As a result of Poock's influential work in the early 1980s , command and control is generally believed to be one specific application where speech input holds great advantages over keyed data entry . However , a recent paper (Damper & Wood , 1995 ''Speech versus keying in command and control applica
Speech versus keying in command and control applications
β Scribed by R.I. Damper; S.D. Wood
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 673 KB
- Volume
- 42
- Category
- Article
- ISSN
- 1071-5819
No coin nor oath required. For personal study only.
β¦ Synopsis
Experimental comparisons of speech and competitor input media such as keying have, taken overall, produced equivocal results: this has usually been attributed to "task-specific variables". Thus, it seems that there are some good, and some less good, situations for utilization of speech input. One application generally thought to be a success is small-vocabulary, isolated-word recognition for command and control. In a simulated command and control task, Poock purportedly showed a very significant superiority of speech over keying in terms of higher input speeds and lower error rates. This paper argues that the apparent superiority observed results from a methodological error-specifically that the verbose commands chosen suit the requirements of speech input but make little or no concession to the requirements of keying. We describe experiments modelled on those of Poock, but designed to overcome this putative flaw and to effect a fair comparison of the input media by using terse, abbreviated commands for the keying condition at least. Results of these new experiments reveal that speech input is (10.6 %) slower (although this difference is not statistically significant) and (360.4 %) more error-prone than keying, supporting our hypothesis that the methodology of the earlier work was flawed. However, simple extrapolation of our data for terse commands to the situation where keyed commands are entered in full suggests that other differences between our work and Poock's could play a part. Overall, we conclude that a fair comparison of input media requires an experimental design that explicitly attempts to minimize the so-called transaction cycle-the number of user actions necessary to elicit a system response-for each medium.
π SIMILAR VOLUMES
Performance measures and satisfaction ratings were obtained from skilled typists and from non-typists using two different designs of editor, one requiring more commands but simpler ("short transactions"), the other needing fewer commands but more complex ("long transactions"). Each subject used the
The division of labour, in its turn, implies interaction; for it consists not in the sheer di!erence of one man's kind of work from that another, but in the fact that the di!erent tasks and accomplishments are parts of a whole to whose product all, in some degree, contribute. And wholes, in the huma
This paper investigates the autonomous decision-making process of threat detection, classiΓcation, and the selection of alternative countermeasures against threats in electronic warfare settings. We introduce a threat model that represents a speciΓc threat pattern and also present a methodology that