Tangible navigation and object manipulation in virtual environments

Wu, A., Reilly, D., Tang, A., and Mazalek, A. (2011). Tangible navigation and object manipulation in virtual environments. In TEI '11: Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, 37--44.

Acceptance: 32% - 65/203.

Abstract

In this paper, we introduce approaches to navigating and manipulating objects in a Collaborative Virtual Environment (CVE) that engage tangible objects and an interactive table interface. We also identify three design concerns that are common to physical-virtual connectivity for interaction with CVE systems. At last, we propose solutions to these issues within the context of CVEs.

Materials

PDF File (http://hcitang.org/papers/2011-tei2011-tangible-navigation.pdf)
DOI (http://doi.acm.org/10.1145/1935701.1935710)

Keywords

Tangible User Interface, TUI, HCI, Tabletop, 3D interaction, virtual world

BibTeX

@inproceedings{wu2011tangible,
  year = {2011},
  type = {conference},
  title = {Tangible navigation and object manipulation in virtual environments},
  publisher = {ACM},
  pdfurl = {http://hcitang.org/papers/2011-tei2011-tangible-navigation.pdf},
  pages = {37--44},
  location = {Funchal, Portugal},
  keywords = {Tangible User Interface, TUI, HCI, Tabletop, 3D interaction, virtual
world},
  isbn = {978-1-4503-0478-8},
  doi = {http://doi.acm.org/10.1145/1935701.1935710},
  date-modified = {2014-01-17 04:34:09 +0000},
  booktitle = {TEI '11: Proceedings of the fifth international conference on Tangible,
embedded, and embodied interaction},
  author = {Wu, Andy and Reilly, Derek and Tang, Anthony and Mazalek, Ali},
  address = {New York, NY, USA},
  acceptance = {32% - 65/203},
  abstract = {In this paper, we introduce approaches to navigating and manipulating
objects in a Collaborative Virtual Environment (CVE) that engage tangible objects
and an interactive table interface. We also identify three design concerns
that are common to physical-virtual connectivity for interaction with CVE systems.
At last, we propose solutions to these issues within the context of CVEs.},
}