SlideShare a Scribd company logo
1 of 26
Download to read offline
An Algorithm to Determine Peer-Reviewers



        Marko A. Rodriguez and Johan Bollen
    Digital Library Research and Prototyping Team
           T-7, Center for Nonlinear Studies
            Los Alamos National Laboratory

                  October 25, 2008
Peer-Review Problem Statement

• Editors are overwhelmed due to the number of submissions.
    Provide mechanisms to decentralize the peer-review process [10].

• Editors have a difficult time locating referees who know the domain of
  discourse and do not have a ethical conflict with reviewing the submission.
    Automate the referee identification problem [9].




              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Hypothesis

• It is hypothesized that the authors of the cited articles and their coauthors
  are good referees.
• It is hypothesis that conflict of interest referees are considered the authors
  of the article and their coauthors.

With respect to the article associated with this presentation:

• David Yarowsky, Radu Florian, Fabio Crestani, Tamara Sumner, etc. are
  considered competent referees.
• Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel, Xiaoming
  Liu, Michael Nelson, etc. are considered conflict of interest referees.


               Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Outline

• Define the coauthorship network data structure.

• Define the particle-swarm algorithm.

• Present experimental results validating the proposed algorithm.

• Related work and conclusion.




              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Outline

• Define the coauthorship network data structure.

• Define the particle-swarm algorithm.

• Present experimental results validating the proposed algorithm.

• Related work and conclusion.




              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
A Scholarly Coauthorship Network

                                                       Author-D
                          Author-B




                                                                            Author-F
                                     Author-C




               Author-A

                                                         Author-E




All edges have a single homogenous meaning of “coauthor”. If Author-A
and Author-B have written an article together, then they are considered
coauthors.

              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
A Scholarly Coauthorship Network
Our coauthorship network is defined as

                                      G = (V, E, ω),

where V is the set of vertices, E ⊆ (V × V ), and ω : E → R+. The
function rule for ω is
                                                                     1
                ω(i, j) = ω(j, i) →                                        ,
                                                                  α(m) − 1
                                               ∀m∈M by i,j


where M is the set of all manuscripts and α : M → N+ maps each
manuscript to the total number of authors for that manuscript. Thus, the
more authors on an article, the less “coauthor weight” exist between them
with respect to that article [5, 7, 6].

              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
A Scholarly Coauthorship Network

Finally the weight of all edges outgoing from a vertex are normalized to
form a probability distribution over the outgoing edge set. Thus, for a
particular vertex i,
                               ω : E → [0, 1]
such that
                                                     ω(i, j)
                                 ω (i, j) →                    ,
                                                     k ω(i, k)
where ω (i, j) need not equal ω (j, i).




               Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Outline

• Define the coauthorship network data structure.

• Define the particle-swarm algorithm.

• Present experimental results validating the proposed algorithm.

• Related work and conclusion.




              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
A Particle Swarm Algorithm


                                                 0.75


                                                                   1.0

                              0.5                0.25


                                                                  1.0


                              0.5


                                                                   1.0

                                                 1.0




                    t=1                t=2               t=3                t=4




A particle begins its journey at a particular vertex and will take an
outgoing edge of its current vertex biased by the outgoing probability
distribution defined over the outgoing edge set. Moreover, at each discrete
timestep in N+ the particle decays in energy.

              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
A Particle Swarm Algorithm
The set of all particles in the network is P where pi ∈ P is the ith particle.
The properties of an individual particle include:

1. ci(t) ∈ V : is the location of the particle pi at time t.

2.   i (t)∈ R: is the amount of energy contained within the particle pi at
     time t.

3. δi ∈ [0, 1]: is the decay parameter governing the loss of energy as the
   particle pi propagates through the network. This is a globally defined
   parameter in our experiment with decay set to ∀iδi = 0.15.

4. particles can maintain state and have heterogenous internal logics to
   perform more complex walks.

                Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
A Particle Swarm Algorithm
The algorithm runs for k timesteps. At each step, the particle has its
energy decayed such that

                                         (1 − δi) i(t)          if t ≤ k
                     i (t + 1) =
                                         0                      otherwise

Finally, there exists a global rank vector e ∈ R|V | that records how much
energy has passed through each vertex.

                          eci(t)(t + 1) = eci(t)(t) + i(t)

Thus,
                    t≤k i≤|P |
                                     (1 − δi)t−1 i(1)             if ci(t − 1) = nl
          el(k) =
                    t=1 i=1
                                     0                            otherwise.

              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Experimental Results
                  submission                                   co-authorship
                                                  -               network

                                  -
                      author1
                      author2      -
                                             -
                     reference1
                     reference2    +                       +


                                  +
                                                 +




Authors of the submitted article have negative energy particles provided to
their corresponding vertex in the coauthorship network. The authors of the
referenced articles (i.e. cited authors) are provided positive energy
particles.

              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Outline

• Define the coauthorship network data structure.

• Define the particle-swarm algorithm.

• Present experimental results validating the proposed algorithm.

• Related work and conclusion.




             Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Experimental Results
The DBLP provided us the data set from which to construct our
coauthorship network, which includes 284,082 authors and 2,167,018
coauthorship edges. The 2005 ACM/IEEE Joint Conference on Digital
Libraries provided us a their program committees referee bid data. That is,
for each of the 124 submitted manuscripts, each of the 77 program
committee members stated:

1.   I am an expert in the domain of the submission and want to review
2.   I am an expert in the domain of the submission
3.   I am not an expert in the domain of the submission
4.   There exists a conflict of interest

                               [1] ≈ [2] > [3] ≈ [4] ≈ 0.


               Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Experimental Results
                       [1] expert wanting to review (k=2)                                            [2] expert (k=2)




                                                                             200
            30




                                                                             150
frequency




                                                                 frequency
            20




                                                                             100
            5 10




                                                                             50
            0




                                                                             0
                       !20     !15       !10            !5   0                           !20         !15      !10          !5   0

                              log of the energy value                                            log of the energy value



                             [3] non!expert (k=2)                                         [4] conflict of interest (k=2)
            100




                                                                             25
            80




                                                                             20
frequency




                                                                 frequency
            60




                                                                             15
            40




                                                                             10
            20




                                                                             5
            0




                                                                             0



                       !20      !15       !10           !5   0                     !20         !15         !10          !5      0

                              log of the energy value                                            log of the energy value




                   Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Experimental Results


                            0.4
average individual energy
                            0.3
                            0.2




                                                                     (4) conflict of interest
                            0.1




                                                  (2) expert           (1) expert wanting to review



                                                     (3) non!expert
                            0.0




                                  0        1          2          3              4               5     6   7
                                                          k!steps of negative energy




                             Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Experimental Results

• Other types of relationships are involved in conflict of interest situations
  besides previous article collaborations (e.g. same institution, friendship,
  shared committees, etc.) [2, 8].




              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Outline

• Define the coauthorship network data structure.

• Define the particle-swarm algorithm.

• Present experimental results validating the proposed algorithm.

• Related work and conclusion.




              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Related Work and Conclusion

• Latent semantic indexing to match manuscript abstract to referees [3, 11].
• Expertise identification via web mining techniques [1].
• Simply asking authors and the referees to provide keyterms describing their manuscript
  and area of expertise respectively [4].

• Due to the computational and human intervention costs, applications of the mentioned
  referee identification algorithms have been restricted to situations in which such
  information can be obtained for a pre-selected set of individuals, e.g. conferences and
  workshops.
• They have consequently failed to gain acceptance in the domain of classic journal
  peer-review and open commentary peer-review.




                 Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Related Work and Conclusion

• The proposed automatic referee identification algorithm requires no human intervention,
  is computationally efficient, and can, to some extent, automatically identify conflict of
  interest situations.
• The referee weighting aspect of the algorithm provides a strong incentive for its use
  in open commentary peer-review. The level of automation provides the necessary
  infrastructure to decouple the publication process from the peer-review process in the
  sense that editors are no longer required to assign referees.




                Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
Acknowledgements

• This research could not have been conducted if it were not for the
  support of the 2005 JCDL program chair and steering committee.

• Herbert Van de Sompel supported this research through data acquisition.

• Journal of Memetics1 for using a prototype implementation of the
  algorithm in their peer-review process.

• This research was financially supported by the Los Alamos National
  Laboratory.


 1
     Journal of Memetics available at: http://www.jom-emit.org/


                     Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
References

[1] C. Basu, H. Hirsh, W. Cohen, and C. Nevill-Manning. Technical paper
    recommendation: A study in combining multiple information sources.
    Journal of Artificial Intelligence Research, 14:231–252, 2001.

[2] Johan Bollen, Marko A. Rodriguez, Herbert Van de Sompel, Luda L.
    Balakireva, and Aric Hagberg. The largest scholarly semantic
    network...ever. In ACM World Wide Web Conference, Banff, Canada,
    Banff, Canada 2007. ACM Press.

[3] Susan T. Dumais and Jakob Nielsen. Automating the assignment of
    submitted manuscripts to reviewers. In SIGIR ’92: Proceedings of
    the 15th annual international ACM SIGIR conference on Research and

             Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
development in information retrieval, pages 233–244, Copenhagen,
   Denmark, 1992. ACM Press.

[4] Juan J. Merelo Guerv´s and Pedro A. Castillo Valdivieso. Conference
                         o
    paper assignment using a combined greedy/evolutionary algorithm.
    In Proceedings of the International Conference on Parallel Problem
    Solving from Nature, pages 602–611, Birmingham, UK, 2004.

[5] Xiaoming Liu, Johan Bollen, Michael L. Nelson, and Herbert Van
    de Sompel. Co-authorship networks in the digital library research
    community. Information Processing and Management, 41(6):1462–
    1480, 2006.

[6] M E J Newman. Scientific collaboration networks: I. network
    construction and fundamental results.  Physical Review E,
    64(1):016131, 2001.

             Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
[7] M E J Newman. Scientific collaboration networks: Ii. shortest paths,
     weighted networks, and centrality. Physical Review E, 64(1):016132,
     2001.

