The Problem With Positive Face Strategies - A Review
|
|
|
- Randolf Lloyd
- 5 years ago
- Views:
Transcription
1 Modeling Blame to Avoid Positive Face Threats in Natural Language Generation Gordon Briggs Human-Robot Interaction Laboratory Tufts University Medford, MA USA Matthias Scheutz Human-Robot Interaction Laboratory Tufts University Medford, MA USA Abstract Prior approaches to politeness modulation in natural language generation (NLG) often focus on manipulating factors such as the directness of requests that pertain to preserving the autonomy of the addressee (negative face threats), but do not have a systematic way of understanding potential impoliteness from inadvertently critical or blame-oriented communications (positive face threats). In this paper, we discuss ongoing work to integrate a computational model of blame to prevent inappropriate threats to positive face. 1 Introduction When communicating with one another, people often modulate their language based on a variety of social factors. Enabling natural and humanlike interactions with virtual and robotic agents may require engineering these agents to be able to demonstrate appropriate social behaviors. For instance, increasing attention is being paid to the effects of utilizing politeness strategies in both human-computer and human-robot dialogue interactions (Cassell and Bickmore, 2003; Torrey et al., 2013; Strait et al., 2014). This work has shown that, depending on context, the deployment of politeness strategies by artificial agents can increase human interactants positive assessments of an agent along multiple dimensions (e.g. likeability). However, while these studies investigated the human factors aspects of utilizing politeness strategies, they were not concerned with the natural language generation (NLG) mechanisms necessary to appropriately realize and deploy these strategies. Instead, there is a small, but growing, body of work on natural language generation architectures that seek to address this challenge (Gupta et al., 2007; Miller et al., 2008; Briggs and Scheutz, 2013). The common approach taken by these architectures is the operationalization of key factors in Brown and Levinson s seminal work on politeness theory, in particular, the degree to which an utterance can be considered a face-threatening act (FTA) (Brown and Levinson, 1987). While this prior work demonstrates the abilities of these NLG architectures to successfully produce polite language, there remain some key challenges. Perhaps the most crucial question is: how does one calculate the degree to which an utterance is a FTA 1? This is a complex issue, as not only is this value modulated by factors such as social distance, power, and context, but also the multifaceted nature of face. An utterance may be polite in relation to negative face (i.e. the agent s autonomy), but may be quite impolite with regard to positive face (i.e. the agent s image and perceived character). In this paper, we investigate the problem of modeling threats to positive face. First we discuss how prior work that has focused primarily on mitigating threats to negative face, and examine a specific example, taken from the human subject data of (Gupta et al., 2007), to show why accounting for positive face is necessary. Next, we discuss our proposed solution to begin to model threats to positive face specifically, integrating a computational model of blame. Finally, we discuss the justification behind and limitations of this proposed approach. 2 Motivation Brown and Levinson (1987) articulated a taxonomy of politeness strategies, distinguishing broadly between the notion of positive and negative politeness (with many distinct strategies for each). These categories of politeness correspond 1 Less crucially, what is the appropriate notation for this value? It is denoted differently in each paper: Θ, W, and η.
2 to the concepts of positive and negative face, respectively. An example of a positive politeness strategy is the use of praise ( Great! ), whereas a common negative politeness strategy is the use of an indirect speech act (ISA), in particular, an indirect request. An example of an indirect request is the question, Could you get me a coffee?, which avoids the autonomy-threatening direct imperative, while still potentially being construed as a request. This is an example of a conventionalized form, in which the implied request is more directly associated with the implicit form. Often considered even less of a threat to negative face are unconventionalized ISAs, which often require a deeper chain of inference to derive their implied meaning. It is primarily the modulation of the level of request indirectness that is the focus of (Gupta et al., 2007; Briggs and Scheutz, 2013). To provide an empirical evaluation of their system, Gupta et al. (2007) asked human subjects to rate the politeness of generated requests on a five-point Likert scale in order of most rude (1) to to most polite (5). The results from (Gupta et al., 2007) for each of their politeness strategy categories are below: 1. Autonomy [3.4] (e.g. Could you possibly do X for me? ) 2. Approval [3.0] (e.g. Could you please do X mate? ) 3. Direct [2.0] (e.g. Do X. ) 4. Indirect [1.8] (e.g. X is not done yet. ) This finding is, in some sense, counterintuitive, as unconventionalized request forms should be the least face-threatening. However, Gupta et al. (2007) briefly often an explanation, saying that the utterances generated in the indirect category sound a bit like a complaint or sarcasm. We agree with this assessment. More precisely, while negative face is protected by the use of their unconventionalized ISAs, positive face was not. To model whether or not utterances may be interpreted as being complaints or criticisms, we seek to determine whether or not they can be interpreted as an act of blame 2. 2 What the precise ontological relationship is between concepts such as complaining, criticizing, and blaming is beyond the scope of this paper. 3 Approach Like praise, blame (its negative counterpart) is both a cognitive and social phenomenon (Malle et al., 2012). The cognitive component pertains to the internal attitudes of an agent regarding another agent and their actions, while the social component involves the expression of these internal attitudes through communicative acts. To achieve blame-sensitivity in NLG, we need to model both these aspects. In the following sections, we briefly discuss how this could be accomplished. 3.1 Pragmatic and Belief Reasoning Before a speaker S can determine the high-level perlocutionary effects of an utterance on an addressee (H) vis-á-vis whether or not they feel criticized or blamed, it is first necessary to determine the precise set of beliefs and intentions of the addressee upon hearing an utterance u in context c. We denote this updated set of beliefs and intentions Ψ H (u, c). Note that this set is a model of agent H s beliefs and intentions from the speaker S s perspective, and not necessarily equivalent to the actual belief state of agent H. In order to perform this mental modeling, we utilize a reasoning system similar to that in (Briggs and Scheutz, 2011). This pragmatic reasoning architecture utilizes a set of rules of the form: [[U]] C := φ 1... φ n where U denotes an utterance form, C denotes a set of contextual constraints that must hold, and φ denotes a belief update predicate. An utterance form is specified by u = U tterancet ype(α, β, X, M), where U tterancet ype denotes the dialogue turn type (e.g. statement, y/n-question), α denotes the speaker of the utterance u, β denotes the addressee of the utterance, X denotes the surface semantics of the utterance, and M denotes a set of sentential modifiers. An example of such a pragmatic rule is found below: [[Stmt(S, H, X, {})]] := want(s, bel(h, X)) which denotes that a statement by the speaker S to an addressee H that X holds should indicate that, S wants H to believe X, in all contexts (given the empty set of contextual constraints). If this rule matches a recognized utterance (and the contextual constraints are satis-
3 fied, which is trivial in this case), then the mental model of the addressee is updated such that: want(s, bel(h, X)) Ψ H (u, c). Of particular interest with regard to the Gupta et al. (2007) results, Briggs and Scheutz (2011) describe how they can use their system to understand the semantics of the adverbial modifier yet, which they describe as being indicative of mutually understood intentionality. More accurately, yet, is likely indicative of a belief regarding expectation of an action being performed or state being achieved. Therefore, a plausible pragmatic rule to interpret, X is not done yet, could be: [[Stmt(S, H, done(x), {yet})]] := want(s, bel(h, done(x))) expects(s, done(x)) Furthermore, in a cooperative, task-driven context, such as that described in (Gupta et al., 2007), it would not be surprising for an interactant to infer that this expectation is further indicative of a belief in a particular intention or a task-based obligation to achieve X. 3 As such, if we consider an utterance u d as being a standard direct request form (strategy 3), and an utterance u y as being an indirect construction with a yet modifier (strategy 4), the following facts may hold: bel(s, promised(h, S, X, t p )) Ψ H (u d, c) bel(s, promised(h, S, X, t p )) Ψ H (u y, c) If S is making a request to H, there is no believed agreement to achieve X. However, if yet, is utilized, this may indicate to H a belief that S thinks there is such an agreement. Having calculated an updated mental model of the addressee s beliefs after hearing a candidate utterance u, we now can attempt to infer the degree to which u is interpreted as an act of criticism or blame. 3.2 Blame Modeling Attributions of blame are influenced by several factors including, but not limited to, beliefs about an agent s intentionality, capacity, foreknowledge, obligations, and possible justifications (Malle et 3 How precisely this reasoning is and/or ought to be performed is an important question, but is outside the scope of this paper. al., 2012). Given the centrality of intentionality in blame attribution, it is unsurprising that current computational models involve reasoning within a symbolic BDI (belief, desire, intention) framework, utilizing rules to infer an ordinal degree of blame based on the precise set of facts regarding these factors (Mao and Gratch, 2012; Tomai and Forbus, 2007). A rule that is similar to those found in these systems is: bel(s, promised(h, S, X, t p )) bel(s, X) bel(s, (t > t p )) bel(s, capable of(h, X)) blames(s, H, high) that is to say, if agent S believes agent H promised to him or her to achieve X by time t p, and S believes X has not been achieved and the current time t is past t p, and S believes H is capable of fulfilling this promise, then S will blame H to a high degree. Continuing our discussion regarding the perlocutionary effects of u d and u y, it is likely then that: blames(s, H, high) Ψ H (u d, c) and blames(s, H, high) Ψ H (u y, c). 3.3 FTA Modeling Having determined whether or not an addressee would feel criticized or blamed by a particular candidate utterance, it is then necessary to translate this assessment back into the terms of FTA-degree (the currency of the NLG system). This requires a function β(ψ) that maps the ordinal blame assessment of the speaker toward the hearer based on a set of beliefs Ψ, described in the previous section, to a numerical value than can be utilized to calculate the severity of the FTA (e.g. blames(s, H, high) = 9.0, blames(s, H, medium) = 4.5). For the purposes of this paper we adopt the theta-notation of Gupta et al. (2007) to denote the degree to which an utterance is a FTA. With the β function, we can then express the blame-related FTA severity of an utterance as: Θ blame (u, c) = β H (Ψ H (u, c)) α(c) β S (Ψ S ) where β H denotes the level of blame the speaker believes the hearer has inferred based on the addressee s belief state after hearing utterance u with context c (Ψ H (u, c))). β S denotes the level of blame the speaker believes is appropriate given his or her current belief state. Finally, α(c) denotes a
4 multiplicative factor that models the appropriateness of blame given the current social context. For instance, independent of the objective blameworthiness of a superior, it may be inappropriate for a subordinate to criticize his or her superior in certain contexts. Finally, then, the degree to which an utterance is a FTA is the sum of all the contributions of evaluations of possible threats to positive face and possible threats to negative face: Θ(u, c) = p P Θ p (u, c) + n N Θ n (u, c) where P denotes the set of all possible threats to positive face (e.g. blame) and N denotes the set of all possible threats to negative face (e.g. directness). We can see how this would account for the human-subject results from (Gupta et al., 2007), as conventionally indirect requests (strategies 1 and 2) would not produce large threat-value contributions from either the positive or negative FTA components. Direct requests (strategy 3) would, however, potentially produce a large Θ N contribution, while their set of indirect requests (strategy 4) would trigger a large Θ P contribution. 4 Discussion Having presented an approach to avoid certain types of positive-ftas through reasoning about blame, one may be inclined to ask some questions regarding the justification behind this approach. Why should we want to better model one highly complex social phenomenon (politeness) through the inclusion of a model of another highly complex social phenomenon (blame)? Does the integration of a computational model of blame actually add anything that would justify the effort? At a superficial level, it does not. The criticism/blame-related threat of a specific speech act can be implicitly factored into the base FTAdegree evaluation function supplied to the system, determined by empirical data or designerconsensus as is the case of (Miller et al., 2008). However, this approach is limited in a couple ways. First, this does not account for the fact that, in addition to the set of social factors Brown and Levinson articulated, the appropriateness of an act of criticism or blame is also dependent on whether or not it is justified. Reasoning about whether or not an act of blame is justified requires: a computational model of blame. Second, the inclusion of blame-reasoning within the larger scope of the entire agent architecture may enable useful behaviors both inside and outside the natural language system. There is a growing community of researchers interested in developing ethical-reasoning capabilities for autonomous agents (Wallach and Allen, 2008), and the ability to reason about blame has been proposed as one key competency for such an ethically-sensitive agent (Bello and Bringsjord, 2013). Not only is there interest in utilizing such mechanisms to influence general action-selection in autonomous agents, but there is also interest in the ability to understand and generate valid explanations and justifications for adopted courses of action in ethically-charged scenarios, which is of direct relevance to the design of NLG architectures. While our proposed solution tackles threats to positive face that arise due to unduly critical/blame-oriented utterances, there are many different ways of threatening positive face aside from criticism/blame. These include phenomena such as the discussion of inappropriate/sensitive topics or non-cooperative behavior (e.g. purposefully ignoring an interlocutor s dialogue contribution). Indeed, empirical results show that referring to an interlocutor in a dyadic interaction using an impersonal pronoun (e.g. someone ) may constitute another such positive face threat (De Jong et al., 2008). Future work will need to be done to develop mechanisms to address these other possible threats to positive face. 5 Conclusion Enabling politeness in NLG is a challenging problem that requires the modeling of a host of complex, social psychological factors. In this paper, we discuss ongoing work to integrate a computational model of blame to prevent inappropriate threats to positive face that can account for prior human-subject data. As an ongoing project, future work is needed to further test and evaluate this proposed approach. Acknowledgments We would like to thank the reviewers for their helpful feedback. This work was supported by NSF grant #
5 References Paul Bello and Selmer Bringsjord On how to build a moral machine. Topoi, 32(2): Gordon Briggs and Matthias Scheutz Facilitating mental modeling in collaborative human-robot interaction through adverbial cues. In Proceedings of the SIGDIAL 2011 Conference, pages , Portland, Oregon, June. Association for Computational Linguistics. Gordon Briggs and Matthias Scheutz A hybrid architectural approach to understanding and appropriately generating indirect speech acts. In Proceedings of the 27th AAAI Conference on Artificial Intelligence. moral responsibility. Technical report, DTIC Document. Cristen Torrey, Susan R Fussell, and Sara Kiesler How a robot should give advice. In Human- Robot Interaction (HRI), th ACM/IEEE International Conference on, pages IEEE. Wendell Wallach and Colin Allen Moral machines: Teaching robots right from wrong. Oxford University Press. Penelope Brown and Stephen C. Levinson Politeness: Some universals in language usage. Cambridge University Press. Justine Cassell and Timothy Bickmore Negotiated collusion: Modeling social language and its relationship effects in intelligent agents. User Modeling and User-Adapted Interaction, 13(1-2): Markus De Jong, Mariët Theune, and Dennis Hofs Politeness and alignment in dialogues with a virtual guide. In Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-volume 1, pages International Foundation for Autonomous Agents and Multiagent Systems. Swati Gupta, Marilyn A Walker, and Daniela M Romano How rude are you?: Evaluating politeness and affect in interaction. In Affective Computing and Intelligent Interaction, pages Springer. Bertram F Malle, Steve Guglielmo, and Andrew E Monroe Moral, cognitive, and social: The nature of blame. Social thinking and interpersonal behavior, 14:313. Wenji Mao and Jonathan Gratch Modeling social causality and responsibility judgment in multiagent interactions. Journal of Artificial Intelligence Research, 44(1): Christopher A Miller, Peggy Wu, and Harry B Funk A computational approach to etiquette: Operationalizing brown and levinson s politeness model. Intelligent Systems, IEEE, 23(4): Megan Strait, Cody Canning, and Matthias Scheutz Let me tell you! investigating the effects of robot communication strategies in advicegiving situations based on robot appearance, interaction modality and distance. In Proceedings of the 2014 ACM/IEEE international conference on Human-robot interaction, pages ACM. Emmett Tomai and Ken Forbus Plenty of blame to go around: a qualitative approach to attribution of
α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
Introduction to 30th Anniversary Perspectives on Cognitive Science: Past, Present, and Future
Topics in Cognitive Science 2 (2010) 322 327 Copyright Ó 2010 Cognitive Science Society, Inc. All rights reserved. ISSN: 1756-8757 print / 1756-8765 online DOI: 10.1111/j.1756-8765.2010.01104.x Introduction
Integrating Cognitive Models Based on Different Computational Methods
Integrating Cognitive Models Based on Different Computational Methods Nicholas L. Cassimatis ([email protected]) Rensselaer Polytechnic Institute Department of Cognitive Science 110 8 th Street Troy, NY 12180
Appendices master s degree programme Artificial Intelligence 2014-2015
Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability
2 Computer Science and Information Systems Research Projects
2 Computer Science and Information Systems Research Projects This book outlines a general process for carrying out thesis projects, and it embraces the following components as fundamentally important:
Greetings Generation in Video Role Playing Games
Greetings Generation in Video Role Playing Games Björn Schlünder Ruhr-Universität Bochum Department of Linguistics Germany [email protected] Ralf Klabunde Ruhr-Universität Bochum Department of Linguistics
THE EFFECTIVENESS OF LOGISTICS ALLIANCES EUROPEAN RESEARCH ON THE PERFORMANCE MEASUREMENT AND CONTRACTUAL SUCCESS FACTORS IN LOGISTICS PARTNERSHIPS
CIIL An IESE-Mecalux Initiative STUDY-62 February, 2008 THE EFFECTIVENESS OF LOGISTICS ALLIANCES EUROPEAN RESEARCH ON THE MEASUREMENT AND CONTRACTUAL SUCCESS FACTORS IN LOGISTICS PARTNERSHIPS Joan Jané
CREDIT TRANSFER: GUIDELINES FOR STUDENT TRANSFER AND ARTICULATION AMONG MISSOURI COLLEGES AND UNIVERSITIES
CREDIT TRANSFER: GUIDELINES FOR STUDENT TRANSFER AND ARTICULATION AMONG MISSOURI COLLEGES AND UNIVERSITIES With Revisions as Proposed by the General Education Steering Committee [Extracts] A. RATIONALE
A framing effect is usually said to occur when equivalent descriptions of a
FRAMING EFFECTS A framing effect is usually said to occur when equivalent descriptions of a decision problem lead to systematically different decisions. Framing has been a major topic of research in the
The Double Lives of Objects: An Essay in the Metaphysics of the Ordinary World
252 The Double Lives of Objects: An Essay in the Metaphysics of the Ordinary World, by Thomas Sattig. Oxford: Oxford University Press, 2015, 288 pages, ISBN 9780199683017 (hbk). In The Double Lives of
Subject area: Ethics. Injustice causes revolt. Discuss.
