Human Assisted Cognitive Modelling

Slides:



Advertisements
Similar presentations
Joshua Sunshine. Defining Ubiquitous Computing Unique Privacy Problems Examples Exercise 1: Privacy Solution Privacy Tradeoffs Professional Solutions.
Advertisements

Chapter 12 cognitive models.
Empirical and Data-Driven Models of Multimodality Advanced Methods for Multimodal Communication Computational Models of Multimodality Adequate.
Urban Encounters: The game of real life Eamonn O’Neill University of Bath Department of Computer Science Vassilis Kostakos University of Madeira / Carnegie.
Evaluation Types GOMS and KLM
1 CS 544 Human Abilities Human Motor Capabilities Acknowledgement: Some of the material in these lectures is based on material prepared for similar courses.
TAUCHI – Tampere Unit for Computer-Human Interaction Manual Text Entry: Experiments, Models, and Systems Poika Isokoski Tampere Unit for Computer-Human.
Queen Mary, University of London
An Exploratory Study of Visual Information Analysis Petra Isenberg Dept. of Computer Science University of Calgary Calgary, AB, Canada
People: Donald Norman UCSD (Cognitive Science and Psychology); Apple Computer; Northwestern University … Application of cognitive science to computers.
Some questions of hypermedia and CHI Josep Blat Universitat Pompeu Fabra.
Research Methods for HCI: Cognitive Modelling BCS HCI Tutorial 1 st September, 2008.
INTRODUCTION. Concepts HCI, CHI Usability User-centered Design (UCD) An approach to design (software, Web, other) that involves the user Interaction Design.
Bootstrapping pronunciation models: a South African case study Presented at the CSIR Research and Innovation Conference Marelie Davel & Etienne Barnard.
Usability Evaluation of Digital Libraries Stacey Greenaway Submitted to University of Wolverhampton module Dec 15 th 2006.
David Garlan Ivan Ruchkin Carnegie Mellon University Pittsburgh, PA, USA December 2014.
What is HCI? IMD07101: Introduction to Human Computer Interaction Brian Davison 2011/12.
1. Human – the end-user of a program – the others in the organization Computer – the machine the program runs on – often split between clients & servers.
1 CS6380 Topics in Information Systems I Current Research in Human Computer Interaction in the Information Systems area Lecturer: Chan Hock Chuan
Biometric User Authentication on Mobile Devices through Gameplay REU fellow: Kirsten Giesbrecht 1, Faculty mentor: Dr. Jonathan Voris 2 Affiliation: 1.Centre.
Human Computer Interaction CS/ CM 348 Fall 2010 Class Camille Riviere.
Slides based on those by Paul Cairns, York ( users.cs.york.ac.uk/~pcairns/) + ID3 book slides + slides from: courses.ischool.berkeley.edu/i213/s08/lectures/i ppthttp://www-
The future of collaborative working. In 20 years how would analysts collaborate to report on a major global event as it happens? What kind of technologies.
Interaction with Surfaces. Aims Last week focused on looking at interaction with keyboard and mouse This week ◦ Surface Interaction ◦ Gestures.
VERIFICATION OF ASPECT ORIENTED MODELS BY DON MARTIN JAYASHREE VENKIPURAM PATHANGI PIYUSH SRIVASTAVA REFERENCES F. Mostefaoui and J. Vachon,” Design level.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Overview of the rest of the semester Building on Assignment 1 Using iterative prototyping.
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
{ Building Blocks Scientific foundations for Interface Design HCI Remixed “Chapter 47: A Most Fitting Law” Presented by Sarah Deighan.
Overview of the rest of the semester Iteratively design interface to help people log their food intake over the long term.
Children: Can they inspect it? Yes they can! Gavin Sim.
VERIFICATION OF ASPECT-ORIENTED MODELS Review of Aspect-Oriented Definitions aspect – crosscutting concern that may involve multiple classes pointcut –
CSCI 6231 – Final Lecture Additional Resources and Topics.
Cognitive Modeling 1 Predicting thougts and actions
Aeronautics / EDS / SDS Volvo Technology Fall IFAB 2013 WP5: Work package presentation University of Skövde 20 Nov 2013.
Profile Dr Alice Good (MSc, BSC, PGCE, FHEA) Senior Lecturer Human Computer Interaction (SoC) Research Interests Supporting mental health and wellbeing.
Computing for Social Needs Jennifer Mankoff UC Berkeley.
© Simeon Keates 2009 Usability with Project Lecture 14 – 30/10/09 Dr. Simeon Keates.
The Psychology of Human-Computer Interaction
Presented By Sean Liu 2007/1120.  Ph.D. in Computer and Information Science, University of Pennsylvania, 1981  Arizona State University, Assistant Professor,
Evaluation Using Modeling. Testing Methods Same as Formative Surveys/questionnaires Interviews Observation Documentation Automatic data recording/tracking.
Cognitive Models Lecture # March, 2008Human Computer Intercation Spring 2008, Lecture #10 2 Agenda Cognitive models –KLM –GOMS –Fitt’s Law –Applications.
Su-ting, Chuang 1. Outline Introduction Related work Hardware configuration Detection system Optimal parameter estimation framework Conclusion 2.
User Interfaces 4 BTECH: IT WIKI PAGE:
Introduction to HCI Lecture #1.
Matthew McDonald Supervisors: Bruce H. Thomas & Ross T. Smith.
From context sensitivity to intelligent user interfaces Requirements for learning agents Jarmo Korhonen
Visualizing Individuals and their Social Interactions Hoang Dang.
CEN3722 Human Computer Interaction Overview of HCI Dr. Ron Eaglin.
HCC 831 User Interface Design and Evaluation. What is Usability?
Bob Wray, Charles Newton, Victor Hung, Norb Timpko 7 Jun 2017
Human Computer Interaction
University of Texas Mobile Library Search Application Architecture
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
Impacts of workload on trust in imperfect automated systems
Summarized by Chaky For more details, please read, Really good book.
Gaurav Dubey & Frank Ritter
Cognitive Modeling for HCI
Chapter 12: Automated data collection methods
CS 522: Human-Computer Interaction Usability and HCI Topics
Identifying Confusion from Eye-Tracking Data
CS 522: Human-Computer Interaction Lab: Formative Evaluation
GOMS as a Simulation of Cognition
GOMS as a Simulation of Cognition
Fundamentals of Human Computer Interaction (HCI)
User Interface Design and Evaluation
Model based design Cognitive (user) models
Model based design keystroke level model
Chapter 12 cognitive models.
COMPONENTS OF PROBLEM SOLVING
Presentation transcript:

Human Assisted Cognitive Modelling Haiyue Yuan, Shujun Li Deparment of Computer Science, Surrey Centre for Cyber Security, University of Surrey, UK Patrice Rusconi School of Psychology, University of Surrey, UK Hybrid Human-Machine Computing HHMC 2017 20/21 Sep

Research Background Cognitive modelling Emulate human behaviour (perceptual, cognitive, motor process) Predict user performance and evaluate UI GOMS (Goals, Operators, Methods, and Selection) rules, KLM (Keystroke-Level Model), CPM-GOMS, etc. Cognitive modelling software (CogTool, SANLab-CM, Cogulator etc.) Facilitate the design and modelling process Still needs a fair amount of manual work Difficult to model a system with complicated UI and user interaction

CogTool+ Based on the open source software CogTool developed at Carnegie-Mellon University (semi-)automated modelling and simulations of human cognitive tasks Keep humans as a source of additional data External Human-Generated Data Eye tracking data ACT-R parameters Simulation parameters

Case study 1 Human generated eye tracking data assisted cognitive modelling Cognitive modelling an user authentication system ‘Undercover[1]’ Lab-based eye-tracking user study[2]. Reproduce some human behavioural patterns [1]H.Sasamoto, N.Christin, and E.Hayashi. 2008. “Undercover: authentication usable in front of prying eyes.”, In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '08). ACM, New York, NY, USA, 183-192 [2] H.Yuan, S.Li, P.Rusconi and N.Aljaffan, 2017, “When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems,” in Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, part of HCI International HCII 2017, Vancouver, BC, Canada, Proceedings, Lecture Notes in Computer Science, vol. 10292, pp. 251-264, 2017, Springer

Case study 2 Predictive model of human movement Fitts’ law parameter to tailor simulation process Predictive model of human movement Parameter a and b are empirically determined Different user group (young, old, skilled, novice etc) Add-on software module for tapping/pointing game to gather data

Conclusion Keep human in the loop is important Finalise and share the CogTool+ software How AI can be part of the human-assisted cognitive modelling process? Acknowledgments COMMANDO-HUMANS COMputational Modelling and Automatic Nonintrusive Detection Of HUMan behAviour based iNSecurity www.commando-humans.net Funders: Project Members: 6

Thank you Any questions ? 7