Proceedings of the 16th Annual ACM Symposium on User Interface Software and Technology 2003
DOI: 10.1145/964696.964698
|View full text |Cite
|
Sign up to set email alerts
|

Rhythm modeling, visualizations and applications

Abstract: People use their awareness of others' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling temporal patterns from a record of online presence data. We describe analytic and end-user visualizations of rhythmic patterns and the tradeoffs between them. We conducted a design study that explored the accuracy of the derived rhythm models compared to user perceptions, user preference among the visualization alternatives, and users' priv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0

Year Published

2004
2004
2009
2009

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 78 publications
(69 citation statements)
references
References 13 publications
0
69
0
Order By: Relevance
“…However, such manual solutions, although considered as rich and at the same time providing sufficient space for ambiguity, are imperfect: people tend to forget to update them when their situation changes [24,29,1]. Therefore, many works concentrated around designing systems deriving one's communicative state based on automatically detected availability cues [7,6,14,31,32,30]. Availability indications were provided through video-streaming [11,22], by representing the content of agendas or daily rhythms [7,6,32] or by showing computer activities and various sensory data captured from people's environments [13].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, such manual solutions, although considered as rich and at the same time providing sufficient space for ambiguity, are imperfect: people tend to forget to update them when their situation changes [24,29,1]. Therefore, many works concentrated around designing systems deriving one's communicative state based on automatically detected availability cues [7,6,14,31,32,30]. Availability indications were provided through video-streaming [11,22], by representing the content of agendas or daily rhythms [7,6,32] or by showing computer activities and various sensory data captured from people's environments [13].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, many works concentrated around designing systems deriving one's communicative state based on automatically detected availability cues [7,6,14,31,32,30]. Availability indications were provided through video-streaming [11,22], by representing the content of agendas or daily rhythms [7,6,32] or by showing computer activities and various sensory data captured from people's environments [13]. Evaluations of many systems showed, however, that presenting availability status alone appears to be insufficient for screening unwanted interruptions [7,6,31].…”
Section: Related Workmentioning
confidence: 99%
“…The intended modeling tasks we were targeting include building predictive models of user activity, identifying recurring patterns or routines in user behavior (as in [2]), identifying key collaborators or resources (as [13]), and aiding human memory through reminder and recall [11]. A description of using PLUM's activity logs for latent task analysis be found in [15].…”
Section: Capture Architecturementioning
confidence: 99%
“…A practical issue remaining, however, surrounds whether users can trust applications needing access to their protected activity logs; for this we are currently considering whether OS-kernel level data isolation and labelling approaches (such as those demonstrated in Asbestos [6]) could be applied. 2 …”
Section: Evaluation and Future Workmentioning
confidence: 99%
“…In recent years, researchers have demonstrated the potential for extracting patterns from users' behavior by employing sensors [1][2][3]. There are various applications for detecting the user's activities.…”
Section: Introductionmentioning
confidence: 99%