preface preface
play

Preface Preface As we walk, our locomotion reveals our - PowerPoint PPT Presentation

Preface Preface As we walk, our locomotion reveals our destinations. As we talk, our speech reveals our intentions. As we gesture, our motions reveal our thoughts. As we read, our gaze reveals our focus of attention. As we type, our keystrokes


  1. Preface Preface As we walk, our locomotion reveals our destinations. As we talk, our speech reveals our intentions. As we gesture, our motions reveal our thoughts. As we read, our gaze reveals our focus of attention. As we type, our keystrokes reveal our intentions. As we surf the web, our clicks reveal our interests. Jon Orwant - DOPPELGÄNGER PROJECT [Orwant, 1995] Trier, July 10 th , 2005 IGK Annual Research Meeting

  2. Ubiquitous User Modeling Ubiquitous User Modeling Dominik Heckmann Supervisors: Wolfgang Wahlster & Jon Oberlander IGK Annual Research Meeting Trier, July 10th, 2005 Trier, July 10 th , 2005 IGK Annual Research Meeting

  3. Outline of the Talk Outline of the Talk • Part 1: (Motivating Questions) – What is user modeling? – Why de we need ubiquitous user modeling? – How to define ubiquitous user modeling? • Part 2: (Engeneering Questions) – How do we realize ubiquitous user modeling? – What are the problems and the contributions? – What is the overall service architechture like? Trier, July 10 th , 2005 IGK Annual Research Meeting

  4. Comparison of Human-Human vs. HCI Comparison of Human-Human vs. HCI User Modeling and User-Adaptivity User Modeling and User-Adaptivity Human-human interaction H1 age, gender, mother language B A User model their B A cognitive load, time pressure, emotion interaction partner mood, clothes, plans, knowledge H2 We adapt vocabulary (age) User show A B We adapt speech volume (noise) A B adaptive behavior We adapt speech rate (time pressure) Human-computer interaction H3 Systems model A A their users: User Model User Modeling Context Model H4 Systems adapt Situation Model to their users: A A User-Adaptivity Trier, July 10 th , 2005 IGK Annual Research Meeting

  5. Why Ubiquitous User Modeling? Why Ubiquitous User Modeling? More and more interactions take place between humans and different stationary, mobile or web-connected IT-systems in daily life. There is a shift from the „desktop metaphor“ to the metaphors of „mobile computing“, „ubiquitous computing“ and „intelligent environments“ If we manage to integrated all distributed, user-related assumptions (that are currently applied by these systems individually) into one consistent model, then we could expect several improvements We expect that ongoing evaluation of user behavior with systems that share their user models will improve the coverage, the level of detail, and the reliability of the integrated user models (and thus allow better functions of adaptation) Trier, July 10 th , 2005 IGK Annual Research Meeting

  6. Motivating Example for Ubiquitous User Motivating Example for Ubiquitous User Modeling in the Airport Scenario Modeling in the Airport Scenario Pedestrian Shopping Restaurant Adaptive Variety of Pedestrian Shopping Restaurant Adaptive Navigation Guide Guide Hypertext Applications Navigation Guide Guide Hypertext Variety of Situations Office Airport Hotel Variety of Rest Rest Environments Shop Airplane TV Shop Airplane TV Room Room Info Terminal Variety of Info Terminal WWW WWW Gate WWW WWW Gate Kiosk Hall Kiosk Locations Hall Variety of Adaptive Product Adaptive Location-based Adaptive Product Adaptive Location-based Adaptive Adaptive Adaptation Dialogue Recommen- (Airport) Information Dialogue Recommen- (Airport) Information Web-Sites Web-Sites Functionality Interaction dation Navigation Presentation Interaction dation Navigation Presentation Trier, July 10 th , 2005 IGK Annual Research Meeting

  7. How do we define How do we define Ubiquitous User Modeling? Ubiquitous User Modeling? Definition (Ubiquitous User Modeling) Ubiquitous user modeling describes ongoing modeling and exploitation of user behavior with a variety of systems that share their user models for mutual or individual adaptation goals. • Ubiquitous user modeling can be differentiated between general user modeling by the three additional concepts: ongoing modeling, ongoing sharing and ongoing exploitation. • Ubiquitous user modeling implies that the user’s behavior and the user’s state are constantly tracked at any time, at any location and in any interaction context � important need for privacy control ! Trier, July 10 th , 2005 IGK Annual Research Meeting

  8. (Generalize the example into a) Conceptual View (Generalize the example into a) Conceptual View to Ubiquitous User Modeling to Ubiquitous User Modeling 1 . 2 . 3 . IT System with IT System with IT System with IT System with IT System with IT System with User Modeling User Modeling User Modeling User Modeling UserQL / UserML User Modeling UserQL / UserML User Modeling UserQL / UserML UserQL / UserML Component Component Component Component Component Component Sharing Sharing Modeling & Exploitation Exploitation Modeling User User User User User User User Behaviour, User State, User Context, User Interests, User Knowledge, User Plans User Behaviour, User State, User Context, User Interests, User Knowledge, User Plans Trier, July 10 th , 2005 IGK Annual Research Meeting

  9. PART 2: PART 2: Tasks, Design Decisions and Methods Tasks, Design Decisions and Methods • Main Tasks – Enable user model exchange and knowledge-sharing between user- adaptive systems on the web and within instrumented environments – Enable facilities for the user to inspect and control the represented and exchanged user-related data • Main Design Decisions – Support decentralization, inconsistencies, conflict resolution – Support scrutability, modularity, clearity, external ontologies • Main developed Methods – Relation-based user model representation: SituationalStatements – RDF-based user model exchange language: UserML, UserQL – OWL-based user model ontology: GUMO, UbisWorldOntology – Web-based user model tools: UserModelEditor, UbisBrowser, OntologyEditor, OntologyTreeBrowser, LocationMonitor, … – Service-based user model broker: www.u2m.org Trier, July 10 th , 2005 IGK Annual Research Meeting

  10. What will be exchanged? What will be exchanged? SituationalStatement Mainpart + Meta Data = SituationalStatement Mainpart + Meta Data = „Peter ist under high time pressure“ Which meta data is interesting mainpart for distributed and ubiquitous user modeling? situation When and how long is the statement valid? explanation Where is Peter under time pressure? privacy Who claims this and which explanation is given? What is the evidence and the confidence? administration Who is the owner of this information? What are the privacy settings? How can the statement be uniquely identified? Can the statement be grouped with others? Trier, July 10 th , 2005 IGK Annual Research Meeting

  11. Situational Statement / Box Situational Statement / RDF-XML Mainpart <rdf:RDF SituationalStatement SituationalStatement xmlns:rdf=“http://www.w3.org/1999/02/22-rdf-syntax#“ Subject = Peter xmlns:st=“http://www.u2m.org/2003/situation#“ Auxiliary = hasProperty xml:base=“http://www.u2m.org/2003/statements“> Predicate = timePressure <rdf:Description rdf:ID=“statement_XY“> Range = low-medium-high <st:subject> A1 </st:subject> Object = high <st:auxiliary> A2 </st:auxiliary> Situation <st:predicate> A3 </st:predicate> Start = 2005-04-16T19:15 <st:range> A4 </st:range> End = 2005-04-16T19:25 <st:object> A5 </st:object> Durability = few minutes <st:start> A6 </st:start> Location = airport.dutyfree mainpart <st:end> A7 </st:end> Position = x34-y22-z15 <st:durability> A8 </st:durability> Explanation <st:location> A9 </st:location> <st:position> A10 </st:position> Source = peter.repository situation <st:source> A11 </st:source> Creator = airport.inference <st:creator> A12 </st:creator> Method = deduction13 <st:method> A13 </st:method> Evidence = id2, id3 explanation <st:evidence> A14 </st:evidence> Confidence = most-probably <st:confidence> A15 </st:confidence> Privacy <st:key> A16 </st:key> Key = ******** <st:owner> A17 </st:owner> privacy Owner = Peter <st:access> A18 </st:access> Access = friends-only <st:purpose> A19 </st:purpose> Purpose = research <st:retention> A20 </st:retention> administration Retention = few days <st:id> A21 </st:id> Administration <st:unique> A22 </st:unique> <st:replaces> A23 </st:replaces> id = 23 <st:group> A24 </st:group> unique = u2m.org#154123 <st:notes> A25 </st:notes> replaces = u2m.org#154006 </rdf:Description> group = UserModel </rdf:RDF> notes = ;-( Trier, July 10 th , 2005 IGK Annual Research Meeting

  12. Reification-based RDF Representation Reification-based RDF Representation Situational Statement / RDF Graph (Reification) Privacy P1 P2 P3 P4 Explanation s:owner s:access s:purpose s:retention E1 s:creator Mainpart (Reified) s:method E2 M2/M3/M4 s:evidence M1 M5 s:confidence E3 E4 s:start s:durability s:location s:position Situation S1 S2 S4 S3 Trier, July 10 th , 2005 IGK Annual Research Meeting

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend