{"title":"Can We Replace Programming Languages by Natural Instruction?","authors":"Tom Michael Mitchell","doi":"10.1145/3486622.0000003","DOIUrl":"https://doi.org/10.1145/3486622.0000003","url":null,"abstract":"Now that computers are finally able to have simple conversations, it is time to explore the potential for replacing programming languages with natural language instruction. For example, less than 1% of phone users can program their phone to do new things for them, but if this line of research succeeds we might change that to 99%. This talk will describe our recent research exploring how we might enable phone users to teach their phones to perform new commands, using natural language interaction together with demonstrations. This line of research represents a paradigm of ``conversational machine learning'' that complements current data-intensive statistical approaches. If successful, it has implications for many types of computer interfaces, from giving users more control over their smart phones, to a providing a new generation of teachable web browsers. This talk covers joint work with Igor Labutov, Forough Arabshahi, Brad Meyers, Shashank Srivastava, Toby Li, Jennifer Lee, Antoine Bosselut, and Yeijin Choi.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87672354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Query Obfuscation with Keyqueries","authors":"Maik Fröbe, Eric Schmidt, Matthias Hagen","doi":"10.1145/3486622.3493950","DOIUrl":"https://doi.org/10.1145/3486622.3493950","url":null,"abstract":"Search engine users who do not want a sensitive query to actually appear in a search engine’s query log can use query obfuscation or scrambling techniques to keep their information need private. However, the practical applicability of the state-of-the-art obfuscation technique is rather limited since it compares hundreds of thousands of candidate queries on a local corpus to select the final obfuscated queries. We propose a new approach to query obfuscation combining an efficient enumeration algorithm with so-called keyqueries. Generating only hundreds of candidate queries, our approach is orders of magnitude faster and makes close to real-time obfuscation of sensitive information needs feasible. Our experiments in TREC scenarios on the ClueWeb corpora show that our approach achieves a retrieval effectiveness comparable to the previous exhaustive candidate generation at a run time of only seconds instead of hours. Overall, 75% of the private information needs can be obfuscated while retrieving at least one relevant document of the original private query—that itself will not appear in the search engine logs. To further improve a user’s privacy, the query obfuscation can easily be combined with other client-side tools like TrackMeNot or PEAS fake queries, and TOR routing.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91379355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Computational Agent Model for Temporal Dynamic Analysis in Virtual Community Cohesion","authors":"A. A. Aziz, N. Yusop, Zahurin Mat Aji, Z. Dahalin","doi":"10.1145/3498851.3498925","DOIUrl":"https://doi.org/10.1145/3498851.3498925","url":null,"abstract":"Community cohesion is a broad concept that commonly connotes better relationships among people of different backgrounds. It has resulted in long-term interactions amongst the participating community members, commonly in the physical community. The relationships among agents were represented as a conceptual model for virtual community cohesion, and those relationships were then modelled using a set of formal specifications. Later, the simulator was used to explore exciting patterns and traces that explain the agent model's behaviour related to virtual community cohesion as asserted in related literature. These traces show the necessary what-if conditions as the resulting input-output collaboration patterns in the entire virtual community cohesion emerge. Moreover, this computational agent model has been evaluated using mathematical analysis (whereby theoretical and value substitution analyses are performed) and automated logical verification (internal validation based on previous empirical studies). The simulation traces and patterns provide indications that the internal validation has been successful.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"253 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82927470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Neural Correlations Between Numerical Induction and Letter Induction Based on Data-Brain Driven Integration Evidence","authors":"Lianfang Ma, Jianhui Chen, Ning Zhong","doi":"10.1145/3498851.3498969","DOIUrl":"https://doi.org/10.1145/3498851.3498969","url":null,"abstract":"Numerical induction and letter induction are two kinds of important subtypes of induction. Analyzing their neural correlations is very important for understanding the common mechanism of induction. Previous comparative studies on number cognition and letter comprehension were mainly based on a group of comparative experiment designs and their neuroimaging data. However, because of the many-to-many structure-function relationships, it is difficult to understand neural correlations between number cognition and letter comprehension, especially in complex cognitive functions, such as induction, only based on single-task or few-task neuroimaging data within an experimental lab. This paper proposes a systematic approach to analyze the similarity and disimilarity of neural pattern between numerical and letter induction by using Data-Brain driven integration evidence. Under the four dimensions of Data-Brain, a group of internal and external evidence is collected. A three stages multi-task analytical method is proposed to understand the similarity and disimilarity of neural pattern between numerical and letter induction, by combining meta-analysis and representational similarity. Results show that more activation specific for inductive reasoning is left MFG and IFG. And number inductive reasoning and letter inductive reasoning have high neural pattern similarity in the IFG and MFG, and a significant main effect of inductive reasoning is in the left MFG. Other hand, the method can supplementary proof some results, it has important implications for understand the brain mechanism of information processing.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89922389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Domain Attentive Sequential Recommendations based on General and Current User Preferences (CD-ASR)","authors":"Nawaf Alharbi, Doina Caragea","doi":"10.1145/3486622.3493949","DOIUrl":"https://doi.org/10.1145/3486622.3493949","url":null,"abstract":"Sequential Recommendations (SR) have become increasingly important because of their accuracy and consistency with real world scenarios, where a user interacts with a sequence of items over time. SR systems have the capability of modeling temporal information to extract user’s current preferences. However, data sparsity is a real challenge for SR models, causing them to sometimes function poorly and generate inaccurate recommendations. A practical solution to this problem is to transfer information from multiple source domains to tackle the sparsity in the target domain, an approach known as Cross-Domain Recommendations (CDR). Extracting users’ preferences from different domains in a sequential manner can help generate an effective CDR for sequential models. In this paper, we propose a Cross-Domain Attentive Sequential Recommendation model based on general and current user preferences (CD-ASR). We assume the user information from the source domains to be a user’s general information, and apply a general attention model to aggregate user source representational vectors. At the same time, we apply a self-attention sequential model to obtain user’s current preferences in the target domain. Implicitly, we utilize the aggregated user’s source vectors to transfer knowledge to produce more precise recommendation in the target domain. Our model shows superiority over other state-of-the-art SR models using three datasets extracted from Amazon dataset.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89952865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VBNet: A VLC Enabled Hybrid Data Center Network","authors":"Jie Li, Xiaoyu Du, Zhijie Han","doi":"10.1145/3498851.3498999","DOIUrl":"https://doi.org/10.1145/3498851.3498999","url":null,"abstract":"Visible Light Communication (VLC) has the potential to provide dense and fast connectivity at low cost. In this paper, we propose a novel VLC-enabled hybrid data center network VBNet. It extends the design of wireless data center networks further into three aspects: (1) full wireless: server level is completely wireless; (2) easy to deploy: no need to change the existing infrastructure in the data center; (3) plug-and-play: no additional centralized control operations. VLC link reduces the path length of communication between servers and improves network performance. The unicast and multicast routing of VBNet are also given. Using VLC links can avoid hierarchical switches and cables and reduce hardware investment and maintenance costs.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"218 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77692021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexander Pinto-De la Gala, Yudith Cardinale, Irvin Dongo
{"title":"CURIOCITY Framework: Managing Heterogeneous Cultural Heritage Data","authors":"Alexander Pinto-De la Gala, Yudith Cardinale, Irvin Dongo","doi":"10.1145/3486622.3494001","DOIUrl":"https://doi.org/10.1145/3486622.3494001","url":null,"abstract":"The huge amount of data managed by information tools and services of cultural heritage, demands the use of a more complex and formal knowledge representation, such as ontologies. However, existing platforms, aimed at supporting the management of semantic knowledge and the development of applications are limited, and mainly focused on serving a single user application. In this context, we propose CURIOCITY Framework, a platform to manage semantic knowledge and support applications in the context of cultural heritage. We implement a first version of our framework to demonstrate that it meets the objectives of storage, data management, mapping, population, and query handling. Moreover, a time response evaluation shows that it is possible to attend queries in an appropriate way according to application requirements.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"2009 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82577205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Calvaresi, Stefan Eggenschwiler, J. Calbimonte, Gaetano Manzo, M. Schumacher
{"title":"A personalized agent-based chatbot for nutritional coaching","authors":"D. Calvaresi, Stefan Eggenschwiler, J. Calbimonte, Gaetano Manzo, M. Schumacher","doi":"10.1145/3486622.3493992","DOIUrl":"https://doi.org/10.1145/3486622.3493992","url":null,"abstract":"Intelligent systems increasingly support users’ behavior change, including exercise adherence, smoking cessation, and healthy diet adoption. Their effectiveness is affected by the personalization degree of advice/coaching and HMI mechanisms. This paper proposes a personalized agent-based chatbot platform assisting the user in healthy nutrition via pervasive technologies leveraging dynamical, multi-modal, and personalized interactions. The system provides diet recommendations and tracks the user’s food intake and nutritional behaviors to promote a healthy lifestyle. The study concludes with a user study and performance evaluation.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"221 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73053101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Razieh Nokhbeh Zaeem, Kai-Chi Chang, Teng-Chieh Huang, David Liau, Wenting Song, Aditya Tyagi, Manah M. Khalil, Michael R. Lamison, Siddharth Pandey, K. S. Barber
{"title":"Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study","authors":"Razieh Nokhbeh Zaeem, Kai-Chi Chang, Teng-Chieh Huang, David Liau, Wenting Song, Aditya Tyagi, Manah M. Khalil, Michael R. Lamison, Siddharth Pandey, K. S. Barber","doi":"10.1145/3486622.3493917","DOIUrl":"https://doi.org/10.1145/3486622.3493917","url":null,"abstract":"Identity is at the heart of digital transformation. Successful digital transformation requires confidence in and protection of digital identities. On the Internet, however, there is no unique and standard identity layer. Consequently, a variety of digital identities have emerged over years, leading to privacy risks, security vulnerabilities, risks for identity owners, and liability for identity issuers and those relying on digital identities to grant access to goods and services. Self-Sovereign Identity (SSI) and similar forms of identity management on the blockchain distributed ledger are novel technologies that recognize the need to keep user identity privately stored in user-owned devices, securely verified by identity issuers, and only revealed to verifiers as needed. There is limited academic literature defining the prerequisite SSI functional and non-functional requirements and comparing SSI technologies. Often those SSI technologies reviewed in the literature lack behind current advances. We present the first work that compiles a comprehensive list of functional and non-functional requirements of SSI and compares an extensive number of existing SSI/blockchain-based identity management solutions with respect to these requirements. Our work sheds light on the state-of-the-art SSI development and paves the way for future, more informed analysis and development of novel identity management and SSI solutions.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79063121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Segmentation-based Phishing URL Detection","authors":"Eint Sandi Aung, H. Yamana","doi":"10.1145/3486622.3493983","DOIUrl":"https://doi.org/10.1145/3486622.3493983","url":null,"abstract":"Uniform resource locators (URLs), used for referencing web pages, play a vital role in cyber fraud because of their complicated structure; phishers, or in other words, attackers, employ tricky by-passing techniques to deceive users. Thus, information extracted from URLs might indicate significant and meaningful patterns essential for phishing detection. To enhance the accuracy of URL-based phishing detection, we need an accurate word segmentation technique to split URLs correctly. However, in contrast to traditional word segmentation techniques used in natural language processing (NLP), URL segmentation requires meticulous attention, as tokenization, the process of turning meaningless data into meaningful data, is not as easy to apply as in NLP. In our work, we concentrate on URL segmentation to propose a novel tokenization method, named URL-Tokenizer, by combining the Bert tokenizer and WordSegment tokenizer, in addition to adopting character-level and word-level segmentations simultaneously. Our experimental evaluations in detecting the phishing URLs show that our proposed method achieves a high accuracy of 95.7% with a balanced dataset, and 97.7% with an imbalanced dataset, whereas baseline models achieved 85.4% with a balanced dataset and 85.1% with an imbalanced dataset.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"263 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79692982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}