25 research outputs found

    A Study of Immediate Requery Behavior in Search

    Get PDF
    © Haotian Zhang, Mustafa Abualsaud and Mark D. Smucker, 2018. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive version was published in the Proceedings of the 2018 Conference on Human Information Interaction & Retrieval, (CHIIR'18), ACM. , https://doi.org/10.1145/3176349.3176400When search results fail to satisfy users' information needs, users often reformulate their search query in the hopes of receiving better results. In many cases, users immediately requery without clicking on any search results. In this paper, we report on a user study designed to investigate the rate at which users immediately reformulate at different levels of search quality. We had users search for answers to questions as we manipulated the placement of the only relevant document in a ranked list of search results. We show that as the quality of search results decreases, the probability of immediately requerying increases. We find that users can quickly decide to immediately reformulate, and the time to immediately reformulate appears to be independent of the quality of the search results.Finally, we show that there appears to be two types of users. One group has a high probability of immediately reformulating and the other is unlikely to immediately reformulate unless no relevant documents can be found in the search results. While requerying takes time, it is the group of users who are more likely to immediately requery that are able to able find answers to questions the fastest.Natural Sciences and Engineering Research Council of Canada (Grants CRDPJ 468812-14 and RGPIN-2014-03642), in part by Google, and in part by the University of Waterloo

    Patterns of Search Result Examination: Query to First Action.

    Get PDF
    To determine key factors that affect a user's behavior with search results, we conducted a controlled eye-tracking study of users completing search tasks using both desktop and mobile devices. We focus our investigation on users' behavior from their query to the first action they take with the search engine results page (SERP): either a click on a search result or a reformulation of their query. We found that a user deciding to reformulate a query rather than click on a result is best understood as being caused by the user's examination pattern not including a relevant search result. If a user sees a relevant result, they are very likely to click it. Of note, users do not look at all search results and their examination may be influenced by other factors. The key factors we found to explain a user's examination pattern are: the rank of search results, the user type, and the query quality. While existing research has identified rank and user types as important factors affecting examination patterns, to our knowledge, query quality is a new discovery. We found that user queries can be understood as either of weak or strong quality. Weak queries are those that the user may believe are more likely to fail compared to a strong query, and as a result, we find that users modify their examination patterns to view fewer documents when they issue a weak query, i.e. they give up sooner.Natural Sciences and Engineering Research Council of Canada, Grant CRDPJ 468812-14 || Natural Sciences and Engineering Research Council of Canada, Grant RGPIN-2014-03642 || Google || University of Waterlo

    Interactive Machine Learning with Applications in Health Informatics

    Full text link
    Recent years have witnessed unprecedented growth of health data, including millions of biomedical research publications, electronic health records, patient discussions on health forums and social media, fitness tracker trajectories, and genome sequences. Information retrieval and machine learning techniques are powerful tools to unlock invaluable knowledge in these data, yet they need to be guided by human experts. Unlike training machine learning models in other domains, labeling and analyzing health data requires highly specialized expertise, and the time of medical experts is extremely limited. How can we mine big health data with little expert effort? In this dissertation, I develop state-of-the-art interactive machine learning algorithms that bring together human intelligence and machine intelligence in health data mining tasks. By making efficient use of human expert's domain knowledge, we can achieve high-quality solutions with minimal manual effort. I first introduce a high-recall information retrieval framework that helps human users efficiently harvest not just one but as many relevant documents as possible from a searchable corpus. This is a common need in professional search scenarios such as medical search and literature review. Then I develop two interactive machine learning algorithms that leverage human expert's domain knowledge to combat the curse of "cold start" in active learning, with applications in clinical natural language processing. A consistent empirical observation is that the overall learning process can be reliably accelerated by a knowledge-driven "warm start", followed by machine-initiated active learning. As a theoretical contribution, I propose a general framework for interactive machine learning. Under this framework, a unified optimization objective explains many existing algorithms used in practice, and inspires the design of new algorithms.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/147518/1/raywang_1.pd

    Users, Queries, and Bad Abandonment in Web Search

    Get PDF
    After a user submits a query and receives a list of search results, the user may abandon their query without clicking on any of the search results. A bad query abandonment is when a searcher abandons the SERP because they were dissatisfied with the quality of the search results, often making the user reformulate their query in the hope of receiving better search results. As we move closer to understanding when and what causes a user to abandon their query under different qualities of search results, we move forward in an overall understanding of user behavior with search engines. In this thesis, we describe three user studies to investigate bad query abandonment. First, we report on a study to investigate the rate and time at which users abandon their queries at different levels of search quality. We had users search for answers to questions, but showed users manipulated SERPs that contain one relevant document placed at different ranks. We show that as the quality of search results decreases, the probability of abandonment increases, and that users quickly decide to abandon their queries. Users make their decisions fast, but not all users are the same. We show that there appear to be two types of users that behave differently, with one group more likely to abandon their query and are quicker in finding answers than the group less likely to abandon their query. Second, we describe an eye-tracking experiment that focuses on understanding possible causes of users' willingness to examine SERPs and what motivates users to continue or discontinue their examination. Using eye-tracking data, we found that a user deciding to abandon a query is best understood by the user's examination pattern not including a relevant search result. If a user sees a relevant result, they are very likely to click it. However, users' examination of results are different and may be influenced by other factors. The key factors we found are the rank of search results, the user type, and the query quality. For example, we show that regardless of where the relevant document is placed in the SERP, the type of query submitted affects examination, and if a user enters an ambiguous query, they are likely to examine fewer results. Third, we show how the nature of non-relevant material affects users' willingness to further explore a ranked list of search results. We constructed and showed participants manipulated SERPs with different types of non-relevant documents. We found that user examination of search results and time to query abandonment is influenced by the coherence and type of non-relevant documents included in the SERP. For SERPs coherent on off-topic results, users spend the least amount of time before abandoning and are less likely to request to view more results. The time they spend increases as the SERP quality improves, and users are more likely to request to view more results when the SERP contains diversified non-relevant results on multiple subtopics

    The role of concomitant drugs in the aetiology of fatal heroin- and methadone- related overdose

    Get PDF
    Heroin and methadone poisoning are significant causes of death of young people in the United Kingdom. In a high proportion of these fatalities concomitant substances are also detected. This thesis is concerned with the significance of this observation and the hypothesis that these substances are risk factors for fatal heroin- and methadone-related overdose. A referential database was developed incorporating post-mortem toxicology data from 1,222 heroin and methadone overdose fatalities from around England and Wales. The most commonly detected concomitant drugs were ethanol, diazepam, temazepam, an additional opioid and cocaine. In the first of two studies, statistical models were derived, using multiple linear regression, to assess the potential effect of these concomitant substances on the lethality of heroin and methadone. Log-log and semi-log models were considered and regression coefficients were estimated by ordinary least squares. Ethanol blood concentrations were associated with significantly reduced blood levels of total morphine and methadone, consistent with a causal role for this substance. There was an absence of evidence of a similar effect for other commonly detected concomitants

    Custom Visualization without Real Programming

    Get PDF
    Information Visualization tools have simplified visualization development. Some tools help simple users construct standard visualizations; others help programmers develop custom visualizations. This thesis contributes to the field of Information Visualization and End-User Development. The first contribution of the thesis is a taxonomy for Information Visualization development tools. Existing taxonomies for Information Visualization are helpful, but none of them can properly categorize visualization tools from a user development perspective. The categorization of 20 Information Visualization tools proves the applicability of this taxonomy, and the result showed that there are no Drag-and-Drop tools that allow end-user developers as well as programmers to create custom visualizations. The results can be used by the End-User Development and the Information Visualization community to identify future avenues of research. The second contribution is a new visualization development approach, the Drag-Drop-Set-View-Interact approach provided by the visualization too

    Effects of Data Replication on Data Exfiltration in Mobile Ad hoc Networks Utilizing Reactive Protocols

    Get PDF
    A swarm of autonomous UAVs can provide a significant amount of ISR data where current UAV assets may not be feasible or practical. As such, the availability of the data the resides in the swarm is a topic that will benefit from further investigation. This thesis examines the impact of le replication and swarm characteristics such as node mobility, swarm size, and churn rate on data availability utilizing reactive protocols. This document examines the most prominent factors affecting the networking of nodes in a MANET. Factors include network routing protocols and peer-to-peer le protocols. It compares and contrasts several open source network simulator environments. Experiment implementation is documented, covering design considerations, assumptions, and software implementation, as well as detailing constant, response and variable factors. Collected data is presented and the results show that in swarms of sizes of 30, 45, and 60 nodes, le replication improves data availability until network saturation is reached, with the most significant benefit gained after only one copy is made. Mobility, churn rate, and swarm density all influence the replication impact

    The busy coder's guide to Android development

    Get PDF
    380 p. ; il. , Indice.Libro ElectrónicoIf you are interested in programming for Android, you will need at least basic understanding of how to program in Java. Android programming is done using Java syntax, plus a class library that resembles a subset of the Java SE library (plus Android-specific extensions). If you have not programmed in Java before, you probably should quick learn how that works before attempting to dive into programming for Android. The book does not cover in any detail how to download or install the Android development tools, either the Eclipse IDE flavor or the standalone flavor. The Android Web site covers this quite nicely. The material in the book should be relevant whether you use the IDE or not. You should download, install, and test out the Android development tools from the Android Web site before trying any of the examples listed in this book.Welcome to the Warescription!xiii Prefacexv Welcome to the Book!xv Prerequisitesxv Warescriptionxvi Book Bug Bountyxvii Source Code Licensexviii Creative Commons and the Four-to-Free (42F) Guaranteexviii The Big Picture1 What Androids Are Made Of3 Activities3 Content Providers4 Intents4 Services4 Stuff At Your Disposal5 Storage5 Network5 Multimedia5 GPS5 Phone Services6 Project Structure7 Root Contents7 The Sweat Off Your Brow8 iii Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition And Now, The Rest of the Story8 What You Get Out Of It9 Inside the Manifest11 In The Beginning, There Was the Root, And It Was Good11 Permissions, Instrumentations, and Applications (Oh, My!)12 Your Application Does Something, Right?13 Creating a Skeleton Application17 Begin at the Beginning17 The Activity18 Dissecting the Activity19 Building and Running the Activity21 Using XML-Based Layouts23 What Is an XML-Based Layout?23 Why Use XML-Based Layouts?24 OK, So What Does It Look Like?25 What's With the @ Signs?26 And We Attach These to the JavaHow?26 The Rest of the Story27 Employing Basic Widgets29 Assigning Labels29 Button, Button, Who's Got the Button?30 Fleeting Images31 Fields of Green Or Other Colors31 Just Another Box to Check34 Turn the Radio Up37 It's Quite a View39 Useful Properties39 Useful Methods39 Working with Containers41 Thinking Linearly42 Concepts and Properties42 Example45 All Things Are Relative50 iv Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition Concepts and Properties50 Example53 Tabula Rasa56 Concepts and Properties56 Example59 Scrollwork60 Using Selection Widgets65 Adapting to the Circumstances65 Using ArrayAdapter66 Other Key Adapters67 Lists of Naughty and Nice68 Spin Control70 Grid Your Lions (Or Something Like That)74 Fields: Now With 35% Less Typing!78 Galleries, Give Or Take The Art82 Employing Fancy Widgets and Containers83 Pick and Choose83 Time Keeps Flowing Like a River88 Making Progress89 Putting It On My Tab90 The Pieces91 The Idiosyncrasies91 Wiring It Together93 Other Containers of Note96 Applying Menus97 Flavors of Menu97 Menus of Options98 Menus in Context100 Taking a Peek102 Embedding the WebKit Browser107 A Browser, Writ Small107 Loading It Up109 Navigating the Waters111 v Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition Entertaining the Client111 Settings, Preferences, and Options (Oh, My!)114 Showing Pop-Up Messages117 Raising Toasts117 Alert! Alert!118 Checking Them Out119 Dealing with Threads123 Getting Through the Handlers123 Messages124 Runnables127 Running In Place127 Utilities (And I Don't Mean Water Works)128 And Now, The Caveats128 Handling Activity Lifecycle Events131 Schroedinger's Activity131 Life, Death, and Your Activity132 onCreate() and onCompleteThaw()132 onStart(), onRestart(), and onResume()133 onPause(), onFreeze(), onStop(), and onDestroy()134 Using Preferences137 Getting What You Want137 Stating Your Preference138 A Preference For Action138 Accessing Files143 You And The Horse You Rode In On143 Readin' 'n Writin'147 Working with Resources151 The Resource Lineup151 String Theory152 Plain Strings152 String Formats153 Styled Text153 Styled Formats154 vi Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition Got the Picture?158 XML: The Resource Way160 Miscellaneous Values163 Dimensions163 Colors164 Arrays165 Different Strokes for Different Folks166 Managing and Accessing Local Databases171 A Quick SQLite Primer172 Start at the Beginning173 Setting the Table174 Makin' Data174 What Goes Around, Comes Around176 Raw Queries176 Regular Queries177 Building with Builders177 Using Cursors179 Change for the Sake of Change179 Making Your Own Cursors180 Data, Data, Everywhere180 Leveraging Java Libraries183 The Outer Limits183 Ants and Jars184 Communicating via the Internet187 REST and Relaxation187 HTTP Operations via Apache Commons188 Parsing Responses190 Stuff To Consider192 Email over Java193 Creating Intent Filters199 What's Your Intent?200 Pieces of Intents200 Stock Options201 vii Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition Intent Routing202 Stating Your Intent(ions)203 Narrow Receivers205 Launching Activities and Sub-Activities207 Peers and Subs208 Start 'Em Up208 Make an Intent209 Make the Call209 Finding Available Actions via Introspection215 Pick 'Em216 Adaptable Adapters220 Would You Like to See the Menu?223 Asking Around225 Using a Content Provider229 Pieces of Me229 Getting a Handle230 Makin' Queries231 Adapting to the Circumstances233 Doing It By Hand235 Position235 Getting Properties236 Setting Properties237 Give and Take238 Beware of the BLOB!239 Building a Content Provider241 First, Some Dissection241 Next, Some Typing242 Step #1: Create a Provider Class243 ContentProvider243 DatabaseContentProvider252 Step #2: Supply a Uri252 Step #3: Declare the Properties252 Step #4: Update the Manifest253 viii Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition Notify-On-Change Support254 Requesting and Requiring Permissions257 Mother, May I?258 Halt! Who Goes There?259 Enforcing Permissions via the Manifest260 Enforcing Permissions Elsewhere261 May I See Your Documents?262 Creating a Service263 Getting Buzzed264 Service with Class264 When IPC Attacks!266 Write the AIDL267 Implement the Interface268 Manifest Destiny270 Where's the Remote?271 Invoking a Service273 Bound for Success274 Request for Service276 Prometheus Unbound276 Manual Transmission276 Alerting Users Via Notifications279 Types of Pestering279 Hardware Notifications280 Icons281 Letting Your Presence Be Felt281 Accessing Location-Based Services287 Location Providers: They Know Where You're Hiding288 Finding Yourself288 On the Move292 Are We There Yet? Are We There Yet? Are We There Yet?292 TestingTesting296 Mapping with MapView and MapActivity299 The Bare Bones299 ix Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition Exercising Your Control301 Zoom301 Center302 Reticle303 Traffic and Terrain303 Follow You, Follow Me305 Layers Upon Layers307 Overlay Classes308 Drawing the Overlay308 Handling Screen Taps310 Playing Media313 Get Your Media On314 Making Noise315 Moving Pictures321 Handling Telephone Calls325 No, No, No – Not That IPhone326 What's Our Status?326 You Make the Call!326 Searching with SearchManager333 Hunting Season333 Search Yourself335 Craft the Search Activity336 Update the Manifest340 Try It Out342 The TourIt Sample Application347 Installing TourIt347 Demo Location Provider347 SD Card Image with Sample Tour348 Running TourIt349 Main Activity350 Configuration Activity352 Cue Sheet Activity354 Map Activity355 x Subscribe to updates at http://commonswarecom Special Creative Commons BY-NC-SA 30 License Edition Tour Update Activity357 Help Activity358 TourIt's Manifest359 TourIt's Content360 Data Storage361 Content Provider361 Model Classes361 TourIt's Activities362 TourListActivity362 TourViewActivity363 TourMapActivity367 TourEditActivity367 HelpActivity367 ConfigActivity36

    To Host a Legacy System to the Web

    Get PDF
    The dramatic improvements in global interconectivity due to intranets, extranets and the Internet has led to many enterprises to consider migrating legacy systems to a web based systems. While data remapping is relatively straightforward in most cases, greater challenges lie in adapting legacy application software. This research effort describes an experiment in which a legacy system is migrated to a web-client/server environment. First, this thesis reports on the difficulties and issues arising when porting a legacy system International Invoice (IIMM) to a web-client/server environment. Next, this research analyzes the underlying issues, and offer cautionary guidance to future migrators and finally this research effort builds a prototype of the legacy system on a web client/server environment that demonstrates effective strategies to deal with these issues
    corecore