SlideShare a Scribd company logo
Data by the people, for the peoplePowering Interactions via the Social Web Michael Bernsteinmitcsail | user interface design group | haystack group mit human-computer interaction
Computer Science “In the most basic sense, a network is any collection of objects in which some pairs of these objects are connected by links.” - Easley and Kleinberg, page 2 [Zachary ‘77, via Easley and Kleinberg ‘10]
With the abstraction, we can: - Reason at high levels  - Make predictions - Interact online - Model data http://www.flickr.com/marc_smith
Social Science “The analysis of patterns of social relationship in the group is then conducted on the graph, which is merely a shorthand representation of the ethnographic data.” - Zachary  ‘77 [Zachary ‘77, via Easley and Kleinberg ‘10]
Methodological mismatch Many of you are sitting on terabytes of data about human interactions.  The opportunities to scrape data – or more politely, leverage APIs – are also unprecedented.  And folks are buzzing around wondering what they can do with all of the data they've got their hands on.  But in our obsession with Big Data, we've forgotten to ask some of the hard critical questions about what all this data means and how we should be engaging with it. - danahboyd, WWW ‘10
Methodological mismatch Many of you are sitting on terabytes of data about human interactions.  The opportunities to scrape data – or more politely, leverage APIs – are also unprecedented.  And folks are buzzing around wondering what they can do with all of the data they've got their hands on.  But in our obsession with Big Data, we've forgotten to ask some of the hard critical questions about what all this data means and how we should be engaging with it. - danahboyd, WWW ‘10
building privacy-sensitive systems building successful systems
Netflix: Getting it right Collaborative filtering http://www.eecs.berkeley.edu/~zhanghao
Netflix: Getting it right Temporal dynamics [Koren ’09]
the challenge bridging
Soylent UIST ‘10 Eddi UIST ‘10 FeedMe CHI ‘10 Collabio UIST ‘09
Soylent A Word Processor with a Crowd Inside human computation marketsvoting [Bernstein et al. UIST ‘10]
Interface Wizard of Oz
Highly-educated workers, mostly from the U.S. and India Appropriate for generic cognition tasks with little intrinsic motivation
Interface Wizard of Turk Wizard of Oz Wire paid human computation directly into an interface
Editing for length is excruciating Even experts make writing mistakes High-level decisions result in lots of small tasks
Shortn: Text Shortening
Blog – 83% Print publishers are in a tizzy over Apple’s new iPad because they hope to finally be able to charge for their digital editions. But in order to get people to pay for their magazine and newspaper apps, they are going to have to offer something different that readers cannot get at the newsstand or on the open Web. Classic uist– 87% The metaDESK effort is part of the larger Tangible Bits project. The Tangible Bits vision paper, which introduced the metaDESKalong withand two companion platforms, the transBOARD and ambientROOM. Draft uist– 90% In this paper we argue that it is possible and desirable to combine the easy input affordances of text with the powerful retrieval and visualization capabilities of graphical applications.  We present WenSo, a tool thatwhich uses lightweight text input to capture richly structured information for later retrieval and navigation in a graphical environment.. Rambling E-mail – 78% A previous board member, Steve Burleigh, created our web site last year and gave me alot of ideas. For this year, I found a web site called eTeamZ that hosts web sites for sports groups.  Check out our new page: […] Technical Computer Science – 82% Figure 3 shows the pseudocode that implements this design for Lookup. FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key(the index bits) and the next 15 low order bits (the key fragment).
Crowdproof: Human Proofreading Finds errors that AIs miss, explains the reason behind the problem in plain English, and suggests fixes
The Human Macro Macro scripting without programming ‘‘Please change text in document from past tense to present tense.’’  I gave one final glance around before descending from the barrow. As I did so, my eye caught something […]  I give one final glance around before descending from the barrow. As I do so, my eye catches something […]
The Human Macro Macro scripting without programming ‘‘Pick out keywords from the paragrah like Yosemite, rock, half dome, park. Go to a site which hsa CC licensed images […]’’   When I first visited Yosemite State Park in California, I was a boy. I was amazed by how big everything was […]  http://commons.wikimedia.org/wiki/File:03_yosemite_half_dome.jpg
The Human Macro Macro scripting without programming ‘‘Hi, please find the bibtex references for the 3 papers in brackets. You can located these by Google Scholar searches and clicking on bibtex.” Duncan and Watts [Duncan and watts HCOMP 09 anchoring] found that Turkers will do more work when you pay more, but that the quality is no higher. @conference {   title={{Financial incentives […]}},    author={Mason, W. and Watts, D.J.},  booktitle={HCOMP ‘09},  […] }
Programming Crowd Workers Rule of Thumb: 30% of worker effort on open-ended tasks will have an error in it Two useful personas: The Lazy Turker and The Eager Beaver
The Lazy Turker Does as little work as necessary to be paid The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
