JG
Jorge Goncalves
7 records found
1
Object Selection and Manipulation in VR Headsets
Research Challenges, Solutions, and Success Measurements
Object selection and manipulation are the foundation of VR interactions. With the rapid development of VR technology and the field of virtual object selection and manipulation, the literature demands a structured understanding of the core research challenges and a critical reflec
...
Addressing attentional issues in augmented reality with adaptive agents
Possibilities and challenges
Recent work on augmented reality (AR) has explored the use of adaptive agents to overcome attentional issues that negatively impact task performance. However, despite positive technical evaluations, adaptive agents have shown no significant improvements to user task performance i
...
AI systems are increasingly incorporated into human decision-making. Yet, human decision-makers are often affected by their cognitive biases. In critical settings, such as medical diagnosis, criminal judgment, or information consumption, these cognitive biases hinder optimal deci
...
InfoPrint
Embedding Interactive Information in 3D Prints Using Low-Cost Readily-Available Printers and Materials
We present a fully-printable method to embed interactive information inside 3D printed objects. The information is invisible to the human eye and can be read using thermal imaging after temperature transfer through interaction with the objects. Prior methods either modify the sur
...
Performing multiple experiments is common when learning internal mechanisms of complex systems. These experiments can include perturbations of parameters or external disturbances. A challenging problem is to efficiently incorporate all collected data simultaneously to infer the u
...
Cyber-physical systems embed software into the physical world. They appear in a wide range of applications such as smart grids, robotics, and intelligent manufacturing. Cyber-physical systems have proved resistant to modeling due to their intrinsic complexity arising from the com
...
We develop and evaluate a data hiding method that enables smartphones to encrypt and embed sensitive information into carrier streams of sensor data. Our evaluation considers multiple handsets and a variety of data types, and we demonstrate that our method has a computational cos
...