throbber
IPR No.: IPR2016-00500
`Patent No. 7,864,163
`
`EXHIBIT 1006
`
`

`
`236
`
`Chapter 6 Direct Manipulation and Virtual Environments
`
`acquire the concept of conservation or invariance. At about age 11, children enter
`the formal-operations stage, in which they use symbol manipulation to represent
`actions on objects. Since mathematics and programming
`require abstract
`thinking , they are difficult for children , and designers must link symbolic repre(cid:173)
`sentations to actual objects. Direct manipulation brings activity to the concrete(cid:173)
`operational stage, thus making certain tasks easier for children and adults.
`
`6 - 3 - 3 Visual thinking and icons
`The concepts of a visual language and of visual thinking were promoted by Arn(cid:173)
`heim (1972) and were embraced by commercial graphic designers (Verplank,
`1988; Mullet and Sano, 1995), semiotically oriented academics (semiotics is the
`study of signs and symbols), and data-visualization gurus. The computer pro(cid:173)
`vides a remarkable visual environment for revealing structure, showing rela (cid:173)
`tionships, and enabling interactivity
`that attracts users who have artistic,
`right -brained, holistic, intuitive personalities . The increasingly visual nature of
`computer interfaces can sometimes challenge or even threaten the logical, linear,
`text-oriented , left-brained, compulsive, rational programmers who were the
`heart of the first generation of hackers. Although these stereotypes-or
`carica(cid:173)
`tures-will
`not stand up to scientific analysis, they do convey the dual paths
`that computing is following. The new visual directions are sometimes scorned
`by the traditionalists as WIMP (windows, icons, mouse, and pull-down menu)
`interfaces , whereas the command-line devotees are seen by visual system pro(cid:173)
`ponents as stubborn and inflexible .
`There is evidence that different people have different cognitive styles, and it
`is quite understandable
`that individual preferences may vary. Just as there are
`multiple ice-cream flavors or car models, so too there will be multiple interface
`styles. It may be that preferences will vary by user and by tasks, so respect is due
`to each community, and the designer's goal is to provide the best of each style
`and the means to cross over when desired.
`The conflict between text and graphics becomes most heated when the issue
`of icons is raised. Dictionary definitions of icon usually refer to religious images,
`but the central notion in computing is that an icon is an image, picture, or sym(cid:173)
`bol representing a concept (Rogers, 1989; Marcus, 1992). In the computer world,
`icons are usuall y small (less than 1-inch-square or 64- by 64-pixel) representa(cid:173)
`tions of an object or action. Smaller icons are often used to save space or to be
`integrated within other objects, such as a window border or toolbar. It is not sur(cid:173)
`prising that icons are often used in painting programs to represent tools or
`actions (for example, lasso or scissors to cut out an image, brush for painting,
`pencil for drawing , eraser to wipe clean), whereas word processors usually have
`textual menus for their actions . This difference appears to reflect the differing
`cognitive styles of visually and textually oriented users , or at least differences in
`
`Exhibit 1006 - Page 1 of 5
`
`

