display configuration
Recently Published Documents


TOTAL DOCUMENTS

23
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

2018 ◽  
Vol 2018 (1) ◽  
Author(s):  
Bernhard Schlagbauer ◽  
Manuel Rausch ◽  
Michael Zehetleitner ◽  
Hermann J Müller ◽  
Thomas Geyer

Author(s):  
Colin Ware ◽  
Roland Arsenault

Objective: The objective was to evaluate the use of a spatially aware handheld chart display in a comparison with a track-up fixed display configuration and to investigate how cognitive strategies vary when performing the task of matching chart symbols with environmental features under different display geometries and task constraints. Background: Small-screen devices containing both accelerometers and magnetometers support the development of spatially aware handheld maps. These can be designed so that symbols representing targets in the external world appear in a perspective view determined by the orientation of the device. Method: A panoramic display was used to simulate a marine environment. The task involved matching targets in the scene to symbols on simulated chart displays. In Experiment 1, a spatially aware handheld chart display was compared to a fixed track-up chart display. In Experiment 2, a gaze monitoring system was added and the distance between the chart display and the scene viewpoint was varied. Results: All respondents were faster with the handheld device. Novices were much more accurate with the handheld device. People allocated their gaze very differently if they had to move between a map display and a view of the environment. Conclusion: There may be important benefits to spatially aware handheld displays in reducing errors relating to common navigation tasks. Application: Both the difficulty of spatial transformations and the allocation of attention should be considered in the design of chart displays.


Author(s):  
S Maj

The Internet is an integral part of business communications, however it was based on open standards without due regard to security issues consequently security threats are not only persistent but also increasing. The Computer Security Institute (CSI) 2007 reported a doubling of average annual loss by US companies. There are three primary network security threats: policy, technology, and configuration. This chapter is primarily concerned with the configuration and management of network devices. There are a number of different network management tools currently available, however typically it is problematic to concurrently display configuration data from devices and protocols whilst maintaining a navigational context. This chapter demonstrates how the State Model Diagram method is not only a universal model-driven network tool but also useful for the configuration and management of complex security protocols and devices.


Author(s):  
Mary Hegarty ◽  
Harvey S. Smallman ◽  
Andrew T. Stull ◽  
Matt S. Canham

Sign in / Sign up

Export Citation Format

Share Document