M. Hoogendoorn, S. W. Jaffry, P. V. Maanen, Jan Treur
When considering intelligent agents that interact with humans, having an idea of the trust levels of the human, for example in other agents or services, can be of great importance. Most models of human trust that exist, are based on some rationality assumption, and biased behavior is not represented, whereas a vast literature in Cognitive and Social Sciences indicates that humans often exhibit non-rational, biased behavior with respect to trust. This paper reports how some variations of biased human trust models have been designed, analyzed and validated against empirical data. The results show that such biased trust models are able to predict human trust significantly better.
{"title":"Modeling and Validation of Biased Human Trust","authors":"M. Hoogendoorn, S. W. Jaffry, P. V. Maanen, Jan Treur","doi":"10.1109/WI-IAT.2011.198","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.198","url":null,"abstract":"When considering intelligent agents that interact with humans, having an idea of the trust levels of the human, for example in other agents or services, can be of great importance. Most models of human trust that exist, are based on some rationality assumption, and biased behavior is not represented, whereas a vast literature in Cognitive and Social Sciences indicates that humans often exhibit non-rational, biased behavior with respect to trust. This paper reports how some variations of biased human trust models have been designed, analyzed and validated against empirical data. The results show that such biased trust models are able to predict human trust significantly better.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133789868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Björn-Oliver Hartmann, Klemens Böhm, Christian Hütter
Social search platforms like Aardvark or Yahoo Answers have attracted a lot of attention lately. In principle, participants have two strategic dimensions in social search systems: (1) Interaction selection, i.e., forwarding/processing incoming requests (or not), and (2) contact selection, i.e., adding or dropping contacts. In systems with these strategic dimensions, it is unclear whether nodes cooperate, and if they form efficient network structures. To shed light on this fundamental question, we have conducted a study to investigate human behavior in interaction selection and to investigate the ability of humans to form efficient networks. In order to limit the degree of problem understanding necessary by the study participants, we have introduced the problem as an online game. 193 subjects joined the study that was online for 67 days. One result is that subjects choose contacts strategically and that they use strategies that lead to cooperative and almost efficient systems. Surprisingly, subjects tend to overestimate the value of cooperative contacts and keep cooperative but costly contacts. This observation is important: Assisting agents that help subjects to avoid this behavior might yield more efficiency.
{"title":"Strategic Behavior in Interaction Selection and Contact Selection","authors":"Björn-Oliver Hartmann, Klemens Böhm, Christian Hütter","doi":"10.1109/WI-IAT.2011.23","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.23","url":null,"abstract":"Social search platforms like Aardvark or Yahoo Answers have attracted a lot of attention lately. In principle, participants have two strategic dimensions in social search systems: (1) Interaction selection, i.e., forwarding/processing incoming requests (or not), and (2) contact selection, i.e., adding or dropping contacts. In systems with these strategic dimensions, it is unclear whether nodes cooperate, and if they form efficient network structures. To shed light on this fundamental question, we have conducted a study to investigate human behavior in interaction selection and to investigate the ability of humans to form efficient networks. In order to limit the degree of problem understanding necessary by the study participants, we have introduced the problem as an online game. 193 subjects joined the study that was online for 67 days. One result is that subjects choose contacts strategically and that they use strategies that lead to cooperative and almost efficient systems. Surprisingly, subjects tend to overestimate the value of cooperative contacts and keep cooperative but costly contacts. This observation is important: Assisting agents that help subjects to avoid this behavior might yield more efficiency.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134100145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Róbert Móro, Ivan Srba, Maros Uncík, M. Bieliková, Marián Simko
In recent years we have witnessed expansion of Web 2.0. Its main feature is allowing users' collaboration in content creation using various means, e.g. annotations, discussions, wikis, blogs or tags. This approach has influenced also web-based learning, for which the term "Learning 2.0" has been introduced. In this paper we explore using tags in such systems. Tags can be used for improving of searching, categorization of web-documents, creating folksonomies and ontologies or enhancing the user-model. Another aspect of tags is that they act as a bridge between resources and users to create a social network. We integrated tags in a learning framework ALEF and experimentally evaluated their usage in education process.
{"title":"Towards Collaborative Metadata Enrichment for Adaptive Web-Based Learning","authors":"Róbert Móro, Ivan Srba, Maros Uncík, M. Bieliková, Marián Simko","doi":"10.1109/WI-IAT.2011.220","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.220","url":null,"abstract":"In recent years we have witnessed expansion of Web 2.0. Its main feature is allowing users' collaboration in content creation using various means, e.g. annotations, discussions, wikis, blogs or tags. This approach has influenced also web-based learning, for which the term \"Learning 2.0\" has been introduced. In this paper we explore using tags in such systems. Tags can be used for improving of searching, categorization of web-documents, creating folksonomies and ontologies or enhancing the user-model. Another aspect of tags is that they act as a bridge between resources and users to create a social network. We integrated tags in a learning framework ALEF and experimentally evaluated their usage in education process.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130321450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ning Wang, Hongyu Huang, Yanzhang Wang, Hui Li, Liming Li
In front of various disasters, the remote rural areas of China appear to be more vulnerable. Because of lacking sufficient attention, disaster reduction in these areas has become the short board of the disaster prevention and reduction system in china. Therefore, this paper lays special stress on analyzing the causes that giving rise to this phenomenon, and the deficiencies in execution, and then proposes some practicable ways to change this situation.
{"title":"Problems and Countermeasures for Disaster Reduction in China's Remote Rural Areas","authors":"Ning Wang, Hongyu Huang, Yanzhang Wang, Hui Li, Liming Li","doi":"10.1109/WI-IAT.2011.91","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.91","url":null,"abstract":"In front of various disasters, the remote rural areas of China appear to be more vulnerable. Because of lacking sufficient attention, disaster reduction in these areas has become the short board of the disaster prevention and reduction system in china. Therefore, this paper lays special stress on analyzing the causes that giving rise to this phenomenon, and the deficiencies in execution, and then proposes some practicable ways to change this situation.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyo-Jung Oh, Jeong Hur, C. Lee, Pum-Mo Ryu, Y. Yoon, Hyunki Kim
Depending on questions, various answering methods and answer sources can be used. In this paper, we build a distributed QA system to handle different types of questions and web sources. When a user question is entered, the broker distributes the question over multiple sub-QAs according to question types. The selected sub-QAs find local optimal candidate answers, and then they are collected in to the answer manager. The merged candidates are re-ranked by adjusting confidence weights based on the question analysis result. The re-ranking algorithm aims to find global optimal answers. We borrow the concept from the margin and slack variables in SVM, and modify to project confidence weights into the same boundary by training. Several experimental results prove reliability of our proposed QA model.
{"title":"Merging and Re-ranking Answers from Distributed Multiple Web Sources","authors":"Hyo-Jung Oh, Jeong Hur, C. Lee, Pum-Mo Ryu, Y. Yoon, Hyunki Kim","doi":"10.1109/WI-IAT.2011.139","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.139","url":null,"abstract":"Depending on questions, various answering methods and answer sources can be used. In this paper, we build a distributed QA system to handle different types of questions and web sources. When a user question is entered, the broker distributes the question over multiple sub-QAs according to question types. The selected sub-QAs find local optimal candidate answers, and then they are collected in to the answer manager. The merged candidates are re-ranked by adjusting confidence weights based on the question analysis result. The re-ranking algorithm aims to find global optimal answers. We borrow the concept from the margin and slack variables in SVM, and modify to project confidence weights into the same boundary by training. Several experimental results prove reliability of our proposed QA model.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114809973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the community set space canvas, a triangular canvas where the results of community finding algorithms can be plotted for comparison. The points of the triangle represent trivial sets, such as the set of one large community, and the edges are populated by well known set types, such as disjoint communities.
{"title":"Exploring the Community Set Space","authors":"J. Scripps","doi":"10.1109/WI-IAT.2011.75","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.75","url":null,"abstract":"This paper presents the community set space canvas, a triangular canvas where the results of community finding algorithms can be plotted for comparison. The points of the triangle represent trivial sets, such as the set of one large community, and the edges are populated by well known set types, such as disjoint communities.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-commerce Web sites owe much of their popularity to consumer reviews provided together with product descriptions. On-line customers spend hours and hours going through heaps of textual reviews to build confidence in products they are planning to buy. At the same time, popular products have thousands of user-generated reviews. Current approaches to present them to the user or recommend an individual review for a product are based on the helpfulness or usefulness of each review. In this paper we look at the top-k reviews in a ranking to give a good summary to the user with each review complementing the others. To this end we use Latent Dirichlet Allocation to detect latent topics within reviews and make use of the assigned star rating for the product as an indicator of the polarity expressed towards the product and the latent topics within the review. We present a framework to cover different ranking strategies based on theuser's need: Summarizing all reviews, focus on a particular latent topic, or focus on positive, negative or neutral aspects. We evaluated the system using manually annotated review data from a commercial review Web site.
{"title":"Diversifying Product Review Rankings: Getting the Full Picture","authors":"Ralf Krestel, Nima Dokoohaki","doi":"10.1109/WI-IAT.2011.33","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.33","url":null,"abstract":"E-commerce Web sites owe much of their popularity to consumer reviews provided together with product descriptions. On-line customers spend hours and hours going through heaps of textual reviews to build confidence in products they are planning to buy. At the same time, popular products have thousands of user-generated reviews. Current approaches to present them to the user or recommend an individual review for a product are based on the helpfulness or usefulness of each review. In this paper we look at the top-k reviews in a ranking to give a good summary to the user with each review complementing the others. To this end we use Latent Dirichlet Allocation to detect latent topics within reviews and make use of the assigned star rating for the product as an indicator of the polarity expressed towards the product and the latent topics within the review. We present a framework to cover different ranking strategies based on theuser's need: Summarizing all reviews, focus on a particular latent topic, or focus on positive, negative or neutral aspects. We evaluated the system using manually annotated review data from a commercial review Web site.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117273770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present a collective classification approach for identifying untrustworthy individuals in multi-agent communities from a combination of observable features and network connections. Under the assumption that data are organized as independent and identically distributed (i.i.d.)samples, traditional classification is typically performed on each object independently, without considering the underlying network connecting the instances. In collective classification, a set of relational features, based on the connections between instances, is used to augment the feature vector used in classification. This approach can perform particularly well when the underlying data exhibits homophily, a propensity for similar items to be connected. We suggest that in many cases human communities exhibit homophily in trust levels since shared attitudes toward trust can facilitate the formation and maintenance of bonds, in the same way that other types of shared beliefs and value systems do. Hence, knowledge of an agent's connections provides a valuable cue that can assist in the identification of untrustworthy individuals who are misrepresenting themselves by modifying their observable information. This paper presents results that demonstrate that our proposed trust evaluation method is robust in cases where a large percentage of the individuals present misleading information.
{"title":"Leveraging Network Properties for Trust Evaluation in Multi-agent Systems","authors":"Xi Wang, M. Maghami, G. Sukthankar","doi":"10.1109/WI-IAT.2011.217","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.217","url":null,"abstract":"In this paper, we present a collective classification approach for identifying untrustworthy individuals in multi-agent communities from a combination of observable features and network connections. Under the assumption that data are organized as independent and identically distributed (i.i.d.)samples, traditional classification is typically performed on each object independently, without considering the underlying network connecting the instances. In collective classification, a set of relational features, based on the connections between instances, is used to augment the feature vector used in classification. This approach can perform particularly well when the underlying data exhibits homophily, a propensity for similar items to be connected. We suggest that in many cases human communities exhibit homophily in trust levels since shared attitudes toward trust can facilitate the formation and maintenance of bonds, in the same way that other types of shared beliefs and value systems do. Hence, knowledge of an agent's connections provides a valuable cue that can assist in the identification of untrustworthy individuals who are misrepresenting themselves by modifying their observable information. This paper presents results that demonstrate that our proposed trust evaluation method is robust in cases where a large percentage of the individuals present misleading information.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115785377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Assuming a binomial distribution for word occurrence, we propose computing a standardized Z score to define the specific vocabulary of a subset compared to that of the entire corpus. This approach is applied to weight terms characterizing a document (or a sample of texts). We then show how these Z score values can be used to derive an efficient categorization scheme. To evaluate this proposition we categorize speeches given by B. Obama as either electoral or presidential. The results tend to show that the suggested classification scheme performs better than a Support Vector Machine scheme, and a Naive Bayes classifier (10-fold cross validation).
{"title":"Classification Based on Specific Vocabulary","authors":"J. Savoy, Olena Zubaryeva","doi":"10.1109/WI-IAT.2011.19","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.19","url":null,"abstract":"Assuming a binomial distribution for word occurrence, we propose computing a standardized Z score to define the specific vocabulary of a subset compared to that of the entire corpus. This approach is applied to weight terms characterizing a document (or a sample of texts). We then show how these Z score values can be used to derive an efficient categorization scheme. To evaluate this proposition we categorize speeches given by B. Obama as either electoral or presidential. The results tend to show that the suggested classification scheme performs better than a Support Vector Machine scheme, and a Naive Bayes classifier (10-fold cross validation).","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115903044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The vision of spontaneously delivering ubiquitous services to mobile users stands on the tradition of reflecting functional and non-functional requirements. Nevertheless, existing approaches do not reason in advance about the potential conflicts of mobility activities with human-computer interaction based tasks. These conflicts may burden the user with unexpected interruptions that overload the central human-cognitive capacity. This paper introduces a novel cognitive engineering mechanism to optimize service functionality co ordinations during runtime in accordance with situational demands of cognitive resources. We base our resource aware approach for service coordination optimization on two theories from cognitive psychology -- the human-processing system theory of Navon and the multiple resource theory of Wickens. On top of this psychological background, we introduce a specific mechanism for varying service co ordinations.
{"title":"Cognitive Resource Aware Service Provisioning","authors":"A. Molina, In-Young Ko","doi":"10.1109/WI-IAT.2011.251","DOIUrl":"https://doi.org/10.1109/WI-IAT.2011.251","url":null,"abstract":"The vision of spontaneously delivering ubiquitous services to mobile users stands on the tradition of reflecting functional and non-functional requirements. Nevertheless, existing approaches do not reason in advance about the potential conflicts of mobility activities with human-computer interaction based tasks. These conflicts may burden the user with unexpected interruptions that overload the central human-cognitive capacity. This paper introduces a novel cognitive engineering mechanism to optimize service functionality co ordinations during runtime in accordance with situational demands of cognitive resources. We base our resource aware approach for service coordination optimization on two theories from cognitive psychology -- the human-processing system theory of Navon and the multiple resource theory of Wickens. On top of this psychological background, we introduce a specific mechanism for varying service co ordinations.","PeriodicalId":128421,"journal":{"name":"2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology","volume":"29 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}