{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:23:47Z","timestamp":1776119027077,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1145\/3379337.3415827","type":"proceedings-article","created":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T19:01:43Z","timestamp":1602874903000},"page":"182-195","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["TransceiVR"],"prefix":"10.1145","author":[{"given":"Balasaravanan","family":"Thoravi Kumaravel","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Cuong","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Adobe Research, San Francisco, CA, USA"}]},{"given":"Stephen","family":"DiVerdi","sequence":"additional","affiliation":[{"name":"Adobe Research, San Francisco, CA, USA"}]},{"given":"Bjoern","family":"Hartmann","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2016. Black Hat Cooperative Game. (2016). https:\/\/www.teamfuturegames.com\/  2016. Black Hat Cooperative Game. (2016). https:\/\/www.teamfuturegames.com\/"},{"key":"e_1_3_2_2_2_1","unstructured":"2017. Eye in the Sky - VinLia Games. (2017). https:\/\/www.vinliagames.com\/  2017. Eye in the Sky - VinLia Games. (2017). https:\/\/www.vinliagames.com\/"},{"key":"e_1_3_2_2_3_1","volume-title":"https:\/\/www.evocatgames.com\/nemesis-perspective\/","author":"Perspective Nemesis","year":"2017"},{"key":"e_1_3_2_2_4_1","unstructured":"2019. Blocks by Google. (2019). https:\/\/vr.google.com\/blocks\/  2019. Blocks by Google. (2019). https:\/\/vr.google.com\/blocks\/"},{"key":"e_1_3_2_2_5_1","unstructured":"2019. Bots with Blocks Challenge. (2019). https:\/\/medium.com\/@JarlanPerez\/bots-with-blocks-challenge-50f3e1dde810  2019. Bots with Blocks Challenge. (2019). https:\/\/medium.com\/@JarlanPerez\/bots-with-blocks-challenge-50f3e1dde810"},{"key":"e_1_3_2_2_6_1","unstructured":"2019. Oculus Asymmetric Field of View. (2019). https:\/\/developer.oculus.com\/documentation\/quest\/latest\/concepts\/unity-asymmetric-fov-faq\/  2019. Oculus Asymmetric Field of View. (2019). https:\/\/developer.oculus.com\/documentation\/quest\/latest\/concepts\/unity-asymmetric-fov-faq\/"},{"key":"e_1_3_2_2_7_1","unstructured":"2019. OpenCV Brox Optical Flow. (2019). https:\/\/docs.opencv.org\/3.4.2\/d7\/d18\/classcv_1_1cuda_1_1BroxOpticalFlow.html  2019. OpenCV Brox Optical Flow. (2019). https:\/\/docs.opencv.org\/3.4.2\/d7\/d18\/classcv_1_1cuda_1_1BroxOpticalFlow.html"},{"key":"e_1_3_2_2_8_1","unstructured":"2019. Panoptic Asymmetrical VR game. (2019). http:\/\/panopticgame.com\/  2019. Panoptic Asymmetrical VR game. (2019). http:\/\/panopticgame.com\/"},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/quill.fb.com\/","year":"2020"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900354.1900423"},{"key":"e_1_3_2_2_11_1","volume-title":"Hum.-Comp. Int.","author":"Alem Leila","year":"2011"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173759"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025474"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","volume-title":"Spatial Augmented Reality: Merging Real and Virtual Worlds","author":"Bimber Oliver","DOI":"10.1201\/b10624"},{"key":"e_1_3_2_2_15_1","volume-title":"SUS-A quick and dirty usability scale. Usability evaluation in industry 189, 194","author":"Brooke John","year":"1996"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24673-2_3"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031612"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01409793"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025573"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753554"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology (UIST '11)","author":"Eagan James R.","year":"2047"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/320719.322580"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3305367.3335040"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '03)","author":"Fussell Susan R."},{"key":"e_1_3_2_2_25_1","unstructured":"noopsortGoogle. 2019. TiltBrush. (2019). http:\/\/www.tiltbrush.com\/ Visited 19-Sep-2019.  noopsortGoogle. 2019. TiltBrush. (2019). http:\/\/www.tiltbrush.com\/ Visited 19-Sep-2019."},{"key":"e_1_3_2_2_26_1","volume-title":"Challenges Using Head-Mounted Displays in Shared and Social Spaces. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). ACM","author":"Gugenheimer Jan","year":"2019"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025683"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173628"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207763"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557048"},{"key":"e_1_3_2_2_31_1","unstructured":"Chad Harms and Frank Biocca. 2004. Internal consistency and reliability of the networked minds measure of social presence. (2004).  Chad Harms and Frank Biocca. 2004. Internal consistency and reliability of the networked minds measure of social presence. (2004)."},{"key":"e_1_3_2_2_32_1","volume-title":"Advances in psychology.","author":"Hart Sandra G"},{"key":"e_1_3_2_2_33_1","volume-title":"Multiple View Geometry in Computer Vision (2 ed.)","author":"Hartley Richard"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19)","author":"Hartmann Jeremy"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542284.2542294"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292147.3292177"},{"key":"e_1_3_2_2_37_1","volume-title":"Direct manipulation interfaces. Human-computer interaction 1, 4","author":"Hutchins Edwin L","year":"1985"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/964696.964714"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2582051.2582097"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124951"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281505.3281542"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/142750.142980"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025708"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173815"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.55672"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-015-9230-9"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126659"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807497"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324892.1324911"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2713168.2713195"},{"key":"e_1_3_2_2_51_1","volume-title":"Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology (UIST '11)","author":"Pongnumkul Suporn","year":"2047"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047247"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/238218.238281"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465958.2465971"},{"key":"e_1_3_2_2_55_1","volume-title":"Munro","author":"Snowdon David N.","year":"2001"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207702"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229091"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300243"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300431"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347872"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300514"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322334"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242597"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622213"},{"key":"e_1_3_2_2_65_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19)","author":"Zhao Yuhang"}],"event":{"name":"UIST '20: The 33rd Annual ACM Symposium on User Interface Software and Technology","location":"Virtual Event USA","acronym":"UIST '20","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379337.3415827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379337.3415827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:06Z","timestamp":1750203906000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379337.3415827"}},"subtitle":["Bridging Asymmetrical Communication Between VR Users and External Collaborators"],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":65,"alternative-id":["10.1145\/3379337.3415827","10.1145\/3379337"],"URL":"https:\/\/doi.org\/10.1145\/3379337.3415827","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]},"assertion":[{"value":"2020-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}