首页 > 最新文献

Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)最新文献

英文 中文
A review of groupware evaluations 对群件评价的回顾
David Pinelle, C. Gutwin
A better understanding of how groupware systems have been evaluated in the past can help to frame the discussion of what methods and techniques should be considered for future evaluations. We reviewed all papers from the ACM CSCW conference (1990-1998) that introduced or evaluated a groupware system. Forty-five papers were included in the review. The main findings are that almost one-third of the groupware systems were not evaluated in any formal way, that only about one-quarter of the articles included evaluations in a real-world setting, and that a wide variety of evaluation techniques are in use. Our main conclusions from the review are that more attention must be paid to evaluating groupware systems and that there is room for additional evaluation techniques that are simple and low in cost.
更好地理解过去是如何评估群件系统的,可以帮助构建关于未来评估应该考虑哪些方法和技术的讨论。我们回顾了来自ACM CSCW会议(1990-1998)的所有介绍或评估群件系统的论文。这篇综述收录了45篇论文。主要的发现是,几乎三分之一的群件系统没有以任何正式的方式进行评估,只有大约四分之一的文章包含了真实世界环境中的评估,并且使用了各种各样的评估技术。我们从审查中得出的主要结论是,必须更多地关注对群件系统的评估,并且存在对简单和低成本的附加评估技术的空间。
{"title":"A review of groupware evaluations","authors":"David Pinelle, C. Gutwin","doi":"10.1109/ENABL.2000.883709","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883709","url":null,"abstract":"A better understanding of how groupware systems have been evaluated in the past can help to frame the discussion of what methods and techniques should be considered for future evaluations. We reviewed all papers from the ACM CSCW conference (1990-1998) that introduced or evaluated a groupware system. Forty-five papers were included in the review. The main findings are that almost one-third of the groupware systems were not evaluated in any formal way, that only about one-quarter of the articles included evaluations in a real-world setting, and that a wide variety of evaluation techniques are in use. Our main conclusions from the review are that more attention must be paid to evaluating groupware systems and that there is room for additional evaluation techniques that are simple and low in cost.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Walking the Web of trust 行走在信任的网络上
G. Caronni
Most currently deployed public key infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usage-scenarios, but there exists the viable alternative of the 'Web of Trust'. In a web of trust, each user of the system can choose for himself whom he elects to trust, and whom not. After contrasting the properties of web-of-trust based PKIs to those of hierarchical PKIs, an introduction to webs of trust and to quantitative trust calculations is given. The paper concludes with the presentation of an efficient, sub-exponential algorithm that allows heuristic computations of trust paths in a web of trust.
目前部署的大多数公钥基础设施(pki)都是面向层次结构的,并且依赖于集中式设计。分层pki可能是许多使用场景的合适解决方案,但存在“信任网络”的可行替代方案。在信任网络中,系统的每个用户都可以自己选择信任谁,不信任谁。在比较了基于信任网络的pki与分层pki的特性之后,介绍了信任网络和定量信任计算。本文最后提出了一种有效的次指数算法,该算法允许启发式计算信任网络中的信任路径。
{"title":"Walking the Web of trust","authors":"G. Caronni","doi":"10.1109/ENABL.2000.883720","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883720","url":null,"abstract":"Most currently deployed public key infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usage-scenarios, but there exists the viable alternative of the 'Web of Trust'. In a web of trust, each user of the system can choose for himself whom he elects to trust, and whom not. After contrasting the properties of web-of-trust based PKIs to those of hierarchical PKIs, an introduction to webs of trust and to quantitative trust calculations is given. The paper concludes with the presentation of an efficient, sub-exponential algorithm that allows heuristic computations of trust paths in a web of trust.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 148
Should users inhabit visualisations? 用户应该使用可视化吗?
C. Knight, M. Munro
The use of three-dimensions for visualisation is a lot newer than the technology required to achieve such visual representations. A further extension of this work is to add multiple users to one visualisation environment to create visualisations that go beyond individual intelligence amplification and become knowledge repositories, shared workspaces and integral parts of the management of the data which they represent. The issues surrounding such uses of visualisations are presented in this paper, with an extension of a three-dimensional visualisation to encompass these ideas.
三维可视化的使用比实现这种视觉表示所需的技术要新得多。这项工作的进一步扩展是将多个用户添加到一个可视化环境中,以创建超越个人智能放大的可视化,并成为知识库,共享工作区和它们所代表的数据管理的组成部分。本文提出了围绕可视化使用的问题,并扩展了三维可视化来包含这些想法。
{"title":"Should users inhabit visualisations?","authors":"C. Knight, M. Munro","doi":"10.1109/ENABL.2000.883703","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883703","url":null,"abstract":"The use of three-dimensions for visualisation is a lot newer than the technology required to achieve such visual representations. A further extension of this work is to add multiple users to one visualisation environment to create visualisations that go beyond individual intelligence amplification and become knowledge repositories, shared workspaces and integral parts of the management of the data which they represent. The issues surrounding such uses of visualisations are presented in this paper, with an extension of a three-dimensional visualisation to encompass these ideas.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
UML-based representation of role-based access control 基于uml的基于角色的访问控制表示
M. Shin, Gail-Joon Ahn
In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. Several framework for the development of role-based systems have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily understand and refer to develop role-based systems. The Unified Modeling Language (UML) is a general-purpose visual modeling language in which we can specify, visualize, and document the components of a software system. In this paper we represent the RBAC model with this well-known modeling language to reduce a gap between security models and system developments. We specify the RBAC model with three views: static view, functional view, and dynamic view. In addition, we briefly discuss about the future directions.
在基于角色的访问控制(RBAC)中,权限与角色相关联,用户成为适当角色的成员,从而获得角色的权限。RBAC背后的主要动机是简化管理。介绍了开发基于角色的系统的几个框架。然而,有一些作品以一种系统开发人员或软件工程师可以轻松理解和参考的方式指定RBAC,以开发基于角色的系统。统一建模语言(UML)是一种通用的可视化建模语言,我们可以用它来指定、可视化和记录软件系统的组件。在本文中,我们用这种著名的建模语言来表示RBAC模型,以减少安全模型和系统开发之间的差距。我们用三个视图指定RBAC模型:静态视图、功能视图和动态视图。并对今后的研究方向作了简要的讨论。
{"title":"UML-based representation of role-based access control","authors":"M. Shin, Gail-Joon Ahn","doi":"10.1109/ENABL.2000.883728","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883728","url":null,"abstract":"In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. Several framework for the development of role-based systems have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily understand and refer to develop role-based systems. The Unified Modeling Language (UML) is a general-purpose visual modeling language in which we can specify, visualize, and document the components of a software system. In this paper we represent the RBAC model with this well-known modeling language to reduce a gap between security models and system developments. We specify the RBAC model with three views: static view, functional view, and dynamic view. In addition, we briefly discuss about the future directions.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Towards an evaluation methodology for the development of research-oriented virtual communities 面向研究型虚拟社区发展的评价方法研究
Janet Ho, M. Schraefel, M. Chignell
This paper is part of a case study of collaborative environment use and part of a proposition for methodological approach for evaluating virtual environments based on the findings from that case study. We review the literature on evaluating collaborative environments and we also report on a usability study carried out on a research oriented virtual community. The report includes a cluster analysis of the questionnaire results and the use of those results in profiling user attitudes. We propose that this type of differential cluster analysis should be used in the future to identify people who are generally better able to make discriminating judgements, and also to identify people who are able to analyse the usability of different components of an environment rather than just the overall environment.
本文是协作环境使用案例研究的一部分,也是基于该案例研究结果评估虚拟环境的方法学方法的一部分。我们回顾了评估协作环境的文献,并报告了在面向研究的虚拟社区中进行的可用性研究。该报告包括对调查表结果的聚类分析,以及利用这些结果对用户态度进行分析。我们建议,这种类型的差异聚类分析应该在未来用于识别通常能够更好地做出判别判断的人,以及识别能够分析环境中不同组件的可用性而不仅仅是整体环境的人。
{"title":"Towards an evaluation methodology for the development of research-oriented virtual communities","authors":"Janet Ho, M. Schraefel, M. Chignell","doi":"10.1109/ENABL.2000.883714","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883714","url":null,"abstract":"This paper is part of a case study of collaborative environment use and part of a proposition for methodological approach for evaluating virtual environments based on the findings from that case study. We review the literature on evaluating collaborative environments and we also report on a usability study carried out on a research oriented virtual community. The report includes a cluster analysis of the questionnaire results and the use of those results in profiling user attitudes. We propose that this type of differential cluster analysis should be used in the future to identify people who are generally better able to make discriminating judgements, and also to identify people who are able to analyse the usability of different components of an environment rather than just the overall environment.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A coordination infrastructure for agent-based Internet applications 基于代理的Internet应用程序的协调基础结构
E. Denti, Andrea Omicini
Internet applications are often structured as collections of interactive, heterogeneous agents, which have to coordinate to pursue the application goals. These applications require design methodologies that are far from being well established and new standard technologies models, languages, technologies and tools specifically tailored to the agent metaphor and to agent-based systems. This article presents LuCe, a coordination infrastructure for the design and the development of agent-based distributed applications on the Internet, which integrates Java logic-based languages, and tuple-based coordination models. We discuss the impact of this approach on the design both of the single agents and of Internet applications, then suggest how it could be exploited in the design/development/test cycle.
Internet应用程序通常被构建为交互式异构代理的集合,这些代理必须相互协调以实现应用程序目标。这些应用程序需要远未完善的设计方法和新的标准技术模型、语言、技术和工具,专门为代理隐喻和基于代理的系统量身定制。本文介绍了LuCe,这是一种用于在Internet上设计和开发基于代理的分布式应用程序的协调基础设施,它集成了基于Java逻辑的语言和基于元组的协调模型。我们讨论了这种方法对单个代理和Internet应用程序设计的影响,然后建议如何在设计/开发/测试周期中利用它。
{"title":"A coordination infrastructure for agent-based Internet applications","authors":"E. Denti, Andrea Omicini","doi":"10.1109/ENABL.2000.883735","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883735","url":null,"abstract":"Internet applications are often structured as collections of interactive, heterogeneous agents, which have to coordinate to pursue the application goals. These applications require design methodologies that are far from being well established and new standard technologies models, languages, technologies and tools specifically tailored to the agent metaphor and to agent-based systems. This article presents LuCe, a coordination infrastructure for the design and the development of agent-based distributed applications on the Internet, which integrates Java logic-based languages, and tuple-based coordination models. We discuss the impact of this approach on the design both of the single agents and of Internet applications, then suggest how it could be exploited in the design/development/test cycle.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128146530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An evaluation and comparison of the industrial and educational usage of CSCW within the design process 在设计过程中对CSCW的工业和教育用途进行评估和比较
A. Thomson, S. MacGregor, W. Ion
This paper presents the findings of three recent research projects carried out at the University of Strathclyde. Two of the projects, ICON (Institutional Collaboration Over Networks) and ICON2 investigated the usage of CSCW tools by disparate engineering design students whilst, a Design Council funded research project investigated the introduction and usage of shared workspace technology within the design process of three companies and their supply chain. This is followed by a comparative reflection of the results allowing identification of generic findings together with opportunities for cross-sectoral lessons.
本文介绍了最近在斯特拉斯克莱德大学进行的三个研究项目的结果。其中两个项目,ICON(机构网络协作)和ICON2调查了不同工程设计专业学生对CSCW工具的使用情况,同时,一个设计委员会资助的研究项目调查了三家公司及其供应链设计过程中共享工作空间技术的引入和使用情况。然后对结果进行比较反映,从而确定一般性的发现,并有机会吸取跨部门的经验教训。
{"title":"An evaluation and comparison of the industrial and educational usage of CSCW within the design process","authors":"A. Thomson, S. MacGregor, W. Ion","doi":"10.1109/ENABL.2000.883713","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883713","url":null,"abstract":"This paper presents the findings of three recent research projects carried out at the University of Strathclyde. Two of the projects, ICON (Institutional Collaboration Over Networks) and ICON2 investigated the usage of CSCW tools by disparate engineering design students whilst, a Design Council funded research project investigated the introduction and usage of shared workspace technology within the design process of three companies and their supply chain. This is followed by a comparative reflection of the results allowing identification of generic findings together with opportunities for cross-sectoral lessons.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tapping alert protocol 监听警报协议
G. Ahn, Kwangjo Kim, Hee Yong Youn
This paper proposes a new protocol called tapping alert protocol (TAP), which detects if any computer is eavesdropping on the network. When tapping is detected, it alerts the network users on the danger of tapping. In designing the protocol, a model for an attacker is developed who sniffs the network and breaks down the proposed protocol, and the requirements on the protocol in terms of efficiency and security are defined. We also describe how to detect if a network interface card on a remote computer is in the sniffing mode. The proposed protocol employs cryptographic schemes to guarantee authentication of the code monitoring tapping operation and integrity of the data being sent. Finally, the proposed protocol can protect authorized users from illegal eavesdropping on the network.
本文提出了一种新的监听警报协议(TAP),用于检测网络上是否有计算机窃听。当检测到窃听时,提示网络用户有窃听的危险。在协议设计中,建立了攻击者的网络嗅探模型,并对协议进行了破坏,定义了协议在效率和安全性方面的要求。我们还描述了如何检测远程计算机上的网络接口卡是否处于嗅探模式。该协议采用加密方案来保证代码的认证、监听操作和发送数据的完整性。最后,该协议可以保护授权用户免受网络上的非法窃听。
{"title":"Tapping alert protocol","authors":"G. Ahn, Kwangjo Kim, Hee Yong Youn","doi":"10.1109/ENABL.2000.883721","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883721","url":null,"abstract":"This paper proposes a new protocol called tapping alert protocol (TAP), which detects if any computer is eavesdropping on the network. When tapping is detected, it alerts the network users on the danger of tapping. In designing the protocol, a model for an attacker is developed who sniffs the network and breaks down the proposed protocol, and the requirements on the protocol in terms of efficiency and security are defined. We also describe how to detect if a network interface card on a remote computer is in the sniffing mode. The proposed protocol employs cryptographic schemes to guarantee authentication of the code monitoring tapping operation and integrity of the data being sent. Finally, the proposed protocol can protect authorized users from illegal eavesdropping on the network.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114386221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The mechanics of collaboration: developing low cost usability evaluation methods for shared workspaces 协作机制:为共享工作空间开发低成本的可用性评估方法
C. Gutwin, S. Greenberg
We introduce a conceptual framework that articulates the mechanics of collaboration for shared-workspace groupware: the low level actions and interactions that must be carried out to complete a task in a shared manner. These include communication, coordination, planning, monitoring, assistance, and protection. The framework also includes three general measures of these mechanics: effectiveness, efficiency, and satisfaction. The underlying idea of the framework is that some usability problems in groupware systems are not inherently tied to the social context in which the system is used but rather are a result of poor support for the basic activities of collaborative work in shared spaces. We believe that existing low-cost evaluation methods-heuristic evaluation, walkthroughs, user observations and questionnaires-can be modified to include this framework in a way that helps a groupware evaluator uncover these usability problems.
我们引入了一个概念框架,阐明了共享工作空间群件的协作机制:以共享方式完成任务必须执行的低级动作和交互。这包括沟通、协调、规划、监测、援助和保护。该框架还包括这些机制的三个一般度量:有效性、效率和满意度。该框架的基本思想是,群件系统中的一些可用性问题与使用系统的社会环境没有内在联系,而是由于对共享空间中协作工作的基本活动支持不足造成的。我们相信现有的低成本评估方法——启发式评估、演练、用户观察和问卷调查——可以被修改以包含这个框架,从而帮助群件评估者发现这些可用性问题。
{"title":"The mechanics of collaboration: developing low cost usability evaluation methods for shared workspaces","authors":"C. Gutwin, S. Greenberg","doi":"10.1109/ENABL.2000.883711","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883711","url":null,"abstract":"We introduce a conceptual framework that articulates the mechanics of collaboration for shared-workspace groupware: the low level actions and interactions that must be carried out to complete a task in a shared manner. These include communication, coordination, planning, monitoring, assistance, and protection. The framework also includes three general measures of these mechanics: effectiveness, efficiency, and satisfaction. The underlying idea of the framework is that some usability problems in groupware systems are not inherently tied to the social context in which the system is used but rather are a result of poor support for the basic activities of collaborative work in shared spaces. We believe that existing low-cost evaluation methods-heuristic evaluation, walkthroughs, user observations and questionnaires-can be modified to include this framework in a way that helps a groupware evaluator uncover these usability problems.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 259
CVE technology development based an real world application and user needs CVE技术的开发基于现实世界的应用和用户需求
E. Daphne, M. William, P.R. Steve, W.J. Adrian
Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.
认为协作虚拟环境(CVE)技术的发展必须以应用和最终用户需求为导向。基于对现实世界教育环境中使用的原型的观察,描述了人为因素和技术研究人员之间的合作。该研究的目的是为在CVE中使用虚拟角色开发一个设计因素框架,并为底层CVE技术的发展提供信息。接下来的方法论方法涉及到原型虚拟学习环境的开发,在一系列不同的阶段增加复杂性。环境是基于古埃及游戏(Senet),目标是在英国国家教育课程的关键阶段2级的孩子。本文展示了如何使用已建立的2D多媒体技术来开发健壮的原型,然后由儿童观察使用。这些阶段的结果已用于指导当前阶段的工作。这涉及到使用实验性的Deva虚拟现实系统构建一个3D共享虚拟环境。
{"title":"CVE technology development based an real world application and user needs","authors":"E. Daphne, M. William, P.R. Steve, W.J. Adrian","doi":"10.1109/ENABL.2000.883698","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883698","url":null,"abstract":"Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1