The Lazy Turker Does as little work as necessary to be paid The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradeship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
The Lazy Turker Does as little work as necessary to be paid The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
The Eager Beaver Go beyond task requirements to be helpful, but introduce errors in the process The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story.  This theme occurs during many circumstances but is not present from start to finish.  In my mind for a theme to be pervasive is must be present during every element of the story.  There are many themes that are present most of the way through such as sacrifice, friendship and comradeship.  But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.  The Eager Beaver Go beyond task requirements to be helpful, but introduce errors in the process
Find-Fix-Verify A design pattern that controls the efforts of the Lazy Turker and the Eager Beaver Separates open-ended tasks into three stageswhere each worker makes a clear contribution
Find “Identify at least one area that can be shortened without changing the meaning of the paragraph.” Independent voting to identify patches Fix “Edit the highlighted section to shorten its length without changing the meaning of the paragraph.” Soylent, a prototype... Randomize order of suggestions Verify “Choose at least one rewrite that has significant style errors in it. Choose at least one rewrite that significantly changes the meaning of the sentence.”
Why Find-Fix-Verify? Why split Find and Fix? 	Force Lazy Turkers to work on a problem of our choice 	Allows us to merge work completed in parallel Why Add Verify? 	Quality raises when we put Turkers at odds with each other 	Trade off lag time with quality
Data is made of people, Data is made by people, Data is made for people.
Collaborators Rob Miller, David Karger, Greg Little, Katrina Panovich, David Crowell Mark Ackerman Björn Hartmann …and about 9000 Turkers. I am generously kept off the streets by an NSF GRFP and NSF award IIS-0712793.
Blog Print publishers are in a tizzy over Apple’s new iPad because they hope to finally be able to charge for their digital editions. But in order to get people to pay for their magazine and newspaper apps, they are going to have to offer something different that readers cannot get at the newsstand or on the open Web. Classic uist The metaDESK effort is part of the larger Tangible Bits project. The Tangible Bits vision paper introduced the metaDESK along with two companion platforms, the transBOARD and ambientROOM. Draft uist In this paper we argue that it is possible and desirable to combine the easy input affordances of text with the powerful retrieval and visualization capabilities of graphical applications.  We present WenSo, a tool that uses lightweight text input to capture richly structured information for later retrieval and navigation in a graphical environment.. Rambling E-mail A previous board member, Steve Burleigh, created our web site last year and gave me alot of ideas. For this year, I found a web site called eTeamZ that hosts web sites for sports groups.  Check out our new page: […] Highly Technical Writing Figure 3 shows the pseudocode that implements this design for Lookup. FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key (the index bits) and the next 15 low order bits (the key fragment).
Blog – 83% Print publishers are in a tizzy over Apple’s new iPad because they hope to finally be able to charge for their digital editions. But in order to get people to pay for their magazine and newspaper apps, they are going to have to offer something different that readers cannot get at the newsstand or on the open Web. Classic uist– 87% The metaDESK effort is part of the larger Tangible Bits project. The Tangible Bits vision paper, which introduced the metaDESKalong withand two companion platforms, the transBOARD and ambientROOM. Draft uist– 90% In this paper we argue that it is possible and desirable to combine the easy input affordances of text with the powerful retrieval and visualization capabilities of graphical applications.  We present WenSo, a tool thatwhich uses lightweight text input to capture richly structured information for later retrieval and navigation in a graphical environment.. Rambling E-mail – 78% A previous board member, Steve Burleigh, created our web site last year and gave me alot of ideas. For this year, I found a web site called eTeamZ that hosts web sites for sports groups.  Check out our new page: […] Technical Computer Science – 82% Figure 3 shows the pseudocode that implements this design for Lookup. FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key(the index bits) and the next 15 low order bits (the key fragment).
Average Performance Cost: 	$1.41 per paragraph		$0.55 to Find an average of two patches	$0.48 to Fix each patch	$0.38 to Verify the results Time:	Wait : median 18.5 minutes 		 (Q1 = 8.3 min, Q3 = 41.6 min) 	Work: median 2.0 minutes 		 (Q1 = 60 sec, Q3 = 3.6 min)
Qualitative Observations Works best with unnecessary text […] they are going to have to offer something different […] Lack of domain knowledge[…] In this paper we argue that tangible interfaces […] Parallel edits can be inconsistent FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key (the index bits) and the next 15 low order bits (the key fragment).

