skip to main content
10.1145/2702123.2702375acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Investigating Visual Feedforward for Target Expansion Techniques

Published:18 April 2015Publication History

ABSTRACT

Target expansion techniques facilitate the pointing task by enlarging the effective sizes of targets. When the target expansion is applied to both the motor and visual spaces, the visual feedforward mechanism is key: Indeed it provides a visual aid to the user on the effective expanded targets prior to the execution or completion of the pointing task, enabling the user to take full advantage of the target expansion technique. Focusing on feedforward mechanisms, we introduce a design space that allows us to describe, classify and design target expansion techniques. To do so we first introduce and characterize the concept of atomic feedforward mechanism along three design axes. We then describe a target expansion technique as a combination of atomic feedforward mechanisms using a matrix-based notation. We provide an analytical exploration of the design space by classifying existing techniques and by designing six new techniques. We also provide a first experimental exploration of the design space in the context of distant pointing. The experimental protocol includes an innovative target layout for handling non-centroidal target expansion. The results show that feedforward dynamicity increases movement time and decreases subjective usability, while explicit expansion observability efficiently supports error prevention for distant pointing.

References

  1. Bateman, S., Mandryk, R. L., Gutwin, C. and Xiao, R. Analysis and comparison of target assistance techniques for relative ray-cast pointing. IJHCS 71, 5 (2013), 511--532. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bau, O. and Mackay, W. OctoPocus: a dynamic guide for learning gesture-based command sets. In Proc. UIST 2008, (2008), 37--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baudisch, P., Zotov, A., Cutrell, E. and Hinckley, K. Starburst: a target expansion algorithm for non-uniform target distributions. In Proc. AVI 2008, (2008), 129--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Blanch, R. and Ortega, M. Benchmarking pointing techniques with distractors: adding a density factor to Fitts' pointing paradigm. In Proc. CHI 2011, (2011), 1629--1638. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Brooke, J. SUS: A Quick and Dirty Usability Scale. Usability Evaluation in Industry (1996), 189--194.Google ScholarGoogle Scholar
  6. Chapuis, O., Labrune, J. and Pietriga, E. DynaSpot: speed-dependent area cursor. In Proc. CHI 2009, (2009), 1391--1400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Du, Q., Faber, V. and Gunzburger, M. Centroidal Voronoi tessellations: Applications and algorithms. SIAM Review 41, 4 (1999), 637--676. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Grossman, T. and Balakrishnan, R. The bubble cursor: enhancing target acquisition by dynamic resizing of the cursor's activation area. In Proc. CHI 2005, (2005), 281--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Grossman, T., Kong, N. and Balakrishnan, R. Modeling pointing at targets of arbitrary shapes. In Proc. CHI 2007, (2007), 463--472. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Guillon, M., Leitner, F. and Nigay, L. Static Voronoi-Based Target Expansion Technique for Distant Pointing. In Proc. AVI 2014, (2014), 41--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kuwabara, C., Yamamoto, K., Kuramoto, I., Tsujino, Y. and Minakuchi, M. Ghost-hunting: a cursor-based pointing technique with picture guide indication of the shortest path. In Proc. IUI 2013, (2013), 85--86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Laukkanen, J., Isokoski, P. and Räihä, K. The cone and the lazy bubble: two efficient alternatives between the point cursor and the bubble cursor. In Proc. CHI 2008, (2008), 309--312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. McGuffin, M. and Balakrishnan, R. Fitts' law and expanding targets: Experimental studies and designs for user interfaces. ACM TOCHI 12, 4 (2005), 388--422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Meyer, D. E., Abrams, R. A., Kornblum, S., Wright, C. E. and Smith, J. E. Optimality in human motor performance: ideal control of rapid aimed movements. Psychological Review 95, 3 (1988), 340--70.Google ScholarGoogle ScholarCross RefCross Ref
  15. Mott, M. and Wobbrock, J. Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets. In Proc. CHI 2014, (2014), 733--742. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Su, X., Au, O. and Lau, R. The Implicit Fan Cursor: A Velocity Dependent Area Cursor. In Proc. CHI 2014, (2014), 753--762. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Tse, E., Hancock, M. and Greenberg, S. Speech-filtered bubble ray: improving target acquisition on display walls. In Proc. ICMI 2007, (2007), 307--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vanacken, L., Grossman, T. and Coninx, K. Multimodal selection techniques for dense and occluded 3D virtual environments. IJHCS 67, 3 (2009), 237--255. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Vermeulen, J., Luyten, K., Van den Hoven, E. and Coninx, K. Crossing the bridge over Norman's gulf of execution: revealing feedforward's true identity. In Proc. CHI 2013, (2013), 1931--1940. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Zhai, S., Conversy, S., Beaudouin-Lafon, M. and Guiard, Y. Human on-line response to target expansion. In Proc. CHI 2003, (2003), 177--184. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Investigating Visual Feedforward for Target Expansion Techniques

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
      April 2015
      4290 pages
      ISBN:9781450331456
      DOI:10.1145/2702123

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 April 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader