Articles

Sort by
Previous Page Page 2 of 6 Next Page
  1. Research

    Design and implement chords and personal windows for multi-user collaboration on a large multi-touch vertical display

    Co-located collaboration on large vertical screens has become technically feasible, but users are faced with increased effort, or have to wear intrusive personal identifiers. Previous research on co-located co...

    Ioannis Leftheriotis, Konstantinos Chorianopoulos and Letizia Jaccheri

    Human-centric Computing and Information Sciences 2016 6:14

    Published on: 10 September 2016

  2. Research

    Ontology mapping and semantics of web interface signs

    Although, intuitive interface signs are crucial elements of a good user interface (UI), prior research ignored these in UI design and usability evaluation process. This paper argues that ontology (the set of c...

    Muhammad Nazrul Islam and A. K. M. Najmul Islam

    Human-centric Computing and Information Sciences 2016 6:20

    Published on: 8 September 2016

  3. Review

    An investigation of unpaid crowdsourcing

    The continual advancement of internet technologies has led to the evolution of how individuals and organizations operate. For example, through the internet, we can now tap a remote workforce to help us accompl...

    Ria Mae Borromeo and Motomichi Toyama

    Human-centric Computing and Information Sciences 2016 6:11

    Published on: 5 August 2016

  4. Research

    Intelligent phishing url detection using association rule mining

    Phishing is an online criminal act that occurs when a malicious webpage impersonates as legitimate webpage so as to acquire sensitive information from the user. Phishing attack continues to pose a serious risk...

    S. Carolin Jeeva and Elijah Blessing Rajsingh

    Human-centric Computing and Information Sciences 2016 6:10

    Published on: 10 July 2016

  5. Research

    Baiting the hook: factors impacting susceptibility to phishing attacks

    Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise. In this article, we critically...

    Cristian Iuga, Jason R. C. Nurse and Arnau Erola

    Human-centric Computing and Information Sciences 2016 6:8

    Published on: 10 June 2016

  6. Research

    Featuring the e-service quality of online website from a varied perspective

    The websites vigorously grow and inevitably need to provide consumers high-quality service to create excellent experience and win the customers’ heart to establish mutually beneficial and long-term relationshi...

    Huan-Ming Chuang, You-Shyang Chen, Chyuan-Yuh Lin and Pei-Chih Yu

    Human-centric Computing and Information Sciences 2016 6:6

    Published on: 10 May 2016

  7. Research

    Using affective brain-computer interfaces to characterize human influential factors for speech quality-of-experience perception modelling

    As new speech technologies emerge, telecommunication service providers have to provide superior user experience in order to remain competitive. To this end, quality-of-experience (QoE) perception modelling and...

    Rishabh Gupta, Khalil Laghari, Hubert Banville and Tiago H. Falk

    Human-centric Computing and Information Sciences 2016 6:5

    Published on: 5 May 2016

  8. Research

    Heuristics for spatial finding using iterative mobile crowdsourcing

    Crowdsourcing has become a popular method for involving humans in socially-aware computational processes. This paper proposes and investigates algorithms for finding regions of interest using mobile crowdsourc...

    Seng W. Loke

    Human-centric Computing and Information Sciences 2016 6:4

    Published on: 17 April 2016

  9. Research

    SAR reduction in the modelled human head for the mobile phone using different material shields

    Every mobile phone emits radio frequency electromagnetic energy. The amount of this energy absorbed by the human head is measured by the specific absorption rate (SAR). There are standard limits, according to ...

    Prabir Kumar Dutta, Pappu Vankata Yasoda Jayasree and Viriyala Satya Surya Narayana Srinivasa Baba

    Human-centric Computing and Information Sciences 2016 6:3

    Published on: 11 April 2016

  10. Research

    Graph-based motor primitive generation framework

    Unmanned aerial vehicles (UAVs) have many potential applications, such as delivery, leisure, and surveillance. To enable these applications, making the UAVs fly autonomously is the key issue, and requires defi...

    Yunsick Sung, Jeonghoon Kwak and Jong Hyuk Park

    Human-centric Computing and Information Sciences 2015 5:35

    Published on: 15 December 2015

  11. Research

    Heart rate monitoring using human speech spectral features

    This paper attempts to establish a correlation between the human speech, emotions and human heart rate. The study highlights a possible contactless human heart rate measurement technique useful for monitoring ...

    Alex Pappachen James

    Human-centric Computing and Information Sciences 2015 5:33

    Published on: 11 November 2015

  12. Research

    Trusted and secure clustering in mobile pervasive environment

    Pervasive computing has the potential to offer low-cost, high performance, and user centric solutions to exchange the information and communicate seamlessly in highly dynamic, heterogeneous environment. Here s...

    Madhu Sharma Gaur and Bhaskar Pant

    Human-centric Computing and Information Sciences 2015 5:32

    Published on: 31 October 2015

Previous Page Page 2 of 6 Next Page