SlideShare a Scribd company logo
Information  Highlighting ,[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1 Highlighters 1 Origins 2  Cognitive function 3 Highlighting for others
Highlighters 1/3 Origins ,[object Object],[object Object]
Highlighters 2/3 Cognitive function ,[object Object],[object Object]
[object Object],[object Object],[object Object],Highlighters 3/3 Highlighting for others
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2 Highlighting as information visualisation 1 Syntax highlighting 2  SeeSoft 3 TextLight 4 Readers vs. Authors
Highlighting as info visualisation 1/4 Syntax highlighting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Highlighting as info visualisation 2/4 SeeSoft ,[object Object],[object Object],[object Object]
Highlighting as info visualisation 3/4 TextLight ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Highlighting as info visualisation 4/4 Readers vs. authors ,[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3 Past studies on visual cueing 1 Judging importance 2  Choosing words 1 3 Choosing words 2 4 Core content 5 How many words? 6 Large variance
[object Object],[object Object],[object Object],Past studies 1/6   Judging importance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Past studies 2/6 Choosing words 1
[object Object],[object Object],[object Object],[object Object],Past studies 3/6   Choosing words 2
Past studies 4/6 “Core” content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Past studies 5/6 How many words?
[object Object],[object Object],[object Object],[object Object],Past studies 6/6 Large variance
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4 User study 1 Experimental procedure 2  Analytical procedure  3 Analysis of results 4 Observations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User study 1/4   Experimental procedure
[object Object],[object Object],[object Object],[object Object],[object Object],User study 2/4  Analytical procedure
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User study 3/4   Analysis of results
[object Object],[object Object],[object Object],User study 4/4 Observations
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5 Heuristics 1 Correlation with average choice 2  Key correlations 3 Best heuristics 4 Highlighting by humans 1 5 Highlighting by humans 2 6 Highlighting by best heuristics 7 Performance of best heuristics
[object Object],[object Object],Heuristics 1/7 Correlation with average choice
Heuristics 2/7 Key correlations
[object Object],[object Object],[object Object],[object Object],[object Object],Heuristics 3/7 Best heuristics
Heuristics 4/7 Highlighting by humans 1 ,[object Object]
Heuristics 5/7 Highlighting by humans 2 ,[object Object]
Heuristics 6/7 Highlighting by best heuristics ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Heuristics 7/7  Performance of best heuristics
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6 Identifying discourse markers 1 Segments 2  Statements 3 Solution stages 4 Stage labels 5 Cue words as signals 6 “Solution” signals
Identifying discourse markers 1/6 Segments ,[object Object],[object Object],[object Object]
Identifying discourse markers 2/6 Statements ,[object Object],[object Object]
Identifying discourse markers 3/6 Solution stage ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identifying discourse markers 4/6 Stage signals ,[object Object],[object Object],[object Object]
Identifying discourse markers 5/6 Cue words as signals ,[object Object],[object Object],[object Object],[object Object]
Identifying discourse markers 6/6   “Solution” signals ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7 “Given” and “new” information 1 Highlighting the new 2  Narrative stages 3 Importance 4 Intonation 5 First statement 6 Lists 7 “Solution” as “new” 8 Quasi-revision 9 Levels of “new”
“ Given” and “new” information 1/9 Highlighting the new ,[object Object],[object Object],[object Object]
"Given" and ”new" information 2/9 Narrative stages ,[object Object],[object Object]
“ Given” and “new” information 3/9 Importance ,[object Object],[object Object],[object Object],[object Object]
“ Given” and “new” information 4/9  Intonation ,[object Object],[object Object]
“ Given” and “new” information 5/9  First statement ,[object Object],[object Object]
“ Given” and “new” information 6/9  Lists ,[object Object],[object Object],[object Object],[object Object]
“ Given” and “new” information 7/9 “Solution” as “new ” ,[object Object],[object Object]
“ Given” and “new” information 8/9 Quasi-revision ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ Given” and “new” information 9/9 Levels of “newness” ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6  Future directions 1 Highlighting long neglected 2  Virtues of highlighting 3 TextLight: to do
Future directions 1/3 Highlighting long neglected ,[object Object],[object Object]
Future directions 2/3  Virtues of highlighters ,[object Object],[object Object],[object Object],[object Object],[object Object]
Future directions 3/3  TextLight: to do ,[object Object],[object Object],[object Object]
TextLight   URLs ,[object Object],[object Object]

