Automated Analysis of Computer-Generated Software Usage Protocols: An Exploratory Study

نویسندگان

  • John Bristow Smith
  • David Beard
  • Fred Brooks
چکیده

Ilighly-intcractive computer software can potentially help users think and work more effectively. To realize this potential, sotiware developers should understand the cognitive processes involved in the tasks being performed and the ways users interact with the software to accomplish the tasks. Gathering data about software usage-<:alled protocols-is costly in several ways, including preparing representative test scenarios, fmding suitable subjects, training personnel to administer the tests and record the protocols. and collecting and coding the protocols. Similarly, analyzing protocols can be tedious, often done manually by skilled researchers. Because of their high costs, protocol studies frequently consist of a few subjects tested while performing synthetic tasks in an artificial setting. The value of these studies is limited both for software developers and researchers in human-computer interaction. This paper describes a method used to collect and analyze the protocols of a large number of subjects performing tasks in a naturalistic setting. An interactive computer program was developed as a testbed for this study. It contained an automatic tracker that unobtrusively collected protocol records of users' interactions with the program. L sers' strategies in working with this program were modeled as a formal grammar, and a parser was devised, based on the grammar, to analyze protocol records produced by the program. C sers' behaviors and strategies of working with the program were examined and characterized, based upon the parsed protocol data. A graphical structure editor was created as .the testbed for this study; it assists in expository writing, such as technical journal articles, with special emphasis on the exploratory and organizational phases of the writing process. This paper discusses lessons learned in devising the grammar to model users' writing sessions with the editor, in building and refuring the parser, and in analyzing the protocol records for 112 sessions collected from 29 subjects.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Socio-Cultural and Technical Issues in Non-Expert Dubbing: A Case Study

Advances in computer sciences and the emergence of innovative technologies have entered numerous new elements of change in translation industry, such as the inseparable usage of software programs in audiovisual translation. Initiated by the expanding reality of fandubbing in Iran, the present article aimed at illuminating this practice into Persian in the Iranian context to partly address the l...

متن کامل

New model of computer analysis for assessment of the effects of lesions induced by direct voltage current in isolated AV-node of rabbit

Introduction: The ablation technique is one of the important therapeutic interventions for treatment of AV Nodal tachyarrhythmia. Different animal models have been developed to study the effects of ablation on the functional interanodal structure. The aim of the present study was to develop a new model of computer analysis to produce lesions by using direct voltage in isolated perfused rabbi...

متن کامل

Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery

this research explores the manipulation of biomedical big data and diseases detection using automated computing mechanisms. As efficient and cost effective way to discover disease and drug is important for a society so computer aided automated system is a must. This paper aims to understand the importance of computer aided automated system among the people. The analysis result from collected da...

متن کامل

An Efficient Extension of Network Simplex Algorithm

In this paper, an efficient extension of network simplex algorithm is presented. In static scheduling problem, where there is no change in situation, the challenge is that the large problems can be solved in a short time. In this paper, the Static Scheduling problem of Automated Guided Vehicles in container terminal is solved by Network Simplex Algorithm (NSA) and NSA+, which extended the stand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1991