HCI Bibliography : Search Results skip to search form | skip to results |
Database updated: 2016-05-10 Searches since 2006-12-01: 32,646,466
director@hcibib.org
Hosted by ACM SIGCHI
The HCI Bibliogaphy was moved to a new server 2015-05-12 and again 2016-01-05, substantially degrading the environment for making updates.
There are no plans to add to the database.
Please send questions or comments to director@hcibib.org.
Query: Bhattacharya_S* Results: 23 Sorted by: Date  Comments?
Help Dates
Limit:   
[1] Checksum gestures: continuous gestures as an out-of-band channel for secure pairing Secruity tricks / Ahmed, Imtiaj / Ye, Yina / Bhattacharya, Sourav / Asokan, N. / Jacucci, Giulio / Nurmi, Petteri / Tarkoma, Sasu Proceedings of the 2015 International Conference on Ubiquitous Computing 2015-09-07 p.391-401
ACM Digital Library Link
Summary: We propose the use of a single continuous gesture as a novel, intuitive, and efficient mechanism to authenticate a secure communication channel. Our approach builds on a novel algorithm for encoding (at least 20-bits) authentication information as a single continuous gesture, referred to as a checksum gesture. By asking the user to perform the generated gesture, a secure channel can be authenticated. Results from a controlled user experiment (N = 13 participants, 1022 trials) demonstrate the feasibility of our technique, showing over 90% success rate in establishing a secure communication channel despite relying on complex gesture patterns. The authentication times of our method are over three-folds faster than with previous gesture-based solutions. The average execution time of a gesture is 5:7 seconds in our study, which is comparable to the input time of conventional text input based PIN authentication. Our approach is particularly well-suited for scenarios involving wearable devices that lack conventional input capabilities, e.g., pairing a smartwatch with an interactive display.

[2] Predicting Viewer Perceived Emotions in Animated GIFs Multimedia Grand Challenge / Jou, Brendan / Bhattacharya, Subhabrata / Chang, Shih-Fu Proceedings of the 2014 ACM International Conference on Multimedia 2014-11-03 p.213-216
ACM Digital Library Link
Summary: Animated GIFs are everywhere on the Web. Our work focuses on the computational prediction of emotions perceived by viewers after they are shown animated GIF images. We evaluate our results on a dataset of over 3,800 animated GIFs gathered from MIT's GIFGIF platform, each with scores for 17 discrete emotions aggregated from over 2.5M user annotations -- the first computational evaluation of its kind for content-based prediction on animated GIFs to our knowledge. In addition, we advocate a conceptual paradigm in emotion prediction that shows delineating distinct types of emotion is important and is useful to be concrete about the emotion target. One of our objectives is to systematically compare different types of content features for emotion prediction, including low-level, aesthetics, semantic and face features. We also formulate a multi-task regression problem to evaluate whether viewer perceived emotion prediction can benefit from jointly learning across emotion classes compared to disjoint, independent learning.

[3] Learning a Linear Influence Model from Transient Opinion Dynamics KM Session 4: Social Networks & Social Media II / De, Abir / Bhattacharya, Sourangshu / Bhattacharya, Parantapa / Ganguly, Niloy / Chakrabarti, Soumen Proceedings of the 2014 ACM Conference on Information and Knowledge Management 2014-11-03 p.401-410
ACM Digital Library Link
Summary: Many social networks are characterized by actors (nodes) holding quantitative opinions about movies, songs, sports, people, colleges, politicians, and so on. These opinions are influenced by network neighbors. Many models have been proposed for such opinion dynamics, but they have some limitations. Most consider the strength of edge influence as fixed. Some model a discrete decision or action on part of each actor, and an edge as causing an "infection" (that is often permanent or self-resolving). Others model edge influence as a stochastic matrix to reuse the mathematics of eigensystems. Actors' opinions are usually observed globally and synchronously. Analysis usually skirts transient effects and focuses on steady-state behavior. There is very little direct experimental validation of estimated influence models. Here we initiate an investigation into new models that seek to remove these limitations. Our main goal is to estimate, not assume, edge influence strengths from an observed series of opinion values at nodes. We adopt a linear (but not stochastic) influence model. We make no assumptions about system stability or convergence. Further, actors' opinions may be observed in an asynchronous and incomplete fashion, after missing several time steps when an actor changed its opinion based on neighbors' influence. We present novel algorithms to estimate edge influence strengths while tackling these aggressively realistic assumptions. Experiments with Reddit, Twitter, and three social games we conducted on volunteers establish the promise of our algorithms. Our opinion estimation errors are dramatically smaller than strong baselines like the DeGroot, flocking, voter, and biased voter models. Our experiments also lend qualitative insights into asynchronous opinion updates and aggregation.

[4] The company you keep: mobile malware infection rates and inexpensive risk indicators Security 1 / Truong, Hien Thi Thu / Lagerspetz, Eemil / Nurmi, Petteri / Oliner, Adam J. / Tarkoma, Sasu / Asokan, N. / Bhattacharya, Sourav Proceedings of the 2014 International Conference on the World Wide Web 2014-04-07 v.1 p.39-50
ACM Digital Library Link
Summary: There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [11], was based on indirect measurements obtained from domain-name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,000 Android devices. We find that the malware infection rates in Android devices estimated using two malware datasets (0.28% and 0.26%), though small, are significantly higher than the previous independent estimate. Based on the hypothesis that some application stores have a greater density of malicious applications and that advertising within applications and cross-promotional deals may act as infection vectors, we investigate whether the set of applications used on a device can serve as an indicator for infection of that device. Our analysis indicates that, while not an accurate indicator of infection by itself, the application set does serve as an inexpensive method for identifying the pool of devices on which more expensive monitoring and analysis mechanisms should be deployed. Using our two malware datasets we show that this indicator performs up to about five times better at identifying infected devices than the baseline of random checks. Such indicators can be used, for example, in the search for new or previously undetected malware. It is therefore a technique that can complement standard malware scanning. Our analysis also demonstrates a marginally significant difference in battery use between infected and clean devices.

[5] Bengali text input interface design for mobile devices Accessibility aspects in UIDLs / Bhattacharya, Samit / Laha, Subrata Universal Access in the Information Society 2013-11 v.12 n.4 p.441-451
Keywords: Bengali; Virtual keyboard; Two-level design; Frequency-based organization; Static and adaptive; Page replacement algorithm
Link to Digital Content at Springer
Summary: Text entry has become one of the most frequent activities performed using mobile devices such as PDAs. Virtual keyboards (VK), which allow text to be entered by tapping keys displayed on the screen, are among the predominant mode of text input for such devices. It is important to design VK layouts in a way such that the users can achieve high text entry speed with high accuracy. Several layouts, primarily in English and also in some other languages, have been proposed to achieve the twin objectives. However, no such work has been reported for Bengali, the second and fifth most popular language of India and the world, respectively. The existing methods cannot be applied directly to Bengali VK design due to the problem of accommodating the large Bengali alphabet (more than 60 characters) on a small display area. In order to resolve the resulting usability-performance trade-off, this paper proposes a two-level design. Five two-level VKs representing three design paradigms (alphabetic, frequency-based and adaptive) have been designed and compared in an empirical study. The study results show that for mobile devices, the two-level adaptive design is expected to give best performance in terms of text entry rate and accuracy. The layouts as well as the procedure and results of the study are discussed in this paper.

[6] Towards a comprehensive computational model for aesthetic assessment of videos Multimedia grand challenge / Bhattacharya, Subhabrata / Nojavanasghari, Behnaz / Chen, Tao / Liu, Dong / Chang, Shih-Fu / Shah, Mubarak Proceedings of the 2013 ACM International Conference on Multimedia 2013-10-21 p.361-364
ACM Digital Library Link
Summary: In this paper we propose a novel aesthetic model emphasizing psycho-visual statistics extracted from multiple levels in contrast to earlier approaches that rely only on descriptors suited for image recognition or based on photographic principles. At the lowest level, we determine dark-channel, sharpness and eye-sensitivity statistics over rectangular cells within a frame. At the next level, we extract Sentibank features (1,200 pre-trained visual classifiers) on a given frame, that invoke specific sentiments such as "colorful clouds", "smiling face" etc. and collect the classifier responses as frame-level statistics. At the topmost level, we extract trajectories from video shots. Using viewer's fixation priors, the trajectories are labeled as foreground, and background/camera on which statistics are computed. Additionally, spatio-temporal local binary patterns are computed that capture texture variations in a given shot. Classifiers are trained on individual feature representations independently. On thorough evaluation of 9 different types of features, we select the best features from each level -- dark channel, affect and camera motion statistics. Next, corresponding classifier scores are integrated in a sophisticated low-rank fusion framework to improve the final prediction scores. Our approach demonstrates strong correlation with human prediction on 1,000 broadcast quality videos released by NHK as an aesthetic evaluation dataset.

[7] Recognition of complex events in open-source web-scale videos: a bottom up approach Doctoral symposium / Bhattacharya, Subhabrata Proceedings of the 2013 ACM International Conference on Multimedia 2013-10-21 p.1035-1038
ACM Digital Library Link
Summary: Recognition of complex events in unconstrained Internet videos is a challenging research problem. In this symposium proposal, we present a systematic decomposition of complex events into hierarchical components and make an in-depth analysis of how existing research are being used to cater to various levels of this hierarchy. We also identify three key stages where we make novel contributions which are necessary to not only improve the overall recognition performance, but also develop richer understanding of these events. At the lowest level, our contributions include (a) compact covariance descriptors of appearance and motion features used in sparse coding framework to recognize realistic actions and gestures, and (b) a Lie-algebra based representation of dominant camera motion present in video shots which can be used as a complementary feature for video analysis. In the next level, we propose an (c) efficient maximum likelihood estimate based representation from low-level features computed from videos which demonstrates state of the art performance in large scale visual concept detection, and finally, we propose to (d) model temporal interactions between concepts detected in video shots through two new discriminative feature spaces derived from Linear dynamical systems which eventually boosts event recognition performance. In all cases, we conduct thorough experiments to demonstrate promising performance gains over some of the prominent approaches.

[8] A study of the impact of task complexity and interface design on e-learning task adaptations APCHI 2013: full papers / Deshpande, Yogesh / Bhattacharya, Samit / Yammiyavar, Pradeep Proceedings of the 2013 Asia Pacific Conference on Computer Human Interaction 2013-09-24 p.19-27
ACM Digital Library Link
Summary: E-learners use different strategies of learning and interactions in different learning situations. The learning task's complexity and the design of user interface used together influences learner's adaptations in their interaction tasks. This research studies influence of task's complexity and interface design, on learner's adaptations in interaction tasks. The study reveals learner's interaction behavior in situations of changing cognitive demands of learning tasks.
    The participants of the study solved learning tests using an e-learning web application with two distinct types of graphical user interfaces (GUI-1 and GUI-2). GUI-1 had hierarchical navigation design while GUI-2 had non-hierarchical design. Different sample groups (K, C and A) were administered learning tests having different complexities such as knowledge based (K), comprehension based (C) and application based (A). The interaction tasks such as total pages visited (Tpv) and total operations done (Top) during the learning tests were recorded for computing task adaptation score (TAS). The adaptation scores for GUI-1 and GUI-2 in various sample groups (K, C and A) were compared and analyzed. The study concludes that the hierarchical or non-hierarchical navigation designs have no significant effect on learner's adaptations in Tpv and Top. However learning test complexity (knowledge, comprehension and application) significantly affects task adaptation scores.

[9] Automatic correction of annotation boundaries in activity datasets by class separation maximization Workshop: international workshop on human activity sensing corpus and its application (HASCA2013) / Kirkham, Reuben / Khan, Aftab / Bhattacharya, Sourav / Hammerla, Nils / Mellor, Sebastian / Roggen, Daniel / Ploetz, Thomas Adjunct Proceedings of the 2013 International Joint Conference on Pervasive and Ubiquitous Computing 2013-09-08 v.2 p.673-678
ACM Digital Library Link
Summary: t is challenging to precisely identify the boundary of activities in order to annotate the activity datasets required to train activity recognition systems. This is the case for experts, as well as non-experts who may be recruited for crowd-sourcing paradigms to reduce the annotation effort or speed up the process by distributing the task over multiple annotators. We present a method to automatically adjust annotation boundaries, presuming a correct annotation label, but imprecise boundaries, otherwise known as "label jitter". The approach maximizes the Fukunaga Class-Separability, applied to time series. Evaluations on a standard benchmark dataset showed statistically significant improvements from the initial jittery annotations.

