SlideShare a Scribd company logo
Informal PUIs:
No Recognition Required
James Landay
Jason Hong
Scott Klemmer
James Lin
Mark Newman
Mar 25 2001 2
WIMPy User Interfaces
• Windows, Icons, Menus, Pointer
­ Hitting limitations of this kind of interface
• WIMP designed for limited audience
­ Full use of eyes
­ Literate
­ Full use of hands
• WIMP designed for limited situations
­ Fixed location (often offices)
­ Sitting down
­ Single person
Mar 25 2001 3
Perceptual User Interfaces
• PUIs leverage our innate perceptual,
motor, and cognitive abilities
­ Speech recognition, computer vision,
sketching, handwriting
• Sketching is one part of this bigger push
• PUIs more useful for different audiences
and wider range of situations
­ Mobile workers or Home
­ Speech => Hands­free
­ Location Tracking => Physical motion
Mar 25 2001 4
PUIs and Recognition
• Key question:
­ When should perceptual input be recognized?
• Immediate recognition can interfere with
creativity and communications
Mar 25 2001 5
Communication and Creativity
• Informal visual
representation
­ communicates “unfinished”
­ encourages creativity
­ faster to create
­ higher level comments
• Formal visual representation
­ communicates “finished”
­ inhibits creativity (detailed)
­ slower to create
­ lower­level comments
Mar 25 2001 6
Informal User Interfaces
• Historic bias towards formal user interfaces
­ Computation over creativity and communication
­ Structured input to simplify computation
• Position:
­ Recognition interferes with creativity and
communication due to errors and perception
­ Recognition should be minimized or deferred
for these kinds of apps
Mar 25 2001 7
Informal User Interfaces
• Sketching
• Speech
• Handwriting
Mar 25 2001 8
Informal User Interfaces
• Sketching
• Speech
• Handwriting
Mar 25 2001 9
Slide
Landay (1996)
Mar 25 2001 10
Slide
Gross and Do (UIST96)
Mar 25 2001 11
Slide
Lin, Newman, Hong, Landay (CHI2000)
Mar 25 2001 12
DENIM Video
Mar 25 2001 13
Informal User Interfaces
• Sketching
• Speech
• Handwriting
Mar 25 2001 14
Slide
Stifelman, Arons, Schmandt (CHI2001)
Mar 25 2001 15
SUEDE:
Informal Prototyping for Speech-based UIs
• Supports design practice
- example scripts
- Wizard of Oz
- error simulation
- iterative design
• Informal user interface
- no speech recognition or
synthesis
- need not be programming expert
- fast & fluid design
Read my
important
email
Mar 25 2001 16
Slide
Klemmer et al (UIST2000)
Mar 25 2001 17
SUEDE Video
Mar 25 2001 18
Informal User Interfaces
• Sketching
• Speech
• Handwriting
Mar 25 2001 19
NotePals:
Informal Handwriting Capture
Davis et al (CHI99)
Mar 25 2001 20
NotePals:
Informal Handwriting Capture
Mar 25 2001 21
Takeaway Ideas
• Perceptual user interfaces useful for more
audiences and more places
• Informal User Interfaces valuable for PUIs
­ Minimize or defer recognition
­ Creative or communications­oriented tasks
• Informal User Interfaces can be applied to a
range of perceptual input
­ Sketching
­ Speech
­ Handwriting
Informal PUIs:
No Recognition Required
James Landay
Jason Hong
Scott Klemmer
James Lin
Mark Newman
Mar 25 2001 23
Backup Slides
Mar 25 2001 24
Backup Slides
Igarashi, Edwards, LaMarca, and Mynatt (AVI2000)

More Related Content

Viewers also liked

Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Jason Hong
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
Jason Hong
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingJason Hong
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
Jason Hong
 
A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...
A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...
A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...
Jason Hong
 
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007Jason Hong
 
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Jason Hong
 
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
Jason Hong
 
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Jason Hong
 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Jason Hong
 
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Jason Hong
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Jason Hong
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Jason Hong
 
Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000
Jason Hong
 
Telecommuting from home
Telecommuting from homeTelecommuting from home
Telecommuting from home
Hellen Meyer
 
Plyometric jumping
Plyometric jumpingPlyometric jumping
Plyometric jumping
Hellen Meyer
 
Plyometrics jumping
Plyometrics jumpingPlyometrics jumping
Plyometrics jumping
Hellen Meyer
 
Surveys that pay
Surveys that paySurveys that pay
Surveys that pay
Hellen Meyer
 
Creating and editing spreadsheets
Creating and editing spreadsheetsCreating and editing spreadsheets
Creating and editing spreadsheetscrystalpullen
 
Module 5 lesson 5 remediation
Module 5 lesson 5 remediationModule 5 lesson 5 remediation
Module 5 lesson 5 remediationcrystalpullen
 

Viewers also liked (20)

Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
 
A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...
A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...
A Framework of Energy Efficient Mobile Sensing for Automatic Human State Reco...
 
