Pervasive Computing Lab

Exploring the Possibilities of Human-Computer Interaction

co-directed by Dr. Charles Tappert and Dr. Sung-Hyuk Cha

Pervasive HomePervasive computing goes beyond the realm of today's personal computer to ubiquitous devices that are becoming smaller and more powerful with embedded technology and connectivity. It concerns the idea that almost any device, from clothing to appliances to cars to homes and to the human body, can be imbedded with chips to connect the device to an infinite network of other devices. Pervasive computing combines current network and wireless technologies with progressively smaller computing devices, voice recognition, artificial intelligence, and Internet capability, to create an environment where the connectivity is unobtrusive and always available.

Human-computer interaction (HCI) has not really changed for several decades

  • we continue to use the highly successful graphical user interface commonly referred to as the WIMP(windows, icons, menus, pointer) interface with our personal computers

This paradigm will not meet the uses of computers in the future because

  • computers are getting smaller and more pervasive with wireless communication so the size factor makes graphical user interfaces impractical
  • the push to make computers easier to use is leading us in the direction of interacting with machines in human modalities, such as speech, handwriting, and gestures

The purpose of this laboratory is to provide the environment

  • to study and better understand the available HCI techniques and combinations of techniques
  • to study new HCI techniques for small mobile devices and for embedded devices
  • to examine how people interact with each other and with the real world in order to devise better HCI techniques
  • to explore and better understand ways to enable computers to use human communication modalities including
    - speech recognition, speech synthesis, and emerging voice technologies and applications
    - handwriting recognition, pen computing and applications
    -other pattern recognition and artificial intelligence technologies
  • to explore related security technologies including
    - biometric applications
    - individuality studies
    - spam and phishing detection and related issues
    - forensics applications
  • to explore wearable and handheld computing and their enabling technologies including
    - input: speech recognition and pen technologies
    - output: head mounted display and speech output technologies
    - communication: wireless technologies and Internet connectivity
    - virtual reality technologies
  • to help businesses understand and utilize these emerging pervasive computing technologies

Related CSIS courses and other material can be found on