Scalable Human Computer Interaction in Control Rooms as Pervasive Computing Environments

被引:0
|
作者
Flegel, Nadine [1 ]
Van Laerhoven, Kristof [2 ]
Mentler, Tilo [1 ]
机构
[1] Trier Univ Appl Sci, Trier, Germany
[2] Univ Siegen, Siegen, Germany
关键词
Scalability; Safety-Critical Systems; Control Rooms; Interaction Design Patterns; Pervasive Computing Environment;
D O I
10.1145/3552327.3552351
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private and professional life contexts must be viewed as pervasive computing environments, with the aim to address peoples' needs and tasks as well as cooperation and communication issues. However, there is a risk, that this results in handling a growing number of devices and complex interactions. The question arises to what extent interaction concepts that were designed for single or a few devices can be transferred to such environments. This can be seen as a scaling problem in terms of cognitive ergonomics. This is also an important issue in safety-critical domains, where control rooms serve as central units, as the demands on operators are increasing. Support is needed in decision-making, communication and collaboration. This paper describes the research questions and methodology of the development of design principles for scalable interaction design in control rooms from a cognitive ergonomics perspective. The expected outcome is a set of concepts that are specifically suited for safety-critical pervasive computing environments.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Pervasive Computing in Classroom Environments and Applications
    Oluwagbemi, Folakemi
    Misra, Sanjay
    Omoregbe, Nicholas
    2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT), 2014,
  • [22] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [23] On data management in pervasive computing environments
    Perich, F
    Joshi, A
    Finin, T
    Yesha, Y
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (05) : 621 - 634
  • [24] Service discovery in pervasive computing environments
    Zhu, F
    Mutka, MW
    Ni, LM
    IEEE PERVASIVE COMPUTING, 2005, 4 (04) : 81 - 90
  • [25] A location model for pervasive computing environments
    Satoh, I
    THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 215 - 224
  • [26] Provably Correct Pervasive Computing Environments
    Ranganathan, Anand
    Campbell, Roy H.
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 160 - +
  • [27] Highly Efficient and Scalable Access Control Mechanism for IoT Devices in Pervasive Environments
    Yu, Alian
    Kang, Jian
    Jiang, Wei
    Lin, Dan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 234 - 245
  • [28] A trust model for pervasive computing environments
    Yin, Shuxin
    Ray, Indrakshi
    Ray, Indrajit
    2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 340 - +
  • [29] A trust framework for pervasive computing environments
    Wolfe, Steven T.
    Ahamed, Sheikh I.
    Zulkernine, Mohammad
    2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 312 - +
  • [30] A Trust Framework for Pervasive Computing Environments
    Xu, Wenshuan
    Xin, Yunwei
    Lu, Guizhang
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2222 - 2225