SlideShare a Scribd company logo
1 of 47
Trust in Pervasive  Social Computing Licia Capra Dept of Computer Science University College London
EVOLUTION OF MOBILE TECHNOLOGY
TRANSFORMATION OF INTERNET USERS
A DIGITAL  TAPESTRY
PERVASIVE SOCIAL COMPUTING
A DIGITAL TAPESTRY ,[object Object],[object Object]
A DIGITAL TAPESTRY ,[object Object],[object Object]
CONNECTING SYPPLY & DEMAND ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COLLABORATIVE FILTERING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOCIAL NETWORKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE  TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the  Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B C D Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B X Y Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
= Intent & Competence
PHILOSOPHY OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A D X Y Direct Trust for Judgements Direct Trust for Users C B Inferred Trust for Judgements
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],X A B C D ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd. “ The PageRank Citation Ranking: Bringing Order to the Web”. Stanford Digital Library. 1998
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],J. M. Kleinberg. “Authoritative Sources in a Hyperlinked Environment”. Journal of the ACM, 1999 ,[object Object],[object Object],0.25 0.25 0.25 0.25 0.75 0.25 0.50 0.25 0.75 1.00 1.25 0.75 0.20 0.27 0.33 0.20
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],R. Lempel and S. Moran. “SALSA: the Stochastic Approach to for Link Structure Analysis”. ACM TOIS, 2001
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.5,   =0.3 for SOFIA;   =0.3 for PPR;   =0.05 for N-SOFIA 1709 115 30 8 2 1 PPR 1136 63 12 3 1 1 N-SOFIA 855 31 4 1 1 1 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.9,   =0.05 for SOFIA;   =0.5 for PPR;   =0.01 for N-SOFIA 16025 2188 344 66 12 5 PPR 6954 822 157 32 6 2 N-SOFIA 7429 992 174 32 6 2 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ROBUSTNESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS Lower values of    improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
UNLOCKING THE  TAPESTRY
UNLOCKING THE TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY Evaluate Browse Build
UNLOCKING THE TAPESTRY HOW TO  BUILD  AN UNLOCKED TAPESTRY
HOW TO BUILD AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  BROWSE  AN UNLOCKED TAPESTRY
HOW TO BROWSE AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  EVALUATE  OUR APPROACHES
HOW TO EVALUATE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK YOU! ,[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness Presentation
Licia Capra
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf Presentation
Liquis
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishing
jeannebarker
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementu
WebExpo
 

Viewers also liked (16)

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness Presentation
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf Presentation
 
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
 
Tomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuTomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designu
 
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraPetr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishing
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementu
 
Hotmail Add Other Account
Hotmail Add Other AccountHotmail Add Other Account
Hotmail Add Other Account
 
Jakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorJakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with Phabricator
 
Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015
 
Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!
 
WebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo 2008 Glogster
WebExpo 2008 Glogster
 
Lukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleLukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživatele
 
Jakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchJakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiích
 
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánJiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
 
Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?
 

Similar to ARM'08 - Keynote Talk

TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
Lora Aroyo
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Nicolas Kourtellis
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
Wael Elrifai
 

Similar to ARM'08 - Keynote Talk (20)

Content-based link prediction
Content-based link predictionContent-based link prediction
Content-based link prediction
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Telefonica Lunch Seminar
Telefonica Lunch SeminarTelefonica Lunch Seminar
Telefonica Lunch Seminar
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network Sites
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyo
 
Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
 
Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
A recommender system for social learning platforms
A recommender system for social learning platformsA recommender system for social learning platforms
A recommender system for social learning platforms
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Ppt
PptPpt
Ppt
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence
 
Learning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksLearning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction Networks
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

ARM'08 - Keynote Talk

  • 1. Trust in Pervasive Social Computing Licia Capra Dept of Computer Science University College London
  • 2. EVOLUTION OF MOBILE TECHNOLOGY
  • 4. A DIGITAL TAPESTRY
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. BROWSING THE TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. = Intent & Competence
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 35. EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 36. EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 37. EXPERIMENTS – ROBUSTNESS Lower values of  improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 38. UNLOCKING THE TAPESTRY
  • 39.
  • 40. UNLOCKING THE TAPESTRY Evaluate Browse Build
  • 41. UNLOCKING THE TAPESTRY HOW TO BUILD AN UNLOCKED TAPESTRY
  • 42.
  • 43. UNLOCKING THE TAPESTRY HOW TO BROWSE AN UNLOCKED TAPESTRY
  • 44.
  • 45. UNLOCKING THE TAPESTRY HOW TO EVALUATE OUR APPROACHES
  • 46.
  • 47.