Just starting to build the code that will form the foundation of the recognizer. Here’s version 1: http://philfeldman.com/Recognizer1.html
Eugene Higgins Professor of Computer Science
If you’re going to remember one(?) thing:
Think of influence systems as a brand of networks that perpetually rewire themselves emergently – a broad family of multiagent models arising in social dynamics. The idea is to reach beyond numerical simulation to analyze the structure and interactions of biological systems. This article focuses on how algorithmic ideas can enrich our understanding of nature. Examples of in uence systems include the Ising model, neural nets, Bayesian social learning, protein-protein interaction networks, population dynamics, etc.
By “natural algorithms,” I mean the myriad of algorithmic processes evolved by nature over millions of years. Just as dierential equations have given us the tools to explain much of the physical world, so natural algorithms will help us model the living world and make sense of it.
Natural algorithms are quickly becoming the language of choice to model biological and social processes. And so algorithms, broadly construed, are both science and engineering.
Instead of identical particles subject to the same forces, the life sciences feature autonomous agents, each one with its own idea of what laws to obey. It is a long way, scientically speaking, from planets orbiting the sun in orderly fashion to unruly slime molds farming bacterial crops.
What is complexity? Such is the appeal of the word “complexity” that it comes in at least four distinct flavors.
- Semantic: What is hard to understand. For 99.99% of mankind, complex means complicated.
- Epistemological: What is hard to predict. An independent notion altogether: complex chaotic systems can be simple to understand while complicated mechanisms can be easy to predict.
- Instrumental: What is hard to compute, the province of theoretical computer science.
- Linguistic: What is hard to describe. Physics has low descriptive complexity|that’s part of its magic. By contrast, merely specifying a natural algorithm may require an arbitrarily large number of variables to model the diversity present in the system. To capture this type of complexity is a distinctive feature of natural algorithms.
A few words about our agent-based approach. Consider the diusion of pollen particles suspended in water. A Eulerian approach to this process seeks a dierential equation for the concentration c(x; t) of particles at any point x and time t. There are no agents, just density functions evolving over time . An alternative approach, called Lagrangian, would track the movement of all the individual particles and water molecules by appealing to Newton’s laws. Given the sheer number of agents, this line of attack crashes against a wall of intractability. One way around it is to pick a single imaginary self-propelled agent and have it jiggle about randomly in a Brownian motion. This agent models a typical pollen particle – typical in the “ergodic” sense that its time evolution mimics the space distribution of countless particles caught on film in a snapshot. Scaling plays a key role: our pollen particles indeed can be observed only on a time scale far larger than the molecular bumps causing the jiggling. Luckily, Brownian motion is scale-free, meaning that it can be observed at any scale. As we shall see, the ability to express a dynamical process at different scales is an important feature of influence systems.
The strength of the Eulerian approach is its privileged access to an advanced theory of calculus. Its weakness lies in two commitments: global behavior is implied by innitesimal changes; and every point is subject to identical laws. While largely true in physics, these assumptions break down in the living world, where diversity, heterogeneity, and autonomy prevail. Alas, the Lagrangian answer, agent-based modeling, itself suffers from a serious handicap: the lack of a theory of natural algorithms.
Rudi L. Cilibrasi (acm)
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 19, NO 3, MARCH 2007, 370–383
If you’re going to remember one(?) thing:
Semantic cognition using algorithms appears to be possible.
Running code is available for download at http://www.complearn.org
A way of using search engine results to compute a semantic relationship between any two (n?) items. It basically uses Information Distance / Kolmogorov Complexity to determine similarity. From the paper:
While the theory we propose is rather intricate, the resulting method is simple enough. We give an example: At the time of doing the experiment, a Google search for “horse”, returned 46,700,000 hits. The number of hits for the search term “rider” was 12,200,000. Searching for the pages where both “horse” and “rider” occur gave 2,630,000 hits, and Google indexed 8,058,044,651 web pages. Using these numbers in the main formula (III.3) we derive below, with N = 8, 058, 044, 651, this yields a Normalized Google Distance between the terms “horse” and “rider” as follows:
NGD(horse, rider) ≈ 0.443.
In the sequel of the paper we argue that the NGD is a normed semantic distance between the terms in question, usually (but not always, see below) in between 0 (identical) and 1 (unrelated), in the cognitive space invoked by the usage of the terms on the world-wide-web as filtered by Google.
This really sounds like a usable model of cognition. For example:
For us, the Google semantics of a word or phrase consists of the set of web pages returned by the query concerned. Note that this can mean that terms with different meaning have the same semantics, and that opposites like ”true” and ”false” often have a similar semantics. Thus, we just discover associations between terms, suggesting a likely relationship.
CSCW 2014 • The Office
Bran Knowles – Lancaster University, Lancaster (acm)
Mike Harding – Lancaster University, Lancaster (acm)
Lynne Blair – Lancaster University, Lancaster (acm)
Nigel Davies – Lancaster University, Lancaster (acm)
James Hannon - InTouch Ltd (acm)
Mark Rouncefield – Lancaster University, Lancaster (acm)
John Walden – InTouch Ltd, (acm)
An ethnographic study of gully cleaners ‘Gangers’ and examination of an app that supports their actions and management. Computer-Mediated communication allows for the creation of a trusting environment that supports more flexibility and higher productivity, as opposed to the enforcement of rules, an essentially political approach. Very nicely written and easy to read.
Things to Remember
A key challenge is to collect, at the outset, accurate data in which organizations can place significant trust. This trusted data, as we will show, links with a range of other important qualities to do with successful completion and management of work, and can change for the better the way business process is organized.
We adopt a definition of trust fitting with [D. Gambetta. Can we trust trust. Trust: Making and breaking cooperative relations], i.e. trust is a subjective assessment of reliability, and we explore trust specifically as it relates to ‘trusted data’ in the context of developing quality systems.
In our fieldwork studies we paid attention to the social process of trust production, to specify the social mechanisms which generate trust and to examine and document the various ways in which trust is woven into the fabric of everyday organizational life as part of the taken for granted moral order 
What seems especially notable in highway maintenance work, an observably physically demanding job, is the sheer amount of paperwork involved. Documents seem to enable trust in part by creating a ‘stratified trace’ of the orderliness of activities. A document provides history, in this case of a stretch of road; but that historical record is only trustworthy as a result of lower level instantiations of trust: trust in location, trust in the represented order of events, and so on. A document further acts as a coordinating device, and trust placed in that document can be translated into an appropriate organizational formulation.
By allowing workers to add ‘frequency prediction’ information to an asset. More specifically, when a gully is collected/cleaned the user can select from a drop down menu how soon they think it will need to be cleaned again. (Prediction is a great way to develop trust!)
We contend there is an important distinction between accurate data and trusted data. While accuracy is a prerequisite of trusted data, it does not guarantee it; data can be accurate and still not be trusted.
We believe that a similar approach, i.e. trustworthy by design, is required for building trusted data-gathering systems. In ‘The Mechanics of Trust: A Framework for Research and Design,’ Rieselsberger et al  argue that: “If we are to realize the potential of new technologies for enabling new forms of interactions without these undesirable consequences, trust and the conditions that affect it must become a core concern of systems development. The role of systems designers and researchers is thus not one of solely increasing the functionality and usability of the systems that are used to transact or communicate, but to design them in such a way that they support trustworthy action and — based on that — well-placed trust.”
Eight key principles:
1) Security: Trusted data capture must necessarily be underpinned by a secure infrastructure, e.g. it must include measures that ensure tamper resistance.
2) Performance: Systems—both devices and web portals—must be quick and easy to use in order to encourage users to amend data as necessary.
3) Provenance: The system must enable users to trace the source of any data capture and amendment activity in a way that aids verification of the validity of that activity.
4) Translucency: Users must be able to see all relevant data that would help them undertake their work, but no more.
5) Flexibility: The system must allow users to adjust data when the device is unable to deliver accuracy, e.g. if an obstruction prevents the user from positioning the device over the asset.
6) Value to users: The system must be designed to deliver value to the user—as opposed to a model that treats users as ‘dumb sensors’—to ensure they benefit from producing accurate data.
7) Empowerment: The system must bring people ‘into the loop’ and engage their knowledge and intelligence toward a shared goal, such as increasing the quality and ease of work.
8) Competence: In empowering people and giving them responsibility, the system must build in assurances that users will succeed, e.g. facilitating the submission of all necessary data.
…little attention has been paid to the quality of data captured by mobile workers. If this data is inaccurate or untrustworthy, serious consequences can ensue. In this paper we study a system targeted at mobile workers in the highways sector that is deliberately designed to increase the accuracy and trustworthiness of the data collected.
This paper explores the elements of design that enable accurate, and above this, trusted data collection in this domain, with a view toward applying these more generally to other mobile data capture domains.
Trusted data is also critical in a wide range of domains such as health, policing, environmental monitoring, surveying and disaster management where inaccurate or untrustworthy data from the field can have serious consequences.
We use trust as an analytical lens for reflecting on lessons learned from our experience in creating a successful mobile asset collection system, and from this, develop several principles of successful system design that can be applied to a range of domains.
In recent years there has been an increased interest in smartphones for data capture, though many of these studies focus on data capture for purposes of crowdsourcing and participatory sensing [6, 20], experience capture , feedback , etc., in which accuracy and trust play a less critical role.
In the process, is it possible to identify the important role of trust in such organizational work, how people ‘perform’ trust, how it is instantiated in various paper and electronic documents and how it enters into everyday work through aspects of planning, coordination and awareness.
Our exploration of issues of trust in road maintenance began by identifying several different stakeholders or parties (or ‘users’) between whom and for whom issues of trust arise.
The (ongoing) fieldwork reported here was carried out by two ethnographers at seven different sites in the UK over the course of a year and amounted to approximately 70 interviews (of differing durations) and approximately three months worth of observation. Interviews were transcribed and fieldnotes typed up and examined for broad, recurring themes which acted not as precursors to the development of theory but as broad requirements for design.
Like ‘the boy who cried wolf’, contractors may over time be less inclined to take seriously the deadlines set by the council, potentially increasing the chance of instances of unreliability with more damaging consequences to accrued trust. In contrast, were the council to trust contractors, efficiency would result as a natural consequence of empowering people who are best able to make decisions, thereby catalyzing a virtuous circle of trust.
mobile data capture system intended to increase trust between various parties:
- Supporting the identification and persistent storage of evidence.
- Understanding and graphing the complexity of interdependent processes and relationships to deliver on organizational assertions.
- Providing trust warnings in the form of data visualizations and inline user interfaces to involved stakeholders.
- Visualizing the impact of individuals’ actions throughout the system and process.
Gangers work to a cyclical cleaning regimen, which they follow blindly. While this approach does enable thorough, systematic cleaning of the council’s gullies, it is highly inefficient, since many gullies do not actually require cleaning. Furthermore, and in terms of trust, while it is easy to fall short of expectations, it is not particularly easy to exceed expectations.
The ethnographic fieldwork we conducted for gullies was intended not only to reveal further insight into trust, but also, more fundamentally, to capture requirements for our system design.
In addition to position, users capture a range of data about the state of the gully including reports of any damage and a photograph of the current state of the gully.
This support for reinspections, which is the principle advance from second to third generation asset collection, enables users to recollect that same asset again and again, building a history of data against that asset. Users can also change any data that is incorrect by doing a recollection. They do not have to create a new inspection every time; data is pulled forward — some of which is immutable, some mutable, some blank, as appropriate
The system provides a sophisticated set of filters to enable viewers to hide irrelevant data from view. This combination of filtering and access to all the past data on local assets can transform the way highways maintenance operations are performed. In particular, it provides empowerment to the users, allowing them to be in control of their work and to choose how to carry it out, e.g. inspectors can choose to see all the gullies that they did not have time to check last time.
Some of this success can be put down to the extensive ethnographic research done up front and careful planning to attend to the needs highlighted by this research through iterative ethnographic/development cycles throughout, and the use of photographs to document, to provide a trustable record of, their work. Much of this success, however, we put down to serendipity.
We begin with a brief discussion of the affordances of our mobile data capture system and explore how these affect empowerment. Next we explore additional characteristics that contribute to system success. Finally, we conclude by discussing how all of these factors contribute toward trusted data.
Some of the affordances Inspections capitalizes on include the following:
- ‘Wizarding’: Collection and recollection both force the user to enter all mandatory data before they are able to move on.
- Pinpointing location
- Filtering data: Users can not only view relevant data, but also hide irrelevant data.
- Gathering asset histories: The system ties data collection to a specific asset, and users can continue to add information to this same asset over time.
As  notes, introducing a system into an organization entails a complex emergent dynamic between the system and what that system enables users within the organization to do. “These factors,” the authors write, “go beyond basic functionality, dialogue and representations of a technology and encompass organization culture, changes in organizations, users’ identity and power differences and their emotional, symbolic and functional values related to the technology”.
We argue that Inspections makes possible several further organizational-level affordances: 1) it empowers crews to engage their creative intelligence; 2) it empowers the organization as a whole to shift to an intelligent management model; and 3) this empowerment is enabled by — and in turn perpetuates — the fostering of trust throughout the different levels of the organization.
At the organizational level, researchers differentiate between ‘empowering organizations’ and ‘empowered organizations’: the former serves to foster psychological empowerment for individuals within that organization or otherwise influenced by that organization ; whereas the latter (‘empowered’) are those that “influence the larger systems of which they are a part” , increasing their own effectiveness in achieving goals.
Inspections makes use of crews’ previously untapped knowledge by asking them to predict the frequency of cleaning required for each gully. But further, it enables them to act on this creatively and independently, giving them the power to craft their maintenance schedules in accordance with their expertise rather than feeling like robots or slaves to inflexible routines, workers can feel competent and engaged.
Inspections, on the other hand, enables the organization to increase efficiency through strategic means while enabling the workforce to operate at a safe, healthy, realistic pace — with the added benefit that this is conducive to data accuracy. Ultimately, this has revolutionized these organizations, freeing them from a blind, cyclical cleaning regimen and enabling them to proactively target the gullies that are likely to cause unsafe road conditions.
Inspections forces users to fill in all mandatory data fields, but because the device (and the UI decisions we have made) make doing so a very quick process, users are able to complete a collection or recollection quickly, knowing that they can recollect again just as quickly if they need to make corrections.
The benefit of these metadata traces is that they enable those that manage the data (whether or not they actively manage personnel) to determine the data’s validity. We are also aware of the closer association between provenance and trust (e.g. [1, 2, 24]), which indicates that ‘provenance’ is in greater alignment with our intended design ambitions.
CSCW 2014 – Mobilizing for Action
Travis Kriplean – University of Washington (acm)
Caitlin Bonnar – University of Washington (acm)
Alan Borning – University of Washington (acm)
Bo Kinney – Seattle Public Library (acm)
Brian Gill – Seattle Pacific University (acm) <- stats guy.
A description of the development and use of a Value-Centered-Design approach to a referendum fact checking website. Users developed pro and con lists and could request a fact check, which was done by lobriarians at the Seattle Public Library.
Things to Remember
- “Our goal is to enhance public dialogue by providing authoritative information from a trusted third party.”
- “Crowdsourcing systems can benefit from reintroducing professionals and institutions that have been up to now omitted. As socio-technical architects, we should be combining old and new to create entirely new possibilities.”
- The journalistic fact-checking frame did not map smoothly to librarian reference practice.
- Clever use of simulation statistics to compensate for comment drop off as election approached.
- Librarians are very trustworthy.
- This is a second or third generation site, and is still incorporating lessons learned.
- LVG – Living Voters Guide
We explore the design space for introducing authoritative information into public dialogue, with the goal of supporting constructive rather than confrontational discourse.
We also present a specific design and realization of an archetypal sociotechnical system of this kind, namely an on-demand fact-checking service integrated into a crowdsourced voters guide powered by deliberating citizens.
Public deliberation is challenging, requiring communicators to consider tradeoffs, listen to others, seek common ground, and be open to change given evidence.
A few interfaces such as Opinion-Space  and ConsiderIt  have demonstrated that it is possible to create lightweight communication interfaces that encourage constructive interactions when discussing difficult issues.
We describe a new approach for helping discussants decide which factual claims to trust. Specifically, we designed and deployed a fact-checking service staffed by professional librarians and integrated into a crowdsourced voters guide.
It also serves as an archetype of a more general class of systems that integrate the contributions of professionals and established institutions into what Benkler  calls “commons-based peer production.”
One key design element is that the fact-checks are performed at the behest of discussion participants, rather than being imposed from outside.
To help explore design alternatives and evaluate this work, we turn to Value Sensitive Design (VSD), a methodology that accounts for human values in a principled and systematic way throughout the design process [6, 18]. As with prior work involving VSD in the civic realm , we distinguish between stakeholder values and explicitly supported values. Stakeholder values are important to some but not necessarily all of the stakeholders, and may even conflict with each other.
Explicitly supported values, on the other hand, guide designers’ choices in the creation of the system: here, the values are democratic deliberation, respect, listening, fairness, and civility.
Most commonly used communication interfaces, especially online comment boards, implicitly support liberal individualist and communitarian values through the particular interface mechanisms they provide.
Because communicative behaviors are context sensitive and can be altered by interface design [35, 38, 44], we believe we can design lightweight interfaces that gently nudge people toward finding common ground and avoiding flame wars.
In ConsiderIt, participants are first invited to create a pro/con list that captures their most important considerations about the issue. This encourages users to think through tradeoffs — a list with only pros or cons is a structural nudge to consider both sides. Second, ConsiderIt encourages listening to other users by enabling users to adopt into their own pro/con lists the pros and cons contributed by others.
Finally, a per-point discussion facility was added in the 2011 deployment to help participants drill down into a particular pro/con point and have a focused conversation about it. We call special attention to this functionality because one component of our evaluation is an examination of how the focused discussion progressed before and after factchecks.
We have run the LVG for the past three elections inWashington State, with 30,000 unique visitors from over 200 Washington cities using LVG for nearly ten minutes on average. Our analysis of behavioral data has revealed a high degree of deliberative activity; for example, 41.4% of all submitted pro/con lists included both pros and cons [17, 28, 30]. Moreover, the tone of the community discussion has been civil: although CityClub actively monitored the site for hate speech and personal attacks, less than ten out of a total of 424 comments have been removed over the three deployments.
Participants have difficulty understanding what information to trust. Content analysis of the pro/con points in 2010 found that around 60% contained a verifiable statement of fact, such as a claim about what the ballot measure would implement, or included a reference to numerical data from an external source. Anyone can state a claim, but how do others know whether that claim is accurate?
Suitable primary sources are often unavailable, and most deliberating bodies do not have the ability to commission a report from a dedicated organization like the Congressional Budget Office.
Fact-checkers produce an evaluation of verifiable claims made in public statements through investigation of primary and secondary sources. A fact-check usually includes a restatement of the claim being investigated, some context to the statement, a report detailing the results of the report, and a summative evaluation of the veracity of the claim (e.g., Politifact’s “Truth-O-Meter” ranging from “True” to “Pants-on-Fire”).
Establishing the legitimacy of fact-checks can be challenging because the format of a fact-check juxtaposes the claim and the fact-check.
Those whose prior beliefs are threatened by the result of the fact-check are psychologically prone to dismiss counter-attitudinal information and delegitimate the source of the challenging information [31, 33, 34, 46], sometimes even strengthening belief in the misinformation .
Another approach is to synthesize information available in reliable secondary sources. This differs from fact-checking in that (1) the investigation does not create new interpretations of original sources and (2) the report does not explicitly rate the veracity of the claims.
One of the main roles of librarians is to help patrons find the information they seek amidst a sometimes overwhelming amount of source material. Librarians assess the content of resources for accuracy and relevance, determine the authority of these resources, and identify any bias or point of view in the resource .
Establishing trust in the results of these crowdsourced efforts is often a challenge [7, 9], but can be accomplished to some extent by transparency of process .
Authoritative information is usually published and promoted by dedicated entities. For example, fact-checking is often provided as a stand-alone service, as with Snopes, Politifact, and factcheck.org.
Professionals facilitating a discussion can shepherd authoritative information directly into a discussion.
The ALA’s Code of Ethics , emphasizes the role of libraries in a democracy: “In a political system grounded in an informed citizenry, we are members of a profession explicitly committed to intellectual freedom and the freedom of access to information. We have a special obligation to ensure the free flow of information and ideas to present and future generations.”
The specific guidelines that the librarians settled on were: (1) We will not conduct in-depth legal or financial analysis, but we will point users to research that has already been conducted; (2) We will not evaluate the merits of value or opinion statements, but we will evaluate their factual components; (3) We will not evaluate the likelihood of hypothetical statements, but we will evaluate their factual components.
For this work, we call out the following direct stakeholders: (1) users of the Living Voters Guide, (2) authors of points that are fact-checked and (3) the reference librarians.
The primary design tension we faced was enabling LVG users to easily get a sense of which factual claims in the pro/con points were accurate (in support of deliberative values), while not making the fact-checking a confrontational, negative experience that would discourage contributors from participating again (or at all).
The service was on-demand: any registered user could request a fact-check, submitted with a brief description of what he or she wanted to have checked.
By relying on LVG participants themselves to initiate a fact-check, we hypothesized that the degree of confrontation with an authority would be diffused. Further, we hoped that requests would come from supporters of the point to be checked, not just opponents — for example, a supporter (or even the author) might request a check as a way of bolstering the point’s credibility.
Each fact-check comprised (1) a restatement of each factual claim in the pro or con, (2) a brief research report for each claim, and (3) an evaluation of the accuracy of each claim.
We settled on a simple scheme of “accurate,” “unverifiable,” and “questionable.” Each of the evaluation categories was accompanied by a symbol representing the result: a checkmark for accurate, an ellipsis for unverifiable, and a question mark for questionable.
For each fact-checked pro or con, an icon representing the most negative evaluation was shown at the bottom. When a user hovered over the icon, a fact-check summary was shown (Figure 1).
The full fact-check was presented immediately below the text of the point when users drilled into the point details and discussion page
Every fact-check request generated a notification e-mail to the librarians. Librarians then logged into a custom fact-checking dashboard. The dashboard listed each point where a user had requested a fact-check, showing the fact-check status (e.g. completed), which librarian was taking responsibility for it, and the result of the fact-check (if applicable). Librarians could claim responsibility for new requests, and then conduct the fact-check.
The fact-checking page enabled librarians to restate each factual claim made in a pro or con as a researchable and verifiable question, and then answer the research question.
The fact-checking team decided that the librarians should always identify as many researchable, verifiable questions as a pro or con point contained, even if the request was only for a very specific claim to be checked.
Every fact-check was a collaboration between at least two librarians. One librarian would write the initial fact-check, which was then reviewed by a second librarian before being published.
This communication facilitated learning and coherence for the service, and also drove functionality changes during the early stage of the pilot.
After each fact-check was published, a notification e-mail was sent out to the requester of the fact-check, the author of the pro/con point, and any other interested party (such as people who were participating in a discussion on that point).
In an informal analysis, librarians found that approximately half of all submitted pros and cons in 2011 contained claims checkable by their criteria.
Not all pros and cons are examined with the same degree of scrutiny by other users. For example, some are poorly worded or even incoherent. Because of ConsiderIt’s PointRank algorithm , these points rapidly fall to the bottom and are only seen by the most persistent users.
One factor mitigating this possibility is a structural resiliency in ConsiderIt that disincentivizes political gaming of the fact checking service: if a strong advocate decides to request fact checks of all the points he or she disagrees with, the claims could be evaluated as accurate and end up bolstering the opposing side’s case. The more likely risk in overloading the librarians stems from pranksters operating without a political agenda. This could be handled by triaging requests based on the user requesting the fact-check.
One reason for the large number of “unverifiable” claims is that, for the political domain, what one might think are straightforward factual questions turn out to be more nuanced on closer examination. Another reason was SPL’s policy about not doing legal research;
Users generally agreed with the librarian’s analysis and found value in it (8.6% strongly agreed, 65.7% agreed, 25.7% neutral, 0% disagreed, 0% strongly disagreed). People who were fact-checked felt that librarians generally assessed their points in a fair manner (62.5% “fair,” 0% “unfair,” 37.5% “neither”).
Users did express a desire for better communication with the librarians.
The extensive positive press coverage that the service received also suggests that the legitimacy of LVG increased. For example, a Seattle Times column  praised the librarian’s contribution to the LVG, stating that “there’s something refreshing in such a scientific, humble approach to information.”
To conduct the permutation test, Monte Carlo simulation was used to repeatedly randomly reassign the 47 fact-checks and their original timestamps to 47 of the 294 points. In the randomization process, each fact-check was assigned at random to a point which had at least one view prior to the timestamp at which the original request for the fact-check was submitted.
Some librarians raised concerns about the ability of the library to maintain their reputation as a neutral institution.
The lack of a communication mechanism also prevented librarians from knowing how their fact-checks were received by the author of the point, the requester(s) of the fact-check, and anyone reading the fact-check, leading to a general disconnect between librarian and user.
Librarians felt able to provide authoritative, relevant information to the public. They felt that this project was not only a good way to showcase the skills that they possess in terms of providing answers to complex questions, but also a way to reach a wider audience.
Users welcomed the librarians’ contributions, even those whose statements were challenged. Our perspective is that correcting widely held, deep misperceptions is something that cannot be quickly fixed (e.g., with a link to a Snopes article), but is rather a long process of engagement that requires a constructive environment .
The journalistic fact-checking frame did not map smoothly to librarian reference practice. Librarianship is rooted in guiding people to sources rather than evaluating claims. Discomfort stepping outside these bounds was magnified by the lack of opportunities for librarians to communicate with users to clarify request and the original point. This points to an evolution of our approach to introducing authoritative information into public dialogue that we call interactive fact-seeking.
The first draft of the paper is done! It comes out at about 12 pages. I’ll need to cut it down to 6 to submit for CHI 2014 WIP. Easier than writing though. Of course, that’s just the first draft. More to come, I’m guessing. Still, it’s a nice feeling, and since I’ve burned through most of my 20% time, it’s time for me to get back to actually earning my pay, so I’ll be taking a break from this blog for a while. More projects are coming up though, so stay tuned. I’ll finish up this post with some images of all the design variations that led to the final, working version:
The chronological order of development is from left to right and top to bottom. Starting at the top left:
- The first proof of concept. Originally force-input / motion – feedback. It was with this system that I discovered that all actuator motion had to be in relation to a proximal relative base.
- The first prototype. It had 6 Degrees of freedom, allowing for a user to move a gripper within a 3D environment and grab items. It worked well enough that it led to…
- The second prototype. A full 5-finger gripper attached to an XYZ base. I ran into problems with this one. It turned out that motion feedback required too much of a cognitive load to work. The user would loose track of where their fingers were, even with the proximal base. So that led to…
- The third prototype. This used resistive force sensors and vibrotactile feedback. The feedback was provided using voice coils, which were capable of full audio range, which meant that all kinds of sophisticated contact and surface effects could be provided. That proved the point that 5 fingers could work with vibrotactile feedback, but the large scale motions of the base seemed to need motion (I’ve since learned that isometric devices are most effective over short ranges). This was also loaded with electronic concepts that I wanted to try out – Arduino sensing, midi synthesizers per finger, etc.
- To explore direct motion for the base for the fourth prototype I made a 3D printing of a 5-finger Force Input / Vibrotactile Output (FS/VO) system that would sit on top of a mouse. This was a plug-and play substitution that worked with the previous electronics and worked quite nicely, though the ability to grip doesn’t give you much to do in the XY plane
- To Get 3D interaction, I took two FS/VO modules and added them to a Phantom Omni. I also dropped the arduino and the synthesizer and the Arduino, using XAudio2 8-channel audio and a Phidgets interface card. This system worked very nicely. The FS/VO elements combined with a force feedback base turned out to be very effective. That’s what became the basis for the paper, and hopefully the basis for future work.
- Project code is here (MD5: B32EE89CEA9C8E02E5B99BFAF24877A0).
- In meeting with Dr. Kuber, I brought up something that I’ve been thinking about since the weekend. The interface works, provably so. The pilot study shows that it can be used for (a) training and (b) “useful” work. If the goal is to produce “blue collar telecommuting”, then the question becomes, how do we actually achieve that? A dumb master-slave system makes very little sense for a few reasons:
- Time lag. It may not be possible to always get a fast enough response loop to make haptics work well
- Machine intelligence. With robots coming online like Baxter, there is certainly some level of autonomy that the on-site robot can perform. So, what’s a good human-robot synergy?
- I’m thinking that a hybrid virtual/physical interface might be interesting.
- The robotic workcell is constantly scanned and digitized by cameras. The data is then turned into models of the items that the robot is to work with.
- These items are rendered locally to the operator, who manipulates the virtual objects using tight-loop haptics, 3D graphics, etc. Since (often?) the space is well known, the objects can be rendered from a library of CAD-correct parts.
- The operator manipulates the virtual objects. The robot follows the “path” laid down by the operator. The position and behavior of the actual robot is represented in some way (ghost image, warning bar, etc). This is known as Mediated Teleoperation, and described nicely in this paper.
- The novel part, at least as far as I can determine at this point is using mediated telepresence to train a robot in a task:
- The operator can instruct the robot to learn some or all of a particular procedure. This probably entails setting entry, exit, and error conditions for tasks, which the operator is able to create on the local workstation.
- It is reasonable to expect that in many cases, this sort of work will be a mix of manual control and automated behavior. For example, placing of a part may be manual, but screwing a bolt into place to a particular torque could be entirely automatic. If a robot’s behavior is made fully autonomous, the operator needs simply to monitor the system for errors or non-optimal behavior. At that point, the operator could engage another robot and repeat the above process.
- User interfaces that inform the operator when the robot is coming out of autonomous modes in a seamless way need to be explored.