cmd p p p cmd cmd ... cmd p p p command 1 command 2 command 3 cmd cmd ... cmd S M T W T F S command n cmd ... cmdn p p p cmd ...

Size: px
Start display at page:

Download "cmd p p p cmd cmd ... cmd p p p command 1 command 2 command 3 cmd cmd ... cmd S M T W T F S command n cmd ... cmdn p p p cmd ..."

Transcription

1 The Trials and Tribulations of Building an Adative User Interface Benjain Korveaker & Russell Greiner fbenjain, Deartent of Couter Science University of Alberta Edonton, Canada Abstract As every user has his own ideosyncracies and references, an interface that is honed for one user ay be robleatic for another. To accoodate a diverse range of users, any couter alications therefore include an interface that can be custoized e.g., by adjusting araeters, or dening acros. This allows each user to have his \own" version of the interface, honed to his secic references. However, ost such interfaces require the user to erfor this custoization by hand a tedious rocess that requires the user to be aware of his ersonal references. We are therefore exloring adative interfaces, that can autonoously deterine the user's reference, and adjust the interface aroriately. This aer reorts a series of exerients towards building such an adative interface here a Unixshell that can redict the user's next coand based on his revious interactions, and use this to silify the user's future interactions. After suarizing the Davison/Hirsh (998) work (for learning \coand stubs"), we then exlore several ways of extending and iroving this syste; e.g., to redict entire coand lines, to use various other tyes of inforation, etc. Keywords: online learning, learning and adatation, learning user references Introduction There are today a wide variety of interactive couter alications, ranging fro web-browser and searchers, through sreadsheets and data-base anageent systes, to editors, as well as gaes. As these systes becoe ore colicated as required to be able to accolish ore tasks, better their interfaces necessarily also becoe ore colex. Many of these systes have begun including tricks to hel the users; e.g., if the user begins an ety le with \Dear John", Word will suggest a \Letter" telate; siilarly if the user begins a line with \*", Word will change that character to a bullet \" and go into its List environent. Unfortunately, dierent users have dierent references, which eans the tricks that are aroriate for one user ay be robleatic for another. (E.g., there aarently are eole who like the Microsoft \Oce Assistant"... ) Moreover, dierent users want to do dierent things with the syste, as they have very dierent abilities, background knowledge, styles, etc. This realization that \one size does NOT t all" argues for custoizable interfaces, that can rovide dierent interfaces for dierent users, and hence allow each user to have an interface that is honed to his individual references. Of course, any of today's alication rogras can be custoized; e.g., ost editors and shells include acroor scriting- facilities. However, this custoization rocess ust tyically be done by the user which eans, tyically, that it is not done by the user, as this custoization rocess () requires that the user knows how to ake this odication (e.g., knows both the naes of the relevant araeters, and how to odify the); () requires the user to be aware of his secic references, and (3) is usually quite tedious. This research roject, therefore, ushes on a dierent aroach: Build alication systes that can autonoously adat theselves to the individual users. In articular, we focus on techniques for detecting atterns in the user's interactions, and then using this inforation to ake the interaction siler for the user, erhas by autoatically re-setting soe syste araeters, or dening aroriate new acros. This aer investigates a secic anisfestation of this task: We have built a Unix coand shell that can redict the user's behavior fro his revious coands, and then use these redictions to silify his future interactions with the shell. The rest of this introductory section resents two illustrative exales to hel describe our task ore recisely. After Section rovides the background for this work, Section 3 then sketches our algorith, based on the earlier Davison/Hirsh syste (DH98). Finally, Section 4 resents our eirical results, over a large existing dataset of 86 users. It discusses in articular the range of studies we ran, to better understand this challenge. All told, this aer resents what has been tried before, sua-

2 % vi crossword.c % ake crossword cc -g crossword.c -o crossword -l % crossword uzzle0 bus error (core dued) % vi crossword.c % ake crossword cc -g crossword.c -o crossword -l % crossword uzzle0 Solution found in 5584 attets. % crossword uzzle0 segentation violation (core dued) % ddd crossword core % vi crossword.c % ake crossword cc -g crossword.c -o crossword -l Undefined sybol: rint first referenced in file crossword.o ld: fatal: Sybol referencing errors. No outut written to crossword *** Error code ake: Fatal error: Coand failed for target `crossword' % vi crossword.c % ake cc -g crossword.c -o crossword -l % crossword uzzle03 Solution found in 3 attets. % el -s"it works" fred Figure : Wila's Coand Sequences rizes what we have learned, and suggests soe of the robles. Exales: Figure shows Wila's interactions with a shell, as she works on her crossword-solving rogra. It is easy to see that there is a consistent attern within Wila's activities; e.g., the vi-ake-crossword sequence is reeated several ties. Although Wila has taken advantage of traditional Unix facilities, she still has to tye a nuber of characters. Now exaine Fred's coand sequences; Figure. He has already coleted the assignent and is trying to write u his results. Unfortunately, Fred is not very failiar with L A TEX and is having trouble foratting an equation. Here, an even ore obvious attern is visible. Note that, if Fred had had a scrit to erfor the latexdvis-ghostview stes for hi, he wouldn't have ade the istake of running dvis on a L A TEX source le. Task: Our iediate goal is a Unix shell that can anticiate the user's next coand, and use this inforation to silify his interactions. One way to use that inforation would be to ll the user's current buer with this redicted coand e.g., after \vi % vi crossword.tex % latex crossword.tex % dvis crossword.dvi % ghostview crossword.s % vi crossword.tex % latex crossword.tex % dvis crossword.tex % ghostview crossword.s % vi crossword.tex % latex crossword.tex % dvis crossword.tex dvis:! Bad DVI file: first byte not reable % dvis crossword.dvi % ghostview crossword.s % wall Can anyone hel e with latex??? ^D Figure : Fred's Coand Sequences crossword.c", this shell could load \ake crossword" into Wila's buer. Wila could then execute this coand by sily tying a carriage return. Alteratively, she could delete this buer, or a ortion thereof, and retye whatever else she wishes. Siilarly, after Fred's \latex crossword.tex", the shell could suggest \dvis crossword.dvi"; assuing Fred acceted this suggestion, this could save Fred the hassle of guring out why \dvis crossword.tex" did not work. However, as this single ost-likely coand is still very unlikely, we decided to use the slightly dierent aroach of suggesting the 5 ost likely coands. As shown in Figure 3, our shell will dislay (in the to of the screen) these 5 ost likely coands. It also binds the to the F through F 5 keys; the user can execute any of these coans by sily ressing the associated function key. Notice either otion eans the user can achieve his results with less tying, and so do his work in less tie, while aking fewer istakes. In a nutshell, our shell will use this record of revious coands to redict what coand the user is likely to use next. These exales illustrate why our aroach has a chance of succeeding: Peole tend to follow atterns. For exale, after a successful latex coand, any users then tye dvis to roduce a ostscrit le fro the dvi le that latex generated; and if that succeeds, use ghostview to dislay the generated aer. Later versions of this tye of shell could take ore sohisticated actions based on this inforation. For exale, they could dene (and infor the user of) Note that even coands that see rando, such as \df", \utie" or \readail", are robably (robabilistically) redictable based on soe external event. Of course, this ay require elaborate instruentation.

3 Figure 3: Dislay of the Ileentation new acros, corresonding to (variabilized fors of the) sequences observed ost often. Or the adative shell could re-fetch inforation for the next anticiated coand(s) e.g., get the fonts for the ossible \dvis" coand, swa out rogras to reetively ake roo for netscae, swa out netscae before starting soe color-intensive task, or forat the ucoing an age. They ight also be able to detect atterns that corresond to robles e.g., that the user is thrashing and then rovide useful assistance. Background The extended version of this aer rovides a corehensive survey of adative user interfaces (e.g., (Lan97; SH93; HBH + 98) and others) and other work related to our task. Here, for sace reasons, we can only discuss the two ost relevant revious results. Our roject is a direct extension of the seinal work by Davison and Hirsh, (DH97; DH98) which redicts user coand stubs (coands without otions and araeters, e.g., the \latex" of the coand \latex foo.tex") fro the user's revious coand stubs. Their hand-crafted algorith generates and uses a table whose hi; ji entry is the robability of coand stub s i occurring iediately after the stub s j ; i.e., P ( Stub t+ = s i j Stub t = s j ) where the rando variable Stub i denotes the stub tyed as the user's i th coand. After seeing the current stub \stub t ", their erforance syste could then redict the ost likely subsequent stub stub t+ = argaxfp ( Stub t+ = s j Stub t = stub t )g s () The ain challenge, then, is how to ll this N N table of nubers (where there are N ossible stubs). The \obvious" aroach, of using eirical frequency over the sales observed, is arguably aroriate only if the data is iid (indeendent and identically distributed), which eans in articular that the frequency of seeing soe coand does not change over tie. That assution is clearly false in our situation. Instead, their algorith used a dierent way to estiate these robability values, one designed to ehasize recent new coands. On seeing say the coand \cd " followed by \latex " it would rst decay the robabilities on the \cd line" of the table by an (eirically deterined) factor < i.e., it would rst reset, for each stub s, Note here that ^P ( Stub t+ = s j Stub t = cd ) = () X s ^P ( Stub t+ = s j Stub t = cd ) = as this suation had been before this reduction. They then add the reaining? quantity to the hlatex; cdi entry: ^P ( Stub t+ = latex j Stub t = cd ) +=? (3) Hence, this row continues to su to, which is why we can view these values as robabilities.) This rule treendously boosts the value of ^P ( Stubt+ = latex j Stub t = cd ), even if its revious value was 0. This eect is extreely useful; e.g., Davison/Hirsh note that 0% of coands are sily the reeating the iediately rior coand!) We will later refer to this algorith as the \Alha-Udating Rule" or \AUR". Davison and Hirsh could then redict the single ostlikely coand, stub t+ (fro Equation ); however this was correct only 39.9% of the tie. They therefore switched to redicting the ve ost likely coands, and found that the actual stub (i.e., the one the user actually entered) was in this to-5 list alost 3/4 of the tie. Evaluation Criterion: Our basic algorith is a direct extension of theirs; see Section 3. We also adoted their evaluation criterion: Our systes are on-line: after observing the sequence of stubs, hstub ; : : : ; stub t i, each then redicts stub t+ (Equation ), or erhas the to ve: fstub t+; : : : stub 5 t+g. It is then told the correct stub t+ that the user actually tyed, which it can use rst to udate its \classier", and then to redict stub t+, (or erhas fstub t+; : : : stub 5 t+g), etc. We dene \accuracy" as how frequently the redicted coand coletely atches the user's actual coand. That is, after K instances, we coare the correct sequence hstub ; : : : ; stub K i to our rediction hstub ; : : : ; stub Ki, and reort as accuracy the nuber of ties \stub i = stub i ", divided by K. In They liited n to 5 as ore than ve coands tyically causes the user to focus on the redictions rather than the task at hand (or ignoring the redictions altogether).

4 the \to 5" case, the syste gets a \oint" whenver stub i fstub i ; : : : stub 5 i g. We use the sae criterion, utatis utandis, for our studies. Acknowledging that the rediction syste ay take a while to \lock onto" the articular erson, we soeties ignore the istakes ade during the rst, say, 00 coands. Here, the accuracy would be the nuber of ties \stub i = stub i " over tie i=0..k, divided by K? 00. (We will later refer to this as \accuracy?00".) Other eole have done work in the area as well. In articular, Greenberg (Gre88) collected a large dataset for 68 users, and used this to classify users into novice users, exerienced users, scientists and non-users (see Table below). Although these datasets were collected 0 years ago, they still are the largest and ostcolete source of user coand histories that are ublicly available. We use this dataset (albeit for different uroses) in the studies reorted here. 3 We nally note that, while the concet of coand rediction has been exlored for at least ten years, nothing has yet been deloyed into the ainstrea arket. We believe this can be artially exlained by observing: Couting resources ay not have been sucient to adequately redict user coands, until recently. It is dicult to collect sale data. Unix users are a territorial bunch, with their favorite editors, OS variants, and shells. 4 It is tyically very dicult to craft data collection echaniss that are transarent to the user. While the zsh source code is relatively organized and legible (esecially when coared to tcsh source code), it still took 30 hours to nd and change the aroriate 5 lines of code. 3 Prediction Algorith As stated above, our adative shell onitors the coands tyed by the user (along with other associated inforation, see below) then uses this inforation to redict, after each coand, which coand the user will tye next. To reduce the invasiveness of the data collection, we odied the Unix shell, zsh, 5 both to 3 To silify this resentation, we are not included the ore recent, but less colete, data obtained fro our ileentation. 4 One otential subject exlained why he turned us down: \... switching shells is like cutting o y ngers and sawing (sic) the on backwards and I have to relearn how to use y thub as y little nger... " 5 We chose zsh as it clais to be able to eulate the ore oular shells (tcsh, csh, bash, ksh), and it contains ost of the echaniss required to collect the araeters we want. collect the relevant inforation, and then to reset the dislay and the function keys, as shown in Figure 3. The real challenge, of course, is the actual rediction algorith, which deterines, for each ossible coand, the conditional robability that will be the next coand, based on the earlier coands, etc. In articular, we need to coute the robability that the next coand will be t+, based on the available inforation i.e., P ( Cd t+ = t+ j t; : : : ). Moreover, we need to roduce a good estiate to this distribution after very few sales, which is further colicated by the realization that the \local distribution" (i.e., the robability that one coand will iediately follow another) is not stationary. As we want a rediction syste that can track the user's distribution of coands, we therefore lift the Davison and Hirsh idea of ehasizing the iediately rior coand, then decaying the robabilities over tie; see the AUR (Section, Equations and 3). However, we extended their work in two signicant ways. First, we want to redict entire coand lines, rather than just coand stubs. Although redicting the next coand stub ight save a few keystrokes, Unix stubs are notoriously short in fact, over our dataset, the average stub length is only 4. characters. Assuing the redictions are aed to a function key and that the enter key ust be ressed afterwards, reducing the nuber of keystrokes fro four to two is not a signicant savings. Further, when one considers that the function keys are usually not articularly close to the \hoe keys", the eort sent reositioning the hand ay well negate the tie saved. Note, however, the average length of the entire coand line is 9.7 characters; and reducing 9.7 to would be useful. We therefore focus on this task, even though it is, of course, uch harder, esecially for coands that haen frequently, but with highly varying arguents e.g., cd, ls, vi and finger. The second extension was to hel us solve this harder task: We want to allow our redictor to use other inforation in roducing these redictions such as the entire revious coand line, the error code of that revious coand, the tie of day and day of week, etc. DataStructure to Encode Probabilities: We could iagine using a huge ulti-diensional table for this, whose hi; j; k; `; i entry is the conditional robability that P ( Cd t+ = i j Cd t = j; Error = k; tie = `; day = ), where i and j vary over the ossible coand lines, k over the range of ossible error codes, ` over the ties in a day and over the 7 days in the week. Unfortunately, our dataset included over 60,000 dierent coands lines. Even if we ake this secic to the individual users, note there was soe individual

5 coand coand coand 3 coand n n n n n 3 3 n n n n Y M A E N S M T W T F S Y M A E N S M T W T F S Y N N N error error error M A E N tie tie tie day day S M T W T F S day Figure 4: Structure Encoding Probabilities users that used over 3000 dierent coands! 6 Even if we quantize the error codes to only two values (0 or non- 0), and the tie to only hours, this table would need to have over = 3; 04; 000; 000 entries which would be dicult even to store, uch less to estiate fro a aucity of data (BD77). Recall that we want our syste to be able to hel users after observing only a sall handful of interactions. To reduce the nuber of araeters, we instead used a dierent structure, which ioses a bound on the nuber of ossible current coands (set to n), and on the nuber of ossible redicted coands (set to ). We also let the set of redicted coands vary, deending on the current coand. Here, we need only aintain the \active" subset of the coandairs h i ; j i, based on the largest P ( Cd t+ = i j Cd t = j ) values. We also further quantized the tie values, to only the 4 values: orning, afternoon, evening and night. The resulting structure is shown in Figure 4. To exlain the notation: the value of coand 7 ight be \latex crossword"; it oints to an associated j table. 7 There, erhas 7 is \dvis crossword.dvi" with P7 = 0:3; and 7 = \vi crossword.tex" with P7 = 0:09; etc. The value stored in Y 7 = P ( Cd t+ = dvis crossword.dvi j Cd t = \latex crossword.tex"; ErrorCode > 0 ) 6 All told, the Greenberg data involved over 6,774 distinct coands, of the total of 303,68 coands tyed by the 68 users. (Table rovides ore details.) Soe users used as few as 35 dierent coands, while one user used 353. The corresonding values for stubs alone ranged fro 7 to 358; there were a total of 639 dierent stubs used. is the robability that the next coand is \dvis crossword.dvi", given that the revious coand was coand 7 = \latex crossword.tex", and this execution roduced an error. In general, of course Y j i = P ( Cd t+ = P j i j Cd t = coand i ; ErrorCode > 0 ); note that Y j j= 7 =. Siilarly, N j i = P ( Cd t+ = j i j Cd t = coand i ; ErrorCode = 0 ); A j i = P ( Cd t+ = j i j Cd t = coand i ; Tie = Afternoon ); W j i = P ( Cd t+ = j i j Cd t = coand i ; Day = Wednesday ); etc. In our exerients, we set n = 000 and = 0; this eans our encoding involved at ost n47 = ; 0; 000 values, but less for users who used under 000 coands. We show below that this is a robust rediction echanis that is (relatively) resource friendly. The rest of this section discusses how we estiated these values; the next section, how we used these quantities to redict the ost likely coand(s). Estiating the Probabilities: To roduce this \table", we need rst to dene which coands to include as \current coands" (i.e., the far left table in Figure 4), and as \redicted coands" (iddle colun), and second; to coute the actual conditional robabilities used to ll the values. As exlained above, as the distribution is not stationary, we should not sily use frequency estiates e.g., we should not estiate P j i as the nuber of ties we observed Cd t = c i followed by Cd t+ = c j (over all ts), divided by the total nuber of ties that Cd t = c i. We instead used the AUR, in several laces: First, as we can kee only 000 \current coands", we need to know which coands are still active. We therefore aintain robabilities for the various coands, and udate the using this technique. We then kee only the 000 coand lines with highest values. This eans we aintain coands used recently, and let the coands that are unused for an extended tie, fall away. It also eans new coands have a chance of being included, which would not haen if we, instead set the robability to the eirical frequency. For exale, iagine that the rst tie latex was used was in the 000 th coand. In the \robability eirical frequency" aroach, the robability of latex would be only =000. As this is robably the sallest value, it is likely the one that would be ushed! Note that this is robleatic, as this eans that the syste will never consider any new coands even if the next 00 coands are all latex! We also use this AUR to set and udate the conditional robabilitiy values P j i. For each current coand coand i, we then kee only the 0 redictions with the highest P j i scores. We also used this AUR to

6 Accuracy Cd? 0 Cd? 00 Stub? 0 Stub? 00 revious line 7.5% ****** 8.6% ****** revious 5 lines 38.8% ****** 60.7% ****** ost freq 5 lines 34.% 33.9% 6.% 6.3% fro coand 46.9% 47.4% 7.7% 73.3% fro coand + arsing 43.8% 44.0% ****** ****** fro coand + error 46.9% 46.9% 7.6% 7.6% fro coand + day 46.7% 46.7% 7.4% 7.5% fro coand + tie 46.6% 46.6% 7.4% 7.4% fro coand + day + tie 46.6% 46.6% 7.4% 7.4% using last coands 36.9% 36.9% 59.% 59.5% Legend: Cd Line \Colete Coand Line" Stub \Just coand itself (no args, otions)" Accuracy \to ve includes next coand line/stub" Table : Suary of results set the values for the Y j i and other values. (Note, however, that the decision of which redicted coands j j i to kee deends only on the Pi values, and NOT the Y j i quantities, nor does it deend on W j i, etc.) We need an value for each of these AURs; in our exerients, we set = 0.90 to decide which current coands to kee P = 0.95 to udate the Pi j 's Error = 0.9 to udate ErrorCode robabilities DoW = 0.90 to udate DayOfWeek robabilities T od = 0.90 to udate TieOfDay robabilities which we erically found gave the best results. 4 Exerients and Results This section resents our eirical results, based on the data fro the Greenberg (Gre88) dataset. Ex# rst attets to dulicate the Davison and Hirsh results, dealing only with stubs, albeit on our datasets. The rest of this section considers several extensions: Ex# argues for redicting colete coand lines, rather than just the stubs, and resents our results here. There are obvious ways to arse coand lines, and then re-use that inforation e.g., after \latex foo.tex", we ay exect the next coand to be \dvis foo.dvi -o"; note the foo is reeated. Ex#3 states this notion ore recisely, and then resents our results. So far, everything deals only with coand lines or stubs. We would naturally exect that our syste could ake better redictions if it were given ore inforation about the context of the current/revious coand. We therefore exlored using \error codes" (Ex#4) and \current day and/or current tie (Ex#5). Another source of inforation is the coand that was tyed before the current coand; Ex#6 discusses our attets to estiate and use P ( t+ j t ; t? ). Finally, Ex#7 and Ex#8 consider redicting the next coand stub, but here using (resectively) the revious coand line, and then the coand line lus the error code. The nal Ex#9 discusses the redictability of dierent classes of users; it also rovides additional inforation about the Greenberg dataset we are using. We suarize our ain results in Table. Before exlaining the details of this table (see below), note iediately the winner, across the board, is the silest aroach, of sily using the current cond in redicting the next coand i.e., argax P ( t+ j t ), using the AUR to aintain the distribution. In articular, we did not irove (and often, did not even atch) this accuracy when we also used error code, day, tie, or earlier coands. In ore detail: The \Cd?" coluns in Table deal with redicting the colete coand line, and \Stub?"'s, with redicting only the stubs. The = 0 coluns test the redictive accuracy over the user's EN- TIRE sequence of data; the = 00 coluns test the redictive accuracy after ignoring the rst 00 exeriences of each user. (Recall this is considered the algorith's learning hase, to hel it adjust to the erson.) 7 To get soe baseline values, we also ileented a nave rediction ethod that sily redicts the last 5 coands. This syste obtains 60.7% accuracy redicting coand stubs and 38.8% accuracy redicting coand lines. We get even worse nubers, of course, if we consider just the revious SINGLE coand. We also considered a syste that sily redicts the 5 ost 7 We chose 00 after nding it worked better than other training-set sizes, in the context of \learning full coand lines fro full coand lines" (i.e., the \winner"): Nuber ignored: Predictive accuracy: 47.3% 47.4% 46.7% 43.3%

7 frequent revious coands; these values were coarable. (They too aear in Table.) Clearly any rediction syste that erfors worse than these should sily be considered a failure. The following subsections focus on the redicting the coand line fro various bits of evidence, in the \raw accuracy" odel. The table resents the other data, dealing with the \accuracy?00" odel, and with the stub-rediction task. Ex#. Predicting Coand Stubs fro Coand Stubs. First, we sily dulicated the Davison and Hirsh algorith, and obtained 7.7% accuracy (accuracy?00 score of 73.3%). This is reasonably close to their \near-75%" accuracy. (Note that we are using a dierent dataset.) Ex#. Predicting Coand Lines fro Coand Lines. As noted earlier, redicting entire coand lines would be treendously ore useful that just redicting stubs. When we use the entire coand lines to redict the next coand line, our accuracy is 46.9%. (47.4% when we ignore the rst 00 \trainingcoands"). It is not surrising that this is considerably saller than the accuracy for redicting stubs, as this is a uch ore dicult task. (Recall we are only satised with a erfect atch.) Of course, getting the stub right ight still be useful, even if the rest of the coand line is incorrect. For exale, we could then give the user the otion of oving the stub into the user's buer, to be augented, by hand, with the aroriate arguents and otions. We therefore considered a dierent scoring easure, where we awarded the syste oint if the correct line aeared in the list resented to the user; 0:5 oints if the correct stub aeared, and 0 otherwise. Here, the average score rose to 57.8% that is, 46.9% of the tie our list included the correct line, and an additional.8%, it included the correct stub. Ex#3. Predicting Coand Lines fro Parsed Coand Lines. Most Unix coands follow the attern: hstubi hswitchesi harguentsi. By arsing the coand lines into a sequence of tokens, it is ossible to identify coon atterns between a coand that occurs at tie t and a coand that occurs at tie t +. (Treating hstubi hswitchesi as a distinct coand is reasonable, since any users alias coon hstubi hswitchesi airs (for exale, aliasing \la" to \ls -a").) It then becoes straightforward to coare the arguents between two coands and identify equivalent atterns. This can be further extended by dividing each harguenti into ha-stubi and ha-exti e.g., \foo.tex" becoes \foo" and \tex"). For exale, a coand sequence could be arsed as follows: Original vi foo.tex latex foo.tex dvis foo.dvi gv foo.s Parsed vi foo.tex latex harg i dvis harg? STUB i.dvi gv harg? STUB i.s Parsing the coand lines identies generalities that ay or ay not be correct. 8 For instance, after the shell had been trained on the above exale, if a user then enters \vi /etc/hosts" the redicter ay then suggest \latex /etc/hosts", which is not very likely to be correct. Further suose that \vi /etc/hosts" had occurred, followed by ing otherhost. In the odel we ileent, the shell can identify relationshis such as this uch ore readily if it does not arse the coand lines. By arsing the coand lines, we end u with a lossy data coression. The average accuracy for arsed coand lines is 43.8%. (accuracy?00 score of 44.0%). Aarently, the benets of knowing what to do when seeing \vi bar.tex" are outweighed by the loss of individual atterns. Ex#4. Predicting Coand Lines fro Coand Lines and Error Codes. All Unix coands have a return code, tyically an error code fro within the rogra. Moreover, note that the next coand is often be deendent on whether or not the revious coand succeeded. For exale, if coilation is successful, users will tyically execute the new object code. But if coilation fails, we ight exect the user to either run a debugger, or edit the source code. We therefore decided to include this, as art of the criteria for deciding on the roer action. As the eaning of the error code deends on the coand itself, we quantizing it down to no error versus error, (read \0 versus non-0"). This also ket anagable the size of the data structure, while roviding us with a reasonable aount of inforation (5.% of the coands returned an error). However, using the error code rovides no iroveent over the basic odel roducing an accuracy of 46.9%. Why? First, any coands do not (usually) return an error. Second, the total nuber of coands likely to follow a given coand is relatively low. As we were redicting the to ve coands, we found that the coands with a atching error code are likely to be listed, anyway (by erhas earlier). Ex#5. Using Day of Week and Tie of Day. We had anticiated that knowing the day of the week and/or the tie of day (orning, afternoon, evening, night) would be helful, guring that eole work in dierent odes during the daytie versus nighttie; or between week-days and week-ends. We found, however, 8 Note that this arsing inforation could also be useful if we later decide to generate scrits, as it can hel distinguish the \variables" fro the \constants".

8 Grou nae Predictability # subject #Cds non-rograers ,608 novice rograers ,43 exerienced gs ,906 couter scientists ,69 Table : Greenberg's DataSet that it did not hel in general: as the table shows, this inforatoin caused the average accuracy to go down slightly by about 0.5%. This ay be because the granularity used is too coarse and so this coutation ends u dulicating P ( t+ j t ). Ex#6. Predicting Coand Lines fro Multile Coand Lines. Identifying a long-ter trend for redicting the next coand ight be ore eective. By using the last two coands, we get 36.9% accuracy for coand lines and 68.8% accuracy for coand stubs. (Here, we just ket the best n = 000 revious-coand-airs, and used the in the sae way we had used revious-single-coands.) Note that this coand line accuracy is worse than the nave aroach that sily redicts the revious ve coands! Ex#7. Predicting Coand Stubs fro Coand Lines. Above we sought ways to to irove on the rediction rate for coand lines. We ight be able to use soe of these ideas to irove the accuracy of redicting coand stubs. By using the additional inforation in a coand line, the list of ossible hcoand? stubsi ay be reduced (hoefully reducing the chance of error). Unfortunately, we then lose the generality for coands that have not occurred before, and the coand stub accuracy dros to 68.7%. Ex#8. Predicting Coand Stubs fro Coand Stubs and Error Codes. Although using the error code had relatively little iact on redicting coand lines fro coand lines, it causes coand stub rediction accuracy to dro slightly 7.6%. This suggests that the error code ight not contribute any ractical inforation with the current odel; it but ay still be useful in future work. Ex#9. Predictability of Dierent Classes of Users. As entioned earlier, the Greenberg data was originally used to learn to classify each couter user into one of the four categories shown in Table. We see clearly that novice rograers are by far the ost redictable, and couter scientists, the least. 9 A 9 It is interesting to seculate on why: novices robably know relatively few coands (which ilies a saller set of coands to redict fro); and couter scientists are always trying out new things and in articular, new coand and new sequences. later syste ay be able to exloit this inforation, in heling to set u a user role, or whatever. (The table's two coluns indicate the break-down of the data: how any users were of each categories, and how any coands, total, were fro each category.) 5 Contributions, and Future Work Our results, suarized in Table 4, reinforce the Davison/Hirsh clai that it is ossible to redict user actions, using a fairly sile and ecient algoriths. Moreover, the accuracy is high enough to lead to a ractical, usable syste. While the accuracy is not as high as we would like, it has roven surrisingly dicult to irove on the accuracy score. Perhas this shows that we have, in fact, achieved the inherent redictability of the data i.e., eole truly are rando (to this degree), or at least, we aear to be, given the available data. This last thee, in turn, suggests that we should consider other sources of inforation, to better cature the context. For exale, any users use ultile windows siultaneously (e.g., one for editing and one for coiling). Moreover, today's window anagers (e.g., fvw) allow users to execute alications without tying. Obtaining inforation about when these events occur is also iortant. Finally, external events have an iact on what a user will do. Identifying events such as eail arrival, or high load averages, should also be considered. Of course, our long-ter goals are not sily saving keystrokes for the sall oulation of eole that use Unix-style shells. Instead, our goal is to obtain a better understand of techniques for redicting future user interactions, in the hoe of using such technologies to irove other interfaces erhas for coon software roducts such as Word or PowerPoint. We susect that we will be able to use these, or related, techniques not just to redict the coands, but also to detect atterns of the user interactions, and use this to rovide a truly helful assistant uch in the line as the Microsoft \Oce Assistant", but one that is adative to the individual users. (E.g., that can deterine when the user doesn't want to be bothered, or that soe secic user tyically enjoys hearing new hints, or... ) Sile, yet owerful, interfaces are clearly iortant today, given the vast nuber of interactive alication rogras. As these alications scale u, eective interfaces ay becoe even ore essential. We anticiate that adative interfaces, caable of roducing interfaces that users will be willing to use, will be a ajor tool used in building eective interfaces. We hoe the results resented in this aer will hel future researchers better focus on the relevant asects of this task. Finally, any reader who wishes to be art of the subsequent studies (and then to one of

9 the rst to rea the eventual benets of this adative shell) should read the aterial in htt:// Acknowledgeents We would like to thank Saul Greenberg for his dataset, which recorded traces of 68 users; without that data, our ain study would not have been ossible. Portions of this aer were adated fro work done with Thoas Jacob. Greiner was suorted, in art, by NSERC. References [BD77] Peter J. Bickel and Kjell A. Doksu. Matheatical Statistics: Basic Ideas and Selected Toics. Holden-Day, Inc., Oakland, 977. [DH97] Brian D. Davison and Hay Hirsh. Toward an adative coand line interface. In Advances in Huan Factors/Ergonoics, ages 505{508. Elsevier, 997. [DH98] Brian D. Davison and Hay Hirsh. Predicting sequences of user actions. In Predicting the Future: AI Areaches to Tie-Series Analysis, ages 5{. AAAI Press, July 998. WS [Gre88] Saul Greenberg. Using unix: Collected traces of 68 users. Research Reort 88/333/45, Deartent of Couter Science, University of Calgary, Calgary, Alberta, 988. [HBH + 98] Eric Horvitz, Lack Breese, David Heckeran, David Hovel, and Koos Roelse. The luiere roject: Bayesian user odeling for inferring the goals and needs of software users. In UAI-98, ages 56{65, July 998. [Lan97] Pat Langley. Machine learning for adative user interfaces. In Geran Articial Intelligence, ages 53{6, 997. Gerany: Sringer. [SH93] J. C. Schlier and L. A. Herens. Software agents: Coleting atterns and constructing user interfaces. JAIR, :6{89, Noveber 993.

EXTENDED SVD FLATNESS CONTROL. Per Erik Modén and Markus Holm ABB AB, Västerås, Sweden

EXTENDED SVD FLATNESS CONTROL. Per Erik Modén and Markus Holm ABB AB, Västerås, Sweden EXTENDED SVD FLATNESS CONTROL Per Erik Modén and Markus Hol ABB AB, Västerås, Sweden ABSTRACT Cold rolling ills soeties do not see able to control flatness as well as exected, taking into account the nuber

More information

I n many cases, the SPRT will come to a decision with fewer samples than would have been required for a fixed size test.

I n many cases, the SPRT will come to a decision with fewer samples than would have been required for a fixed size test. STATGRAPHICS Rev. 9/6/3 Sequential Saling Suary... Data Inut... 3 Analysis Otions... 3 Analysis Suary... 5 Cuulative Plot... 6 Decision Nubers... 9 Test Perforance... O. C. Curve... ASN Function... Forulas...