[10] Gaussian process-based predictive modeling for bus ridership Workshop: PURBA 2013: workshop on pervasive urban applications / Bhattacharya, Sourav / Phithakkitnukoon, Santi / Nurmi, Petteri / Klami, Arto / Veloso, Marco / Bento, Carlos Adjunct Proceedings of the 2013 International Joint Conference on Pervasive and Ubiquitous Computing 2013-09-08 v.2 p.1189-1198
ACM Digital Library Link
Summary: The dynamics of a city are characterized, among others, by the traveling patterns of its dwellers. Accurate knowledge of human mobility patterns would have applications, e.g., in urban design, in the optimization of public transportation operating costs, and in the improvement of public transportation services. The present paper combines a large scale bus transportation dataset with publicly available data sources to predict bus usage. We propose a Gaussian process-based approach for modeling and predicting bus ridership. To validate our approach we perform experiments on data collected from Lisbon, Portugal. The results demonstrate significant improvements in prediction accuracy compared to a probabilistic baseline predictor.

[11] Semi-supervised Learning Based Aesthetic Classifier for Short Animations Embedded in Web Pages Display Manipulations / Bansal, Dipak / Bhattacharya, Samit Proceedings of IFIP INTERACT'13: Human-Computer Interaction-1 2013 v.1 p.728-745
Keywords: Aesthetics; web page; short video; classification; semi-supervised learning; Co-training
Link to Digital Content at Springer
Summary: We propose a semi-supervised learning based computational model for aesthetic classification of short animation videos, which are nowadays part of many web pages. The proposed model is expected to be useful in developing an overall aesthetic model of web pages, leading to better evaluation of web page usability. We identified two feature sets describing aesthetics of an animated video. Based on the feature sets, we developed a Naïve-Bayes classifier by applying Co-training, a semi-supervised machine learning technique. The model classifies the videos as good, average or bad in terms of their aesthetic quality. We designed 18 videos and got those rated by 17 participants for use as the initial training set. Another set of 24 videos were designed and labeled using Co-training. We conducted an empirical study with 16 videos and 23 participants to ascertain the efficacy of the proposed model. The study results show 75% model accuracy.

[12] Igwana: a text-free search interface / Bhattacharya, Shourov / Feldman, Luke Proceedings of the 2012 Australian Computer-Human Interaction Conference 2012-11-26 p.34-37
ACM Digital Library Link
Summary: Keyword-driven search has become an important way for people to find content on the World Wide Web. However, it is estimated that more than 700 million adults (Warrilow, 2009) lack sufficient literacy in either English or another major language to use existing search interfaces. As a result, these users are to a large extent 'locked out' from the Web. We seek to address this challenge through the development of a user interface ('igwana') to navigate effectively through large sets of content by using pictograms in place of text. This paper describes some of our preliminary research and ideas and a proposed design for the igwana system.

[13] Segmenting web-domains and hashtags using length specific models KM track: information extraction / Srinivasan, Sriram / Bhattacharya, Sourangshu / Chakraborty, Rudrasis Proceedings of the 2012 ACM Conference on Information and Knowledge Management 2012-10-29 p.1113-1122
ACM Digital Library Link
Summary: Segmentation of a string of English language characters into a sequence of words has many applications. Here, we study two applications in the internet domain. First application is the web domain segmentation which is crucial for monetization of broken URLs. Secondly, we propose and study a novel application of twitter hashtag segmentation for increasing recall on twitter searches. Existing methods for word segmentation use unsupervised language models. We find that when using multiple corpora, the joint probability model from multiple corpora performs significantly better than the individual corpora. Motivated by this, we propose weighted joint probability model, with weights specific to each corpus. We propose to train the weights in a supervised manner using max-margin methods. The supervised probability models improve segmentation accuracy over joint probability models. Finally, we observe that length of segments is an important parameter for word segmentation, and incorporate length-specific weights into our model. The length specific models further improve segmentation accuracy over supervised probability models. For all models proposed here, inference problem can be solved using the dynamic programming algorithm. We test our methods on five different datasets, two from web domains data, and three from news headlines data from an LDC dataset. The supervised length specific models show significant improvements over unsupervised single corpus and joint probability models. Cross-testing between the datasets confirm that supervised probability models trained on all datasets, and length specific models trained on news headlines data, generalize well. Segmentation of hashtags result in significant improvement in recall on searches for twitter trends.

