3. User Study Simulate an average research work- day activity of reading a research paper while listening to music and being interrupted with conversations.

Slides:



Advertisements
Similar presentations
N(T) Music Syllabus Implementation Workshop. Objectives of Workshop Interpret the GCE N(T) Music syllabus Plan the N(T) Music course Teach the N(T) Music.
Advertisements

Cognitive Walkthrough More evaluation without users.
English Non-fiction Foundation exam paper What you’ll be asked to do.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Arjmand Samuel Microsoft Research Muhammad Shahzad.
1 Learning User Interaction Models for Predicting Web Search Result Preferences Eugene Agichtein Eric Brill Susan Dumais Robert Ragno Microsoft Research.
Queen Mary, University of London
The C++ Tracing Tutor: Visualizing Computer Program Behavior for Beginning Programming Courses Rika Yoshii Alastair Milne Computer Science Department California.
Software Engineering I Object-Oriented Design
V-FIRE: Virtual Fire In Realistic Environments Michael Penick ◦ Grant Kelly ◦ Juan Quiroz with Dr. Fred Harris, Dr. Sergiu Dascalu, and Brian Westphal.
User Interface Design Users should not have to adapt to a piece of software; the software should be designed to fit the user.
Ambient Displays of User Mood Tony Morelli Department of Computer Science, University of Nevada, Reno Abstract: Determining a user’s mood can be a very.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 16 Slide 1 User interface design.
Design, goal of design, design process in SE context, Process of design – Quality guidelines and attributes Evolution of software design process – Procedural,
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Knowledge Science & Engineering Institute, Beijing Normal University, Analyzing Transcripts of Online Asynchronous.
Losing the Lake: Development and Deployment of an Educational Game Joseph M. Vesco, Katie Gilgen, Anne Paine, Marissa Owens, E. Michael Nussbaum, Gale.
January 13, 2012 Oscar Lin Steve Leung School of Computing and Information Systems Faculty of Science and Technology Athabasca University, Canada.
Reflective practice Session 4 – Working together.
Chapter 7 Requirement Modeling : Flow, Behaviour, Patterns And WebApps.
HARDWARE & SOFTWARE.
ITEd The Role of Complex Software in Cognitive Skill Development Nhlanganiso Biyela, Thato Foko and Alan Amory Centre for IT in Higher Education, University.
1 Shengdong Zhao Department of Computer Science University of Toronto July 9, 2008 earPod: Efficient, Hierarchical, Eyes-free Menu Selection.
Social Computing Networks: A New Paradigm for Engineering Pervasive Software Systems Naeem Esfahani Sam Malek 32th International Conference on Software.
Sociometers: Measuring Group Dynamics
Evaluation of Adaptive Web Sites 3954 Doctoral Seminar 1 Evaluation of Adaptive Web Sites Elizabeth LaRue by.
Psychology: memory. Overview An understanding of human memory is critical to an appreciation of how users will store and use relevant information when.
Introduction CS 3358 Data Structures. What is Computer Science? Computer Science is the study of algorithms, including their  Formal and mathematical.
Vikramaditya Jakkula Washington State University IEEE Workshop of Data Mining in Medicine 2007 (DMMed '07) In conjunction with IEEE.
RecSys 2011 Review Qi Zhao Outline Overview Sessions – Algorithms – Recommenders and the Social Web – Multi-dimensional Recommendation, Context-
3461P Crash Course Lesson on Usability Testing The extreme, extreme basics...
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
Behavior Analysis of Low-literate Users of a Viral Speech-based Telephone Service Haohan Wang, Agha Ali Raza, Yibin Lin, Roni Rosenfeld Language Technologies.
Introduction CS 3358 Data Structures. What is Computer Science? Computer Science is the study of algorithms, including their  Formal and mathematical.
Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games (P2P-NVE 2007 workshop) Jehn-Ruey Jiang and Hung-Shiang Chen Presenter: Shun-Yun.
Amir Mirza. Human Centered Interaction Design & Problem Definition.
Dr. Engr. Sami ur Rahman Assistant Professor Department of Computer Science University of Malakand Research Methods in Computer Science Lecture: Data Generation.
Semi-automated Coaching for Elderly Collaborative effort between UCBerkeley, OHSU and NorthEastern University.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Timing errors in computer- based paradigms Richard R. Plant, Garry Turner and Annie Trapp (The Higher Education Psychology Network)
I can be You: Questioning the use of Keystroke Dynamics as Biometrics —Paper by Tey Chee Meng, Payas Gupta, Debin Gao Presented by: Kai Li Department of.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
The Sociometer: A Wearable Device for Understanding Human Networks
Water as a Social Process Lilian Alessa, Ph.D.,P.Reg.Biol. Resilience and Adaptive Management Group, Water and Environmental Research Center, University.
1 CS 320 Interaction Design Spring 2011 Course Syllabus January19, 2011.
THE ARTS All religions, arts and sciences are branches of the same tree. Albert Einstein Albert Einstein.
DESIGN OF SOFTWARE ARCHITECTURE
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
"Multimedia".
TeraGrid User Portal Eric Roberts. Outline Motivation Vision What’s included? Live Demonstration.
HCI Meeting 1 Thursday, August 26. Class Activities [1] Student questionnaire Answer the following questions: 1.When and where was the computer mouse.
Social Information Processing March 26-28, 2008 AAAI Spring Symposium Stanford University
Top-k Queries in Wireless Sensor Networks Amber Faucett, Dr. Longzhuang Li, In today’s world, wireless.
Chapter 1 What is Psychology Pages Activity Sometimes we have misconceptions about psychology, as a science, and its place in the social sciences.
5. Methodology Compare the performance of XCS with an implementation of C4.5, a decision tree algorithm called J48, on the reminder generation task. Exemplar.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Roslyn: A Tour Guide Robot Jared Rhizor, Timothy Sweet, Nishok Yadav Advisor: Dr. David Feil-Seifer Instructor: Dr. Sergiu Dascalu Department of Computer.
The University of Nevada, Reno SYCOPHANT Sycophant A Context Based Generalized User-Modeling Framework for Desktop Applications Anil Shankar Evolutionary.
Perceptive Computing Democracy Communism Architecture The Steam Engine WheelFire Zero Domestication Iron Ships Electricity The Vacuum tube E=mc 2 The.
Prediction Games Players compete by making predictions about upcoming event/observation in the real world Predictions are scored after event At TAMU, we.
Ten Myths of Multimodal Interaction
Instructor: Dr. Hany H. Ammar
Digital Dictation News Gathering.
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
Department of Informatics, Nicolaus Copernicus University, Toruń
DISC Behavior Profile Module 00-2 Modified: 9/20/2018.
Nathan Eagle Sandy Pentland
Physics-based simulation for visual computing applications
Example of IRB Application and Resulting Research Paper
Empirical Evaluation Data Collection: Techniques, methods, tricks Objective data IRB Clarification All research done outside the class (i.e., with non-class.
Presentation transcript:

3. User Study Simulate an average research work- day activity of reading a research paper while listening to music and being interrupted with conversations from neighbors. Subjects participates in four separate 45 minute sessions. A subject read an article in the first 30 minutes and answered article- related questions in the next 15 minutes. Hints related to the article or study genereated in the form of Visual, voice, visual and voice and void alarms. Subject provided feedback specifying the alarm-type she preferred. 6. Future Work 2. User-Context approach User-Centered Context Aware Framework for Application Personalization Anil Shankar, Sushil J Louis, Sergiu Dascalu Linda J.Hayes, Ramona Houmanfar {anilk, sushil, cse.unr.edu {lhayes, unr.nevada.educse.unr.edu Dept. of Computer Science & Engineering Dept. of Psychology University of Nevada, Reno, USA Acknowledgments: This work was supported in part by contract numbers: N from the Office of Naval Research and National Science Foundation EPSCoR NSHE Current computer interfaces rely on the activity of an internal clock, keyboard and mouse to provide input/context to interact with a user. Reliance on such meager contextual information makes these interfaces unaware of a user and her environment. These context unaware user interfaces can only make weak attempts to adapt their behavior to individual user needs. 1. Motivation Harness external contextual information from a user’s environment (motion and speech) in addition to using contextual information internal to the computer. Use simple sensors to collect data on both the internal and external computer environments. Mine this contextual information for useful user-behavior patterns to better predict user preferences (behavior) and improve user interaction. 4. Experimental Design Talk, No-music Music, No-talk No-music, No-talk Music, Talk 0,3,2,1 1,0,2,3 3,0,1,2 Long- article 4 Talk, No-music Music, No-talk No-music, No-talk Music, Talk 1,3,0,2 2,3,1,0 2,0,3,1 3,2,0,1 Short- article 3 Talk, No-music Music, No-talk No-music, No-talk Music, Talk 3,1,0,2 1,0,2,3 1,3,2,0 3,0,2,1 Long- article 2 Talk, No-music Music, No-talk No-music, No-talk Music, Talk 0,2,3,1 3,1,2,0 2,1,0,3 Short- article 1 TreatmentAlarm Order* TaskSession * 0 = No-alarm; 1 = Visual-alarm; 2 = Voice- Alarm; 3 = Voice and visual alarms 1.XCS has an average performance of 90 percent 2.XCS outperforms 1R and J48 for 8/10 users on the 2Class problem and 9/10 users on the 4Class problem. 3.Removing external user-context degrades XCS’ and J48’s performance 4.Removing external user-context (motion and speech) degrades the alarm-predictive accuracy 5.One-R’s tree picks user-identity attribute, that is knowing who the user is helps the calendar-interface to personalize its alarm-type to that particular user 6.Decision-trees examined show that user-context features like user-id, motion-information are critical for high prediction accuracy Incorporate open-source applications (Sunbird, xmms) into our framework and enable them to be user-context aware Distribute the software and collect short-term and long-term data from a diverse group of users XCS Prediction Accuracy 5. Results