Phenomenological Augmented Reality with the Sequential Wave Imprinting Machine (SWIM)
暂无分享,去创建一个
[1] Jean-Gabriel Ganascia,et al. The generalized sousveillance society , 2010 .
[2] Catherine Wood,et al. The pencil of nature , 2000, The Lancet.
[3] Peter Corcoran. The Internet of Things: Why now, and what's next? , 2016, IEEE Consumer Electronics Magazine.
[4] Katina Michael,et al. Sousveillance and Point of View Technologies in Law Enforcement: An Overview , 2012 .
[5] W Listwan,et al. Is anyone listening? , 1992, Wisconsin Medical Journal.
[6] Yu Yuan,et al. All Reality: Virtual, Augmented, Mixed (X), Mediated (X, Y), and Multimediated Reality , 2018, ArXiv.
[7] David Ehrenfeld,et al. Is anyone listening? , 2007 .
[8] Corey Manders. Moving surveillance techniques to sousveillance: Towards equiveillance using wearable computing , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.
[9] Steve Mann,et al. Sensory flux from the eye: Biological sensing-of-sensing (veillametrics) for 3D augmented-reality environments , 2015, 2015 IEEE Games Entertainment Media Conference (GEM).
[10] Steve Mann,et al. Wearable Computing, 3D Aug* Reality, Photographic/Videographic Gesture Sensing, and Veillance , 2015, Tangible and Embedded Interaction.
[11] Steve Mann,et al. Measuring the effect of sousveillance in increasing socially desirable behaviour , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.
[12] Dominique Quessada. De la sousveillance , 2010 .
[13] Durand R. Begault,et al. 3-D Sound for Virtual Reality and Multimedia Cambridge , 1994 .
[14] Hans G. Kaper,et al. Data sonification and sound visualization , 1999, Comput. Sci. Eng..
[15] Thurasamy Ramayah,et al. Wearable technologies: The role of usefulness and visibility in smartwatch adoption , 2016, Comput. Hum. Behav..
[16] Marc Roessler. How to find hidden cameras , 2002 .
[17] Steve Mann. Surveillance (Oversight), Sousveillance (Undersight), and Metaveillance (Seeing Sight Itself) , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[18] Steve Mann,et al. Veillance flux, vixels, veillons: An information-bearing extramissive formulation of sensing, to measure surveillance and sousveillance , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[19] Steve Mann,et al. "Sousveillance": inverse surveillance in multimedia imaging , 2004, MULTIMEDIA '04.
[20] R. Ericson,et al. The surveillant assemblage. , 2000, The British journal of sociology.
[21] Jason Nolan,et al. Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments. , 2002 .
[22] Anthony R. Florita,et al. Intelligent buildings and advanced control techniques Design and Performance of an Image Processing Occupancy Sensor , 2012 .
[23] Steve Mann. Phenomenal Augmented Reality: Advancing technology for the future of humanity. , 2015, IEEE Consumer Electronics Magazine.
[24] Dawn Freshwater,et al. Revisiting the Panopticon: professional regulation, surveillance and sousveillance. , 2015, Nursing inquiry.
[25] Steve Mann. Wavelets and "Chirplets": Time-Frequency "Perspectives" With Applications , 1992, Advances in Machine Vision.
[26] Jeffrey S. Shell,et al. Attentive user interfaces: the surveillance and sousveillance of gaze-aware objects , 2008 .
[27] Steve Mann,et al. The Sightfield: Visualizing Computer Vision, and Seeing Its Capacity to "See" , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[28] Peter Yapp. Who's Bugging You? How Are You Protecting Your Information? , 2000, Inf. Secur. Tech. Rep..
[29] D. Lyon. Surveillance Studies: An Overview , 2007 .
[30] Steve Mann. Rattletale: Phase-Coherent Telekinetic Imaging to Detect Tattletale Signs of Structural Defects or Potential Failure , 2017, 2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).
[31] Peter M. Corcoran. Third time is the charm - Why the World just might be ready for the Internet of Things this time around , 2017, ArXiv.