-
Anti-Heroes: An Ethics-focused Method for Responsible Designer Intentions
Authors:
Shikha Mehta,
Shruthi Sai Chivukula,
Colin M. Gray,
Ritika Gairola
Abstract:
HCI and design researchers have designed, adopted, and customized a range of ethics-focused methods to inscribe values and support ethical decision making in a design process. In this work-in-progress, we add to this body of resources, constructing a method that surfaces the designer's intentions in an action-focused way, encouraging consideration of both manipulative and value-centered roles. Ant…
▽ More
HCI and design researchers have designed, adopted, and customized a range of ethics-focused methods to inscribe values and support ethical decision making in a design process. In this work-in-progress, we add to this body of resources, constructing a method that surfaces the designer's intentions in an action-focused way, encouraging consideration of both manipulative and value-centered roles. Anti-Heroes is a card deck that allows a designer to playfully take on pairs of manipulative (Anti-Hero) and value-centered (Hero) roles during design ideation/conceptualization, evaluation, and ethical dialogue. The card deck includes twelve cards with Anti-Hero and Hero faces, along with three action cards that include reflective questions for different play modes. Alongside the creation of the Anti-Hero card deck, we describe the evaluation and iteration of the card deck through playtesting sessions with four groups of three design students. We propose implications of Anti-Heros for technology and design education and practice.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Using Schema to Inform Method Design Practices
Authors:
Shruthi Sai Chivukula,
Colin M. Gray
Abstract:
There are many different forms of design knowledge that guide and shape a designer's ability to act and realize potential realities. Methods and schemas are examples of design knowledge commonly used by design researchers and designers alike. In this pictorial, we explore, engage, and describe the role of schemas as tools that can support design researchers in formulating methods to support design…
▽ More
There are many different forms of design knowledge that guide and shape a designer's ability to act and realize potential realities. Methods and schemas are examples of design knowledge commonly used by design researchers and designers alike. In this pictorial, we explore, engage, and describe the role of schemas as tools that can support design researchers in formulating methods to support design action, with our framing of method design specifically focused on ethical design complexity. We present four ways for method designers to engage with schema: 1) Systems to operationalize complex design constructs such as ethical design complexity through an A.E.I.O.YOU schema; 2) Classifiers to map existing methods and identify the possibility for new methods through descriptive semantic differentials; 3) Tools that enable the creation of methods that relate to one or more elements of the schema through creative departures from research to design; and 4) Interactive channels to playfully engage potential and new opportunities through schema interactivity.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building
Authors:
Colin M. Gray,
Cristiana Santos,
Nataliia Bielova,
Thomas Mildner
Abstract:
Deceptive and coercive design practices are increasingly used by companies to extract profit, harvest data, and limit consumer choice. Dark patterns represent the most common contemporary amalgamation of these problematic practices, connecting designers, technologists, scholars, regulators, and legal professionals in transdisciplinary dialogue. However, a lack of universally accepted definitions a…
▽ More
Deceptive and coercive design practices are increasingly used by companies to extract profit, harvest data, and limit consumer choice. Dark patterns represent the most common contemporary amalgamation of these problematic practices, connecting designers, technologists, scholars, regulators, and legal professionals in transdisciplinary dialogue. However, a lack of universally accepted definitions across the academic, legislative and regulatory space has likely limited the impact that scholarship on dark patterns might have in supporting sanctions and evolved design practices. In this paper, we seek to support the development of a shared language of dark patterns, harmonizing ten existing regulatory and academic taxonomies of dark patterns and proposing a three-level ontology with standardized definitions for 65 synthesized dark patterns types across low-, meso-, and high-level patterns. We illustrate how this ontology can support translational research and regulatory action, including pathways to extend our initial types through new empirical work and map across application domains.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Temporal Analysis of Dark Patterns: A Case Study of a User's Odyssey to Conquer Prime Membership Cancellation through the "Iliad Flow"
Authors:
Colin M. Gray,
Thomas Mildner,
Nataliia Bielova
Abstract:
Dark patterns are ubiquitous in digital systems, impacting users throughout their journeys on many popular apps and websites. While substantial efforts from the research community in the last five years have led to consolidated taxonomies of dark patterns, including an emerging ontology, most applications of these descriptors have been focused on analysis of static images or as isolated pattern ty…
▽ More
Dark patterns are ubiquitous in digital systems, impacting users throughout their journeys on many popular apps and websites. While substantial efforts from the research community in the last five years have led to consolidated taxonomies of dark patterns, including an emerging ontology, most applications of these descriptors have been focused on analysis of static images or as isolated pattern types. In this paper, we present a case study of Amazon Prime's "Iliad Flow" to illustrate the interplay of dark patterns across a user journey, grounded in insights from a US Federal Trade Commission complaint against the company. We use this case study to lay the groundwork for a methodology of Temporal Analysis of Dark Patterns (TADP), including considerations for characterization of individual dark patterns across a user journey, combinatorial effects of multiple dark patterns types, and implications for expert detection and automated detection.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Languaging Ethics in Technology Practice
Authors:
Colin M. Gray,
Shruthi Sai Chivukula,
Janna Johns,
Matthew Will,
Ikechukwu Obi,
Ziqing Li
Abstract:
Ethics as embodied by technology practitioners resists simple definition, particularly as it relates to the interplay of identity, organizational, and professional complexity. In this paper we use the linguistic notion of languaging as an analytic lens to describe how technology and design practitioners negotiate their conception of ethics as they reflect upon their everyday work. We engaged twelv…
▽ More
Ethics as embodied by technology practitioners resists simple definition, particularly as it relates to the interplay of identity, organizational, and professional complexity. In this paper we use the linguistic notion of languaging as an analytic lens to describe how technology and design practitioners negotiate their conception of ethics as they reflect upon their everyday work. We engaged twelve practitioners in individual co-creation workshops, encouraging them to reflect on their ethical role in their everyday work through a series of generative and evaluative activities. We analyzed these data to identify how each practitioner reasoned about ethics through language and artifacts, finding that practitioners used a range of rhetorical tropes to describe their ethical commitments and beliefs in ways that were complex and sometimes contradictory. Across three cases, we describe how ethics was negotiated through language across three key zones of ecological emergence: the practitioner's "core" beliefs about ethics, internal and external ecological elements that shaped or mediated these core beliefs, and the ultimate boundaries they reported refusing to cross. Building on these findings, we describe how the languaging of ethics reveals opportunities to definitionally and practically engage with ethics in technology ethics research, practice, and education.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Improving Fairness in Adaptive Social Exergames via Shapley Bandits
Authors:
Robert C. Gray,
Jennifer Villareale,
Thomas B. Fox,
Diane H. Dallal,
Santiago Ontañón,
Danielle Arigo,
Shahin Jabbari,
Jichen Zhu
Abstract:
Algorithmic fairness is an essential requirement as AI becomes integrated in society. In the case of social applications where AI distributes resources, algorithms often must make decisions that will benefit a subset of users, sometimes repeatedly or exclusively, while attempting to maximize specific outcomes. How should we design such systems to serve users more fairly? This paper explores this q…
▽ More
Algorithmic fairness is an essential requirement as AI becomes integrated in society. In the case of social applications where AI distributes resources, algorithms often must make decisions that will benefit a subset of users, sometimes repeatedly or exclusively, while attempting to maximize specific outcomes. How should we design such systems to serve users more fairly? This paper explores this question in the case where a group of users works toward a shared goal in a social exergame called Step Heroes. We identify adverse outcomes in traditional multi-armed bandits (MABs) and formalize the Greedy Bandit Problem. We then propose a solution based on a new type of fairness-aware multi-armed bandit, Shapley Bandits. It uses the Shapley Value for increasing overall player participation and intervention adherence rather than the maximization of total group output, which is traditionally achieved by favoring only high-performing participants. We evaluate our approach via a user study (n=46). Our results indicate that our Shapley Bandits effectively mediates the Greedy Bandit Problem and achieves better user retention and motivation across the participants.
△ Less
Submitted 21 February, 2023; v1 submitted 18 February, 2023;
originally announced February 2023.
-
Practitioner Trajectories of Engagement with Ethics-Focused Method Creation
Authors:
Colin M. Gray,
Ikechukwu Obi,
Shruthi Sai Chivukula,
Ziqing Li,
Thomas Carlock,
Matthew Will,
Anne C. Pivonka,
Janna Johns,
Brookley Rigsbee,
Ambika R. Menon,
Aayushi Bharadwaj
Abstract:
Design and technology practitioners are increasingly aware of the ethical impact of their work practices, desiring tools to support their ethical awareness across a range of contexts. In this paper, we report on findings from a series of co-design workshops with technology and design practitioners that supported their creation of a bespoke ethics-focused action plan. Using a qualitative content an…
▽ More
Design and technology practitioners are increasingly aware of the ethical impact of their work practices, desiring tools to support their ethical awareness across a range of contexts. In this paper, we report on findings from a series of co-design workshops with technology and design practitioners that supported their creation of a bespoke ethics-focused action plan. Using a qualitative content analysis and thematic analysis approach, we identified a range of roles and process moves that practitioners employed and illustrate the interplay of these elements of practitioners' instrumental judgment through a series of three cases, which includes evolution of the action plan itself, the ethical dilemmas or areas of support the action plan was intended to support, and how the action plan represents resonance for the practitioner that created it. We conclude with implications for supporting ethics in socio-technical practice and opportunities for the further development of ethics-focused methods that are resonant with the realities of practice.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Scaffolding Ethics-Focused Methods for Practice Resonance
Authors:
Colin M. Gray,
Shruthi Sai Chivukula,
Thomas Carlock,
Ziqing Li,
Ja-Nae Duane
Abstract:
Numerous methods and tools have been proposed to motivate or support ethical awareness in design practice. However, many existing resources are not easily discoverable by practitioners. One reason being that they are framed using language that is not immediately accessible or resonant with the felt complexity of everyday practice. In this paper, we propose a set of empirically-supported "intention…
▽ More
Numerous methods and tools have been proposed to motivate or support ethical awareness in design practice. However, many existing resources are not easily discoverable by practitioners. One reason being that they are framed using language that is not immediately accessible or resonant with the felt complexity of everyday practice. In this paper, we propose a set of empirically-supported "intentions" to frame practitioners' selection of relevant ethics-focused methods based on interviews with practitioners from a range of technology and design professions, and then leverage these intentions in the design and iterative evaluation of a website that allows practitioners to identify supports for ethics-focused action in their work context. Building on these findings, we propose a set of heuristics to evaluate the practice resonance of resources to support ethics-focused practice, laying the groundwork for increased ecological resonance of ethics-focused methods and method selection tools.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
What Do I Need to Design for Co-Design? Supporting Co-design as a Designerly Practice
Authors:
Shruthi Sai Chivukula,
Colin M Gray
Abstract:
Co-design practices have been used for decades to support participatory engagement in design work. However, despite a wide range of materials that describe the design and commitments of numerous co-design experiences, few descriptions of the knowledge that guides designers when creating these experiences exist. Thus, we ask: What kind of knowledge do designers need to design co-design experiences?…
▽ More
Co-design practices have been used for decades to support participatory engagement in design work. However, despite a wide range of materials that describe the design and commitments of numerous co-design experiences, few descriptions of the knowledge that guides designers when creating these experiences exist. Thus, we ask: What kind of knowledge do designers need to design co-design experiences? What form(s) could intermediate-level knowledge for co-design take? To answer these questions, we adopted a co/auto-ethnographic and Research-through-Design approach to reflexively engage with our design decisions, outcomes, and challenges related to two virtual co-design workshops. We constructed a set of four multi-dimensional facets(Rhythms of Engagement, Material Engagement, Ludic Engagement, and Conceptual Achievement) and three roles (designer, researcher, facilitator) to consider when creating co-design experiences. We illustrate these facets and roles through examples, building new \textit{intermediate-level knowledge} to support future co-design research and design, framing co-design as a designerly practice.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Let's Talk About Socio-Technical Angst: Tracing the History and Evolution of Dark Patterns on Twitter from 2010-2021
Authors:
Ikechukwu Obi,
Colin M. Gray,
Shruthi Sai Chivukula,
Ja-Nae Duane,
Janna Johns,
Matthew Will,
Ziqing Li,
Thomas Carlock
Abstract:
Designers' use of deceptive and manipulative design practices have become increasingly ubiquitous, impacting users' ability to make choices that respect their agency and autonomy. These practices have been popularly defined through the term "dark patterns" which has gained attention from designers, privacy scholars, and more recently, even legal scholars and regulators. The increased interest in t…
▽ More
Designers' use of deceptive and manipulative design practices have become increasingly ubiquitous, impacting users' ability to make choices that respect their agency and autonomy. These practices have been popularly defined through the term "dark patterns" which has gained attention from designers, privacy scholars, and more recently, even legal scholars and regulators. The increased interest in the term and underpinnings of dark patterns across a range of sociotechnical practitioners intrigued us to study the evolution of the concept, to potentially speculate the future trajectory of conversations around dark patterns. In this paper, we examine the history and evolution of the Twitter discourse through #darkpatterns from its inception in June 2010 until April 2021, using a combination of quantitative and qualitative methods to describe how this discourse has changed over time. We frame the evolution of this discourse as an emergent transdisciplinary conversation that connects multiple disciplinary perspectives through the shared concept of dark patterns, whereby these participants engage in a conversation marked by socio-technical angst in order to identify and fight back against deceptive design practices. We discuss the potential future trajectories of this discourse and opportunities for further scholarship at the intersection of design, policy, and activism.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Surveying the Landscape of Ethics-Focused Design Methods
Authors:
Shruthi Sai Chivukula,
Ziqing Li,
Anne C. Pivonka,
**gning Chen,
Colin M. Gray
Abstract:
Over the past decade, HCI researchers, design researchers, and practitioners have increasingly addressed ethics-focused issues through a range of theoretical, methodological and pragmatic contributions to the field. While many forms of design knowledge have been proposed and described, we focus explicitly on knowledge that has been codified as "methods," which we define as any supports for everyda…
▽ More
Over the past decade, HCI researchers, design researchers, and practitioners have increasingly addressed ethics-focused issues through a range of theoretical, methodological and pragmatic contributions to the field. While many forms of design knowledge have been proposed and described, we focus explicitly on knowledge that has been codified as "methods," which we define as any supports for everyday work practices of designers. In this paper, we identify, analyze, and map a collection of 63 existing ethics-focused methods intentionally designed for ethical impact. We present a content analysis, providing a descriptive record of how they operationalize ethics, their intended audience or context of use, their "core" or "script," and the means by which these methods are formulated, articulated, and languaged. Building on these results, we provide an initial definition of ethics-focused methods, identifying potential opportunities for the development of future methods to support design practice and research.
△ Less
Submitted 26 August, 2022; v1 submitted 17 February, 2021;
originally announced February 2021.
-
Player Modeling via Multi-Armed Bandits
Authors:
Robert C. Gray,
Jichen Zhu,
Dannielle Arigo,
Evan Forman,
Santiago Ontañón
Abstract:
This paper focuses on building personalized player models solely from player behavior in the context of adaptive games. We present two main contributions: The first is a novel approach to player modeling based on multi-armed bandits (MABs). This approach addresses, at the same time and in a principled way, both the problem of collecting data to model the characteristics of interest for the current…
▽ More
This paper focuses on building personalized player models solely from player behavior in the context of adaptive games. We present two main contributions: The first is a novel approach to player modeling based on multi-armed bandits (MABs). This approach addresses, at the same time and in a principled way, both the problem of collecting data to model the characteristics of interest for the current player and the problem of adapting the interactive experience based on this model. Second, we present an approach to evaluating and fine-tuning these algorithms prior to generating data in a user study. This is an important problem, because conducting user studies is an expensive and labor-intensive process; therefore, an ability to evaluate the algorithms beforehand can save a significant amount of resources. We evaluate our approach in the context of modeling players' social comparison orientation (SCO) and present empirical results from both simulations and real players.
△ Less
Submitted 10 February, 2021;
originally announced February 2021.
-
Regression Oracles and Exploration Strategies for Short-Horizon Multi-Armed Bandits
Authors:
Robert C. Gray,
Jichen Zhu,
Santiago Ontañón
Abstract:
This paper explores multi-armed bandit (MAB) strategies in very short horizon scenarios, i.e., when the bandit strategy is only allowed very few interactions with the environment. This is an understudied setting in the MAB literature with many applications in the context of games, such as player modeling. Specifically, we pursue three different ideas. First, we explore the use of regression oracle…
▽ More
This paper explores multi-armed bandit (MAB) strategies in very short horizon scenarios, i.e., when the bandit strategy is only allowed very few interactions with the environment. This is an understudied setting in the MAB literature with many applications in the context of games, such as player modeling. Specifically, we pursue three different ideas. First, we explore the use of regression oracles, which replace the simple average used in strategies such as epsilon-greedy with linear regression models. Second, we examine different exploration patterns such as forced exploration phases. Finally, we introduce a new variant of the UCB1 strategy called UCBT that has interesting properties and no tunable parameters. We present experimental results in a domain motivated by exergames, where the goal is to maximize a player's daily steps. Our results show that the combination of epsilon-greedy or epsilon-decreasing with regression oracles outperforms all other tested strategies in the short horizon setting.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Personalization Paradox in Behavior Change Apps: Lessons from a Social Comparison-Based Personalized App for Physical Activity
Authors:
Jichen Zhu,
Diane H. Dallal,
Robert C. Gray,
Jennifer Villareale,
Santiago Ontañón,
Evan M. Forman,
Danielle Arigo
Abstract:
Social comparison-based features are widely used in social computing apps. However, most existing apps are not grounded in social comparison theories and do not consider individual differences in social comparison preferences and reactions. This paper is among the first to automatically personalize social comparison targets. In the context of an m-health app for physical activity, we use artificia…
▽ More
Social comparison-based features are widely used in social computing apps. However, most existing apps are not grounded in social comparison theories and do not consider individual differences in social comparison preferences and reactions. This paper is among the first to automatically personalize social comparison targets. In the context of an m-health app for physical activity, we use artificial intelligence (AI) techniques of multi-armed bandits. Results from our user study (n=53) indicate that there is some evidence that motivation can be increased using the AI-based personalization of social comparison. The detected effects achieved small-to-moderate effect sizes, illustrating the real-world implications of the intervention for enhancing motivation and physical activity. In addition to design implications for social comparison features in social apps, this paper identified the personalization paradox, the conflict between user modeling and adaptation, as a key design challenge of personalized applications for behavior change. Additionally, we propose research directions to mitigate this Personalization Paradox.
△ Less
Submitted 11 February, 2021; v1 submitted 25 January, 2021;
originally announced January 2021.
-
End User Accounts of Dark Patterns as Felt Manipulation
Authors:
Colin M. Gray,
**gle Chen,
Shruthi Sai Chivukula,
Liyang Qu
Abstract:
Manipulation defines many of our experiences as a consumer, including subtle nudges and overt advertising campaigns that seek to gain our attention and money. With the advent of digital services that can continuously optimize online experiences to favor stakeholder requirements, increasingly designers and developers make use of "dark patterns"---forms of manipulation that prey on human psychology-…
▽ More
Manipulation defines many of our experiences as a consumer, including subtle nudges and overt advertising campaigns that seek to gain our attention and money. With the advent of digital services that can continuously optimize online experiences to favor stakeholder requirements, increasingly designers and developers make use of "dark patterns"---forms of manipulation that prey on human psychology---to encourage certain behaviors and discourage others in ways that present unequal value to the end user. In this paper, we provide an account of end user perceptions of manipulation that builds on and extends notions of dark patterns. We report on the results of a survey of users conducted in English and Mandarin Chinese (n=169), including follow-up interviews from nine survey respondents. We used a card sorting method to support thematic analysis of responses from each cultural context, identifying both qualitatively-supported insights to describe end users' felt experiences of manipulative products, and a continuum of manipulation. We further support this analysis through a quantitative analysis of survey results and the presentation of vignettes from the interviews. We conclude with implications for future research, considerations for public policy, and guidance on how to further empower and give users autonomy in their experiences with digital services.
△ Less
Submitted 21 October, 2020;
originally announced October 2020.
-
Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective
Authors:
Colin M. Gray,
Cristiana Santos,
Nataliia Bielova,
Michael Toth,
Damian Clifford
Abstract:
User engagement with data privacy and security through consent banners has become a ubiquitous part of interacting with internet services. While previous work has addressed consent banners from either interaction design, legal, and ethics-focused perspectives, little research addresses the connections among multiple disciplinary approaches, including tensions and opportunities that transcend disci…
▽ More
User engagement with data privacy and security through consent banners has become a ubiquitous part of interacting with internet services. While previous work has addressed consent banners from either interaction design, legal, and ethics-focused perspectives, little research addresses the connections among multiple disciplinary approaches, including tensions and opportunities that transcend disciplinary boundaries. In this paper, we draw together perspectives and commentary from HCI, design, privacy and data protection, and legal research communities, using the language and strategies of "dark patterns" to perform an interaction criticism reading of three different types of consent banners. Our analysis builds upon designer, interface, user, and social context lenses to raise tensions and synergies that arise together in complex, contingent, and conflicting ways in the act of designing consent banners. We conclude with opportunities for transdisciplinary dialogue across legal, ethical, computer science, and interactive systems scholarship to translate matters of ethical concern into public policy.
△ Less
Submitted 4 February, 2021; v1 submitted 21 September, 2020;
originally announced September 2020.
-
Design Judgment in Data Visualization Practice
Authors:
Paul Parsons,
Colin M. Gray,
Ali Baigelenov,
Ian Carr
Abstract:
Data visualization is becoming an increasingly popular field of design practice. Although many studies have highlighted the knowledge required for effective data visualization design, their focus has largely been on formal knowledge and logical decision-making processes that can be abstracted and codified. Less attention has been paid to the more situated and personal ways of knowing that are prev…
▽ More
Data visualization is becoming an increasingly popular field of design practice. Although many studies have highlighted the knowledge required for effective data visualization design, their focus has largely been on formal knowledge and logical decision-making processes that can be abstracted and codified. Less attention has been paid to the more situated and personal ways of knowing that are prevalent in all design activity. In this study, we conducted semi-structured interviews with data visualization practitioners during which they were asked to describe the practical and situated aspects of their design processes. Using a philosophical framework of design judgment from Nelson and Stolterman [23], we analyzed the transcripts to describe the volume and complex layering of design judgments that are used by data visualization practitioners as they describe and interrogate their work. We identify aspects of data visualization practice that require further investigation beyond notions of rational, model- or principle-directed decision-making processes.
△ Less
Submitted 5 September, 2020;
originally announced September 2020.
-
Automated Segmentation of Optical Coherence Tomography Angiography Images: Benchmark Data and Clinically Relevant Metrics
Authors:
Ylenia Giarratano,
Eleonora Bianchi,
Calum Gray,
Andrew Morris,
Tom MacGillivray,
Baljean Dhillon,
Miguel O. Bernabeu
Abstract:
Optical coherence tomography angiography (OCTA) is a novel non-invasive imaging modality for the visualisation of microvasculature in vivo that has encountered broad adoption in retinal research. OCTA potential in the assessment of pathological conditions and the reproducibility of studies relies on the quality of the image analysis. However, automated segmentation of parafoveal OCTA images is sti…
▽ More
Optical coherence tomography angiography (OCTA) is a novel non-invasive imaging modality for the visualisation of microvasculature in vivo that has encountered broad adoption in retinal research. OCTA potential in the assessment of pathological conditions and the reproducibility of studies relies on the quality of the image analysis. However, automated segmentation of parafoveal OCTA images is still an open problem. In this study, we generate the first open dataset of retinal parafoveal OCTA images with associated ground truth manual segmentations. Furthermore, we establish a standard for OCTA image segmentation by surveying a broad range of state-of-the-art vessel enhancement and binarisation procedures. We provide the most comprehensive comparison of these methods under a unified framework to date. Our results show that, for the set of images considered, deep learning architectures (U-Net and CS-Net) achieve the best performance. For applications where manually segmented data is not available to retrain these approaches, our findings suggest that optimal oriented flux is the best handcrafted filter from those considered. Furthermore, we report on the importance of preserving network structure in the segmentation to enable deep vascular phenoty**. We introduce new metrics for network structure evaluation in segmented angiograms. Our results demonstrate that segmentation methods with equal Dice score perform very differently in terms of network structure preservation. Moreover, we compare the error in the computation of clinically relevant vascular network metrics (e.g. foveal avascular zone area and vessel density) across segmentation methods. Our results show up to 25% differences in vessel density accuracy depending on the segmentation method employed. These findings should be taken into account when comparing the results of clinical studies and performing meta-analyses.
△ Less
Submitted 29 May, 2020; v1 submitted 20 December, 2019;
originally announced December 2019.
-
Bayesian inference of network structure from information cascades
Authors:
Caitlin Gray,
Lewis Mitchell,
Matthew Roughan
Abstract:
Contagion processes are strongly linked to the network structures on which they propagate, and learning these structures is essential for understanding and intervention on complex network processes such as epidemics and (mis)information propagation. However, using contagion data to infer network structure is a challenging inverse problem. In particular, it is imperative to have appropriate measure…
▽ More
Contagion processes are strongly linked to the network structures on which they propagate, and learning these structures is essential for understanding and intervention on complex network processes such as epidemics and (mis)information propagation. However, using contagion data to infer network structure is a challenging inverse problem. In particular, it is imperative to have appropriate measures of uncertainty in network structure estimates, however these are largely ignored in most machine-learning approaches. We present a probabilistic framework that uses samples from the distribution of networks that are compatible with the dynamics observed to produce network and uncertainty estimates. We demonstrate the method using the well known independent cascade model to sample from the distribution of networks P(G) conditioned on the observation of a set of infections C. We evaluate the accuracy of the method by using the marginal probabilities of each edge in the distribution, and show the bene ts of quantifying uncertainty to improve estimates and understanding, particularly with small amounts of data.
△ Less
Submitted 9 August, 2019;
originally announced August 2019.
-
SMERC: Social media event response clustering using textual and temporal information
Authors:
Peter Mathews,
Caitlin Gray,
Lewis Mitchell,
Giang T. Nguyen,
Nigel G. Bean
Abstract:
Tweet clustering for event detection is a powerful modern method to automate the real-time detection of events. In this work we present a new tweet clustering approach, using a probabilistic approach to incorporate temporal information. By analysing the distribution of time gaps between tweets we show that the gaps between pairs of related tweets exhibit exponential decay, whereas the gaps between…
▽ More
Tweet clustering for event detection is a powerful modern method to automate the real-time detection of events. In this work we present a new tweet clustering approach, using a probabilistic approach to incorporate temporal information. By analysing the distribution of time gaps between tweets we show that the gaps between pairs of related tweets exhibit exponential decay, whereas the gaps between unrelated tweets are approximately uniform. Guided by this insight, we use probabilistic arguments to estimate the likelihood that a pair of tweets are related, and build an improved clustering method. Our method Social Media Event Response Clustering (SMERC) creates clusters of tweets based on their tendency to be related to a single event. We evaluate our method at three levels: through traditional event prediction from tweet clustering, by measuring the improvement in quality of clusters created, and also comparing the clustering precision and recall with other methods. By applying SMERC to tweets collected during a number of sporting events, we demonstrate that incorporating temporal information leads to state of the art clustering performance.
△ Less
Submitted 12 November, 2018;
originally announced November 2018.
-
Generating Connected Random Graphs
Authors:
Caitlin Gray,
Lewis Mitchell,
Matthew Roughan
Abstract:
Sampling random graphs is essential in many applications, and often algorithms use Markov chain Monte Carlo methods to sample uniformly from the space of graphs. However, often there is a need to sample graphs with some property that we are unable, or it is too inefficient, to sample using standard approaches. In this paper, we are interested in sampling graphs from a conditional ensemble of the u…
▽ More
Sampling random graphs is essential in many applications, and often algorithms use Markov chain Monte Carlo methods to sample uniformly from the space of graphs. However, often there is a need to sample graphs with some property that we are unable, or it is too inefficient, to sample using standard approaches. In this paper, we are interested in sampling graphs from a conditional ensemble of the underlying graph model. We present an algorithm to generate samples from an ensemble of connected random graphs using a Metropolis-Hastings framework. The algorithm extends to a general framework for sampling from a known distribution of graphs, conditioned on a desired property. We demonstrate the method to generate connected spatially embedded random graphs, specifically the well known Waxman network, and illustrate the convergence and practicalities of the algorithm.
△ Less
Submitted 25 October, 2018; v1 submitted 29 June, 2018;
originally announced June 2018.
-
Super-blockers and the effect of network structure on information cascades
Authors:
Caitlin Gray,
Lewis Mitchell,
Matthew Roughan
Abstract:
Modelling information cascades over online social networks is important in fields from marketing to civil unrest prediction, however the underlying network structure strongly affects the probability and nature of such cascades. Even with simple cascade dynamics the probability of large cascades are almost entirely dictated by network properties, with well-known networks such as Erdos-Renyi and Bar…
▽ More
Modelling information cascades over online social networks is important in fields from marketing to civil unrest prediction, however the underlying network structure strongly affects the probability and nature of such cascades. Even with simple cascade dynamics the probability of large cascades are almost entirely dictated by network properties, with well-known networks such as Erdos-Renyi and Barabasi-Albert producing wildly different cascades from the same model. Indeed, the notion of 'superspreaders' has arisen to describe highly influential nodes promoting global cascades in a social network. Here we use a simple model of global cascades to show that the presence of locality in the network increases the probability of a global cascade due to the increased vulnerability of connecting nodes. Rather than 'super-spreaders', we find that the presence of these highly connected 'super-blockers' in heavy-tailed networks in fact reduces the probability of global cascades, while promoting information spread when targeted as the initial spreader.