 [8] Marko A. Rodriguez. Grammar-based random walkers in semantic
     networks. Knowledge-Based Systems, 21(7):727–739, 2008.

 [9] Marko A. Rodriguez, Johan Bollen, and Herbert Van de Sompel.
     An algorithm to determine peer-reviewers. In Proceedings of the
     Conference on Information and Knowledge Management, Napa,
     California, October 2008. ACM Press.

[10] Marko A. Rodriguez, Johan Bollen, and Herbert Van de Sompel. The
     convergence of digital-libraries and the peer-review process. Journal of
     Information Science, 32(2):151–161, 2006.

               Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
[11] D. Yarowsky and R. Florian. Taking the load off the conference
     chairs: towards a digital paper-routing assistant. In Proceedings of
     the 1999 Joint SIGDAT Conference on Empirical Methods in NLP and
     Very-Large Corpora., Cambridge, MA, 1999.




              Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008

More Related Content

Viewers also liked

Geospatial Graphs made easy with OrientDB - Codemotion Spain
Geospatial Graphs made easy with OrientDB - Codemotion SpainGeospatial Graphs made easy with OrientDB - Codemotion Spain
Geospatial Graphs made easy with OrientDB - Codemotion SpainLuigi Dell'Aquila
 
Performance of graph query languages
Performance of graph query languagesPerformance of graph query languages
Performance of graph query languagesAthiq Ahamed
 
OrientDB distributed architecture 1.1
OrientDB distributed architecture 1.1OrientDB distributed architecture 1.1
OrientDB distributed architecture 1.1Luca Garulli
 
OrientDB document or graph? Select the right model (old presentation)
OrientDB document or graph? Select the right model (old presentation)OrientDB document or graph? Select the right model (old presentation)
OrientDB document or graph? Select the right model (old presentation)Luca Garulli
 
Traversing Graph Databases with Gremlin
Traversing Graph Databases with GremlinTraversing Graph Databases with Gremlin
Traversing Graph Databases with GremlinMarko Rodriguez
 
Works with persistent graphs using OrientDB
Works with persistent graphs using OrientDB Works with persistent graphs using OrientDB
Works with persistent graphs using OrientDB graphdevroom
 
Computing with Directed Labeled Graphs
Computing with Directed Labeled GraphsComputing with Directed Labeled Graphs
Computing with Directed Labeled GraphsMarko Rodriguez
 
OrientDB - Time Series and Event Sequences - Codemotion Milan 2014
OrientDB - Time Series and Event Sequences - Codemotion Milan 2014OrientDB - Time Series and Event Sequences - Codemotion Milan 2014
OrientDB - Time Series and Event Sequences - Codemotion Milan 2014Luigi Dell'Aquila
 
Distributed Graph Databases and the Emerging Web of Data
Distributed Graph Databases and the Emerging Web of DataDistributed Graph Databases and the Emerging Web of Data
Distributed Graph Databases and the Emerging Web of DataMarko Rodriguez
 
OrientDB - the 2nd generation of (Multi-Model) NoSQL
OrientDB - the 2nd generation  of  (Multi-Model) NoSQLOrientDB - the 2nd generation  of  (Multi-Model) NoSQL
OrientDB - the 2nd generation of (Multi-Model) NoSQLLuigi Dell'Aquila
 
The Gremlin in the Graph
The Gremlin in the GraphThe Gremlin in the Graph
The Gremlin in the GraphMarko Rodriguez
 
Presentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - WebinarPresentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - WebinarOrient Technologies
 
OrientDB & Hazelcast: In-Memory Distributed Graph Database
 OrientDB & Hazelcast: In-Memory Distributed Graph Database OrientDB & Hazelcast: In-Memory Distributed Graph Database
OrientDB & Hazelcast: In-Memory Distributed Graph DatabaseHazelcast
 
Breaking things on purpose (with Gremlin)
Breaking things on purpose (with Gremlin)Breaking things on purpose (with Gremlin)
Breaking things on purpose (with Gremlin)Kolton Andrus
 
Design your application using Persistent Graphs and OrientDB
Design your application using Persistent Graphs and OrientDBDesign your application using Persistent Graphs and OrientDB
Design your application using Persistent Graphs and OrientDBLuca Garulli
 
Gremlin: A Graph-Based Programming Language
Gremlin: A Graph-Based Programming LanguageGremlin: A Graph-Based Programming Language
Gremlin: A Graph-Based Programming LanguageMarko Rodriguez
 
Introduction to Gremlin
Introduction to GremlinIntroduction to Gremlin
Introduction to GremlinMax De Marzi
 
ACM DBPL Keynote: The Graph Traversal Machine and Language
ACM DBPL Keynote: The Graph Traversal Machine and LanguageACM DBPL Keynote: The Graph Traversal Machine and Language
ACM DBPL Keynote: The Graph Traversal Machine and LanguageMarko Rodriguez
 
Cassandra Summit - What's New In Apache TinkerPop?
Cassandra Summit - What's New In Apache TinkerPop?Cassandra Summit - What's New In Apache TinkerPop?
Cassandra Summit - What's New In Apache TinkerPop?Stephen Mallette
 