[14] Enriching location information: an energy-efficient approach Doctoral colloquia abstracts / Bhattacharya, Sourav Proceedings of the 2011 International Conference on Ubiquitous Computing 2011-09-17 p.519-522
ACM Digital Library Link
Summary: Off-the-shelf modern mobile devices come with a number of inbuilt sensors, e.g., GPS, WiFi, GSM, accelerometer, compass, gyroscope, NFC and Bluetooth. Equipped with all these sensors and internet connectivity, modern mobile phones are enabling continuous sensing and increasingly many emergent mobile applications are using sensed context on the phone to understand users' needs and improve usability. However, limited battery power is a big hindrance to the deployment of continuous sensing on mobile devices and without any intelligent sensor management, the battery lasts only few hours. In this research, we emphasize on location-awareness and address the challenges in developing ubiquitous positioning solutions, cross-device indoor localization, position and trajectory tracking and inferring high-level contexts using machine-learning techniques on sensor data in an energy-efficient way.

[15] Predictive error behavior model of on-screen keyboard users Works-in-progress / Jain, Siddharth / Bhattacharya, Samit Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011-05-07 v.2 p.1435-1440
ACM Digital Library Link
Summary: On-screen keyboards are becoming ubiquitous with increasing use in mobile devices and touch-screens. In this work, we present a novel predictive error model which relates accuracy of an on-screen keyboard user to a given layout using the distance between keys. The model is developed from empirical data with the aim to predict the error rate of a user from the layout specification alone. Our proposed model can be combined with the existing quantitative design approaches for designing keyboards having high text-entry speed and accuracy.

[16] Consideration set generation in commerce search E-commerce / Bhattacharya, Sayan / Gollapudi, Sreenivas / Munagala, Kamesh Proceedings of the 2011 International Conference on the World Wide Web 2011-03-28 v.1 p.317-326
ACM Digital Library Link
Summary: In commerce search, the set of products returned by a search engine often forms the basis for all user interactions leading up to a potential transaction on the web. Such a set of products is known as the consideration set. In this study, we consider the problem of generating consideration set of products in commerce search so as to maximize user satisfaction. One of the key features of commerce search that we exploit in our study is the association of a set of important attributes with the products and a set of specified attributes with the user queries. Those important attributes not used in the query are treated as unspecified. The attribute space admits a natural definition of user satisfaction via user preferences on the attributes and their values, viz. require that the surfaced products be close to the specified attribute values in the query, and diverse with respect to the unspecified attributes. We model this as a general Max-Sum Dispersion problem wherein we are given a set of n nodes in a metric space and the objective is to select a subset of nodes with total cost at most a given budget, and maximize the sum of the pairwise distances between the selected nodes. In our setting, each node denotes a product, the cost of a node being inversely proportional to its relevance with respect to specified attributes. The distance between two nodes quantifies the diversity with respect to the unspecified attributes. The problem is NP-hard and a 2-approximation was previously known only when all the nodes have unit cost.
    In our setting, we do not make any assumptions on the cost. We label this problem as the General Max-Sum Dispersion problem. We give the first constant factor approximation algorithm for this problem, achieving an approximation ratio of 2. Further, we perform extensive empirical analysis on real-world data to show the effectiveness of our algorithm.

