of the angular amplitude of movement and the angular size of the target. Contrary to Fitts’ law, our model shows that the angular size has a much larger effect on movement time than the angular amplitude and that the growth in the difficulty of the tasks is quadratic, rather than linear. We estimated the model's parameters experimentally with a correlation coefficient of 96%.
    International Journal of Human-Computer Studies 10/2010; DOI:10.1016/j.ijhcs.2010.05.001 · 1.17 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In the near future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Security infrastructure is most important in such a hazardous scope of vehicles communication for coordinating actions and avoiding accidents on the roads. One of the first security issues that need to be established is authentication. Vehicle authentication with visual binding prior to establishing a wireless radio channel of communication is useful only when the vehicles possess unique visual attributes. These vehicle static attributes (e.g., licence number, brand and color) are certified together with the vehicle public key. Therefore, we consider the case of multiple malicious vehicles with identical visual static attributes. Apparently, dynamic attributes (e.g., location and direction) can uniquely define a vehicle and can be utilized to resolve the true identity of vehicles. However, unlike static attributes, dynamic attributes cannot be signed by a trusted authority beforehand. We propose an approach to verify the coupling between non-certified dynamic attributes and certified static attributes on an auxiliary communication channel, for example, a modulated laser beam. Furthermore, we illustrate that the proposed approach can be used to facilitate the usage of existing authentication protocols such as NAXOS, in the new scope of ad-hoc vehicle networks.
    13th International Symposium on Network Computing and Applications (IEEE-NCA), Cambridge, Massachusett, USA; 09/2014