More Related Content

Similar to HarambeeNet: Data by the people, for the people

Soylent: A Word Processor with a Crowd Inside
Soylent: A Word Processor with a Crowd InsideSoylent: A Word Processor with a Crowd Inside
Soylent: A Word Processor with a Crowd Inside
Michael Bernstein
 
From Natural Language Processing to Artificial Intelligence
From Natural Language Processing to Artificial IntelligenceFrom Natural Language Processing to Artificial Intelligence
From Natural Language Processing to Artificial Intelligence
Jonathan Mugan
 
Data Day Seattle, From NLP to AI
Data Day Seattle, From NLP to AIData Day Seattle, From NLP to AI
Data Day Seattle, From NLP to AI
Jonathan Mugan
 
Large Components in the Rearview Mirror
Large Components in the Rearview MirrorLarge Components in the Rearview Mirror
Large Components in the Rearview Mirror
Michelle Brush
 
Eid Short Essay In English
Eid Short Essay In EnglishEid Short Essay In English
Eid Short Essay In English
Adriana Lovato
 
The Science Of Social Networks
The Science Of Social NetworksThe Science Of Social Networks
The Science Of Social Networks
Ehren Foss
 
10 Tips For Best Writing In Exams. Online assignment writing service.
10 Tips For Best Writing In Exams. Online assignment writing service.10 Tips For Best Writing In Exams. Online assignment writing service.
10 Tips For Best Writing In Exams. Online assignment writing service.
Tiffany Rose
 
SENG691I - Knowledge Representation and The Semantic Web
SENG691I - Knowledge Representation and The Semantic WebSENG691I - Knowledge Representation and The Semantic Web
SENG691I - Knowledge Representation and The Semantic Web
Daniel Shaw
 
Advantages And Disadvantages Of Nuclear Family Essay In Hindi
Advantages And Disadvantages Of Nuclear Family Essay In HindiAdvantages And Disadvantages Of Nuclear Family Essay In Hindi
Advantages And Disadvantages Of Nuclear Family Essay In Hindi
Inell Campbell
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273Abutest
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273Abutest
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly Campus
Dave Olsen
 
Writing A Good Thesis Statement
Writing A Good Thesis StatementWriting A Good Thesis Statement
Writing A Good Thesis Statement
Wendy Hager
 
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
rohitcse52
 
Naming Things (with notes)
Naming Things (with notes)Naming Things (with notes)
Naming Things (with notes)
Pete Nicholls
 
Policy Brief Template Word Free - Printable Templates
Policy Brief Template Word Free - Printable TemplatesPolicy Brief Template Word Free - Printable Templates
Policy Brief Template Word Free - Printable Templates
Jennifer Wood
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?
David Smith
 
Semantic web and information graph
Semantic web and information graphSemantic web and information graph
Semantic web and information graph
Chao-Hsuan Shen
 
Let Someone Write Paper Hollywood Gazette
Let Someone Write Paper Hollywood GazetteLet Someone Write Paper Hollywood Gazette
Let Someone Write Paper Hollywood Gazette
Alison Hall
 

Similar to HarambeeNet: Data by the people, for the people (20)

Soylent: A Word Processor with a Crowd Inside
Soylent: A Word Processor with a Crowd InsideSoylent: A Word Processor with a Crowd Inside
Soylent: A Word Processor with a Crowd Inside
 
From Natural Language Processing to Artificial Intelligence
From Natural Language Processing to Artificial IntelligenceFrom Natural Language Processing to Artificial Intelligence
From Natural Language Processing to Artificial Intelligence
 
Data Day Seattle, From NLP to AI
Data Day Seattle, From NLP to AIData Day Seattle, From NLP to AI
Data Day Seattle, From NLP to AI
 
Large Components in the Rearview Mirror
Large Components in the Rearview MirrorLarge Components in the Rearview Mirror
Large Components in the Rearview Mirror
 
Eid Short Essay In English
Eid Short Essay In EnglishEid Short Essay In English
Eid Short Essay In English
 
The Science Of Social Networks
The Science Of Social NetworksThe Science Of Social Networks
The Science Of Social Networks
 
10 Tips For Best Writing In Exams. Online assignment writing service.
10 Tips For Best Writing In Exams. Online assignment writing service.10 Tips For Best Writing In Exams. Online assignment writing service.
10 Tips For Best Writing In Exams. Online assignment writing service.
 
SENG691I - Knowledge Representation and The Semantic Web
SENG691I - Knowledge Representation and The Semantic WebSENG691I - Knowledge Representation and The Semantic Web
SENG691I - Knowledge Representation and The Semantic Web
 
Advantages And Disadvantages Of Nuclear Family Essay In Hindi
Advantages And Disadvantages Of Nuclear Family Essay In HindiAdvantages And Disadvantages Of Nuclear Family Essay In Hindi
Advantages And Disadvantages Of Nuclear Family Essay In Hindi
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273A
 
Machine Learning ICS 273A
Machine Learning ICS 273AMachine Learning ICS 273A
Machine Learning ICS 273A
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly Campus
 
Writing A Good Thesis Statement
Writing A Good Thesis StatementWriting A Good Thesis Statement
Writing A Good Thesis Statement
 
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai searchChatGPT-and-Generative-AI-Landscape Working of generative ai search
ChatGPT-and-Generative-AI-Landscape Working of generative ai search
 
Naming Things (with notes)
Naming Things (with notes)Naming Things (with notes)
Naming Things (with notes)
 
Policy Brief Template Word Free - Printable Templates
Policy Brief Template Word Free - Printable TemplatesPolicy Brief Template Word Free - Printable Templates
Policy Brief Template Word Free - Printable Templates
 
CCFW.software
CCFW.softwareCCFW.software
CCFW.software
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?
 
Semantic web and information graph
Semantic web and information graphSemantic web and information graph
Semantic web and information graph
 
Let Someone Write Paper Hollywood Gazette
Let Someone Write Paper Hollywood GazetteLet Someone Write Paper Hollywood Gazette
Let Someone Write Paper Hollywood Gazette
 

More from Michael Bernstein

Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
Michael Bernstein
 
The Future of Crowd Work
The Future of Crowd WorkThe Future of Crowd Work
The Future of Crowd Work
Michael Bernstein
 
Direct Answers for Search Queries in the Long Tail
Direct Answers for Search Queries in the Long TailDirect Answers for Search Queries in the Long Tail
Direct Answers for Search Queries in the Long Tail
Michael Bernstein
 
Analytic Methods for Optimizing Realtime Crowdsourcing
Analytic Methods for Optimizing Realtime CrowdsourcingAnalytic Methods for Optimizing Realtime Crowdsourcing
Analytic Methods for Optimizing Realtime Crowdsourcing
Michael Bernstein
 
4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...
4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...
4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...
Michael Bernstein
 
RepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student PerspectivesRepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student PerspectivesMichael Bernstein
 
RepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student PerspectivesRepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student PerspectivesMichael Bernstein
 
The Trouble with Social Computing Systems Research
The Trouble with Social Computing Systems ResearchThe Trouble with Social Computing Systems Research
The Trouble with Social Computing Systems ResearchMichael Bernstein
 
FeedMe: Enhancing Directed Content Sharing on the Web
FeedMe: Enhancing Directed Content Sharing on the WebFeedMe: Enhancing Directed Content Sharing on the Web
FeedMe: Enhancing Directed Content Sharing on the Web
Michael Bernstein
 

More from Michael Bernstein (9)

Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
The Future of Crowd Work
The Future of Crowd WorkThe Future of Crowd Work
The Future of Crowd Work
 
Direct Answers for Search Queries in the Long Tail
Direct Answers for Search Queries in the Long TailDirect Answers for Search Queries in the Long Tail
Direct Answers for Search Queries in the Long Tail
 
Analytic Methods for Optimizing Realtime Crowdsourcing
Analytic Methods for Optimizing Realtime CrowdsourcingAnalytic Methods for Optimizing Realtime Crowdsourcing
Analytic Methods for Optimizing Realtime Crowdsourcing
 
4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...
4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...
4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Co...
 
RepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student PerspectivesRepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student Perspectives
 
RepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student PerspectivesRepliCHI: Graduate Student Perspectives
RepliCHI: Graduate Student Perspectives
 
The Trouble with Social Computing Systems Research
The Trouble with Social Computing Systems ResearchThe Trouble with Social Computing Systems Research
The Trouble with Social Computing Systems Research
 
FeedMe: Enhancing Directed Content Sharing on the Web
FeedMe: Enhancing Directed Content Sharing on the WebFeedMe: Enhancing Directed Content Sharing on the Web
FeedMe: Enhancing Directed Content Sharing on the Web
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