[17] Influence of landmark-based navigation instructions on user attention in indoor smart spaces Handheld devices / Nurmi, Petteri / Salovaara, Antti / Bhattacharya, Sourav / Pulkkinen, Teemu / Kahl, Gerrit Proceedings of the 2011 International Conference on Intelligent User Interfaces 2011-02-13 p.33-42
ACM Digital Library Link
Summary: Using landmark-based navigation instructions is widely considered to be the most effective strategy for presenting navigation instructions. Among other things, landmark-based instructions can reduce the user's cognitive load, increase confidence in navigation decisions and reduce the number of navigational errors. Their main disadvantage is that the user typically focuses considerable amount of attention on searching for landmark points, which easily results in poor awareness of the user's surroundings. In indoor spaces, this implies that landmark-based instructions can reduce the attention the user pays on advertisements and commercial displays, thus rendering the assistance commercially inviable. To better understand how landmark-based instructions influence the user's awareness of her surroundings, we conducted a user study with $20$ participants in a large national supermarket that investigated how the attention the user pays on her surroundings varies across two types of landmark-based instructions that vary in terms of their visual demand. The results indicate that an increase in the visual demand of landmark-based instructions does not necessarily improve the participant's recall of their surrounding environment and that this increase can cause a decrease in navigation efficiency. The results also indicate that participants generally pay little attention to their surroundings and are more likely to rationalize than to actually remember much from their surroundings. Implications of the findings on navigation assistants are discussed.

[18] A GA-based approach to improve web page aesthetics / Singh, Nahar / Bhattacharya, Samit Proceedings of the 2010 International Conference on Intelligent Interactive Technologies and Multimedia 2010-12-28 p.29-32
ACM Digital Library Link
Summary: The field of human-computer interaction traditionally deals with the problem of improving usability of interactive systems. The concept of usability is defined in terms of user's task performance. While task is undoubtedly one important factor in "usable" interface design, recent research shows that form (aesthetics) performs an equally important role in shaping the overall user experience of an interactive system, which in turn leads to increased usability. Keeping the form factor in focus, in this paper we present an approach to improve aesthetics of web interfaces using a genetic algorithm (GA). An existing computational model of aesthetics has been used to develop the fitness function of the GA. In order to ascertain the efficacy of the approach, an empirical study with 30 web pages and 10 subjects was carried out. Results of the study show that in certain situations, the proposed approach is able to improve perceived interface aesthetics.

[19] A grid-based algorithm for on-device GSM positioning Localization / Nurmi, Petteri / Bhattacharya, Sourav / Kukkonen, Joonas Proceedings of the 2010 International Conference on Ubiquitous Computing 2010-09-26 p.227-236
Keywords: GSM, energy efficiency, fingerprinting, mobile computing, particle filtering, positioning
ACM Digital Library Link
Summary: We propose a grid-based GSM positioning algorithm that can be deployed entirely on mobile devices. The algorithm uses Gaussian distributions to model signal intensity variations within each grid cell. Position estimates are calculated by combining a probabilistic centroid algorithm with particle filtering. In addition to presenting the positioning algorithm, we describe methods that can be used to create, update and maintain radio maps on a mobile device. We have implemented the positioning algorithm on Nokia S60 and Nokia N900 devices and we evaluate the algorithm using a combination of offline and real world tests. The results indicate that the accuracy of our method is comparable to state-of-the-art methods, while at the same time having significantly smaller storage requirements.

[20] Jog Falls: A Pervasive Healthcare Platform for Diabetes Management Applications / Nachman, Lama / Baxi, Amit / Bhattacharya, Sangeeta / Darera, Vivek / Deshpande, Piyush / Kodalapura, Nagaraju / Mageshkumar, Vincent / Rath, Satish / Shahabdeen, Junaith / Acharya, Raviraja Proceedings of Pervasive 2010: International Conference on Pervasive Computing 2010-05-17 p.94-111
Keywords: Personal Health Monitoring; Diabetes Management; Energy Expenditure Analysis; Activity monitoring
Link to Digital Content at Springer
Summary: This paper presents Jog Falls, an end to end system to manage diabetes that blends activity and energy expenditure monitoring, diet-logging, and analysis of health data for patients and physicians. It describes the architectural details, sensing modalities, user interface and the physician's backend portal. We show that the body wearable sensors accurately estimate the energy expenditure across a varied set of active and sedentary states through the fusion of heart rate and accelerometer data. The GUI ensures continuous engagement with the patient by showing the activity goals, current and past activity states and dietary records along with its nutritional values. The system also provides a comprehensive and unbiased view of the patient's activity and food intake trends to the physician, hence increasing his/her effectiveness in coaching the patient. We conducted a user study using Jog Falls at Manipal University, a leading medical school in India. The study involved 15 participants, who used the system for 63 days. The results indicate a strong positive correlation between weight reduction and hours of use of the system.

