Socially Adept Technologies. Steve Marsh National Research Council Canada email@example.com http://www.stephenmarsh.ca/ March 21st, 2002. Motivation. An introduction to the field Pointers to relevant work Questions about ‘suitability’ Suggestions for future projects A wake-up call
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
National Research Council Canada
March 21st, 2002
When an individual enters the presence of others, they commonly seek to acquire information about him or bring into play information about him already possessed ... Information about the individual helps to define the situation, enabling others to know in advance what he will expect of them and what they may expect of him.
GOFFMAN, E., page 13, 1959; “The Presentation of Self in Everyday Life”, Penguin: Middlesex.
Tx(y,a) =Ux(a) * Ix(a)*Tx(y)
C_Tx(y,a) = (Rx(a) / Cx(y, a)) * Ix(a)
Marsh(1994) see: http:// www.iit.nrc.ca/~steve/pubs/Trust
Portions of this work were carried out in collaboration with researchers at University of New Brunswick’s Faculty of Computer Science…
Thanks to Profs Ali Ghorbani and Virendra Bhavsar in particular, who have taken ACORN from its humble beginnings to new heights…
Students and programmers that have worked on this project are: Youssef Masrour, Hui Yu, Leigh Wetmore, and Jonathan Carter.
Without systems being able to sense that the user is there, who they are, what they’re doing or need, and lots of other physical and mental things, this stuff is doomed to ultimate failure
(consider the average traffic light)
The human in the loop is the key to Social Adeptness...