Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Other Computer Engineering

Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li, Juan Wachs Nov 2014

Embodied Interaction With Visualization And Spatial Navigation In Time-Sensitive Scenarios, Yu-Ting Li, Juan Wachs

Yu-Ting Li

Paraphrasing the theory of embodied cognition, all aspects of our cognition are determined primarily by the contextual information and the means of physical interaction with data and information. In hybrid human-machine systems involving complex decision making, continuously maintaining a high level of attention while employing a deep understanding concerning the task performed as well as its context are essential. Utilizing embodied interaction to interact with machines has the potential to promote thinking and learning according to the theory of embodied cognition proposed by Lakoff. Additionally, the hybrid human-machine system utilizing natural and intuitive communication channels (e.g., gestures, speech, and ...


Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran Dec 2007

Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran

Patrick Tague

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For ...