User Modelling for Avoiding Overfitting in Interactive Knowledge Elicitation for Prediction

October 13, 2017 ยท Entered Twilight ยท ๐Ÿ› International Conference on Intelligent User Interfaces

๐ŸŒ… TWILIGHT: Old Age
Predates the code-sharing era โ€” a pioneer of its time

"Last commit was 7.0 years ago (โ‰ฅ5 year threshold)"

Evidence collected by the PWNC Scanner

Repo contents: Data-Exp1, LICENSE.md, README.md, Slides-IUI2018.pdf, calculate_posterior.m, evaluate.m, linreg_sns_ep.m, main.m, word_analysis.m

Authors Pedram Daee, Tomi Peltola, Aki Vehtari, Samuel Kaski arXiv ID 1710.04881 Category cs.HC: Human-Computer Interaction Cross-listed cs.LG, stat.ML Citations 20 Venue International Conference on Intelligent User Interfaces Repository https://github.com/HIIT/human-overfitting-in-IML โญ 6 Last Checked 1 month ago
Abstract
In human-in-the-loop machine learning, the user provides information beyond that in the training data. Many algorithms and user interfaces have been designed to optimize and facilitate this human--machine interaction; however, fewer studies have addressed the potential defects the designs can cause. Effective interaction often requires exposing the user to the training data or its statistics. The design of the system is then critical, as this can lead to double use of data and overfitting, if the user reinforces noisy patterns in the data. We propose a user modelling methodology, by assuming simple rational behaviour, to correct the problem. We show, in a user study with 48 participants, that the method improves predictive performance in a sparse linear regression sentiment analysis task, where graded user knowledge on feature relevance is elicited. We believe that the key idea of inferring user knowledge with probabilistic user models has general applicability in guarding against overfitting and improving interactive machine learning.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Human-Computer Interaction