• Home
  • Yesaya Tommy Paulus
Yesaya Tommy Paulus

Yesaya Tommy Paulus
Dipa Makassar University · Department of Information Systems

Ph.D

About

10
Publications
6,041
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
13
Citations
Introduction
My work focuses on the applications of eye-tracking for human-machine interactions, and more specifically the use of natural eye movements to achieve seamless experiences.

Publications

Publications (10)
Conference Paper
Nowadays, the teaching-learning process was completely performed online due to COVID-19 existed. To support this process, a lecturer was typically used a kind of video meetings to present the teaching materials. The first type is the video-conferencing meeting in which students and lecturers can directly interact during activities. The next type is...
Conference Paper
Computer needs an operating system in order to work. The operating system still needs to be equipped with supporting applications in order to meet user needs. The process of completing a computer with an operating system and supporting applications is called installation. Installation takes time and effort, the more applications you will use the mo...
Conference Paper
The searching denotes a process that aims to find a specific item in the data set. After performing the process of searching, the desired items are likely found or not. This kind of investigations was actually demonstrated by some researchers. For each search algorithm, the previous studies just focused to obtain the search time but did not obtain...
Conference Paper
Mathematics is one of the courses taught at every level of education in some countries. Some students still find math a scary subject. One of the reasons is because students are not familiar with the basics of arithmetic. Therefore, this study aims to investigate whether students are motivated, interested, and faster in learning mathematics by comp...
Article
Full-text available
This study investigates the usability of various “dwell times” for selecting visual objects with eye-gaze-based input by means of eye tracking. Two experiments are described in which participants used eye-gaze-based input to select visual objects consisting of alphanumeric characters, dots, or visual icons. First, a preliminary experiment was desig...
Article
Full-text available
This study investigates which grid formations and password formats are useful for password authentication by means of eye-gaze-based input. Sixteen grid formations were made, in between 3×3 to 6×6 cells (columns-by-rows), for three password formats. The formats were an alphanumeric format, a pattern format, and a picture format. The participants we...
Conference Paper
Visual passwords are passwords made by selecting a sequence of objects on a screen, such as symbols, pictures, or patterns, either by manual input or eye-gaze-based input. Visual passwords can be useful alternatives to alphanumeric passwords, particularly for authentication on devices in semi-private or public spaces (e.g., on ATMs, laptops, smartp...
Conference Paper
Full-text available
It is known that the use of glasses can hamper the quality and speed of user registration into eye-tracking devices. Studies have been done in which the performances of various eye-tracking devices were compared, typically under ideal viewing angles, with the user sitting behind a display under a fixed lighting condition. Here we investigated the i...
Conference Paper
Full-text available
Eye tracking can be used for eye-gaze-based authentication in public settings, such as for registration on personal computers and automated teller machines. In this study, we conducted a series of measurements with low-cost eyetracking devices to assess the feasibility of their use in such settings. We investigated the devices' minimum and maximum...
Article
Full-text available
Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnya nilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapat memodifikasi informasi tersebut. Untuk dapat mengesahkan informasi yang didapatkan, maka harus dilakukan authentication pada informasi sehingga diketahui keaslian...

Network

Cited By