nested model - sci.utah.edu

73
cs7960 | January 15 2013 NESTED MODEL Miriah Meyer slide acknowledgements: Tamara Munzner, UBC Mike Gleicher, U of Wisconsin

Upload: others

Post on 07-Nov-2021

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NESTED MODEL - sci.utah.edu

cs7960 | January 15 2013

NESTED MODELMiriah Meyer

slide acknowledgements: Tamara Munzner, UBCMike Gleicher, U of Wisconsin

Page 2: NESTED MODEL - sci.utah.edu

ADMINISTRIVIA...

2

Page 3: NESTED MODEL - sci.utah.edu

3

- Thursday paper presentations: sign up!

- design study papers for the next 3 classes...

- Ben Fry round-table

Page 4: NESTED MODEL - sci.utah.edu

LAST TIME

4

Page 5: NESTED MODEL - sci.utah.edu

design study - a project

- analyze a real-world problem

- design a visualization system

- validate the design

- reflect about lessons learned

Design Study Methodology: Reflections for the Trenches and the Stacks.

M. Sedlmair, M. Meyer, T. Munzner, IEEE TVCG (Proceedings of InfoVis 2012).

Page 6: NESTED MODEL - sci.utah.edu

6

10 properties of a wicked problem

Page 7: NESTED MODEL - sci.utah.edu

7You have to be at least this far in order to start designing a visualization solution.

Now

it’s so well-defined that w

e can write

an algorithm to solve the problem

.

Page 8: NESTED MODEL - sci.utah.edu

MizBee A Multiscale Synteny Browser

Miriah MeyerTamara Munzner

Hanspeter Pfister12

1

1Harvard UniversityUniversity of British Columbia2

chrI

chrII

chrIII

chrIV

chrIX

chrV

chrVI

chrVII

chrVIII

chrX

chrXIchrXII

chrXIII

chrXIV

chrXIX

chrXV

chrXVI

chrXVII

chrXVIII

chrXX

chrXXI

chrUn

chrI

chr1

chr2

chr3

chr4

chr5

chr6

chr7

chr8chr9

chr10

chr11

chr12

chr13

chr14

chr15

chr16

chr17

chr18

chr19chr20chr21

saturationline

- +

10Mb

chrI

go to:

chrI chr10

7,522,019 10,194,592

7,552,761 10,162,878

orientation:match

inversion

invert

out i n

Page 9: NESTED MODEL - sci.utah.edu

9

- nested model for design

- extension of blocks and guidelines

- application to recent InfoVis paper

Page 10: NESTED MODEL - sci.utah.edu

10

BUT FIRST...

Page 11: NESTED MODEL - sci.utah.edu

11

design models vs process modelsdomain problem characterization

data/task abstraction design

encoding/interaction technique design

algorithm design

design model: describes levels of design inherent to, and should be considered in, the creation of a tool

nested model

Page 12: NESTED MODEL - sci.utah.edu

12

design models vs process modelsdomain problem characterization

data/task abstraction design

encoding/interaction technique design

algorithm design

PRECONDITIONpersonal validation

COREinward-facing validation

ANALYSISoutward-facing validation

learn implementwinnow cast discover design deploy reflect write

design model: describes levels of design inherent to, and should be considered in, the creation of a tool

process model: gives practical advice in how to design and develop a tool

nested model

9-stage framework

Page 13: NESTED MODEL - sci.utah.edu

A Nested Model for Visualization Design and Validation

Tamara MunznerUniversity of British ColumbiaDepartment of Computer Science

Page 14: NESTED MODEL - sci.utah.edu

How do you show your system is good?

• so many possible ways! • algorithm complexity analysis• field study with target user population• implementation performance (speed, memory)• informal usability study• laboratory user study• qualitative discussion of result pictures• quantitative metrics• requirements justification from task analysis• user anecdotes (insights found)• user community size (adoption)• visual encoding justification from theoretical principles

Page 15: NESTED MODEL - sci.utah.edu

15

Contribution

• nested model unifying design and validation

• guidance on when to use what validation method

• different threats to validity at each level of model

• recommendations based on model

Page 16: NESTED MODEL - sci.utah.edu

16

Four kinds of threats to validity

Page 17: NESTED MODEL - sci.utah.edu

17

Four kinds of threats to validity

domain problem characterization

• wrong problem• they don’t do that

Page 18: NESTED MODEL - sci.utah.edu

18

Four kinds of threats to validity

domain problem characterization data/operation abstraction design

• wrong problem• they don’t do that

• wrong abstraction• you’re showing them the wrong thing

Page 19: NESTED MODEL - sci.utah.edu

19

Four kinds of threats to validity

domain problem characterization data/operation abstraction design encoding/interaction technique design

• wrong problem• they don’t do that

• wrong abstraction• you’re showing them the wrong thing

• wrong encoding/interaction technique• the way you show it doesn’t work

Page 20: NESTED MODEL - sci.utah.edu

20

Four kinds of threats to validity

domain problem characterization data/operation abstraction design encoding/interaction technique design algorithm design

• wrong problem• they don’t do that

• wrong abstraction• you’re showing them the wrong thing

• wrong encoding/interaction technique• the way you show it doesn’t work

• wrong algorithm• your code is too slow

Page 21: NESTED MODEL - sci.utah.edu

21

threat: wrong problem threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm

• each validation works for only one kind of threat to validity

Match validation method to contributions

Page 22: NESTED MODEL - sci.utah.edu

22

Analysis examples

justify encoding/interaction design

qualitative result image analysistest on target users, get utility anecdotes

justify encoding/interaction design

measure system time/memory qualitative result image analysis

computational complexity analysis

qualitative/quantitative image analysis

lab study, measure time/errors for operation

Interactive visualization of genealogical graphs. McGuffin and Balakrishnan. InfoVis 2005.

MatrixExplorer. Henry and Fekete. InfoVis 2006.

An energy model for visual graph clustering. (LinLog)Noack. Graph Drawing 2003

Flow map layout. Phan et al. InfoVis 2005.

LiveRAC. McLachlan, Munzner, Koutsofios, and North. CHI 2008.

Effectiveness of animation in trend visualization.Robertson et al. InfoVis 2008.

measure system time/memory qualitative result image analysis

observe and interview target users

justify encoding/interaction design

qualitative result image analysis

observe and interview target users

justify encoding/interaction design

field study, document deployed usage

Page 23: NESTED MODEL - sci.utah.edu

23

Nested levels in model

domain problem characterization data/operation abstraction design encoding/interaction technique design algorithm design

• output of upstream levelinput to downstream level

• challenge: upstream errors inevitably cascade• if poor abstraction choice made, even perfect technique

and algorithm design will not solve intended problem

Page 24: NESTED MODEL - sci.utah.edu

24

Characterizing domain problems

• tasks, data, workflow of target users• problems: tasks described in domain terms• requirements elicitation is notoriously hard

problem data/op abstraction enc/interact technique algorithm

Page 25: NESTED MODEL - sci.utah.edu

25

Designing data/operation abstraction

• mapping from domain vocabulary/concerns to abstraction• may require transformation!

• data types: data described in abstract terms• numeric tables, relational/network, spatial, ...

• operations: tasks described in abstract terms• generic

• sorting, filtering, correlating, finding trends/outliers... • datatype-specific

• path following through network...

problem data/op abstraction enc/interact technique algorithm

Page 26: NESTED MODEL - sci.utah.edu

26

Designing encoding,interaction techniques

• visual encoding• marks, attributes, ...• extensive foundational work exists

• interaction• selecting, navigating, ordering, ...• significant guidance exists

Semiology of Graphics. Jacques Bertin, Gauthier-Villars 1967, EHESS 1998

problem data/op abstraction enc/interact technique algorithm

Page 27: NESTED MODEL - sci.utah.edu

27

Designing algorithms

• well-studied computer science problem• create efficient algorithm given clear specification• no human-in-loop questions

problem data/op abstraction enc/interact technique algorithm

Page 28: NESTED MODEL - sci.utah.edu

28

Immediate vs. downstream validation

threat: wrong problem threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system

Page 29: NESTED MODEL - sci.utah.edu

29

Domain problem validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system

• immediate: ethnographic interviews/observations

Page 30: NESTED MODEL - sci.utah.edu

30

Domain problem validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system validate: observe adoption rates

• downstream: adoption (weak but interesting signal)

Page 31: NESTED MODEL - sci.utah.edu

31

Abstraction validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique threat: slow algorithm implement system validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

• downstream: can only test with target users doing real work

Page 32: NESTED MODEL - sci.utah.edu

32

Encoding/interaction technique validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

• immediate: justification useful, but not sufficient - tradeoffs

Page 33: NESTED MODEL - sci.utah.edu

33

Encoding/interaction technique validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: qualitative/quantitative result image analysis validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

• downstream: discussion of result images very common

Page 34: NESTED MODEL - sci.utah.edu

34

Encoding/interaction technique validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: qualitative/quantitative result image analysis validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

• downstream: studies add another level of rigor (and time)

Page 35: NESTED MODEL - sci.utah.edu

35

Encoding/interaction technique validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm implement system validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

• usability testing necessary for validity of downstream testing• not validation method itself!

Page 36: NESTED MODEL - sci.utah.edu

36

Algorithm validation

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

• immediate vs. downstream here clearly understood in CS

Page 37: NESTED MODEL - sci.utah.edu

37

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

Avoid mismatches• can’t validate encoding with wallclock timings

Page 38: NESTED MODEL - sci.utah.edu

38

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

Avoid mismatches• can’t validate abstraction with lab study

Page 39: NESTED MODEL - sci.utah.edu

39

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

Single paper would include only subset• can’t do all for same project

• not enough space in paper or time to do work

Page 40: NESTED MODEL - sci.utah.edu

40

threat: wrong problem validate: observe and interview target users threat: bad data/operation abstraction threat: ineffective encoding/interaction technique validate: justify encoding/interaction design threat: slow algorithm validate: analyze computational complexity implement system validate: measure system time/memory validate: qualitative/quantitative result image analysis [test on any users, informal usability study] validate: lab study, measure human time/errors for operation validate: test on target users, collect anecdotal evidence of utility validate: field study, document human usage of deployed system validate: observe adoption rates

Single paper would include only subset• pick validation method according to contribution claims

Page 41: NESTED MODEL - sci.utah.edu

41

Real design process

• iterative refinement• levels don’t need to be done in strict order• intellectual value of level separation

• exposition, analysis

• shortcut across inner levels + implementation• rapid prototyping, etc.

• low-fidelity stand-ins so downstream validation can happen sooner

Page 42: NESTED MODEL - sci.utah.edu

42

Related work

• influenced by many previous pipelines• but none were tied to validation

• [Card, Mackinlay, Shneiderman 99], ...

• many previous papers on how to evaluate• but not when to use what validation methods

• [Carpendale 08], [Plaisant 04], [Tory and Möller 04]

• exceptions• good first step, but no formal framework

[Kosara, Healey, Interrante, Laidlaw, Ware 03]• guidance for long term case studies, but not other contexts

[Shneiderman and Plaisant 06]• only three levels, does not include algorithm

[Ellis and Dix 06], [Andrews 08]

Page 43: NESTED MODEL - sci.utah.edu

43

Recommendations: authors

• explicitly state level of contribution claim(s)

• explicitly state assumptions for levels upstream of paper focus• just one sentence + citation may suffice

• goal: literature with clearer interlock between papers• better unify problem-driven and technique-driven work

Page 44: NESTED MODEL - sci.utah.edu

44

Recommendation: publication venues

• we need more problem characterization• ethnography, requirements analysis

• as part of paper, and as full paper• now full papers relegated to CHI/CSCW

• does not allow focus on central vis concerns

• legitimize ethnographic “orange-box” papers!

observe and interview target users

Page 45: NESTED MODEL - sci.utah.edu

45

Lab study as core now deemed legitimate

justify encoding/interaction design

qualitative result image analysistest on target users, get utility anecdotes

justify encoding/interaction design

measure system time/memory qualitative result image analysis

computational complexity analysis

qualitative/quantitative image analysis

lab study, measure time/errors for operation

Interactive visualization of genealogical graphs. McGuffin and Balakrishnan. InfoVis 2005.

MatrixExplorer. Henry and Fekete. InfoVis 2006.

An energy model for visual graph clustering. (LinLog)Noack. Graph Drawing 2003

Flow map layout. Phan et al. InfoVis 2005.

LiveRAC. McLachlan, Munzner, Koutsofios, and North. CHI 2008.

Effectiveness of animation in trend visualization.Robertson et al. InfoVis 2008.

measure system time/memory qualitative result image analysis

observe and interview target users

justify encoding/interaction design

qualitative result image analysis

observe and interview target users

justify encoding/interaction design

field study, document deployed usage

Page 46: NESTED MODEL - sci.utah.edu

46

Limitations

• oversimplification

• not all forms of user studies addressed

• infovis-oriented worldview

• are these levels the right division?

Page 47: NESTED MODEL - sci.utah.edu

47

Conclusion

• new model unifying design and validation• guidance on when to use what validation method• broad scope of validation, including algorithms

• recommendations• be explicit about levels addressed and state

upstream assumptions so papers interlock more• we need more problem characterization work

these slides posted at http://www.cs.ubc.ca/~tmm/talks.html#iv09

Page 48: NESTED MODEL - sci.utah.edu

48

Mike GleicherBELIV’12

Page 49: NESTED MODEL - sci.utah.edu

49

Page 50: NESTED MODEL - sci.utah.edu

50

Page 51: NESTED MODEL - sci.utah.edu

51

Page 52: NESTED MODEL - sci.utah.edu

52

Page 53: NESTED MODEL - sci.utah.edu

53

Page 54: NESTED MODEL - sci.utah.edu

54

Page 55: NESTED MODEL - sci.utah.edu

55

Page 56: NESTED MODEL - sci.utah.edu

56

Page 57: NESTED MODEL - sci.utah.edu

57

Page 58: NESTED MODEL - sci.utah.edu

58

Page 59: NESTED MODEL - sci.utah.edu

The Four-Level Nested Model Revisited: Blocks and Guidelines

59

Miriah Meyer, Michael Selmair, Tamara MunznerBELIV’12

Page 60: NESTED MODEL - sci.utah.edu

learn implementwinnow cast discover design deploy reflect write

Design Study Methodology: Reflections for the Trenches and the Stacks.

M. Sedlmair, M. Meyer, T. Munzner, IEEE TVCG (Proceedings of InfoVis 2012).

Page 61: NESTED MODEL - sci.utah.edu

learn implementwinnow cast discover design deploy reflect write

Design Study Methodology: Reflections for the Trenches and the Stacks.

M. Sedlmair, M. Meyer, T. Munzner, IEEE TVCG (Proceedings of InfoVis 2012).

confirm | refine | reject | proposeguidelines

Page 62: NESTED MODEL - sci.utah.edu

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

Page 63: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

blocks

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

outcome of a design decision

Page 64: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

blocks

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

directed graph

outcome of a design decision

node-link diagram

force-directed layout

Page 65: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

blocks

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

outcome of a design decision

Page 66: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

blocksguidelines

statement about relationship between blocks

Page 67: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

blocksguidelines

good for categorical data

hue colormap appropriate

categorical data

hue colormap

Page 68: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

blocksguidelines

Nocaj 2012 Balzer 2005

faster Voronoi treemap

Page 69: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

domain problem characterization data/task abstraction design

encoding/interaction technique designalgorithm design

Munzner 2009

NESTED MODEL

blocksguidelinesbetween-level guideline

within-level guideline

Page 70: NESTED MODEL - sci.utah.edu

dom

ain

prob

lem

ab

stra

ctio

nte

chni

que

algo

rithm

EXTENSION

blocksguidelines

implications-mapping problems to abstractions-mapping algorithms to techniques-reporting algorithm comparisons

between-level guideline

within-level guideline

Page 71: NESTED MODEL - sci.utah.edu
Page 72: NESTED MODEL - sci.utah.edu

L4: Design Model

REQUIRED READING

71

Page 73: NESTED MODEL - sci.utah.edu

72

choose your own adventure