Pick-and-drop: a direct manipulation technique for multiple computer environments
Proceedings of the 10th annual ACM symposium on User interface software and technology
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Bridging physical and virtual worlds with electronic tags
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Augmented surfaces: a spatially continuous work space for hybrid computing environments
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Connectables: dynamic coupling of displays for the flexible creation of shared workspaces
Proceedings of the 14th annual ACM symposium on User interface software and technology
That one there! Pointing to establish device identity
Proceedings of the 15th annual ACM symposium on User interface software and technology
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Synchronous gestures for multiple persons and computers
Proceedings of the 16th annual ACM symposium on User interface software and technology
HCI aspects of mobile devices and services
Personal and Ubiquitous Computing
Cooperative gestures: multi-user gestural interactions for co-located groupware
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A taxonomy for and analysis of multi-person-display ecosystems
Personal and Ubiquitous Computing
uPackage: a package to enable do-it-yourself style ubiquitous services with daily objects
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Influence of user perception, security needs, and social factors on device pairing method choices
Proceedings of the Sixth Symposium on Usable Privacy and Security
User-defined gestures for connecting mobile phones, public displays, and tabletops
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
PhoneTouch: a technique for direct phone interaction on surfaces
UIST '10 Proceedings of the 23nd annual ACM symposium on User interface software and technology
Towards personalized surface computing
UIST '10 Adjunct proceedings of the 23nd annual ACM symposium on User interface software and technology
Spatial co-location for device association: the connected object way
Proceedings of the 2011 international workshop on Networking and object memories for the internet of things
RhythmLink: securely pairing I/O-constrained devices by tapping
Proceedings of the 24th annual ACM symposium on User interface software and technology
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
Clipoid: an augmentable short-distance wireless toolkit for 'accidentally smart home' environments
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
EasyGroups: binding mobile devices for collaborative interactions
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Factors influencing visual attention switch in multi-display user interfaces: a survey
Proceedings of the 2012 International Symposium on Pervasive Displays
Designing a multi-slate reading environment to support active reading activities
ACM Transactions on Computer-Human Interaction (TOCHI)
Hi-index | 0.00 |
This paper introduces the concept of synchronous user operation, a user interface technique for establishing spontaneous network connections between digital devices. This concept has been implemented in the “SyncTap system”, which allows a user to establish device connections through synchronous button operations. When the user wants to connect two devices, she synchronously presses and releases the “connection” buttons on both devices. Then, multicast packets containing button press and release timing information are sent through the network. By comparing this timing information with locally recorded information, the devices can correctly identify each other. This scheme is simple but scalable because it can detect and handle simultaneous overlapping connection requests. It can also be used to establish secure connections by exchanging public keys. This paper describes the principle, the protocol, and various applications in the domain of ubiquitous computing.