27,413 research outputs found

    "One-button” brain-computer interfaces

    Get PDF

    The design-by-adaptation approach to universal access: learning from videogame technology

    Get PDF
    This paper proposes an alternative approach to the design of universally accessible interfaces to that provided by formal design frameworks applied ab initio to the development of new software. This approach, design-byadaptation, involves the transfer of interface technology and/or design principles from one application domain to another, in situations where the recipient domain is similar to the host domain in terms of modelled systems, tasks and users. Using the example of interaction in 3D virtual environments, the paper explores how principles underlying the design of videogame interfaces may be applied to a broad family of visualization and analysis software which handles geographical data (virtual geographic environments, or VGEs). One of the motivations behind the current study is that VGE technology lags some way behind videogame technology in the modelling of 3D environments, and has a less-developed track record in providing the variety of interaction methods needed to undertake varied tasks in 3D virtual worlds by users with varied levels of experience. The current analysis extracted a set of interaction principles from videogames which were used to devise a set of 3D task interfaces that have been implemented in a prototype VGE for formal evaluation

    KINECTWheels: wheelchair-accessible motion-based game interaction

    Get PDF
    The increasing popularity of full-body motion-based video games creates new challenges for game accessibility research. Many games strongly focus on able-bodied persons and require players to move around freely. To address this problem, we introduce KINECTWheels, a toolkit that facilitates the integration of wheelchair-based game input. Our library can help game designers to integrate wheelchair input at the development stage, and it can be configured to trigger keystroke events to make off-the-shelf PC games wheelchair-accessible

    Visual complexity, player experience, performance and physical exertion in motion-based games for older adults

    Get PDF
    Motion-based video games can have a variety of benefits for the players and are increasingly applied in physical therapy, rehabilitation and prevention for older adults. However, little is known about how this audience experiences playing such games, how the player experience affects the way older adults interact with motion-based games, and how this can relate to therapy goals. In our work, we decompose the player experience of older adults engaging with motion-based games, focusing on the effects of manipulations of the game representation through the visual channel (visual complexity), since it is the primary interaction modality of most games and since vision impairments are common amongst older adults. We examine the effects of different levels of visual complexity on player experience, performance, and exertion in a study with fifteen participants. Our results show that visual complexity affects the way games are perceived in two ways: First, while older adults do have preferences in terms of visual complexity of video games, notable effects were only measurable following drastic variations. Second, perceived exertion shifts depending on the degree of visual complexity. These findings can help inform the design of motion-based games for therapy and rehabilitation for older adults

    EasyUC: using EasyCrypt to mechanize proofs of universally composable security

    Get PDF
    We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols within the universally composable (UC) security framework. This allows, for the first time, the mechanization and formal verification of the entire sequence of steps needed for proving simulation-based security in a modular way: Specifying a protocol and the desired ideal functionality; Constructing a simulator and demonstrating its validity, via reduction to hard computational problems; Invoking the universal composition operation and demonstrating that it indeed preserves security. We demonstrate our methodology on a simple example: stating and proving the security of secure message communication via a one-time pad, where the key comes from a Diffie-Hellman key-exchange, assuming ideally authenticated communication. We first put together EasyCrypt-verified proofs that: (a) the Diffie-Hellman protocol UC-realizes an ideal key-exchange functionality, assuming hardness of the Decisional Diffie-Hellman problem, and (b) one-time-pad encryption, with a key obtained using ideal key-exchange, UC-realizes an ideal secure-communication functionality. We then mechanically combine the two proofs into an EasyCrypt-verified proof that the composed protocol realizes the same ideal secure-communication functionality. Although formulating a methodology that is both sound and workable has proven to be a complex task, we are hopeful that it will prove to be the basis for mechanized UC security analyses for significantly more complex protocols and tasks.Accepted manuscrip

    Rules of Engagement: design attributes for social interactions

    No full text
    We present a taxonomy for the design of workplace “break” spaces. The taxonomy can be used to identify aspects of current spaces that are either successful or problematic. From this analysis, we demonstrate how the taxonomy can be used to identify opportunities for computer mediated augmentation of spaces, and how such designs can be validated against this taxonomy

    Puzzle games: a metaphor for computational thinking

    Get PDF

    Demystifying the educational benefits of different gaming genres

    Get PDF
    As research continues into the use of computer games for educational purposes, educators still appear reluctant to incorporate them into their teaching. One contributing factor to this reluctance is the lack of information regarding the benefits offered by the different games available today. These differences appear to have been largely overlooked by the academic community, resulting in a lack of information being made available to both the academic and education communities alike. Without this information, educators will find it difficult to determine whether a game will suit their teaching needs, and will continue to avoid using them. This paper studies a selection of games from several different genres, assessing each one in its ability to fulfil a set of previously identified requirements for a good educational resource. The results of the investigation showed that there were indeed strong differences between the genres, allowing for some suggestions to be made regarding their use in education, as well as leaving room for some interesting future work

    Computer Entertainment Technologies for the Visually Impaired: An Overview

    Get PDF
    Over the last years, works related to accessible technologies have increased both in number and in quality. This work presents a series of articles which explore different trends in the field of accessible video games for the blind or visually impaired. Reviewed articles are distributed in four categories covering the following subjects: (1) video game design and architecture, (2) video game adaptations, (3) accessible games as learning tools or treatments and (4) navigation and interaction in virtual environments. Current trends in accessible game design are also analysed, and data is presented regarding keyword use and thematic evolution over time. As a conclusion, a relative stagnation in the field of human-computer interaction for the blind is detected. However, as the video game industry is becoming increasingly interested in accessibility, new research opportunities are starting to appear
    corecore