`
`6.3 Discussion of Direct Manipulation
`
`237
`
`the tasks. Maybe while users are working on visually oriented tasks, it is helpful
`to "stay visual" by using icons, whereas while working on a text document, it is
`helpful to "stay textual" by using textual menus.
`for
`For situations where both a visual icon or a textual item are possible -
`example, in a directory listing - designers face two interwoven issues: how to
`decide between icons and text, and how to design icons. The well-established
`highway signs are a useful source of experience. Icons are unbeatable for show(cid:173)
`ing ideas such as a road curve, but sometimes a phrase such as ONE WAY!-DO
`NOT ENTER is more comprehensible than an icon. Of course, the smorgasbord
`approach is to have a little of each (as with, for example, the octagonal STOP
`sign), and there is evidence that icons plus words are effective in computing sit(cid:173)
`uations (Norman, 1991). So the answer to the first question (deciding between
`icons and text) depends not only on the users and the tasks, but also on the qual(cid:173)
`ity of the icons or the words that are proposed. Textual menu choices are cov(cid:173)
`ered in Chapter 7; many of the principles carry over to icon use. In addition,
`these icon-specific guidelines should be considered:
`
`• Represent the object or action in a familiar and recognizable manner.
`• Limit the number of different icons.
`• Make the icon stand out from its background.
`• Carefully consider three-dimensional
`icons; they are eye-catching but also
`can be distracting.
`• Ensure that a single selected icon is clearly visible when surrounded by unse-
`lected icons.
`• Make each icon distinctive from every other icon.
`• Ensure the harmoniousness of each icon as a member of a family of icons.
`• Design the movement animation: when dragging an icon, the user might
`move the whole icon, just a frame, possibly a grayed-out or transparent ver(cid:173)
`sion, or a black box.
`• Add detailed information, such as shading to show the size of a file (larger
`shadow indicates larger file), thickness to show the breadth of a directory
`folder (thicker means more files inside), color to show the age of a document
`(older might be yellower or grayer), or animation to show how much of a
`document has been printed (document folder absorbed progressively into the
`printer icon).
`• Explore the use of combinations of icons to create new objects or actions-for
`example, dragging a document icon to a folder, trash can, outbox, or printer
`icon has great utility. Can a document be appended or prepended
`to another
`document by pasting of adjacent icons? Can a user set security levels by drag(cid:173)
`ging a document or folder to a guard dog, police car, or vault icon? Can two
`database icons be intersected by overlapping of the icons?
`
`Exhibit 1006 - Page 2 of 5
`
`

`
`238
`
`Chapter 6 Direct Manipulation and Virtual Environments
`
`Marcus (1992) applies semiotics as a guide to four levels of icon design:
`1. Lexical qualities. Machine-generated marks-pixel
`blinking
`2. Syntactics. Appearance and movement-lines,
`shape
`3. Semantics. Objects represented-concrete
`versus abstract, part versus whole
`4. Pragmatics. Overall legibility, utility, identifiability, memorability, pleasingness
`
`patterns, modular parts, size,
`
`shape, color, brightness,
`
`He recommends starting by creating quick sketches, pushing for consistent
`style, designing a layout grid, simplifying appearance , and evaluating
`the
`designs by testing with users. We might also consider a fifth level of icon design:
`5. Dynamics. Receptivity to clicks- highlighting, dragging, combining
`The dynamics of icons might include a rich set of gestures with a mouse, touch(cid:173)
`screen, or pen. The gestures might indicate copy (up and down arrows), delete (a
`cross), edit (a circle), and so on. Icons might also have associated sounds. For exam(cid:173)
`ple, if each document icon had a tone associated with it (the lower the tone, the big(cid:173)
`ger the document), when a directory was opened, each tone might be played
`simultaneously or sequentially. Users might get used to the symphony played by
`each directory and be able to detect certain features or anomalies, just as we often
`know telephone numbers by tune and can detect misdialings as discordant tones.
`Icon design becomes more interesting as computer hardware improves and
`as designers become more creative . Animated icons that demonstrate their func(cid:173)
`tions improve online help capabilities (see Section 13.4.2). Beyond simple icons,
`we are now seeing increasing numbers of visual programming
`languages (see
`Section 5.3) and specialized
`languages
`for mechanical engineering, circuit
`design, and database query.
`
`6 - 3- 4 Direct-manipulation programming
`Performing tasks by direct manipulation is not the only goal. It should be possi(cid:173)
`ble to do programming by direct manipulation as well, at least for certain prob(cid:173)
`lems. As mentioned earlier, people often program car-painting
`robots by
`moving the robot arm through a sequence of steps that are later replayed, possi(cid:173)
`bly at higher speed . This example seems to be a good candidate for generaliza(cid:173)
`tion. How about moving a drill press or a surgical tool through a complex series
`of motions that are then repeated exactly? In fact, these direct-manipulation pro(cid:173)
`gramming ideas are already being implemented in modest ways with automo(cid:173)
`bile radios that users preset by tuning to their desired station and then pressing
`and holding a button. Later, when the button is pressed, the radio tunes to the
`preset frequency . Likewise , some professional television -camera supports allow
`the operator to program a sequence of pans or zooms and then to replay it
`smoothl y when required.
`
`Exhibit 1006 - Page 3 of 5
`
`

`
`6.3 Discussion of Direct Manipulation
`
`239
`
`Programming of physical devices by direct manipulation seems quite nat(cid:173)
`ural, and an adequate visual representation of information may make direct(cid:173)
`manipulation programming possible in other domains. Several word processors
`allow users to create macros by simply performing a sequence of commands
`and storing it for later use-for
`example, emacs allows its rich set of functions,
`including regular-expression searching, to be recorded into macros. Spreadsheet
`packages, such as Lotus 1-2-3 and Excel, have rich programming
`languages and
`allow users to create portions of programs by carrying out standard spreadsheet
`actions. The result of the actions is stored in another part of the spreadsheet and
`can be edited, printed, and stored in a textual form. Similarly, Adobe PhotoShop
`records a history of user actions and then allows users to create programs with
`action sequences and repetition using direct manipulation.
`It would be helpful if the computer could recognize repeated patterns reliably
`and create useful macros automatically, while the user was engaged in perform(cid:173)
`ing a repetitive interface task. Then, with the user's confirmation, the computer
`could take over and carry out the remainder of the task automatically (Lieber(cid:173)
`man, 2001). This hope for automatic programming
`is appealing, but a more
`effective approach may be to give users the visual tools to specify and record
`their
`intentions. Rule-based programming with graphical conditions and
`actions offers a fresh alternative that may be appealing to children and adults
`(Smith, Cypher, and Spohrer, 1994). The screen is portrayed as a set of tiles, and
`users specify graphical rewrite rules by showing before-and-after
`tile examples
`(Fig. 6.11). Another innovative environment initially conceived of for children is
`ToonTalk (Kahn, 1999), which offers animated cartoon characters who carry out
`actions in buildings using a variety of fanciful tools.
`To create a reliable tool that works in many situations without unpredictable
`automatic programming, designers must meet the five challenges of program(cid:173)
`ming in the user interface (PITUI) (Potter, 1993):
`
`1. Sufficient computational generality (conditionals, iteration)
`2. Access to the appropriate data structures (file structures for directories,
`structural representations of graphical objects) and operators (selectors,
`booleans, specialized operators of applications)
`3. Ease in programming (by specification, by example, or by demonstration,
`with modularity, argument passing, and so on) and in editing programs
`4. Simplicity in invocation and assignment of arguments (direct manipulation,
`simple library strategies with meaningful names or icons, in-context execu(cid:173)
`tion, and availability of results)
`5. Low risk (high probability of bug-free programs, halt and resume facilities
`to permit partial executions, undo actions to enable repair of unanticipated
`damage)
`
`The goal of PITUI is to allow users easily and reliably to repeat automatically the
`actions that they can perform manually
`in the user interface. Rather than
`
`Exhibit 1006 - Page 4 of 5
`
`

`
`DESIGNING THE USER INTERFACE
`
`Ben Shneiderman
`
`Catherine Plaisant
`
`.,.,
`0 c
`::0
`-i :::c
`m
`
`CJ --i -0
`
`2
`en
`-i
`::0
`l>
`-I
`m
`Ci)
`m
`
`Cl) .,.,
`0
`::0
`m .,.,
`...,.,
`m
`C"1
`-i
`
`I
`C"1
`
`< m
`::::c
`c s:
`l> z
`0 s: -c
`c
`-i m
`:0
`z
`-i m
`::0
`)>
`("")
`-I
`0 z
`
`Exhibit 1006 - Page 5 of 5

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket