Computerworld - Increased computing power doesn't just make for better graphics; it opens up new ways to interact with computers. Take, for example, the EyePoint system developed by Stanford University doctoral researcher Manu Kumar.
EyePoint uses a four-step process that incorporates a user's hands and eyes to increase accuracy and eliminate the false positives that come from using eye movements alone. Plus, the technique brings a more natural way of interaction to a broader band of users.
"Using gaze-based interaction techniques makes the system appear to be more intelligent and intuitive to use," says Kumar. "Several users have reported that it often felt like the system was reading their mind."
Makes eye-gaze a viable alternative to the mouse for everyday pointing and selection tasks, like Web surfing.
Here's how it works: While looking at a screen, the user presses a hot key on the keyboard, magnifying the area being viewed. The user then looks at the link within the enlarged area and releases the hot key, thereby activating the link.
Eye tracking, which has been around for decades, typically uses infrared devices embedded into a headset or a monitor frame. The devices track the centers of the user's pupils and then calculate which part of the screen the user is viewing.
This method, however, has been plagued by errors, limiting its use primarily to people with disabilities that prevent using a keyboard and mouse.
Eye trackers are accurate to about 1 degree of visual angle. When looking at a 1,280-by-1,024-pixel, 96-dpi screen at a distance of 20 inches, this equates to a 33-pixel spread in any direction from where the user is looking. That's not accurate enough to pinpoint a link.
"What is really exciting is that the processing power of today's computers is completely changing the kinds of things we can use for computer interfaces," says Ted Selker, associate professor at the MIT Media and Arts Technology Laboratory and director of the Context Aware Computing Lab. "Things like eye tracking are using channels of communication that literally were unavailable to interface designers even five years ago."
"[Kumar's] approach -- using eye movement in a subtle, lightweight way, rather than as a direct mouse substitute -- is exactly the right way to go," says Robert Jacob, a professor of computer science at Tufts University in Medford, Mass.
Selker says eye tracking might become a standard computer interface within the next five years. For now, the primary obstacle is the high cost of eye-tracking hardware, although mass adoption of the technology would drive those costs down.
Next cutting-edge technology >
Read more about Applications in Computerworld's Applications Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more