More Related Content

What's hot

A Review of Distributional models of word meaning (Lenci, 2018)
A Review of Distributional models of word meaning (Lenci, 2018)A Review of Distributional models of word meaning (Lenci, 2018)
A Review of Distributional models of word meaning (Lenci, 2018)
Shuntaro Yada
 
Week3 pptslides structure and key terms of research report
Week3 pptslides  structure and key terms of research reportWeek3 pptslides  structure and key terms of research report
Week3 pptslides structure and key terms of research report
Hafizul Mukhlis
 
Content analysis
Content analysisContent analysis
Content analysis
Atul Thakur
 
Chapter 20 Presentation
Chapter 20 Presentation Chapter 20 Presentation
Chapter 20 Presentation
LizbethKate
 
Assignment presentation QDA analysis
Assignment presentation QDA analysisAssignment presentation QDA analysis
Assignment presentation QDA analysis
SajeelRehman3
 
Quantification of Portrayal Concepts using tf-idf Weighting
Quantification of Portrayal Concepts using tf-idf WeightingQuantification of Portrayal Concepts using tf-idf Weighting
Quantification of Portrayal Concepts using tf-idf Weighting
ijistjournal
 
InHouse Training 141114
InHouse Training 141114InHouse Training 141114
InHouse Training 141114Hiram Ting
 
Collecting Primary Data Using Semi Structured
Collecting Primary Data Using Semi StructuredCollecting Primary Data Using Semi Structured
Collecting Primary Data Using Semi Structured
ASAD ALI
 
Research writing problems and solutions
Research writing problems and solutionsResearch writing problems and solutions
Research writing problems and solutions
UCSI University
 
Qualitative research methods kanhaiya sapkota
Qualitative research methods kanhaiya sapkotaQualitative research methods kanhaiya sapkota
Qualitative research methods kanhaiya sapkota
Tribhuvan University, Kathmandu, Nepal
 
Finding Your Voice as an Academic Writer
Finding Your Voice as an Academic WriterFinding Your Voice as an Academic Writer
Finding Your Voice as an Academic Writer
bikashtaly
 
Examining reading
Examining readingExamining reading
Examining reading
englishonecfl
 
Presentation m.ali pu
Presentation m.ali puPresentation m.ali pu
Presentation m.ali pu
MyWritings
 
Combining IR with Relevance Feedback for Concept Location
Combining IR with Relevance Feedback for Concept LocationCombining IR with Relevance Feedback for Concept Location
Combining IR with Relevance Feedback for Concept LocationSonia Haiduc
 
Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...
Tutors India
 
Content analysis
Content analysisContent analysis
Content analysis
NEO NEWS NETWORK
 
Week6 7a- developing a questionnaire
Week6 7a- developing a questionnaireWeek6 7a- developing a questionnaire
Week6 7a- developing a questionnaire
Hafizul Mukhlis
 
Opinion Mining Techniques for Non-English Languages: An Overview
Opinion Mining Techniques for Non-English Languages: An OverviewOpinion Mining Techniques for Non-English Languages: An Overview
Opinion Mining Techniques for Non-English Languages: An Overview
CSCJournals
 

What's hot (20)

A Review of Distributional models of word meaning (Lenci, 2018)
A Review of Distributional models of word meaning (Lenci, 2018)A Review of Distributional models of word meaning (Lenci, 2018)
A Review of Distributional models of word meaning (Lenci, 2018)
 
Biowriting
BiowritingBiowriting
Biowriting
 
Week3 pptslides structure and key terms of research report
Week3 pptslides  structure and key terms of research reportWeek3 pptslides  structure and key terms of research report
Week3 pptslides structure and key terms of research report
 
Content analysis
Content analysisContent analysis
Content analysis
 
Chapter 20 Presentation
Chapter 20 Presentation Chapter 20 Presentation
Chapter 20 Presentation
 
Assignment presentation QDA analysis
Assignment presentation QDA analysisAssignment presentation QDA analysis
Assignment presentation QDA analysis
 
Quantification of Portrayal Concepts using tf-idf Weighting
Quantification of Portrayal Concepts using tf-idf WeightingQuantification of Portrayal Concepts using tf-idf Weighting
Quantification of Portrayal Concepts using tf-idf Weighting
 
