Automatic UI Generation Technique for Mobile Applications on Touch-Screen based Smart Phones

نویسندگان

  • YunSik Son
  • YangSun Lee
چکیده

As touch-screen mobile phones pour into the market, demands for reusing existing mobile applications by adding a touch-screen UI are increasing. In order to service an existing application without a touch-screen UI to touch phones, an on-screen keyboard that implements a virtual keyboard on the touch screen is needed. On-screen keyboards are particularly convenient to use on small mobile phone screens because they reduce the number of keys and consequently increase the size of each. Previous on-screen keyboard generation methods generate fixed keyboard layouts that include every key defined by a system, resulting in smaller and inconvenient keys. Further, the recently studied dynamic analysis method analyzes keys used in source codes during run-time to generate on-screen keyboards optimized for applications but it generates too much overhead to control. In this study, we proposed the touch-screen UI generating technique based on content's source code by static analysis. To generate the UI automatically, we adopt the notion of key set graphs that store the UI status information of applications to identify UI states by referencing the graphs and generating optimized on-screen keyboards. This method uses effective graph data structures to effectively circumvent the overhead issues featured in the dynamic analysis method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Usability of Touch-screen and Button Cell Phones Among Elderly Users

Background and Objectives: The use of new technologies, particularly mobile phones, is drastically growing on a daily basis. The usability of mobile phones can be determined for different age groups in order to reach a balanced development plan with respect to this technology. The present study aimed to investigate and compare the usability of touch-screen and button cell phones among Iranian e...

متن کامل

Evaluation of User Interface Design and Input Methods for Applications on Mobile Touch Screen Devices

With the advent of touch screen phones, good UI design and simplified input methods for applications running on such devices are important factors that contribute to its popularity and success. The goal of this research is to evaluate different user interface designs and input methods for mobile phones with touch screen capability. In order to do this, two prototypes of a simple social networki...

متن کامل

Poster Abstract:Proximity-Triggered Speech Recognition in Mobile Cloud Computing

Speech recognition applications have become very popular and have changed our behaviors of using Smart phones. However, users still have to initiate the voice recording by touching the small icons on the screens of smart phones. This action brings users great inconvenience especially for those who are driving. To overcome this issue, we propose a proximity triggered no-touch" mechanism for smar...

متن کامل

Finger Based Technique (FBT): An Innovative System for Improved Usability for the Blind Users' Dynamic Interaction with Mobile Touch Screen Devices

prototypes, a novel interaction system for blind users, which is especially designed and developed for non-visual touch screen devices and their applications. The FBT prototypes were developed with virtual keys to be identified based on finger holding positions. Two different models namely the single digit FBT and double digit FBT were propounded. FBT technique were applied using two different ...

متن کامل

A Review on Android Authentication System Vulnerabilities

Mobile security has become a crucial aspect of mobile computing. People are maintaining their confidential and valuable information on smart phones. Most of the users and businesses use smart phones as message tools, and means of scheduling and establishing their work and private life. Smart phones contain increasing amount of exposed information to which access must be prohibited. But security...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012