Assessment of Multi-Hop Interpersonal Trust in Social Networks by 3VSL

Size: px
Start display at page:

Download "Assessment of Multi-Hop Interpersonal Trust in Social Networks by 3VSL"

Transcription

1 Assessment of Multi-Hop Interpersonal Trust in Social Networks by 3VSL Guangchi Liu, Qing Yang, Honggang Wang, Xiaodong Lin and Mike P. Wittie Presented by Guangchi Liu Department of Computer Science Montana State University Bozeman, MT, USA IEEE INFOCOM 2014, Toronto, CA

2 Motivation 2

3 Motivation Ask Yourself: How to trust someone you have never known before? Trustor? Trustee Alice David 3

4 Motivation Probably, If Trustor Trustee Alice Bob David Transitivity of Trust [1] [1] Falcone, Rino, and Cristiano Castelfranchi. "Transitivity in trust a discussed property." (2010). 4

5 Motivation Then, How Should Alice Trust David? Trustor Trustee Alice Bob? David 5

6 Motivation Complex Topology: Harder Cases?? Parallel Topology? Bridge Topology Arbitrary Topology 6

7 Motivation Finally, we could expect. Small World Network Six degrees of separation 7

8 Applications 8

9 Applications Consumer-to-Consumer Recommendation Systems Untrustworthy User Trustworthy User Seller Buyer 9

10 Applications Active Friending in OSNs [2] Weak Relation Strong Relation Trustworthy User Target User Finder [2] Yang, De-Nian, et al. "Maximizing acceptance probability for active friending in online social networks." Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM,

11 Applications Sybil Identification Untrustworthy User Trustworthy User Unknown user User? 11

12 Contributions 12

13 Contributions Methodology Three-Valued Subjective Logic (3VSL) Multi-hop trustworthiness assessment Advantage Applicable to Complex Topology Be able to handle any large scale social network Validation Real World Experiment 100+ participants in online survey 13

14 Related Works 14

15 Related Works 3VSL Bayesian Network Hidden Markov Model Subjective Logic Artificial Intelligence Methods Random Walk Community Analysis Graph Partitioning Graph Theory Methods 15

16 Three-Valued Subjective Logic (3VSL) 16

17 3VSL: Opinion Vector Interpersonal Trust: Is David telling the truth? Positive Uncertain Negative Impression Trustor Opinion Trustee Alice David 17

18 3VSL: Opinion Vector Mom Alice s Evidences: Posteriori Evidence? Interaction History Positive Uncertain Negative Impression 18

19 3VSL: Opinion Vector Stranger Alice s Evidences: Priori Evidence Cognition in Mind Positive Uncertain Negative Impression 19

20 3VSL: Opinion Vector Priori Evidence Posteriori Evidence Positive Uncertain Negative Impression 20

21 3VSL: Opinion Vector Dirichlet Distribution: + f ( p, p,, ) (1 p p ) p p B(,, ) Positive Uncertain Negative p 1 p 2 p 3 # # # : P 1 P P

22 3VSL: Opinion Vector 1 f ( p, p,, ) (1 p p ) p p B(,, ) Positive Uncertain Negative EP ( ) 1 EP ( 2) = EP ( ) 3 # # + # + # # # + # + # # # + # + # 22

23 3VSL: Opinion Vector Positive EP ( ) 1 Uncertain 2 Negative EP ( ) EP ( 3) Impression # # + # + # # # + # + # # # + # + # # + # + # Positive # + # + # # + # + # # + # + # Pos-uncertain Negative

24 3VSL: Opinion Vector Opinion Vector A b X Positive n A X Pos-uncertain A d X Negative A e X A a X Impression 1 A A A A A A X X X X X X [ b, d, n, e, a ] A Opinion 24 X

25 3VSL: Opinion Vector Expected Belief Positive Pos-uncertain Negative Impression 1 E( ) b a n e 3 A A A A A X X X X X A X 25

26 3VSL: Opinion Vector Is David telling the truth? Opinion of David s Mom E( ) Opinion of a Stranger E( )

27 Multi-hop Trust Computation in OSNs: w v i e v j G(V, E, W) v? u 27

28 3VSL: Discounting Operation Operation for Trust Propagation 28

29 3VSL: Discounting Operation A D Alice A B Bob B D David Positive Uncertain Negative Positive Uncertain Negative 29

30 3VSL: Discounting Operation A B B D? A D Positive? Uncertain Negative 30

31 3VSL: Discounting Operation B D A D Distortion Alice A B Bob B D David 31

32 3VSL: Discounting Operation Absorbing Process Hop # Alice A D David 2 Hops Bob B D David 1 Hop 32

33 3VSL: Discounting Operation A B Discounting Operation: (, ) B D A A B (, ) D B D A B B D Alice Bob David A [ b A, d A, n A, e A, a A ] B B B B B B A A B bd bb bd A A B dd bb dd (, ) n 1 b d e A B ed ed A A ad ad A B A A A B B D D D D D B [ b B, d B, n B, e B, a B ] D D D D D D 33

34 3VSL: Combining Operation Operation for Trust Fusion 34

35 3VSL: Combining Operation A 1 D A D Alice David A 2 D A 1 D A 2 D Positive Positive Uncertain Uncertain Negative Negative 35

36 3VSL: Combining Operation Posteriori Evidences Priori Evidences A 1 D A 1 D Positive + Positive Pos-uncertain Negative + + Pos-uncertain Negative Independent Evidences Dependent Evidences Positive Pos-uncertain Negative A D Positive Pos-uncertain Normalize Negative 36

37 3VSL: Combining Operation A1 A2 Combining Operation: (, ) Alice A1 A2 (, ) A D D D A 1 D A 2 D David [ b, d, n, e, a ] A D D D D D D A A A A A A D D D D D D [ b, d, n, e, a ] D D b d 1 2 (, ) n A1 A2 A2 A1 A D D D D D A A A A ed ed ed ed A1 A2 A2 A1 A D D D D D A A A A ed ed ed ed A1 A2 A2 A1 A A A D D D D D D D A A A A ed ed ed ed e a A2 A1 A D D D A A A A ed ed ed ed A D a b e A D b e d e d e n e e e n e

38 3VSL: Property Method 1: A B1 A B2 ( (, ), (, )) B C B C Method 2: A B1 B2 (, (, ) B C C Step.1 Step.1 Step.2 Equivalent Step.2 Step.3 38

39 3VSL: Topologies Bridge Topology Arbitrary Topology Large Social Networks 39

40 Evaluation 40

41 Evaluation: Real World Validation Goal Accuracy of 3VSL in Real Social Network Topology Method : Online Questionnaire [3,4] (100+ samples) 1. Error = ( ) ( ) 2. Error = ( ) ( ) [3]. Xiaoming Li and Guangchi Liu. Online Trust Survey [4]. C. Johnson-George and W. C. Swap, Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other. Journal of Personality and Social Psychology, vol. 43, no. 6, pp ,

42 Evaluation: Real World Validation 42

43 Evaluation: Numerical Analysis Goal 3VSL Vs. Common Sense Topology Method E( )? 43

44 Evaluation: Numerical Analysis E( )? 44

45 Evaluation: Numerical Analysis E( )?

46 Evaluation: Numerical Analysis E( )? 46

47 Conclusion 47

48 Conclusion Three-Valued Subjective Logic 48

49 Thank You! Q & A Guangchi Liu (Luke) 刘光迟 ( 劉光遲 ) Networking Lab, Dept. of Computer Science Montana State University, MT, United States LinkedIn: guangchi.liu@msu.montana.edu IEEE INFOCOM 2014, Toronto, CA

50 Backup I Trust Trust (Cognitive) Trust (Probabilistic) 50

51 Backup II Single hop trust assessment Wang, Yao, and Julita Vassileva. "Trust and reputation model in peer-to-peer networks." Multi Hop Trust Computation Jøsang, Audun. "A logic for uncertain probabilities." Bayesian Network Trust Assessment (AI Methods) Subjective Logic (SL) HMM Model Dynamic of Trust ElSalamouny, Ehab, Vladimiro Sassone, and Mogens Nielsen. "HMM-based trust model." 51

52 Backup III Subjective Logic 3VSL (, ) 1 2 (, ) 1 2 Collapse Constant Large Social Networks Large Social Networks 52

Computational Trust. Perspectives in Concurrency Theory Chennai December Mogens Nielsen University of Aarhus DK

Computational Trust. Perspectives in Concurrency Theory Chennai December Mogens Nielsen University of Aarhus DK Computational Trust Perspectives in Concurrency Theory Chennai December 2008 Mogens Nielsen University of Aarhus DK 1 Plan of talk 1. Computational Trust and Ubiquitous Computing - a brief survey 2. Computational

More information

A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks

A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks Joydeep Chandra 1, Ingo Scholtes 2, Niloy Ganguly 1, Frank Schweitzer 2 1 - Dept. of Computer Science and Engineering,

More information

Interact with Strangers

Interact with Strangers Interact with Strangers RATE: Recommendation-aware Trust Evaluation in Online Social Networks Wenjun Jiang 1, 2, Jie Wu 2, and Guojun Wang 1 1. School of Information Science and Engineering, Central South

More information

MULTINOMIAL AGENT S TRUST MODELING USING ENTROPY OF THE DIRICHLET DISTRIBUTION

MULTINOMIAL AGENT S TRUST MODELING USING ENTROPY OF THE DIRICHLET DISTRIBUTION MULTINOMIAL AGENT S TRUST MODELING USING ENTROPY OF THE DIRICHLET DISTRIBUTION Mohammad Anisi 1 and Morteza Analoui 2 1 School of Computer Engineering, Iran University of Science and Technology, Narmak,

More information

Social Interaction Based Video Recommendation: Recommending YouTube Videos to Facebook Users

Social Interaction Based Video Recommendation: Recommending YouTube Videos to Facebook Users Social Interaction Based Video Recommendation: Recommending YouTube Videos to Facebook Users Bin Nie 1 Honggang Zhang 1 Yong Liu 2 1 Fordham University, Bronx, NY. Email: {bnie, hzhang44}@fordham.edu 2

More information

Computational Trust. SFM 11 Bertinoro June Mogens Nielsen University of Aarhus DK. Aarhus Graduate School of Science Mogens Nielsen

Computational Trust. SFM 11 Bertinoro June Mogens Nielsen University of Aarhus DK. Aarhus Graduate School of Science Mogens Nielsen Computational Trust SFM 11 Bertinoro June 2011 Mogens Nielsen University of Aarhus DK 1 Plan of talk 1) The grand challenge of Ubiquitous Computing 2) The role of Computational Trust in Ubiquitous Computing

More information

Formal Trust Model for Multiagent Systems

Formal Trust Model for Multiagent Systems Formal Trust Model for Multiagent Systems Yonghong Wang and Munindar P. Singh Department of Computer Science orth Carolina State University Raleigh, C 7695-86, USA Abstract Trust should be substantially

More information

Final Exam December 12, 2017

Final Exam December 12, 2017 Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes

More information

Fission of Opinions in Subjective Logic

Fission of Opinions in Subjective Logic Fission of Opinions in Subjective Logic udun Jøsang University of Oslo - UNIK Graduate Center josang @ matnat.uio.no bstract Opinion fusion in subjective logic consists of combining separate observers

More information

Exploring the Patterns of Human Mobility Using Heterogeneous Traffic Trajectory Data

Exploring the Patterns of Human Mobility Using Heterogeneous Traffic Trajectory Data Exploring the Patterns of Human Mobility Using Heterogeneous Traffic Trajectory Data Jinzhong Wang April 13, 2016 The UBD Group Mobile and Social Computing Laboratory School of Software, Dalian University

More information

Multiplication of Multinomial Subjective Opinions

Multiplication of Multinomial Subjective Opinions Multiplication of Multinomial Subjective Opinions Audun Jøsang 1 and Stephen O Hara 2 1 UNIK Graduate Center University of Oslo, Norway josang@unik.no 2 21st Century Systems Inc. USA sohara@21csi.com Abstract.

More information

Believe it Today or Tomorrow? Detecting Untrustworthy Information from Dynamic Multi-Source Data

Believe it Today or Tomorrow? Detecting Untrustworthy Information from Dynamic Multi-Source Data SDM 15 Vancouver, CAN Believe it Today or Tomorrow? Detecting Untrustworthy Information from Dynamic Multi-Source Data Houping Xiao 1, Yaliang Li 1, Jing Gao 1, Fei Wang 2, Liang Ge 3, Wei Fan 4, Long

More information

B-trust: Bayesian Trust Framework for Pervasive Computing

B-trust: Bayesian Trust Framework for Pervasive Computing B-trust: Bayesian Trust Framework for Pervasive Computing Daniele Quercia, Stephen Hailes, Licia Capra Department of Computer Science, University College London, London, WC1E 6BT, UK {D.Quercia, S.Hailes,

More information

Modeling the Dynamic Trust of Online Service Providers using HMM

Modeling the Dynamic Trust of Online Service Providers using HMM Modeling the Dynamic Trust of Online Service Providers using HMM Xiaoming Zheng Department of Computing Macquarie University Sydney, NSW 2109, Australia xiaoming.zheng@mq.edu.au Yan Wang Department of

More information

Final Exam December 12, 2017

Final Exam December 12, 2017 Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes

More information

Mining Newsgroups Using Networks Arising From Social Behavior by Rakesh Agrawal et al. Presented by Will Lee

Mining Newsgroups Using Networks Arising From Social Behavior by Rakesh Agrawal et al. Presented by Will Lee Mining Newsgroups Using Networks Arising From Social Behavior by Rakesh Agrawal et al. Presented by Will Lee wwlee1@uiuc.edu September 28, 2004 Motivation IR on newsgroups is challenging due to lack of

More information

Published in: Tenth Tbilisi Symposium on Language, Logic and Computation: Gudauri, Georgia, September 2013

Published in: Tenth Tbilisi Symposium on Language, Logic and Computation: Gudauri, Georgia, September 2013 UvA-DARE (Digital Academic Repository) Estimating the Impact of Variables in Bayesian Belief Networks van Gosliga, S.P.; Groen, F.C.A. Published in: Tenth Tbilisi Symposium on Language, Logic and Computation:

More information

Automatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries

Automatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries Automatic Differentiation Equipped Variable Elimination for Sensitivity Analysis on Probabilistic Inference Queries Anonymous Author(s) Affiliation Address email Abstract 1 2 3 4 5 6 7 8 9 10 11 12 Probabilistic

More information

On Beta Models with Trust Chains

On Beta Models with Trust Chains On Beta Models with Trust Chains Tim Muller and Patrick Schweitzer {tim.muller, patrick.schweitzer}@uni.lu University of Luxembourg Abstract. In a type of interactions over the Internet, a user (the subject)

More information

An analysis of the exponential decay principle in probabilistic trust models

An analysis of the exponential decay principle in probabilistic trust models An analysis of the exponential decay principle in probabilistic trust models Ehab ElSalamouny 1, Karl Tikjøb Krukow 2, and Vladimiro Sassone 1 1 ECS, University of Southampton, UK 2 Trifork, Aarhus, Denmark

More information

Continuous Ratings in Discrete Bayesian Reputation Systems

Continuous Ratings in Discrete Bayesian Reputation Systems Continuous Ratings in Discrete Bayesian Reputation Systems Audun Jøsang, Xixi Luo and Xiaowu Chen Abstract Reputation systems take as input ratings from members in a community, and can produce measures

More information

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,

More information

INVERTING CONDITIONAL OPINIONS IN SUBJECTIVE LOGIC

INVERTING CONDITIONAL OPINIONS IN SUBJECTIVE LOGIC INVERTING CONDITIONAL OPINIONS IN SUBJECTIVE LOGIC Audun Jøsang a and Francesco Sambo b (a) University of Oslo, Norway, josang@mn.uio.no (b) University of Padova, Italy, francesco.sambo@dei.unipd.it Abstract:

More information

A Reputation-Based Approach for Securing Vivaldi Embedding

A Reputation-Based Approach for Securing Vivaldi Embedding A Reputation-Based Approach for Securing Vivaldi Embedding System Damien Saucez Benoit Donnet Olivier Bonaventure Université Catholique de Louvain Eunice 2007 Twente http://inl.info.ucl.ac.be July 19th,

More information

Distributed ML for DOSNs: giving power back to users

Distributed ML for DOSNs: giving power back to users Distributed ML for DOSNs: giving power back to users Amira Soliman KTH isocial Marie Curie Initial Training Networks Part1 Agenda DOSNs and Machine Learning DIVa: Decentralized Identity Validation for

More information

Logic and Artificial Intelligence Lecture 13

Logic and Artificial Intelligence Lecture 13 Logic and Artificial Intelligence Lecture 13 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit

More information

A Bayesian model for event-based trust

A Bayesian model for event-based trust A Bayesian model for event-based trust Elements of a foundation for computational trust Vladimiro Sassone ECS, University of Southampton joint work K. Krukow and M. Nielsen Oxford, 9 March 2007 V. Sassone

More information

Machine Learning Summer School

Machine Learning Summer School Machine Learning Summer School Lecture 3: Learning parameters and structure Zoubin Ghahramani zoubin@eng.cam.ac.uk http://learning.eng.cam.ac.uk/zoubin/ Department of Engineering University of Cambridge,

More information

Semantic Constraints for Trust Transitivity

Semantic Constraints for Trust Transitivity Semantic Constraints for Trust Transitivity Audun Jøsang Simon Pope Distributed Systems Technology Centre University of Queensland, Brisbane, Australia Email: {ajosang, simon.pope}@dstc.edu.au Abstract

More information

To Trust or Not to Trust? Predicting Online Trusts using Trust Antecedent Framework

To Trust or Not to Trust? Predicting Online Trusts using Trust Antecedent Framework To Trust or Not to Trust? Predicting Online Trusts using Trust Antecedent Framework Viet-An Nguyen, Ee-Peng Lim, Jing Jiang School of Information Systems Singapore Management University, Singapore {vanguyen,eplim,jingjiang}@smu.edu.sg

More information

Optimal Social Trust Path Selection in Complex Social Networks

Optimal Social Trust Path Selection in Complex Social Networks Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Optimal Social Trust Path Selection in Complex Social Networks Guanfeng Liu, Yan Wang and Mehmet A. Orgun Department

More information

CS 4649/7649 Robot Intelligence: Planning

CS 4649/7649 Robot Intelligence: Planning CS 4649/7649 Robot Intelligence: Planning Probability Primer Sungmoon Joo School of Interactive Computing College of Computing Georgia Institute of Technology S. Joo (sungmoon.joo@cc.gatech.edu) 1 *Slides

More information

Generalising Bayes Theorem in Subjective Logic

Generalising Bayes Theorem in Subjective Logic Generalising Bayes Theorem in Subjective Logic Audun Jøsang 1 Abstract Bayes theorem provides a method of inverting conditional probabilities in probability calculus and statistics. Subjective logic generalises

More information

Mihai Boicu, Gheorghe Tecuci, Dorin Marcu Learning Agent Center, George Mason University

Mihai Boicu, Gheorghe Tecuci, Dorin Marcu Learning Agent Center, George Mason University Mihai Boicu, Gheorghe Tecuci, Dorin Marcu Learning Agent Center, George Mason University The Seventh International Conference on Semantic Technologies for Intelligence, Defense, and Security STIDS Fairfax,

More information

CSE 473: Artificial Intelligence

CSE 473: Artificial Intelligence CSE 473: Artificial Intelligence Hidden Markov Models Dieter Fox --- University of Washington [Most slides were created by Dan Klein and Pieter Abbeel for CS188 Intro to AI at UC Berkeley. All CS188 materials

More information

Chapter 4 Dynamic Bayesian Networks Fall Jin Gu, Michael Zhang

Chapter 4 Dynamic Bayesian Networks Fall Jin Gu, Michael Zhang Chapter 4 Dynamic Bayesian Networks 2016 Fall Jin Gu, Michael Zhang Reviews: BN Representation Basic steps for BN representations Define variables Define the preliminary relations between variables Check

More information

Wiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte

Wiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Reputation Systems I HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Yury Lifshits Wiki Definition Reputation is the opinion (more technically, a social evaluation) of the public toward a person, a

