Skip to main content
... Edward Clarkson, Kent Lyons, James Clawson and Thad Starner College of Computing and GVU Center, Georgia Institute of Technology 801 Atlantic Drive, Atlanta GA 30332-0280 {edcclark, kent, jamer, thad}@cc.gatech.edu ABSTRACT MacKenzie... more
... Edward Clarkson, Kent Lyons, James Clawson and Thad Starner College of Computing and GVU Center, Georgia Institute of Technology 801 Atlantic Drive, Atlanta GA 30332-0280 {edcclark, kent, jamer, thad}@cc.gatech.edu ABSTRACT MacKenzie and Soukoreff have ...
Page 1. Recognizing Sign Language from Brain Imaging Nishant A. Mehta, Thad Starner, Melody M. Jackson, Karolyn O. Babalola Georgia Institute of Technology Atlanta, GA, USA {niche,thad,melody}@cc.gatech.edu karolyn@gatech.edu ...
Research Interests:
BBN Systems and Technologies 70 Fawcett Street, Cambridge, MA 02138 Email: Makhoul@bbn.com ... ABSTRACT A hidden Markov model (HMM) based continuous speech recognition system is applied to on-line cursive handwrit-ing recognition. The... more
BBN Systems and Technologies 70 Fawcett Street, Cambridge, MA 02138 Email: Makhoul@bbn.com ... ABSTRACT A hidden Markov model (HMM) based continuous speech recognition system is applied to on-line cursive handwrit-ing recognition. The base ...
While a military patrol may be well-planned, its soldiers well-trained, and the intelligence objectives achieved, the information requirements of the commander may change significantly after the patrol has returned. An area that has been... more
While a military patrol may be well-planned, its soldiers well-trained, and the intelligence objectives achieved, the information requirements of the commander may change significantly after the patrol has returned. An area that has been scouted for military action may later be the focus for humanitarian aid. In addition, the artifacts and intelligence gained from presence patrols may cause an intelligence officer, upon reflection, to wish for more specifically targeted information than what the patrol was told to recover. Georgia Tech's Virtual Patrol allows a soldier to revisit a patrol captured earlier using the Soldier's Assist System (SAS) wearable computer. SAS captures video, ambient audio, speech audio, high resolution still images, GPS position, altitude, orientation, and body movement during a patrol. The soldier can replay the patrol as a continuous movie, search for specific events, or quickly browse the patrol using a map-based or timeline-based interface. The soldier can quickly select media from the interface to semi-automatically create a presentation about the patrol. In this talk, we will describe the difficulties of creating the on-body capture hardware for this project, the lessons learned in interface design, and the challenges of automatically indexing media taken from the patrols using the types of events soldiers wish to search.
Wearable computing brings computation much closer to the user for everyday tasks and may be worn during most of the day. However, with CPU and wireless network intensive applications, higher power microprocessors and radio links are... more
Wearable computing brings computation much closer to the user for everyday tasks and may be worn during most of the day. However, with CPU and wireless network intensive applications, higher power microprocessors and radio links are necessary resulting in increased heat generation. This paper suggests a method to increase the hear dissipation capability per unit surface area of a mobile
We present two experiments to evaluate wrist-worn wearable tactile displays (WTDs) that provide easy to perceive alerts for on-the-go users. The first experiment (2304 trials, 12 participants) focuses on the perception sensitivity of... more
We present two experiments to evaluate wrist-worn wearable tactile displays (WTDs) that provide easy to perceive alerts for on-the-go users. The first experiment (2304 trials, 12 participants) focuses on the perception sensitivity of tactile patterns and reveals that people discriminate our 24 tactile patterns with up to 99% accuracy after 40 minutes of training. Among the four parameters (intensity, starting
... School of Interactive Computing, College of Computing, Georgia Institute of Technology {zahoor brashear harley.hamilton thad}@cc.gatech.edu ... During experimentation we found that rather than just using the reverse pass, verification... more
... School of Interactive Computing, College of Computing, Georgia Institute of Technology {zahoor brashear harley.hamilton thad}@cc.gatech.edu ... During experimentation we found that rather than just using the reverse pass, verification per-formance could be improved by ...
ABSTRACT Thad Starner, who has been wearing a "homebrew" computer with a head-up display as part of his daily life since 1993, discusses why it has taken so long for wearables to capture consumer interest. He discusses... more
ABSTRACT Thad Starner, who has been wearing a "homebrew" computer with a head-up display as part of his daily life since 1993, discusses why it has taken so long for wearables to capture consumer interest. He discusses the various challenges of designing wearable systems and presents five different phases of head-mounted displays, illustrating how improvements in technology allowed progressively more useful and usable devices.
Devices capable of gestural interaction through motion sensing are increasingly becoming available to consumers; however, motion gesture control has yet to appear outside of game consoles. Interaction designers are frequently not expert... more
Devices capable of gestural interaction through motion sensing are increasingly becoming available to consumers; however, motion gesture control has yet to appear outside of game consoles. Interaction designers are frequently not expert in pattern recognition, which may be one reason for this lack of availability. Another issue is how to effectively test gestures to ensure that they are not unintentionally
ABSTRACT
ABSTRACT Wearable technology, specifically e-textiles, offers the potential for interacting with electronic devices in a whole new manner. However, some may find the operation of a system that employs non-traditional on-body interactions... more
ABSTRACT Wearable technology, specifically e-textiles, offers the potential for interacting with electronic devices in a whole new manner. However, some may find the operation of a system that employs non-traditional on-body interactions uncomfortable to perform in a public setting, impacting how readily a new form of mobile technology may be received. Thus, it is important for interaction designers to take into consideration the implications of on-body gesture interactions when designing wearable interfaces. In this study, we explore the third-party perceptions of a user's interactions with a wearable e-textile interface. This two-prong evaluation examines the societal perceptions of a user interacting with the textile interface at different on-body locations, as well as the observer's attitudes toward on-body controller placement. We performed the study in the United States and South Korea to gain cultural insights into the perceptions of on-body technology usage.
ABSTRACT Seeking to enable direct and equal access for the Deaf to emergency call centers, we analyze the current state of the emergency phone system in the United States and elsewhere in the world. Leveraging teletypewriter (TTY)... more
ABSTRACT Seeking to enable direct and equal access for the Deaf to emergency call centers, we analyze the current state of the emergency phone system in the United States and elsewhere in the world. Leveraging teletypewriter (TTY) technology mandated by the Americans with Disabilities Act of 1990 to be installed in all emergency call centers in the United States, we developed software that emulates a TTY on a smart phone. We present an Instant Messaging style interface for mobile phones that uses the existing emergency infrastructure and allows Deaf users to communicate directly with emergency operators.
Mobile phone calls are often missed due to the user not hearing the phone ring or feeling it vibrate. We present the design of wearable textile-based electro-tactile display embedded in a wristband that can be integrated with current... more
Mobile phone calls are often missed due to the user not hearing the phone ring or feeling it vibrate. We present the design of wearable textile-based electro-tactile display embedded in a wristband that can be integrated with current mobile phones and wearable computers. ...
We introduce a face detector for wearable computers that exploits constraints in face scale and orientation imposed by the proximity of participants in near social interactions. Using this method we describe a wearable system that... more
We introduce a face detector for wearable computers that exploits constraints in face scale and orientation imposed by the proximity of participants in near social interactions. Using this method we describe a wearable system that perceives “social engagement,” i.e., when the wearer begins to interact with other individuals. Our experimental system proved >90% accurate when tested on wearable video data
... Using Head-Mounted Displays Kimberly A. Weaver GVU Center, School of Interactive Computing Georgia Tech Atlanta, GA 30332 kimberly.weaver@gatech.edu Hannes Baumann TZI, Universität Bremen Am Fallturm 1 D-28359 Bremen, Germany... more
... Using Head-Mounted Displays Kimberly A. Weaver GVU Center, School of Interactive Computing Georgia Tech Atlanta, GA 30332 kimberly.weaver@gatech.edu Hannes Baumann TZI, Universität Bremen Am Fallturm 1 D-28359 Bremen, Germany hannes@tzi.de ...
Page 1. Recognizing Sign Language from Brain Imaging Nishant A. Mehta, Thad Starner, Melody M. Jackson, Karolyn O. Babalola Georgia Institute of Technology Atlanta, GA, USA {niche,thad,melody}@cc.gatech.edu karolyn@gatech.edu ...
By analyzing features of users' typing, Automatic Whiteout++ detects and corrects up to 32.37% of the... more
By analyzing features of users' typing, Automatic Whiteout++ detects and corrects up to 32.37% of the errors made by typists while using a mini-QWERTY (RIM Blackberry style) keyboard. The system targets "off-by-one" errors where the user accidentally presses a key adjacent to the one intended. Using a database of typing from longitudinal tests on two different keyboards in a variety
My group at Georgia Tech is dedicated to creating wearable agents. By necessity, our work combines on-body perception, user modeling, and human-computer interfaces. The Web site, www.innovations.gatech.edu, demonstrates our first attempt... more
My group at Georgia Tech is dedicated to creating wearable agents. By necessity, our work combines on-body perception, user modeling, and human-computer interfaces. The Web site, www.innovations.gatech.edu, demonstrates our first attempt at such an agent. The prototypes on the site predict the user's next location, perceive the user's availability, and help schedule an appointment based on a conversation with another
... Thad Starner ... Two students, Kent Lyons and Daniel Plaisted, took an interest in these questions, and we designed experiments to determine the answer using methods similar to those ScottMacKenzie reported at the User Interface... more
... Thad Starner ... Two students, Kent Lyons and Daniel Plaisted, took an interest in these questions, and we designed experiments to determine the answer using methods similar to those ScottMacKenzie reported at the User Interface Software and Technology Conference (UIST ...
Mobile phone companies sell more batteries than phones to consumers. The devices users buy generally include rechargeable batteries so that they are immediately useful. Companies try to protect their batteries with various design and... more
Mobile phone companies sell more batteries than phones to consumers. The devices users buy generally include rechargeable batteries so that they are immediately useful. Companies try to protect their batteries with various design and utility patents to keep third-party vendors from competing too heavily with their after-market sales. This protection is necessary because battery technology changes slowly-consumers receive little incentive to upgrade their batteries unless they fail or the consumer desires a larger one. Power is a difficult issue and is often overlooked in mobile computers. However, innovative opportunities abound for exploring this problem. We introduce the issue and propose some alternatives to batteries. In subsequent issues we'll address methods of being more power efficient by using resources both on the body and in the environment.
... We con-tinually change our voices depending on our emotion, stress level, social situation, environment ... a team of undergraduates who played the part of a conversational wear-able agent named Jane ... uates monitored a cell phone... more
... We con-tinually change our voices depending on our emotion, stress level, social situation, environment ... a team of undergraduates who played the part of a conversational wear-able agent named Jane ... uates monitored a cell phone line from 10 am to 10 pm; Jane would answer ...
Page 1. “Do you use that while you drive?” This question is among the most common that people ask when they first see my wearable computer with its head-up display. My standard answer is, “No, driving is a highly visual task, so a visual... more
Page 1. “Do you use that while you drive?” This question is among the most common that people ask when they first see my wearable computer with its head-up display. My standard answer is, “No, driving is a highly visual task, so a visual display causes too much con-flict. ...
ABSTRACT The article discusses how the wearable computers such as Google Glass and head-up displays (HUD) have revolutionized the way people interact. People can Google search on Glass in a wide variety of contexts, both personal and... more
ABSTRACT The article discusses how the wearable computers such as Google Glass and head-up displays (HUD) have revolutionized the way people interact. People can Google search on Glass in a wide variety of contexts, both personal and professional. Google's search displays excerpts of the most related content for each of its hits, which means that the result of the search itself often provides people with the information they need without even clicking on a link. When the time between intention and action becomes small enough, the interface becomes an extension of the self. When the time between intention and action becomes small enough, the interface becomes an extension of the self. An example is a man riding a bicycle. If a car cuts him off, the rider does not think, 'If I squeeze this lever on the handlebar, it will pivot about its axle, pulling a cable. Using a sheaf, that cable will direct the force under the bicycle and pull on a pair of calipers that will then squeeze against the sides of his back tire.
... 172–194. 2. T. Martin et al., “Denial-of-Service Attacks on Battery-Powered Mobile Computers,” Proc. 2nd IEEE Int'l Conf. Pervasive Computing and Communications, IEEE CS Press, 2004, pp. 309–318. BATTERY... more
... 172–194. 2. T. Martin et al., “Denial-of-Service Attacks on Battery-Powered Mobile Computers,” Proc. 2nd IEEE Int'l Conf. Pervasive Computing and Communications, IEEE CS Press, 2004, pp. 309–318. BATTERY EXHAUSTION: A THREAT TO MOBILITY Page 5. ...
... of Hg (mercury) (normal desired blood pres-sure is 120/80 above atmospheric pressure), a resting heart rate of 60 beats per minute, and a heart stroke volume of 70 milliliters (ml) passing through the aorta per beat ... A fast QWERTY... more
... of Hg (mercury) (normal desired blood pres-sure is 120/80 above atmospheric pressure), a resting heart rate of 60 beats per minute, and a heart stroke volume of 70 milliliters (ml) passing through the aorta per beat ... A fast QWERTY typist (90 wpm) depresses 7.5 keys per second ...
Although most classification methods benefit from the in-corporation of domain knowledge, some situations call for a single algorithm that applies to a wide range of diverse do-mains. In such cases, the techniques and biases that prove... more
Although most classification methods benefit from the in-corporation of domain knowledge, some situations call for a single algorithm that applies to a wide range of diverse do-mains. In such cases, the techniques and biases that prove useful in one domain may ...
... Author, Thad Starner, Sponsors, : The Atlanta Linux Enthusiasts (ALE) Users Group : USENIX. Publisher, USENIX Association Berkeley, CA, USA. Bibliometrics, Downloads (6 Weeks): n/a, Downloads (12 Months): n/a, Citation Count: 0. ...

And 218 more