Viewers also liked (20)

Geospatial Graphs made easy with OrientDB - Codemotion Spain
Geospatial Graphs made easy with OrientDB - Codemotion SpainGeospatial Graphs made easy with OrientDB - Codemotion Spain
Geospatial Graphs made easy with OrientDB - Codemotion Spain
 
Performance of graph query languages
Performance of graph query languagesPerformance of graph query languages
Performance of graph query languages
 
OrientDB distributed architecture 1.1
OrientDB distributed architecture 1.1OrientDB distributed architecture 1.1
OrientDB distributed architecture 1.1
 
OrientDB document or graph? Select the right model (old presentation)
OrientDB document or graph? Select the right model (old presentation)OrientDB document or graph? Select the right model (old presentation)
OrientDB document or graph? Select the right model (old presentation)
 
Traversing Graph Databases with Gremlin
Traversing Graph Databases with GremlinTraversing Graph Databases with Gremlin
Traversing Graph Databases with Gremlin
 
Works with persistent graphs using OrientDB
Works with persistent graphs using OrientDB Works with persistent graphs using OrientDB
Works with persistent graphs using OrientDB
 
Computing with Directed Labeled Graphs
Computing with Directed Labeled GraphsComputing with Directed Labeled Graphs
Computing with Directed Labeled Graphs
 
OrientDB - Time Series and Event Sequences - Codemotion Milan 2014
OrientDB - Time Series and Event Sequences - Codemotion Milan 2014OrientDB - Time Series and Event Sequences - Codemotion Milan 2014
OrientDB - Time Series and Event Sequences - Codemotion Milan 2014
 
Distributed Graph Databases and the Emerging Web of Data
Distributed Graph Databases and the Emerging Web of DataDistributed Graph Databases and the Emerging Web of Data
Distributed Graph Databases and the Emerging Web of Data
 
OrientDB - the 2nd generation of (Multi-Model) NoSQL
OrientDB - the 2nd generation  of  (Multi-Model) NoSQLOrientDB - the 2nd generation  of  (Multi-Model) NoSQL
OrientDB - the 2nd generation of (Multi-Model) NoSQL
 
The Gremlin in the Graph
The Gremlin in the GraphThe Gremlin in the Graph
The Gremlin in the Graph
 
Presentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - WebinarPresentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - Webinar
 
OrientDB & Hazelcast: In-Memory Distributed Graph Database
 OrientDB & Hazelcast: In-Memory Distributed Graph Database OrientDB & Hazelcast: In-Memory Distributed Graph Database
OrientDB & Hazelcast: In-Memory Distributed Graph Database
 
Breaking things on purpose (with Gremlin)
Breaking things on purpose (with Gremlin)Breaking things on purpose (with Gremlin)
Breaking things on purpose (with Gremlin)
 
Design your application using Persistent Graphs and OrientDB
Design your application using Persistent Graphs and OrientDBDesign your application using Persistent Graphs and OrientDB
Design your application using Persistent Graphs and OrientDB
 
The Path Forward
The Path ForwardThe Path Forward
The Path Forward
 
Gremlin: A Graph-Based Programming Language
Gremlin: A Graph-Based Programming LanguageGremlin: A Graph-Based Programming Language
Gremlin: A Graph-Based Programming Language
 
Introduction to Gremlin
Introduction to GremlinIntroduction to Gremlin
Introduction to Gremlin
 
ACM DBPL Keynote: The Graph Traversal Machine and Language
ACM DBPL Keynote: The Graph Traversal Machine and LanguageACM DBPL Keynote: The Graph Traversal Machine and Language
ACM DBPL Keynote: The Graph Traversal Machine and Language
 
Cassandra Summit - What's New In Apache TinkerPop?
Cassandra Summit - What's New In Apache TinkerPop?Cassandra Summit - What's New In Apache TinkerPop?
Cassandra Summit - What's New In Apache TinkerPop?
 

Similar to An Algorithm to Determine Peer-Reviewers

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A SVM Applied Text Categorization of Academia-Industry Collaborative Research...
A SVM Applied Text Categorization of Academia-Industry Collaborative Research...A SVM Applied Text Categorization of Academia-Industry Collaborative Research...
A SVM Applied Text Categorization of Academia-Industry Collaborative Research...National Institute of Informatics
 
Dh31504508
Dh31504508Dh31504508
Dh31504508IJMER
 
A multithreaded method for network alignment
A multithreaded method for network alignmentA multithreaded method for network alignment
A multithreaded method for network alignmentDavid Gleich
 
Latent Dirichlet Allocation
Latent Dirichlet AllocationLatent Dirichlet Allocation
Latent Dirichlet AllocationMarco Righini
 
Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Cigdem Aslay
 
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Alessandro Suglia
 
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Claudio Greco
 
A Primer on Entity Resolution
A Primer on Entity ResolutionA Primer on Entity Resolution
A Primer on Entity ResolutionBenjamin Bengfort
 
Machine Learning and Artificial Neural Networks.ppt
Machine Learning and Artificial Neural Networks.pptMachine Learning and Artificial Neural Networks.ppt
Machine Learning and Artificial Neural Networks.pptAnshika865276
 
A scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clusteringA scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clusteringAllenWu
 
Software tools for high-throughput materials data generation and data mining
Software tools for high-throughput materials data generation and data miningSoftware tools for high-throughput materials data generation and data mining
Software tools for high-throughput materials data generation and data miningAnubhav Jain
 
Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...
Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...
Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...Ryutaroh Matsumoto
 
Probablistic information retrieval
Probablistic information retrievalProbablistic information retrieval
Probablistic information retrievalNisha Arankandath
 
Influence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clusteringInfluence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clusteringcsandit
 
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGINFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGcscpconf
 

Similar to An Algorithm to Determine Peer-Reviewers (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A SVM Applied Text Categorization of Academia-Industry Collaborative Research...
A SVM Applied Text Categorization of Academia-Industry Collaborative Research...A SVM Applied Text Categorization of Academia-Industry Collaborative Research...
A SVM Applied Text Categorization of Academia-Industry Collaborative Research...
 
Dh31504508
Dh31504508Dh31504508
Dh31504508
 
A multithreaded method for network alignment
A multithreaded method for network alignmentA multithreaded method for network alignment
A multithreaded method for network alignment
 
Bj24390398
Bj24390398Bj24390398
Bj24390398
 
Latent Dirichlet Allocation
Latent Dirichlet AllocationLatent Dirichlet Allocation
Latent Dirichlet Allocation
 
Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...
 
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
 
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
Ask Me Any Rating: A Content-based Recommender System based on Recurrent Neur...
 
LDAvis
LDAvisLDAvis
LDAvis
 
A Primer on Entity Resolution
A Primer on Entity ResolutionA Primer on Entity Resolution
A Primer on Entity Resolution
 
Machine Learning and Artificial Neural Networks.ppt
Machine Learning and Artificial Neural Networks.pptMachine Learning and Artificial Neural Networks.ppt
Machine Learning and Artificial Neural Networks.ppt
 
A scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clusteringA scalable collaborative filtering framework based on co clustering
A scalable collaborative filtering framework based on co clustering
 
Software tools for high-throughput materials data generation and data mining
Software tools for high-throughput materials data generation and data miningSoftware tools for high-throughput materials data generation and data mining
Software tools for high-throughput materials data generation and data mining
 
Clustering: A Survey
Clustering: A SurveyClustering: A Survey
Clustering: A Survey
 
Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...
Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...
Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding ...
 
Probablistic information retrieval
Probablistic information retrievalProbablistic information retrieval
Probablistic information retrieval
 
nnml.ppt
nnml.pptnnml.ppt
nnml.ppt
 
Influence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clusteringInfluence of priors over multityped object in evolutionary clustering
Influence of priors over multityped object in evolutionary clustering
 
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERINGINFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
INFLUENCE OF PRIORS OVER MULTITYPED OBJECT IN EVOLUTIONARY CLUSTERING
 

More from Marko Rodriguez

mm-ADT: A Virtual Machine/An Economic Machine
mm-ADT: A Virtual Machine/An Economic Machinemm-ADT: A Virtual Machine/An Economic Machine
mm-ADT: A Virtual Machine/An Economic MachineMarko Rodriguez
 
mm-ADT: A Multi-Model Abstract Data Type
mm-ADT: A Multi-Model Abstract Data Typemm-ADT: A Multi-Model Abstract Data Type
mm-ADT: A Multi-Model Abstract Data TypeMarko Rodriguez
 
Open Problems in the Universal Graph Theory
Open Problems in the Universal Graph TheoryOpen Problems in the Universal Graph Theory
Open Problems in the Universal Graph TheoryMarko Rodriguez
 
Gremlin 101.3 On Your FM Dial
Gremlin 101.3 On Your FM DialGremlin 101.3 On Your FM Dial
Gremlin 101.3 On Your FM DialMarko Rodriguez
 
Gremlin's Graph Traversal Machinery
Gremlin's Graph Traversal MachineryGremlin's Graph Traversal Machinery
Gremlin's Graph Traversal MachineryMarko Rodriguez
 
Quantum Processes in Graph Computing
Quantum Processes in Graph ComputingQuantum Processes in Graph Computing
Quantum Processes in Graph ComputingMarko Rodriguez
 
The Gremlin Graph Traversal Language
The Gremlin Graph Traversal LanguageThe Gremlin Graph Traversal Language
The Gremlin Graph Traversal LanguageMarko Rodriguez
 
Faunus: Graph Analytics Engine
Faunus: Graph Analytics EngineFaunus: Graph Analytics Engine
Faunus: Graph Analytics EngineMarko Rodriguez
 
Solving Problems with Graphs
Solving Problems with GraphsSolving Problems with Graphs
Solving Problems with GraphsMarko Rodriguez
 
Titan: The Rise of Big Graph Data
Titan: The Rise of Big Graph DataTitan: The Rise of Big Graph Data
Titan: The Rise of Big Graph DataMarko Rodriguez
 
The Pathology of Graph Databases
The Pathology of Graph DatabasesThe Pathology of Graph Databases
The Pathology of Graph DatabasesMarko Rodriguez
 
Memoirs of a Graph Addict: Despair to Redemption
Memoirs of a Graph Addict: Despair to RedemptionMemoirs of a Graph Addict: Despair to Redemption
Memoirs of a Graph Addict: Despair to RedemptionMarko Rodriguez
 
Graph Databases: Trends in the Web of Data
Graph Databases: Trends in the Web of DataGraph Databases: Trends in the Web of Data
Graph Databases: Trends in the Web of DataMarko Rodriguez
 
Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...
Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...
Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...Marko Rodriguez
 
A Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network ScienceA Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network ScienceMarko Rodriguez
 
The Graph Traversal Programming Pattern
The Graph Traversal Programming PatternThe Graph Traversal Programming Pattern
The Graph Traversal Programming PatternMarko Rodriguez
 
The Network Data Structure in Computing
The Network Data Structure in ComputingThe Network Data Structure in Computing
The Network Data Structure in ComputingMarko Rodriguez
 
A Model of the Scholarly Community
A Model of the Scholarly CommunityA Model of the Scholarly Community
A Model of the Scholarly CommunityMarko Rodriguez
 
General-Purpose, Internet-Scale Distributed Computing with Linked Process
General-Purpose, Internet-Scale Distributed Computing with Linked ProcessGeneral-Purpose, Internet-Scale Distributed Computing with Linked Process
General-Purpose, Internet-Scale Distributed Computing with Linked ProcessMarko Rodriguez
 
Collective Decision Making Systems: From the Ideal State to Human Eudaimonia
Collective Decision Making Systems: From the Ideal State to Human EudaimoniaCollective Decision Making Systems: From the Ideal State to Human Eudaimonia
Collective Decision Making Systems: From the Ideal State to Human EudaimoniaMarko Rodriguez
 

More from Marko Rodriguez (20)

mm-ADT: A Virtual Machine/An Economic Machine
mm-ADT: A Virtual Machine/An Economic Machinemm-ADT: A Virtual Machine/An Economic Machine
mm-ADT: A Virtual Machine/An Economic Machine
 
mm-ADT: A Multi-Model Abstract Data Type
mm-ADT: A Multi-Model Abstract Data Typemm-ADT: A Multi-Model Abstract Data Type
mm-ADT: A Multi-Model Abstract Data Type
 
Open Problems in the Universal Graph Theory
Open Problems in the Universal Graph TheoryOpen Problems in the Universal Graph Theory
Open Problems in the Universal Graph Theory
 
Gremlin 101.3 On Your FM Dial
Gremlin 101.3 On Your FM DialGremlin 101.3 On Your FM Dial
Gremlin 101.3 On Your FM Dial
 
Gremlin's Graph Traversal Machinery
Gremlin's Graph Traversal MachineryGremlin's Graph Traversal Machinery
Gremlin's Graph Traversal Machinery
 
Quantum Processes in Graph Computing
Quantum Processes in Graph ComputingQuantum Processes in Graph Computing
Quantum Processes in Graph Computing
 
The Gremlin Graph Traversal Language
The Gremlin Graph Traversal LanguageThe Gremlin Graph Traversal Language
The Gremlin Graph Traversal Language
 
Faunus: Graph Analytics Engine
Faunus: Graph Analytics EngineFaunus: Graph Analytics Engine
Faunus: Graph Analytics Engine
 
Solving Problems with Graphs
Solving Problems with GraphsSolving Problems with Graphs
Solving Problems with Graphs
 
Titan: The Rise of Big Graph Data
Titan: The Rise of Big Graph DataTitan: The Rise of Big Graph Data
Titan: The Rise of Big Graph Data
 
The Pathology of Graph Databases
The Pathology of Graph DatabasesThe Pathology of Graph Databases
The Pathology of Graph Databases
 
Memoirs of a Graph Addict: Despair to Redemption
Memoirs of a Graph Addict: Despair to RedemptionMemoirs of a Graph Addict: Despair to Redemption
Memoirs of a Graph Addict: Despair to Redemption
 
Graph Databases: Trends in the Web of Data
Graph Databases: Trends in the Web of DataGraph Databases: Trends in the Web of Data
Graph Databases: Trends in the Web of Data
 
Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...
Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...
Problem-Solving using Graph Traversals: Searching, Scoring, Ranking, and Reco...
 
A Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network ScienceA Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network Science
 
The Graph Traversal Programming Pattern
The Graph Traversal Programming PatternThe Graph Traversal Programming Pattern
The Graph Traversal Programming Pattern
 
The Network Data Structure in Computing
The Network Data Structure in ComputingThe Network Data Structure in Computing
The Network Data Structure in Computing
 
A Model of the Scholarly Community
A Model of the Scholarly CommunityA Model of the Scholarly Community
A Model of the Scholarly Community
 
General-Purpose, Internet-Scale Distributed Computing with Linked Process
General-Purpose, Internet-Scale Distributed Computing with Linked ProcessGeneral-Purpose, Internet-Scale Distributed Computing with Linked Process
General-Purpose, Internet-Scale Distributed Computing with Linked Process
 
Collective Decision Making Systems: From the Ideal State to Human Eudaimonia
Collective Decision Making Systems: From the Ideal State to Human EudaimoniaCollective Decision Making Systems: From the Ideal State to Human Eudaimonia
Collective Decision Making Systems: From the Ideal State to Human Eudaimonia
 

Recently uploaded

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

An Algorithm to Determine Peer-Reviewers

  • 1. An Algorithm to Determine Peer-Reviewers Marko A. Rodriguez and Johan Bollen Digital Library Research and Prototyping Team T-7, Center for Nonlinear Studies Los Alamos National Laboratory October 25, 2008
  • 2. Peer-Review Problem Statement • Editors are overwhelmed due to the number of submissions. Provide mechanisms to decentralize the peer-review process [10]. • Editors have a difficult time locating referees who know the domain of discourse and do not have a ethical conflict with reviewing the submission. Automate the referee identification problem [9]. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 3. Hypothesis • It is hypothesized that the authors of the cited articles and their coauthors are good referees. • It is hypothesis that conflict of interest referees are considered the authors of the article and their coauthors. With respect to the article associated with this presentation: • David Yarowsky, Radu Florian, Fabio Crestani, Tamara Sumner, etc. are considered competent referees. • Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel, Xiaoming Liu, Michael Nelson, etc. are considered conflict of interest referees. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 4. Outline • Define the coauthorship network data structure. • Define the particle-swarm algorithm. • Present experimental results validating the proposed algorithm. • Related work and conclusion. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 5. Outline • Define the coauthorship network data structure. • Define the particle-swarm algorithm. • Present experimental results validating the proposed algorithm. • Related work and conclusion. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 6. A Scholarly Coauthorship Network Author-D Author-B Author-F Author-C Author-A Author-E All edges have a single homogenous meaning of “coauthor”. If Author-A and Author-B have written an article together, then they are considered coauthors. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 7. A Scholarly Coauthorship Network Our coauthorship network is defined as G = (V, E, ω), where V is the set of vertices, E ⊆ (V × V ), and ω : E → R+. The function rule for ω is 1 ω(i, j) = ω(j, i) → , α(m) − 1 ∀m∈M by i,j where M is the set of all manuscripts and α : M → N+ maps each manuscript to the total number of authors for that manuscript. Thus, the more authors on an article, the less “coauthor weight” exist between them with respect to that article [5, 7, 6]. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 8. A Scholarly Coauthorship Network Finally the weight of all edges outgoing from a vertex are normalized to form a probability distribution over the outgoing edge set. Thus, for a particular vertex i, ω : E → [0, 1] such that ω(i, j) ω (i, j) → , k ω(i, k) where ω (i, j) need not equal ω (j, i). Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 9. Outline • Define the coauthorship network data structure. • Define the particle-swarm algorithm. • Present experimental results validating the proposed algorithm. • Related work and conclusion. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 10. A Particle Swarm Algorithm 0.75 1.0 0.5 0.25 1.0 0.5 1.0 1.0 t=1 t=2 t=3 t=4 A particle begins its journey at a particular vertex and will take an outgoing edge of its current vertex biased by the outgoing probability distribution defined over the outgoing edge set. Moreover, at each discrete timestep in N+ the particle decays in energy. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 11. A Particle Swarm Algorithm The set of all particles in the network is P where pi ∈ P is the ith particle. The properties of an individual particle include: 1. ci(t) ∈ V : is the location of the particle pi at time t. 2. i (t)∈ R: is the amount of energy contained within the particle pi at time t. 3. δi ∈ [0, 1]: is the decay parameter governing the loss of energy as the particle pi propagates through the network. This is a globally defined parameter in our experiment with decay set to ∀iδi = 0.15. 4. particles can maintain state and have heterogenous internal logics to perform more complex walks. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 12. A Particle Swarm Algorithm The algorithm runs for k timesteps. At each step, the particle has its energy decayed such that (1 − δi) i(t) if t ≤ k i (t + 1) = 0 otherwise Finally, there exists a global rank vector e ∈ R|V | that records how much energy has passed through each vertex. eci(t)(t + 1) = eci(t)(t) + i(t) Thus, t≤k i≤|P | (1 − δi)t−1 i(1) if ci(t − 1) = nl el(k) = t=1 i=1 0 otherwise. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 13. Experimental Results submission co-authorship - network - author1 author2 - - reference1 reference2 + + + + Authors of the submitted article have negative energy particles provided to their corresponding vertex in the coauthorship network. The authors of the referenced articles (i.e. cited authors) are provided positive energy particles. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 14. Outline • Define the coauthorship network data structure. • Define the particle-swarm algorithm. • Present experimental results validating the proposed algorithm. • Related work and conclusion. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 15. Experimental Results The DBLP provided us the data set from which to construct our coauthorship network, which includes 284,082 authors and 2,167,018 coauthorship edges. The 2005 ACM/IEEE Joint Conference on Digital Libraries provided us a their program committees referee bid data. That is, for each of the 124 submitted manuscripts, each of the 77 program committee members stated: 1. I am an expert in the domain of the submission and want to review 2. I am an expert in the domain of the submission 3. I am not an expert in the domain of the submission 4. There exists a conflict of interest [1] ≈ [2] > [3] ≈ [4] ≈ 0. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 16. Experimental Results [1] expert wanting to review (k=2) [2] expert (k=2) 200 30 150 frequency frequency 20 100 5 10 50 0 0 !20 !15 !10 !5 0 !20 !15 !10 !5 0 log of the energy value log of the energy value [3] non!expert (k=2) [4] conflict of interest (k=2) 100 25 80 20 frequency frequency 60 15 40 10 20 5 0 0 !20 !15 !10 !5 0 !20 !15 !10 !5 0 log of the energy value log of the energy value Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 17. Experimental Results 0.4 average individual energy 0.3 0.2 (4) conflict of interest 0.1 (2) expert (1) expert wanting to review (3) non!expert 0.0 0 1 2 3 4 5 6 7 k!steps of negative energy Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 18. Experimental Results • Other types of relationships are involved in conflict of interest situations besides previous article collaborations (e.g. same institution, friendship, shared committees, etc.) [2, 8]. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 19. Outline • Define the coauthorship network data structure. • Define the particle-swarm algorithm. • Present experimental results validating the proposed algorithm. • Related work and conclusion. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 20. Related Work and Conclusion • Latent semantic indexing to match manuscript abstract to referees [3, 11]. • Expertise identification via web mining techniques [1]. • Simply asking authors and the referees to provide keyterms describing their manuscript and area of expertise respectively [4]. • Due to the computational and human intervention costs, applications of the mentioned referee identification algorithms have been restricted to situations in which such information can be obtained for a pre-selected set of individuals, e.g. conferences and workshops. • They have consequently failed to gain acceptance in the domain of classic journal peer-review and open commentary peer-review. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 21. Related Work and Conclusion • The proposed automatic referee identification algorithm requires no human intervention, is computationally efficient, and can, to some extent, automatically identify conflict of interest situations. • The referee weighting aspect of the algorithm provides a strong incentive for its use in open commentary peer-review. The level of automation provides the necessary infrastructure to decouple the publication process from the peer-review process in the sense that editors are no longer required to assign referees. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 22. Acknowledgements • This research could not have been conducted if it were not for the support of the 2005 JCDL program chair and steering committee. • Herbert Van de Sompel supported this research through data acquisition. • Journal of Memetics1 for using a prototype implementation of the algorithm in their peer-review process. • This research was financially supported by the Los Alamos National Laboratory. 1 Journal of Memetics available at: http://www.jom-emit.org/ Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 23. References [1] C. Basu, H. Hirsh, W. Cohen, and C. Nevill-Manning. Technical paper recommendation: A study in combining multiple information sources. Journal of Artificial Intelligence Research, 14:231–252, 2001. [2] Johan Bollen, Marko A. Rodriguez, Herbert Van de Sompel, Luda L. Balakireva, and Aric Hagberg. The largest scholarly semantic network...ever. In ACM World Wide Web Conference, Banff, Canada, Banff, Canada 2007. ACM Press. [3] Susan T. Dumais and Jakob Nielsen. Automating the assignment of submitted manuscripts to reviewers. In SIGIR ’92: Proceedings of the 15th annual international ACM SIGIR conference on Research and Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 24. development in information retrieval, pages 233–244, Copenhagen, Denmark, 1992. ACM Press. [4] Juan J. Merelo Guerv´s and Pedro A. Castillo Valdivieso. Conference o paper assignment using a combined greedy/evolutionary algorithm. In Proceedings of the International Conference on Parallel Problem Solving from Nature, pages 602–611, Birmingham, UK, 2004. [5] Xiaoming Liu, Johan Bollen, Michael L. Nelson, and Herbert Van de Sompel. Co-authorship networks in the digital library research community. Information Processing and Management, 41(6):1462– 1480, 2006. [6] M E J Newman. Scientific collaboration networks: I. network construction and fundamental results. Physical Review E, 64(1):016131, 2001. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 25. [7] M E J Newman. Scientific collaboration networks: Ii. shortest paths, weighted networks, and centrality. Physical Review E, 64(1):016132, 2001. [8] Marko A. Rodriguez. Grammar-based random walkers in semantic networks. Knowledge-Based Systems, 21(7):727–739, 2008. [9] Marko A. Rodriguez, Johan Bollen, and Herbert Van de Sompel. An algorithm to determine peer-reviewers. In Proceedings of the Conference on Information and Knowledge Management, Napa, California, October 2008. ACM Press. [10] Marko A. Rodriguez, Johan Bollen, and Herbert Van de Sompel. The convergence of digital-libraries and the peer-review process. Journal of Information Science, 32(2):151–161, 2006. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008
  • 26. [11] D. Yarowsky and R. Florian. Taking the load off the conference chairs: towards a digital paper-routing assistant. In Proceedings of the 1999 Joint SIGDAT Conference on Empirical Methods in NLP and Very-Large Corpora., Cambridge, MA, 1999. Conference on Information and Knowledge Management (CIKM) – Napa, California – October 25, 2008