InHouse Training 141114
InHouse Training 141114InHouse Training 141114
InHouse Training 141114
 
Collecting Primary Data Using Semi Structured
Collecting Primary Data Using Semi StructuredCollecting Primary Data Using Semi Structured
Collecting Primary Data Using Semi Structured
 
Research writing problems and solutions
Research writing problems and solutionsResearch writing problems and solutions
Research writing problems and solutions
 
Qualitative research methods kanhaiya sapkota
Qualitative research methods kanhaiya sapkotaQualitative research methods kanhaiya sapkota
Qualitative research methods kanhaiya sapkota
 
Finding Your Voice as an Academic Writer
Finding Your Voice as an Academic WriterFinding Your Voice as an Academic Writer
Finding Your Voice as an Academic Writer
 
Examining reading
Examining readingExamining reading
Examining reading
 
Presentation m.ali pu
Presentation m.ali puPresentation m.ali pu
Presentation m.ali pu
 
Drafting lit review
Drafting lit reviewDrafting lit review
Drafting lit review
 
Combining IR with Relevance Feedback for Concept Location
Combining IR with Relevance Feedback for Concept LocationCombining IR with Relevance Feedback for Concept Location
Combining IR with Relevance Feedback for Concept Location
 
Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...Give a guideline to help students to submit a high quality research proposal ...
Give a guideline to help students to submit a high quality research proposal ...
 
Content analysis
Content analysisContent analysis
Content analysis
 
Week6 7a- developing a questionnaire
Week6 7a- developing a questionnaireWeek6 7a- developing a questionnaire
Week6 7a- developing a questionnaire
 
Opinion Mining Techniques for Non-English Languages: An Overview
Opinion Mining Techniques for Non-English Languages: An OverviewOpinion Mining Techniques for Non-English Languages: An Overview
Opinion Mining Techniques for Non-English Languages: An Overview
 

Similar to Information Highlighting

Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...
Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...
Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...
Ekaterina Olshannikova
 
Dr.saleem gul assignment summary
Dr.saleem gul assignment summaryDr.saleem gul assignment summary
Dr.saleem gul assignment summary
Javed Riza
 
Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)
Hafiza Abas
 
The Open Research Agenda
The Open Research AgendaThe Open Research Agenda
The Open Research Agenda
OER Hub
 
The Open Research Agenda
The Open Research AgendaThe Open Research Agenda
The Open Research Agenda
Robert Farrow
 
content analysis and discourse analysis
content analysis and discourse analysiscontent analysis and discourse analysis
content analysis and discourse analysis
Rudy Banuta
 
Information Skills For Researchers V3
Information Skills For Researchers V3Information Skills For Researchers V3
Information Skills For Researchers V3Jacqueline Thomas
 
Saleegul summary
Saleegul summarySaleegul summary
Saleegul summaryJaved Riza
 
John van genderen
John van genderenJohn van genderen
John van genderenGeoMedeelel
 
Research methods for strategic managers
Research methods for strategic managersResearch methods for strategic managers
Research methods for strategic managers
Bhavi Bhatia
 
Tutoriel ssmt
Tutoriel ssmtTutoriel ssmt
Tutoriel ssmt
Lorraine Goeuriot
 
How to write an effective title and abstract and choose appropriate keywords 
How to write an effective title and abstract and choose appropriate keywords How to write an effective title and abstract and choose appropriate keywords 
How to write an effective title and abstract and choose appropriate keywords 
Editage Insights (Resources for authors and journals)
 
How to Conduct a Systematic Search
How to Conduct a Systematic SearchHow to Conduct a Systematic Search
How to Conduct a Systematic Search
Robin Featherstone
 
Definiendo el enfoque lfe
Definiendo el enfoque lfeDefiniendo el enfoque lfe
Definiendo el enfoque lfe
Natalia Rojo
 
Introduction to Thesis
Introduction to ThesisIntroduction to Thesis
Introduction to ThesisUltraman Taro
 
G1.suntasig.guallichico.maicol.alexander.english.project.design
G1.suntasig.guallichico.maicol.alexander.english.project.designG1.suntasig.guallichico.maicol.alexander.english.project.design
G1.suntasig.guallichico.maicol.alexander.english.project.design
Maicol Suntasig
 
Respond using one or more of the following approaches
Respond using one or more of the following approachesRespond using one or more of the following approaches
Respond using one or more of the following approaches
mickietanger
 
writing a research proposal.pdf
writing a research proposal.pdfwriting a research proposal.pdf
writing a research proposal.pdf
mshalimatulsaadiah
 

Similar to Information Highlighting (20)

Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...
Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...
Scholars’ Perceptions of Relevance in Bibliography-Based People Recommender S...
 
