SlideShare a Scribd company logo
A Machine Learning Approach for Identifying Expert Stakeholders Carlos Castro-Herrera Jane Cleland-Huang
Outline Introduction & Motivation Case Study Identifying Expert Stakeholders Direct stakeholders Indirect stakeholders Inferred stakeholders Conclusions and Future work 9/2/2009 2 RE09   •   Carlos Castro-Herrera   •   DePaul University
Introduction & Motivation Requirements Elicitation: Representative group of stakeholders Proactively engaged Discovery and Analysis of the requirements Organizations adopting online collaborative tools How to identify Subject Matter Experts? Novel technique that automatically analyzes contributions and interests to identify relevant stakeholders Machine learning techniques organize contributions into topics Identifies three classes of stakeholders:  Direct, Indirect and Inferred. Can be combined into a single ranking. 9/2/2009 3 RE09   •   Carlos Castro-Herrera   •   DePaul University
Case Study Student Dataset 36 Masters students: Requirements Engineering Class 366 Feature requests Amazon-like web portal Purchasing and Selling of school books 9/2/2009 4 RE09   •   Carlos Castro-Herrera   •   DePaul University
Direct Stakeholders Made specific contributions to a topic Topics can be identified: Manually  Automatically Automatically: Contributions are pre-processed: Determine ‘ideal’ amount of topics:  Can’s Cover Coefficient Consensus Clustering using Spherical K-Means: Co-Association Matrix: captures the proximity of the needs Hierarchical Agglomerative Clustering over the final matrix 9/2/2009 RE09   •   Carlos Castro-Herrera   •   DePaul University 5
Direct Stakeholders Ex. Encryption Topic: 28 Additional topics (purchases, used books, shopping cart) Contribution Metrics: Topic Contribution:  % or requirements in the topic contributed by a stakeholder Topic Specialization Inverse of the number of topics a stakeholder is associated with 9/2/2009 RE09   •   Carlos Castro-Herrera   •   DePaul University 6
Indirect Stakeholders Made contributions to a related topic Similarity between topics: Vector Space Model using tf-idf Cosine similarity metric Similarity scores for the Encryption topic: Interest of stakeholders in the target topic can be weighted by the similarity of the related topics: 9/2/2009 RE09   •   Carlos Castro-Herrera   •   DePaul University 7
Indirect Stakeholders Visualize the relationships between topics: Ex. Indirect Stakeholders for the Encryption topic: 9/2/2009 RE09   •   Carlos Castro-Herrera   •   DePaul University 8
Inferred Stakeholders Direct and Indirect are based on content. Inferred stakeholders based on behavior profiles Collaborative Recommender Systems: 9/2/2009 RE09   •   Carlos Castro-Herrera   •   DePaul University 9 Infer interest based on the behavior of a stakeholders with similar contribution patterns
Inferred Stakeholders Neighbors are calculated using a similarity function: A prediction score for a particular item is calculated using the function: Ex. Top Recommendations for the Encryption topic (inferred stakeholders): 9/2/2009 RE09   •   Carlos Castro-Herrera   •   DePaul University 10
Conclusions and Future Work Presented a novel technique (proof of concept) Uses data mining  Analyze stakeholders’ contributions Indentify potential experts (key stakeholders) for a topic Potential uses: Identify stakeholders that: Should participate in a new feature Can bring in new perspectives to a stagnant discussion Will be impacted by a change Future work: More sophisticated model More rigorous evaluation 9/2/2009 11 RE09   •   Carlos Castro-Herrera   •   DePaul University

More Related Content

Similar to 10 A Machine Learning Approach for Identifying Expert Stakeholders

Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Kim Pearson
 
Aligning Learning Analytics with Classroom Practices & Needs
Aligning Learning Analytics with Classroom Practices & NeedsAligning Learning Analytics with Classroom Practices & Needs
Aligning Learning Analytics with Classroom Practices & Needs
Simon Knight
 
Doctoral seminar (DBIS RWTH Aachen)
Doctoral seminar  (DBIS RWTH Aachen)Doctoral seminar  (DBIS RWTH Aachen)
Doctoral seminar (DBIS RWTH Aachen)Zina Petrushyna
 
SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...
SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...
SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...
GUANGYUAN PIAO
 
Navigating Our Way with the Framework for Information Literacy
Navigating Our Way with the Framework for Information LiteracyNavigating Our Way with the Framework for Information Literacy
Navigating Our Way with the Framework for Information Literacy
Donna Witek
 
Social Web Course @VU Amsterdam: Final Student Presentations
Social Web Course @VU Amsterdam: Final Student PresentationsSocial Web Course @VU Amsterdam: Final Student Presentations
Social Web Course @VU Amsterdam: Final Student PresentationsLora Aroyo
 
Project 2 Field InterviewInstructionsNo directly quoted ma.docx
Project 2 Field InterviewInstructionsNo directly quoted ma.docxProject 2 Field InterviewInstructionsNo directly quoted ma.docx
Project 2 Field InterviewInstructionsNo directly quoted ma.docx
denneymargareta
 
Personalized Search-Building a prototype to infer the user's interest
Personalized Search-Building a prototype to infer the user's interestPersonalized Search-Building a prototype to infer the user's interest
Personalized Search-Building a prototype to infer the user's interest
Tom Burgmans
 
Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Kim Pearson
 
Mining Opinions from University Students’ Feedback using Text Analytics
Mining Opinions from University Students’ Feedback using Text AnalyticsMining Opinions from University Students’ Feedback using Text Analytics
Mining Opinions from University Students’ Feedback using Text Analytics
ITIIIndustries
 
TOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKING
TOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKINGTOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKING
TOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKING
csandit
 
Digital Trails Dave King 1 5 10 Part 2 D3
Digital Trails   Dave King   1 5 10   Part 2   D3Digital Trails   Dave King   1 5 10   Part 2   D3
Digital Trails Dave King 1 5 10 Part 2 D3Dave King
 
Mining User Interests from Social Media
Mining User Interests from Social MediaMining User Interests from Social Media
Mining User Interests from Social Media
Fattane Zarrinkalam
 
Tell me and I forget, teach me and I remember, involve me and I learn: unders...
Tell me and I forget, teach me and I remember, involve me and I learn: unders...Tell me and I forget, teach me and I remember, involve me and I learn: unders...
Tell me and I forget, teach me and I remember, involve me and I learn: unders...
zzalszjc
 
Slides ecir2016
Slides ecir2016Slides ecir2016
Slides ecir2016
Fattane Zarrinkalam
 
Session-Based Recommender Systems
Session-Based Recommender SystemsSession-Based Recommender Systems
Session-Based Recommender Systems
Eötvös Loránd University
 
Tcf college access ppt final
Tcf college access ppt finalTcf college access ppt final
Tcf college access ppt finalJessica Daniels
 
Card Sort Report
Card Sort ReportCard Sort Report
Card Sort Report
宇轩 谢
 
Recommendations for Open Online Education: An Algorithmic Study
Recommendations for Open Online Education:  An Algorithmic StudyRecommendations for Open Online Education:  An Algorithmic Study
Recommendations for Open Online Education: An Algorithmic Study
Hendrik Drachsler
 
master_thesis.pdf
master_thesis.pdfmaster_thesis.pdf
master_thesis.pdf
EL MAJJODI Ayoub
 

Similar to 10 A Machine Learning Approach for Identifying Expert Stakeholders (20)

Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...
 
Aligning Learning Analytics with Classroom Practices & Needs
Aligning Learning Analytics with Classroom Practices & NeedsAligning Learning Analytics with Classroom Practices & Needs
Aligning Learning Analytics with Classroom Practices & Needs
 
Doctoral seminar (DBIS RWTH Aachen)
Doctoral seminar  (DBIS RWTH Aachen)Doctoral seminar  (DBIS RWTH Aachen)
Doctoral seminar (DBIS RWTH Aachen)
 
SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...
SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...
SEMANTiCS2016 - Exploring Dynamics and Semantics of User Interests for User ...
 
Navigating Our Way with the Framework for Information Literacy
Navigating Our Way with the Framework for Information LiteracyNavigating Our Way with the Framework for Information Literacy
Navigating Our Way with the Framework for Information Literacy
 
Social Web Course @VU Amsterdam: Final Student Presentations
Social Web Course @VU Amsterdam: Final Student PresentationsSocial Web Course @VU Amsterdam: Final Student Presentations
Social Web Course @VU Amsterdam: Final Student Presentations
 
Project 2 Field InterviewInstructionsNo directly quoted ma.docx
Project 2 Field InterviewInstructionsNo directly quoted ma.docxProject 2 Field InterviewInstructionsNo directly quoted ma.docx
Project 2 Field InterviewInstructionsNo directly quoted ma.docx
 
Personalized Search-Building a prototype to infer the user's interest
Personalized Search-Building a prototype to infer the user's interestPersonalized Search-Building a prototype to infer the user's interest
Personalized Search-Building a prototype to infer the user's interest
 
Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...Collaborating Across Boundaries to Engage Journalism Students in Computationa...
Collaborating Across Boundaries to Engage Journalism Students in Computationa...
 
Mining Opinions from University Students’ Feedback using Text Analytics
Mining Opinions from University Students’ Feedback using Text AnalyticsMining Opinions from University Students’ Feedback using Text Analytics
Mining Opinions from University Students’ Feedback using Text Analytics
 
TOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKING
TOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKINGTOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKING
TOWARDS A MULTI-FEATURE ENABLED APPROACH FOR OPTIMIZED EXPERT SEEKING
 
Digital Trails Dave King 1 5 10 Part 2 D3
Digital Trails   Dave King   1 5 10   Part 2   D3Digital Trails   Dave King   1 5 10   Part 2   D3
Digital Trails Dave King 1 5 10 Part 2 D3
 
Mining User Interests from Social Media
Mining User Interests from Social MediaMining User Interests from Social Media
Mining User Interests from Social Media
 
Tell me and I forget, teach me and I remember, involve me and I learn: unders...
Tell me and I forget, teach me and I remember, involve me and I learn: unders...Tell me and I forget, teach me and I remember, involve me and I learn: unders...
Tell me and I forget, teach me and I remember, involve me and I learn: unders...
 
Slides ecir2016
Slides ecir2016Slides ecir2016
Slides ecir2016
 
Session-Based Recommender Systems
Session-Based Recommender SystemsSession-Based Recommender Systems
Session-Based Recommender Systems
 
Tcf college access ppt final
Tcf college access ppt finalTcf college access ppt final
Tcf college access ppt final
 
Card Sort Report
Card Sort ReportCard Sort Report
Card Sort Report
 
Recommendations for Open Online Education: An Algorithmic Study
Recommendations for Open Online Education:  An Algorithmic StudyRecommendations for Open Online Education:  An Algorithmic Study
Recommendations for Open Online Education: An Algorithmic Study
 
master_thesis.pdf
master_thesis.pdfmaster_thesis.pdf
master_thesis.pdf
 

More from Walid Maalej

How Can Software Engineering Support AI
How Can Software Engineering Support AIHow Can Software Engineering Support AI
How Can Software Engineering Support AI
Walid Maalej
 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Walid Maalej
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Walid Maalej
 
Msr14 tutorial 4upload
Msr14 tutorial 4uploadMsr14 tutorial 4upload
Msr14 tutorial 4upload
Walid Maalej
 
Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!
Walid Maalej
 
On the Socialness of Software
On the Socialness of SoftwareOn the Socialness of Software
On the Socialness of Software
Walid Maalej
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU GrazWalid Maalej
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsWalid Maalej
 
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Walid Maalej
 
Can Development Work Describe Itself?
Can Development Work Describe Itself?Can Development Work Describe Itself?
Can Development Work Describe Itself?
Walid Maalej
 
05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements ExplicitWalid Maalej
 
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...Walid Maalej
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements ElicitationWalid Maalej
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...Walid Maalej
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...Walid Maalej
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product LinesWalid Maalej
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements KnowledgeWalid Maalej
 
14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support Creativity14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support CreativityWalid Maalej
 
03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably Sized03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably SizedWalid Maalej
 
00 Opening: Why MaRK
00 Opening: Why MaRK00 Opening: Why MaRK
00 Opening: Why MaRKWalid Maalej
 

More from Walid Maalej (20)

How Can Software Engineering Support AI
How Can Software Engineering Support AIHow Can Software Engineering Support AI
How Can Software Engineering Support AI
 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
 
Msr14 tutorial 4upload
Msr14 tutorial 4uploadMsr14 tutorial 4upload
Msr14 tutorial 4upload
 
Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!
 
On the Socialness of Software
On the Socialness of SoftwareOn the Socialness of Software
On the Socialness of Software
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU Graz
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering Tools
 
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
 
Can Development Work Describe Itself?
Can Development Work Describe Itself?Can Development Work Describe Itself?
Can Development Work Describe Itself?
 
05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit
 
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge
 
14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support Creativity14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support Creativity
 
03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably Sized03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably Sized
 
00 Opening: Why MaRK
00 Opening: Why MaRK00 Opening: Why MaRK
00 Opening: Why MaRK
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

10 A Machine Learning Approach for Identifying Expert Stakeholders

  • 1. A Machine Learning Approach for Identifying Expert Stakeholders Carlos Castro-Herrera Jane Cleland-Huang
  • 2. Outline Introduction & Motivation Case Study Identifying Expert Stakeholders Direct stakeholders Indirect stakeholders Inferred stakeholders Conclusions and Future work 9/2/2009 2 RE09 • Carlos Castro-Herrera • DePaul University
  • 3. Introduction & Motivation Requirements Elicitation: Representative group of stakeholders Proactively engaged Discovery and Analysis of the requirements Organizations adopting online collaborative tools How to identify Subject Matter Experts? Novel technique that automatically analyzes contributions and interests to identify relevant stakeholders Machine learning techniques organize contributions into topics Identifies three classes of stakeholders: Direct, Indirect and Inferred. Can be combined into a single ranking. 9/2/2009 3 RE09 • Carlos Castro-Herrera • DePaul University
  • 4. Case Study Student Dataset 36 Masters students: Requirements Engineering Class 366 Feature requests Amazon-like web portal Purchasing and Selling of school books 9/2/2009 4 RE09 • Carlos Castro-Herrera • DePaul University
  • 5. Direct Stakeholders Made specific contributions to a topic Topics can be identified: Manually Automatically Automatically: Contributions are pre-processed: Determine ‘ideal’ amount of topics: Can’s Cover Coefficient Consensus Clustering using Spherical K-Means: Co-Association Matrix: captures the proximity of the needs Hierarchical Agglomerative Clustering over the final matrix 9/2/2009 RE09 • Carlos Castro-Herrera • DePaul University 5
  • 6. Direct Stakeholders Ex. Encryption Topic: 28 Additional topics (purchases, used books, shopping cart) Contribution Metrics: Topic Contribution: % or requirements in the topic contributed by a stakeholder Topic Specialization Inverse of the number of topics a stakeholder is associated with 9/2/2009 RE09 • Carlos Castro-Herrera • DePaul University 6
  • 7. Indirect Stakeholders Made contributions to a related topic Similarity between topics: Vector Space Model using tf-idf Cosine similarity metric Similarity scores for the Encryption topic: Interest of stakeholders in the target topic can be weighted by the similarity of the related topics: 9/2/2009 RE09 • Carlos Castro-Herrera • DePaul University 7
  • 8. Indirect Stakeholders Visualize the relationships between topics: Ex. Indirect Stakeholders for the Encryption topic: 9/2/2009 RE09 • Carlos Castro-Herrera • DePaul University 8
  • 9. Inferred Stakeholders Direct and Indirect are based on content. Inferred stakeholders based on behavior profiles Collaborative Recommender Systems: 9/2/2009 RE09 • Carlos Castro-Herrera • DePaul University 9 Infer interest based on the behavior of a stakeholders with similar contribution patterns
  • 10. Inferred Stakeholders Neighbors are calculated using a similarity function: A prediction score for a particular item is calculated using the function: Ex. Top Recommendations for the Encryption topic (inferred stakeholders): 9/2/2009 RE09 • Carlos Castro-Herrera • DePaul University 10
  • 11. Conclusions and Future Work Presented a novel technique (proof of concept) Uses data mining Analyze stakeholders’ contributions Indentify potential experts (key stakeholders) for a topic Potential uses: Identify stakeholders that: Should participate in a new feature Can bring in new perspectives to a stagnant discussion Will be impacted by a change Future work: More sophisticated model More rigorous evaluation 9/2/2009 11 RE09 • Carlos Castro-Herrera • DePaul University