ubiquitous computing and augmented realities
#1

[attachment=9534]
ubiquitous computing and augmented realities
• ubiquitous computing
– filling the real world with computers
• virtual and augmented reality
– making the real world in a computer!
Challenging HCI Assumptions
• What do we imagine when we think of a computer?
“The most profound technologies are those that disappear.” Weiser
• 1990’s: this was not our imagined computer!
Ubiquitous Computing
• Any computing technology that permits human interaction away from a single workstation
• Implications for
– Technology defining the interactive experience
– Applications or uses
Underlying theories of interaction
Scales of devices
• Weiser proposed
– Inch
– Foot
– Yard
• Implications for device size as well as relationship to people
Device scales
• Inch
– PDAs
– PARCTAB
– Voice Recorders
– smart phones
• Individuals own many
of them and they can all communicate with each other and environment.
• Foot
– notebooks
– tablets
– digital paper
Individual owns several but not assumed to be always with them
• Yard
– electronic whiteboards
– plasma displays
– smart bulletin boards
• Buildings or institutions own them and lots of people share them.
Defining the Interaction Experience
• Implicit input
– Sensor-based input
– Extends traditional explicit input (e.g., keyboard and mouse)
– Towards “awareness”
– Use of recognition technologies
Introduces ambiguity because recognizers are not perfect
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: disadvantages with ubiquitous computing, ubiquitous computing seminar report, ubiquitous computing pdf, ubiquitous computing and privacy, ubiquitous computing doc download, ubiquitous computing amazon, seminar topics on ubiquitous computing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,207 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  Soft Computing seminar surveyer 2 11,146 29-10-2013, 03:50 PM
Last Post: kavitaswami93gmail.com
  Modular Computing seminars report computer science crazy 4 21,441 08-10-2013, 04:32 PM
Last Post: Guest
  self managing computing system full report computer science technology 5 14,135 18-05-2013, 09:48 AM
Last Post: computer topic
  Unicode And Multilingual Computing computer science crazy 2 8,232 06-05-2013, 11:18 AM
Last Post: computer topic
  What Networking of Information Can Do for Cloud Computing project topics 1 8,196 29-03-2013, 01:03 AM
Last Post: Guest
  pervasive computing full report computer science technology 11 18,399 02-03-2013, 11:34 AM
Last Post: seminar details
  Nanocell Logic Gates For Molecular Computing full report seminar presentation 3 10,074 02-01-2013, 10:21 AM
Last Post: seminar details
  GREEN COMPUTING A SEMINAR REPORT Computer Science Clay 10 31,710 31-12-2012, 10:40 AM
Last Post: seminar details
  mobile computing full report seminar topics 11 15,865 13-12-2012, 01:35 PM
Last Post: seminar details

Forum Jump: