Academic literature on the topic 'Human-computer interaction'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Human-computer interaction.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Human-computer interaction"

1

Zhang, Tongda, Xiao Sun, Yueting Chai, and Hamid Aghajan. "Human Computer Interaction Activity Based User Identification." International Journal of Machine Learning and Computing 4, no. 4 (2014): 354–58. http://dx.doi.org/10.7763/ijmlc.2014.v4.436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Orfei, Maria Donata. "Human-Computer Interaction: Lights, Shadows, and Spotlights." Mental Health & Human Resilience International Journal 7, no. 2 (2023): 1–4. http://dx.doi.org/10.23880/mhrij-16000229.

Full text
Abstract:
In the last decades, Information and Computer Technology (ICT) has become part and parcel of our lives, bringing undeniable advantages, especially in the workplace, both to individuals and organizations. Nonetheless, the increasingly massive use of ICT also contributed to a higher risk for maladaptive effects on quality of life, thus jeopardizing workers’ well-being. From the perspective of the organizational safety approach, the study of Human-Computer Interaction (HCI) is crucial. Despite this, so far, much attention has been paid to ergonomics and to technostress, but mostly from a sectorial perspective and disregarding several additional phenomena. In this conceptual paper, a multidimensional model able to go beyond the ergonomic features necessary to set a functional physical environment and facilitate the isomorphism mind-ICT is advocated. We point out a modern approach aimed at exploring additional dimensions underpinning HCI in the workplace, with a dual purpose: to highlight possible risk factors for maladjustment and to pave the way for intervention strategies to facilitate a healthy HCI.
APA, Harvard, Vancouver, ISO, and other styles
3

Jones, Steve, and Steve Marsh. "Human-computer-human interaction." ACM SIGCHI Bulletin 29, no. 3 (July 1997): 36–40. http://dx.doi.org/10.1145/264853.264872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jadhav, Suvrunda, and Patil T R. "Human Computer Interaction." IJARCCE 6, no. 3 (March 30, 2017): 141–42. http://dx.doi.org/10.17148/ijarcce.2017.6329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smithson, Steve. "Human-Computer Interaction." European Journal of Information Systems 1, no. 2 (March 1991): 143. http://dx.doi.org/10.1057/ejis.1991.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jacob, Robert J. K. "Human-computer interaction." ACM Computing Surveys 28, no. 1 (March 1996): 177–79. http://dx.doi.org/10.1145/234313.234387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carver, Liz, and Murray Turoff. "Human-computer interaction." Communications of the ACM 50, no. 3 (March 2007): 33–38. http://dx.doi.org/10.1145/1226736.1226761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ebert, Achim, Nahum D. Gershon, and Gerrit C. van der Veer. "Human-Computer Interaction." KI - Künstliche Intelligenz 26, no. 2 (March 1, 2012): 121–26. http://dx.doi.org/10.1007/s13218-012-0174-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grudin, Jonathan. "Human-computer interaction." Annual Review of Information Science and Technology 45, no. 1 (2011): 367–430. http://dx.doi.org/10.1002/aris.2011.1440450115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kobayashi, Hill Hiroki. "Research in Human-Computer-Biosphere Interaction." Leonardo 48, no. 2 (April 2015): 186–87. http://dx.doi.org/10.1162/leon_a_00982.

Full text
Abstract:
Currently human-computer interaction (HCI) is primarily focused on human-centric interactions. However, people experience many non-human-centric interactions every day. Interactions with nature can reinforce the importance of our relationship with nature. This paper presents the author’s vision of human-computer-biosphere interaction (HCBI) to facilitate non-human-centric interaction with the goal of moving society towards environmental sustainability.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Human-computer interaction"

1

Jackson, Samuel. "Sustainability in Computer Science, Human-Computer Interaction, and Interaction Design." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1329.

