22:
124:
191:
However, WIMP interfaces are not optimal for working with certain tasks or through input devices which differ from a mouse and keyboard. WIMPs are usually pixel-hungry, so given limited screen real estate they can distract attention from the task at hand. Thus, other interfaces can better encapsulate
187:
The reason WIMP interfaces have become so prevalent since their conception at Xerox PARC is that they are very good at abstracting work-spaces, documents, and their actions. Their analogous desktop metaphor to documents as paper sheets or folders makes WIMP interfaces easy to introduce to new users.
195:
Interfaces based on these considerations, now called "post-WIMP", have made their way to the general public in mobile and embedded applications. Meanwhile, software for desktop computer workstations still uses WIMP interfaces, but has started undergoing major operational changes as desktop
199:
The seminal paper for post-WIMP interfaces is "Non
Command User Interfaces" by Jakob Nielsen 1993, followed by "The Anti-Mac Interface". Updated proposals are discussed in "Post-WIMP user interfaces" by Andries van Dam. Michel Beaudouin-Lafon subsequently proposed a framework called
184:("windows, icons, menus, pointer") comprises work on user interfaces, mostly graphical user interfaces, which attempt to go beyond the paradigm of windows, icons, menus and a pointing device, i.e. WIMP interfaces.
188:
Furthermore their basic representations as rectangular regions on a 2D flat screen make them a good fit for system programmers, thus favoring the abundance of commercial widget toolkits in this style.
204:, that defines a design space for Post-WIMP interaction techniques and a set of properties for comparing them. Examples of Post-WIMP interaction include 3D interaction and reality-based interaction.
570:
196:
marketshare declines. These include the exploration of virtual 3D space, interaction techniques for window/icon sorting, focus, and embellishment.
554:
346:
302:
594:
589:
501:
461:
167:
105:
134:
43:
86:
58:
149:
39:
145:
32:
65:
564:
201:
254:
224:
72:
434:
276:
271:
249:
539:
CHI '08: Proceedings of the Twenty-Sixth Annual SIGCHI Conference on Human
Factors in Computing Systems
522:
485:
54:
534:
229:
477:
489:
481:
530:
416:
372:
328:
298:
526:
550:
497:
457:
234:
438:
542:
449:
406:
362:
318:
518:
390:
259:
218:
439:"Instrumental Interaction: An Interaction Model for Designing Post-WIMP User Interfaces"
79:
583:
213:
446:
CHI '00: Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems
420:
376:
332:
21:
350:
244:
240:
546:
306:
537:(2008). "Reality-Based Interaction: A Framework for Post-WIMP Interfaces".
453:
411:
394:
367:
323:
152:. Statements consisting only of original research should be removed.
117:
15:
448:. The Hague, The Netherlands: ACM Press. pp. 446–453.
141:
46:. Unsourced material may be challenged and removed.
192:workspaces, actions, and objects for such tasks.
8:
569:: CS1 maint: multiple names: authors list (
541:. Florence, Italy: ACM. pp. 201–210.
410:
366:
322:
293:
291:
168:Learn how and when to remove this message
106:Learn how and when to remove this message
494:3D User Interfaces: Theory and Practice
287:
562:
7:
496:. Addison–Wesley/Pearson Education.
44:adding citations to reliable sources
14:
122:
20:
31:needs additional citations for
1:
351:"Noncommand User Interfaces"
395:"POST-WIMP User Interfaces"
148:the claims made and adding
611:
595:User interface techniques
590:Graphical user interfaces
399:Communications of the ACM
355:Communications of the ACM
311:Communications of the ACM
307:"The Anti-Mac Interface"
255:Tangible user interfaces
225:Gesture-based interfaces
202:instrumental interaction
547:10.1145/1357054.1357089
405:(2). ACM Press: 63–67.
361:(4). ACM Press: 83–99.
317:(8). ACM Press: 70–82.
250:Zooming user interfaces
435:Michel Beaudouin-Lafon
277:Natural user interface
272:10-foot user interface
454:10.1145/332040.332473
412:10.1145/253671.253708
368:10.1145/255950.153582
324:10.1145/232014.232032
230:Voice user interfaces
40:improve this article
133:possibly contains
556:978-1-60558-011-1
523:Leanne Hirshfield
486:Joseph J. LaViola
437:(November 2000).
393:(February 1997).
178:
177:
170:
135:original research
116:
115:
108:
90:
602:
575:
574:
568:
560:
525:, Michael Horn,
514:
508:
507:
474:
468:
467:
443:
431:
425:
424:
414:
387:
381:
380:
370:
343:
337:
336:
326:
295:
260:Web applications
173:
166:
162:
159:
153:
150:inline citations
126:
125:
118:
111:
104:
100:
97:
91:
89:
48:
24:
16:
610:
609:
605:
604:
603:
601:
600:
599:
580:
579:
578:
565:cite conference
561:
557:
535:Jamie Zigelbaum
519:Audrey Girouard
516:
515:
511:
504:
476:
475:
471:
464:
441:
433:
432:
428:
391:Andries van Dam
389:
388:
384:
345:
344:
340:
305:(August 1996).
297:
296:
289:
285:
268:
219:Virtual reality
210:
174:
163:
157:
154:
139:
127:
123:
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
608:
606:
598:
597:
592:
582:
581:
577:
576:
555:
517:Robert Jacob,
509:
502:
478:Doug A. Bowman
469:
462:
426:
382:
349:(April 1993).
338:
286:
284:
281:
280:
279:
274:
267:
264:
263:
262:
257:
252:
247:
238:
232:
227:
222:
216:
209:
206:
180:In computing,
176:
175:
130:
128:
121:
114:
113:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
607:
596:
593:
591:
588:
587:
585:
572:
566:
558:
552:
548:
544:
540:
536:
532:
528:
524:
520:
513:
510:
505:
503:0-201-75867-9
499:
495:
491:
490:Ivan Poupyrev
487:
483:
482:Ernst Kruijff
479:
473:
470:
465:
463:1-58113-216-6
459:
455:
451:
447:
440:
436:
430:
427:
422:
418:
413:
408:
404:
400:
396:
392:
386:
383:
378:
374:
369:
364:
360:
356:
352:
348:
347:Jakob Nielsen
342:
339:
334:
330:
325:
320:
316:
312:
308:
304:
303:Jakob Nielsen
300:
294:
292:
288:
282:
278:
275:
273:
270:
269:
265:
261:
258:
256:
253:
251:
248:
246:
242:
239:
236:
233:
231:
228:
226:
223:
220:
217:
215:
214:Computer game
212:
211:
207:
205:
203:
197:
193:
189:
185:
183:
172:
169:
161:
158:December 2011
151:
147:
143:
137:
136:
131:This article
129:
120:
119:
110:
107:
99:
96:December 2011
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
538:
531:Erin Solovey
512:
493:
472:
445:
429:
402:
398:
385:
358:
354:
341:
314:
310:
198:
194:
190:
186:
181:
179:
164:
155:
132:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
299:Don Gentner
245:mobile apps
241:Smartphones
235:See-through
55:"Post-WIMP"
584:Categories
527:Orit Shaer
283:References
142:improve it
66:newspapers
182:post-WIMP
146:verifying
492:(2005).
266:See also
208:Examples
421:9947290
377:7684922
333:1503181
221:systems
140:Please
80:scholar
553:
500:
460:
419:
375:
331:
82:
75:
68:
61:
53:
442:(PDF)
417:S2CID
373:S2CID
329:S2CID
237:tools
87:JSTOR
73:books
571:link
551:ISBN
498:ISBN
458:ISBN
301:and
243:and
59:news
543:doi
450:doi
407:doi
363:doi
319:doi
144:by
42:by
586::
567:}}
563:{{
549:.
533:,
529:,
521:,
488:;
484:;
480:;
456:.
444:.
415:.
403:40
401:.
397:.
371:.
359:36
357:.
353:.
327:.
315:39
313:.
309:.
290:^
573:)
559:.
545::
506:.
466:.
452::
423:.
409::
379:.
365::
335:.
321::
171:)
165:(
160:)
156:(
138:.
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.