Andrzej Janusz, D. Ślęzak, Sebastian Stawicki, K. Stencel
{"title":"SENSEI: An Intelligent Advisory System for the eSport Community and Casual Players","authors":"Andrzej Janusz, D. Ślęzak, Sebastian Stawicki, K. Stencel","doi":"10.1109/WI.2018.00010","DOIUrl":"https://doi.org/10.1109/WI.2018.00010","url":null,"abstract":"In this article, we describe the SENSEI system. It helps players to improve their skills in popular eSports games. We discuss the main goals of the system and explain the associated challenges. We also present its conceptual architecture which aims at enabling full automation of the data acquisition and analytic processes. The system is expected to provide in-depth analytics of players' performance and give practical advice regarding possible improvements. Thus its architecture allows players to provide feedback and manually label important concepts. Finally, we discuss our first case study - an advisory system for popular collectible card video games.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topical Cluster Discovery in Semistructured Healthcare Data","authors":"G. Costa, R. Ortale","doi":"10.1109/WI.2018.00014","DOIUrl":"https://doi.org/10.1109/WI.2018.00014","url":null,"abstract":"We propose an approach to clustering XML-based corpora of healthcare documents by their latent topic similarity. Our approach is a two-step process. Initially, the latent topic distributions of the input healthcare documents are inferred, by performing collapsed Gibbs sampling and parameter estimation under an XML topic model. Subsequently, the inferred distributions are grouped through established clustering techniques.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124361744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guilherme Baesso Moreira, Vanusa Menditi Calegario, J. C. Duarte, A. F. P. D. Santos
{"title":"Extending the VERIS Framework to an Incident Handling Ontology","authors":"Guilherme Baesso Moreira, Vanusa Menditi Calegario, J. C. Duarte, A. F. P. D. Santos","doi":"10.1109/WI.2018.00-55","DOIUrl":"https://doi.org/10.1109/WI.2018.00-55","url":null,"abstract":"Statistics show that while large amounts of money are being invested in cybersecurity, the number of incidents continues to grow, with cyber attacks motivated by political and financial issues, many times funded by States as part of cyberwarfare. Although the general perception is that the occurrence of incidents is almost inevitable, the literature demonstrates that cybersecurity initiatives are often focused on prevention of incidents rather than its response, with many organizations often poorly prepared and ignoring key incident handling processes. Some initiatives were proposed in order to fill this gap, one of them being the VERIS framework, a \"vocabulary for event recording and incident sharing.\" VERIS goal is to provide a basis for incident documentation, at the same time allowing the sharing of anonymized data to a community database, hence providing metrics for use within organizations or among external parties. As VERIS is a framework focused on information gathering and sharing, this work proposes the extension of the model from its original JSON representation to an OWL ontology, one of the main tools of the Semantic Web initiative, used for knowledge representation and strongly tied to the idea of information sharing. This work focus on the advantages of using such representation for incident handling.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127080264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Semantic Relationships in Folksonomies","authors":"Iman Saleh, Neamat El-Tazi","doi":"10.1109/WI.2018.00-92","DOIUrl":"https://doi.org/10.1109/WI.2018.00-92","url":null,"abstract":"In this paper we study the problem of finding semantic relationships between folksonomy tags. We investigate different methods used to embed tags in the vector space and find similarities between them using word embedding vectors. We also present two new methods for embedding tags in the vector space utilizing labeled Latent Dirichlet Allocation (LDA) and Wikipedia category links. Related tags are grouped into communities using an overlapping community detection technique. In order to evaluate tag embedding methods, we use three different evaluation metrics, two of them do not require a ground truth dataset and the third is based on a manually created dataset of ground truth communities. Our results show that representing folksonomy tags using bag of words and embedding this representation in the vector space yields the best results compared to embedding co-occurring tags only or embedding tags along with textual content of tagged documents. We also compare between using word embedding, Latent Semantic Indexing (LSI), and LDA to find similarities between bag of words representations of tags. We show that word embedding outperforms LSI in one representation, while LDA is hard to beat.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123659153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liqing Liu, Haiyan Zhou, Minghui Zhang, Jiajin Huang, Lei Feng, Ning Zhong
{"title":"Resting EEG Features and Their Application in Depressive Disorders","authors":"Liqing Liu, Haiyan Zhou, Minghui Zhang, Jiajin Huang, Lei Feng, Ning Zhong","doi":"10.1109/WI.2018.00-74","DOIUrl":"https://doi.org/10.1109/WI.2018.00-74","url":null,"abstract":"This research is aimed to analysis the resting EEG features in depression and the application in clinic. Sixteen patients with depression and sixteen healthy controls were involved in this study. Both features from the alpha and beta frequency bands were selected to analysis in this study. First the features' sensitivity to the group-difference and the correlation to the clinical HAMD scale score were analyzed, and then the classification method was used to further test the role of the resting EEG features in depression. The results showed that the difference between depression and healthy controls in the absolute power of beta band in the left prefrontal lobe was significant. And the alpha left-right asymmetry in the prefrontal cortex had a correlation with HAMD scale score. In addition, the classification based on the features showed that there was a relative higher accuracy rate to identify the depressions than to identify the healthy controls. Specifically, the classification based on alpha asymmetry was higher than that based on beta asymmetry, and the absolute power in beta band was higher than that in alpha band. Alpha asymmetry is a traditional sensitive resting EEG features for depression, this study provide new evidence to support the view. The findings here further suggest that absolute power in beta band would be important biomarker in depression.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116045810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Identification of Type-Specific Dependencies between Requirements","authors":"Muesluem Atas, Ralph Samer, A. Felfernig","doi":"10.1109/WI.2018.00-10","DOIUrl":"https://doi.org/10.1109/WI.2018.00-10","url":null,"abstract":"Requirements Engineering is one of the most important phases in a software project. The elicitation of requirements and the identification of dependencies between these requirements appears to be a challenging task. In this paper, we present an approach to automatically identify requirement dependencies of type requires by using supervised classification techniques. Our results indicate that the implemented approach can detect potential requires dependencies between requirements (formulated on a textual level). We evaluated our approach on a test dataset and figured out that it is possible to identify requirement dependencies with a high prediction quality. We trained and tested our system with different classifiers such as Naive Bayes, Linear SVM, k-Nearest Neighbors, and Random Forest. The results show that Random Forest classifiers correctly predict dependencies with a F1 score of ~82%.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116193821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain for Trustworthy Coordination: A First Study with LINDA and Ethereum","authors":"Giovanni Ciatto, S. Mariani, Andrea Omicini","doi":"10.1109/WI.2018.000-9","DOIUrl":"https://doi.org/10.1109/WI.2018.000-9","url":null,"abstract":"Blockchain technologies are rapidly gaining attention in the multi-agent systems (MAS) community to face critical issues such as trust, secured communications, and data consistency. In particular, the notion of smart contract can be exploited to deploy trustworthy computations automatically executed by the network in a consistent way. MAS coordination - modelling and engineering of agents interaction in a MAS - thus represents an appealing application field for smart contracts, potentially enabling fully-decentralised, trustworthy coordination. Along this line, we focus on the Ethereum blockchain technology, map it onto LINDA tuple-based coordination model, and discuss two proof-of-concept implementations of LINDA on Ethereum. We hence demonstrate conceptual and technical feasibility of blockchain-based coordination in MAS, while emphasising issues of applying the blockchain beyond accountability and identity management.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129427147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boosting Reinforcement Learning in Competitive Influence Maximization with Transfer Learning","authors":"Khurshed Ali, Chih-Yu Wang, Yi-Shin Chen","doi":"10.1109/WI.2018.00-62","DOIUrl":"https://doi.org/10.1109/WI.2018.00-62","url":null,"abstract":"Companies aim to promote their products under competitions and try to gain more profit than other companies. This problem is formulated as a Competitive Influence Maximization (CIM). Recently, a reinforcement learning has been used to solve the CIM problem, that is, to find an optimal strategy against competitor in order to maximize the commutative reward under the competition from other agents. However, reinforcement learning agents require huge training time to find an optimal strategy whenever the settings of the agents or the networks change. To tackle this issue, we propose a transfer learning method in reinforcement learning to reduce the training time and utilize the knowledge gained on source network to target network. Our method relies on two ideas, the first one is the state representation of the source and target networks in order to efficiently utilize the knowledge gained on source network to target network. The second idea is to transfer the final Q-solution of source network while learning on the target network. We validate our transfer learning method in similar or different settings of source and target networks while competing against the competitor's known strategies. Experimental results show that our proposed transfer learning method achieves similar or better performance as a baseline model while significantly reducing training time in all settings.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130353109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Air Pollutant Severity Prediction Using Bi-Directional LSTM Network","authors":"Ishan Verma, Rahul Ahuja, Hardik Meisheri, Lipika Dey","doi":"10.1109/WI.2018.00-19","DOIUrl":"https://doi.org/10.1109/WI.2018.00-19","url":null,"abstract":"Air pollution has emerged as a universal concern across the globe affecting human health. This increasing danger motivates the study of systems for predicting air pollutant severities ahead of time. In this paper, we have proposed the use of a bi-directional LSTM model to predict air pollutant severity levels ahead of time. We have shown that the predictions can be significantly improved using an ensemble of three Bi-Directional LSTMs (BiLSTM) that model the long-term, short-term and immediate effects of PM2.5 (the key air pollutant) severity levels. Further, weather information data has been taken into account while modelling, since they are found to boost prediction accuracies. Experimental results for multiple locations in New Delhi, India are presented to demonstrate model superiority over earlier techniques.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129177915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SNS Retrieval Based on User Profile Estimation Using Transfer Learning from Web Search","authors":"Daisuke Kataoka, Keishi Tajima","doi":"10.1109/WI.2018.00-79","DOIUrl":"https://doi.org/10.1109/WI.2018.00-79","url":null,"abstract":"In this paper, we propose a method of retrieving posts on social networking services (SNSs) by specifying a pair of queries: a topic query and an entity query. A topic query specifies the topic of the posts to retrieve (e.g., \"iPhone\") and an entity query specifies the type of users who posted them (e.g., \"students\"). In the existing search systems for SNS posts, we can specify topics of posts by keywords, but we cannot specify types of users. Even if we include keywords specifying types of users in a query, such keywords are not usually included in tweets or user profile data. In our method, we estimate types of users by learning vocabulary whose appearance is correlated with specific types of users. We learn it from the datasets obtained through Web search. We retrieve Web documents through the search with a keyword specifying the type of users (e.g., \"student\"), and we also retrieve Web documents by using a keyword specifying its opposite (e.g., \"adult\"). We regard the documents retrieved by these queries as positive and negative examples of documents describing the target type, and we train a model for recognizing users of the given type. We recognize users of the target type by inputting their posts and their profile data into the model. We use Web documents instead of SNS posts for training the model because the Web has more documents describing types of people.","PeriodicalId":405966,"journal":{"name":"2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}