△ Less
Submitted 21 March, 2018; v1 submitted 14 February, 2018;
originally announced February 2018.
-
Evacuation of rectilinear polygons
Authors:
Sandor P. Fekete,
Chris Gray,
Alexander Kroeller
Abstract:
We investigate the problem of creating fast evacuation plans for buildings that are modeled as grid polygons, possibly containing exponentially many cells. We study this problem in two contexts: the ``confluent'' context in which the routes to exits remain fixed over time, and the ``non-confluent'' context in which routes may change. Confluent evacuation plans are simpler to carry out, as they all…
▽ More
We investigate the problem of creating fast evacuation plans for buildings that are modeled as grid polygons, possibly containing exponentially many cells. We study this problem in two contexts: the ``confluent'' context in which the routes to exits remain fixed over time, and the ``non-confluent'' context in which routes may change. Confluent evacuation plans are simpler to carry out, as they allocate contiguous regions to exits; non-confluent allocation can possibly create faster evacuation plans. We give results on the hardness of creating the evacuation plans and strongly polynomial algorithms for finding confluent evacuation plans when the building has two exits. We also give a pseudo-polynomial time algorithm for non-confluent evacuation plans. Finally, we show that the worst-case bound between confluent and non-confluent plans is 2-2/(k+1).
△ Less
Submitted 25 August, 2010;
originally announced August 2010.
-
Removing Local Extrema from Imprecise Terrains
Authors:
Chris Gray,
Frank Kammer,
Maarten Loffler,
Rodrigo I. Silveira
Abstract:
In this paper we consider imprecise terrains, that is, triangulated terrains with a vertical error interval in the vertices. In particular, we study the problem of removing as many local extrema (minima and maxima) as possible from the terrain. We show that removing only minima or only maxima can be done optimally in O(n log n) time, for a terrain with n vertices. Interestingly, however, removing…
▽ More
In this paper we consider imprecise terrains, that is, triangulated terrains with a vertical error interval in the vertices. In particular, we study the problem of removing as many local extrema (minima and maxima) as possible from the terrain. We show that removing only minima or only maxima can be done optimally in O(n log n) time, for a terrain with n vertices. Interestingly, however, removing both the minima and maxima simultaneously is NP-hard, and is even hard to approximate within a factor of O(log log n) unless P=NP. Moreover, we show that even a simplified version of the problem where vertices can have only two different heights is already NP-hard, a result we obtain by proving hardness of a special case of 2-Disjoint Connected Subgraphs, a problem that has lately received considerable attention from the graph-algorithms community.
△ Less
Submitted 12 August, 2011; v1 submitted 12 February, 2010;
originally announced February 2010.
-
Low-Cost Multi-Gigahertz Test Systems Using CMOS FPGAs and PECL
Authors:
D. C. Keezer,
C. Gray,
A. Majid,
N. Taher
Abstract:
This paper describes two research projects that develop new low-cost techniques for testing devices with multiple high-speed (2 to 5 Gbps) signals. Each project uses commercially available components to keep costs low, yet achieves performance characteristics comparable to (and in some ways exceeding) more expensive ATE. A common CMOS FPGA-based logic core provides flexibility, adaptability, and…
▽ More
This paper describes two research projects that develop new low-cost techniques for testing devices with multiple high-speed (2 to 5 Gbps) signals. Each project uses commercially available components to keep costs low, yet achieves performance characteristics comparable to (and in some ways exceeding) more expensive ATE. A common CMOS FPGA-based logic core provides flexibility, adaptability, and communication with controlling computers while customized positive emitter-coupled logic (PECL) achieves multi-gigahertz data rates with about $\pm$25ps timing accuracy.
△ Less
Submitted 25 October, 2007;
originally announced October 2007.