Conference Paper

A 2-Way Laser-Assisted Selection Scheme for Handhelds in a Physical Environment.

DOI: 10.1007/978-3-540-39653-6_16 Conference: UbiComp 2003: Ubiquitous Computing, 5th International Conference, Seattle, WA, USA, October 12-15, 2003, Proceedings
Source: DBLP


We present a 2-way selection method to select objects in a physical environment with a novel feedback and transfer of control mechanism. A modulated laser pointer signal sent from a handheld device triggers a photosen- sitive tag placed in the environment. The tag responds via a standard wireless channel directly to the handheld with information regarding an object it repre- sents. We describe a prototype implementation for a Motorola iDEN i95cl cell phone, discuss the interaction challenges and application possibilities for this physical world selection that extends a common handheld device. We also compare this solution to related attempts in the literature.

12 Reads
  • Source
    • "In [9], the authors suggest the transmission of the shared secret key through the laser modulation. It has the same drawback as with the previous approach [20] that is an adversary equipped with a high resolution camera might capture the laser beam modulation to recover the secret session key. Another work, in [17], presents a visual out-of-band channel. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In the near future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Security infrastructure is most important in such a hazardous scope of vehicles communication for coordinating actions and avoiding accidents on the roads. One of the first security issues that need to be established is authentication. Vehicle authentication with visual binding prior to establishing a wireless radio channel of communication is useful only when the vehicles possess unique visual attributes. These vehicle static attributes (e.g., licence number, brand and color) are certified together with the vehicle public key. Therefore, we consider the case of multiple malicious vehicles with identical visual static attributes. Apparently, dynamic attributes (e.g., location and direction) can uniquely define a vehicle and can be utilized to resolve the true identity of vehicles. However, unlike static attributes, dynamic attributes cannot be signed by a trusted authority beforehand. We propose an approach to verify the coupling between non-certified dynamic attributes and certified static attributes on an auxiliary communication channel, for example, a modulated laser beam. Furthermore, we illustrate that the proposed approach can be used to facilitate the usage of existing authentication protocols such as NAXOS, in the new scope of ad-hoc vehicle networks.
    13th International Symposium on Network Computing and Applications (IEEE-NCA), Cambridge, Massachusett, USA; 09/2014
  • Source
    • "This is quite undesirable in a domestic context where users may want to have some freedom. Another solution was proposed to decrease errors and improve precision, by providing a confirmation step and larger targets [8]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: We focus on the selection of light sources in the physical world. Their selection is challenging for the user, since numerous Light-Emitting Diodes (LEDs) can be embedded into various materials as well as environments, thus creating high densities of interactive objects. In this paper, we describe an innovative technique for light sources selection based on the pointing paradigm, that is, allowing interaction at a distance. To address the limitations of the pointing paradigm (e.g., aiming at distant and/or small targets), we design a two-step pointing technique: a rough aiming with an arm pointing gesture and a disambiguation mechanism with a wrist rolling gesture. Feedbacks lean on the various capacities of LED lights. We expect that our technique is well suited for the selection task in dense environments, no matter how small and how distant the targeted light sources are. We also expect that the technique supports an efficient interaction based on proprioception and muscular memory properties for expert users, who may perform the two interaction steps by a single combined gesture for better performance.
  • Source
    • "Several existing systems and research projects use some form of distal pointing to control the cursor. Examples include home entertainment system control (Patel and Abowd, 2003) and laser pointer interaction (Olsen and Nielsen, 2001). In fact, distal pointing interaction has made its way into consumer products with the Nintendo "
    [Show abstract] [Hide abstract]
    ABSTRACT: Models of human motor behavior are well known as an aid in the design of user interfaces (UIs). Most current models apply primarily to desktop interaction, but with the development of non-desktop UIs, new types of motor behaviors need to be modeled. Distal pointing—pointing directly at a target that is remotely situated with respect to the input device—is such a motor behavior. A model of distal pointing would be particularly useful in the comparison of different interaction techniques, because the performance of such techniques is highly dependent on user strategy, making controlled studies difficult to perform. Inspired by Fitts’ law, we studied four possible models and concluded that movement time for a distal pointing task is best described as a function of the angular amplitude of movement and the angular size of the target. Contrary to Fitts’ law, our model shows that the angular size has a much larger effect on movement time than the angular amplitude and that the growth in the difficulty of the tasks is quadratic, rather than linear. We estimated the model's parameters experimentally with a correlation coefficient of 96%.
    International Journal of Human-Computer Studies 10/2010; 68(10-68):603-615. DOI:10.1016/j.ijhcs.2010.05.001 · 1.29 Impact Factor
Show more

Similar Publications


12 Reads