HarambeeNet: Data by the people, for the people

  • 1. Data by the people, for the peoplePowering Interactions via the Social Web Michael Bernsteinmitcsail | user interface design group | haystack group mit human-computer interaction
  • 2. Computer Science “In the most basic sense, a network is any collection of objects in which some pairs of these objects are connected by links.” - Easley and Kleinberg, page 2 [Zachary ‘77, via Easley and Kleinberg ‘10]
  • 3. With the abstraction, we can: - Reason at high levels - Make predictions - Interact online - Model data http://www.flickr.com/marc_smith
  • 4. Social Science “The analysis of patterns of social relationship in the group is then conducted on the graph, which is merely a shorthand representation of the ethnographic data.” - Zachary ‘77 [Zachary ‘77, via Easley and Kleinberg ‘10]
  • 5. Methodological mismatch Many of you are sitting on terabytes of data about human interactions.  The opportunities to scrape data – or more politely, leverage APIs – are also unprecedented.  And folks are buzzing around wondering what they can do with all of the data they've got their hands on.  But in our obsession with Big Data, we've forgotten to ask some of the hard critical questions about what all this data means and how we should be engaging with it. - danahboyd, WWW ‘10
  • 6. Methodological mismatch Many of you are sitting on terabytes of data about human interactions.  The opportunities to scrape data – or more politely, leverage APIs – are also unprecedented.  And folks are buzzing around wondering what they can do with all of the data they've got their hands on.  But in our obsession with Big Data, we've forgotten to ask some of the hard critical questions about what all this data means and how we should be engaging with it. - danahboyd, WWW ‘10
  • 7. building privacy-sensitive systems building successful systems
  • 8. Netflix: Getting it right Collaborative filtering http://www.eecs.berkeley.edu/~zhanghao
  • 9. Netflix: Getting it right Temporal dynamics [Koren ’09]
  • 11. Soylent UIST ‘10 Eddi UIST ‘10 FeedMe CHI ‘10 Collabio UIST ‘09
  • 12. Soylent A Word Processor with a Crowd Inside human computation marketsvoting [Bernstein et al. UIST ‘10]
  • 14. Highly-educated workers, mostly from the U.S. and India Appropriate for generic cognition tasks with little intrinsic motivation
  • 15. Interface Wizard of Turk Wizard of Oz Wire paid human computation directly into an interface
  • 16. Editing for length is excruciating Even experts make writing mistakes High-level decisions result in lots of small tasks
  • 18. Blog – 83% Print publishers are in a tizzy over Apple’s new iPad because they hope to finally be able to charge for their digital editions. But in order to get people to pay for their magazine and newspaper apps, they are going to have to offer something different that readers cannot get at the newsstand or on the open Web. Classic uist– 87% The metaDESK effort is part of the larger Tangible Bits project. The Tangible Bits vision paper, which introduced the metaDESKalong withand two companion platforms, the transBOARD and ambientROOM. Draft uist– 90% In this paper we argue that it is possible and desirable to combine the easy input affordances of text with the powerful retrieval and visualization capabilities of graphical applications. We present WenSo, a tool thatwhich uses lightweight text input to capture richly structured information for later retrieval and navigation in a graphical environment.. Rambling E-mail – 78% A previous board member, Steve Burleigh, created our web site last year and gave me alot of ideas. For this year, I found a web site called eTeamZ that hosts web sites for sports groups. Check out our new page: […] Technical Computer Science – 82% Figure 3 shows the pseudocode that implements this design for Lookup. FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key(the index bits) and the next 15 low order bits (the key fragment).
  • 19. Crowdproof: Human Proofreading Finds errors that AIs miss, explains the reason behind the problem in plain English, and suggests fixes
  • 20. The Human Macro Macro scripting without programming ‘‘Please change text in document from past tense to present tense.’’ I gave one final glance around before descending from the barrow. As I did so, my eye caught something […] I give one final glance around before descending from the barrow. As I do so, my eye catches something […]
  • 21. The Human Macro Macro scripting without programming ‘‘Pick out keywords from the paragrah like Yosemite, rock, half dome, park. Go to a site which hsa CC licensed images […]’’ When I first visited Yosemite State Park in California, I was a boy. I was amazed by how big everything was […] http://commons.wikimedia.org/wiki/File:03_yosemite_half_dome.jpg
  • 22. The Human Macro Macro scripting without programming ‘‘Hi, please find the bibtex references for the 3 papers in brackets. You can located these by Google Scholar searches and clicking on bibtex.” Duncan and Watts [Duncan and watts HCOMP 09 anchoring] found that Turkers will do more work when you pay more, but that the quality is no higher. @conference { title={{Financial incentives […]}}, author={Mason, W. and Watts, D.J.}, booktitle={HCOMP ‘09}, […] }
  • 23. Programming Crowd Workers Rule of Thumb: 30% of worker effort on open-ended tasks will have an error in it Two useful personas: The Lazy Turker and The Eager Beaver
  • 24. The Lazy Turker Does as little work as necessary to be paid The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
  • 25. The Lazy Turker Does as little work as necessary to be paid The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradeship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
  • 26. The Lazy Turker Does as little work as necessary to be paid The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
  • 27. The Eager Beaver Go beyond task requirements to be helpful, but introduce errors in the process The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams.
  • 28. The theme of loneliness features throughout many scenes in Of Mice and Men and is often the dominant theme of sections during this story. This theme occurs during many circumstances but is not present from start to finish. In my mind for a theme to be pervasive is must be present during every element of the story. There are many themes that are present most of the way through such as sacrifice, friendship and comradeship. But in my opinion there is only one theme that is present from beginning to end, this theme is pursuit of dreams. The Eager Beaver Go beyond task requirements to be helpful, but introduce errors in the process
  • 29. Find-Fix-Verify A design pattern that controls the efforts of the Lazy Turker and the Eager Beaver Separates open-ended tasks into three stageswhere each worker makes a clear contribution
  • 30. Find “Identify at least one area that can be shortened without changing the meaning of the paragraph.” Independent voting to identify patches Fix “Edit the highlighted section to shorten its length without changing the meaning of the paragraph.” Soylent, a prototype... Randomize order of suggestions Verify “Choose at least one rewrite that has significant style errors in it. Choose at least one rewrite that significantly changes the meaning of the sentence.”
  • 31. Why Find-Fix-Verify? Why split Find and Fix? Force Lazy Turkers to work on a problem of our choice Allows us to merge work completed in parallel Why Add Verify? Quality raises when we put Turkers at odds with each other Trade off lag time with quality
  • 32. Data is made of people, Data is made by people, Data is made for people.
  • 33. Collaborators Rob Miller, David Karger, Greg Little, Katrina Panovich, David Crowell Mark Ackerman Björn Hartmann …and about 9000 Turkers. I am generously kept off the streets by an NSF GRFP and NSF award IIS-0712793.
  • 34. Blog Print publishers are in a tizzy over Apple’s new iPad because they hope to finally be able to charge for their digital editions. But in order to get people to pay for their magazine and newspaper apps, they are going to have to offer something different that readers cannot get at the newsstand or on the open Web. Classic uist The metaDESK effort is part of the larger Tangible Bits project. The Tangible Bits vision paper introduced the metaDESK along with two companion platforms, the transBOARD and ambientROOM. Draft uist In this paper we argue that it is possible and desirable to combine the easy input affordances of text with the powerful retrieval and visualization capabilities of graphical applications. We present WenSo, a tool that uses lightweight text input to capture richly structured information for later retrieval and navigation in a graphical environment.. Rambling E-mail A previous board member, Steve Burleigh, created our web site last year and gave me alot of ideas. For this year, I found a web site called eTeamZ that hosts web sites for sports groups. Check out our new page: […] Highly Technical Writing Figure 3 shows the pseudocode that implements this design for Lookup. FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key (the index bits) and the next 15 low order bits (the key fragment).
  • 35. Blog – 83% Print publishers are in a tizzy over Apple’s new iPad because they hope to finally be able to charge for their digital editions. But in order to get people to pay for their magazine and newspaper apps, they are going to have to offer something different that readers cannot get at the newsstand or on the open Web. Classic uist– 87% The metaDESK effort is part of the larger Tangible Bits project. The Tangible Bits vision paper, which introduced the metaDESKalong withand two companion platforms, the transBOARD and ambientROOM. Draft uist– 90% In this paper we argue that it is possible and desirable to combine the easy input affordances of text with the powerful retrieval and visualization capabilities of graphical applications. We present WenSo, a tool thatwhich uses lightweight text input to capture richly structured information for later retrieval and navigation in a graphical environment.. Rambling E-mail – 78% A previous board member, Steve Burleigh, created our web site last year and gave me alot of ideas. For this year, I found a web site called eTeamZ that hosts web sites for sports groups. Check out our new page: […] Technical Computer Science – 82% Figure 3 shows the pseudocode that implements this design for Lookup. FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key(the index bits) and the next 15 low order bits (the key fragment).
  • 36. Average Performance Cost: $1.41 per paragraph $0.55 to Find an average of two patches $0.48 to Fix each patch $0.38 to Verify the results Time: Wait : median 18.5 minutes (Q1 = 8.3 min, Q3 = 41.6 min) Work: median 2.0 minutes (Q1 = 60 sec, Q3 = 3.6 min)
  • 37. Qualitative Observations Works best with unnecessary text […] they are going to have to offer something different […] Lack of domain knowledge[…] In this paper we argue that tangible interfaces […] Parallel edits can be inconsistent FAWN-DS extracts two fields from the 160-bit key: the i low order bits of the key (the index bits) and the next 15 low order bits (the key fragment).

Editor's Notes

  1. When we're talking about social networks in computer science education, we have two methodological traditions to fuse. One is computer science, which we can see here through the lens of network science. It puts the network primary. Here is the first figure in the Easley and Kleinberg textbook, of a 34-person karate club.
  2. This is an appealing definition and approach, because it provides a mathematical formalism that enables us to derive proofs, reason about groups at high levels and write interactive systems like Facebook. It doesn’t matter than friendship is a fuzzy concept: so long as both parties have agreed that it’s an undirected edge, we can do friend recommendation, build a news feed, and compute tie strengths (or as Facebook calls it, EdgeRank). It’s a very top-down approach, because computer scientists are good at dealing with lots of data.
  3. The other strong tradition in this space is characterized by social science: social psychology, sociology, cultural anthropology, and the broad spectrum of ideas and methodologies encompassed by conferences like CSCW. Where computer science approach may put the network primary, social science puts the person primary. The goal of this approach is to understand why those links form, what they mean, and how they are utilized. This can be very bottom-up: social psychology, for instance, tends to take the individual as the unit of analysis. It asks questions like, “Why do groups form and split?”
  4. When cultures collide, if we naively follow our methodological training, expectations get mismanaged. In her keynote at WWW, danahboyd critiqued the approach that many computer scientists take when they consider network problems:[quote]danah is referencing ethical and privacy questions largely, but there is an even bigger implication for computer science in my mind: we cannot write crowd programs without really knowing what it is that the crowd is doing.
  5. When cultures collide, if we naively follow our methodological training, expectations get mismanaged. In her keynote at WWW, danahboyd critiqued the approach that many computer scientists take when they consider network problems:[quote]danah is referencing ethical and privacy questions largely, but there is an even bigger implication for computer science in my mind: we cannot write crowd programs without really knowing what it is that the crowd is doing.
  6. danah would talk about the de-anonymization of the Netflix dataset. I have another angle on the situation: understanding humans was what ultimately won the million dollars. Basic collaborative filtering techniques can get you so far. But one of the techniques that BellKor’s Pragmatic Chaos used was temporality: it turns out that when people rate a bunch of movies at a time, they tend to be movies that they saw a long time ago. And those kinds of movies exhibit a specific kind of rating pattern. The authors speculate, but I think this has to do with cognitive psychology: that we are much more likely to remember events with high emotional arousal than those without, and more likely to remember remember positive events than negative events.
  7. danah would talk about the de-anonymization of the Netflix dataset. I have another angle on the situation: understanding humans was what ultimately won the million dollars. Basic collaborative filtering techniques can get you so far. But one of the techniques that BellKor’s Pragmatic Chaos used was temporality: it turns out that when people rate a bunch of movies at a time, they tend to be movies that they saw a long time ago. And those kinds of movies exhibit a specific kind of rating pattern. The authors speculate, but I think this has to do with cognitive psychology: that we are much more likely to remember events with high emotional arousal than those without, and more likely to remember remember positive events than negative events.
  8. So it is when we program systems involving networks and crowds. We have a lot of data, and even more interest in that data, as demonstrated by the number of influential and award-winning papers that have been written by the amazing people sitting in front of me right now. When we talk about data, we are fundamentally bridging the attractive networks abstraction and the equally attractive social science abstraction. When we’re successful like BellKor’s Pragmatic Chaos was, it takes us farther than either process in isolation.
  9. I’m a social computing systems builder: I build interfaces that are powered by social data and interfaces that encourage social interaction. To do this well, I have to get this balance right. I want to share with you a few ways in which I’ve been using the social web to develop new tools, and the ways in which we have wrestled with humans and algorithms simultaneously to make them work.
  10. For years, human-computer interaction researchers have used Wizard of Oz techniques to prototype interactive systems. This technique typically meant having one of the design team members behind a curtain simulating parts of an artificial intelligence that hadn’t been built yet. But, we now have artificial intelligence for hire via services like Amazon Mechanical Turk, where you can pay cents for workers largely in the U.S. and India to perform tasks for you. The Soylent project asks: what happens when you embed those workers inside of an interface -- when you have a Wizard of Turk? Can we help end users when interfaces aren’t necessarily bound by AI-hard problems any more, but by humans?Here are a few preliminary thoughts, which will show up at the ACM UIST conference this year.
  11. For years, human-computer interaction researchers have used Wizard of Oz techniques to prototype interactive systems. This technique typically meant having one of the design team members behind a curtain simulating parts of an artificial intelligence that hadn’t been built yet. But, we now have artificial intelligence for hire via services like Amazon Mechanical Turk, where you can pay cents for workers largely in the U.S. and India to perform tasks for you. The Soylent project asks: what happens when you embed those workers inside of an interface -- when you have a Wizard of Turk? Can we help end users when interfaces aren’t necessarily bound by AI-hard problems any more, but by humans?Here are a few preliminary thoughts, which will show up at the ACM UIST conference this year.
  12. We are focused on writing. We’ve learned to write since grade school; it’s the stock and trade of how most of us exchange ideas today. I think we can all agree that writing is hard. Even seasoned experts will make mistakes: non-parallel constructions, typos, or just plain being unclear. If we make a high level decision like changing a story from past tense to present tense or shifting references from ACM format to MLA format, we have to execute a daunting number of tasks. And of course, when we have that 10-page limit and our paper is 11 pages, we spend hours whittling our writing down to size.
  13. Let me shift to the data aspects of this. To make these interfaces, we need algorithms with human callouts in them. But, we don’t really know how to do this yet. Turkers are people, and using an extrinsic motivation like payment can lead to weird effects. We’ve created two useful personas that guide our work: