2007
DOI: 10.1007/s00165-007-0035-6
|View full text |Cite
|
Sign up to set email alerts
|

An approach to formal verification of human–computer interaction

Abstract: The correct functioning of interactive computer systems depends on both the faultless operation of the device and correct human actions. In this paper, we focus on system malfunctions due to human actions. We present abstract principles that generate cognitively plausible human behaviour. These principles are then formalised in a higher-order logic as a generic , and so retargetable, cognitive architecture, based on results from cognitive psychology. We instantiate the generic cognitive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 66 publications
(50 citation statements)
references
References 40 publications
0
48
0
Order By: Relevance
“…When a bug was reported in his own code (part of the Sun Java library), Joshua Bloch found 14 that the binary search algorithm-proved correct many years before (by, amongst others Jon Bentley in his Communications column) and upon which a generation of programmers had relied-harbored a subtle flaw. The problem arose when the sum of the low and high bounds exceeded the largest representable integer 15 . Of course, the proof wasn't wrong in a technical sense; there was an assumption that no integer overflow would occur (which was reasonable when Bentley wrote his column, given that computer memories back then were not large enough to hold such a large array).…”
Section: Problems With Proofsmentioning
confidence: 99%
See 1 more Smart Citation
“…When a bug was reported in his own code (part of the Sun Java library), Joshua Bloch found 14 that the binary search algorithm-proved correct many years before (by, amongst others Jon Bentley in his Communications column) and upon which a generation of programmers had relied-harbored a subtle flaw. The problem arose when the sum of the low and high bounds exceeded the largest representable integer 15 . Of course, the proof wasn't wrong in a technical sense; there was an assumption that no integer overflow would occur (which was reasonable when Bentley wrote his column, given that computer memories back then were not large enough to hold such a large array).…”
Section: Problems With Proofsmentioning
confidence: 99%
“…13 The analysis only considered data up to 1992; however, there does not appear to be any more recent analysis. 14 http://googleresearch.blogspot.com/2006/06/extra-extra-read-all-about-it-nearly.html 15 That is, code of the form middle = (high + low) / 2.…”
Section: Assumptions In the Waste Disposal Robot Case Study Revisitedmentioning
confidence: 99%
“…We then formalised [RBC + 08] these dependencies within our abstract cognitive architecture developed earlier [CuB01,CRB07,RCB + 07]. The architecture formalises abstract cognitive principles, such as a user entering an interaction with knowledge of the task and its subsidiary goals, and choosing non-deterministically between appropriate actions.…”
Section: Our Earlier Workmentioning
confidence: 99%
“…Most is focused at the level of the dialogue starting at symbolic actions such as 'key A pressed' and on the behaviour of the digital system; although some work includes models of the physical systems being controlled by the digital device and even the user's mental states or behaviour so that conjoint properties can be investigated (e.g. [YGS89,CuR07]). Modelling of the physical aspects of interaction devices seems rare, a notable exception is Thimbleby's recent work modelling of the layout of controls [Thi07].…”
Section: Modelling Physical and Continuous Actionmentioning
confidence: 99%