Speaker: Yuen-Kuei Hsueh Mixed-Initiative Conflict Resolution for Context-aware Applications Choonsung Shin, Anind K. Dey, and Woontack Woo Proceedings.

Slides:



Advertisements
Similar presentations
Improving Learning Object Description Mechanisms to Support an Integrated Framework for Ubiquitous Learning Scenarios María Felisa Verdejo Carlos Celorrio.
Advertisements

The Enterprise Skills Story
Chapter 12 Analyzing Semistructured Decision Support Systems Systems Analysis and Design Kendall and Kendall Fifth Edition.
C ONTEXT - AWARE SIMILARITIES WITHIN THE FACTORIZATION FRAMEWORK Balázs Hidasi Domonkos Tikk C A RR WORKSHOP, 5 TH F EBRUARY 2013, R OME.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Conferences: Facilitate Change Conflict Problem Solving Negotiation.
Amit Shvarchenberg and Rafi Sayag. Based on a paper by: Robin Dhamankar, Yoonkyong Lee, AnHai Doan Department of Computer Science University of Illinois,
Context Awareness System and Service SCENE JS Lee 1 An Energy-Aware Framework for Dynamic Software Management in Mobile Computing Systems.
1 RegionKNN: A Scalable Hybrid Collaborative Filtering Algorithm for Personalized Web Service Recommendation Xi Chen, Xudong Liu, Zicheng Huang, and Hailong.
Comparing Twitter Summarization Algorithms for Multiple Post Summaries David Inouye and Jugal K. Kalita SocialCom May 10 Hyewon Lim.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
1 Draft of a Matchmaking Service Chuang liu. 2 Matchmaking Service Matchmaking Service is a service to help service providers to advertising their service.
Teaching Multimedia. Multimedia is media that uses multiple forms of information content and information processing (e.g. text, audio, graphics, animation,
Data-collection techniques. Contents Types of data Observations Event logs Questionnaires Interview.
Ranking by Odds Ratio A Probability Model Approach let be a Boolean random variable: document d is relevant to query q otherwise Consider document d as.
On Fairness, Optimizing Replica Selection in Data Grids Husni Hamad E. AL-Mistarihi and Chan Huah Yong IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
1 REQUIREMENTS ENGINEERING and SYSTEMS ANALYSIS Elements and Definitions.
Who’s Viewed You? The Impact of Feedback in a Mobile Location-Sharing Application Date : 2011/09/06 Reporter : Lin Kelly.
Chapter 5 Data mining : A Closer Look.
1 EmuPlayer Music Recommendation System Based on User Emotion Using Vital-sensor KMSF- sunny 親: namachan さん.
A Collaborative Music DJ for Ad Hoc Networks Ursula Wolz Mike Massimi Eric Tarn Department of Computer Science The College of New Jersey.
Modeling and Finding Abnormal Nodes (chapter 2) 駱宏毅 Hung-Yi Lo Social Network Mining Lab Seminar July 18, 2007.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
A Computational Framework for Multi-dimensional Context- aware Adaptation Vivian Genaro Motti LILAB – Louvain Interaction Laboratory Université catholique.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
CHAMELEON : A Hierarchical Clustering Algorithm Using Dynamic Modeling
Dineshwari Byrappa Nagraj Rashi Gupta Shreya Modi Swati Satija Magesh Panchanathan.
Sociology 3322a. “…the systematic assessment of the operation and/or outcomes of a program or policy, compared to a set of explicit or implicit standards.
Fault Diagnosis System for Wireless Sensor Networks Praharshana Perera Supervisors: Luciana Moreira Sá de Souza Christian Decker.
1 Lesson 19 Creating Formulas and Charting Data Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
DSS Modeling Current trends – Multidimensional analysis (modeling) A modeling method that involves data analysis in several dimensions – Influence diagram.
Unit 3. demonstrate the ability to use subprograms within computer programs; use a variety of problem-solving strategies to solve different types of.
Chapter 7. BEAT: the Behavior Expression Animation Toolkit
1 ENTROPY-BASED CONCEPT SHIFT DETECTION PETER VORBURGER, ABRAHAM BERNSTEIN IEEE ICDM 2006 Speaker: Li HueiJyun Advisor: Koh JiaLing Date:2007/11/6 1.
Chapter 7 Conflicts. Objectives Specific, not general Specific, not general Not overly complex Not overly complex Measurable, tangible, and verifiable.
Therese E. Ritter, MCT New Horizons Computer Learning Centers— Great Lakes A Look at Conflict and Consensus in Decision Making.
Standards for Mathematical Practice
1 Relational Databases and SQL. Learning Objectives Understand techniques to model complex accounting phenomena in an E-R diagram Develop E-R diagrams.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Support for Context-Aware Intelligibility and Control Anind K. Dey Human-Computer Interaction Institute Carnegie Mellon University, Pittsburgh
Easiest-to-Reach Neighbor Search Fatimah Aldubaisi.
CMPS 435 F08 These slides are designed to accompany Web Engineering: A Practitioner’s Approach (McGraw-Hill 2008) by Roger Pressman and David Lowe, copyright.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
Chapter 11 Statistical Techniques. Data Warehouse and Data Mining Chapter 11 2 Chapter Objectives  Understand when linear regression is an appropriate.
Computer Science 1 Mining Likely Properties of Access Control Policies via Association Rule Mining JeeHyun Hwang 1, Tao Xie 1, Vincent Hu 2 and Mine Altunay.
Course ILT Troubleshooting Unit objectives Describe methods to help prioritize network problems List basic troubleshooting steps to be followed when working.
1 Discussion of “Computer- Assisted Tools for Auditing XBRL- Related Documents” Symposium on Information Integrity & Information Systems Assurance David.
A Metrics Program. Advantages of Collecting Software Quality Metrics Objective assessments as to whether quality requirements are being met can be made.
Copyright © 2006 by Maribeth H. Price 13-1 Chapter 13 Working with Geodatabases.
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
Exploiting Contextual Information from Event Logs for Personalized Recommendation ICIS2010 Intelligent Database Systems Lab. School of Computer Science.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
An Interval Classifier for Database Mining Applications Rakes Agrawal, Sakti Ghosh, Tomasz Imielinski, Bala Iyer, Arun Swami Proceedings of the 18 th VLDB.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
Requirement Engineering with URN: Integrating Goals and Scenarios Jean-François Roy Thesis Defense February 16, 2007.
1 UNIT-3 KNOWLEDGE REPRESENTATION. 2 Agents that reason logically(Logical agents) A Knowledge based Agent The Wumpus world environment Representation,
Instance Discovery and Schema Matching With Applications to Biological Deep Web Data Integration Tantan Liu, Fan Wang, Gagan Agrawal {liut, wangfa,
The Value of USAP in Software Architecture Design Presentation by: David Grizzanti.
HighImpactSoft 2010 Organizing a Better Future. Agenda Specify Goals ScopeDefinitions Process Model Preliminary Requirements Issues and solutions TraceabilityPrototype.
WOSS 04 1 Task-based Self-adaptation David Garlan Bradley Schmerl Joao Sousa Vahe Poladian Carnegie Mellon University WOSS’04.
1 Towards Integrated Tool Support for the User Requirements Notation Jean-François Roy
Understanding Depth of Knowledge. Depth of Knowledge (DOK) Adapted from the model used by Norm Webb, University of Wisconsin, to align standards with.
Using Latent Variable Models in Survey Research Roger E. Millsap Arizona State University Contact: (480)
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Mean Shift Segmentation
‘Can’t we all just get along?’: Useful Conflict Management Skills
Mediation and Social Work Practice
Model-Driven Analysis Frameworks for Embedded Systems
Ass. Prof. Dr. Mogeeb Mosleh
Chapter 12 Analyzing Semistructured Decision Support Systems
Presentation transcript:

Speaker: Yuen-Kuei Hsueh Mixed-Initiative Conflict Resolution for Context-aware Applications Choonsung Shin, Anind K. Dey, and Woontack Woo Proceedings of the 10th international conference on Ubiquitous computing (UbiComp2008), Seoul, Korea, September 21-24, 2008, pp Choonsung Shin Anind K. Dey Woontack Woo

July 29, Resource conflict ? ? I want to see HBO I want to see ESPN MaryTom

July 29, Resource conflict 25  C Cold Cool Cold

July 29, Resource conflict 25  C 28  C 24  C 23  C 25  C 27  C

July 29, Outline Introduction Mixed-initiative conflict resolution Conflict Resolution Approach Determination Tree Conflict Resolution Evaluation Conclusions

July 29, Introduction Systems which resolve resource conflicts automatically will –eliminate the users’ ability to perform this conflict resolution by themselves However, the users actually prefer to do by themselves in certain situations

July 29, Introduction Many technologies address resource conflicts between multiple users But, most of them are unlikely to produce the best solution for their users due to –the existence of multiple solutions –the dynamicity of users’ desires and context Mediation techniques give users useful information to support them in resolving conflict to overcome those problems

July 29, Introduction Mediation techniques require users to be active participants in conflict resolution ? Automatic resolutionMediated resolution Which one is better?

July 29, Mixed-initiative conflict resolution This approach exploits –users’ priorities –the types of context attributes (Symbolic and Numeric) –users’ preferences This resolution framework consists of three components –Conflict detection –Determination of resolution approach –Conflict resolution

July 29, Mixed-initiative conflict resolution Conflict detection –Gather users’ contexts –Detect conflicts Determination of resolution approach –determines whether a detected conflict should be resolved automatically by asking for users’ opinions Conflict resolution –resolves the conflict with the specified approach

Mixed-initiative conflict resolution

Conflict Resolution Approach Determination Tree

July 29, Conflict Resolution Approach Determination Tree Symbolic attribute type (e.g. the title of song) –degrees of deviation between users’ preference is used to determine an appropriate resolution approach –might have no easily reachable solution –may have multiple solutions

July 29, Conflict Resolution Approach Determination Tree For selecting an appropriate resolution approach –deviations between each user’s and group’s best items are used The user’s best item is –the item with the highest preference The group’s best item is –the item preferred by a majority of all users

Conflict Resolution Approach Determination Tree The deviation between a user’s and group’s best items is given by following equation: ▲ UP(u, v) be a function which maps a symbolic item v belonging to a user u to a preference value, an integer value ranging form -5 to +5

Conflict Resolution Approach Determination Tree User 1-k User 1 A A B B C C D D UserItem 1 ABCD Preference value 52-34

Conflict Resolution Approach Determination Tree A A B B C C D D GroupItem UserItem 1 ABCD Preference value (assumption)

Conflict Resolution Approach Determination Tree Based on the deviation, the resolution approach for –resolving a conflict between users is determined as follows: ▲ N user is the number of users ▲ d is the deviation threshold

July 29, Conflict Resolution Example - TV application –Select an appropriate program –3 users with the same priority –4 potential programs (a-d, or e-h)

July 29, Conflict Resolution However, when resolving conflict, –more than one solution may exist depending on the underlying algorithm used, e.g., Average Multiplication of preferences Minimizing user misery

Conflict Resolution =6(4+5)*(3+5)*(3+5)=576

July 29, Evaluation Projected –(a) TV –(b) temperature control applications and the –(c) music player application projected in a coffee shop setting.

July 29, Evaluation Experimental setup

Evaluation (Satisfaction with Conflict Resolution Approach) The graphs compare satisfaction with resolution approaches involving users –(a) with slightly different preferences –(b) with very different preferences

July 29, Evaluation participants describe their feelings about the automatic and mediated approach along 5 dimensions: –understanding of resolution approach (U), –control over applications (C) –how well the process reflects preferences (P) –agreement with the selection (A) –how close the result was to their preferred selection (B)

Evaluation (automatic) Features for scenarios with slightly different preference for (a) TV application (b) Temperature control Application (c) Music player application.

Evaluation (mediated) Features for very different preference scenarios (a) TV application (b) Temperature control Application (c) Music player application.

Evaluation (Effect of Preference Deviation) Relationship between satisfaction and preference deviation for the automatic resolution approach

July 29, Conclusions This research shows an interesting result that currently users would like to make decisions by themselves