388 Results
November 3, 2018
The Effect of Computer-Generated Descriptions on Photo-Sharing Experiences of People with Visual Impairments
Conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
Like sighted people, visually impaired people want to share photographs on social networking services, but find it difficult to identify and select photos from their albums. We aimed to address this problem by incorporating state-of-the-art computer-generated descriptions into Facebook’s photo-sharing feature.
By: Lindsay Reynolds, Shaomei Wu, Shiri Azenkot, Yuhang ZhaoJune 1, 2018
The Immersive VR Self: Performance, Embodiment and Presence in Immersive Virtual Reality Environments
Book chapter from A Networked Self and Human Augmentics, AI, Sentience
Virtual avatars are a common way to present oneself in online social interactions. From cartoonish emoticons to hyper-realistic humanoids, these online representations help us portray a certain image to our respective audiences.
By: Raz Schwartz, William SteptoeMay 7, 2018
Advances in Pre-Training Distributed Word Representations
Language Resources and Evaluation Conference (LREC)
In this paper, we show how to train high-quality word vector representations by using a combination of known tricks that are however rarely used together.
By: Tomas Mikolov, Edouard Grave, Piotr Bojanowski, Christian Puhrsch, Armand JoulinApril 21, 2018
Feeling Speech on the Arm
Computer Human Interaction (CHI)
In this paper, we introduce a transcutaneous language communication (TLC) system that transmits a tactile representation of spoken or written language to the arm.
By: Jennifer Chen, Pablo Castillo, Robert Turcott, Ali Israr, Frances LauApril 21, 2018
Communication Behavior in Embodied Virtual Reality
Human Computer Interaction Conference (CHI)
To investigate communication behavior with embodied virtual reality onto an avatar in a virtual 3D environment, we had 30 dyads complete two tasks using a shared visual workspace: negotiating an apartment layout and placing model furniture on an apartment floor plan.
By: Harrison Jesse Smith, Michael NeffApril 21, 2018
Examining the Demand for Spam: Who Clicks?
Conference on Human Factors in Computing Systems (CHI)
Some spam content manages to evade detection and engage users which is why, in this paper, we focus on the demand side of the spam equation examining what drives users to click on spam via a largescale analysis of de-identified, aggregated Facebook log data (n=600,000).
By: Brian Waismeyer, Elissa M. Redmiles, Neha ChachraApril 21, 2018
A Face Recognition Application for People with Visual Impairments: Understanding Use Beyond the Lab
Conference on Human Factors in Computing Systems (CHI)
We present Accessibility Bot, a research prototype bot on Facebook Messenger, which leverages state-of-the-art computer vision algorithms and the existing set of tagged photos of a user’s friends on Facebook to help people with visually impairments recognize their friends.
By: Lindsay Reynolds, Shaomei Wu, Shiri Azenkot, Yuhang ZhaoApril 21, 2018
Social Influence and Reciprocity in Online Gift Giving
Computer Human Interaction (CHI)
We examine 1.5 million gift exchanges on Facebook and show that receiving a gift causes individuals to be 56% more likely to give a gift in the future.
By: René F. Kizilcec, Eytan Bakshy, Dean Eckles, Moira BurkeApril 21, 2018
Speech Communication through the Skin: Design of Learning Protocols and Initial Findings
Computer Human Interaction (CHI)
This study reports the design and testing of learning protocols with a system that translates English phonemes to haptic stimulation patterns (haptic symbols).
By: Jaehong Jung, Yang Jiao, Frederico M, Severgnini, Hong Z Tan, Charlotte M. Reed, Ali Israr, Frances Lau, Freddy AbnousiApril 16, 2018
Rethinking Concurrency Control for In-Memory OLAP DBMSs
IEEE International Conference on Data Engineering (ICDE 2018)
In this paper we describe a new concurrency control protocol specifically designed for analytical DBMSs that can provide Snapshot Isolation for distributed in-memory OLAP database systems, called Append-Only Snapshot Isolation (AOSI).
By: Pedro Pedreira, Yinghai Lu, Sergey Pershin, Amit Dutta, Chris Crosswhite