1,865 Matching Annotations
  1. Last 7 days
    1. But the ear-lier we go in development, the less able children are to comprehend verbal explanationsof abstract ideas. In contrast, there is evidence that analogical comparison and abstractionprocesses are present in 7–9-month-old infants, and even earlier (Anderson, Chang, Hes-pos, & Gentner, under review; Ferry, Hespos, & Gentner, 2015).
  2. May 2026
    1. In HCI, evaluation refers to the application of some systematic methodology to attribute human-related values to an artifact, prototype, system, or process. Examples of such attributes include performance, experience, safety, and ethical aspects, such as the avoidance of bias or harm.
    2. A special part of a computing system is the user interface. It is the part that the user can see and utilize to control the computer. Through the user interface, users can provide input and instructions to a computer and receive feedback from it. In short, the user interface enables interaction with a computer.
    3. HCI phenomena span eye movements, emotional reactions, aesthetic experiences, social interactions, and organizational structures; they also span behaviors from the millisecond level to changes in the use of interactive systems over decades as well as the individual, group, and societal levels.
    4. Human–computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.

      a sentence that describes a concept

    5. For example, an expert in HCI4D (HCI for development) described the challengesfaced in non-Western contexts as follows [184, p. 2228]:We need to address the everyday problems of people. Most people don’t know how to scroll, navigate.We need to do basic HCI work to make text larger. Also, time of day is the most prominent thing on [aphone’s] screen. Let’s replace that with the amount of airtime you have left. We need to improve uponwhat we built yesterday rather than doing novel interventions or focusing on the future.
  3. Apr 2026
    1. A study of large-scale web-clicking data employed this theory to explain why certain distributions of web page hits emerge on web sites. Huberman et al. [362] proposed a mathematical model that assumes that at any page, users decide to continue clicking as long as its information scent exceeds some threshold. This information scent can be computed using information foraging theory (IFT).

      sentence that mentions implicitly or explicitly a particular theory about computing or information

    2. IFT proposes that information-seeking behavior develops to maximize the rate of information gained per unit of time or effort invested. Note that the term information does not refer to the information-theoretic concept but to subjective interest; here, information means anything that users find interesting.

      sentence that mentions implicitly or explicitly a particular theory about computing or information

    3. Computational rationality is a theory and a modeling approach rooted in bounded rationality and bounded optimality. Recent applications include typing (Figure 21.7), pointing, driving, multitasking, menu selection, and visual search.

      sentence that mentions implicitly or explicitly a particular theory about computing or information

    4. MDP is a formalism that originates from studies of sequential decision-making in artificial intelligence and operations research. Instead of the choice between n actions, MDP deals with environments where rewards are delayed (or distal). This requires an ability to plan actions as part of sequences instead of one-shot choices.

      sentence that mentions implicitly or explicitly a particular theory about computing or information

    5. Visual statistical learning is a research topic in perception that studies how the statistical distribution of our environments affects the deployment of gaze.

      sentence that mentions implicitly or explicitly a particular concept relevant to HCI

    6. It assumes that human long-term memory evolved to help survival by anticipating organismically important events. It is evolutionarily important to remember things that are important for survival. Therefore, the expected value of remembering a thing in the future should affect the probability of recalling it.

      sentence that mentions implicitly or explicitly a particular theory about how humans think or act

    7. According to rational analysis, behavior is sensitive to the statistical distribution of rewards in the environment that a user has experienced. Users learn the way rewards are distributed through continued exposure to an environment and adapt their behavior accordingly. A user's behavior is rational because it is tuned to the distribution of rewards in the environment—the ecology.

      sentence that mentions implicitly or explicitly a particular theory about how humans think or act

    8. The theory assumes that users are 'computationally rational': When picking an action—or deciding how to get from the present state to a state with positive rewards—users are as rational as their cognition allows. Users act based on their often inaccurate and partial beliefs, which they have formed via experience.

      sentence that mentions implicitly or explicitly a particular theory about how humans think or act

    9. Computational rationality is a theory and a modeling approach rooted in bounded rationality and bounded optimality. Recent applications include typing (Figure 21.7), pointing, driving, multitasking, menu selection, and visual search. Its core assumption is that users act in accordance with what they believe is best for them.

      sentence that mentions implicitly or explicitly a particular theory about how humans think or act

    10. Rational analysis is a theory of rational behavior proposed by Anderson and Schooler [21]. It examines the distribution of rewards in the environment to explain how users adapt their behavior. According to rational analysis, behavior is sensitive to the statistical distribution of rewards in the environment that a user has experienced.

      sentence that mentions implicitly or explicitly a particular theory about how humans think or act

    11. These four theories differ in the factors they include and how the agent's decision-making problem is formulated. As such, the theories differ in how easily they help us find a solution to the user's decision-making problem.

      sentence that describes theories in the abstract

    12. The term satisficing is used to describe how users tend to behave when facing a complex decision-making problem. It refers to settling on a satisfactory but not optimal solution in the normative sense.

      sentence that mentions implicitly or explicitly a particular concept relevant to HCI

    13. The concept of rationality has its roots in economics, where it was developed to study how peo-ple should act in economic decision-making. In such settings, the idea is that people reach theirgoal, such as maximizing their return, by maximizing utility.
    1. Our design was motivated by two major goals for notation authoring. These goals followed from recent studies of notation augmentation [30, 71] and conversations with scientists who had experience writing notation in instructional materials and research communications (4 professors, 2 graduate students, R1–6).

      sentence that describes who the system is designed for

    2. We define the key projections as markup (in this case, LaTeX), an annotatable render, and a structure hierarchy view. Augmentations are made easy to invoke, and projections are kept synchronized and co-present so that authors can shift between representations as is expedient to them.

      sentence that describes the characteristics that define the proposed system

    3. the challenge of using these tools is that annotations are unmoored from the structure of the formula and must be redone whenever the formula changes. Authors must perform precision positioning and sizing operations that could be inferred from the coordinates of the augmented expressions.

      sentence that describes the obstacles that the proposed system is designed to help the intended user get around to reach their goals

    4. these markup languages can require cumbersome and error-prone editing, arising from the intermixing of annotation markup with the underlying formula. Participants in a study by Wu et al. [71] identified difficulty with debugging nested braces and locating markup to edit.

      sentence that describes the obstacles that the proposed system is designed to help the intended user get around to reach their goals

    5. lab study participants frequently made errors related to incorrectly matched braces when using a LaTeX baseline to augment formulas.

      sentence that describes the obstacles that the proposed system is designed to help the intended user get around to reach their goals

    6. Authors in Head et al. [30] described that "code gets horrible looking" as macros are added to it to specify augmentations.

      sentence that describes the obstacles that the proposed system is designed to help the intended user get around to reach their goals

    7. FreeForm, a projectional editor wherein authors can augment formulas—with color, labels, spacing, and more—across multiple synchronized representations. Augmentations are created graphically using direct selections and compact menus. Those augmentations propagate to LaTeX markup, which can itself be edited and easily exported.

      sentence that describes the characteristics that define the proposed system

    8. FreeForm is a projectional editor optimized for notation augmentation. This paper defines the key projections for the text: textual LaTeX, a formula render with tree-aware selections, and a property/hierarchy view.

      sentence that describes the characteristics that define the proposed system

    1. designing complex behavior can be a difficult programming task, and program representations in end-user programming tools may not be well-suited for heavy programs.

      sentence that describes the obstacles that the proposed system is designed to help the intended user get around to reach their goals

    2. Ply allows users to develop, test, and tweak program components, exploring possibilities for how data can be transformed and composed to discover and achieve goals. This style of programming can support many use cases, even those not traditionally considered in the trigger-action programming model.

      sentence that describes the goals of the intended user

    3. Through the combination of these features, Ply allows users to develop, test, and tweak program components, exploring possibilities for how data can be transformed and composed to discover and achieve goals.

      sentence that describes the goals of the intended user

    4. Frequently, code-generation systems focus on building and then refining a full working application, using visibility of the full underlying code as a fallback when users need to build understanding of the generated program.

      sentence that describes the obstacles that the proposed system is designed to help the intended user get around to reach their goals

    5. Each sensor is accompanied by a glanceable visualization of the sensor's output payloads on the Ply canvas. This visualization is specific to the sensor and its output type, showing the most critical information for evaluating whether the sensor is behaving as expected.

      sentence that describes the characteristics that define the proposed system

    6. Ply uses a server program written in TypeScript to make code generation requests to a large language model and to execute the resulting code, which passes messages to and from sensors and actuators.

      sentence that describes the characteristics that define the proposed system

    7. Each layer in Ply tracks its dependencies; sensors receive data from their dependencies, actuators push data to their dependencies, and linkages each refer to exactly one sensor and one actuator dependency. Collections of layers and linkages in Ply are isomorphic to node graphs in node-based programming languages.

      sentence that describes the characteristics that define the proposed system

    8. Code generation offered by large language models can serve to author this glue code for trigger-action programs, allowing for data from triggers to be mapped to input data for actions automatically even when their native data formats or intended functionality do not match exactly.

      sentence that describes the conditions for which the system is designed

    9. Ply allows users to develop, test, and tweak program components, exploring possibilities for how data can be transformed and composed to discover and achieve goals. This style of programming can support many use cases, even those not traditionally considered in the trigger-action programming model.

      sentence that describes who the system is designed for

    10. It encourages program decomposition into "layer" abstractions, It automatically creates visualizations of event payloads at layer boundaries to help users understand layer behavior without having to read the underlying generated code, and It constructs ad hoc parametrization interfaces that allow users to configure important dimensions of the behavior of each layer without having to re-author it.

      sentence that describes the characteristics that define the proposed system

    11. However, such LLM-authored code, especially when implementing nontrivial logic, can be difficult to specify, understand or debug. Users need appropriate tools and handles to understand and make changes to the computation that is being performed in such code.

      sentence that describes the obstacles that the proposed system is designed to help the intended user get around to reach their goals

    12. Trigger-action programming has been a success in end-user programming. Traditionally, the simplicity of links between triggers and actions limits the expressivity of such systems. LLM-based code generation promises to enable users to specify more complex behavior in natural language. However, users need appropriate ways to understand and control this added expressive power.

      sentence that describes the conditions for which the system is designed

    1. In UTAUT, Venkatesh extended TAM by incorporating two constructs not directly related to a system's perceived properties, but derived from external aspects: social influence and facilitating conditions. Additionally, UTAUT posits four mediating factors that moderate the impact of each key construct on usage intention and behavior, namely gender, age, experience, and voluntariness of use.

      sentences that implicitly or explicitly mention theory

    2. While our key focus is to build a theoretical model that explains the process through which older adults accept (or reject) mobile technology, which can provide theoretical guidelines when designing a technology, and which may also be able to generate new investigations and experiments.

      sentences that implicitly or explicitly mention theory

    3. Azjen's theory of planned behavior [1, 2] posits that a specific behavior is the result of an intention to carry it out, and that intention is determined by attitudes, norms, and the perception of control over the behavior. Drawing upon this theory of planned behavior, Davis et al. developed the technology acceptance model (TAM) [10].

      sentences that implicitly or explicitly mention theory

    4. To summarize, existing models of technology acceptance can provide a partial explanation of older adults' behaviors of mobile technology acceptance. However, we also identified critical elements that are not represented in the existing models. Components in red boldface in Figure 3 provide a preview of the new elements we have identified and their relationship to the components proposed in earlier models.

      sentences about extending existing theoretical models with research findings

    5. by triangulating our empirical findings with existing theoretical models from the literature, we found out that the existing models of technology adoption require new theory components to be able to describe technology adoption processes of our participants. In particular, we identified an additional phase that is prominent among the participants, intention to learn, but did not appear in prior models. Then, we identified three new factors that significantly influence their technology acceptance but which are, again, not represented in the existing models: self-efficacy, conversion readiness, and peer support.

      sentences about extending existing theoretical models with research findings

    6. we found out that the existing models of technology adoption require new theory components to be able to describe technology adoption processes of our participants. In particular, we identified an additional phase that is prominent among the participants, intention to learn, but did not appear in prior models. Then, we identified three new factors that significantly influence their technology acceptance but which are, again, not represented in the existing models: self-efficacy, conversion readiness, and peer support.

      sentences about extending existing theoretical models with research findings

    1. Then, by triangulating our empirical findings with existing theoretical models from the literature, we found out that the existing models of technology adoption require new theory components to be able to describe technology adoption processes of our participants.

      sentences about extending existing theoretical models with research findings

    2. We identified three distinct factors that influence older adults' technology acceptance behaviors, particularly the intention to learn phase, that are not represented in prior models: self-efficacy, conversion readiness, and peer support.

      sentences about extending existing theoretical models with research findings

    1. An example of low-level automation is the extrapolation or prediction of data over time,such as a system predicting a trend for the output of an industrial plant based on historical sensordata. An example of moderate- to high-level automation is a system integrating multiple sources orinput variables. This could be a display with emergent perceptual features, such as an optical see-through display with a landing strip intended to assist a pilot in landing an aircraft. An exampleof high-level automation is a context-dependent summary of data.
    2. An example of low-level automation is assistance in sensor adjustment, such as a system mechanically moving a radarsensor to lock on a detected target. An example of moderate automation is a system organizinginformation according to criteria such as a priority list or highlighting information based on staticor dynamic criteria. This could be, for example, a display highlighting the rate of change in somevariable of interest. This could be indicated by increasing the intensity of some pixels more rapidlythan others in the display.
    3. Four levels of shared control can be distinguished [1]: strategic (e.g.,setting a destination), tactical (e.g., doing a specific maneuver like merging into a lane), oper-ational (e.g., maintaining a certain distance from another car), and execution (lowest-level ofcontrolling locomotion, steering, and so on).
    4. Third, control can be shared via partitioning. In this case, a task is decomposed into parts thatcan be addressed by humans and machines separately. An example of such control sharing is semi-automatic parallel parking, which provides the driver with some braking ability while the machinecontrols the speed and steering of the car. An HCI example is automatic spell checking, where thesystem detects and highlights incorrectly spelled words but does not change them. Instead, theuser has to take an explicit corrective action, such as selecting a misspelled word and choosing analternative.
    5. Cai et al. [117] interviewed 21 pathologists who used a deep neural network to aid in thediagnosis of prostate cancer. The interviews showed that pathologists needed to learn moreabout the network’s strengths and limitations to use it effectively. They also wanted to knowthe design objective of the network and the kind of data on which it was trained.