Presentation is loading. Please wait.

Presentation is loading. Please wait.

Oh, no! validation bingo!. algorithm complexity analysis.

Similar presentations


Presentation on theme: "Oh, no! validation bingo!. algorithm complexity analysis."— Presentation transcript:

1 oh, no! validation bingo!

2 algorithm complexity analysis

3 oh, no! validation bingo! algorithm complexity analysis field study with target user population

4 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory)

5 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study

6 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study laboratory user study

7 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study laboratory user study qualitative discussion of result pictures

8 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study laboratory user study qualitative discussion of result pictures quantitative metrics

9 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study laboratory user study qualitative discussion of result pictures quantitative metrics requirements justification from task analysis

10 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study laboratory user study qualitative discussion of result pictures quantitative metrics requirements justification from task analysis user anecdotes (insights found)

11 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study laboratory user study qualitative discussion of result pictures quantitative metrics requirements justification from task analysis user anecdotes (insights found) user community size (adoption)

12 oh, no! validation bingo! algorithm complexity analysis field study with target user population implementation performance (speed, memory) informal usability study laboratory user study qualitative discussion of result pictures quantitative metrics requirements justification from task analysis user anecdotes (insights found) user community size (adoption) visual encoding justification from theoretical principles

13 split threats to validity into four levels

14 domain problem characterization wrong problem they don’t do that

15 split threats to validity into four levels domain problem characterization data/operation abstraction design wrong problem they don’t do that wrong abstraction you’re showing them the wrong thing

16 split threats to validity into four levels domain problem characterization data/operation abstraction design encoding/interaction technique design wrong problem they don’t do that wrong abstraction you’re showing them the wrong thing wrong encoding/interaction technique the way you show it doesn’t work

17 split threats to validity into four levels domain problem characterization data/operation abstraction design encoding/interaction technique design algorithm design wrong problem they don’t do that wrong abstraction you’re showing them the wrong thing wrong encoding/interaction technique the way you show it doesn’t work wrong algorithm your code is too slow

18 validate according to threat threat: wrong problem threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system

19 validate according to threat threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system validate: observe adoption rates

20 validate according to threat threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

21 validate according to threat threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

22 validate according to threat threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

23 threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates don’t do them all in any single paper

24 threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates match up with level of contributions!

25 threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates match up with level of contributions!

26 threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates match up with level of contributions!

27 threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates match up with level of contributions!

28 threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates avoid deadly mismatches

29 threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates avoid deadly mismatches

30 examples! nuances! 4:15 tomorrow genealogical graphs justify encoding/interaction design qualitative result image analysis test on target users, collect anecdotal evidence of utility MatrixExplorer justify encoding/interaction design measure system time/memory qualitative result image analysis observe and interview target users LiveRAC justify encoding/interaction design field study, document usage of deployed system qualitative result image analysis observe and interview target users LinLog qualitative/quantitative result image analysis


Download ppt "Oh, no! validation bingo!. algorithm complexity analysis."

Similar presentations


Ads by Google