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
 
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
Gurungo: Coupling Personal Computers and Mobile Devices Through Mobile Data T...
 
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
A Study of Firefighting in the Coming Age of Ubiquitous Computing, 2002
 
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
Sketch Recognizers from the End-User’s, the Designer’s, and the Programmer’s ...
 
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
Privacy in the Age of Ubiquitous Computing, Stanford PCD seminar March 2004
 
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
 
Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000Satin, a toolkit for sketch-based applications at UIST 2000
Satin, a toolkit for sketch-based applications at UIST 2000
 
Telecommuting from home
Telecommuting from homeTelecommuting from home
Telecommuting from home
 
Plyometric jumping
Plyometric jumpingPlyometric jumping
Plyometric jumping
 
Plyometrics jumping
Plyometrics jumpingPlyometrics jumping
Plyometrics jumping
 
Surveys that pay
Surveys that paySurveys that pay
Surveys that pay
 
Creating and editing spreadsheets
Creating and editing spreadsheetsCreating and editing spreadsheets
Creating and editing spreadsheets
 
Module 5 lesson 5 remediation
Module 5 lesson 5 remediationModule 5 lesson 5 remediation
Module 5 lesson 5 remediation
 

Similar to Informal PUIs: No Recognition Required, at AAAI 2002 workshop

Inleiding tot chi
Inleiding tot chiInleiding tot chi
Inleiding tot chi
Erik Duval
 
Csun 2016 inclusive design workshop
Csun 2016 inclusive design workshopCsun 2016 inclusive design workshop
Csun 2016 inclusive design workshop
Charu Pandhi
 
UX & RIAs: UI Design Challenges (ERGOSIGN)
UX & RIAs: UI Design Challenges (ERGOSIGN)UX & RIAs: UI Design Challenges (ERGOSIGN)
UX & RIAs: UI Design Challenges (ERGOSIGN)
Ergosign GmbH
 
Define & design apps for success en
Define & design apps for success enDefine & design apps for success en
Define & design apps for success enAcrmnet s.r.l.
 
Technovation - Intro to UX
Technovation - Intro to UXTechnovation - Intro to UX
Technovation - Intro to UX
John Carpenter
 
Introduction of operating system(latest)
Introduction of operating system(latest)Introduction of operating system(latest)
Introduction of operating system(latest)pamellachan
 
Flat Design
Flat DesignFlat Design
Flat Design
Tomáš Muchka
 
Hci gattech32 ubiquitous-computing
Hci gattech32 ubiquitous-computingHci gattech32 ubiquitous-computing
Hci gattech32 ubiquitous-computingAlvin Setiawan
 
Interaction design quick tour 1
Interaction design quick tour 1Interaction design quick tour 1
Interaction design quick tour 1Laili Farhana M.I.
 
Implementing Modernization by Trevor Perry
Implementing Modernization by Trevor PerryImplementing Modernization by Trevor Perry
Implementing Modernization by Trevor Perry
Fresche Solutions
 
FXD 2019 Keynote: Marti Gold, SiriusXM
FXD 2019 Keynote: Marti Gold, SiriusXMFXD 2019 Keynote: Marti Gold, SiriusXM
FXD 2019 Keynote: Marti Gold, SiriusXM
Mad*Pow
 
An introduction to HCI
An introduction to HCIAn introduction to HCI
An introduction to HCI
Erik Duval
 
Empowering More People By Building Accessible Apps
Empowering More People By Building Accessible AppsEmpowering More People By Building Accessible Apps
Empowering More People By Building Accessible Apps
Guy Barker
 
Remixing Mobile User Experience
Remixing Mobile User ExperienceRemixing Mobile User Experience
Remixing Mobile User Experience
Jason Mesut
 
Ux presentation-i net - https://uxvietnam.com
Ux presentation-i net - https://uxvietnam.comUx presentation-i net - https://uxvietnam.com
Ux presentation-i net - https://uxvietnam.com
Khoi Pham
 
Mobile App Design Best Practices - Usable Interfaces for Tiny Places
Mobile App Design Best Practices - Usable Interfaces for Tiny PlacesMobile App Design Best Practices - Usable Interfaces for Tiny Places
Mobile App Design Best Practices - Usable Interfaces for Tiny PlacesApigee | Google Cloud
 
The minimum you need to know about UX as a coder
The minimum you need to know about UX as a coderThe minimum you need to know about UX as a coder
The minimum you need to know about UX as a coder
John Carpenter
 
20130219 chi chi-overzicht
20130219 chi chi-overzicht20130219 chi chi-overzicht
20130219 chi chi-overzichtErik Duval
 
Natural user interface
Natural user interfaceNatural user interface
Natural user interface
Semper IT Services
 

Similar to Informal PUIs: No Recognition Required, at AAAI 2002 workshop (20)

Inleiding tot chi
Inleiding tot chiInleiding tot chi
Inleiding tot chi
 
Csun 2016 inclusive design workshop
Csun 2016 inclusive design workshopCsun 2016 inclusive design workshop
Csun 2016 inclusive design workshop
 
UX & RIAs: UI Design Challenges (ERGOSIGN)
UX & RIAs: UI Design Challenges (ERGOSIGN)UX & RIAs: UI Design Challenges (ERGOSIGN)
UX & RIAs: UI Design Challenges (ERGOSIGN)
 
Define & design apps for success en
Define & design apps for success enDefine & design apps for success en
Define & design apps for success en
 
Technovation - Intro to UX
Technovation - Intro to UXTechnovation - Intro to UX
Technovation - Intro to UX
 
Chi overview
Chi overviewChi overview
Chi overview
 
Introduction of operating system(latest)
Introduction of operating system(latest)Introduction of operating system(latest)
Introduction of operating system(latest)
 
Flat Design
Flat DesignFlat Design
Flat Design
 
Hci gattech32 ubiquitous-computing
Hci gattech32 ubiquitous-computingHci gattech32 ubiquitous-computing
Hci gattech32 ubiquitous-computing
 
Interaction design quick tour 1
Interaction design quick tour 1Interaction design quick tour 1
Interaction design quick tour 1
 
Implementing Modernization by Trevor Perry
Implementing Modernization by Trevor PerryImplementing Modernization by Trevor Perry
Implementing Modernization by Trevor Perry
 
FXD 2019 Keynote: Marti Gold, SiriusXM
FXD 2019 Keynote: Marti Gold, SiriusXMFXD 2019 Keynote: Marti Gold, SiriusXM
FXD 2019 Keynote: Marti Gold, SiriusXM
 
An introduction to HCI
An introduction to HCIAn introduction to HCI
An introduction to HCI
 
Empowering More People By Building Accessible Apps
Empowering More People By Building Accessible AppsEmpowering More People By Building Accessible Apps
Empowering More People By Building Accessible Apps
 
Remixing Mobile User Experience
Remixing Mobile User ExperienceRemixing Mobile User Experience
Remixing Mobile User Experience
 
Ux presentation-i net - https://uxvietnam.com
Ux presentation-i net - https://uxvietnam.comUx presentation-i net - https://uxvietnam.com
Ux presentation-i net - https://uxvietnam.com
 
Mobile App Design Best Practices - Usable Interfaces for Tiny Places
Mobile App Design Best Practices - Usable Interfaces for Tiny PlacesMobile App Design Best Practices - Usable Interfaces for Tiny Places
Mobile App Design Best Practices - Usable Interfaces for Tiny Places
 
The minimum you need to know about UX as a coder
The minimum you need to know about UX as a coderThe minimum you need to know about UX as a coder
The minimum you need to know about UX as a coder
 
20130219 chi chi-overzicht
20130219 chi chi-overzicht20130219 chi chi-overzicht
20130219 chi chi-overzicht
 
Natural user interface
Natural user interfaceNatural user interface
Natural user interface
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Informal PUIs: No Recognition Required, at AAAI 2002 workshop

