Instrumenting the Learning Commons Eugene Agichtein, Qi Guo and Ryan Kelly Intelligent Information Access Lab, Math & CS Department Arthur Murphy, Selden.

Slides:



Advertisements
Similar presentations
Connect Pictometry Online End User
Advertisements

Marianne Chilutti April 1, 2011
Google Apps Access Google Apps from the Parkland Intranet Page:
WebTMA for Users Workshop
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
1 Learning User Interaction Models for Predicting Web Search Result Preferences Eugene Agichtein Eric Brill Susan Dumais Robert Ragno Microsoft Research.
1 CS 502: Computing Methods for Digital Libraries Lecture 2 The Nomadic Computing Experiment Object Models.
WebMiningResearch ASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007.
Semantic Web and Web Mining: Networking with Industry and Academia İsmail Hakkı Toroslu IST EVENT 2006.
Reference and Instruction Automated Statistics Gathering and Reporting System Members: Patrick Chen (pyc7) Soo-Yung Cho (sc444) Gregg Herlacher (gah24)
Servlets and a little bit of Web Services Russell Beale.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Wireless LAN Topology Visualiser Project Supervisor: Dr Arkady Zaslavsky Project Team Members: Jignesh Rambhia Robert Mark Bram Tejas Magia.
WebMiningResearchASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007 Revised.
4 Copyright © 2004, Oracle. All rights reserved. Creating a Basic Form Module.
Introduction Web Development II 5 th February. Introduction to Web Development Search engines Discussion boards, bulletin boards, other online collaboration.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
CrowdLogger as a Community Platform for Searcher Behavior Experiments Henry Feild Center for Intelligent Information Retrieval University of Massachusetts.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
1 CS 3870/CS 5870 Static and Dynamic Web Pages ASP.NET and IIS.
Technical Workshops | Esri International User Conference San Diego, California ArcMap: Tips and Tricks Miriam Schmidts Jorge Ruiz-Valdepena July 23 – 27,
EUBA: The Emory User Behavior Analysis System Eugene Agichtein, Qi Guo and Ryan Kelly Intelligent Information Access Lab
Semantic Computing Research Group University of Helsinki 1 SemCocoon – A Semantic Cocoon OntoView – Portal System.
1 Natural Language Emory Eugene Agichtein Math & Computer Science and CCI Andrew Post CCI and Biomedical Engineering (?)
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
Automatic Subject Classification and Topic Specific Search Engines -- Research at KnowLib Anders Ardö and Koraljka Golub DELOS Workshop, Lund, 23 June.
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Board of Canadian Registered Safety Professionals Certification Maintenance Online Tool BCRSP introduces a new web-based tool to assist certificate holders.
Microsoft Windows Vista Chapter 1 Fundamentals of Using Microsoft Windows Vista.
Microsoft Windows 7 Part 1 Fundamentals of Using Windows 7.
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
Part 1 – PubMed Interface, Display options, Saving, Printing, and ing results. Instructions This part of the course is a PowerPoint demonstration.
Creating a User ID (1) User makes any HTTP request
Chapter 8 Cookies And Security JavaScript, Third Edition.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
Tutorial 11 Five windows included in the Visual Basic Startup Screen Main Form Toolbox Project Explorer (Project) Properties.
University of Palestine Faculty of Engineering and Urban planning Software Engineering department Software Engineering Group Project Requirements Project.
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
4 Copyright © 2004, Oracle. All rights reserved. Creating a Basic Form Module.
What’s new in Kentico CMS 5.0 Michal Neuwirth Product Manager Kentico Software.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
An Architectural Review of TAKEaTEST.Net Southern California Code Camp California State University, Fullerton January 21-22, 2006 Ben Aminnia Pointer Corporation.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Croplands Website. Croplands Website: Marker Icons New map icons allow users to quickly differentiate locations, and track those they have reviewed or.
SANSUEB SOFTWARE PRESENTS SkyTextMsg – Online Texting for your Business.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
PubMed/How to Search, Display, Download & (module 4.1)
Configuring and Deploying Web Applications Lesson 7.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
SharePoint 2010 Business Intelligence Module 7: Filter Web Parts.
An Architecture for Adaptive Content Extraction in Wireless Networks Phil West Greg Foster Peter Clayton Submitted to the South African Telecommunications.
Raina NEC Application Object Describes the methods, properties, and collections of the object that stores information related to the entire Web.
1 CS 8803 AIAD (Spring 2008) Project Group#22 Ajay Choudhari, Avik Sinharoy, Min Zhang, Mohit Jain Smart Seek.
ANGEL Penn State’s Course Management System Created by PSY Office of C&IS.
ArcGIS for Server Security: Advanced
Essential tools for implementing and testing websites
Building Regression Tests With PeopleSoft Test Framework
Improving searches through community clustering of information
CARA 3.10 Major New Features
By Dan Gotlund & Eric Acierto
Web Software Model CS 4640 Programming Languages for Web Applications
Data Mining: Concepts and Techniques Course Outline
Chapter 12: Automated data collection methods
Web Systems Development (CSC-215)
Network Controllable MP3 Player
Back end Development CS Programming Languages for Web Applications
Back end Development CS Programming Languages for Web Applications
Presentation transcript:

Instrumenting the Learning Commons Eugene Agichtein, Qi Guo and Ryan Kelly Intelligent Information Access Lab, Math & CS Department Arthur Murphy, Selden Deemer, Kyle Fenton Emory Libraries

2 Intelligent Information Access Lab Goals/Motivation  Evaluate effectiveness of search/discovery with behavioral metrics (task-specific) Perform aggregate, longitudinal studies  Tools for usability studies “in the wild” Scale (hundreds/thousands of “participants”) Realistic behavior and tasks On-demand playback of “interesting” sessions  Unified analysis/query framework for internal and external resource access and usage statistics Web-based query and statistics interface Access auditing, privacy, anonymity enforced

3 Intelligent Information Access Lab Approach: Client-side instrumentation  Implementation within the Emory Installation of the LibX Toolbar: (  Extended LibX to track UI events: JavaScript patch to sample the mouse movements and other events on pre-specified web search pages. Events are encoded into a string and buffered, and periodically sent to the server (on internal library network).

4 Intelligent Information Access Lab How it works  On login, firefox is started with  If user has previously opted in (or out) Redirect to Euclid homepage  If new user, show consent form  Store choice in database; if opted in, also store salted hash string for user log in Can track user behavior over “lifetime” No way to recover login id by dictionary attack Can be removed at any time by deleting mapping  LibX sends http requests to server with encoded event strings.

5 Intelligent Information Access Lab User Opt-in (new Learning Commons Users)

6 Intelligent Information Access Lab Events captured (v0.4, deployed)  Button/link clicks/Url changes Name of the button, link, other meta-info  Mouse movements (x,y) coordinates sampled ~every 10ms  Scrolling Start, stop position, ~ every 10ms  Text entry Query text, options changes  Keypress events  Menu item events Print, bookmark, save (all of them)

7 Intelligent Information Access Lab Example: Mouse Movement  “Cheap” proxy for eye- tracking: Capture physiological characteristics of the mouse trajectories  Segment Properties: Speed Acceleration Rotation Drift Hover 5 segments: initial, early, middle, late, and end. For each: avg. speed, avg. acceleration, rotation etc.

8 Intelligent Information Access Lab Example applications: Classifying Search Intent  Initial exploration: Standard supervised machine learning classification techniques WEKA implementation of SVM and decision trees.

9 Intelligent Information Access Lab Summary of Features Used

10 Intelligent Information Access Lab Example Informational query: “spanish wine”

11 Intelligent Information Access Lab Emory User Behavior Analysis System  EUBA: Client-side instrumentation, Data mining/machine learning (Qi Guo) Log DB parsing, indexing, web-based interface for querying, playback, annotation (Ryan Kelly)  Plan: to release the system to research/library community

12 Intelligent Information Access Lab Demo Prototype: user: test password: notsafe