Subject area: Ethics Title: Injustice causes revolt. Discuss. 1 Injustice causes revolt. Discuss. When we explain phenomena we rely on the assertion of facts. The sun rises because the earth turns on its
Kant s Fundamental Principles of the Metaphysic of Morals
Kant s Fundamental Principles of the Metaphysic of Morals G. J. Mattey Winter, 2015/ Philosophy 1 The Division of Philosophical Labor Kant generally endorses the ancient Greek division of philosophy into
Communication Problems in Global Software Development: Spotlight on a New Field of Investigation
Communication Problems in Global Software Development: Spotlight on a New Field of Investigation Sébastien Cherry, Pierre N. Robillard Software Engineering Research Laboratory, École Polytechnique de Montréal
JOINT ATTENTION. Kaplan and Hafner (2006) Florian Niefind Coli, Universität des Saarlandes SS 2010
JOINT ATTENTION Kaplan and Hafner (2006) Florian Niefind Coli, Universität des Saarlandes SS 2010 1 1 1.Outline 2.Joint attention - an informal approximation 3.Motivation of the paper 4.Formalization of
Requests in International Business Emails
Requests in International Business Emails Dissertation zur Erlangung des Grades der Doktorin der Philosophie bei der Fakultät für Geisteswissenschaften Fachbereiche Sprache, Literatur, Medien & Europäische
Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager
Role title Digital Cultural Asset Manager Also known as Relevant professions Summary statement Mission Digital Asset Manager, Digital Curator Cultural Informatics, Cultural/ Art ICT Manager Deals with
A System for Labeling Self-Repairs in Speech 1
A System for Labeling Self-Repairs in Speech 1 John Bear, John Dowding, Elizabeth Shriberg, Patti Price 1. Introduction This document outlines a system for labeling self-repairs in spontaneous speech.
MS 102- PROFESSIONAL & BUSINESS ETHICS 2 MARKS QUESTIONS AND ANSWERS UNIT I
1. Define Ethics? MS 102- PROFESSIONAL & BUSINESS ETHICS 2 MARKS QUESTIONS AND ANSWERS UNIT I * Study of right or wrong. * Good and evil. * Obligations & rights. * Justice. * Social & Political deals.
DRAFT NATIONAL PROFESSIONAL STANDARDS FOR TEACHERS. Teachers Registration Board of South Australia. Submission
DRAFT NATIONAL PROFESSIONAL STANDARDS FOR TEACHERS Teachers Registration Board of South Australia Submission 21 May 2010 Table of Contents 1. EXECUTIVE SUMMARY 1 2. TEACHERS REGISTRATION BOARD OF SOUTH
How To Compare The Ideas Of Politeness To Face And Facework
Liisa Vilkki Politeness, Face and Facework: Current Issues Abstract The main purpose of this paper is to consider some current issues in the study of linguistic politeness and its relation to the notions
Appendices master s degree programme Human Machine Communication 2014-2015
Appendices master s degree programme Human Machine Communication 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability
Qualitative data acquisition methods (e.g. Interviews and observations) -.
Qualitative data acquisition methods (e.g. Interviews and observations) -. Qualitative data acquisition methods (e.g. Interviews and observations) ( version 0.9, 1/4/05 ) Code: data-quali Daniel K. Schneider,
Methodological Issues for Interdisciplinary Research
J. T. M. Miller, Department of Philosophy, University of Durham 1 Methodological Issues for Interdisciplinary Research Much of the apparent difficulty of interdisciplinary research stems from the nature
Intelligent Agents. Based on An Introduction to MultiAgent Systems and slides by Michael Wooldridge
Intelligent Agents Based on An Introduction to MultiAgent Systems and slides by Michael Wooldridge Denition of an Agent An agent is a computer system capable of autonomous action in some environment, in
or conventional implicature [1]. If the implication is only pragmatic, explicating logical truth, and, thus, also consequence and inconsistency.
44 ANALYSIS explicating logical truth, and, thus, also consequence and inconsistency. Let C1 and C2 be distinct moral codes formulated in English. Let C1 contain a norm N and C2 its negation. The moral
Management Assistance Program
Management Assistance Program HANDLING INSUBORDINATION AT WORK: Prevention and Intervention Techniques GOALS: The main goal of this module is to help organizations, managers and employees handle insubordination
On Intuitive Dialogue-based Communication and Instinctive Dialogue Initiative
On Intuitive Dialogue-based Communication and Instinctive Dialogue Initiative Daniel Sonntag German Research Center for Artificial Intelligence 66123 Saarbrücken, Germany [email protected] Introduction AI
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Rehabilitation programs for young offenders: Towards good practice? Andrew Day. Forensic Psychology Research Group. University of South Australia
1 Rehabilitation programs for young offenders: Towards good practice? Andrew Day Forensic Psychology Research Group University of South Australia [email protected] Invited paper for the Understanding
A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems
Proceedings of 10 th International Conference on User Modeling, pp423-427 Edinburgh, UK, July 24-29, 2005. Springer-Verlag Berlin Heidelberg 2005 A Framework of Context-Sensitive Visualization for User-Centered
KNOWLEDGE ORGANIZATION
KNOWLEDGE ORGANIZATION Gabi Reinmann Germany [email protected] Synonyms Information organization, information classification, knowledge representation, knowledge structuring Definition The term
LCS 11: Cognitive Science Chinese room argument
Agenda Pomona College LCS 11: Cognitive Science argument Jesse A. Harris February 25, 2013 Turing test review Searle s argument GQ 2.3 group discussion Selection of responses What makes brains special?
