2014 European Network Intelligence Conference最新文献

筛选
英文 中文
The Concept of Recommender System Supporting Command and Control System in Hierarchical Organization 层级组织中支持指挥控制系统的推荐系统概念
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.9
Maj Grzegorz Pilarski
{"title":"The Concept of Recommender System Supporting Command and Control System in Hierarchical Organization","authors":"Maj Grzegorz Pilarski","doi":"10.1109/ENIC.2014.9","DOIUrl":"https://doi.org/10.1109/ENIC.2014.9","url":null,"abstract":"The most important aspect of operations in a hierarchical organization of military character is the fastness and aptness of the made decisions in the circumstances riddled with uncertainty and big risk. Thus, it is very important to equip a command body responsible for gathering, processing, sending and storing of information with proper IT tools which support the process of decision making. The conduct of research which aims at elaborating a concept of recommender system supporting the military decision making process (MDMP) is the most important activity in the transition period leading to the achievement of network centric capabilities in NATO. The author presents in this article distinctive features which describe the functioning of a hierarchical organization of military character as well as the most important results of research connected with the usage of the present applications supporting a command body in the military decision making process. The results and conclusions of the research allowed to create and present a concept of recommender system which, if implemented, could increase the effectiveness of a command body in a hierarchical organization of military character.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Profile Cloning Detection in Social Networks 社交网络中的配置文件克隆检测
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.21
Piotr Bródka, Mateusz Sobas, H. Johnson
{"title":"Profile Cloning Detection in Social Networks","authors":"Piotr Bródka, Mateusz Sobas, H. Johnson","doi":"10.1109/ENIC.2014.21","DOIUrl":"https://doi.org/10.1109/ENIC.2014.21","url":null,"abstract":"Profile cloning is a severe security issue in social networks since it is used to make a profile identical to existing ones. Profile cloning detection creates a possibility to detect frauds that would use people's trust to gather social information. This paper proposes two novel methods of profile cloning detection and also presents state-of-the-art research. The first method is based on the similarity of attributes from both profiles and the second method is based on the similarity of relationship networks. The methods are further evaluated with experiments and the results clearly describes that the proposed methods are useful and efficient compared to existing methods. The paper also stress that profile cloning in Facebook is not only possible but also fairly easy to perform.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Norm Emergence via Influential Weight Propagation in Complex Networks 复杂网络中影响权传播的范数涌现
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.28
Ryosuke Shibusawa, T. Sugawara
{"title":"Norm Emergence via Influential Weight Propagation in Complex Networks","authors":"Ryosuke Shibusawa, T. Sugawara","doi":"10.1109/ENIC.2014.28","DOIUrl":"https://doi.org/10.1109/ENIC.2014.28","url":null,"abstract":"We propose an influence-based aggregative learning framework that facilitates the emergence of social norms in complex networks and investigate how a norm converges by learning through iterated local interactions in a coordination game. In society, humans decide to coordinate their behavior not only by exchanging information but also on the basis of norms that are often individually derived from interactions without a centralized authority. Coordination using norms has received much attention in studies of multi-agent systems. In addition, because agents often work as delegates of humans, they should have \"mental\" models about how to interact with others and incorporate differences of opinion. Because norms make sense only when all or most agents have the same one and they can expect that others will follow, it is important to investigate the mechanism of norm emergence through learning with local and individual interactions in agent society. Our method of norm learning borrows from the opinion aggregation process while taking into account the influence of local opinions in tightly coordinated human communities. We conducted experiments showing how our learning framework facilitates propagation of norms in a number of complex agent networks.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Assessing Professional Skills in a Multi-scale Environment by Means of Graph-Based Algorithms 用基于图的算法在多尺度环境中评估专业技能
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.12
J. Álvarez-Rodríguez, R. Colomo-Palacios
{"title":"Assessing Professional Skills in a Multi-scale Environment by Means of Graph-Based Algorithms","authors":"J. Álvarez-Rodríguez, R. Colomo-Palacios","doi":"10.1109/ENIC.2014.12","DOIUrl":"https://doi.org/10.1109/ENIC.2014.12","url":null,"abstract":"The present paper introduces a study of different techniques to assess professional skills in social networks and to align those user skills with existing multi-scale knowledge classifications. Currently both job seekers and talent hunters are looking for new and innovative techniques to filter jobs and candidates as well as candidates are also trying to improve and make more attractive their profiles. In this environment it is necessary to provide new techniques to assess the quality of professional skills depending on user's activity and to compare with existing scales. To do so some relevant graph-based techniques such as the HITS and the SPEAR algorithms have been used for calculating the confidence of a certain user in a particular skill. Moreover a new re-interpretation of the SPEAR algorithm, called Skill rank, is introduced to take advantage of user's behavior and history. A major outcome of this approach is that expertise and experts can be detected, verified and ranked using a suited trust metric. The paper also presents a validation of the Skill rank accuracy by means of a sound qualitative and quantitative comparison with existing approaches based on the opinions of a panel of experts (3) on a real dataset (created using the Linked in API) and two different scales. Although results show in general low values of accuracy (close to 50% of correct classified skills), the Skill rank technique is more accurate than other techniques to align a user skill in a certain scale of knowledge. Finally some discussion, conclusions and future work are also outlined.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133935837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Effect of High Order Reputation Information on Trust Prediction in Wikipedia's Vote Network 高阶声誉信息对维基百科投票网络信任预测的影响
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.13
J. Nuñez-Gonzalez, M. Graña
{"title":"On the Effect of High Order Reputation Information on Trust Prediction in Wikipedia's Vote Network","authors":"J. Nuñez-Gonzalez, M. Graña","doi":"10.1109/ENIC.2014.13","DOIUrl":"https://doi.org/10.1109/ENIC.2014.13","url":null,"abstract":"When a user (the truster) in a social network is trying to solve the problem of guessing whether he/she will trust or not another user (the trustee) when he/she has not direct experience of the trustee behavior, then the truster is facing a Trust prediction problem. In this paper we deal with this problem as a classification problem based on reputation features of the target trustee. Reputation refers to the opinion that a third person (a witness) may have about the target trustee. Second and higher order reputation information comes from witnesses which have no direct contact with the trustee. The differences in the spread of relationships among users produce variable size reputation feature vectors, according to the relationships of each user. We propose probabilistic descriptors of the reputation information in order to reduce the feature vectors to the same size. In this paper we explore the prediction of Trust training some classifiers with reputation features extracted from first and second order relationships. We conclude that second order reputation features do not improve classification significatively.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130261541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Social Network Analysis to Unveil Cartels in Public Bids 利用社会网络分析揭示公开投标中的卡特尔
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.11
A. C. Gabardo, H. S. Lopes
{"title":"Using Social Network Analysis to Unveil Cartels in Public Bids","authors":"A. C. Gabardo, H. S. Lopes","doi":"10.1109/ENIC.2014.11","DOIUrl":"https://doi.org/10.1109/ENIC.2014.11","url":null,"abstract":"In recent years, the study of complex networks has attracted great attention. Several fields of science have used techniques of social network analysis and complex networks to represent a wide range of structures such as, social networks, political influence, communication, epidemics and several other aspects of human behavior. Most of the complex networks show community structures. Revealing these communities is highly relevant to understanding several social phenomena such as the organizing of groups, the flow of information and the strength of the influence of some members over the group. In this article, we use techiques of social network analysis and complex networks to represent the relationship between companies that are participating in public bids to unveil community structures analog to cartels. Several nations are facing injuries trough the misuse of public money caused by the formation of cartels, which are groupings of companies aiming to defraud the free competition. Our main goal in this work is to present a methodology for identifying these communities. Furthermore, we aim to address whether companies that have high success rates in public bids are grouped and identify whether they are taking advantage of their influence in the network.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124096096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Network Approach to Marriage/Divorces Problem 婚姻/离婚问题的动态网络研究
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.24
A. Jarynowski, P. Nyczka
{"title":"Dynamic Network Approach to Marriage/Divorces Problem","authors":"A. Jarynowski, P. Nyczka","doi":"10.1109/ENIC.2014.24","DOIUrl":"https://doi.org/10.1109/ENIC.2014.24","url":null,"abstract":"We extend \"stable marriage problem\" studied via computer simulation (agent-based) from network perspective by dynamical generalization. We investigate how preferential or random attachment of individuals can affect simulation results such as: proportion of singles in society, number of divorces etc. We took into account attractiveness of individuals and its different types as well as personal taste. Current value of socio-economic pressure p (main model parameter) drives the dynamic of first marriage, remarriage or spontaneously marriage breaks up. Model reflects the behavior of the simplified heterosexual population (frequency of changing partners, the ratio of singles in society). Theoretical agent-based simulation (with populational approaches, e.g. Births and deaths) should be later supplemented by historical values of divorces/marriages in different countries of the world. Stable (constant) society was also implemented to show difference with \"living\" society. In this model, agents have attribute of attraction. Preferential attachment, known from network theory, was introduced, to mimic selection process. Additionally, totally random attachment (not attraction-depended) was also implemented for contrast.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Privacy-Preserving Framework for Mining Continuous Sequences in Trajectory Systems 轨迹系统中连续序列挖掘的隐私保护框架
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.16
Pawel Jureczek, Adrianna Kozierkiewicz-Hetmanska
{"title":"A Privacy-Preserving Framework for Mining Continuous Sequences in Trajectory Systems","authors":"Pawel Jureczek, Adrianna Kozierkiewicz-Hetmanska","doi":"10.1109/ENIC.2014.16","DOIUrl":"https://doi.org/10.1109/ENIC.2014.16","url":null,"abstract":"The popularization of mobile devices and satellite navigation systems has brought new opportunities and challenges to many location-based services (LBSs), intelligent transport systems (ITSs) and fleet management systems. Those systems store trajectory data in moving object databases and trajectory data warehouses. Trajectory datasets can be used in many data mining tasks, e.g., for mining traffic patterns, frequently visited places, and so on. However, such data mining tasks introduce security and location privacy threats to companies (data owners) and mobile objects that generate trajectories. In this paper, in order to overcome the location privacy threats, we present a technique that blurs trajectories according to user-defined privacy profiles and a data mining algorithm called MCSPP that is capable of mining continuous sequences from blurred trajectories. To test that our approach works correctly, we have implemented an experimental environment. Moreover, the conducted experiments have shown a good performance and scalability of the MCSPP algorithm.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125187883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foresighted Heat Ring: Tracking the Productivity and Collaborativeness of Researchers in Dynamic Networks 前瞻性热环:动态网络中研究人员生产力和协作性的跟踪
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.23
Alfredo Ramos Lezama, Tilman Göhnert, Sam Zeini, H. Hoppe
{"title":"Foresighted Heat Ring: Tracking the Productivity and Collaborativeness of Researchers in Dynamic Networks","authors":"Alfredo Ramos Lezama, Tilman Göhnert, Sam Zeini, H. Hoppe","doi":"10.1109/ENIC.2014.23","DOIUrl":"https://doi.org/10.1109/ENIC.2014.23","url":null,"abstract":"In this paper, we present the design, implementation and an evaluation of the \"Foresighted Heat Ring\", a technique for visualizing the productivity and collaborative ness of researchers in dynamic networks. Our approach combines a heat map and a foresighted radial layout with physiological theories of visual perception to achieve visual stability on the drawing. The technique has been embedded into a network analysis workbench and applied to a time-sliced nanotechnology publication network from Web of Science. Based on this scenario, an evaluation with twenty participants was conducted. The results suggest that there are three factors that allow a visualization technique to be perceived as stable.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characteristics of Terrorists Networks Based on Ideology and Practices 基于意识形态与实践的恐怖主义网络特征
2014 European Network Intelligence Conference Pub Date : 2014-09-29 DOI: 10.1109/ENIC.2014.34
Fatih Özgül, C. Bowerman
{"title":"Characteristics of Terrorists Networks Based on Ideology and Practices","authors":"Fatih Özgül, C. Bowerman","doi":"10.1109/ENIC.2014.34","DOIUrl":"https://doi.org/10.1109/ENIC.2014.34","url":null,"abstract":"Due to the interest by public audience and academic research, there has been a great interest in Terrorist Networks by the academicians, analysts and criminologists. Either to learn how to disrupt or to prevent their activities, structure of these networks are investigated. The final conclusion about their structure and topology came to the fact that they do not resemble each other, but there are categories of them. In this paper, we categorized these networks into six because of their ideologies and common practices. Example terrorist groups are also discussed.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信