(1 - 5 of 5)
document
Belpaeme, T. (author), Baxter, P. (author), de Greeff, J. (author), Kennedy, J. (author), Read, R. (author), Looije, R. (author), Neerincx, M. (author), Baroni, I. (author), Coti Zelati, M. (author)
Child-Robot Interaction (cHRI) is a promising point of entry into the rich challenge that social HRI is. Starting from three years of experiences gained in a cHRI research project, this paper offers a view on the opportunities offered by letting robots interact with children rather than with adults and having the interaction in real-world...
conference paper 2013
document
de Greeff, J. (author), Janssen, J.B. (author), Looije, R. (author), Mioch, T. (author), Alpay, L. (author), Neerincx, M.A. (author), Baxter, P. (author), Belpaeme, T. (author)
A case study is presented in which a socially capable robot played multiple activities during multiple sessions with hospitalised children. In this paper we show how an environment was created in which children engage with the robot and feel at liberty to express their preferences regarding which activities to play. Valuable lessons regarding...
conference paper 2013
document
Smets, N.J.J.M. (author), Neerincx, M.A. (author), Looije, R. (author)
conference paper 2012
document
Ros, R. (author), Nalin, M. (author), Wood, R. (author), Baxter, P. (author), Looije, R. (author), Demiris, Y. (author), Belpaeme, T. (author), Giusti, A. (author), Pozzi, C. (author)
We present insights gleaned from a series of child-robot interaction experiments carried out in a hospital paediatric department. Our aim here is to share good practice in experimental design and lessons learned about the implementation of systems for social HRI with child users towards application in "the wild", rather than in tightly...
conference paper 2011
document
Mioch, T. (author), Looije, R. (author), Neerincx, M.A. (author), TNO Defensie en Veiligheid (author)
This paper presents the development of a cognitive model of cognitive lockup: the tendency of humans to deal with disturbances sequentially, possibly overseeing crucial data from unattended resources so that serious task failures can appear—e.g., in a cockpit or control centre. The proposed model should support the design and evaluation of user...
conference paper 2010
(1 - 5 of 5)