Full text
Abstract:
Sustainability is a growing concern in a world where climate change threatens to inflict massive environmental and human damage in the coming decades. As climate change becomes a global issue, researchers and professionals from many pursuits are beginning to rally around the cause of bringing about an economically and environmentally sustainable future. Computer science and the related fields of human-computer interaction and interaction design have both a moral obligation and profound opportunity to contribute to environmental sustainability. In this thesis, I will examine the efforts of computer scientists and interaction designers in sustainability so far in order to form an understanding of what computer science has contributed to the effort of curbing damage to the environment to date. While the contributions of computer science and related fields to sustainability are significant, there are many ways in which they are deficient. Therefore, I will look to the future possibilities for academic and industrial developments and improvements in sustainable technology from the perspective of computer scientists and practitioners of related disciplines, and make recommendations as to the direction these fields should take in order to best serve the global thrust toward a sustainable human civilization.
APA, Harvard, Vancouver, ISO, and other styles
2

Fleury, Rosanne. "Gender and human-computer interaction." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ50310.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, QianQian. "Human-Computer Interaction: Security Aspects." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3427166.

Full text
Abstract:
Along with the rapid development of intelligent information age, users are having a growing interaction with smart devices. Such smart devices are interconnected together in the Internet of Things (IoT). The sensors of IoT devices collect information about users' behaviors from the interaction between users and devices. Since users interact with IoT smart devices for the daily communication and social network activities, such interaction generates a huge amount of network traffic. Hence, users' behaviors are playing an important role in the security of IoT smart devices, and the security aspects of Human-Computer Interaction are becoming significant. In this dissertation, we provide a threefold contribution: (1) we review security challenges of HCI-based authentication, and design a tool to detect deceitful users via keystroke dynamics; (2) we present the impact of users' behaviors on network traffic, and propose a framework to manage such network traffic; (3) we illustrate a proposal for energy-constrained IoT smart devices to be resilient against energy attack and efficient in network communication. More in detail, in the first part of this thesis, we investigate how users' behaviors impact on the way they interact with a device. Then we review the work related to security challenges of HCI-based authentication on smartphones, and Brain-Computer Interfaces (BCI). Moreover, we design a tool to assess the truthfulness of the information that users input using a computer keyboard. This tool is based on keystroke dynamics and it relies on machine learning technique to achieve this goal. To the best of our knowledge, this is the first work that associates the typing users' behaviors with the production of deceptive personal information. We reached an overall accuracy of 76% in the classification of a single answer as truthful or deceptive. In the second part of this thesis, we review the analysis of network traffic, especially related to the interaction between mobile devices and users. Since the interaction generates a huge amount of network traffic, we propose an innovative framework, GolfEngine, to manage and control the impact of users behavior on the network relying on Software Defined Networking (SDN) techniques. GolfEngine provides users a tool to build their security applications and offers Graphical User Interface (GUI) for managing and monitoring the network. In particular, GolfEngine provides the function of checking policy conflicts when users design security applications and the mechanism to check data storage redundancy. GolfEngine not only prevents the malicious inputting policies but also it enforces the security about network management of network traffic. The results of our simulation underline that GolfEngine provides an efficient, secure, and robust performance for managing network traffic via SDN. In the third and last part of this dissertation, we analyze the security aspects of battery-equipped IoT devices from the energy consumption perspective. Although most of the energy consumption of IoT devices is due to user interaction, there is still a significant amount of energy consumed by point-to-point communication and IoT network management. In this scenario, an adversary may hijack an IoT device and conduct a Denial of Service attack (DoS) that aims to run out batteries of other devices. Therefore, we propose EnergIoT, a novel method based on energetic policies that prevent such attacks and, at the same time, optimizes the communication between users and IoT devices, and extends the lifetime of the network. EnergIoT relies on a hierarchical clustering approach, based on different duty cycle ratios, to maximize network lifetime of energy-constrained smart devices. The results show that EnergIoT enhances the security and improves the network lifetime by 32%, compared to the earlier used approach, without sacrificing the network performance (i.e., end-to-end delay).
Insieme al rapido sviluppo dell'era dell'informazione, gli utenti stanno avendo una crescente interazione con i dispositivi intelligenti. Tali dispositivi intelligenti sono interconnessi tra loro nell'Internet of Things (IoT). I sensori dei dispositivi IoT raccolgono informazioni sui comportamenti degli utenti dall'interazione tra utenti e dispositivi. Poiché gli utenti interagiscono con i dispositivi intelligenti IoT per le attività quotidiane di comunicazione e social network, tale interazione genera un'enorme quantità di traffico di rete. Quindi, i comportamenti degli utenti stanno giocando un ruolo importante nella sicurezza dei dispositivi intelligenti IoT e gli aspetti di sicurezza dell'interazione uomo-macchina stanno diventando significativi. In questa tesi, forniamo un triplice contributo: (1) esaminiamo le sfide alla sicurezza dell'autenticazione basata su HCI e progettiamo uno strumento per rilevare utenti ingannevoli tramite la dinamica dei tasti; (2) presentiamo l'impatto dei comportamenti degli utenti sul traffico di rete e proponiamo un framework per gestire tale traffico di rete; (3) illustriamo una proposta per dispositivi intelligenti IoT con vincoli energetici per essere resilienti contro attacchi energetici ed efficienti nella comunicazione di rete. Più in dettaglio, nella prima parte di questa tesi, analizziamo il modo in cui i comportamenti degli utenti influiscono sul modo in cui essi interagiscono con un dispositivo. Quindi, esaminiamo il lavoro relativo alle sfide di sicurezza dell'autenticazione basata su HCI su smartphone e Brain-Computer Interfaces (BCI). Inoltre, progettiamo uno strumento per valutare la veridicità delle informazioni che gli utenti inseriscono usando la tastiera di un computer. Questo strumento si basa sulla dinamica dei tasti e si basa sulla tecnica di apprendimento automatico per raggiungere tale obiettivo. Per quanto siamo a conoscenza, questo è il primo lavoro che associa i comportamenti degli utenti di digitazione alla produzione di informazioni personali ingannevoli. Abbiamo raggiunto un'accuratezza complessiva del 76% nella classificazione di una singola risposta come veritiera o mendace. Nella seconda parte di questa tesi, esaminiamo l'analisi del traffico di rete, in particolare in relazione all'interazione tra dispositivi mobili e utenti. Poiché l'interazione genera un'enorme quantità di traffico di rete, proponiamo un framework innovativo, GolfEngine, per gestire e controllare l'impatto del comportamento degli utenti sulla rete facendo affidamento sulle tecniche di Software Defined Networking (SDN). GolfEngine fornisce agli utenti uno strumento per costruire le loro applicazioni di sicurezza e offre una GUI (Graphical User Interface) per la gestione e il monitoraggio della rete. In particolare, GolfEngine fornisce la funzione di controllare i conflitti di policy quando gli utenti progettano applicazioni di sicurezza e il meccanismo per controllare la ridondanza dell'archiviazione dei dati. GolfEngine non solo previene le politiche di inserimento malizioso, ma impone anche la sicurezza sulla gestione della rete del traffico di rete. I risultati della nostra simulazione sottolineano che GolfEngine fornisce prestazioni efficienti, sicure e robuste per la gestione del traffico di rete tramite SDN. Nella terza e ultima parte di questa tesi, analizziamo gli aspetti di sicurezza dei dispositivi IoT dotati di batteria dal punto di vista del consumo energetico. Sebbene la maggior parte del consumo di energia dei dispositivi IoT sia dovuta all'interazione dell'utente, c'è ancora una quantità significativa di energia consumata dalla comunicazione point-to-point e dalla gestione della rete IoT. In questo scenario, un avversario può compromettere un dispositivo IoT e condurre un attacco Denial of Service (DoS) che punta a esaurire le batterie di altri dispositivi. Pertanto, proponiamo EnergIoT, un nuovo metodo basato su politiche energetiche che prevengono tali attacchi e, allo stesso tempo, ottimizza la comunicazione tra utenti e dispositivi IoT ed estende la durata della rete. EnergIoT si basa su un approccio di clustering gerarchico, basato su diversi rapporti di duty cycle, per massimizzare la durata della rete di dispositivi intelligenti con vincoli energetici. I risultati mostrano che EnergIoT migliora la sicurezza e la durata della rete del 32%, rispetto agli approcci utilizzati in precedenza, senza sacrificare le prestazioni della rete (cioè, ritardo end-to-end).
APA, Harvard, Vancouver, ISO, and other styles
4

Sayago, Barrantes Sergio. "Human-computer interaction with older people." Doctoral thesis, Universitat Pompeu Fabra, 2009. http://hdl.handle.net/10803/7560.

Full text
Abstract:
L'envelliment de la població i la importància de les TIC a la societat actual han motivat la necessitat d'integrar més a les persones grans en la interacció persona-ordinador. La investigació actual es centra en factors individuals de l'envelliment i l'aproximació més generalitzada és dissenyar interfícies considerant les persones grans com a conjunt de factors. Aquesta tesi doctoral planteja un paradigma diferent: de factors a persones grans com a actors. En aquest paradigma, prestar atenció als canvis en capacitats funcionals no és l'únic que importa, cal que interacció i ús real estiguin més fortament relacionats. En aquest marc, aquesta tesi presenta els resultats d'un treball etnogràfic extens sobre el correu electrònic i la web. Mètodes quantitatius i mixtes s'han utilitzat en altres aspectes, que recolzen aquest estudi de camp. Altres capítols presenten contribucions metodològiques en avaluació en entorns reals. La tesi acaba proposant estratègies per a investigar amb persones grans com a actors socials, insistint en considerar l'experiència de vida de la gent gran i estudiar més l'ús i les interaccions en entorns reals combinant etnografia i treball més experimental.
El envejecimiento de la población y la importancia de las TIC en la sociedad actual han motivado la necesidad de integrar más a las personas mayores en la interacción persona-ordenador. La investigación actual se centra en factores individuales del envejecimiento y la aproximación más generalizada es diseñar interfaces considerando a las personas mayores como un conjunto de factores. Esta tesis doctoral plantea un paradigma diferente: de factores a personas mayores como actores. En este paradigma, prestar atención a los cambios en capacidades funcionales no es lo único que importa, sino que interacción y uso real deberían estar más fuertemente relacionados. En este marco, esta tesis presenta los resultados de un trabajo etnográfico extenso sobre el correo electrónico y la web. Métodos cuantitativos y mixtos se han utilizado en otros aspectos, que apoyan este estudio de campo. Otros capítulos presentan contribuciones metodológicas en evaluación en entornos reales. La tesis acaba proponiendo estrategias para investigar con personas mayores como actores sociales, insistiendo en considerar la experiencia de vida de la gente mayor y estudiar más el uso y las interacciones en entornos reales combinando etnografía y trabajo más experimental.
Population ageing and the role of computers in current society have created a need to strengthen HCI with older people. The current paradigm considers them as a set of factors and central to it is compensation for age-related changes in functional abilities. This dissertation proposes a different paradigm: from factors towards interaction based on older people as social actors. Within this paradigm, compensating for diminishing abilities is not the cornerstone of research. Instead, interaction and real-life use should be closely intertwined. Against this framework, the thesis presents the results of an extensive ethnographic work on e-mail and web use. Quantitative and mixed methods are employed in other aspects related to use and interaction which complement this major study. Other chapters include methodological contributions to real-life evaluation. The dissertation discusses strategies for approaching HCI with older people. Central to them is the concept of life experience and the need to turn to everyday interactions by combining classical ethnography with experimentations.
APA, Harvard, Vancouver, ISO, and other styles
5

Laberge, Dominic. "Visual tracking for human-computer interaction." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26504.

Full text
Abstract:
The purpose of this master's thesis project is to design, implement and evaluate vision-based user interfaces for use in the context of virtual environments. Three interfaces are treated. The first one is a 4 degrees of freedom (DOF) mouse that can track the position and 1 DOF or rotation (roll) of a user's hand. The second one is a 6 DOF mouse that can track both the position and the orientation of a user's hand in 3D space. Finally the third one is a laser pointing interface used to track the laser spot of a standard laser pointer, in order to interact with a large screen display. The two latter interfaces use an auto-calibrated approach based on planar homography, that distinguish them from the standard computer-vision based approach which requires a previous step of calibration.
APA, Harvard, Vancouver, ISO, and other styles
6

Abowd, Gregory Dominic. "Formal aspects of human-computer interaction." Thesis, University of Oxford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.232812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramsay, Judith Easton. "Measuring and facilitating human-computer interaction." Thesis, University of Glasgow, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.281957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Roast, Christopher Richard. "Executing models in human computer interaction." Thesis, University of York, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.335778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Westerman, Stephen J. "Individual differences in human-computer interaction." Thesis, Aston University, 1993. http://publications.aston.ac.uk/10853/.

Full text
Abstract:
This thesis initially presents an 'assay' of the literature pertaining to individual differences in human-computer interaction. A series of experiments is then reported, designed to investigate the association between a variety of individual characteristics and various computer task and interface factors. Predictor variables included age, computer expertise, and psychometric tests of spatial visualisation, spatial memory, logical reasoning, associative memory, and verbal ability. These were studied in relation to a variety of computer-based tacks, including: (1) word processing and its component elements; (ii) the location of target words within passages of text; (iii) the navigation of networks and menus; (iv) command generation using menus and command line interfaces; (v) the search and selection of icons and text labels; (vi) information retrieval. A measure of self-report workload was also included in several of these experiments. The main experimental findings included: (i) an interaction between spatial ability and the manipulation of semantic but not spatial interface content; (ii) verbal ability being only predictive of certain task components of word processing; (iii) age differences in word processing and information retrieval speed but not accuracy; (iv) evidence of compensatory strategies being employed by older subjects; (v) evidence of performance strategy differences which disadvantaged high spatial subjects in conditions of low spatial information content; (vi) interactive effects of associative memory, expertise and command strategy; (vii) an association between logical reasoning and word processing but not information retrieval; (viii) an interaction between expertise and cognitive demand; and (ix) a stronger association between cognitive ability and novice performance than expert performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Frisk, Henrik. "Improvisation, computers and interaction : rethinking human-computer interaction through music /." Malmö : Malmö Academy of Music, Lund University, 2008. http://www.lu.se/o.o.i.s?id=12588&postid=1239899.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Human-computer interaction"

1

Andrew, Sears, and Jacko Julie A, eds. Human-computer interaction. Boca Raton, Fla: Taylor & Francis, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1927-, Shackel B., and International Federation for Information Processing. Task Group on Human-Computer Interaction., eds. Human-Computer interaction. Amsterdam: North-Holland, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moran, Thomas P. Human-computer interaction. Mahwah, N.J: Lawrence Erlbaum, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ruiz, Pablo H., Vanessa Agredo-Delgado, and André Luiz Satoshi Kawamoto, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92325-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Agredo-Delgado, Vanessa, and Pablo H. Ruiz, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05270-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Seongil, Hyunseung Choo, Sungdo Ha, and In Chul Shin, eds. Computer-Human Interaction. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70585-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Blumenthal, Brad, Juri Gornostaev, and Claus Unger, eds. Human-Computer Interaction. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60614-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ruiz, Pablo H., and Vanessa Agredo-Delgado, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37386-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Collazos, César, Andréia Liborio, and Cristian Rusu, eds. Human Computer Interaction. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03068-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Agredo-Delgado, Vanessa, Pablo H. Ruiz, and Klinge Orlando Villalba-Condori, eds. Human-Computer Interaction. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66919-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Human-computer interaction"

1

Riggan, Benjamin S., Wesley E. Snyder, and Cliff Wang. "Human-Computer Interaction." In Fundamentals of Sketch-Based Passwords, 43–50. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13629-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O’Regan, Gerard. "Human–Computer Interaction." In World of Computing, 147–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75844-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dix, Alan. "Human-Computer Interaction." In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4899-7993-3_192-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rada, Roy. "Human-Computer Interaction." In Interactive Media, 12–20. New York, NY: Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4612-4226-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Hau San, and Horace H. S. Ip. "Human Computer Interaction." In Encyclopedia of Multimedia, 289–93. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-78414-4_339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brodić, Darko, and Alessia Amelio. "Human-Computer Interaction." In The CAPTCHA: Perspectives and Challenges, 7–14. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29345-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moritz, Thorsten, Hans-Jürgen Steffens, and Petra Steffens. "Human Computer Interaction." In Prüfungstrainer Informatik, 201–16. Heidelberg: Spektrum Akademischer Verlag, 2010. http://dx.doi.org/10.1007/978-3-8274-2567-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dix, Alan. "Human-Computer Interaction." In Encyclopedia of Database Systems, 1327–31. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Errity, Andrew. "Human–Computer Interaction." In An Introduction to Cyberpsychology, 305–22. 2nd ed. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003092513-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Dennis, Vuong Le, and Thomas Huang. "Human–Computer Interaction." In Visual Analysis of Humans, 493–510. London: Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-997-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Human-computer interaction"

1

Butler, Keith A., Robert J. K. Jacob, and Bonnie E. John. "Human-computer interaction." In CHI '99 extended abstracts. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/632716.632781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Joshi, Anirudha. "Human-Computer Interaction." In 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems (ICIIS). IEEE, 2008. http://dx.doi.org/10.1109/iciinfs.2008.4798328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sinha, G., R. Shahi, and M. Shankar. "Human Computer Interaction." In Third International Conference on Emerging Trends in Engineering and Technology (ICETET 2010). IEEE, 2010. http://dx.doi.org/10.1109/icetet.2010.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Butler, Keith A., and Robert J. K. Jacob. "Human-computer interaction." In CHI '97 extended abstracts. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/1120212.1120311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Butler, Keith A., Robert J. K. Jacob, and Bonnie E. John. "Human-computer interaction." In CHI98: ACM Conference on Human Factors and Computing Systems. New York, NY, USA: ACM, 1998. http://dx.doi.org/10.1145/286498.286556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Borkotoky, Chandragupta, Swapil Galgate, and S. B. Nimbekar. "Human computer interaction." In the 1st Bangalore annual Compute conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1341771.1341797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kinley, Khamsum, Dian Tjondronegoro, Helen Partridge, and Sylvia Edwards. "Human-computer interaction." In the 24th Australian Computer-Human Interaction Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2414536.2414586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Human computer interaction." In Proceedings of the ITI 2009 31st International Conference on Information Technology Interfaces (ITI). IEEE, 2009. http://dx.doi.org/10.1109/iti.2009.5196095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schummer, Till, Jan Borchers, John C. Thomas, and Uwe Zdun. "Human-computer-human interaction patterns." In Extended abstracts of the 2004 conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/985921.986200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnes, Julie, Rob Bryant, Daniel D. McCracken, and Susan Reiser. "Teaching human-computer interaction." In the 34th SIGCSE technical symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/611892.611901.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Human-computer interaction"

1

Ambardar, Anita K. Individual Difference Effects in Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, October 1991. http://dx.doi.org/10.21236/ada243172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Sidney C. Impact of Cognitive Architectures on Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, September 2014. http://dx.doi.org/10.21236/ada610093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brock, Derek P. A Language Use Approach to Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada389099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carroll, John M. Evaluation, Description and Invention: Paradigms for Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada204617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

SMALL, DANIEL E., JASON P. LUCK, and JEFFREY J. CARLSON. Volumetric Video Motion Detection for Unobtrusive Human-Computer Interaction. Office of Scientific and Technical Information (OSTI), April 2002. http://dx.doi.org/10.2172/800789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Graesser, Arthur C. Questioning Mechanisms During Tutoring, Conversation, and Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, June 1993. http://dx.doi.org/10.21236/ada266420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Repperger, D. W., and Ling Rothrock. A Dual Haptic Interface Investigation for Improved Human-Computer Interaction. Fort Belvoir, VA: Defense Technical Information Center, October 2002. http://dx.doi.org/10.21236/ada412247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McFarlane, Daniel C. Interruption of People in Human-Computer Interaction: A General Unifying Definition of Human Interruption and Taxonomy. Fort Belvoir, VA: Defense Technical Information Center, December 1997. http://dx.doi.org/10.21236/ada333587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jones, David W., Max H. Miller, James A. Ballas, and Janet I. Olsonbaker. Analysis of Human-Computer Interaction in the Expeditionary Warfare Decision Support System (EDSS). Fort Belvoir, VA: Defense Technical Information Center, September 2004. http://dx.doi.org/10.21236/ada427048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hoover, Carol L. Human-Computer Interaction (HCI) Specialization Track Masters of Software Engineering (MSE) Program. Revision. Fort Belvoir, VA: Defense Technical Information Center, March 1995. http://dx.doi.org/10.21236/ada292895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography