Ted Selker - Academia.edu (original) (raw)

Papers by Ted Selker

Research paper thumbnail of A Methodology for Testing Voting Systems

Usability Professionals' AssociationPUB6786Bloomingdale, IL, Nov 1, 2006

Research paper thumbnail of Manuscrit auteur, publié dans "INTERACT, Cape Town: Afrique Du Sud (2013)" Beyond Rhetoric to Poetics in IT Invention

Abstract. Two kinds of discourse typically define scientific productions: logical (epistemology o... more Abstract. Two kinds of discourse typically define scientific productions: logical (epistemology of science) and rhetorical (sociology of science). We suggest that research projects can also be analyzed as poetical productions. While rhetorical strategies anticipate controversies and deploy techniques to defend projects and findings, poetical practices deepen the cultural and symbolic dimensions of technologies. Based on use cases that show different ways the poetics come to bear on research and development projects in information technology (IT), we discuss the play on words and images and how they contribute to the definition and creation of a new technology within research projects. Three cases of poetical practices are presented: naming technologies, christening projects, and designing logos. We give examples of naming and project identity formation to underscore how such a poetic stance impacts projects. Images and words help people imagine what the technology is about by giving...

Research paper thumbnail of Style and Function of Graphic Tools

Shouldn't the future be a place where our graphical interfaces disencumber computer use? We s... more Shouldn't the future be a place where our graphical interfaces disencumber computer use? We should be developing a library of graphical presentation and interface techniques relative to where they are useful. We should work to make things respect the ergonomic and psychophysical realities of people. We should work to make things that look like what they do or represent. When these goals over constrain design, we need good teaching tools - prosthetics - to help the user share the designer's vision. When should the user interface should slink out of the way to allow us to focus our attention on our tasks and when should it be stylish and playful? The sea-green institutional paint of the 50s was supposed be a relaxing color. Interfaces also might suffer from being offensively bland. We choose and use things to make a social statement of status, style, and knowledge. This paper discusses how tools should give designers the latitude to create brand and style statements, while mak...

Research paper thumbnail of Smartphones can Recognize Stress Induced Hand Tremor

This paper shows that a Smartphone’s accelerometers can corroborate metrics of quality of daily l... more This paper shows that a Smartphone’s accelerometers can corroborate metrics of quality of daily living. A HTC G1 application was created to capture hand tremor. The application was tested on volunteer participants, both with and without known hand tremor. Experiments were run to assess the application’s ability to distinguish tremor for a participant and between participants. The application was also used to test if it could corroborate self report of sleep quality. Our experiments were able to use the Smartphone accelerometers to easily distinguish tremor frequency and frequency change between people with diagnosed hand tremor and those that did not have it. Showing hand tremor on a mobile device has the potential to help those with hand tremor track and gain greater understanding of the tremor’s manifestation over time. Such an understanding could aid in diagnosis and provide those with hand tremor indications of lifestyle factors that exacerbate or relieve certain types of tremor...

Research paper thumbnail of Cue-Pin-Select, a Secure Mental Password Manager

2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020

People struggle to invent safe passwords for many of their typical online activities, leading to ... more People struggle to invent safe passwords for many of their typical online activities, leading to a variety of security problems when they use overly simple passwords or reuse them multiple times with minor modifications. Having different passwords for each service generally requires password managers or memorable (but weak) passwords, introducing other vulnerabilities [1], [2]. Recent research [3], [4] has offered multiple alternatives but those require either rote memorisation [5] or computation on a physical device[6], [7]. This paper describes a secure and usable solution to this problem that requires no assistance from any physical device. We present the Cue-Pin-Select password family scheme that requires little memorisation and allows users to create and retrieve passwords easily. It uses our natural cognitive abilities to be durable, adaptable to different password requirements, and resistant to attacks, including ones involving plain-text knowledge of some passwords from the ...

Research paper thumbnail of Chapter 1 Introduction : Framing Peripheral Interaction

In everyday life, we perform several activities in our periphery of attention. For example, we ar... more In everyday life, we perform several activities in our periphery of attention. For example, we are aware of what the weather is like and we can routinely wash our hands without actively thinking about it. However, we can also easily focus on these activities when desired. Contrarily, interactions with computing devices, such as smartphones and tablet computers, usually require focused attention, or even demand it through flashing displays, beeping sounds, and vibrations used to alert people. Hence, these interactions move more unpredictably between periphery and center of attention compared to non-computer-mediated activities. With the number of computers embedded in our everyday environment increasing, inevitably interaction with these computers will move to the periphery of attention. Inspired by the way we fluently divide our attentional resources over various activities in everyday life, we call this type of interaction “peripheral interaction.” We believe that considering and e...

Research paper thumbnail of An Adaptive Mediating Agent for Teleconferences

Conference calls represent a natural but limited communication channel between people. Lack of vi... more Conference calls represent a natural but limited communication channel between people. Lack of visual contact and limited bandwidth impoverish social cues people typically use to moderate their behavior. This paper presents a system capable of providing timely aural feedback enabling meeting participants to check themselves. The system is able to sense and recognize problems, reason about them, and make decisions on how and when to provide feedback based on an interaction policy. While a hand-crafted policy based on expert insight can be used, it is non-optimal and can be brittle. Instead, we use reinforcement learning to build a system that can adapt to users by interacting with them. To evaluate the system, we first conduct a user study and demonstrate its utility in getting meeting participants to contribute more equally. We then validate the adaptive feedback policy by demonstrating the agent's ability to adapt its action choices to different types of users.

Research paper thumbnail of Creativity and Interface

Communications of The ACM, 2002

Información del artículo Creativity and Interface.

Research paper thumbnail of Process Is Technology : Coming to Terms with Systems-Level Problems and Human-Factors Failures with Voting

The “technology” to be supervised in voting processes is the process itself. No one particular de... more The “technology” to be supervised in voting processes is the process itself. No one particular device can be a magic bullet to ensure secure voting. Process failures occur in every step of the voting process, including the technical steps voters take as they register, check in to polling sites, receive their ballots, solicit human technical assistance with voting hardware, and entrust their ballots to election staff. Process failures in these and other areas are currently a greater threat to accurately measuring voter intention than direct security breakdowns or vulnerabilities of voting devices themselves.

Research paper thumbnail of Improving Write-In Candidate Text Entry for Audio-Only Voting Interfaces

For voters who cannot read a graphical ballot, audio-based voting systems currently in use can pr... more For voters who cannot read a graphical ballot, audio-based voting systems currently in use can provide a private and independent path for entering the first and last names of write-in candidates, but the process tends to be slow, difficult to comprehend, and inaccurate. Challenges range from technical and procedural to cognitive and emotional, and have led, at times, to disenfranchisement, according to the Government Accountability Office’s 2013 Statement before the National Council on Disability. Entering candidate names without difficulty is crucial to the fairness — and ultimate legal standing — of our election system. To resolve these issues, we developed and tested three novel audio interfaces that enable navigation and selection of characters through simple techniques that allow users to linearly access an alphabet for the purpose of typing a specific name. A number of factors were found to improve character input speed, input accuracy, and user comfort, including using as few...

Research paper thumbnail of Sensing and Effecting Environment with Extremity Computing Devices

This paper presents the “extremity” approach to creating user-interface experiences. We describe ... more This paper presents the “extremity” approach to creating user-interface experiences. We describe a class of dataacquisition systems called “extremity-computing devices” and their broad implications to user-interface design scenarios. These devices are used to interface sensors and effectors in wearable-computer applications. Instead of wearing a complete computer, outfitted with interface, storage, and processing components, a user needs only to wear sensors attached to a small microcontroller-based device with rudimentary user interface, local storage, and off-body transfer. Users access data externally, on a device of their choice: hand-held, laptop, or desktop computer, cell phone, etc. We have used extremity devices to gather physiological and motion data, surrounding temperature and lighting conditions, proximity, and the identity of people and objects nearby. We have utilized data gathered by these devices in applications in the areas of education, research, healthcare, and en...

Research paper thumbnail of Leveraging Persuasive Feedback Mechanism for Problem Solving

There are many problems around us need to be solved by human agents. It is very challenging to pe... more There are many problems around us need to be solved by human agents. It is very challenging to persuade people to change behavior implicitly, especially for solving public problems. We leverage persuasive mechanism for increasing incentives to change human behavior in a problem solving framework. By linking feedback to the actions, we've been able to increase the incentives to trigger behavior change. We deploy two persuasive feedback system in a building to support energy-saving scenario. By integrating sound feedback to window closing behavior to make people aware of the energy problem in the public space.

Research paper thumbnail of Force-to-motion functions for pointing

Research paper thumbnail of Certification and Voting Software: Position Statement

Ted Selker selker@media.mit.edu Caltech/MIT Voting Project Overview Computers are important in ev... more Ted Selker selker@media.mit.edu Caltech/MIT Voting Project Overview Computers are important in every aspect of modern life. Automatic tabulating machines are designed to be the most consistent and reliable counting approach invented. Still, questions of reliability, security and auditability persist. Ken Thompson and others have shown that, like other carelessly composed processes, computer programs can harbor potentially criminal activity. To be useful for voting, software must simplify and improve the ability to record and report intentions. Best practices must be used in creating important software to guard against bugs and malware. In spite of the fact that malware can be hidden in any program, there are ways to assure that it is not impacting the operation of the software. First, test vectors must allow testing of the software in every conceivable situation. Second, demonstrations can be arranged to show that it is running correctly when it is actually used. Third, computers ca...

Research paper thumbnail of Negative inertia

Conference companion on Human factors in computing systems - CHI '95, 1995

In-keyboard isometric joysticks can give better performance than mice for mixed typing/pointing t... more In-keyboard isometric joysticks can give better performance than mice for mixed typing/pointing tasks. The continuing challenge is to improve such devices to the point that they are preferable even for pure pointing tasks. Previous work has improved joystick performance by considering user perception and motor skills. This paper considers the dynamics of the pointing operation. A dynamic transfer function for an isometric joystick is described which amplifies changes in the applied force to increase responsiveness without loss of control. User tests show a 7.8 +/-3.5% performance improvement over a standard non-dynamic joystick. This feature has been incorporated into the TrackPoint III from IBM.

Research paper thumbnail of Reports of the AAAI 2011 Conference Workshops

AI Magazine, 2012

The AAAI-11 workshop program was held Sunday and Monday, August 7–18, 2011, at the Hyatt Regency ... more The AAAI-11 workshop program was held Sunday and Monday, August 7–18, 2011, at the Hyatt Regency San Francisco in San Francisco, California USA. The AAAI-11 workshop program included 15 workshops covering a wide range of topics in artificial intelligence. The titles of the workshops were Activity Context Representation: Techniques and Languages; Analyzing Microtext; Applied Adversarial Reasoning and Risk Modeling; Artificial Intelligence and Smarter Living: The Conquest of Complexity; AI for Data Center Management and Cloud Computing; Automated Action Planning for Autonomous Mobile Robots; Computational Models of Natural Argument; Generalized Planning; Human Computation; Human-Robot Interaction in Elder Care; Interactive Decision Theory and Game Theory; Language-Action Tools for Cognitive Artificial Agents: Integrating Vision, Action and Language; Lifelong Learning; Plan, Activity, and Intent Recognition; and Scalable Integration of Analytics and Visualization. This article presents...

Research paper thumbnail of Task Load Estimation and Mediation Using Psycho-physiological Measures

Proceedings of the 21st International Conference on Intelligent User Interfaces, 2016

Research paper thumbnail of Accelerometer-based RemoteDroid

Research paper thumbnail of Orienting Graphical User Interfaces Reduces Errors: The Low Error Voting Interface

Research paper thumbnail of Security Vulnerabilities and Problems with VVPT

Research paper thumbnail of A Methodology for Testing Voting Systems

Usability Professionals' AssociationPUB6786Bloomingdale, IL, Nov 1, 2006

Research paper thumbnail of Manuscrit auteur, publié dans "INTERACT, Cape Town: Afrique Du Sud (2013)" Beyond Rhetoric to Poetics in IT Invention

Abstract. Two kinds of discourse typically define scientific productions: logical (epistemology o... more Abstract. Two kinds of discourse typically define scientific productions: logical (epistemology of science) and rhetorical (sociology of science). We suggest that research projects can also be analyzed as poetical productions. While rhetorical strategies anticipate controversies and deploy techniques to defend projects and findings, poetical practices deepen the cultural and symbolic dimensions of technologies. Based on use cases that show different ways the poetics come to bear on research and development projects in information technology (IT), we discuss the play on words and images and how they contribute to the definition and creation of a new technology within research projects. Three cases of poetical practices are presented: naming technologies, christening projects, and designing logos. We give examples of naming and project identity formation to underscore how such a poetic stance impacts projects. Images and words help people imagine what the technology is about by giving...

Research paper thumbnail of Style and Function of Graphic Tools

Shouldn't the future be a place where our graphical interfaces disencumber computer use? We s... more Shouldn't the future be a place where our graphical interfaces disencumber computer use? We should be developing a library of graphical presentation and interface techniques relative to where they are useful. We should work to make things respect the ergonomic and psychophysical realities of people. We should work to make things that look like what they do or represent. When these goals over constrain design, we need good teaching tools - prosthetics - to help the user share the designer's vision. When should the user interface should slink out of the way to allow us to focus our attention on our tasks and when should it be stylish and playful? The sea-green institutional paint of the 50s was supposed be a relaxing color. Interfaces also might suffer from being offensively bland. We choose and use things to make a social statement of status, style, and knowledge. This paper discusses how tools should give designers the latitude to create brand and style statements, while mak...

Research paper thumbnail of Smartphones can Recognize Stress Induced Hand Tremor

This paper shows that a Smartphone’s accelerometers can corroborate metrics of quality of daily l... more This paper shows that a Smartphone’s accelerometers can corroborate metrics of quality of daily living. A HTC G1 application was created to capture hand tremor. The application was tested on volunteer participants, both with and without known hand tremor. Experiments were run to assess the application’s ability to distinguish tremor for a participant and between participants. The application was also used to test if it could corroborate self report of sleep quality. Our experiments were able to use the Smartphone accelerometers to easily distinguish tremor frequency and frequency change between people with diagnosed hand tremor and those that did not have it. Showing hand tremor on a mobile device has the potential to help those with hand tremor track and gain greater understanding of the tremor’s manifestation over time. Such an understanding could aid in diagnosis and provide those with hand tremor indications of lifestyle factors that exacerbate or relieve certain types of tremor...

Research paper thumbnail of Cue-Pin-Select, a Secure Mental Password Manager

2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020

People struggle to invent safe passwords for many of their typical online activities, leading to ... more People struggle to invent safe passwords for many of their typical online activities, leading to a variety of security problems when they use overly simple passwords or reuse them multiple times with minor modifications. Having different passwords for each service generally requires password managers or memorable (but weak) passwords, introducing other vulnerabilities [1], [2]. Recent research [3], [4] has offered multiple alternatives but those require either rote memorisation [5] or computation on a physical device[6], [7]. This paper describes a secure and usable solution to this problem that requires no assistance from any physical device. We present the Cue-Pin-Select password family scheme that requires little memorisation and allows users to create and retrieve passwords easily. It uses our natural cognitive abilities to be durable, adaptable to different password requirements, and resistant to attacks, including ones involving plain-text knowledge of some passwords from the ...

Research paper thumbnail of Chapter 1 Introduction : Framing Peripheral Interaction

In everyday life, we perform several activities in our periphery of attention. For example, we ar... more In everyday life, we perform several activities in our periphery of attention. For example, we are aware of what the weather is like and we can routinely wash our hands without actively thinking about it. However, we can also easily focus on these activities when desired. Contrarily, interactions with computing devices, such as smartphones and tablet computers, usually require focused attention, or even demand it through flashing displays, beeping sounds, and vibrations used to alert people. Hence, these interactions move more unpredictably between periphery and center of attention compared to non-computer-mediated activities. With the number of computers embedded in our everyday environment increasing, inevitably interaction with these computers will move to the periphery of attention. Inspired by the way we fluently divide our attentional resources over various activities in everyday life, we call this type of interaction “peripheral interaction.” We believe that considering and e...

Research paper thumbnail of An Adaptive Mediating Agent for Teleconferences

Conference calls represent a natural but limited communication channel between people. Lack of vi... more Conference calls represent a natural but limited communication channel between people. Lack of visual contact and limited bandwidth impoverish social cues people typically use to moderate their behavior. This paper presents a system capable of providing timely aural feedback enabling meeting participants to check themselves. The system is able to sense and recognize problems, reason about them, and make decisions on how and when to provide feedback based on an interaction policy. While a hand-crafted policy based on expert insight can be used, it is non-optimal and can be brittle. Instead, we use reinforcement learning to build a system that can adapt to users by interacting with them. To evaluate the system, we first conduct a user study and demonstrate its utility in getting meeting participants to contribute more equally. We then validate the adaptive feedback policy by demonstrating the agent's ability to adapt its action choices to different types of users.

Research paper thumbnail of Creativity and Interface

Communications of The ACM, 2002

Información del artículo Creativity and Interface.

Research paper thumbnail of Process Is Technology : Coming to Terms with Systems-Level Problems and Human-Factors Failures with Voting

The “technology” to be supervised in voting processes is the process itself. No one particular de... more The “technology” to be supervised in voting processes is the process itself. No one particular device can be a magic bullet to ensure secure voting. Process failures occur in every step of the voting process, including the technical steps voters take as they register, check in to polling sites, receive their ballots, solicit human technical assistance with voting hardware, and entrust their ballots to election staff. Process failures in these and other areas are currently a greater threat to accurately measuring voter intention than direct security breakdowns or vulnerabilities of voting devices themselves.

Research paper thumbnail of Improving Write-In Candidate Text Entry for Audio-Only Voting Interfaces

For voters who cannot read a graphical ballot, audio-based voting systems currently in use can pr... more For voters who cannot read a graphical ballot, audio-based voting systems currently in use can provide a private and independent path for entering the first and last names of write-in candidates, but the process tends to be slow, difficult to comprehend, and inaccurate. Challenges range from technical and procedural to cognitive and emotional, and have led, at times, to disenfranchisement, according to the Government Accountability Office’s 2013 Statement before the National Council on Disability. Entering candidate names without difficulty is crucial to the fairness — and ultimate legal standing — of our election system. To resolve these issues, we developed and tested three novel audio interfaces that enable navigation and selection of characters through simple techniques that allow users to linearly access an alphabet for the purpose of typing a specific name. A number of factors were found to improve character input speed, input accuracy, and user comfort, including using as few...

Research paper thumbnail of Sensing and Effecting Environment with Extremity Computing Devices

This paper presents the “extremity” approach to creating user-interface experiences. We describe ... more This paper presents the “extremity” approach to creating user-interface experiences. We describe a class of dataacquisition systems called “extremity-computing devices” and their broad implications to user-interface design scenarios. These devices are used to interface sensors and effectors in wearable-computer applications. Instead of wearing a complete computer, outfitted with interface, storage, and processing components, a user needs only to wear sensors attached to a small microcontroller-based device with rudimentary user interface, local storage, and off-body transfer. Users access data externally, on a device of their choice: hand-held, laptop, or desktop computer, cell phone, etc. We have used extremity devices to gather physiological and motion data, surrounding temperature and lighting conditions, proximity, and the identity of people and objects nearby. We have utilized data gathered by these devices in applications in the areas of education, research, healthcare, and en...

Research paper thumbnail of Leveraging Persuasive Feedback Mechanism for Problem Solving

There are many problems around us need to be solved by human agents. It is very challenging to pe... more There are many problems around us need to be solved by human agents. It is very challenging to persuade people to change behavior implicitly, especially for solving public problems. We leverage persuasive mechanism for increasing incentives to change human behavior in a problem solving framework. By linking feedback to the actions, we've been able to increase the incentives to trigger behavior change. We deploy two persuasive feedback system in a building to support energy-saving scenario. By integrating sound feedback to window closing behavior to make people aware of the energy problem in the public space.

Research paper thumbnail of Force-to-motion functions for pointing

Research paper thumbnail of Certification and Voting Software: Position Statement

Ted Selker selker@media.mit.edu Caltech/MIT Voting Project Overview Computers are important in ev... more Ted Selker selker@media.mit.edu Caltech/MIT Voting Project Overview Computers are important in every aspect of modern life. Automatic tabulating machines are designed to be the most consistent and reliable counting approach invented. Still, questions of reliability, security and auditability persist. Ken Thompson and others have shown that, like other carelessly composed processes, computer programs can harbor potentially criminal activity. To be useful for voting, software must simplify and improve the ability to record and report intentions. Best practices must be used in creating important software to guard against bugs and malware. In spite of the fact that malware can be hidden in any program, there are ways to assure that it is not impacting the operation of the software. First, test vectors must allow testing of the software in every conceivable situation. Second, demonstrations can be arranged to show that it is running correctly when it is actually used. Third, computers ca...

Research paper thumbnail of Negative inertia

Conference companion on Human factors in computing systems - CHI '95, 1995

In-keyboard isometric joysticks can give better performance than mice for mixed typing/pointing t... more In-keyboard isometric joysticks can give better performance than mice for mixed typing/pointing tasks. The continuing challenge is to improve such devices to the point that they are preferable even for pure pointing tasks. Previous work has improved joystick performance by considering user perception and motor skills. This paper considers the dynamics of the pointing operation. A dynamic transfer function for an isometric joystick is described which amplifies changes in the applied force to increase responsiveness without loss of control. User tests show a 7.8 +/-3.5% performance improvement over a standard non-dynamic joystick. This feature has been incorporated into the TrackPoint III from IBM.

Research paper thumbnail of Reports of the AAAI 2011 Conference Workshops

AI Magazine, 2012

The AAAI-11 workshop program was held Sunday and Monday, August 7–18, 2011, at the Hyatt Regency ... more The AAAI-11 workshop program was held Sunday and Monday, August 7–18, 2011, at the Hyatt Regency San Francisco in San Francisco, California USA. The AAAI-11 workshop program included 15 workshops covering a wide range of topics in artificial intelligence. The titles of the workshops were Activity Context Representation: Techniques and Languages; Analyzing Microtext; Applied Adversarial Reasoning and Risk Modeling; Artificial Intelligence and Smarter Living: The Conquest of Complexity; AI for Data Center Management and Cloud Computing; Automated Action Planning for Autonomous Mobile Robots; Computational Models of Natural Argument; Generalized Planning; Human Computation; Human-Robot Interaction in Elder Care; Interactive Decision Theory and Game Theory; Language-Action Tools for Cognitive Artificial Agents: Integrating Vision, Action and Language; Lifelong Learning; Plan, Activity, and Intent Recognition; and Scalable Integration of Analytics and Visualization. This article presents...

Research paper thumbnail of Task Load Estimation and Mediation Using Psycho-physiological Measures

Proceedings of the 21st International Conference on Intelligent User Interfaces, 2016

Research paper thumbnail of Accelerometer-based RemoteDroid

Research paper thumbnail of Orienting Graphical User Interfaces Reduces Errors: The Low Error Voting Interface

Research paper thumbnail of Security Vulnerabilities and Problems with VVPT