39,194 research outputs found

    Investigating five key predictive text entry with combined distance and keystroke modelling

    Get PDF
    This paper investigates text entry on mobile devices using only five-keys. Primarily to support text entry on smaller devices than mobile phones, this method can also be used to maximise screen space on mobile phones. Reported combined Fitt's law and keystroke modelling predicts similar performance with bigram prediction using a five-key keypad as is currently achieved on standard mobile phones using unigram prediction. User studies reported here show similar user performance on five-key pads as found elsewhere for novice nine-key pad users

    Enhancing Information Language Learning with Mobile Technology - Does it Work?

    Get PDF
    There are many theories that attempt to explain second language acquisition processes and factors determining success or failure. Despite a lack of general agreement between proponents of these theories, research has convincingly shown that the amount of exposure to target language input is one important predictor of ultimate achievement levels. ā€˜Time on taskā€™ is as important in language learning as it is in many other domains (cf. Reber, 1993) and it is therefore important to identify ways in which this can be increased. An obvious possibility is to encourage learners to engage with (and in) the language outside the classroom. Informal learning, in the sense of learning outside of formal education, has been shown to be a major aspect of adult learning (Cross, 2007) and, given appropriate preparation and support, learners can greatly increase opportunities for learning if they can do so independently. Mobile technologies have obvious potential in this regard. However, is it possible to improve language skills in this way? In this article we report on an exploratory study into the use of cellphones for extensive listening practice. We used input enhancement to draw learnersā€™ attention to not only the meaning of the materials but also the formal (grammatical) aspects of the input. We found that the use of mobile technology presented a number of challenges and in this study did not result in learners acquiring the target structures. We conclude with a number of recommendations for the use and future study of mobile technologies for (language) learning

    Pickup usability dominates: a brief history of mobile text entry research and adoption

    Get PDF
    Text entry on mobile devices (e.g. phones and PDAs) has been a research challenge since devices shrank below laptop size: mobile devices are simply too small to have a traditional full-size keyboard. There has been a profusion of research into text entry techniques for smaller keyboards and touch screens: some of which have become mainstream, while others have not lived up to early expectations. As the mobile phone industry moves to mainstream touch screen interaction we will review the range of input techniques for mobiles, together with evaluations that have taken place to assess their validity: from theoretical modelling through to formal usability experiments. We also report initial results on iPhone text entry speed

    Ambiguous keyboards for AAC

    Get PDF
    Purpose ā€“ ā€œAmbiguous keyboardsā€ and ā€œdisambiguation processesā€ are becoming universally recognised through the popularisation of ā€œpredictive text messagingā€ on mobile phones. As this paper shows, although originating in the AT and AAC fields, these terms and techniques no longer appear to be widely understood or adopted by practitioners or users. The purpose of this paper is to introduce these techniques, discussing the research and theory around them, and to suggest them as AT and AAC strategies to be considered by practitioners and users. Design/methodology/approach ā€“ This is a conceptual paper that describes the use of ambiguous keyboards and disambiguation. The hypothesis of the paper is that ambiguous keyboards and disambiguation processes offer potential to increase the efficiency and effectiveness of AAC and should thus be considered further in research and practice. Findings ā€“ The two broad methods for removing the ambiguity from the output of an ambiguous keyboard are presented. A summary of the literature around the use of disambiguation processes provided and the use of disambiguation processes for AAC discussed. Originality/value ā€“ This paper suggests that ambiguity should be adopted as a characteristic of an AAC keyboard as should the method of removing ambiguity ā€“ namely either coding or a disambiguation process

    Investigating Performance and Usage of Input Methods for Soft Keyboard Hotkeys

    Get PDF
    Touch-based devices, despite their mainstream availability, do not support a unified and efficient command selection mechanism, available on every platform and application. We advocate that hotkeys, conventionally used as a shortcut mechanism on desktop computers, could be generalized as a command selection mechanism for touch-based devices, even for keyboard-less applications. In this paper, we investigate the performance and usage of soft keyboard shortcuts or hotkeys (abbreviated SoftCuts) through two studies comparing different input methods across sitting, standing and walking conditions. Our results suggest that SoftCuts not only are appreciated by participants but also support rapid command selection with different devices and hand configurations. We also did not find evidence that walking deters their performance when using the Once input method.Comment: 17+2 pages, published at Mobile HCI 202

    Keystroke dynamics in the pre-touchscreen era

    Get PDF
    Biometric authentication seeks to measure an individualā€™s unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individualsā€™ typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts

    TechNews digests: Jan - Mar 2010

    Get PDF
    TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news. TechNews service : digests september 2004 till May 2010 Analysis pieces and News combined publish every 2 to 3 month
    • ā€¦
    corecore