Redirigiendo al acceso original de articulo en 22 segundos...
ARTÍCULO
TITULO

Using Eye Tracking to Explore the Guidance and Constancy of Visual Variables in 3D Visualization

Bing Liu    
Weihua Dong and Liqiu Meng    

Resumen

No disponible

 Artículos similares

       
 
Fenli Jia, Weiming Wang, Jian Yang, Tingting Li, Guomin Song and Yeqiu Xu    
A rectangular cartogram is a kind of graphical representation that uses a rectangular area to represent the attributes of geographical objects and is widely used in the representation of statistical data such as population, economic statistics, and epide... ver más

 
Tihomir Orehovacki, Luka Bla?kovic and Matej Kurevija    
Mobile banking is nowadays a standard service provided by banks worldwide because it adds convenience for people. There is no more rushing to a bank or waiting in lines for a simple transaction that can be conducted from anywhere and at any time in the b... ver más
Revista: Future Internet

 
Na Li, Shanshan Zhang, Lei Xia and Yue Wu    
The visual quality of architectural heritage is crucial to the preservation of architectural features, enhancement of the environmental quality, and conservation of the sustainable development and adaptive use of architectural heritage. Few studies have ... ver más
Revista: Buildings

 
Dian Candra Rini Novitasari, Fatmawati Fatmawati, Rimuljo Hendradi, Hetty Rohayani, Rinda Nariswari, Arnita Arnita, Moch Irfan Hadi, Rizal Amegia Saputra and Ardhin Primadewi    
Diabetic retinopathy is the leading cause of blindness suffered by working-age adults. The increase in the population diagnosed with DR can be prevented by screening and early treatment of eye damage. This screening process can be conducted by utilizing ... ver más

 
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell    
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical... ver más
Revista: Future Internet