  • 1. Informal PUIs: No Recognition Required James Landay Jason Hong Scott Klemmer James Lin Mark Newman
  • 2. Mar 25 2001 2 WIMPy User Interfaces • Windows, Icons, Menus, Pointer ­ Hitting limitations of this kind of interface • WIMP designed for limited audience ­ Full use of eyes ­ Literate ­ Full use of hands • WIMP designed for limited situations ­ Fixed location (often offices) ­ Sitting down ­ Single person
  • 3. Mar 25 2001 3 Perceptual User Interfaces • PUIs leverage our innate perceptual, motor, and cognitive abilities ­ Speech recognition, computer vision, sketching, handwriting • Sketching is one part of this bigger push • PUIs more useful for different audiences and wider range of situations ­ Mobile workers or Home ­ Speech => Hands­free ­ Location Tracking => Physical motion
  • 4. Mar 25 2001 4 PUIs and Recognition • Key question: ­ When should perceptual input be recognized? • Immediate recognition can interfere with creativity and communications
  • 5. Mar 25 2001 5 Communication and Creativity • Informal visual representation ­ communicates “unfinished” ­ encourages creativity ­ faster to create ­ higher level comments • Formal visual representation ­ communicates “finished” ­ inhibits creativity (detailed) ­ slower to create ­ lower­level comments
  • 6. Mar 25 2001 6 Informal User Interfaces • Historic bias towards formal user interfaces ­ Computation over creativity and communication ­ Structured input to simplify computation • Position: ­ Recognition interferes with creativity and communication due to errors and perception ­ Recognition should be minimized or deferred for these kinds of apps
  • 7. Mar 25 2001 7 Informal User Interfaces • Sketching • Speech • Handwriting
  • 8. Mar 25 2001 8 Informal User Interfaces • Sketching • Speech • Handwriting
  • 9. Mar 25 2001 9 Slide Landay (1996)
  • 10. Mar 25 2001 10 Slide Gross and Do (UIST96)
  • 11. Mar 25 2001 11 Slide Lin, Newman, Hong, Landay (CHI2000)
  • 12. Mar 25 2001 12 DENIM Video
  • 13. Mar 25 2001 13 Informal User Interfaces • Sketching • Speech • Handwriting
  • 14. Mar 25 2001 14 Slide Stifelman, Arons, Schmandt (CHI2001)
  • 15. Mar 25 2001 15 SUEDE: Informal Prototyping for Speech-based UIs • Supports design practice - example scripts - Wizard of Oz - error simulation - iterative design • Informal user interface - no speech recognition or synthesis - need not be programming expert - fast & fluid design Read my important email
  • 16. Mar 25 2001 16 Slide Klemmer et al (UIST2000)
  • 17. Mar 25 2001 17 SUEDE Video
  • 18. Mar 25 2001 18 Informal User Interfaces • Sketching • Speech • Handwriting
  • 19. Mar 25 2001 19 NotePals: Informal Handwriting Capture Davis et al (CHI99)
  • 20. Mar 25 2001 20 NotePals: Informal Handwriting Capture
  • 21. Mar 25 2001 21 Takeaway Ideas • Perceptual user interfaces useful for more audiences and more places • Informal User Interfaces valuable for PUIs ­ Minimize or defer recognition ­ Creative or communications­oriented tasks • Informal User Interfaces can be applied to a range of perceptual input ­ Sketching ­ Speech ­ Handwriting
  • 22. Informal PUIs: No Recognition Required James Landay Jason Hong Scott Klemmer James Lin Mark Newman
  • 23. Mar 25 2001 23 Backup Slides
  • 24. Mar 25 2001 24 Backup Slides Igarashi, Edwards, LaMarca, and Mynatt (AVI2000)

Editor's Notes

  1. WIMP - Windows Icon Menu Pointer 1997 report from National Research Council, 5% of individuals over age 15 in the US have vision problems 1992 report from US Department of Education, 21% of Americans over age 16 have limited literacy skills Neglected audiences include: Mobile workers, homes, groups of people
  2. Saw a video game in Hong Kong where you had boxing gloves, and had sensors on top of the video game, letting you physically dodge
  3. Palm Pilot example Position is that Informal User Interfaces seem better for documenting than for transforming Suggests a malleability of form (useful for creativity) Recognition errors interfere Position is that Informal User Interfaces also better for communicating Unrecognized input keeps the nuances of expression Recognition errors interfere Take you through some apps
  4. Precision makes it easy for the computer to represent the objects in the system. Precision is also important for mechanical drawings But this is very different from how we do things without computers Sketching is very valuable for creative design tasks Explore more ideas Don't have to worry about details such as color, font, and alignment (until necessary) SILK, PhD dissertation by Landay, is an example of a tool that supports sketching for GUI design Does immediate recognition of objects but keeps strokes the same Still has some problems due to immediate recognition and feedback
  5. Freehand drawing for conceptual design Also does immediate recognition of objects (tree, house)
  6. Little built-in recognition Groups things that might be words together Arrows Otherwise no recognition
  7. Show part of DENIM video here
  8. Speech Most speech recognition systems try to recognize human speech and translate it immediately into a form that machines can deal with Often causes people to enter a dialog with the system to correct mistakes as they occur Immediate recognition is useful in many cases, but gets in the way in writing, designing, and brainstorming Informal Speech Audio Notebook Freeform ink and speech, notes and speech are un-interpreted Synchronizes the notes and speech, letting you explore either and link to the other