More information

Planning Under Uncertainty II

Planning Under Uncertainty II Planning Under Uncertainty II Intelligent Robotics 2014/15 Bruno Lacerda Announcement No class next Monday - 17/11/2014 2 Previous Lecture Approach to cope with uncertainty on outcome of actions Markov

More information

Probability. CS 3793/5233 Artificial Intelligence Probability 1

Probability. CS 3793/5233 Artificial Intelligence Probability 1 CS 3793/5233 Artificial Intelligence 1 Motivation Motivation Random Variables Semantics Dice Example Joint Dist. Ex. Axioms Agents don t have complete knowledge about the world. Agents need to make decisions

More information

CS 188: Artificial Intelligence Fall 2011

CS 188: Artificial Intelligence Fall 2011 CS 188: Artificial Intelligence Fall 2011 Lecture 20: HMMs / Speech / ML 11/8/2011 Dan Klein UC Berkeley Today HMMs Demo bonanza! Most likely explanation queries Speech recognition A massive HMM! Details

More information

STAR: Semiring Trust Inference for Trust-Aware Social Recommenders

STAR: Semiring Trust Inference for Trust-Aware Social Recommenders STAR: Semiring Trust Inference for Trust-Aware Social Recommenders Peixin Gao Institute for Systems Research University of Maryland gaopei@umd.edu Hui Miao Dept. of Computer Science University of Maryland

More information

Is It Harmful When Advisors Only Pretend to Be Honest?

Is It Harmful When Advisors Only Pretend to Be Honest? Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16) Is It Harmful When Advisors Only Pretend to Be Honest? Dongxia Wang and Tim Muller and Jie Zhang and Yang liu School of

More information

Introduction to Artificial Intelligence (AI)

Introduction to Artificial Intelligence (AI) Introduction to Artificial Intelligence (AI) Computer Science cpsc502, Lecture 10 Oct, 13, 2011 CPSC 502, Lecture 10 Slide 1 Today Oct 13 Inference in HMMs More on Robot Localization CPSC 502, Lecture

More information

On the Complexity of the Minimum Independent Set Partition Problem

On the Complexity of the Minimum Independent Set Partition Problem On the Complexity of the Minimum Independent Set Partition Problem T-H. Hubert Chan 1, Charalampos Papamanthou 2, and Zhichao Zhao 1 1 Department of Computer Science the University of Hong Kong {hubert,zczhao}@cs.hku.hk

More information

Lecture 6: Graphical Models: Learning

Lecture 6: Graphical Models: Learning Lecture 6: Graphical Models: Learning 4F13: Machine Learning Zoubin Ghahramani and Carl Edward Rasmussen Department of Engineering, University of Cambridge February 3rd, 2010 Ghahramani & Rasmussen (CUED)

More information

Density Propagation for Continuous Temporal Chains Generative and Discriminative Models

Density Propagation for Continuous Temporal Chains Generative and Discriminative Models $ Technical Report, University of Toronto, CSRG-501, October 2004 Density Propagation for Continuous Temporal Chains Generative and Discriminative Models Cristian Sminchisescu and Allan Jepson Department

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6:00pm 8:50pm Mon. and Wed. Location: SL105 Spring 2016 Reading assignments We will increase the bar a little bit Please

More information

RaRE: Social Rank Regulated Large-scale Network Embedding

RaRE: Social Rank Regulated Large-scale Network Embedding RaRE: Social Rank Regulated Large-scale Network Embedding Authors: Yupeng Gu 1, Yizhou Sun 1, Yanen Li 2, Yang Yang 3 04/26/2018 The Web Conference, 2018 1 University of California, Los Angeles 2 Snapchat

More information

A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks

A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks 21 IEEE International Conference on Services Computing A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks Guanfeng Liu, Yan Wang and Mehmet A. Orgun Department

More information

Overview and comparison of random walk based techniques for estimating network averages

Overview and comparison of random walk based techniques for estimating network averages Overview and comparison of random walk based techniques for estimating network averages Konstantin Avrachenkov (Inria, France) Ribno COSTNET Conference, 21 Sept. 2016 Motivation Analysing (online) social

More information

FlowTrust: Trust Inference with Network Flows

FlowTrust: Trust Inference with Network Flows FlowTrust: Trust Inference with Network Flows Guojun Wang and Jie Wu Abstract Web-based social networking is increasingly gaining popularity due to the rapid development of computer networking technologies.

More information

Probabilistic Logic under Uncertainty

Probabilistic Logic under Uncertainty Probabilistic Logic under Uncertainty Audun Jøsang School of Software Engineering and Data Communications QUT, Brisbane, Australia Email: a.josang@qut.edu.au Abstract Probabilistic logic combines the capability

More information

Winter 2019 Math 106 Topics in Applied Mathematics. Lecture 1: Introduction

Winter 2019 Math 106 Topics in Applied Mathematics. Lecture 1: Introduction Winter 2019 Math 106 Topics in Applied Mathematics Data-driven Uncertainty Quantification Yoonsang Lee (yoonsang.lee@dartmouth.edu) Lecture 1: Introduction 19 Winter M106 Class: MWF 12:50-1:55 pm @ 200

More information

An Interoperable Context Sensitive Model of Trust

An Interoperable Context Sensitive Model of Trust An Interoperable Context Sensitive Model of Trust Indrakshi Ray Indrajit Ray Sudip Chakraborty Department of Computer Science Colorado State University Fort Collins CO 80523-1873 iray,indrajit,sudip @cs.colostate.edu

More information

Using first-order logic, formalize the following knowledge:

Using first-order logic, formalize the following knowledge: Probabilistic Artificial Intelligence Final Exam Feb 2, 2016 Time limit: 120 minutes Number of pages: 19 Total points: 100 You can use the back of the pages if you run out of space. Collaboration on the

More information

Circle-based Recommendation in Online Social Networks

Circle-based Recommendation in Online Social Networks Circle-based Recommendation in Online Social Networks Xiwang Yang, Harald Steck*, and Yong Liu Polytechnic Institute of NYU * Bell Labs/Netflix 1 Outline q Background & Motivation q Circle-based RS Trust

More information

Probabilistic Graphical Models Homework 2: Due February 24, 2014 at 4 pm

Probabilistic Graphical Models Homework 2: Due February 24, 2014 at 4 pm Probabilistic Graphical Models 10-708 Homework 2: Due February 24, 2014 at 4 pm Directions. This homework assignment covers the material presented in Lectures 4-8. You must complete all four problems to

More information

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer

More information

Measurement of Burst Topic in Microblog

Measurement of Burst Topic in Microblog , pp.16-20 http://dx.doi.org/10.14257/astl.2014.78.04 Measurement of Burst Topic in Microblog Guozhong Dong 1, Xin Zou 2*, Wei Wang 1, Yaxue Hu 1, Guowei Shen 1, Korawit Orkphol 1,Wu Yang 1 1 Information

More information

Introduction to Probabilistic Programming Languages (PPL)

Introduction to Probabilistic Programming Languages (PPL) Introduction to Probabilistic Programming Languages (PPL) Anton Andreev Ingénieur d'études CNRS andreev.anton@.grenoble-inp.fr Something simple int function add(int a, int b) return a + b add(3, 2) 5 Deterministic

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6-8:50PM Thursday Location: AK233 Spring 2018 v Course Project I has been graded. Grading was based on v 1. Project report

More information

TPS DR: A Universal Dimension Reducing Algorithm for Optimal Trust Path Selection in Complex Sensor Network

TPS DR: A Universal Dimension Reducing Algorithm for Optimal Trust Path Selection in Complex Sensor Network Appl Math Inf Sci 7, No 1L, 161-167 (2013) 161 Applied Mathematics & Information Sciences An International Journal TPS DR: A Universal Dimension Reducing Algorithm for Optimal Trust Path Selection in Complex

More information

Truth Discovery for Spatio-Temporal Events from Crowdsourced Data

Truth Discovery for Spatio-Temporal Events from Crowdsourced Data Truth Discovery for Spatio-Temporal Events from Crowdsourced Data Daniel A. Garcia-Ulloa Math & CS Department Emory University dgarci8@emory.edu Li Xiong Math & CS Department Emory University lxiong@emory.edu

More information

Introduction to Bayesian Learning

Introduction to Bayesian Learning Course Information Introduction Introduction to Bayesian Learning Davide Bacciu Dipartimento di Informatica Università di Pisa bacciu@di.unipi.it Apprendimento Automatico: Fondamenti - A.A. 2016/2017 Outline

More information

Outline. CSE 573: Artificial Intelligence Autumn Agent. Partial Observability. Markov Decision Process (MDP) 10/31/2012

Outline. CSE 573: Artificial Intelligence Autumn Agent. Partial Observability. Markov Decision Process (MDP) 10/31/2012 CSE 573: Artificial Intelligence Autumn 2012 Reasoning about Uncertainty & Hidden Markov Models Daniel Weld Many slides adapted from Dan Klein, Stuart Russell, Andrew Moore & Luke Zettlemoyer 1 Outline

More information

Automating variational inference for statistics and data mining

Automating variational inference for statistics and data mining Automating variational inference for statistics and data mining Tom Minka Machine Learning and Perception Group Microsoft Research Cambridge A common situation You have a dataset Some models in mind Want

More information

Interpretation and Fusion of Hyper Opinions in Subjective Logic

Interpretation and Fusion of Hyper Opinions in Subjective Logic Interpretation and Fusion of Hyper Opinions in Subjective Logic Audun Jøsang University of Oslo Norway Email: josang@mn.uio.no Robin Hankin University of Auckland New Zealand Email: hankin.robin@gmail.com

More information

ABSTRACT. WANG, YONGHONG. Evidence-Based Trust in Distributed Agent Systems. (Under the direction of Professor Munindar P. Singh).

ABSTRACT. WANG, YONGHONG. Evidence-Based Trust in Distributed Agent Systems. (Under the direction of Professor Munindar P. Singh). ABSTRACT WANG, YONGHONG. Evidence-Based Trust in Distributed Agent Systems. (Under the direction of Professor Munindar P. Singh). Trust is a crucial basis for interactions among parties in large, open

More information

Propositions. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 5.1, Page 1

Propositions. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 5.1, Page 1 Propositions An interpretation is an assignment of values to all variables. A model is an interpretation that satisfies the constraints. Often we don t want to just find a model, but want to know what

More information

: Approximation and Online Algorithms with Applications Lecture Note 2: NP-Hardness

: Approximation and Online Algorithms with Applications Lecture Note 2: NP-Hardness 4810-1183: Approximation and Online Algorithms with Applications Lecture Note 2: NP-Hardness Introduction Suppose that you submitted a research manuscript to a journal. It is very unlikely that your paper

More information

Uncertainty and knowledge. Uncertainty and knowledge. Reasoning with uncertainty. Notes

Uncertainty and knowledge. Uncertainty and knowledge. Reasoning with uncertainty. Notes Approximate reasoning Uncertainty and knowledge Introduction All knowledge representation formalism and problem solving mechanisms that we have seen until now are based on the following assumptions: All

More information

The Lady Tasting Tea. How to deal with multiple testing. Need to explore many models. More Predictive Modeling

The Lady Tasting Tea. How to deal with multiple testing. Need to explore many models. More Predictive Modeling The Lady Tasting Tea More Predictive Modeling R. A. Fisher & the Lady B. Muriel Bristol claimed she prefers tea added to milk rather than milk added to tea Fisher was skeptical that she could distinguish

More information

Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks

Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks Yongkun Li, John C.S. Lui Department of Computer Science & Engineering, The Chinese University of Hong Kong Email: {ykli, cslui}@cse.cuhk.edu.hk

More information

15-381: Artificial Intelligence. Hidden Markov Models (HMMs)

15-381: Artificial Intelligence. Hidden Markov Models (HMMs) 15-381: Artificial Intelligence Hidden Markov Models (HMMs) What s wrong with Bayesian networks Bayesian networks are very useful for modeling joint distributions But they have their limitations: - Cannot

More information

Digital Chart Cartography: Error and Quality control

Digital Chart Cartography: Error and Quality control Digital Chart Cartography: Error and Quality control Di WU (PHD student) Session7: Advances in Cartography Venue: TU 107 Yantai Institute of Coastal Zone Research, CAS, Yantai 264003, ChinaC Key State

More information

Display Advertising Optimization by Quantum Annealing Processor

Display Advertising Optimization by Quantum Annealing Processor Display Advertising Optimization by Quantum Annealing Processor Shinichi Takayanagi*, Kotaro Tanahashi*, Shu Tanaka *Recruit Communications Co., Ltd. Waseda University, JST PRESTO Overview 1. Introduction

More information

Mining Triadic Closure Patterns in Social Networks

Mining Triadic Closure Patterns in Social Networks Mining Triadic Closure Patterns in Social Networks Hong Huang, University of Goettingen Jie Tang, Tsinghua University Sen Wu, Stanford University Lu Liu, Northwestern University Xiaoming Fu, University

More information

Logic and Artificial Intelligence Lecture 7

Logic and Artificial Intelligence Lecture 7 Logic and Artificial Intelligence Lecture 7 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit

More information

Bayesian Networks BY: MOHAMAD ALSABBAGH

Bayesian Networks BY: MOHAMAD ALSABBAGH Bayesian Networks BY: MOHAMAD ALSABBAGH Outlines Introduction Bayes Rule Bayesian Networks (BN) Representation Size of a Bayesian Network Inference via BN BN Learning Dynamic BN Introduction Conditional

More information

Available online at ScienceDirect. Procedia Engineering 119 (2015 ) 13 18

Available online at   ScienceDirect. Procedia Engineering 119 (2015 ) 13 18 Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 119 (2015 ) 13 18 13th Computer Control for Water Industry Conference, CCWI 2015 Real-time burst detection in water distribution

More information

Logics of Rational Agency Lecture 3

Logics of Rational Agency Lecture 3 Logics of Rational Agency Lecture 3 Eric Pacuit Tilburg Institute for Logic and Philosophy of Science Tilburg Univeristy ai.stanford.edu/~epacuit July 29, 2009 Eric Pacuit: LORI, Lecture 3 1 Plan for the

More information

Activity Recognition with a Smart Walker

Activity Recognition with a Smart Walker Activity Recognition with a Smart Walker Friday, October 1st, 2010 CS886: AI for Healthcare Applications Pascal Poupart Associate Professor Cheriton School of Computer Science University of Waterloo 1

More information

Preference Elicitation for Sequential Decision Problems

Preference Elicitation for Sequential Decision Problems Preference Elicitation for Sequential Decision Problems Kevin Regan University of Toronto Introduction 2 Motivation Focus: Computational approaches to sequential decision making under uncertainty These

More information

Une approche multi-agent basée sur la confiance pour évaluer la performance des plateformes de crowdsourcing d idées

Une approche multi-agent basée sur la confiance pour évaluer la performance des plateformes de crowdsourcing d idées Laboratoire en Innovation, Technologie, Économie et Management Une approche multi-agent basée sur la confiance pour évaluer la performance des plateformes de crowdsourcing d idées Amine Louati Christine

More information

Analysis of Multiview Legislative Networks with Structured Matrix Factorization: Does Twitter Influence Translate to the Real World?

Analysis of Multiview Legislative Networks with Structured Matrix Factorization: Does Twitter Influence Translate to the Real World? Analysis of Multiview Legislative Networks with Structured Matrix Factorization: Does Twitter Influence Translate to the Real World? Shawn Mankad The University of Maryland Joint work with: George Michailidis

More information

CPS 173 Mechanism design. Vincent Conitzer

CPS 173 Mechanism design. Vincent Conitzer CPS 173 Mechanism design Vincent Conitzer conitzer@cs.duke.edu edu Mechanism design: setting The center has a set of outcomes O that she can choose from Allocations of tasks/resources, joint plans, Each

More information

Opinion Dynamics on Triad Scale Free Network

Opinion Dynamics on Triad Scale Free Network Opinion Dynamics on Triad Scale Free Network Li Qianqian 1 Liu Yijun 1,* Tian Ruya 1,2 Ma Ning 1,2 1 Institute of Policy and Management, Chinese Academy of Sciences, Beijing 100190, China lqqcindy@gmail.com,

More information

Gibbs Sampling Methods for Multiple Sequence Alignment

Gibbs Sampling Methods for Multiple Sequence Alignment Gibbs Sampling Methods for Multiple Sequence Alignment Scott C. Schmidler 1 Jun S. Liu 2 1 Section on Medical Informatics and 2 Department of Statistics Stanford University 11/17/99 1 Outline Statistical

More information

System Reliability Analysis. CS6323 Networks and Systems

System Reliability Analysis. CS6323 Networks and Systems System Reliability Analysis CS6323 Networks and Systems Topics Combinatorial Models for reliability Topology-based (structured) methods for Series Systems Parallel Systems Reliability analysis for arbitrary

More information

Combining Recommender and Reputation Systems to Produce Better Online Advice

Combining Recommender and Reputation Systems to Produce Better Online Advice Combining Recommender and Reputation Systems to Produce Better Online Advice Audun Jøsang 1, Guibing Guo 2, Maria Silvia Pini 3, Francesco Santini 4,and Yue Xu 5 1 University of Oslo, Norway (josang@ifi.uio.no)

More information

Effective Design of Trust Ontologies for Improvement in the Structure of Socio-Semantic Trust Networks

Effective Design of Trust Ontologies for Improvement in the Structure of Socio-Semantic Trust Networks 23 Effective Design of Trust Ontologies for Improvement in the Structure of Socio-Semantic Trust Networks Nima Dokoohaki 1, Mihhail Matskin 2 Abstract Social ecosystems are growing across the web and social

More information

UNDER UNCERTAINTY TRUST ESTIMATION IN MULTI-VALUED SETTINGS

UNDER UNCERTAINTY TRUST ESTIMATION IN MULTI-VALUED SETTINGS UNDER UNCERTAINTY TRUST ESTIMATION IN MULTI-VALUED SETTINGS Sina Honari A thesis in The Department of Computer Science and Software Engineering Presented in Partial Fulfillment of the Requirements For

More information

Data Quality in Hybrid Neuro-Fuzzy based Soft-Sensor Models: An Experimental Study

Data Quality in Hybrid Neuro-Fuzzy based Soft-Sensor Models: An Experimental Study IAENG International Journal of Computer Science, 37:1, IJCS_37_1_8 Data Quality in Hybrid Neuro-Fuzzy based Soft-Sensor Models: An Experimental Study S. Jassar, Student Member, IEEE, Z. Liao, Member, ASHRAE,

More information

Random Surfing on Multipartite Graphs

Random Surfing on Multipartite Graphs Random Surfing on Multipartite Graphs Athanasios N. Nikolakopoulos, Antonia Korba and John D. Garofalakis Department of Computer Engineering and Informatics, University of Patras December 07, 2016 IEEE

More information

International Journal "Information Theories & Applications" Vol.14 /

International Journal Information Theories & Applications Vol.14 / International Journal "Information Theories & Applications" Vol.4 / 2007 87 or 2) Nˆ t N. That criterion and parameters F, M, N assign method of constructing sample decision function. In order to estimate

More information

Kazuyuki Tanaka s work on AND-OR trees and subsequent development

Kazuyuki Tanaka s work on AND-OR trees and subsequent development Kazuyuki Tanaka s work on AND-OR trees and subsequent development Toshio Suzuki Department of Math. and Information Sciences, Tokyo Metropolitan University, CTFM 2015, Tokyo Institute of Technology September

More information

A Generalized Decision Logic in Interval-set-valued Information Tables

A Generalized Decision Logic in Interval-set-valued Information Tables A Generalized Decision Logic in Interval-set-valued Information Tables Y.Y. Yao 1 and Qing Liu 2 1 Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca

More information

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:

More information

Basic Probabilistic Reasoning SEG

Basic Probabilistic Reasoning SEG Basic Probabilistic Reasoning SEG 7450 1 Introduction Reasoning under uncertainty using probability theory Dealing with uncertainty is one of the main advantages of an expert system over a simple decision

More information

Modeling face-to-face social interaction networks

Modeling face-to-face social interaction networks Modeling face-to-face social interaction networks Romualdo Pastor-Satorras Dept. Fisica i Enginyería Nuclear Universitat Politècnica de Catalunya Spain http://www.fen.upc.edu/~romu Work done in collaboration

More information