PREDICTING SOFTWARE FAULTS
PREDICTING SOFTWARE FAULTS Jay Naphas Federal Aviation Administration/AST-300, 800 Independence Avenue SW, Washington, DC 20591, USA, [email protected] ABSTRACT At first glance, software faults appear
Integrated Risk Management:
Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)
GOAL-BASED WEB DESIGN TOWARDS BRIDGING THE GAP BETWEEN REQUIREMENTS AND DESIGN OF WEB APPLICATIONS
13_BOLCHINI.qxd 3/26/2003 10:25 Pagina 187 SComS: New Media in Education (2003) 187-191 DAVIDE BOLCHINI* GOAL-BASED WEB DESIGN TOWARDS BRIDGING THE GAP BETWEEN REQUIREMENTS AND DESIGN OF WEB APPLICATIONS
Selecting Research Participants
C H A P T E R 6 Selecting Research Participants OBJECTIVES After studying this chapter, students should be able to Define the term sampling frame Describe the difference between random sampling and random
Robustness of a Spoken Dialogue Interface for a Personal Assistant
Robustness of a Spoken Dialogue Interface for a Personal Assistant Anna Wong, Anh Nguyen and Wayne Wobcke School of Computer Science and Engineering University of New South Wales Sydney NSW 22, Australia
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Language Meaning and Use
Language Meaning and Use Raymond Hickey, English Linguistics Website: www.uni-due.de/ele Types of meaning There are four recognisable types of meaning: lexical meaning, grammatical meaning, sentence meaning
Implementation of hybrid software architecture for Artificial Intelligence System
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
RELEVANCE AND e-learning. RELEVANCE IN CONTEXT, CONTENT AND ACTIVITIES IN e- LEARNING 1
RELEVANCE AND e-learning. RELEVANCE IN CONTEXT, CONTENT AND ACTIVITIES IN e- LEARNING 1 Jacques Moeschler ([email protected]) Department of linguistics, University of Geneva, 2, rue de
Errors in Operational Spreadsheets: A Review of the State of the Art
Errors in Operational Spreadsheets: A Review of the State of the Art Stephen G. Powell Tuck School of Business Dartmouth College [email protected] Kenneth R. Baker Tuck School of Business Dartmouth College
Component Based Software Engineering: A Broad Based Model is Needed
Component Based Software Engineering: A Broad Based Model is Needed Allen Parrish ([email protected]) Brandon Dixon ([email protected]) David Hale ([email protected]) Department of Computer Science
EFFECTIVE PERFORMANCE APPRAISALS
EFFECTIVE PERFORMANCE APPRAISALS When used correctly, the performance appraisal process is a useful technique to hold employees accountable for desired results, and aligning them with business strategy.
Colton B. Christian Department of Psychology 1227 University of Oregon Eugene, OR 97403-1227 [email protected]
Colton B. Christian 1227 University of Oregon Eugene, OR 97403-1227 [email protected] EDUCATION 2013-present University of Oregon, Eugene, OR Ph.D. (in progress), Social Psychology Advisor: Dr. Sara
Understanding and Supporting Intersubjective Meaning Making in Socio-Technical Systems: A Cognitive Psychology Perspective
Understanding and Supporting Intersubjective Meaning Making in Socio-Technical Systems: A Cognitive Psychology Perspective Sebastian Dennerlein Institute for Psychology, University of Graz, Universitätsplatz
Transformational Leadership in Technology Post-Adoption Period: A Motivational Factor for Acquiring Technology Enhancement Information
Transformational Leadership in Technology Post-Adoption Period: A Motivational Factor for Acquiring Technology Enhancement Information Kirill M. Yurov University of Illinois at Chicago Department of Information
School of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
Ontologies for Enterprise Integration
Ontologies for Enterprise Integration Mark S. Fox and Michael Gruninger Department of Industrial Engineering,University of Toronto, 4 Taddle Creek Road, Toronto, Ontario M5S 1A4 tel:1-416-978-6823 fax:1-416-971-1373
CASSANDRA: Version: 1.1.0 / 1. November 2001
CASSANDRA: An Automated Software Engineering Coach Markus Schacher KnowGravity Inc. Badenerstrasse 808 8048 Zürich Switzerland Phone: ++41-(0)1/434'20'00 Fax: ++41-(0)1/434'20'09 Email: [email protected]
ISRE 2400 (Revised), Engagements to Review Historical Financial Statements
International Auditing and Assurance Standards Board Exposure Draft January 2011 Comments requested by May 20, 2011 Proposed International Standard on Review Engagements ISRE 2400 (Revised), Engagements
Overcoming the false dichotomy of quantitative and qualitative research: The case of criminal psychology
Overcomingthefalsedichotomyofquantitativeand qualitativeresearch:thecaseofcriminalpsychology Candidate:SamuelGunn Supervisor:ProfessorDavidD.Clarke Degree:BScPsychology WordCount:3864 1 Contents 1.Introduction
Cognitive Load Theory and Instructional Design: Recent Developments
PAAS, RENKL, INTRODUCTION SWELLER EDUCATIONAL PSYCHOLOGIST, 38(1), 1 4 Copyright 2003, Lawrence Erlbaum Associates, Inc. Cognitive Load Theory and Instructional Design: Recent Developments Fred Paas Educational
COMPARATIVES WITHOUT DEGREES: A NEW APPROACH. FRIEDERIKE MOLTMANN IHPST, Paris [email protected]
COMPARATIVES WITHOUT DEGREES: A NEW APPROACH FRIEDERIKE MOLTMANN IHPST, Paris [email protected] It has become common to analyse comparatives by using degrees, so that John is happier than Mary would
Iterated Dynamic Belief Revision. Sonja Smets, University of Groningen. website: http://www.vub.ac.be/clwf/ss
LSE-Groningen Workshop I 1 Iterated Dynamic Belief Revision Sonja Smets, University of Groningen website: http://www.vub.ac.be/clwf/ss Joint work with Alexandru Baltag, COMLAB, Oxford University LSE-Groningen
Relevance Theory and Its Application to Advertising Interpretation
ISSN 1799-2591 Theory and Practice in Language Studies, Vol. 3, No. 3, pp. 492-496, March 2013 Manufactured in Finland. doi:10.4304/tpls.3.3.492-496 Relevance Theory and Its Application to Advertising
Introduction: Reading and writing; talking and thinking
Introduction: Reading and writing; talking and thinking We begin, not with reading, writing or reasoning, but with talk, which is a more complicated business than most people realize. Of course, being
Quine on truth by convention
Quine on truth by convention March 8, 2005 1 Linguistic explanations of necessity and the a priori.............. 1 2 Relative and absolute truth by definition.................... 2 3 Is logic true by convention?...........................
How To Design A Project
RODRIGO TISI Universidad Católica de Chile B 1 S 1 P 1 T 1 PL 1 M Six Ways to Approach Architecture Collaborative studio projects tested as full-scale models allow students of architecture to learn about
Framework for Modeling Partial Conceptual Autonomy of Adaptive and Communicating Agents
Framework for Modeling Partial Conceptual Autonomy of Adaptive and Communicating Agents Timo Honkela ([email protected]) Laboratory of Computer and Information Science Helsinki University of Technology
TEACHING INTERCULTURAL COMMUNICATIVE COMPETENCE IN BUSINESS CLASSES
22 TEACHING INTERCULTURAL COMMUNICATIVE COMPETENCE IN BUSINESS CLASSES Roxana CIOLĂNEANU Abstract Teaching a foreign language goes beyond teaching the language itself. Language is rooted in culture; it
KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE
KEY KNOWLEDGE MANAGEMENT TECHNOLOGIES IN THE INTELLIGENCE ENTERPRISE RAMONA-MIHAELA MATEI Ph.D. student, Academy of Economic Studies, Bucharest, Romania [email protected] Abstract In this rapidly
KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 22/2013, ISSN 1642-6037 medical diagnosis, ontology, subjective intelligence, reasoning, fuzzy rules Hamido FUJITA 1 KNOWLEDGE-BASED IN MEDICAL DECISION
A Marketing Manager's Primer How to Create a Customer Database
A Marketing Manager's Primer How to Create a Customer Database By Cynthia Baughan Wheaton Principal, Wheaton Group Original Version of an article that appeared in the February 1990 issue of Direct Marketing
Course Engagement and Involvement ENG P107-4. Presecondary
Course Engagement and Involvement ENG P107-4 Presecondary Language is the roadmap of a culture. It tells you where its people came from and where they are going. Presentation of the Course Engagement
In an ERP implementation how the entire organization works changes forever
Whether you re upgrading from a legacy based system or automating from scratch, selecting and deploying the right ERP solution is something organizations must get right. An ERP pervades through the entire
Critical Study David Benatar. Better Never To Have Been: The Harm of Coming into Existence (Oxford: Oxford University Press, 2006)
NOÛS 43:4 (2009) 776 785 Critical Study David Benatar. Better Never To Have Been: The Harm of Coming into Existence (Oxford: Oxford University Press, 2006) ELIZABETH HARMAN Princeton University In this
Ten Steps to Comprehensive Project Portfolio Management Part 3 Projects, Programs, Portfolios and Strategic Direction By R.
August 2007 Ten Steps to Comprehensive Project Portfolio Management Part 3 Projects, Programs, Portfolios and Strategic Direction By R. Max Wideman This series of papers has been developed from our work
Introduction to formal semantics -
Introduction to formal semantics - Introduction to formal semantics 1 / 25 structure Motivation - Philosophy paradox antinomy division in object und Meta language Semiotics syntax semantics Pragmatics
Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance
Factors for the Acceptance of Enterprise Resource Planning (ERP) Systems and Financial Performance Ayman Bazhair and Kamaljeet Sandhu Abstract The purpose of this research paper to present the synthesized
Langue and Parole. John Phillips
1 Langue and Parole John Phillips The distinction between the French words, langue (language or tongue) and parole (speech), enters the vocabulary of theoretical linguistics with Ferdinand de Saussure
Undergraduate Psychology Major Learning Goals and Outcomes i
Undergraduate Psychology Major Learning Goals and Outcomes i Goal 1: Knowledge Base of Psychology Demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical
Facilitating Business Process Discovery using Email Analysis
Facilitating Business Process Discovery using Email Analysis Matin Mavaddat [email protected] Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process
HIGHER DIPLOMA BUSINESS FINANCE
BENCHMARK STATEMENTS for HIGHER DIPLOMA in BUSINESS FINANCE SRI LANKA QUALIFICATIONS FRAMEWORK AND QUALITY ASSURANCE UNIT HIGHER EDUCATION FOR TWENTY FIRST CENTURY (HETC) PROJECT Ministry of Higher Education
Quality Standard Customer Service Complaints Handling
Quality Standard Customer Service Complaints Handling Version 1 Date:- 2 nd December 2010 Page 1 Contents INTRODUCTION 4 OVERVIEW OF THE COMPLAINTS STANDARD 5 FRAMEWORK 6 MANDATORY SECTIONS 7 SECTION 1
Module 0. Facilitating Adult Learning. (September 2004)
Module 0 Facilitating Adult Learning (September 2004) Table of Contents a. Preparing to conduct a training... 1 b. Developing training objectives... 1 c. Designing training content... 1 d. Using principles
Context Capture in Software Development
Context Capture in Software Development Bruno Antunes, Francisco Correia and Paulo Gomes Knowledge and Intelligent Systems Laboratory Cognitive and Media Systems Group Centre for Informatics and Systems
CS4025: Pragmatics. Resolving referring Expressions Interpreting intention in dialogue Conversational Implicature
CS4025: Pragmatics Resolving referring Expressions Interpreting intention in dialogue Conversational Implicature For more info: J&M, chap 18,19 in 1 st ed; 21,24 in 2 nd Computing Science, University of
Information Technology and Knowledge Management
Information Technology and Knowledge Management E. Shimemura and Y. Nakamori Japan Advanced Institute of Science and Technology 1-1 Asahidai, Tatsunokuchi, Ishikawa 923-1292, Japan Abstract This paper
IMPLIES 'CAN' 'OUGHT' CONVERSATIONALLY. Walter Sinnott-Armstrong
The Philosophical Review, XCIII, No. 2 (April 1984) 'OUGHT' CONVERSATIONALLY Walter Sinnott-Armstrong IMPLIES 'CAN' The principle that 'ought' implies 'can' is often taken for granted in discussions of
3.14 UNDERGRADUATE DEGREE REQUIREMENTS 3.14.1 Purpose This policy statement establishes guidelines, criteria, and standards for use by State System
3.14 UNDERGRADUATE DEGREE REQUIREMENTS 3.14.1 Purpose This policy statement establishes guidelines, criteria, and standards for use by State System institutions in developing degree programs for which
TRU Math Conversation Guide
Release Version Alpha TRU Math Conversation Guide Module A: Contextual Algebraic Tasks This TRU Math Conversation Guide, Module A: Contextual Algebraic Tasks is a product of The Algebra Teaching Study
School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology. DM/IST 004 Requirements
School of Advanced Studies Doctor Of Management In Organizational Leadership/information Systems And Technology The mission of the Information Systems and Technology specialization of the Doctor of Management
