Towards Computational Identification of Visual Attention on Interactive Tabletops
Abstract
Supplementary Material
References
Index Terms
- Towards Computational Identification of Visual Attention on Interactive Tabletops
Recommendations
Video game design using an eye-movement-dependent model of visual attention
Eye movements can be used to infer the allocation of covert attention. In this article, we propose to model the allocation of attention in a task-dependent manner based on different eye movement conditions, specifically fixation and pursuit. We show ...
Human Visual Scanpath Prediction Based on RGB-D Saliency
ICIGP '18: Proceedings of the 2018 International Conference on Image and Graphics ProcessingHuman visual perception is considered as a dynamic process of information acquisition, while the visual scanpath can clearly reflect the shift of our eye fixations. In the previous study of visual attention, researchers generally do the saliency ...
How Shared Visual Attention Patterns of Pairs Unfold Over Time when Workload Changes
ETRA '20 Short Papers: ACM Symposium on Eye Tracking Research and ApplicationsData rich environments rely on operator collaboration to manage workload changes. This work explores the relationship between operators’ visual attention and collaborative performance during these workload changes. Percent gaze overlap and percent ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Joaquim Jorge,
- Alfredo Ferreira,
- Program Chairs:
- Nicolai Marquardt,
- Fanny Chevalier
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigchi
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 86Total Downloads
- Downloads (Last 12 months)10
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in