Academic literature on the topic 'Human-computer interaction'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Human-computer interaction.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Human-computer interaction"
Zhang, Tongda, Xiao Sun, Yueting Chai, and Hamid Aghajan. "Human Computer Interaction Activity Based User Identification." International Journal of Machine Learning and Computing 4, no. 4 (2014): 354–58. http://dx.doi.org/10.7763/ijmlc.2014.v4.436.
Full textOrfei, Maria Donata. "Human-Computer Interaction: Lights, Shadows, and Spotlights." Mental Health & Human Resilience International Journal 7, no. 2 (2023): 1–4. http://dx.doi.org/10.23880/mhrij-16000229.
Full textJones, Steve, and Steve Marsh. "Human-computer-human interaction." ACM SIGCHI Bulletin 29, no. 3 (July 1997): 36–40. http://dx.doi.org/10.1145/264853.264872.
Full textJadhav, Suvrunda, and Patil T R. "Human Computer Interaction." IJARCCE 6, no. 3 (March 30, 2017): 141–42. http://dx.doi.org/10.17148/ijarcce.2017.6329.
Full textSmithson, Steve. "Human-Computer Interaction." European Journal of Information Systems 1, no. 2 (March 1991): 143. http://dx.doi.org/10.1057/ejis.1991.23.
Full textJacob, Robert J. K. "Human-computer interaction." ACM Computing Surveys 28, no. 1 (March 1996): 177–79. http://dx.doi.org/10.1145/234313.234387.
Full textCarver, Liz, and Murray Turoff. "Human-computer interaction." Communications of the ACM 50, no. 3 (March 2007): 33–38. http://dx.doi.org/10.1145/1226736.1226761.
Full textEbert, Achim, Nahum D. Gershon, and Gerrit C. van der Veer. "Human-Computer Interaction." KI - Künstliche Intelligenz 26, no. 2 (March 1, 2012): 121–26. http://dx.doi.org/10.1007/s13218-012-0174-7.
Full textGrudin, Jonathan. "Human-computer interaction." Annual Review of Information Science and Technology 45, no. 1 (2011): 367–430. http://dx.doi.org/10.1002/aris.2011.1440450115.
Full textKobayashi, Hill Hiroki. "Research in Human-Computer-Biosphere Interaction." Leonardo 48, no. 2 (April 2015): 186–87. http://dx.doi.org/10.1162/leon_a_00982.
Full textDissertations / Theses on the topic "Human-computer interaction"
Jackson, Samuel. "Sustainability in Computer Science, Human-Computer Interaction, and Interaction Design." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1329.
Full textFleury, Rosanne. "Gender and human-computer interaction." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ50310.pdf.
Full textLi, QianQian. "Human-Computer Interaction: Security Aspects." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.
Full textInsieme al rapido sviluppo dell'era dell'informazione, gli utenti stanno avendo una crescente interazione con i dispositivi intelligenti. Tali dispositivi intelligenti sono interconnessi tra loro nell'Internet of Things (IoT). I sensori dei dispositivi IoT raccolgono informazioni sui comportamenti degli utenti dall'interazione tra utenti e dispositivi. Poiché gli utenti interagiscono con i dispositivi intelligenti IoT per le attività quotidiane di comunicazione e social network, tale interazione genera un'enorme quantità di traffico di rete. Quindi, i comportamenti degli utenti stanno giocando un ruolo importante nella sicurezza dei dispositivi intelligenti IoT e gli aspetti di sicurezza dell'interazione uomo-macchina stanno diventando significativi. In questa tesi, forniamo un triplice contributo: (1) esaminiamo le sfide alla sicurezza dell'autenticazione basata su HCI e progettiamo uno strumento per rilevare utenti ingannevoli tramite la dinamica dei tasti; (2) presentiamo l'impatto dei comportamenti degli utenti sul traffico di rete e proponiamo un framework per gestire tale traffico di rete; (3) illustriamo una proposta per dispositivi intelligenti IoT con vincoli energetici per essere resilienti contro attacchi energetici ed efficienti nella comunicazione di rete. Più in dettaglio, nella prima parte di questa tesi, analizziamo il modo in cui i comportamenti degli utenti influiscono sul modo in cui essi interagiscono con un dispositivo. Quindi, esaminiamo il lavoro relativo alle sfide di sicurezza dell'autenticazione basata su HCI su smartphone e Brain-Computer Interfaces (BCI). Inoltre, progettiamo uno strumento per valutare la veridicità delle informazioni che gli utenti inseriscono usando la tastiera di un computer. Questo strumento si basa sulla dinamica dei tasti e si basa sulla tecnica di apprendimento automatico per raggiungere tale obiettivo. Per quanto siamo a conoscenza, questo è il primo lavoro che associa i comportamenti degli utenti di digitazione alla produzione di informazioni personali ingannevoli. Abbiamo raggiunto un'accuratezza complessiva del 76% nella classificazione di una singola risposta come veritiera o mendace. Nella seconda parte di questa tesi, esaminiamo l'analisi del traffico di rete, in particolare in relazione all'interazione tra dispositivi mobili e utenti. Poiché l'interazione genera un'enorme quantità di traffico di rete, proponiamo un framework innovativo, GolfEngine, per gestire e controllare l'impatto del comportamento degli utenti sulla rete facendo affidamento sulle tecniche di Software Defined Networking (SDN). GolfEngine fornisce agli utenti uno strumento per costruire le loro applicazioni di sicurezza e offre una GUI (Graphical User Interface) per la gestione e il monitoraggio della rete. In particolare, GolfEngine fornisce la funzione di controllare i conflitti di policy quando gli utenti progettano applicazioni di sicurezza e il meccanismo per controllare la ridondanza dell'archiviazione dei dati. GolfEngine non solo previene le politiche di inserimento malizioso, ma impone anche la sicurezza sulla gestione della rete del traffico di rete. I risultati della nostra simulazione sottolineano che GolfEngine fornisce prestazioni efficienti, sicure e robuste per la gestione del traffico di rete tramite SDN. Nella terza e ultima parte di questa tesi, analizziamo gli aspetti di sicurezza dei dispositivi IoT dotati di batteria dal punto di vista del consumo energetico. Sebbene la maggior parte del consumo di energia dei dispositivi IoT sia dovuta all'interazione dell'utente, c'è ancora una quantità significativa di energia consumata dalla comunicazione point-to-point e dalla gestione della rete IoT. In questo scenario, un avversario può compromettere un dispositivo IoT e condurre un attacco Denial of Service (DoS) che punta a esaurire le batterie di altri dispositivi. Pertanto, proponiamo EnergIoT, un nuovo metodo basato su politiche energetiche che prevengono tali attacchi e, allo stesso tempo, ottimizza la comunicazione tra utenti e dispositivi IoT ed estende la durata della rete. EnergIoT si basa su un approccio di clustering gerarchico, basato su diversi rapporti di duty cycle, per massimizzare la durata della rete di dispositivi intelligenti con vincoli energetici. I risultati mostrano che EnergIoT migliora la sicurezza e la durata della rete del 32%, rispetto agli approcci utilizzati in precedenza, senza sacrificare le prestazioni della rete (cioè, ritardo end-to-end).
Sayago, Barrantes Sergio. "Human-computer interaction with older people." Doctoral thesis, Universitat Pompeu Fabra, 2009. http://hdl.handle.net/10803/7560.
Full textEl envejecimiento de la población y la importancia de las TIC en la sociedad actual han motivado la necesidad de integrar más a las personas mayores en la interacción persona-ordenador. La investigación actual se centra en factores individuales del envejecimiento y la aproximación más generalizada es diseñar interfaces considerando a las personas mayores como un conjunto de factores. Esta tesis doctoral plantea un paradigma diferente: de factores a personas mayores como actores. En este paradigma, prestar atención a los cambios en capacidades funcionales no es lo único que importa, sino que interacción y uso real deberían estar más fuertemente relacionados. En este marco, esta tesis presenta los resultados de un trabajo etnográfico extenso sobre el correo electrónico y la web. Métodos cuantitativos y mixtos se han utilizado en otros aspectos, que apoyan este estudio de campo. Otros capítulos presentan contribuciones metodológicas en evaluación en entornos reales. La tesis acaba proponiendo estrategias para investigar con personas mayores como actores sociales, insistiendo en considerar la experiencia de vida de la gente mayor y estudiar más el uso y las interacciones en entornos reales combinando etnografía y trabajo más experimental.
Population ageing and the role of computers in current society have created a need to strengthen HCI with older people. The current paradigm considers them as a set of factors and central to it is compensation for age-related changes in functional abilities. This dissertation proposes a different paradigm: from factors towards interaction based on older people as social actors. Within this paradigm, compensating for diminishing abilities is not the cornerstone of research. Instead, interaction and real-life use should be closely intertwined. Against this framework, the thesis presents the results of an extensive ethnographic work on e-mail and web use. Quantitative and mixed methods are employed in other aspects related to use and interaction which complement this major study. Other chapters include methodological contributions to real-life evaluation. The dissertation discusses strategies for approaching HCI with older people. Central to them is the concept of life experience and the need to turn to everyday interactions by combining classical ethnography with experimentations.
Laberge, Dominic. "Visual tracking for human-computer interaction." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26504.
Full textAbowd, Gregory Dominic. "Formal aspects of human-computer interaction." Thesis, University of Oxford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.232812.
Full textRamsay, Judith Easton. "Measuring and facilitating human-computer interaction." Thesis, University of Glasgow, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.281957.
Full textRoast, Christopher Richard. "Executing models in human computer interaction." Thesis, University of York, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335778.
Full textWesterman, Stephen J. "Individual differences in human-computer interaction." Thesis, Aston University, 1993. http://publications.aston.ac.uk/10853/.
Full textFrisk, Henrik. "Improvisation, computers and interaction : rethinking human-computer interaction through music /." Malmö : Malmö Academy of Music, Lund University, 2008. http://www.lu.se/o.o.i.s?id=12588&postid=1239899.
Full textBooks on the topic "Human-computer interaction"
Andrew, Sears, and Jacko Julie A, eds. Human-computer interaction. Boca Raton, Fla: Taylor & Francis, 2009.
Find full text1927-, Shackel B., and International Federation for Information Processing. Task Group on Human-Computer Interaction., eds. Human-Computer interaction. Amsterdam: North-Holland, 1985.
Find full textMoran, Thomas P. Human-computer interaction. Mahwah, N.J: Lawrence Erlbaum, 2000.
Find full textRuiz, Pablo H., Vanessa Agredo-Delgado, and André Luiz Satoshi Kawamoto, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92325-9.
Full textAgredo-Delgado, Vanessa, and Pablo H. Ruiz, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05270-6.
Full textLee, Seongil, Hyunseung Choo, Sungdo Ha, and In Chul Shin, eds. Computer-Human Interaction. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70585-7.
Full textBlumenthal, Brad, Juri Gornostaev, and Claus Unger, eds. Human-Computer Interaction. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60614-9.
Full textRuiz, Pablo H., and Vanessa Agredo-Delgado, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37386-3.
Full textCollazos, César, Andréia Liborio, and Cristian Rusu, eds. Human Computer Interaction. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03068-5.
Full textAgredo-Delgado, Vanessa, Pablo H. Ruiz, and Klinge Orlando Villalba-Condori, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66919-5.
Full textBook chapters on the topic "Human-computer interaction"
Riggan, Benjamin S., Wesley E. Snyder, and Cliff Wang. "Human-Computer Interaction." In Fundamentals of Sketch-Based Passwords, 43–50. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13629-5_5.
Full textO’Regan, Gerard. "Human–Computer Interaction." In World of Computing, 147–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75844-2_7.
Full textDix, Alan. "Human-Computer Interaction." In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4899-7993-3_192-2.
Full textRada, Roy. "Human-Computer Interaction." In Interactive Media, 12–20. New York, NY: Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4612-4226-0_2.
Full textWong, Hau San, and Horace H. S. Ip. "Human Computer Interaction." In Encyclopedia of Multimedia, 289–93. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-78414-4_339.
Full textBrodić, Darko, and Alessia Amelio. "Human-Computer Interaction." In The CAPTCHA: Perspectives and Challenges, 7–14. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29345-1_2.
Full textMoritz, Thorsten, Hans-Jürgen Steffens, and Petra Steffens. "Human Computer Interaction." In Prüfungstrainer Informatik, 201–16. Heidelberg: Spektrum Akademischer Verlag, 2010. http://dx.doi.org/10.1007/978-3-8274-2567-6_11.
Full textDix, Alan. "Human-Computer Interaction." In Encyclopedia of Database Systems, 1327–31. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_192.
Full textErrity, Andrew. "Human–Computer Interaction." In An Introduction to Cyberpsychology, 305–22. 2nd ed. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003092513-27.
Full textLin, Dennis, Vuong Le, and Thomas Huang. "Human–Computer Interaction." In Visual Analysis of Humans, 493–510. London: Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-997-0_25.
Full textConference papers on the topic "Human-computer interaction"
Butler, Keith A., Robert J. K. Jacob, and Bonnie E. John. "Human-computer interaction." In CHI '99 extended abstracts. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/632716.632781.
Full textJoshi, Anirudha. "Human-Computer Interaction." In 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems (ICIIS). IEEE, 2008. http://dx.doi.org/10.1109/iciinfs.2008.4798328.
Full textSinha, G., R. Shahi, and M. Shankar. "Human Computer Interaction." In Third International Conference on Emerging Trends in Engineering and Technology (ICETET 2010). IEEE, 2010. http://dx.doi.org/10.1109/icetet.2010.85.
Full textButler, Keith A., and Robert J. K. Jacob. "Human-computer interaction." In CHI '97 extended abstracts. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/1120212.1120311.
Full textButler, Keith A., Robert J. K. Jacob, and Bonnie E. John. "Human-computer interaction." In CHI98: ACM Conference on Human Factors and Computing Systems. New York, NY, USA: ACM, 1998. http://dx.doi.org/10.1145/286498.286556.
Full textBorkotoky, Chandragupta, Swapil Galgate, and S. B. Nimbekar. "Human computer interaction." In the 1st Bangalore annual Compute conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1341771.1341797.
Full textKinley, Khamsum, Dian Tjondronegoro, Helen Partridge, and Sylvia Edwards. "Human-computer interaction." In the 24th Australian Computer-Human Interaction Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2414536.2414586.
Full text"Human computer interaction." In Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces (ITI). IEEE, 2009. http://dx.doi.org/10.1109/iti.2009.5196095.
Full textSchummer, Till, Jan Borchers, John C. Thomas, and Uwe Zdun. "Human-computer-human interaction patterns." In Extended abstracts of the 2004 conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/985921.986200.
Full textBarnes, Julie, Rob Bryant, Daniel D. McCracken, and Susan Reiser. "Teaching human-computer interaction." In the 34th SIGCSE technical symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/611892.611901.
Full textReports on the topic "Human-computer interaction"
Ambardar, Anita K. Individual Difference Effects in Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, October 1991. http://dx.doi.org/10.21236/ada243172.
Full textSmith, Sidney C. Impact of Cognitive Architectures on Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, September 2014. http://dx.doi.org/10.21236/ada610093.
Full textBrock, Derek P. A Language Use Approach to Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada389099.
Full textCarroll, John M. Evaluation, Description and Invention: Paradigms for Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada204617.
Full textSMALL, DANIEL E., JASON P. LUCK, and JEFFREY J. CARLSON. Volumetric Video Motion Detection for Unobtrusive Human-Computer Interaction. Office of Scientific and Technical Information (OSTI), April 2002. http://dx.doi.org/10.2172/800789.
Full textGraesser, Arthur C. Questioning Mechanisms During Tutoring, Conversation, and Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, June 1993. http://dx.doi.org/10.21236/ada266420.
Full textRepperger, D. W., and Ling Rothrock. A Dual Haptic Interface Investigation for Improved Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, October 2002. http://dx.doi.org/10.21236/ada412247.
Full textMcFarlane, Daniel C. Interruption of People in Human-Computer Interaction: A General Unifying Definition of Human Interruption and Taxonomy. Fort Belvoir, VA: Defense Technical Information Center, December 1997. http://dx.doi.org/10.21236/ada333587.
Full textJones, David W., Max H. Miller, James A. Ballas, and Janet I. Olsonbaker. Analysis of Human-Computer Interaction in the Expeditionary Warfare Decision Support System (EDSS). Fort Belvoir, VA: Defense Technical Information Center, September 2004. http://dx.doi.org/10.21236/ada427048.
Full textHoover, Carol L. Human-Computer Interaction (HCI) Specialization Track Masters of Software Engineering (MSE) Program. Revision. Fort Belvoir, VA: Defense Technical Information Center, March 1995. http://dx.doi.org/10.21236/ada292895.
Full text