4,556 Matching Annotations
  1. Apr 2026
    1. Hallucinated packages are the sleeper threat. LLMs regularly invent package names that don't exist. One study found that nearly 20% of AI-recommended packages were fabrications, and 43% of those hallucinated names appeared consistently across queries.

      大多数人认为AI推荐的包都是真实存在的,但作者揭示了AI经常推荐不存在的包,这已成为一种新的攻击向量。攻击者利用这一现象注册'幻觉包'并植入恶意代码,这种'slopsquatting'技术让AI本身成为供应链攻击的放大器。

    2. AI agents select known-vulnerable dependency versions 50% more often than humans. Worse, the vulnerable versions they pick are harder to fix, requiring major-version upgrades far more frequently.

      大多数人认为AI编码助手会比人类更安全地选择依赖项,但作者发现AI实际上选择已知漏洞版本的概率比人类高50%,而且这些漏洞更难修复。这是因为AI优化的是'功能是否工作'而非'是否安全',这挑战了AI辅助开发的安全假设。

    1. Talent density : the biggest prizes in capitalism attract the best minds in the field. These are the fastest growing software companies in history.

      大多数人认为AI发展主要靠算法突破和计算资源,但作者强调人才密度是推动AI压缩的关键因素,暗示了人才竞争比资本和算法更重要,这与行业普遍重视技术投入的观点相悖。

    2. In 23 months, the same capability that needed 1.8 trillion parameters now fits in 4 billion parameters. A 450x compression.

      大多数人认为AI模型性能提升主要依靠参数数量增加,但作者认为通过算法优化和人才聚集,AI模型可以实现450倍的参数压缩,这挑战了'更大参数等于更好性能'的行业共识。

    3. Within three to four months, you can run a model with similar performance on your laptop; 23 months later, you can run the same model on your phone.

      大多数人认为前沿AI技术需要很长时间才能普及到消费级设备,但作者认为前沿模型只需3-4个月就能在笔记本上运行,23个月就能在手机上实现,这种技术下放的速度远超行业普遍预期。

    1. Exposure alone is a completely meaningless tool for predicting displacement

      大多数人认为通过分析工作任务的AI暴露程度可以预测哪些工作会被取代,但作者认为这种单一指标完全无意义,因为它忽略了价格弹性和需求变化等关键因素。这挑战了当前AI就业影响研究的主流方法。

    1. in the past year Huawei has overtaken Nvidia as the leading source of AI computing power in China, at least in terms of rated FLOP/s

      大多数人可能认为Nvidia在中国市场仍然占据主导地位,但作者认为华为已经超过Nvidia成为中国AI计算能力的主要来源。这一发现挑战了人们对Nvidia在中国市场不可动摇地位的认知,表明本土替代技术可能比预期更快地获得市场份额。

    2. We estimate that as of the end of 2025, Chinese companies collectively own just over 5% of the cumulative computing power of the leading AI chips sold in recent years

      考虑到中国AI产业的快速发展和政府对AI的大力投资,大多数人可能认为中国拥有更大比例的全球AI计算能力,但作者认为中国公司仅拥有约5%的全球AI计算能力。这一数字远低于人们的预期,挑战了关于中国AI技术实力的普遍认知。

    3. Many frontier AI developers, including Anthropic and OpenAI, acquire almost all of their compute from hyperscalers and other cloud providers.

      大多数人可能认为领先的AI公司会拥有自己的计算基础设施以保持竞争优势,但作者认为OpenAI和Anthropic等前沿AI公司几乎完全依赖超大规模云服务提供商获取计算能力。这表明AI创新可能比想象中更加依赖大型科技公司的基础设施,而非独立的计算资源。

    4. We estimate that over 60% of global AI compute (in terms of total computing power) is owned by the five US hyperscalers, led by Google.

      大多数人认为AI芯片的分布会更加分散,或者被专门的AI公司如OpenAI和Anthropic所主导,但作者认为全球AI计算能力的大部分被少数几家美国超大规模科技公司控制,这挑战了人们对AI产业结构的认知。这种集中化意味着少数几家公司对AI发展的方向有不成比例的影响力。

    1. 複雑なリサーチは、単一のクエリに対する回答の集積ではなく、アイデアの生成から、裏付けとなる証拠の探索、矛盾の解消、そして最終的なレポートとしての構造化まで、一連のプロセスを完遂する必要があります。

      大多数人认为AI研究助手应该专注于提供快速、直接的答案,但作者强调复杂研究需要完整的'从想法到结构化报告'的完整过程。这与当前AI助手追求即时回答的主流认知相悖,暗示了质量比速度更重要,这是一个非共识的AI应用观点。

    2. 推論時により長く、深く思考させることでよりよいアウトプットを引き出せる。これが推論スケーリングの本質です。

      大多数人认为AI应该追求更快的响应速度和更高的效率,但作者认为AI应该'长时间深度思考'才能产生更好的输出。这与当前AI行业追求即时响应的主流认知相悖,提出了一个反直觉的观点:计算效率的提升反而应该用于增加思考深度而非速度。

    1. For higher-interactivity scenarios, execution time for MoE models is bound by expert weight load time. By splitting, or sharding, the experts across multiple GPUs across NVL72 nodes, this bottleneck is reduced, improving end-to-end performance.

      大多数人认为MoE模型的主要瓶颈在于计算能力,但作者指出专家权重加载时间是真正的瓶颈,并提出通过跨GPU分片专家权重来解决问题,这挑战了AI模型优化的传统认知,暗示了I/O可能比计算更重要。

    2. NVIDIA was the first and only platform to submit DeepSeek-R1 results on MLPerf Inference when the benchmark debuted last year.

      大多数人认为AI基准测试会吸引多家竞争平台参与,但作者强调NVIDIA是唯一提交DeepSeek-R1结果的平台,这暗示了NVIDIA在AI基准测试中的垄断地位,与行业多元化竞争的普遍认知相悖。

    1. The E4B and E2B are the newest edition of on-device and mobile designed models first launched with Gemma 3n.

      大多数人认为移动设备上的AI模型需要大幅简化功能才能高效运行。但作者暗示Gemma 4的E4B和E2B版本在移动设备上仍然保持了多模态能力,包括文本、音频、视觉和视频处理,这挑战了移动AI能力的传统认知。

    2. Modern physical AI agents are evolving rapidly with Gemma 4 models that integrate audio, multimodal perception, and deep reasoning capabilities.

      大多数人认为物理AI代理仍处于早期阶段,主要执行简单任务。但作者暗示Gemma 4已经使物理AI代理能够理解语音、解释视觉上下文并智能推理,这代表了对当前机器人技术能力的重大提升,可能会加速AI实体化的进程。

    1. By using SAM, the Alta team has been able to process more than 20 million images without incurring exorbitant costs, allowing them to focus on building the best possible product for their users.

      大多数人可能认为初创公司需要依赖昂贵的第三方API来处理大量图像,但作者通过使用开源SAM模型,实现了大规模图像处理而不产生巨额成本。这一观点挑战了'高质量AI服务必须昂贵'的行业共识,展示了开源模型在成本效益方面的优势。

    2. If we knew that every image uploaded was a beautiful model shot, segmentation would be far easier, but because of the nature of user-uploaded content, we need the best possible segmentation.

      大多数人可能认为高质量的专业照片是AI图像处理的理想输入,但作者暗示即使是'完美'的模特照片实际上比用户上传的真实内容更容易处理。这一观点挑战了人们对'理想训练数据'的假设,暗示真实世界数据的'不完美'实际上构成了更严峻的技术挑战。

    1. The edge models feature a 128K context window, while the larger models offer up to 256K

      大多数人认为边缘设备/移动设备上的AI模型功能受限,尤其是在处理长上下文方面。但作者声称即使在移动设备上,Gemma 4也能提供128K的上下文窗口,挑战了边缘AI能力有限的普遍认知。

    1. Within ChatGPT Business and Enterprise, the number of Codex users has grown 6x since January.

      大多数人可能认为企业AI工具的采用是渐进式的,但作者认为Codex在企业环境中的采用呈爆炸性增长(6倍增长),这表明AI编程助手可能比预期更快地从实验性工具转变为生产力核心,挑战了人们对AI技术企业采用速度的常规认知。

    2. Codex-only seats have no rate limits, and usage is billed on token consumption.

      大多数人认为AI服务通常会设置使用限制以控制成本,但作者认为Codex无速率限制的按token计费模式是可行的,因为这提供了更透明的成本结构和更灵活的使用体验,这可能反映了OpenAI对自身技术效率和用户需求的信心。

    1. Priority areas include safety evaluation, ethics, robustness, scalable mitigations, privacy-preserving safety methods, agentic oversight, and high-severity misuse domains.

      大多数人认为AI安全研究主要集中在防止恶意使用和确保系统对齐人类价值观上。但作者将隐私保护方法列为优先领域,这表明OpenAI正在将隐私视为安全的核心组成部分,而非一个独立考虑的因素,这与传统上将隐私和安全视为两个不同领域的观点相悖。

    2. Fellows will receive API credits and other resources as appropriate, but will not have internal system access.

      在AI安全领域,许多人认为要真正研究系统安全,必须获得对内部系统的完全访问权限。作者明确表示研究员将无法访问内部系统,这挑战了传统AI安全研究的假设,暗示OpenAI认为安全研究可以在没有完全系统访问的情况下进行,或者他们有其他方法来评估安全性。

    3. Fellows will work closely with OpenAI mentors and engage with a cohort of peers.

      大多数人认为AI安全研究应该是高度保密和孤立的,特别是涉及高级AI系统安全的研究。但作者强调与OpenAI导师的紧密合作和同行交流,表明OpenAI正在采取一种开放协作的AI安全研究方法,这与行业通常的封闭研究模式形成鲜明对比。

    4. We are especially interested in work that is empirically grounded, technically strong, and relevant to the broader research community.

      大多数人认为AI安全研究应该是高度理论化和抽象的,但作者强调需要实证基础和技术强度,这表明OpenAI正在将AI安全研究从纯理论领域转向更注重实际应用和可验证成果的方向,这与传统AI安全研究的精英主义倾向形成对比。

    1. Demand from Claude customers has accelerated in 2026. Our run-rate revenue has now surpassed $30 billion—up from approximately $9 billion at the end of 2025.

      大多数人认为AI公司仍处于烧钱阶段,但Anthropic的收入增长速度惊人,从2025年底的90亿美元年化收入飙升至2026年的300亿美元,这表明AI商业化速度远超市场预期,挑战了AI公司长期亏损的共识观点。

    1. There's a fundamental problem with these tools beyond the capacity of any deployment strategy to solve: the tool requires expertise to validate, but its use diminishes expertise and stunts its growth

      the paradox here is that using algogens erodes the skills to be able to judge its output. I think we already see that in the code leak from Anthropic.

    1. The thing about agentic coding is that agents grind problems into dust. Give an agent a problem and a while loop and - long term - it’ll solve that problem even if it means burning a trillion tokens and re-writing down to the silicon. Like, where’s the bottom? Why not take a plain English spec and grind in out in pure assembly every time? It would run quicker. But we want AI agents to solve coding problems quickly and in a way that is maintainable and adaptive and composable (benefiting from improvements elsewhere), and where every addition makes the whole stack better. So at the bottom is really great libraries that encapsulate hard problems, with great interfaces that make the “right” way the easy way for developers building apps with them. Architecture! While I’m vibing (I call it vibing now, not coding and not vibe coding) while I’m vibing, I am looking at lines of code less than ever before, and thinking about architecture more than ever before. I am sweating developer experience even though human developers are unlikely to ever be my audience. How do we make libraries that agents love?

      Is this an example of how to better make agents (better architecture and libraries underneath) or an example of 'the arc of AI bends towards deterministic software: architecture and libraries making agents as flat as functions?

    1. Anthropic, the company behind the Claude AI model that was integrated into Palantir’s Maven Smart System, published a landmark paper on the problem in 2023. “Towards Understanding Sycophancy in Language Models,” presented at ICLR 2024, demonstrated that five state-of-the-art AI assistants consistently exhibited sycophantic behaviour across four varied text-generation tasks. The researchers found that when a response matched a user’s pre-existing views, it was significantly more likely to be rated as “preferred” by both humans and the preference models used to train the AI. Both humans and preference models, the paper concluded, prefer convincingly-written sycophantic responses over correct ones “a non-negligible fraction of the time.

      not just humans, but by extension also preference models prefer flattery over accuracy in generated outcomes.

      2023 Towards Understanding Sycophancy in Language Models, paper: https://arxiv.org/abs/2310.13548 (cc-by)

    2. A growing body of evidence, drawn from leaked planning documents, academic research, and the testimony of intelligence professionals, suggests that the most consequential military operation of the twenty-first century may have been shaped less by strategic necessity than by a phenomenon researchers now call AI sycophancy — the tendency of large language models to tell their users exactly what they want to hear.

      US may have ai-flattered their way into Iran war.

    1. Our preliminary results indicate that there is an additional phase, the intention to learn, and three relating factors, self-efficacy, conversion readiness, and peer support, that significantly influence the acceptance of mobile technologies among the participants, but are not represented in the existing models. With these findings, we propose a tentative theoretical model that extends the existing theories to explain the ways in which our participants came to accept mobile technologies.

      sentences about extending existing theoretical models with research findings

    2. Triangulating the empirical findings from our preliminary results with the existing theoretical models, we proposed an extension of the existing theoretical models that explains the technology acceptance behavior of our participants who were aged 60 or over. Our proposed model incorporates key elements of prior models and introduces novel components that significantly influence the participants' technology acceptance, namely one new phase, intention to learn, and three factors, self-efficacy, conversion readiness and peer support.

      sentences about extending existing theoretical models with research findings

    3. Consolidating our preliminary findings with the existing models, we propose an extended technology acceptance model for older adults illustrated in Figure 3. Extending to the predecessor theories, our tentative model introduces the perceived effort of learning a new technology as an obstacle for older adults' technology acceptance, which has not been reported in any studies of younger adults' technology acceptance.

      sentences about extending existing theoretical models with research findings

    4. Another stream of efforts sought to understand physical and cognitive performance of older adults in interacting with mobile technologies. Studies have shown that typical interaction components and techniques of a smartphone often prevent older adults from smooth and instant interactions with it. For example, the small size and the low contrast of buttons on a mobile display has a significant negative influence on interaction performance such as speed and accuracy [18], and decline in motor skills is correlated with time required to complete a task [30].

      citations about older adults

    5. Lee and Coughlin reviewed studies of older adults' technology acceptance and identified ten factors that are critical facilitators or determinants of older adults' acceptance of technology: value, usability, affordability, accessibility, technical support, social support, emotion, independence, experience, and confidence [20].

      citations about older adults

    6. Many studies have empirically investigated technology acceptance practices among older adults. While diverse in detail, most works point out that an individual's personal context [38] and the social context [36] in which the technology is introduced are the primary factors influencing the perception of, experience with, and evaluation of new technological developments among older adults [19].

      citations about older adults

    7. Seniors have historically been late adopters to the world of technology compared to their younger counterparts [24, 40]. As a result, older adults and their adoption of new technologies have been a topic of active research since the advent of consumer technologies (e.g., automated teller machine [32], scanner-equipped grocery stores [41], electronic funds transfer [15]).

      citations about older adults

    8. Nowadays, older adults are increasingly adopting and adapting to information and communication technologies [5]. For example, smartphone ownership among older adults has significantly risen in recent years [3]. However, its adoption levels among older adults in the US still sit at 27% as of 2015, whereas some 85% of Americans aged 18-29 are smartphone owners [31].

      citations about older adults

    9. Consolidating our preliminary findings with the existing models, we propose an extended technology acceptance model for older adults illustrated in Figure 3. Extending to the predecessor theories, our tentative model introduces the perceived effort of learning a new technology as an obstacle for older adults' technology acceptance, which has not been reported in any studies of younger adults' technology acceptance.

      sentences that implicitly or explicitly mention theory

    10. our key focus is to build a theoretical model that explains the process through which older adults accept (or reject) mobile technology, which can provide theoretical guidelines when designing a technology, and which may also be able to generate new investigations and experiments.

      sentences that implicitly or explicitly mention theory

    11. Triangulating the empirical findings from our preliminary results with the existing theoretical models, we proposed an extension of the existing theoretical models that explains the technology acceptance behavior of our participants who were aged 60 or over.

      sentences that implicitly or explicitly mention theory

    12. Employing the grounded theory method [33], we allowed recurring themes and concepts in relation to technology acceptance behaviors to arise from the data itself. Then, by triangulating our empirical findings with existing theoretical models from the literature, we found out that the existing models of technology adoption require new theory components to be able to describe technology adoption processes of our participants.

      sentences that implicitly or explicitly mention theory

    1. We propose that cognitive engagement may be a useful construct in conceptualizing human engagement with AI and can help to distinguish between passive engagement, when individuals simply follow AI recommendations, and deeper forms of engagement, when they critically examine these recommendations and compare them with their own knowledge and judgement.

      sentences about intended user's goals

    2. An outcome of deeper cognitive engagement would be an ability to reject information that is inconsistent with individuals' own knowledge and beliefs, and to adjust their own knowledge to incorporate new information.

      sentences about intended user's goals

    3. Given continuous concerns regarding the reliability and trustworthiness of AI, human critical engagement may be a necessary component of successful human-AI interaction, particularly in domains with a high cost of errors, such as health and medicine.

      sentences about intended user's goals

    4. Incidental learning typically occurs as a byproduct of other activities (e.g., problem solving, advice seeking) rather than as a result of explicit or formal educational activities [47]. However, like formal learning, incidental learning can only occur if people engage deeply with information.

      sentences that implicitly or explicitly mention theory

    5. While prior work has highlighted the critical role of explanations in promoting learning [10, 18], our work additionally demonstrated the value of creating the conditions for learners to engage constructively (as defined in the ICAP framework [15, 16]) with the explanations.

      sentences that implicitly or explicitly mention theory

    6. We hypothesize that the observed difference in learning gain was due to the degree of cognitive engagement with AI-generated information. When individuals were provided with a solution to their task (in the form of a decision recommendation), they did not need to engage deeply with the explanations and could simply proceed with action. However, when they needed to arrive at their own decisions, they needed to engage with the provided explanations and synthesize the information to arrive at the conclusions.

      sentences that implicitly or explicitly mention theory

    7. al. propose Interactive-Constructive-Active-Passive (ICAP) framework to describe a continuum of learning behaviors (from passive, to active, to constructive, to interactive) and argue that each subsequent level leads to an increase in cognitive engagement and learning [15, 16].

      sentences that implicitly or explicitly mention theory

    8. Research in cognitive psychology suggested that people process information on different levels. Deep processing occurs when individuals engage in more meaningful analysis of information and link it to existing knowledge structures [2]. In learning sciences, depth of processing is often associated with the degree of cognitive engagement, which is described as a "psychological state in which students put in a lot of effort to truly understand a topic and in which students persist studying over a long period of time." [59].

      sentences that implicitly or explicitly mention theory

    9. Researchers in learning sciences use the term "cognitive engagement" to describe learners' engagement with the learning process. When people are cognitively engaged with instructional process and materials, they are more likely to benefit from instruction and are more likely to acquire new skills and knowledge.

      sentences that implicitly or explicitly mention theory

    1. Additionally, our tool currently helps users in the reviewing step solely with the alignment functionality. Future work should add additional assistance during this step in the form of suggested improvements to selected unsatisfactory content in the summary, in addition to the alignment feature.

      Please highlight any phrases that describe recommendations made in the paper

    2. Future work should expand the application's capabilities to the multi-document setting, both in terms of the backend models and in terms of accessibility and intuitiveness of the application's frontend design.

      Please highlight any phrases that describe recommendations made in the paper

    3. Additionally, in light of some user feedback, another interesting extension includes developing more abstractive consolidation and fusion models, which would offer control over the level of abstractness in the outputs.

      Please highlight any phrases that describe recommendations made in the paper

    4. highlights are incorporated into the input text with special markups, <extra_id_1> and <extra_id_2>, marking the beginning and end of each highlighted span, respectively. In our configuration, we set the maximum input length to 4096 and the maximum target length to 400. A greedy decoding strategy was used in order to optimize the decoding speed.

      Please highlight any phrases that describe the libraries and tools used to implement the idea

    5. Our approach locates the longest common subsequence (LCS) between the lemmas of each input sentence and each summary sentence, followed by several heuristics to filter out irrelevant LCSs

      Please highlight any phrases that describe the libraries and tools used to implement the idea

    6. For the initial auto-consolidation, we deploy an available Controlled Text Reduction model (Slobodkin et al., 2023), which is a Flan-T5large model (Chung et al., 2022), finetuned on the highlights-focused CTR dataset.

      Please highlight any phrases that describe the libraries and tools used to implement the idea

    7. we deploy the ExtractiveSummarizer model from the TransformerSum library. The model, a RoBERTabase (Liu et al., 2019) trained on the CNN/DailyMail summarization dataset (Hermann et al., 2015), operates as a binary classifier.

      Please highlight any phrases that describe the libraries and tools used to implement the idea

    8. This step coincides with the recently introduced Controlled Text Reduction task (CTR; Slobodkin et al., 2022), which produces a coherent fused version of the content of marked spans ("highlights") in a source document, as interpreted within the context of the full text.

      Please highlight any phrases that describe the theory behind this work

    9. SUMMHELPER is a modular system consisting of separate components, each performing one subtask, allowing user modifications of that sub-task's output. Such decomposition has been studied before in the context of fully automated summarization, with several works separating the process into salience detection and generation components (Barzilay and McKeown, 2005; Li et al., 2018; Ernst et al., 2022). These works focused on optimizing each component as part of a fully-automatic summarization process in order to improve the overall performance of the model. In contrast, our work uses this modularity to not only improve overall system output, but to also give more control to the user over each step in the summarization process.

      Please highlight any phrases that describe the theory behind this work

    10. Our objective in this paper is to promote such a human-involved approach to summarization, allowing to better tailor the eventual output to real-world user needs, and to synergize the efficiency of the computer with the quality of the human (Hoc, 2000; Pacaux-Lemoine et al., 2017; Flemisch et al., 2019).

      Please highlight any phrases that describe the theory behind this work

  2. Mar 2026
    1. the selection of label options may work better if it is similar to common options for given tasks, such as [positive, neutral, negative] > [super positive, positive, ..., negative] for sentiment classification

      Please highlight any phrases that describe recommendations made in the paper

    2. errors encountered during API calls are handled in two ways: handle within our system or delegate to users. We handle known LLM API errors that can be solved by user-side intervention. This would be in cases such as a Timeout or RateLimitError in OpenAI models

      Please highlight any phrases that describe the libraries and tools used to implement the idea

    3. Data Model MEGAnno+ extends MEGAnno's data model where data Record, Label, Annotation, Metadata (e.g., text embedding or confidence score) are persisted in the service database along with the task Schema.

      Please highlight any phrases that describe the libraries and tools used to implement the idea

    4. MEGAnno+ is designed to provide a convenient and robust workflow for users to utilize LLMs in text annotation. To use our tool, users operate within their Jupyter notebook (Kluyver et al., 2016) with the MEGAnno+ client installed.

      Please highlight any phrases that describe the libraries and tools used to implement the idea

    5. LLM annotators and human annotators should not be treated the same, and annotation tools should carefully design their data models and workflows to accommodate both types of annotators.

      Please highlight any phrases that describe the theory behind this work

    6. we go beyond using LLMs to assist annotation for human annotators or to replace human annotators. Rather, MEGAnno+ advocates for a collaboration between humans and LLMs with our dedicated system design and annotation-verification workflows.

      Please highlight any phrases that describe the theory behind this work

    7. Despite these advancements, it is essential to acknowledge that LLMs have limitations, necessitating human intervention in the data annotation process. One challenge is that the performance of LLMs varies extensively across different tasks, datasets, and labels. LLMs often struggle to comprehend subtle nuances or contexts in natural language, making involvement of humans with social and cultural understanding or domain expertise crucial.

      Please highlight any phrases that describe the theory behind this work

    8. Large language models (LLMs) can label data faster and cheaper than humans for various NLP tasks. Despite their prowess, LLMs may fall short in understanding of complex, sociocultural, or domain-specific context, potentially leading to incorrect annotations. Therefore, we advocate a collaborative approach where humans and LLMs work together to produce reliable and high-quality labels.

      Please highlight any phrases that describe the theory behind this work

    1. Mary E Sesto, Curtis B Irwin, Karen B Chen, Amrish O Chourasia, and Douglas A Wiegmann. 2012. Effect of touch screen button size and spacing on touch characteristics of users with and without disabilities. Human Factors: The Journal of the Human Factors and Ergonomics Society 54, 3 (2012), 425–436.

      any bibliographic entry relating to older adults

    2. Zhao Xia Jin, Tom Plocher, and Liana Kiff. 2007. Touch screen user interfaces for older adults: button size and spacing. In Universal acess in human computer interaction. coping with diversity. Springer, 933–941.

      any bibliographic entry relating to older adults

    3. Robin Brewer, Raymundo Cornejo Garcia, Tedmond Schwaba, Darren Gergle, and Anne Marie Piper. 2016. Exploring Traditional Phones as an E-Mail Interface for Older Adults. ACM Transactions on Accessible Computing (TACCESS) 8, 2 (2016), 6.

      any bibliographic entry relating to older adults

    4. Kerryellen G Vroman, Sajay Arthanat, and Catherine Lysack. 2015. "Who over 65 is online?" Older adults' dispositions toward information communication technology. Computers in Human Behavior 43 (2015), 156–166.

      any bibliographic entry relating to older adults

    5. Karen Renaud and Judy Van Biljon. 2008. Predicting technology acceptance and adoption by the elderly: a qualitative study. In Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology. ACM, 210–219.

      any bibliographic entry relating to older adults

    6. Chee Wei Phang, Juliana Sutanto, Atreyi Kankanhalli, Yan Li, Bernard CY Tan, and Hock-Hai Teo. 2006. Senior citizens' acceptance of information systems: A study in the context of e-government services. Engineering Management, IEEE Transactions on 53, 4 (2006), 555–569.

      any bibliographic entry relating to older adults

    7. Bjorn Niehaves and Ralf Plattfaut. 2014. Internet adoption by the elderly: employing IS technology acceptance theories for understanding the age-related digital divide. European Journal of Information Systems 23, 6 (2014), 708–726.

      any bibliographic entry relating to older adults

    8. Tracy L Mitzner, Wendy A Rogers, Arthur D Fisk, Walter R Boot, Neil Charness, Sara J Czaja, and Joseph Sharit. 2014. Predicting older adults' perceptions about a computer system designed for seniors. Universal Access in the Information Society (2014), 1–10.

      any bibliographic entry relating to older adults

    9. Chaiwoo Lee and Joseph F Coughlin. 2014. PERSPECTIVE: Older Adults' Adoption of Technology: An Integrated Approach to Identifying Determinants and Barriers. Journal of Product Innovation Management (2014).

      any bibliographic entry relating to older adults

    10. Nancy M Gell, Dori E Rosenberg, George Demiris, Andrea Z LaCroix, and Kushang V Patel. 2013. Patterns of technology use among older adults with and without disabilities. The Gerontologist (2013), gnt166.

      any bibliographic entry relating to older adults

    11. Helene Gelderblom, Tobie van Dyk, and Judy van Biljon. 2010. Mobile phone adoption: Do existing models adequately capture the actual usage of older adults?. In Proceedings of the 2010 annual research conference of the south african institute of computer scientists and information technologists. ACM, 67–74.

      any bibliographic entry relating to older adults

    12. Anna Dickinson, Alan F Newell, Michael J Smith, and Robin L Hill. 2005. Introducing the Internet to the over-60s: Developing an email system for older novice computer users. Interacting with Computers 17, 6 (2005), 621–642.

      any bibliographic entry relating to older adults

    13. Luca Buccoliero and Elena Bellio. 2014. The adoption of silver e-Health technologies: first hints on technology acceptance factors for elderly in Italy. In Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance. ACM, 304–307.

      any bibliographic entry relating to older adults

    14. Today's generations of older adults have not grown up with information and communications technologies that are widely available these days. Thus, there is "a natural confound of age and experience, since today's older adults are exposed to these technologies at a different point in their lives than today's young adults." [17]

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    15. Incorporating these human factors and practical design suggestions for older adults, Fisk et al. proposed key recommendations for designing mobile devices for this age group [12].

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    16. Studies have shown that typical interaction components and techniques of a smartphone often prevent older adults from smooth and instant interactions with it. For example, the small size and the low contrast of buttons on a mobile display has a significant negative influence on interaction performance such as speed and accuracy [18], and decline in motor skills is correlated with time required to complete a task [30].

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    17. Lee and Coughlin reviewed studies of older adults' technology acceptance and identified ten factors that are critical facilitators or determinants of older adults' acceptance of technology: value, usability, affordability, accessibility, technical support, social support, emotion, independence, experience, and confidence [20].

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    18. most works point out that an individual's personal context [38] and the social context [36] in which the technology is introduced are the primary factors influencing the perception of, experience with, and evaluation of new technological developments among older adults [19].

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    19. One exception is the senior technology acceptance model (STAM) [28]. Using TAM, UTAUT, and several other works as theoretical underpinning, Renaud and Biljon proposed a model to explain older adults' mobile phone adoption.

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    20. Several studies have attempted to determine older adults' acceptance of technologies in general, and healthcare-related systems in particular, using the UTAUT framework. (e.g., email [14], a telehealth service [7]).

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    21. As a result, older adults and their adoption of new technologies have been a topic of active research since the advent of consumer technologies (e.g., automated teller machine [32], scanner-equipped grocery stores [41], electronic funds transfer [15]).

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    22. smartphone ownership among older adults has significantly risen in recent years [3]. However, its adoption levels among older adults in the US still sit at 27% as of 2015, whereas some 85% of Americans aged 18-29 are smartphone owners [31].

      citations about older adults; for example, the citation numbers being highlighted when the citation is in regards to older adults

    23. We inductively analyzed the first-round interview data using thematic analysis based on a grounded theory approach [33]. Grounded theory methods build theory iteratively from the data, using rigorous coding practices. Initial open codes are primarily descriptive. These may be combined into more sophisticated related sets of descriptors, in which each set is referred to as an axial code. Subsequently, axial codes are combined into more theoretically powerful code complexes, called selective codes. Our approach included a process of open coding, axial coding, and selective coding.

      sentences that use or mention grounded theory

    24. Triangulating the empirical findings from our preliminary results with the existing theoretical models, we proposed an extension of the existing theoretical models that explains the technology acceptance behavior of our participants who were aged 60 or over. Our proposed model incorporates key elements of prior models and introduces novel components that significantly influence the participants' technology acceptance, namely one new phase, intention to learn, and three factors, self-efficacy, conversion readiness and peer support.

      sentences about extending existing theoretical models with research findings

    25. Consolidating our preliminary findings with the existing models, we propose an extended technology acceptance model for older adults illustrated in Figure 3. Extending to the predecessor theories, our tentative model introduces the perceived effort of learning a new technology as an obstacle for older adults' technology acceptance, which has not been reported in any studies of younger adults' technology acceptance.

      sentences about extending existing theoretical models with research findings

    26. In particular, we identified an additional phase that is prominent among the participants, intention to learn, but did not appear in prior models. Then, we identified three new factors that significantly influence their technology acceptance but which are, again, not represented in the existing models: self-efficacy, conversion readiness, and peer support.

      sentences about extending existing theoretical models with research findings

    27. Triangulating the empirical findings from our preliminary results with the existing theoretical models, we proposed an extension of the existing theoretical models that explains the technology acceptance behavior of our participants who were aged 60 or over.

      sentences that implicitly or explicitly mention theory

    28. Consolidating our preliminary findings with the existing models, we propose an extended technology acceptance model for older adults illustrated in Figure 3. Extending to the predecessor theories, our tentative model introduces the perceived effort of learning a new technology as an obstacle for older adults' technology acceptance, which has not been reported in any studies of younger adults' technology acceptance.

      sentences that implicitly or explicitly mention theory

    29. Azjen's theory of planned behavior [1, 2] posits that a specific behavior is the result of an intention to carry it out, and that intention is determined by attitudes, norms, and the perception of control over the behavior. Drawing upon this theory of planned behavior, Davis et al. developed the technology acceptance model (TAM) [10].

      sentences that implicitly or explicitly mention theory

    30. Then, by triangulating our empirical findings with existing theoretical models from the literature, we found out that the existing models of technology adoption require new theory components to be able to describe technology adoption processes of our participants.

      sentences that implicitly or explicitly mention theory

    1. The beauty of the GP-TSM technique lies in its simplicity: at its core, all GP-TSM does is change the visual saliency of words by adjusting their opacity. This preserves the integrity of the original text and minimizes "ergonomic obtrusiveness" [100] while providing readers with a form of "contextual cuing" to arm them with "incidental knowledge about global context", which they can harness to better assign visual attention and memory when reading [40].

      sentences that implicitly or explicitly mention theory

    2. Furthermore, according to Stevens's power law, people perceive changes in gray scale not linearly, but rather by a factor of approximately 0.5 [71]. For instance, a threefold increase in opacity might only be perceived as 1.5 times more significant, further complicating the differentiation of levels.

      sentences that implicitly or explicitly mention theory

    3. This sequence resonates with efficient content absorption strategies highlighted in speed reading literature, where readers first capture the gist and then delve deeper [1, 63]. The interface, therefore, may inadvertently facilitate this structured, layered reading approach, which might explain the improvement in reading efficiency and comprehension.

      sentences that implicitly or explicitly mention theory

    4. We adopt the term "saliency" based on its definition (a "bottom-up, stimulus-driven perceptual quality which makes some items stand out from their neighbors") [42], and its use in augmented reality [85, 88], computer vision [17, 55], and cognitive science [37, 56].

      sentences that implicitly or explicitly mention theory

    5. Modulating text saliency is a widely studied aspect of textual information representation. This technique modifies the visual attributes of text to promote words of interest and guide readers' attention, making pertinent information more perceptible and thereby enhancing comprehension and the user experience [12, 42].

      sentences that implicitly or explicitly mention theory

    6. compressive summarization aims to select the shortest subsequence of words within a sentence that yields an informative and grammatical sentence [64]. This framework allows for a more concise representation of the original content while retaining the essence of its meaning.

      sentences that implicitly or explicitly mention theory

    7. Given the cognitive effort reading requires, readers frequently resort to skimming, which is a rapid, selective, and non-linear form of reading [2]. Eye tracking studies [30, 74] validate that such behavior is extremely common. However, multiple studies have suggested a significant trade-off between reading speed and comprehension [65, 66, 76, 87].

      sentences that implicitly or explicitly mention theory

    8. Automated text summarization techniques, including but not limited to crowd-powered systems [10], prompting large language models (LLMs) [105], and other AI technologies, can address a subset of these difficulties, i.e., the resulting text may be shorter, with simpler sentence structures and fewer unusual words [62]. However, unless there is information within the original document that is truly redundant, the result is a lossy representation of the original document, regardless of whether the process is abstractive or extractive.

      sentences that implicitly or explicitly mention theory

    9. Support skimming without interrupting flow. The system should improve skimming of text while minimizing the impact on the user's natural reading flow. In particular, as much as possible, it should avoid presenting users with salient text that is unparsable as a coherent thought, i.e., the system should present a complete sentence rather than a phrase or sentence fragment.

      sentences about intended user's goals

    10. Support reading at multiple levels of detail. The system should help users navigate the full complexity of a text, shifting focus seamlessly between different levels of semantic coverage, or granularity, from the big picture to the fine details.

      sentences about intended user's goals

    11. Integrate seamlessly into existing reading experiences. The system should complement and not interfere with the existing digital reading workflow that people are used to. It should provide all the functionalities in the same view, minimizing the overhead of mode and context switching.

      sentences about intended user's goals

    12. Remain faithful to the original text. The system should not automatically reword or add new words or phrases to the original text. It should preserve the original text, while rendering it in a way that aids reading, skimming, or information retrieval.

      sentences about intended user's goals

    13. We aspired to design a text rendering interface that alleviates some of the cognitive demands of reading, skimming, or performing information retrieval on natural language documents—particularly those with long, complicated sentences—without compromising the integrity of the original content.

      sentences about intended user's goals

    1. Established theories of human cognition describe how exposure to variation and consistency within prescribed structures can help people more robustly form mental models of a phenomenon, e.g., how an LLM behaves. Specifically, in line with Variation Theory [35], the features we instantiate identify patterns of consistency (Figure 1d, "Exact Matches"), variation (Figure 1c, "Unique Words"), or both (Figures 1a, 1b, "Positional Diction Clustering (PDC)"—a novel algorithm we introduce in this paper). In line with Analogical Learning Theory [13], PDC highlights analogous text across LLM responses, i.e., positionally consistent and similar in diction, such that users can see emergent relationships.

      sentences that implicitly or explicitly mention theory

    2. users may want to select the best option from among many, compose their own response through bricolage, consider many ideas during ideation, audit a model by looking at the variety of possible responses, or compare the functionality of different models or prompts.

      sentences about intended user's goals

    3. There are two hypothesized benefits of this view. One is based on an understanding of human perception: the grid layout should help users compare more LLM responses because the spatial arrangement assists their memory. The other benefit is based on Variation Theory, which posits that discerning the impact of a critical aspect, for example model temperature, is only possible when experiencing variation along that dimension, isolated from variation along other dimensions.

      sentences that implicitly or explicitly mention theory

    4. Given that the features implemented in this work are in line with design implications of Variation Theory and Analogical Learning Theory, the results suggest that there may be further utility of these theories for guiding the design of future systems that help users make sense of data and form mental models from examples.

      sentences that implicitly or explicitly mention theory

    5. Theories of human concept learning suggest that a key step in forming accurate, robust mental models of a phenomenon is to be able to discern the underlying dimensions of variation (Variation Theory) and any latent structures beneath superficial details (Analogical Learning Theory). By detecting and communicating which sentences are both structurally analogous (by virtue of their position within the response) and semantically related (by virtue of highly overlapping content), users should be able to more easily identify emergent structures, as well as compare and contrast particular compositions of structural elements across responses and syntactic elements that may vary in meaningful ways across analogous sentences within those responses. These theories assert that these subtasks are key ingredients in forming those robust accurate mental models, i.e., learning from the LLM responses in order to better perform their overarching task.

      sentences that implicitly or explicitly mention theory

    6. In this work, in line with Variation Theory, the existing and novel features instantiated and described in the next subsection collectively identify patterns of consistency, variation, or both; they are explicitly designed to make emergent dimensions of consistency and variation easier for the user to perceive.

      sentences that implicitly or explicitly mention theory

    7. Variation Theory describes how helping people perceive the different dimensions of consistency and variation across examples (here, LLM responses) of the object of learning helps them more quickly and robustly leap to more accurate mental models. Analogical Learning Theory describes how people can form mental models or schema from perceiving structural analogical relationships across superficially varying examples (again, here LLM responses).

      sentences that implicitly or explicitly mention theory

    8. we want to decorate text to show pre-computed relationships, such as string matches or analogous sentences, across responses. In this way, we help users shift cognitive bandwidth away from identifying overlapping or \

      sentences about intended user's goals

    9. We want to support a wide range of tasks that involve sensemaking. For example, we want to support the detection of similarities and differences between individual responses as well as groups of responses, and support the detection of

      sentences about intended user's goals

    1. As corporate IT departments have found themselves with long backlogs of requests, Excel users have discovered that they can produce the reports needed to run their businesses themselves using the macro language Visual Basic for Applications (VBA).

      Find macros

    2. VBA enables you to achieve tremendous efficiencies in your day-to-day use of Excel. VBA helps you figure out how to import data and produce reports in Excel so that you don't have to wait for the IT department to help you.

      Find macros

    1. Usability concerns how easily computer-based tools may be operated by users trying to accomplish a task. Usability differs from utility. Usability concerns whether users can use the product in a way that makes it possible to realize its utility; utility is about whether the goal is important to the user.

      Highlight tasks