More information

A Fail-Aware Datagram Service

A Fail-Aware Datagram Service A Fail-Aware Datagra Service Christof Fetzer and Flaviu Cristian christof@research.att.co, htt://www.christof.org Abstract In distributed real-tie systes it is often useful for a rocess to know that another

More information

Recap Consistent cuts. CS514: Intermediate Course in Operating Systems. What time is it? But what does time mean? Drawing time-line pictures:

Recap Consistent cuts. CS514: Intermediate Course in Operating Systems. What time is it? But what does time mean? Drawing time-line pictures: CS514: Interediate Course in Oerating Systes Professor Ken iran Vivek Vishnuurthy: T Reca Consistent cuts On Monday we saw that sily gathering the state of a syste isn t enough Often the state includes

More information

A Fail-Aware Datagram Service

A Fail-Aware Datagram Service A Fail-Aware Datagra Service Christof Fetzer and Flaviu Cristian christof@research.att.co, htt://www.christof.org Abstract In distributed real-tie systes it is often useful for a rocess Ô to know that

More information

New method of angle error measurement in angular artifacts using minimum zone flatness plane

New method of angle error measurement in angular artifacts using minimum zone flatness plane Alied Mechanics and Materials Subitted: 04-05-4 ISSN: 66-748, Vols. 599-60, 997-004 Acceted: 04-06-05 doi:0.408/www.scientific.net/amm.599-60.997 Online: 04-08- 04 Trans Tech Publications, Switzerland

More information

Analysis of a Biologically-Inspired System for Real-time Object Recognition

Analysis of a Biologically-Inspired System for Real-time Object Recognition Cognitive Science Online, Vol.3.,.-4, 5 htt://cogsci-online.ucsd.edu Analysis of a Biologically-Insired Syste for Real-tie Object Recognition Erik Murhy-Chutorian,*, Sarah Aboutalib & Jochen Triesch,3

More information

On-Chip Interconnect Implications of Shared Memory Multicores

On-Chip Interconnect Implications of Shared Memory Multicores On-Chi Interconnect Ilications of Shared Meory Multicores Srini Devadas Couter Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology 1 Prograing 1000 cores MPI has

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Spatial interference encoding patterns based super resolved photoacoustic microscopy

Spatial interference encoding patterns based super resolved photoacoustic microscopy Satial interference encoding atterns based suer resolved hotoacoustic icroscoy Aihai Meiri 1, Eric M. Stroh 2, Michael C. Kolios 2 and Zeev Zalevsky 1 1 Faculty of Engineering and the Nano Technology Center,

More information

A Preliminary Study of Maximum System-level Crosstalk at High Frequencies for Coupled Transmission Lines

A Preliminary Study of Maximum System-level Crosstalk at High Frequencies for Coupled Transmission Lines A Preliinary tudy of Maxiu yste-leel Crosstalk at High Frequencies for Couled Transission Lines iaoeng Dong, Haixiao Weng, Daryl G Beetner Todd Hubing Electroagnetic Coatibility Laboratory Uniersity of

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering

An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering An Enseble of Adative euro-fuzzy Kohonen etworks for Online Data Strea Fuzzy Clustering Zhengbing Hu School of Educational Inforation Technology Central China oral University Wuhan China Eail: hzb@ail.ccnu.edu.cn

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Interactive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference

Interactive Fuzzy Modeling by Evolutionary Multiobjective Optimization with User Preference Interactive Fuzzy Modeling by Evolutionary Multiobjective Otiization with User Preference Yusue ojia, Hisao Ishibuchi Deartent of Couter Science and Intelligent Systes, Osaa Prefecture University - Gauen-cho,

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Single Degree-of-Freedom Rigidly Foldable Cut Origami Flashers

Single Degree-of-Freedom Rigidly Foldable Cut Origami Flashers Robert J. Lang Lang Origai, Alao, CA 9507 e-ail: robert@langorigai.co Sencer Magleby Deartent of Mechanical Engineering, Brigha Young University, Provo, UT 860 e-ail: agleby@byu.edu Larry Howell Deartent

More information

Sage Estimating (formerly Sage Timberline Estimating) Getting Started Guide. Version has been retired. This version of the software

Sage Estimating (formerly Sage Timberline Estimating) Getting Started Guide. Version has been retired. This version of the software Sage Estimating (formerly Sage Timberline Estimating) Getting Started Guide Version 14.12 This version of the software has been retired This is a ublication of Sage Software, Inc. Coyright 2014. Sage Software,

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Sage Estimating. (formerly Sage Timberline Estimating) Getting Started Guide

Sage Estimating. (formerly Sage Timberline Estimating) Getting Started Guide Sage Estimating (formerly Sage Timberline Estimating) Getting Started Guide This is a ublication of Sage Software, Inc. Document Number 20001S14030111ER 09/2012 2012 Sage Software, Inc. All rights reserved.

More information

Measuring Bottleneck Bandwidth of Targeted Path Segments

Measuring Bottleneck Bandwidth of Targeted Path Segments Measuring Bottleneck Bandwidth of Targeted Path Segents Khaled Harfoush Deartent of Couter Science North Carolina State University Raleigh, NC 27695 harfoush@cs.ncsu.edu Azer Bestavros Couter Science Deartent

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

A Novel Architecture for Compiled-type Software CNC System

A Novel Architecture for Compiled-type Software CNC System Key Engineering Materials Online: 2007-05-15 ISSN: 1662-9795, ol. 339, 442-446 doi:10.4028/.scientific.net/kem.339.442 2007 rans ech Pulications, Sitzerland A Novel Architecture for Coiled-tye Softare

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory

Performance analysis of hybrid (M/M/1 and M/M/m) client server model using Queuing theory International Journal of Electronic and Couter cience Engineering vailable Online at wwwijeceorg IN- 77-9 erforance analyi of hybrid M/M/ and M/M/ client erver odel uing ueuing theory atarhi Guta, Dr Rajan

More information

An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks

An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks Zhou et al. EURASIP Journal on Wireless Counications and Networking 2014, 2014:163 htt://jwcn.eurasijournals.co/content/2014/1/163 RESEARCH Oen Access An energy-efficient rando verification rotocol for

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

COMP 250. Lecture 4. Array lists. Sept. 15, 2017

COMP 250. Lecture 4. Array lists. Sept. 15, 2017 COMP 25 Lecture 4 Arra lists Set. 5, 27 Arras in Java int[ ] Ints = new int[5]; Ints[3] = -732; Arra whose eleents have a riitive te 2 Ints int[ ] Ints = new int[5]; Ints[3] = -732; 2 3 : 4-732 : Arras

More information

Near Light Correction for Image Relighting and 3D Shape Recovery

Near Light Correction for Image Relighting and 3D Shape Recovery Near Light Correction for Iage Relighting and 3D Shae Recovery Anonyous for Review Abstract In this aer, we roose a near-light illuination odel for iage relighting and 3D shae recovery Classic ethods such

More information

Markov Analysis for Optimum Caching as an Alternative to Belady s Algorithm

Markov Analysis for Optimum Caching as an Alternative to Belady s Algorithm arov Analysis for Otiu Caching as an Alternative to Belady s Algorith, Deutsche Teleo, Darstadt, Gerany gerhard.hasslinger@teleo.de Analytic Results on LRU, LFU, Otiu Caching Belady s Princile for Otiu

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Performance Analysis and QoE-aware Enhancement for IEEE e EDCA under Unsaturations

Performance Analysis and QoE-aware Enhancement for IEEE e EDCA under Unsaturations Perforance Analysis and QoE-aware Enhanceent for IEEE 80.11e EDCA under Unsaturations Yueying Zhang, Wei Li, Junlong Zhang, Hang Long, Wenbo Wang Wireless Signal Processing and etwork Lab Key laboratory

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

CLOUD computing is quickly becoming an effective and

CLOUD computing is quickly becoming an effective and IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 203 087 Otial Multiserver Configuration for Profit Maxiization in Cloud Couting Junwei Cao, Senior Meber, IEEE, Kai Hwang, Fellow,

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

cm3520 cm3525 Security Function

cm3520 cm3525 Security Function wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September ISSN International Journal of Scientific & Engineering Research, Volue 6, Issue 9, Seteber-05 9 ISSN 9-558 Doinating Sets Of Divisor Cayley Grahs G. Mirona, Prof. B. Maheswari Abstract Let n be an integer and

More information

Group MRF for fmri Activation Detection

Group MRF for fmri Activation Detection Grou MRF for fmri Activation Detection Bernard Ng, Rafeef Abugharbieh The University of British Colubia 9 West Mall, Vancouver, BC VT Z bernardn@ece.ubc.ca, rafeef@ece.ubc.ca htt://bisicl.ece.ubc.ca Ghassan

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Image Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK.

Image Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK. Iage Processing for fmri John Ashburner Wellcoe Trust Centre for Neuroiaging, 12 Queen Square, London, UK. Contents * Preliinaries * Rigid-Body and Affine Transforations * Optiisation and Objective Functions

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Of the 43 U.S. presidents, two share a birthday (same month and day). The

Of the 43 U.S. presidents, two share a birthday (same month and day). The Section 6.4 ProducttoSum and SumtoProduct Formulas 69 Objectives Section 6.4 Use the roducttosum Use the sumtoroduct ProducttoSum and SumtoProduct Formulas James K. Polk Born November, 795 Warren G. Harding

More information

The Boundary Between Privacy and Utility in Data Publishing

The Boundary Between Privacy and Utility in Data Publishing The Boundary Between Privacy and Utility in Data Publishing Vibhor Rastogi Dan Suciu Sungho Hong ABSTRACT We consider the privacy proble in data publishing: given a database instance containing sensitive

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER nd International Congress of Mechanical Engineering (COBEM 3) Noveber 3-7, 3, Ribeirão Preto, SP, Brazil Copyright 3 by ABCM PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

A Measurement Study of Internet Bottlenecks

A Measurement Study of Internet Bottlenecks A Measurement Study of Internet Bottlenecks Ningning Hu, Li (Erran) Li y, Zhuoqing Morley Mao z, Peter Steenkiste and Jia Wang x Carnegie Mellon University, Email: fhnn, rsg@cs.cmu.edu y Bell Laboratories,

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

Sage Document Management Version 17.1

Sage Document Management Version 17.1 Sage Document Management Version 17.1 User's Guide This is a ublication of Sage Software, Inc. 2017 The Sage Grou lc or its licensors. All rights reserved. Sage, Sage logos, and Sage roduct and service

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Swinburne Research Bank

Swinburne Research Bank Powered by TCPDF (www.tcdf.org) Swinburne Research Bank htt://researchbank.swinburne.edu.au Author: Isla, Md. Saiful; Liu, Chengfei; Rahayu, Wenny; Anwar, Tariue Title: Q lus Tree: An efficient Quad Tree

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Sage Estimating. (formerly Sage Timberline Estimating) Options Guide

Sage Estimating. (formerly Sage Timberline Estimating) Options Guide Sage Estimating (formerly Sage Timberline Estimating) Otions Guide This is a ublication of Sage Software, Inc. Document Number 1112ER 09/2012 2012 Sage Software, Inc. All rights reserved. Sage, the Sage

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density Tracing Multile Targets Using a Particle Filter Reresentation of the Joint Multitarget Probability Density Chris Kreucher, Keith Kastella, Alfred Hero This wor was suorted by United States Air Force contract

More information

Trigonometric Functions

Trigonometric Functions Similar Right-Angled Triangles Trigonometric Functions We lan to introduce trigonometric functions as certain ratios determined by similar right-angled triangles. By de nition, two given geometric gures

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information