[21] Identifying Meaningful Places: The Non-parametric Way Location in Pervasive Systems / Nurmi, Petteri / Bhattacharya, Sourav Proceedings of Pervasive 2008: International Conference on Pervasive Computing 2008-05-19 p.111-127
Link to Digital Content at Springer
Summary: Gathering and analyzing location data is an important part of many ubiquitous computing applications. The most common way to represent location information is to use numerical coordinates, e.g., latitudes and longitudes. A problem with this approach is that numerical coordinates are usually meaningless to a user and they contrast with the way humans refer to locations in daily communication. Instead of using coordinates, humans tend to use descriptive statements about their location; for example, "I'm home" or "I'm at Starbucks." Locations, to which a user can attach meaningful and descriptive semantics, are often called places. In this paper we focus on the automatic extraction of places from discontinuous GPS measurements. We describe and evaluate a non-parametric Bayesian approach for identifying places from this kind of data. The main novelty of our approach is that the algorithm is fully automated and does not require any parameter tuning. Another novel aspect of our algorithm is that it can accurately identify places without temporal information. We evaluate our approach using data that has been gathered from different users and different geographic areas. The traces that we use exhibit different characteristics and contain data from daily life as well as from traveling abroad. We also compare our algorithm against the popular k-means algorithm. The results indicate that our method can accurately identify meaningful places from a variety of location traces and that the algorithm is robust against noise.

[22] Study and modeling of user errors for virtual scanning keyboard design Works in progress / Bhattacharya, Samit / Samanta, Debasis / Basu, Anupam Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems 2008-04-05 v.2 p.3399-3404
ACM Digital Library Link
Summary: Virtual scanning keyboards are text entry systems used by individuals with severe speech and motion impairments. In this paper, we present results of our empirical study on user errors for such keyboards. We also propose a computational error model and a method for evaluation of such keyboards taking errors into account. The work is aimed to help designers make appropriate choice from a large number of design alternatives with minimum user involvement.

[23] User errors on scanning keyboards: Empirical study, model and design principles / Bhattacharya, Samit / Samanta, Debasis / Basu, Anupam Interacting with Computers 2008 v.20 n.3 p.406-418
Keywords: Augmentative communication; Soft keyboards; Scanning input methods; Focus distance; Timing errors; Selection errors
Link to Article at ScienceDirect
1. Introduction
2. Details of the empirical study
2.1. Interfaces and access switches
2.2. Subjects
2.3. Method
3. Data analysis
3.1. Calculation of error free text entry time
3.2. Calculation of text entry time increase due to SE
3.3. Calculation of text entry time increase due to TE
3.4. Results
4. Modeling of user behavior
5. Prediction of error behavior from the user model
5.1. Focus distance
5.2. Model prediction
5.3. Observed error behavior
6. Development of design principles
7. Discussion
8. Conclusions
Acknowledgements
Appendix A. Texts used in the study
References
Summary: Scanning keyboards are used as augmentative communication aids by persons with severe speech and motion impairments. Literature reports two approaches for the design of scanning keyboards; design based on the experience and intuition of designers and user model based design methods. None of these approaches, however, considers user errors in the design process, potentially limiting the practical usefulness of the designs. We have performed experiments in order to study user errors on scanning keyboards. We have found that two types of errors affect performance of scanning keyboard users significantly, namely (a) timing error that occurs when a user fails to select a key at the appropriate time and (b) selection error that occurs when the user selects a wrong key. These errors have been found to increase users' text entry time by as high as 65% and 35%, respectively. Based on empirical observations, we have developed a state transition model of user behavior during user-keyboard interaction. The model comprises of four states, each of which represents the physical and cognitive state of the user at particular instant of the interaction. The transitions are caused by users' physical, cognitive and perceptual activities. We have found that the errors could be explained as caused due to the problems in making the transitions properly. In addition to explaining errors, the model has helped us to predict distribution of error probabilities with respect to the distance between keys. We have used the model predicted error distributions to develop principles for scanning keyboard design that aim to reduce user errors. The principles state that the frequently used key pairs should be placed apart by a minimum distance, which has been obtained from the error distributions, in order to reduce errors. The method and results of the study, the user model and the design principles are presented in this paper.