Not enough data to create a plot.
Try a different view from the menu above.
Information Technology
Beyond Flickr: Not All Image Tagging Is Created Equal
Klavans, Judith L. (University of Maryland College Park) | Guerra, Raul (University of Maryland) | LaPlante, Rebecca (University of Maryland) | Bachta, Ed ( Indianapolis Museum of Art) | Stein, Robert (Indianapolis Museum of Art)
This paper reports on the linguistic analysis of a tag set of nearly 50,000 tags collected as part of the steve.museum project. The tags describe images of objects in museum collections. We present our results on morphological, part of speech and semantic analysis. We demonstrate that deeper tag processing provides valuable information for organizing and categorizing social tags. This promises to improve access to museum objects by leveraging the characteristics of tags and the relationships between them rather than treating them as individual items. The paper shows the value of using deep computational linguistic techniques in interdisciplinary projects on tagging over images of objects in museums and libraries. We compare our data and analysis to Flickr and other image tagging projects.
Context Transitions: User Identification and Comparison of Mobile Device Motion Data
Lovett, Tom (University of Bath and Vodafone) | O' (University of Bath) | Neill, Eamonn
In this paper, we study a time-critical facet of context-awareness: context transitions, which we model as changes in specific context types over time, e.g., activity or location. We present results from a user-centred field study involving participant interviews and motion data capture from two mobile device sensors: the accelerometer and magnetic field sensor. The results show how the participants subjectively interpret their daily context transitions with variable granularity, and a comparison of these context transitions with mobile device motion data shows how the motion data poorly reflect the identified transitions. The results imply that care should be taken when representing and modelling usersโ subjective interpretations of context, as well as the objective nature of context sensors. Furthermore, processing and usability trade-offs should be made if real-time on-device transition detection is to be implemented.
Gender Recognition Based on Sift Features
Yousefi, Sahar, Zahedi, Morteza
This paper proposes a robust approach for face detection and gender classification in color images. Previous researches about gender recognition suppose an expensive computational and time-consuming pre-processing step in order to alignment in which face images are aligned so that facial landmarks like eyes, nose, lips, chin are placed in uniform locations in image. In this paper, a novel technique based on mathematical analysis is represented in three stages that eliminates alignment step. First, a new color based face detection method is represented with a better result and more robustness in complex backgrounds. Next, the features which are invariant to affine transformations are extracted from each face using scale invariant feature transform (SIFT) method. To evaluate the performance of the proposed algorithm, experiments have been conducted by employing a SVM classifier on a database of face images which contains 500 images from distinct people with equal ratio of male and female.
Composite Social Network for Predicting Mobile Apps Installation
Pan, Wei (Massachusetts Institute of Technology) | Aharony, Nadav (Massachusetts Institute of Technology) | Pentland, Alex (Massachusetts Institute of Technology)
We have carefully instrumented a large portion of the population living in a university graduate dormitory by giving participants Android smart phones running our sensing software. In this paper, we propose the novel problem of predicting mobile application (known as โappsโ) installation using social networks and explain its challenge. Modern smart phones, like the ones used in our study, are able to collect different social networks using built-in sensors. (e.g. Bluetooth proximity network, call log network, etc) While this information is accessible to app market makers such as the iPhone AppStore, it has not yet been studied how app market makers can use these information for marketing research and strategy development. We develop a simple computational model to better predict app installation by using a composite network computed from the different networks sensed by phones. Our model also captures individual variance and exogenous factors in app adoption. We show the importance of considering all these factors in predicting app installations, and we observe the surprising result that app installation is indeed predictable. We also show that our model achieves the best results compared with generic approaches.
Web Personalization and Cohort Information Services for Natural Resource Managers
Redman, Crystal E. (Colorado State University)
Their information needs are long and popular information needs of the masses. Topic term and highly dynamic - nearly everything about this topic specificity, customizability, and automatically pursuing the is in flux. For these users, information search can be made long term unique information needs of individual users are more effective with knowledge about the field and about the not among the strengths of current main stream search engines types of documents being retrieved. Because the resource (Jansen, Spink, and Saracevic 2000) (Teevan, Dumais, management decisions require judgment about the materials and Horvitz 2005). This gap has inspired web personalization collected, the users require confidentiality and must trust the and collaborative information seeking tools such as sources. Google Alerts and has encouraged topic-specific blogs and Matilda is designed to 1) tailor information collection for podcasts.
On Expressing Value Externalities in Position Auctions
Constantin, Florin (Georgia Institute of Technology) | Rao, Malvika (Harvard University) | Huang, Chien-Chung (Humboldt-Universität zu Berlin) | Parkes, David (Harvard University)
We introduce a bidding language for expressing negative value externalities in position auctions for online advertising. The unit-bidder constraints (UBC) language allows a bidder to condition a bid on its allocated slot and on the slots allocated to other bidders. We introduce a natural extension of the Generalized Second Price (GSP) auction, the expressive GSP (eGSP) auction, that induces truthful revelation of constraints for a rich subclass of unit-bidder types, namely downward-monotonic UBC. We establish the existence of envy-free Nash equilibrium in eGSP under a further restriction to a subclass of exclusion constraints, for which the standard GSP has no pure strategy Nash equilibrium. The equilibrium results are obtained by reduction to equilibrium analysis for reserve price GSP (Even-Dar et al. 2008). In considering the winner determination problem, which is NP-hard, we bound the approximation ratio for social welfare in eGSP and provide parameterized complexity results.
Comparing Agents' Success against People in Security Domains
Lin, Raz (Bar-Ilan University) | Kraus, Sarit (Bar-Ilan University) | Agmon, Noa (The University of Texas at Austin) | Barrett, Samuel (The University of Texas at Austin) | Stone, Peter (The University of Texas at Austin)
The interaction of people with autonomous agents has become increasingly prevalent. Some of these settings include security domains, where people can be characterized as uncooperative, hostile, manipulative, and tending to take advantage of the situation for their own needs. This makes it challenging to design proficient agents to interact with people in such environments. Evaluating the success of the agents automatically before evaluating them with people or deploying them could alleviate this challenge and result in better designed agents. In this paper we show how Peer Designed Agents (PDAs) -- computer agents developed by human subjects -- can be used as a method for evaluating autonomous agents in security domains. Such evaluation can reduce the effort and costs involved in evaluating autonomous agents interacting with people to validate their efficacy. Our experiments included more than 70 human subjects and 40 PDAs developed by students. The study provides empirical support that PDAs can be used to compare the proficiency of autonomous agents when matched with people in security domains.
Branch and Price for Multi-Agent Plan Recognition
Banerjee, Bikramjit (The University of Southern Mississippi) | Kraemer, Landon (The University of Southern Mississippi)
The problem of identifying the (dynamic) team structures and team behaviors from the observed activities of multiple agents is called Multi-Agent Plan Recognition (MAPR). We extend a recent formalization of this problem to accommodate a compact, partially ordered, multi-agent plan language, as well as complex plan execution models โ particularly plan abandonment and activity interleaving. We adopt a branch and price approach to solve MAPR in such a challenging setting, and fully instantiate the (generic) pricing problem for MAPR. We show experimentally that this approach outperforms a recently proposed hypothesis pruning algorithm in two domains: multi-agent blocks word, and intrusion detection. The key benefit of the branch and price approach is its ability to grow the necessary component (occurrence) space from which the hypotheses are constructed, rather than begin with a fully enumerated component space that has an intractable size, and search it with pruning. Our formulation of MAPR has the broad objective of bringing mature Operations Research methodologies to bear upon MAPR, envisaged to have a similar impact as mature SAT-solvers had on planning.
SemRec: A Semantic Enhancement Framework for Tag Based Recommendation
Xu, Guandong (Victoria University) | Gu, Yanhui (University of Tokyo) | Dolog, Peter (Aalborg University) | Zhang, Yanchun (Victoria University) | Kitsuregawa, Masaru (University of Tokyo)
Collaborative tagging services provided by various social web sites become popular means to mark web resources for different purposes such as categorization, expression of a preference and so on. However, the tags are of syntactic nature, in a free style and do not reflect semantics, resulting in the problems of redundancy, ambiguity and less semantics. Current tag-based recommender systems mainly take the explicit structural information among users, resources and tags into consideration, while neglecting the important implicit semantic relationships hidden in tagging data. In this study, we propose a Semantic Enhancement Recommendation strategy (SemRec), based on both structural information and semantic information through a unified fusion model. Extensive experiments conducted on two real datasets demonstarte the effectiveness of our approaches.
Unsupervised Learning of Human Behaviours
Chua, Sook-Ling (Massey University) | Marsland, Stephen (Massey University) | Guesgen, Hans W. (Massey University)
Behaviour recognition is the process of inferring the behaviour of an individual from a series of observations acquired from sensors such as in a smart home. The majority of existing behaviour recognition systems are based on supervised learning algorithms, which means that training them requires a preprocessed, annotated dataset. Unfortunately, annotating a dataset is a rather tedious process and one that is prone to error. In this paper we suggest a way to identify structure in the data based on text compression and the edit distance between words, without any prior labelling. We demonstrate that by using this method we can automatically identify patterns and segment the data into patterns that correspond to human behaviours. To evaluate the effectiveness of our proposed method, we use a dataset from a smart home and compare the labels produced by our approach with the labels assigned by a human to the activities in the dataset. We find that the results are promising and show significant improvement in the recognition accuracy over Self-Organising Maps (SOMs).