Xiaoyan Peng and Daniel L. Silver Jodrey School of Computer Science Acadia University Wolfville, Nova Scotia Canada.

Slides:



Advertisements
Similar presentations
Testing Relational Database
Advertisements

Basics Creating an account What do you need An name for yourself. An address looks like this:
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
1 Profit from usage data analytics: Recent trends in gathering and analyzing IVR usage data Vasudeva Akula, Convergys Corporation 08/08/2006.
Chapter 8 – Logistic Regression
Microsoft ® Office Outlook ® 2003 Virtually Working for You presents:
Dealing With Spam The kind, not the Food product.
Usability presented by the OSU Libraries’ u-team.
CSC 205 Software Engineering I 1 Overview - Cognitive Walkthroughs Brief introduction to Human-Computer Interaction Introduction to Cognitive Walkthroughs.
Stanford hci group / cs376 Adaptive Interfaces Nathan Sakunkoo.
What is HCI? CSE/ISE 323 Spring 2011 Tony Scarlatos.
Evaluating Websites By Zuber, Basil, Elizabeth and Rehana.
Connections to Independence
1 EmuPlayer Music Recommendation System Based on User Emotion Using Vital-sensor KMSF- sunny 親: namachan さん.
1 Functional Testing Motivation Example Basic Methods Timing: 30 minutes.
Evaluations and recommendations for a user support toolkit Christine Cahoon George Munroe.
GOALS & GOAL ORIENTATION. Needs Drive Human Behavior  Murray  Maslow.
Evaluation IMD07101: Introduction to Human Computer Interaction Brian Davison 2010/11.
1. Human – the end-user of a program – the others in the organization Computer – the machine the program runs on – often split between clients & servers.
Ciarán O’Leary Wednesday, 23 rd September Ciarán O’Leary School of Computing, Dublin Institute of Technology, Kevin St Research Interests Distributed.
CS 580 chapter 4 paradigms.
Usability By: Sharett Wooten and Gwen Payne. What is Usability Usability addresses the relationship between tools and their users. In order for a tool.
Evaluation of Adaptive Web Sites 3954 Doctoral Seminar 1 Evaluation of Adaptive Web Sites Elizabeth LaRue by.
Software Processes lecture 8. Topics covered Software process models Process iteration Process activities The Rational Unified Process Computer-aided.
Interacting with IT Systems Fundamentals of Information Technology Session 5.
Representation of Electronic Mail Filtering Profiles: A User Study Michael J. Pazzani Information and Computer Science University of California, Irvine.
The Shastalink Barracuda Spam Filter How to properly use the Barracuda Spam Filter to control your Inbox.
1 Automatic Classification of Bookmarked Web Pages Chris Staff First Talk February 2007.
Cristina Conati Department of Computer Science University of British Columbia Plan Recognition for User-Adaptive Interaction.
IBM Research June 14, 2007 An IP Continuum for Adaptive Interface Design Jeff Pierce © 2007 IBM Corporation.
Heuristic evaluation Functionality: Visual Design: Efficiency:
Testing -- Part II. Testing The role of testing is to: w Locate errors that can then be fixed to produce a more reliable product w Design tests that systematically.
Lecture 3 Software Engineering Models (Cont.)
Automated Assistant for Crisis Management Reflective Agent with Distributed Adaptive Reasoning RADAR.
Black Box Testing Techniques Chapter 7. Black Box Testing Techniques Prepared by: Kris C. Calpotura, CoE, MSME, MIT  Introduction Introduction  Equivalence.
User Support Chapter 8. Overview Assumption/IDEALLY: If a system is properly design, it should be completely of ease to use, thus user will require little.
Computing Science, University of Aberdeen1 Reflections on Bayesian Spam Filtering l Tutorial nr.10 of CS2013 is based on Rosen, 6 th Ed., Chapter 6 & exercises.
1 Markov Decision Processes Infinite Horizon Problems Alan Fern * * Based in part on slides by Craig Boutilier and Daniel Weld.
Understanding Use: Predicting Action on a message Laura A. Dabbish Jianwei Wang CSCI6800 Spring 2005.
Standard Setting Results for the Oklahoma Alternate Assessment Program Dr. Michael Clark Research Scientist Psychometric & Research Services Pearson State.
Collaboration over Internet Ivan Tomek, Rick Giles, Hai Zhang, Li Di Jodrey School of Computer Science Acadia University, Wolfville, Nova Scotia, Canada.
Objectives Objectives Recommendz: A Multi-feature Recommendation System Matthew Garden, Gregory Dudek, Center for Intelligent Machines, McGill University.
1 Markov Decision Processes Infinite Horizon Problems Alan Fern * * Based in part on slides by Craig Boutilier and Daniel Weld.
Measuring complexity Section 7.1 Giorgi Japaridze Theory of Computability.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
MODULE 17 COMMUNICATION “Listening can be the key to understanding” What is communication and when is it effective? How can we improve communication with.
In Search of Usable Security: Five Lessons from the Field Presentation by 王志誠.
July 24, 2005UM 2005, Edinburgh, UK1 User Control over User Adaptation: A Case Study Xiaoyan Peng and Daniel L. Silver Jodrey School of Computer Science.
Decision Making Week 6. Decision-Making Would you rather work alone or in a team? Do groups make better decisions?
Winter 2011SEG Chapter 11 Chapter 1 (Part 1) Review from previous courses Subject 1: The Software Development Process.
User Interfaces 4 BTECH: IT WIKI PAGE:
Evaluating Classification Performance
Process Asad Ur Rehman Chief Technology Officer Feditec Enterprise.
Modelling the Process and Life Cycle. The Meaning of Process A process: a series of steps involving activities, constrains, and resources that produce.
Chapter 1: Introduction Omar Meqdadi SE 3860 Lecture 1 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
1 Evaluating the User Experience in CAA Environments: What affects User Satisfaction? Gavin Sim Janet C Read Phil Holifield.
1 Usability evaluation and testing User interfaces Jaana Holvikivi Metropolia.
Research Word has a broad spectrum of meanings –“Research this topic on ….” –“Years of research has produced a new ….”
Data Mining Concepts and Techniques Course Presentation by Ali A. Ali Department of Information Technology Institute of Graduate Studies and Research Alexandria.
Utility or Futility? Marguerite Koole Dr. Mohamed Ally.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
ORGANIZING . 1.Sort messages quickly. 2.Group similar messages in folders or labels. 3.Route mail efficiently to specific folders or labels. 4.Reduce.
Machine Learning for Computer Security
Alan P. Reynolds*, David W. Corne and Michael J. Chantler
The Semiotic Engineering of Human-Computer Interaction Section I Foundation Chapter 1 Introduction.
SEVERITY & PRIORITY RELATIONSHIP
Preface to the special issue on context-aware recommender systems
Chapter 5 Designing the Architecture Shari L. Pfleeger Joanne M. Atlee
The Learner-Centered Classroom
Presentation transcript:

Xiaoyan Peng and Daniel L. Silver Jodrey School of Computer Science Acadia University Wolfville, Nova Scotia Canada

Synopsis Problem: The mix of automation and user control is a major issue for a successful UAI Theory: A UAI will be acceptable as long as the state of system interaction is within the current region of user interaction expectation Application: Spam filtering via a learned UM that predicts user’s sense of priority Solution: The user is provided with control over spam classification by the UM via a novel priority cut-off adjustment method

User Adapted Interfaces (UAI) = Human-Computer Interaction (HCI) + User Modeling (UM) To improve the usability and performance of software systems Controllability is a major usability issue for UAI technology Most research has focused on the performance of the learning algorithm Deficiency of systematic gather evidence about what users think about adaptation and controllability Motivation

Space of HCI s R P R2 R3 R’ NowPastFuture P -- System adaptation through the space. Each point along P represents the system’s state of interaction with the user at a particular time. R, R2, R3, R’ – The user’s region of interaction expectation. The size of R, |R|, is the number of interaction states within R. If |R| = 1, then no variation from s will be tolerated by the user; this user is very conservative in terms of adaptation. If |R| = n then there are n states within R that will be acceptable to the user; this user is more accepting of adaptation. S -- The systems current state of interaction. Adaptation Viewed as Movement through as HCI State Space

A user has a region of interaction expectation, R, that preferably is centered on the systems current state of interaction, s, or at least contains the s. Ideally, as the system interface adapts, the user shifts her R so as to centre it once again on the new s. This transition is not always in concert. If the system adapts too quickly then the user is left behind at R2. If the system adapts too slowly then the user may assume an interaction state too far in advance of the current s, at R3. In either case the user will not be satisfied with the system and task performance will suffer. The worst case is when the user’s expectation region is R’, a region of interaction space through which adaptation will never pass; the user is continually dissatisfied. To be successful, a UAI must provide the user with control over adaptation. We advocate that user control should be exercised over the deployment of user models rather than their development. Adaptation Viewed as Movement through as HCI State Space Theory

Empirical Study -- Objective An adaptive intelligent client is our application of choice for employing UAI. In this study we focus on predicting the priority of incoming messages based on a learned user model. Control over automatic spam filtering can then be provided by allowing the user to adjust cut-off values that determine when the predicted priority of a message is at the level of legitimate or spam. The objective of this experiment is to demonstrate that user control over appropriate aspects a UAI can improve the usability of the application and user satisfaction.

Empirical Study -- Implementation We have created an intelligent client and developed an intuitive user interface for controlling adaptation. There are two priority cut-off values Suspect cut-off value Spam cut-off value with a priority value lower than the spam cut-off will be placed in the Spam folder. with a priority value equal to or higher than the suspect cut-off will be filed into the Inbox folder. with a priority equal to or higher than the spam cut-off and lower than the suspect cut-off will be put in a Suspect folder.

Empirical Study – Materials and Methods Three variants of the system were tried. Variant N – It employs a UAI based on “no user model”. Variant F – It develops a user model but uses “fixed cut-off values” to determine the priority required for spam and legitimate s. Variant A – It develops a user model and allows the subjects to adjust the spam and suspect cut-off values as desired. This gives the subjects control over the UAI. Each subject used all 3 system variants in one of two possible orders; the first order being N, F and A and the second being N, A, and F. A different subset of s was used for each variant to prevent subjects from memorizing the content of messages. Each subject was surveyed following their trial of the 3 system variants.

Empirical Study – Results and Discussion 92.86% of subjects preferred the UAI variant of the system after the user model was developed, with 82.14% of subjects preferring the adjustable spam and suspect cut- offs over the fixed cut-offs % of subjects felt that the cut-off adjustment increased the accuracy of classifications with more subjects preferring cut-off adjustment on their current clients (78.57%) than user modeling with fixed cut-offs (71.43%). Despite the fact that significantly more misclassifications were made by variant A (with adjustable cut-offs), 67.9% of the subjects (19/28) preferred variant A over F.

Empirical Study – Results and Discussion Of the subjects who liked cut-off adjustment, 95.65% preferred FN over FP meaning they most dislike finding legitimate messages in the Spam folder. Adjustment of the cut-offs allows the users to err on the side of FN classifications even if this reduces the overall performance of the UAI. Of the subjects who responded “do not know” or “disagree” to cut-off adjustment, 80% are less sensitive to FP (legitimate s classified as spam). The fixed default cut-off values worked well for that purpose, the subjects recognized this and preferred it.