Dr.saleem gul assignment summary
Dr.saleem gul assignment summaryDr.saleem gul assignment summary
Dr.saleem gul assignment summary
 
Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)Chapter 12: Abstract ( english for writing research papers)
Chapter 12: Abstract ( english for writing research papers)
 
meta analysis
meta analysis meta analysis
meta analysis
 
The Open Research Agenda
The Open Research AgendaThe Open Research Agenda
The Open Research Agenda
 
The Open Research Agenda
The Open Research AgendaThe Open Research Agenda
The Open Research Agenda
 
content analysis and discourse analysis
content analysis and discourse analysiscontent analysis and discourse analysis
content analysis and discourse analysis
 
Information Skills For Researchers V3
Information Skills For Researchers V3Information Skills For Researchers V3
Information Skills For Researchers V3
 
Saleegul summary
Saleegul summarySaleegul summary
Saleegul summary
 
John van genderen
John van genderenJohn van genderen
John van genderen
 
Research methods for strategic managers
Research methods for strategic managersResearch methods for strategic managers
Research methods for strategic managers
 
Tutoriel ssmt
Tutoriel ssmtTutoriel ssmt
Tutoriel ssmt
 
How to write an effective title and abstract and choose appropriate keywords 
How to write an effective title and abstract and choose appropriate keywords How to write an effective title and abstract and choose appropriate keywords 
How to write an effective title and abstract and choose appropriate keywords 
 
How to Conduct a Systematic Search
How to Conduct a Systematic SearchHow to Conduct a Systematic Search
How to Conduct a Systematic Search
 
Definiendo el enfoque lfe
Definiendo el enfoque lfeDefiniendo el enfoque lfe
Definiendo el enfoque lfe
 
Introduction to Thesis
Introduction to ThesisIntroduction to Thesis
Introduction to Thesis
 
G1.suntasig.guallichico.maicol.alexander.english.project.design
G1.suntasig.guallichico.maicol.alexander.english.project.designG1.suntasig.guallichico.maicol.alexander.english.project.design
G1.suntasig.guallichico.maicol.alexander.english.project.design
 
Respond using one or more of the following approaches
Respond using one or more of the following approachesRespond using one or more of the following approaches
Respond using one or more of the following approaches
 
Sonja's power point on prior knowlege
Sonja's power point on prior knowlegeSonja's power point on prior knowlege
Sonja's power point on prior knowlege
 
writing a research proposal.pdf
writing a research proposal.pdfwriting a research proposal.pdf
writing a research proposal.pdf
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Information Highlighting

  • 1.
  • 2.
  • 3. 1 Highlighters 1 Origins 2 Cognitive function 3 Highlighting for others
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. 2 Highlighting as information visualisation 1 Syntax highlighting 2 SeeSoft 3 TextLight 4 Readers vs. Authors
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. 3 Past studies on visual cueing 1 Judging importance 2 Choosing words 1 3 Choosing words 2 4 Core content 5 How many words? 6 Large variance
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. 4 User study 1 Experimental procedure 2 Analytical procedure 3 Analysis of results 4 Observations
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. 5 Heuristics 1 Correlation with average choice 2 Key correlations 3 Best heuristics 4 Highlighting by humans 1 5 Highlighting by humans 2 6 Highlighting by best heuristics 7 Performance of best heuristics
  • 29.
  • 30. Heuristics 2/7 Key correlations
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. 6 Identifying discourse markers 1 Segments 2 Statements 3 Solution stages 4 Stage labels 5 Cue words as signals 6 “Solution” signals
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. 7 “Given” and “new” information 1 Highlighting the new 2 Narrative stages 3 Importance 4 Intonation 5 First statement 6 Lists 7 “Solution” as “new” 8 Quasi-revision 9 Levels of “new”
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. 6 Future directions 1 Highlighting long neglected 2 Virtues of highlighting 3 TextLight: to do
  • 57.
  • 58.
  • 59.
  • 60.