All Research Areas
Research Areas
Year Published

387 Results

November 3, 2018

The Effect of Computer-Generated Descriptions on Photo-Sharing Experiences of People with Visual Impairments

Conference on Computer-Supported Cooperative Work and Social Computing (CSCW)

Like sighted people, visually impaired people want to share photographs on social networking services, but find it difficult to identify and select photos from their albums. We aimed to address this problem by incorporating state-of-the-art computer-generated descriptions into Facebook’s photo-sharing feature.

By: Lindsay Reynolds, Shaomei Wu, Shiri Azenkot, Yuhang Zhao
June 1, 2018

The Immersive VR Self: Performance, Embodiment and Presence in Immersive Virtual Reality Environments

Book chapter from A Networked Self and Human Augmentics, AI, Sentience

Virtual avatars are a common way to present oneself in online social interactions. From cartoonish emoticons to hyper-realistic humanoids, these online representations help us portray a certain image to our respective audiences.

By: Raz Schwartz, William Steptoe
May 7, 2018

Advances in Pre-Training Distributed Word Representations

Language Resources and Evaluation Conference (LREC)

In this paper, we show how to train high-quality word vector representations by using a combination of known tricks that are however rarely used together.

By: Tomas Mikolov, Edouard Grave, Piotr Bojanowski, Christian Puhrsch, Armand Joulin
April 21, 2018

Communication Behavior in Embodied Virtual Reality

Human Computer Interaction Conference (CHI)

To investigate communication behavior with embodied virtual reality onto an avatar in a virtual 3D environment, we had 30 dyads complete two tasks using a shared visual workspace: negotiating an apartment layout and placing model furniture on an apartment floor plan.

By: Harrison Jesse Smith, Michael Neff
April 21, 2018

Examining the Demand for Spam: Who Clicks?

Conference on Human Factors in Computing Systems (CHI)

Some spam content manages to evade detection and engage users which is why, in this paper, we focus on the demand side of the spam equation examining what drives users to click on spam via a largescale analysis of de-identified, aggregated Facebook log data (n=600,000).

By: Brian Waismeyer, Elissa M. Redmiles, Neha Chachra
April 21, 2018

A Face Recognition Application for People with Visual Impairments: Understanding Use Beyond the Lab

Conference on Human Factors in Computing Systems (CHI)

We present Accessibility Bot, a research prototype bot on Facebook Messenger, which leverages state-of-the-art computer vision algorithms and the existing set of tagged photos of a user’s friends on Facebook to help people with visually impairments recognize their friends.

By: Lindsay Reynolds, Shaomei Wu, Shiri Azenkot, Yuhang Zhao
April 21, 2018

Social Influence and Reciprocity in Online Gift Giving

Computer Human Interaction (CHI)

We examine 1.5 million gift exchanges on Facebook and show that receiving a gift causes individuals to be 56% more likely to give a gift in the future.

By: René F. Kizilcec, Eytan Bakshy, Dean Eckles, Moira Burke
April 21, 2018

Speech Communication through the Skin: Design of Learning Protocols and Initial Findings

Computer Human Interaction (CHI)

This study reports the design and testing of learning protocols with a system that translates English phonemes to haptic stimulation patterns (haptic symbols).

By: Jaehong Jung, Yang Jiao, Frederico M, Severgnini, Hong Z Tan, Charlotte M. Reed, Ali Israr, Frances Lau, Freddy Abnousi
April 21, 2018

Feeling Speech on the Arm

Computer Human Interaction (CHI)

In this paper, we introduce a transcutaneous language communication (TLC) system that transmits a tactile representation of spoken or written language to the arm.

By: Jennifer Chen, Pablo Castillo, Robert Turcott, Ali Israr, Frances Lau
April 16, 2018

Rethinking Concurrency Control for In-Memory OLAP DBMSs

IEEE International Conference on Data Engineering (ICDE 2018)

In this paper we describe a new concurrency control protocol specifically designed for analytical DBMSs that can provide Snapshot Isolation for distributed in-memory OLAP database systems, called Append-Only Snapshot Isolation (AOSI).

By: Pedro Pedreira, Yinghai Lu, Sergey Pershin, Amit Dutta, Chris Crosswhite