Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Artificial intelligence (3)
- Explainable artificial intelligence (3)
- Machine learning (3)
- Engagement (2)
- Linguistics (2)
-
- Natural language processing (2)
- Part-of-speech tagging (2)
- Perception (2)
- Program comprehension (2)
- Robotics (2)
- Software maintenance (2)
- AI (1)
- Abusive (1)
- Advances (1)
- Agent systems (1)
- Algorithmic music (1)
- Anthropomorphism (1)
- Argumentation (1)
- Argumentation Theory (1)
- Argumentation theory (1)
- Artificial Intelligene (1)
- Assessments (1)
- Association Rules (1)
- Audiovisual speech (1)
- Automatic Search Query Enhancement (1)
- Automatic annotation (1)
- Automatic tool (1)
- BERT (1)
- Background corpus (1)
- Big Data (1)
Articles 1 - 30 of 42
Full-Text Articles in Entire DC Network
A Method For Generating A Non-Manual Feature Model For Sign Language Processing, Robert G. Smith Dr, Markus Hofmann Dr
A Method For Generating A Non-Manual Feature Model For Sign Language Processing, Robert G. Smith Dr, Markus Hofmann Dr
Articles
While recent approaches to sign language processing have shifted to the domain of Machine Learning (ML), the treatment of Non-Manual Features (NMFs) remains an open question. The principal challenge facing this method is the comparatively small sign language corpora available for training machine learning models. This study produces a statistical model which may be used in future ML, rules-based, and hybrid-learning approaches for sign language processing tasks. In doing so, this research explores the emerging patterns of non-manual articulation concerning grammatical classes in Irish Sign Language (ISL). The experimental method applied here is a novel implementation of an association rules …
Investigating How Speech And Animation Realism Influence The Perceived Personality Of Virtual Characters And Agents, Sean A. Thomas, Ylva Ferstl, Rachel Mcdonnell, Cathy Ennis
Investigating How Speech And Animation Realism Influence The Perceived Personality Of Virtual Characters And Agents, Sean A. Thomas, Ylva Ferstl, Rachel Mcdonnell, Cathy Ennis
Articles
The portrayed personality of virtual characters and agents is understood to influence how we perceive and engage with digital applications. Understanding how the features of speech and animation drive portrayed personality allows us to intentionally design characters to be more personalized and engaging. In this study, we use performance capture data of unscripted conversations from a variety of actors to explore the perceptual outcomes associated with the modalities of speech and motion. Specifically, we contrast full performance-driven characters to those portrayed by generated gestures and synthesized speech, analysing how the features of each influence portrayed personality according to the Big …
Shapley Idioms: Analysing Bert Sentence Embeddings For General Idiom Token Identification, Vasudevan Nedumpozhimana, Filip Klubicka, John Kelleher
Shapley Idioms: Analysing Bert Sentence Embeddings For General Idiom Token Identification, Vasudevan Nedumpozhimana, Filip Klubicka, John Kelleher
Articles
This article examines the basis of Natural Language Understanding of transformer based language models, such as BERT. It does this through a case study on idiom token classification. We use idiom token identification as a basis for our analysis because of the variety of information types that have previously been explored in the literature for this task, including: topic, lexical, and syntactic features. This variety of relevant information types means that the task of idiom token identification enables us to explore the forms of linguistic information that a BERT language model captures and encodes in its representations. The core of …
A Framework Of Web-Based Dark Patterns That Can Be Detected Manually Or Automatically, Ioannis Stavrakakis, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney
A Framework Of Web-Based Dark Patterns That Can Be Detected Manually Or Automatically, Ioannis Stavrakakis, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney
Articles
This research explores the design and development of a framework for the detection of Dark Patterns, which are a series of user interface tricks that manipulate users into actions that they do not intend to do, for example, share more data than they want to, or spend more money than they plan to. The interface does this using either deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. They are typically varied in their form and what they do, and the goal of this …
On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu
On The Documentation Of Refactoring Types, Eman Abdullah Alomar, Jiaqian Liu, Kenneth Addo, Mohamed Wiem Mkaouer, Christian D. Newman, Ali Ouni, Zhe Yu
Articles
Commit messages are the atomic level of software documentation. They provide a natural language description of the code change and its purpose. Messages are critical for software maintenance and program comprehension. Unlike documenting feature updates and bug fixes, little is known about how developers document their refactoring activities. Specifically, developers can perform multiple refactoring operations, including moving methods, extracting classes, renaming attributes, for various reasons, such as improving software quality, managing technical debt, and removing defects. Yet, there is no systematic study that analyzes the extent to which the documentation of refactoring accurately describes the refactoring operations performed at the …
Notions Of Explainability And Evaluation Approaches For Explainable Artificial Intelligence, Giulia Vilone, Luca Longo
Notions Of Explainability And Evaluation Approaches For Explainable Artificial Intelligence, Giulia Vilone, Luca Longo
Articles
Explainable Artificial Intelligence (XAI) has experienced a significant growth over the last few years. This is due to the widespread application of machine learning, particularly deep learning, that has led to the development of highly accurate models that lack explainability and interpretability. A plethora of methods to tackle this problem have been proposed, developed and tested, coupled with several studies attempting to define the concept of explainability and its evaluation. This systematic review contributes to the body of knowledge by clustering all the scientific studies via a hierarchical system that classifies theories and notions related to the concept of explainability …
Provenance: An Intermediary-Free Solution For Digital Content Verification, Bilal Yousuf, M. Atif Qureshi, Brendan Spillane, Gary Munnelly, Oisin Carroll, Matthew Runswick, Kirsty Park, Eileen Culloty, Owen Conlan, Jane Suiter
Provenance: An Intermediary-Free Solution For Digital Content Verification, Bilal Yousuf, M. Atif Qureshi, Brendan Spillane, Gary Munnelly, Oisin Carroll, Matthew Runswick, Kirsty Park, Eileen Culloty, Owen Conlan, Jane Suiter
Articles
The threat posed by misinformation and disinformation is one of the defining challenges of the 21st century. Provenance is designed to help combat this threat by warning users when the content they are looking at may be misinformation or disinformation. It is also designed to improve media literacy among its users and ultimately reduce susceptibility to the threat among vulnerable groups within society. The Provenance browser plugin checks the content that users see on the Internet and social media and provides warnings in their browser or social media feed. Unlike similar plugins, which require human experts to provide evaluations and …
Classification Of Explainable Artificial Intelligence Methods Through Their Output Formats, Giulia Vilone, Luca Longo
Classification Of Explainable Artificial Intelligence Methods Through Their Output Formats, Giulia Vilone, Luca Longo
Articles
Machine and deep learning have proven their utility to generate data-driven models with high accuracy and precision. However, their non-linear, complex structures are often difficult to interpret. Consequently, many scholars have developed a plethora of methods to explain their functioning and the logic of their inferences. This systematic review aimed to organise these methods into a hierarchical classification system that builds upon and extends existing taxonomies by adding a significant dimension—the output formats. The reviewed scientific papers were retrieved by conducting an initial search on Google Scholar with the keywords “explainable artificial intelligence”; “explainable machine learning”; and “interpretable machine learning”. …
An Ensemble Approach For Annotating Source Code Identifiers With Part-Of-Speech Tags, Christian D. Newman,, Michael J. Decker, Reem S. Alsuhaibani, Anthony Peruma, Mohamed Wiem Mkaouer, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy Sheldon, Emily Hill
An Ensemble Approach For Annotating Source Code Identifiers With Part-Of-Speech Tags, Christian D. Newman,, Michael J. Decker, Reem S. Alsuhaibani, Anthony Peruma, Mohamed Wiem Mkaouer, Satyajit Mohapatra, Tejal Vishnoi, Marcos Zampieri, Timothy Sheldon, Emily Hill
Articles
This paper presents an ensemble part-of-speech tagging approach for source code identifiers. Ensemble tagging is a technique that uses machine-learning and the output from multiple part-of-speech taggers to annotate natural language text at a higher quality than the part-of-speech taggers are able to obtain independently. Our ensemble uses three state-of-the-art part-of-speech taggers: SWUM, POSSE, and Stanford. We study the quality of the ensemble's annotations on five different types of identifier names: function, class, attribute, parameter, and declaration statement at the level of both individual words and full identifier names. We also study and discuss the weaknesses of our tagger to …
On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill
On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill
Articles
Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the performance of automated approaches that leverage identifier names in source code analysis; threatening many of the advantages which stand to be gained from advances in artificial intelligence and machine learning. Therefore, it is vital to support developers in naming and renaming identifiers. In this paper, we extend our prior work, which studies the primary method through which names evolve: rename refactorings. In our prior work, we contextualize rename changes by examining commit messages and other refactorings. In this extension, we further consider data …
Exploring The Potential Of Defeasible Argumentation For Quantitative Inferences In Real-World Contexts: An Assessment Of Computational Trust, Lucas Rizzo, Pierpaolo Dondio, Luca Longo
Exploring The Potential Of Defeasible Argumentation For Quantitative Inferences In Real-World Contexts: An Assessment Of Computational Trust, Lucas Rizzo, Pierpaolo Dondio, Luca Longo
Articles
Argumentation has recently shown appealing properties for inference under uncertainty and conflicting knowledge. However, there is a lack of studies focused on the examination of its capacity of exploiting real-world knowledge bases for performing quantitative, case-by-case inferences. This study performs an analysis of the inferential capacity of a set of argument-based models, designed by a human reasoner, for the problem of trust assessment. Precisely, these models are exploited using data from Wikipedia, and are aimed at inferring the trustworthiness of its editors. A comparison against non-deductive approaches revealed that these models were superior according to values inferred to recognised trustworthy …
How We Refactor And How We Document It? On The Use Of Supervised Machine Learning Algorithms To Classify Refactoring Documentation, Eman Abdullah Alomar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Marouane Kessentini, Ali Ouni
How We Refactor And How We Document It? On The Use Of Supervised Machine Learning Algorithms To Classify Refactoring Documentation, Eman Abdullah Alomar, Anthony Peruma, Mohamed Wiem Mkaouer, Christian D. Newman, Marouane Kessentini, Ali Ouni
Articles
Refactoring is the art of improving the structural design of a software system without altering its external behavior. Today, refactoring has become a well-established and disciplined software engineering practice that has attracted a significant amount of research presuming that refactoring is primarily motivated by the need to improve system structures. However, recent studies have shown that developers may incorporate refactoring strategies in other development-related activities that go beyond improving the design especially with the emerging challenges in contemporary software engineering. Unfortunately, these studies are limited to developer interviews and a reduced set of projects. To cope with the above-mentioned limitations, …
Preface To The Special Issue On Advances In Argumentation In Artificial Intelligence, Pierpaolo Dondio, Luca Longo, Stefano Bistarelli
Preface To The Special Issue On Advances In Argumentation In Artificial Intelligence, Pierpaolo Dondio, Luca Longo, Stefano Bistarelli
Articles
Now at the forefront of automated reasoning, argumentation has become a key research topic within Artificial Intelligence. It involves the investigation of those activities for the production and exchange of arguments, where arguments are attempts to persuade someone of something by giving reasons for accepting a particular conclusion or claim as evident. The study of argumentation has been the focus of attention of philosophers and scholars, from Aristotle and classical rhetoric to the present day. The computational study of arguments has emerged as a field of research in AI in the last two decades, mainly fuelled by the interest from …
In Their Shoes: A Structured Analysis Of Job Demands, Resources, Work Experiences, And Platform Commitment Of Crowdworkers In China, Yihong Wang, Konstantinos Papangelis, Ioanna Lykourentzou, Hai-Ning Liang, Irwyn Sadien, Evangelia Demerouti, Vassilis-Javed Khan
In Their Shoes: A Structured Analysis Of Job Demands, Resources, Work Experiences, And Platform Commitment Of Crowdworkers In China, Yihong Wang, Konstantinos Papangelis, Ioanna Lykourentzou, Hai-Ning Liang, Irwyn Sadien, Evangelia Demerouti, Vassilis-Javed Khan
Articles
Despite the growing interest in crowdsourcing, this new labor model has recently received severe criticism. The most important point of this criticism is that crowdworkers are often underpaid and overworked. This severely affects job satisfaction and productivity. Although there is a growing body of evidence exploring the work experiences of crowdworkers in various countries, there have been a very limited number of studies to the best of our knowledge exploring the work experiences of Chinese crowdworkers. In this paper we aim to address this gap. Based on a framework of well-established approaches, namely the Job Demands-Resources model, the Work Design …
Expectations Of Artificial Intelligence And The Performativity Of Ethics: Implications For Communication Governance, Aphra Kerr, Marguerite Barry, John D. Kelleher
Expectations Of Artificial Intelligence And The Performativity Of Ethics: Implications For Communication Governance, Aphra Kerr, Marguerite Barry, John D. Kelleher
Articles
This article draws on the sociology of expectations to examine the construction of expectations of ‘ethical AI’ and considers the implications of these expectations for communication governance. We first analyse a range of public documents to identify the key actors, mechanisms and issues which structure societal expectations around artificial intelligence (AI) and an emerging discourse on ethics. We then explore expectations of AI and ethics through a survey of members of the public. Finally, we discuss the implications of our findings for the role of AI in communication gover- nance. We find that, despite societal expectations that we can design …
Comparing Tagging Suggestion Models On Discrete Corpora, Bojan Bozic, Andre Rios, Sarah Jane Delany
Comparing Tagging Suggestion Models On Discrete Corpora, Bojan Bozic, Andre Rios, Sarah Jane Delany
Articles
This paper aims to investigate the methods for the prediction of tags on a textual corpus that describes diverse data sets based on short messages; as an example, the authors demonstrate the usage of methods based on hotel staff inputs in a ticketing system as well as the publicly available StackOverflow corpus. The aim is to improve the tagging process and find the most suitable method for suggesting tags for a new text entry.
Named Entity Recognition Based On A Graph Structure, David Muñoz, Fernando Pérez Téllez, David Pinto
Named Entity Recognition Based On A Graph Structure, David Muñoz, Fernando Pérez Téllez, David Pinto
Articles
The identification of indirect relationships between texts from different sources makes the task of text mining useful when the goal is to obtain the most valuable information from a set of texts. That is why in the field of information retrieval the correct recognition of named entities plays an important role when extracting valuable information in large amounts of text. Therefore, it is important to propose techniques that improve the NER classifiers in order to achieve the correct recognition of named entities. In this work, a graph structure for storage and enrichment of named entities is proposed. It makes use …
Analysis Of Automatic Annotations Of Real Video Surveillance Images, Diana Guevara Flores, Fernando Pérez Téllez, David Pinto Avendaño
Analysis Of Automatic Annotations Of Real Video Surveillance Images, Diana Guevara Flores, Fernando Pérez Téllez, David Pinto Avendaño
Articles
The results of the analysis of the automatic annotations of real video surveillance sequences are presented. The annotations of the frames of surveillance sequences of the parking lot of a university campus are generated. The purpose of the analysis is to evaluate the quality of the descriptions and analyze the correspondence between the semantic content of the images and the corresponding annotation. To perform the tests, a fixed camera was placed in the campus parking lot and video sequences of about 20 minutes were obtained, later each frame was annotated individually and a text repository with all the annotations was …
An Empirical Evaluation Of The Inferential Capacity Of Defeasible Argumentation, Non-Monotonic Fuzzy Reasoning And Expert Systems, Lucas Rizzo, Luca Longo
An Empirical Evaluation Of The Inferential Capacity Of Defeasible Argumentation, Non-Monotonic Fuzzy Reasoning And Expert Systems, Lucas Rizzo, Luca Longo
Articles
Several non-monotonic formalisms exist in the field of Artificial Intelligence for reasoning under uncertainty. Many of these are deductive and knowledge-driven, and also employ procedural and semi-declarative techniques for inferential purposes. Nonetheless, limited work exist for the comparison across distinct techniques and in particular the examination of their inferential capacity. Thus, this paper focuses on a comparison of three knowledge-driven approaches employed for non-monotonic reasoning, namely expert systems, fuzzy reasoning and defeasible argumentation. A knowledge-representation and reasoning problem has been selected: modelling and assessing mental workload. This is an ill-defined construct, and its formalisation can be seen as a reasoning …
Automatic Acquisition Of Annotated Training Corpora For Test-Code Generation, Magdalena Kacmajor, John D. Kelleher
Automatic Acquisition Of Annotated Training Corpora For Test-Code Generation, Magdalena Kacmajor, John D. Kelleher
Articles
Open software repositories make large amounts of source code publicly available. Potentially, this source code could be used as training data to develop new, machine learning-based programming tools. For many applications, however, raw code scraped from online repositories does not constitute an adequate training dataset. Building on the recent and rapid improvements in machine translation (MT), one possibly very interesting application is code generation from natural language descriptions. One of the bottlenecks in developing these MT-inspired systems is the acquisition of parallel text-code corpora required for training code-generative models. This paper addresses the problem of automatically synthetizing parallel text-code corpora …
The Role Of Previous Discourse In Identifying Public Textual Cyberbullying, Aurelia Power, Anthony Keane, Brian Nolan, Brian O'Neill
The Role Of Previous Discourse In Identifying Public Textual Cyberbullying, Aurelia Power, Anthony Keane, Brian Nolan, Brian O'Neill
Articles
In this paper we investigate the contribution of previous discourse in identifying elements that are key to detecting public textual cyberbullying. Based on the analysis of our dataset, we first discuss the missing cyberbullying elements and the grammatical structures representative of discourse-dependent cyberbullying discourse. Then we identify four types of discourse dependent cyberbullying constructions: (1) fully inferable constructions, (2) personal marker and cyberbullying link inferable constructions, (3) dysphemistic element and cyberbullying link inferable constructions, and (4) dysphemistic element inferable constructions. Finally, we formalise a framework to resolve the missing cyberbullying elements that proposes several resolution algorithms. The resolution algorithms target …
Bigger Versus Similar: Selecting A Background Corpus For First Story Detection Based On Distributional Similarity, Fei Wang, Robert J. Ross, John D. Kelleher
Bigger Versus Similar: Selecting A Background Corpus For First Story Detection Based On Distributional Similarity, Fei Wang, Robert J. Ross, John D. Kelleher
Articles
The current state of the art for First Story Detection (FSD) are nearest neighbourbased models with traditional term vector representations; however, one challenge faced by FSD models is that the document representation is usually defined by the vocabulary and term frequency from a background corpus. Consequently, the ideal background corpus should arguably be both large-scale to ensure adequate term coverage, and similar to the target domain in terms of the language distribution. However, given these two factors cannot always be mutually satisfied, in this paper we examine whether the distributional similarity of common terms is more important than the scale …
Automatically Extracting Meaning From Legal Texts: Opportunities And Challenges, Kevin D. Ashley
Automatically Extracting Meaning From Legal Texts: Opportunities And Challenges, Kevin D. Ashley
Articles
This paper examines impressive new applications of legal text analytics in automated contract review, litigation support, conceptual legal information retrieval, and legal question answering against the backdrop of some pressing technological constraints. First, artificial intelligence (Al) programs cannot read legal texts like lawyers can. Using statistical methods, Al can only extract some semantic information from legal texts. For example, it can use the extracted meanings to improve retrieval and ranking, but it cannot yet extract legal rules in logical form from statutory texts. Second, machine learning (ML) may yield answers, but it cannot explain its answers to legal questions or …
On The Exactitude Of Big Data: La Bêtise And Artificial Intelligence, Noel Fitzpatrick, John D. Kelleher
On The Exactitude Of Big Data: La Bêtise And Artificial Intelligence, Noel Fitzpatrick, John D. Kelleher
Articles
This article revisits the question of ‘la bêtise’ or stupidity in the era of Artificial Intelligence driven by Big Data, it extends on the questions posed by Gille Deleuze and more recently by Bernard Stiegler. However, the framework for revisiting the question of la bêtise will be through the lens of contemporary computer science, in particular the development of data science as a mode of analysis, sometimes, misinterpreted as a mode of intelligence. In particular, this article will argue that with the advent of forms of hype (sometimes referred to as the hype cycle) in relation to big data and …
Muddy Waters: Refining The Way Forward For The “Sustainability Science” Of Socio-Hydrogeology, Paul Hynds, Shane Regan, Luisa Andrade, Simon Mooney, Kevin O'Malley, Stephanie Dipelino, Jean O'Dwyer
Muddy Waters: Refining The Way Forward For The “Sustainability Science” Of Socio-Hydrogeology, Paul Hynds, Shane Regan, Luisa Andrade, Simon Mooney, Kevin O'Malley, Stephanie Dipelino, Jean O'Dwyer
Articles
The trouble with groundwater is that despite its critical importance to global water supplies, it frequently attracts insufficient management attention relative to more visible surface water sources, irrespective of regional climate, socioeconomic profile, and regulatory environment. To this end, the recently defined sub-discipline of "socio-hydrogeology", an extension of socio-hydrology, seeks to translate and exchange knowledge with and between non-expert end-users, in addition to involving non-expert opinion and experience in hydrogeological investigations, thus emphasising a "bottom-up" methodology. It is widely acknowledged that issues pertaining to groundwater quality, groundwater quantity, climate change, and a poor general awareness and understanding of groundwater occurrence …
A Wikipedia Powered State-Based Approach To Automatic Search Query Enhancement, Kyle Goslin, Markus Hofmann
A Wikipedia Powered State-Based Approach To Automatic Search Query Enhancement, Kyle Goslin, Markus Hofmann
Articles
This paper describes the development and testing of a novel Automatic Search Query Enhancement (ASQE) algorithm, the Wikipedia N Sub-state Algorithm (WNSSA), which utilises Wikipedia as the sole data source for prior knowledge. This algorithm is built upon the concept of iterative states and sub-states, harnessing the power of Wikipedia's data set and link information to identify and utilise reoccurring terms to aid term selection and weighting during enhancement. This algorithm is designed to prevent query drift by making callbacks to the user's original search intent by persisting the original query between internal states with additional selected enhancement terms. The …
Robot Perception Errors And Human Resolution Strategies In Situated Human-Robot Dialogue, Niels Schütte, Brian Mac Namee, John D. Kelleher
Robot Perception Errors And Human Resolution Strategies In Situated Human-Robot Dialogue, Niels Schütte, Brian Mac Namee, John D. Kelleher
Articles
Errors in visual perception may cause problems in situated dialogues. We investigated this problem through an experiment in which human participants interacted through a natural language dialogue interface with a simulated robot.We introduced errors into the robot’s perception, and observed the resulting problems in the dialogues and their resolutions.We then introduced different methods for the user to request information about the robot’s understanding of the environment. We quantify the impact of perception errors on the dialogues, and investigate resolution attempts by users at a structural level and at the level of referring expressions.
Abusive Text Detection Using Neural Networks, Hao Chen, Susan Mckeever, Sarah Jane Delany
Abusive Text Detection Using Neural Networks, Hao Chen, Susan Mckeever, Sarah Jane Delany
Articles
Neurall network models have become increasingly popular for text classification in recent years. In particular, the emergence of word embeddings within deep learning architecture has recently attracted a high level of attention amongst researchers.
Subjective Usability, Mental Workload Assessments And Their Impact On Objective Human Performance, Luca Longo
Subjective Usability, Mental Workload Assessments And Their Impact On Objective Human Performance, Luca Longo
Articles
Self-reporting procedures and inspection methods have been largely employed in the fields of interaction and web-design for assessing the usability of interfaces. However, there seems to be a propensity to ignore features related to end-users or the context of application during the usability assessment procedure. This research proposes the adoption of the construct of mental workload as an additional aid to inform interaction and web-design. A user-study has been performed in the context of human-web interaction. The main objective was to explore the relationship between the perception of usability of the interfaces of three popular web-sites and the mental workload …
Mobilaudio – A Multimodal Content Delivery Platform For Geo-Services, James Carswell, Keith Gardiner, Charlie Cullen
Mobilaudio – A Multimodal Content Delivery Platform For Geo-Services, James Carswell, Keith Gardiner, Charlie Cullen
Articles
Delivering high-quality context-relevant information in a timely manner is a priority for location-based services (LBS) where applications require an immediate response based on spatial interaction. Previous work in this area typically focused on ever more accurately determining this interaction and informing the user in the customary graphical way using the visual modality. This paper describes the research area of multimodal LBS and focuses on audio as the key delivery mechanism. This new research extends familiar graphical information delivery by introducing a geoservices platform for delivering multimodal content and navigation services. It incorporates a novel auditory user interface (AUI) that enables …