Ambiences on the-fly usage of available resources through personal devicesijasuc
In smart spaces such as smart homes, computation is
embedded everywhere: in toys, appliances, or the
home’s infrastructure. Most of these devices provid
e a pool of available resources which the user can
take
advantage, interacting and creating a friendly envi
ronment. The inherent composability of these system
s
and other unique characteristics such as low-cost e
nergy, simplicity in module programming, and even
their small size, make them a suitable candidate fo
r dynamic and adaptive ambient systems. This resear
ch
work focuses on what is defined as an “ambience”, a
space with a user-defined set of computational
devices. A smart-home is modeled as a collection of
ambiences, where every ambience is capable of
providing a pool of available resources to the user
. In turn, the user is supposed to carry one or sev
eral
personal devices able to interact with the ambience
s, taking advantage of his inherent mobility. In th
is way,
the whole system can benefit from resources discove
red in the spatial proximity. A software architectu
re is
designed, which is based on the implementation of l
ow-cost algorithms able to detect and update the sy
stem
when changes in an ambience occur. Ambience middlew
are implementation works in a wide range of
architectures and OSs, while showing a negligible o
verhead in the time to perform the basic output
operations.
"Computing for Human Experience: Semantics empowered Cyber-Physical, Social and Ubiquitous Computing beyond the Web" Keynote at On the Move Federated Conferences, Crete, Greece, October 18, 2011.
http://www.onthemove-conferences.org/
Details: http://wiki.knoesis.org/index.php/Computi
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...Amit Sheth
Keynote at the Workshop on Building Research Collaboration: Electricity Systems. Purdue University, West Lafayette, IN. Aug 28-29, 2013.
Abstract:
Big Data has captured much interest in research and industry, with anticipation of better decisions, efficient organizations, and many new jobs. Much of the emphasis is on technology that handles volume, including storage and computational techniques to support analysis (Hadoop, NoSQL, MapReduce, etc), and the challenges of the four Vs of Big Data: Volume, Variety, Velocity, and Veracity. However, the most important feature of data, the raison d'etre, is neither volume, variety, velocity, nor veracity -- but value. In this talk, I will emphasize the significance of Smart Data, and discuss how it is can be realized by extracting value from Big Data. Accomplishing this task requires organized ways to harness and overcome the original four V-challenges; and while the technologies currently touted may provide some necessary infrastructure-- they are far from sufficient. In particular, we will need to utilize metadata, employ semantics and intelligent processing, and leverage some of the extensive work that predates Big Data.
For achieving energy sustainability, Smart Grids are known to transform the way we generate, distribute, and consume power. Unprecedented amount of data is being collected from smart meters, smart devices, and sensors all throughout the power grid. I will discuss the central question of deriving Value from the entire smart grid data deluge by discussing novel algorithms and techniques such as Semantic Perception for dealing with Velocity, use of ontologies and vocabularies for dealing with Variety, and Continuous Semantics for dealing with Velocity. I will discuss scenarios that exemplify the process of deriving Value from Big Data in the context of Smart Grid.
Additional background is at: http://wiki.knoesis.org/index.php/Smart_Data
A previous version of this talk with more technical details but not focused on energy: http://j.mp/SmatData
A mobile agent based approach for data management to support 3 d emergency pr...Ijrdt Journal
In present-day, technology is moving towards Mobile Ad-hoc Networks (MANET), which creates temporary network in environments that have no previous network infrastructure. 3D Mobile Collaborative Virtual Environments (3D MCVEs) to support emergency preparedness scenario such as security sensitive operations (firefighter, biological attacks ) and military training, have made a considerable impact on both commercial and academic fields over the last few years. In such systems, users will share a 3D virtual environment through their mobile devices in order to accomplish specific missions. Effective data management is vital due to the massive amount of data that need to be exchanged and displayed. When the mobile devices resource capabilities are smaller than the 3D virtual environment, we need an efficient approach to maintain and manage active data in the device memory. Traditional data management schemas become inadequate when applied in mobile environment, because it is important to guarantee the existence of the VE even when many users leave suddenly the virtual environment with critical data such as (3D geometric data, score credits etc...). To meet this challenge, we propose a novel approach using decision-based mobile agent that enables nodes to autonomously make intelligent decision about data computation and node state in the network. The resulting approach limits the damage of application interest and offers a realistic virtual environment. We also provide an example of how this approach can be implemented in a real-life emergency preparedness scenario.
Design After the Rise of AI-Driven ServicesJoana Cerejo
Technology is playing a significant role in shaping the future of design. We are moving fast into a digital era where Artificial Intelligence, Machine Learning, Deep Learning, Big Data, the Internet of Things, Blockchain, Spatial Computing, and several other technologies are becoming part of the designers’ lexicon. The designers’ roles are evolving, and the touchpoints they need to consider are growing in complexity. Integrating AI developments with User-centered Design and User Experience Design is becoming a challenging task.
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...CSCJournals
The increasing population of elderly people is associated with the need to meet their increasing requirements and to provide solutions that can improve their quality of life in a smart home. In addition to fear and anxiety towards interfacing with systems; cognitive disabilities, weakened memory, disorganized behavior and even physical limitations are some of the problems that elderly people tend to face with increasing age. The essence of providing technology-based solutions to address these needs of elderly people and to create smart and assisted living spaces for the elderly; lies in developing systems that can adapt by addressing their diversity and can augment their performances in the context of their day to day goals. Therefore, this work proposes a framework for development of a Personalized Intelligent Assistant to help elderly people perform Activities of Daily Living (ADLs) in a smart and connected Internet of Things (IoT) based environment. This Personalized Intelligent Assistant can analyze different tasks performed by the user and recommend activities by considering their daily routine, current affective state and the underlining user experience. To uphold the efficacy of this proposed framework, it has been tested on a couple of datasets for modelling an "average user" and a "specific user" respectively. The results presented show that the model achieves a performance accuracy of 73.12% when modelling a "specific user", which is considerably higher than its performance while modelling an "average user", this upholds the relevance for development and implementation of this proposed framework.
Virtual worlds are part of the shared spaces technologies and are applied to strengthen the weaknesses of teamwork, identifying a direct relationship with the intellectual capital. Theoretical models on virtual worlds have different attributes from other digital media and allow getting effective team collaboration; this is possible because unlike 3D games, virtual world’s user actions lie in their interest. Based on the information about virtual worlds, intellectual capital, collaborative knowledge management, intelligent agents and MPLM3D platform, we propose a model to demonstrate how the interaction with intelligent agents allows getting an effective collaborative learning using the platform Second Life to non-native in social issues as democracy and social development.
Ambiences on the-fly usage of available resources through personal devicesijasuc
In smart spaces such as smart homes, computation is
embedded everywhere: in toys, appliances, or the
home’s infrastructure. Most of these devices provid
e a pool of available resources which the user can
take
advantage, interacting and creating a friendly envi
ronment. The inherent composability of these system
s
and other unique characteristics such as low-cost e
nergy, simplicity in module programming, and even
their small size, make them a suitable candidate fo
r dynamic and adaptive ambient systems. This resear
ch
work focuses on what is defined as an “ambience”, a
space with a user-defined set of computational
devices. A smart-home is modeled as a collection of
ambiences, where every ambience is capable of
providing a pool of available resources to the user
. In turn, the user is supposed to carry one or sev
eral
personal devices able to interact with the ambience
s, taking advantage of his inherent mobility. In th
is way,
the whole system can benefit from resources discove
red in the spatial proximity. A software architectu
re is
designed, which is based on the implementation of l
ow-cost algorithms able to detect and update the sy
stem
when changes in an ambience occur. Ambience middlew
are implementation works in a wide range of
architectures and OSs, while showing a negligible o
verhead in the time to perform the basic output
operations.
"Computing for Human Experience: Semantics empowered Cyber-Physical, Social and Ubiquitous Computing beyond the Web" Keynote at On the Move Federated Conferences, Crete, Greece, October 18, 2011.
http://www.onthemove-conferences.org/
Details: http://wiki.knoesis.org/index.php/Computi
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...Amit Sheth
Keynote at the Workshop on Building Research Collaboration: Electricity Systems. Purdue University, West Lafayette, IN. Aug 28-29, 2013.
Abstract:
Big Data has captured much interest in research and industry, with anticipation of better decisions, efficient organizations, and many new jobs. Much of the emphasis is on technology that handles volume, including storage and computational techniques to support analysis (Hadoop, NoSQL, MapReduce, etc), and the challenges of the four Vs of Big Data: Volume, Variety, Velocity, and Veracity. However, the most important feature of data, the raison d'etre, is neither volume, variety, velocity, nor veracity -- but value. In this talk, I will emphasize the significance of Smart Data, and discuss how it is can be realized by extracting value from Big Data. Accomplishing this task requires organized ways to harness and overcome the original four V-challenges; and while the technologies currently touted may provide some necessary infrastructure-- they are far from sufficient. In particular, we will need to utilize metadata, employ semantics and intelligent processing, and leverage some of the extensive work that predates Big Data.
For achieving energy sustainability, Smart Grids are known to transform the way we generate, distribute, and consume power. Unprecedented amount of data is being collected from smart meters, smart devices, and sensors all throughout the power grid. I will discuss the central question of deriving Value from the entire smart grid data deluge by discussing novel algorithms and techniques such as Semantic Perception for dealing with Velocity, use of ontologies and vocabularies for dealing with Variety, and Continuous Semantics for dealing with Velocity. I will discuss scenarios that exemplify the process of deriving Value from Big Data in the context of Smart Grid.
Additional background is at: http://wiki.knoesis.org/index.php/Smart_Data
A previous version of this talk with more technical details but not focused on energy: http://j.mp/SmatData
A mobile agent based approach for data management to support 3 d emergency pr...Ijrdt Journal
In present-day, technology is moving towards Mobile Ad-hoc Networks (MANET), which creates temporary network in environments that have no previous network infrastructure. 3D Mobile Collaborative Virtual Environments (3D MCVEs) to support emergency preparedness scenario such as security sensitive operations (firefighter, biological attacks ) and military training, have made a considerable impact on both commercial and academic fields over the last few years. In such systems, users will share a 3D virtual environment through their mobile devices in order to accomplish specific missions. Effective data management is vital due to the massive amount of data that need to be exchanged and displayed. When the mobile devices resource capabilities are smaller than the 3D virtual environment, we need an efficient approach to maintain and manage active data in the device memory. Traditional data management schemas become inadequate when applied in mobile environment, because it is important to guarantee the existence of the VE even when many users leave suddenly the virtual environment with critical data such as (3D geometric data, score credits etc...). To meet this challenge, we propose a novel approach using decision-based mobile agent that enables nodes to autonomously make intelligent decision about data computation and node state in the network. The resulting approach limits the damage of application interest and offers a realistic virtual environment. We also provide an example of how this approach can be implemented in a real-life emergency preparedness scenario.
Design After the Rise of AI-Driven ServicesJoana Cerejo
Technology is playing a significant role in shaping the future of design. We are moving fast into a digital era where Artificial Intelligence, Machine Learning, Deep Learning, Big Data, the Internet of Things, Blockchain, Spatial Computing, and several other technologies are becoming part of the designers’ lexicon. The designers’ roles are evolving, and the touchpoints they need to consider are growing in complexity. Integrating AI developments with User-centered Design and User Experience Design is becoming a challenging task.
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...CSCJournals
The increasing population of elderly people is associated with the need to meet their increasing requirements and to provide solutions that can improve their quality of life in a smart home. In addition to fear and anxiety towards interfacing with systems; cognitive disabilities, weakened memory, disorganized behavior and even physical limitations are some of the problems that elderly people tend to face with increasing age. The essence of providing technology-based solutions to address these needs of elderly people and to create smart and assisted living spaces for the elderly; lies in developing systems that can adapt by addressing their diversity and can augment their performances in the context of their day to day goals. Therefore, this work proposes a framework for development of a Personalized Intelligent Assistant to help elderly people perform Activities of Daily Living (ADLs) in a smart and connected Internet of Things (IoT) based environment. This Personalized Intelligent Assistant can analyze different tasks performed by the user and recommend activities by considering their daily routine, current affective state and the underlining user experience. To uphold the efficacy of this proposed framework, it has been tested on a couple of datasets for modelling an "average user" and a "specific user" respectively. The results presented show that the model achieves a performance accuracy of 73.12% when modelling a "specific user", which is considerably higher than its performance while modelling an "average user", this upholds the relevance for development and implementation of this proposed framework.
Virtual worlds are part of the shared spaces technologies and are applied to strengthen the weaknesses of teamwork, identifying a direct relationship with the intellectual capital. Theoretical models on virtual worlds have different attributes from other digital media and allow getting effective team collaboration; this is possible because unlike 3D games, virtual world’s user actions lie in their interest. Based on the information about virtual worlds, intellectual capital, collaborative knowledge management, intelligent agents and MPLM3D platform, we propose a model to demonstrate how the interaction with intelligent agents allows getting an effective collaborative learning using the platform Second Life to non-native in social issues as democracy and social development.
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
Nowadays, cities around the world intend to use information technology to improve the lives of their citizens.
Future smart cities will incorporate digital data and technology to interact differently with their human
inhabitants.
Among the key component of a smart city, we find the smart home component. It is an autonomic environment
that can provide various smart services by considering the user’s context information. Several methods are used
in context-aware system to provide such services. In this paper, we propose an approach to offer the most
relevant services to the user according to any significant change of his context environment. The proposed
approach is based on the use of context history information together with user profiling and machine learning
techniques. Experimentations show that the proposed solution can efficiently provide the most useful services to
the user in an intelligent home environment.
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeCognizant
The rapid growth of analytics, AI and related intelligent software is merely the first phase of the robotics revolution. Computer algorithms that learn and improve the output of systems over time are now managing and controlling physical systems in ways that enable machines to function autonomously.
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...RSIS International
The Things of Internet (TOI) are paradigm stands for
virtually interconnected objects that we can identify the objects
through its different devices and services with Wi-Fi sensing
system, computing, and communications system. All of the
implementations, applications and there services are
implemented over the TOI architecture system. It can use the
concept to get benefit over the cloud computing services. Sensing
Service (SS) is cloud-inspired service model which used to
enables access the TOI. We present a framework where TOI can
enhance public safety through crowd management system, and
also provide sensing services with different types of sensors
device are available. In order to ensure trustworthiness in the
presented framework, where users can support from there
reviews with the incentive supported of network, we can also
check the trustworthiness of data, for more trustfulness. We have
design for mobile services application to demonstrate how users
our can connect to Wi-Fi hotspots and how the networks work in
crowd sourced Wi-Fi sensing system. We propose a SS scheme
namely, Sensing for Crowd Management (SCM) for front-end
access to the TOI. To collect and share user experience through
Wi-Fi hotspots in an urban and rural area. We incorporate the
network into the system. SCM is used to sensing data on cloud
model and a procedure which used to selects mobile devices for
specific tasks and identifies the payments by users through
mobile devices which provide data. The performance of SCM
shows that the impact of more users in the crowd sourced data
can be degraded by 70% while trustworthiness of a malicious
user converges to a value below 30% following few auctions.
Moreover, we show that SCM can enhance the utility of the
public safety authority up to 80%.
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
Ubiquitous systems require user to be dynamically and realtime informed in order to make his current activity increasingly easy. First, this paper presents and discusses a method to model the realtime interaction of the user with a ubiquitous system based on Petri-nets modelling technology. The goal deals with investigating dynamically the appropriate form of interaction depending on the context of the user. Thus, the interaction model structure should be dynamically improved with respect to the current and particular activity or goal of the user to better cope with his runtime requirements. This mechanism has been characterized as “models mutation”. Secondly, this paper proves the dynamic construction of models while basing on the dynamic composition of services. The ultimate purpose is to take advantage of the ontology of service written in OWL-S in order to describe the dynamic aspect of Petri-nets based models, especially, the realtime and automatic composition of such models. Simulation work has been conducted to validate the proposed approach.
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
Interactive systems in the mobile, ubiquitous and virtual environments are at a stage of development where designers and developers are keen to find out more about design, use, and usability of these systems. Ubiquitous Computing is the design, implementation and usability that highlight the theories, techniques, tools and best practices in these environments. This paper shows that usable and useful systems that can be achieved in ways that will improve usability to enhance user experience. Research on the usability issues for young children, teenagers, adults and the elderly is presented with different techniques for the mobile, ubiquitous and virtual environments. Interactive frameworks in the portable, omnipresent, and virtual situations are at a phase of advancement where creators and engineers are quick to discover more about the outline, use, and ease of use of these frameworks. The objective of this research paper is to assess the tools and techniques for designing, implementing, and evaluating ubiquitous computing systems used by developers so as to formulate practical solutions that address the functionality of these systems. Ideal systems ensure that designers are able to develop and predict usability of systems at all the stages of virtual environments. This is particularly essential as it increases the experience of the users. This requires one to use the best tool and techniques backed by theories to practice the same. However this varies across different fields such as ubiquitous and mobile environments. In addition all the computing tools have to share visionary tools that allow them to network while at the same time they are processing and distinctively modeling the user interface. Some of the main methods that are used for smart devices include tools such as tabs, boards and pads. Various tools are usually used in the design of the works of the computer. The need to select appropriate techniques that will allow for the efficient use of the chosen techniques for the devices is thus a necessity. This implies that the selection of such tools should be based on set out effective techniques that have been tested so that the required output is achieved.
• Intelligent objects introduce a new vision for strengthening communication, relationship and business. Each system must be able to communicate with humans and non humans and its capabilities bring scalability, adaptability, flexibility and greater efficiency.
• IoT generates a big growth of complexity and a new method is necessary to correctly design app.
• We have developed on the field the method Here&Now to permit to manage contextual, liquid, intelligent and connected applications. This means designing software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
This is the first webinar about an IoT design method that we have created during these months.
• Intelligent objects introduce a new vision for strengthening communication, relationship and business. Each system must be able to communicate with humans and non humans and its capabilities bring scalability, adaptability, flexibility and greater efficiency.
• IoT generates a big growth of complexity and a new method is necessary to correctly design app.
• We have developed on the field the method Here&Now to permit to manage contextual, liquid, intelligent and connected applications. This means designing software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
Meetup #3 - Cyber-physical view of the Internet of EverythingFrancesco Rago
The Internet of Everything (IoE) is built on the connections among people, processes, data, and internet of things. However, it is not about these four dimensions in isolation. Each amplifies the capabilities of the other three. It is in the intersection of all of these elements that the true power of Internet of Everything is realized.
We will examine the Cyber-physical view to explore Specification, Hybrid and Heterogeneous Models, Conceptual frameworks, Multiform Time, and much more.
Presentation held 17 September 2015 at IBM T. J. Watson Research Center, NY
Hybrid Collective Adaptive Systems (hCAS) is a new generation of socio-technical systems where both humans and machine peers complement each other and operate jointly on complex collaborative processes (e.g., collaborative question answering, ride-sharing, collaborative software development).
This presupposes deploying ad-hoc assembled teams of human and machine services that actively collaborate and communicate among each other, exchanging different artifacts and jointly processing them. hCAS are characterized by the fundamental properties of hybridity and collectiveness, hiding from users the complexities associated with managing the collaboration and coordination of hybrid human/machine teams.
In this talk, I discuss major challenges in designing such systems (e.g., team formation, adaptability, execution orchestration) and how these can be alleviated by delegating the responsibility and the know-how needed for these duties to the participating human peers, while influencing them through appropriate programming abstractions (directly) and incentive mechanisms (indirectly). I will present the design of the hCAS named SmartSociety platform, and the programming abstractions and incentive modeling language we developed for it.
Introduction to agents and multi-agent systemsAntonio Moreno
Multi-agent systems course at University Rovira i Virgili. Slides mostly based on those of Rosenschein, from the content of the book by Wooldridge.
Lecture 1-Introduction to agents and multi-agent systems.
Smart Data - How you and I will exploit Big Data for personalized digital hea...Amit Sheth
Amit Sheth's keynote at IEEE BigData 2014, Oct 29, 2014.
Abstract from:
http://cci.drexel.edu/bigdata/bigdata2014/keynotespeech.htm
Big Data has captured a lot of interest in industry, with the emphasis on the challenges of the four Vs of Big Data: Volume, Variety, Velocity, and Veracity, and their applications to drive value for businesses. Recently, there is rapid growth in situations where a big data challenge relates to making individually relevant decisions. A key example is personalized digital health that related to taking better decisions about our health, fitness, and well-being. Consider for instance, understanding the reasons for and avoiding an asthma attack based on Big Data in the form of personal health signals (e.g., physiological data measured by devices/sensors or Internet of Things around humans, on the humans, and inside/within the humans), public health signals (e.g., information coming from the healthcare system such as hospital admissions), and population health signals (such as Tweets by people related to asthma occurrences and allergens, Web services providing pollen and smog information). However, no individual has the ability to process all these data without the help of appropriate technology, and each human has different set of relevant data!
In this talk, I will describe Smart Data that is realized by extracting value from Big Data, to benefit not just large companies but each individual. If my child is an asthma patient, for all the data relevant to my child with the four V-challenges, what I care about is simply, “How is her current health, and what are the risk of having an asthma attack in her current situation (now and today), especially if that risk has changed?” As I will show, Smart Data that gives such personalized and actionable information will need to utilize metadata, use domain specific knowledge, employ semantics and intelligent processing, and go beyond traditional reliance on ML and NLP. I will motivate the need for a synergistic combination of techniques similar to the close interworking of the top brain and the bottom brain in the cognitive models.
For harnessing volume, I will discuss the concept of Semantic Perception, that is, how to convert massive amounts of data into information, meaning, and insight useful for human decision-making. For dealing with Variety, I will discuss experience in using agreement represented in the form of ontologies, domain models, or vocabularies, to support semantic interoperability and integration. For Velocity, I will discuss somewhat more recent work on Continuous Semantics, which seeks to use dynamically created models of new objects, concepts, and relationships, using them to better understand new cues in the data that capture rapidly evolving events and situations.
Smart Data applications in development at Kno.e.sis come from the domains of personalized health, energy, disaster response, and smart city.
Applicability of big data techniques to smart cities deploymentsNexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Software Engineering Challenges in Pervasive Computing: A reviewEditor IJCATR
Moving away from decades of machine-centric computing and making pervasive human-centric computing, the new
wave of computing, a reality revolutionizes the relationship between humans and computing systems. There is a growing interest
in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and
capable of acting autonomously on behalf of users The software challenges to turn such pervasive or ubiquitous computing
environments into reality are enormous In this paper, we review some of the challenges of software engineering in pervasive
computing.
Teaching cognitive computing with ibm watsondiannepatricia
Ralph Badinelli, Lenz Chair in the Department of Business Information Technology, Pamplin College of Business of Virginia Tech. presented "Teaching Cognitive Computing with IBM Watson" as part of the Cognitive Systems Institute Speaker Series.
Cognitive systems institute talk 8 june 2017 - v.1.0diannepatricia
José Hernández-Orallo, Full Professor, Department of Information Systems and Computation at the Universitat Politecnica de València, presentation “Evaluating Cognitive Systems: Task-oriented or Ability-oriented?” as part of the Cognitive Systems Institute Speaker Series.
More Related Content
Similar to Elastic cognitive systems 18 6-2015-dustdar
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
Nowadays, cities around the world intend to use information technology to improve the lives of their citizens.
Future smart cities will incorporate digital data and technology to interact differently with their human
inhabitants.
Among the key component of a smart city, we find the smart home component. It is an autonomic environment
that can provide various smart services by considering the user’s context information. Several methods are used
in context-aware system to provide such services. In this paper, we propose an approach to offer the most
relevant services to the user according to any significant change of his context environment. The proposed
approach is based on the use of context history information together with user profiling and machine learning
techniques. Experimentations show that the proposed solution can efficiently provide the most useful services to
the user in an intelligent home environment.
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeCognizant
The rapid growth of analytics, AI and related intelligent software is merely the first phase of the robotics revolution. Computer algorithms that learn and improve the output of systems over time are now managing and controlling physical systems in ways that enable machines to function autonomously.
Trustworthy Sensing for Public Safety in Cloud Centric Things of Internet wit...RSIS International
The Things of Internet (TOI) are paradigm stands for
virtually interconnected objects that we can identify the objects
through its different devices and services with Wi-Fi sensing
system, computing, and communications system. All of the
implementations, applications and there services are
implemented over the TOI architecture system. It can use the
concept to get benefit over the cloud computing services. Sensing
Service (SS) is cloud-inspired service model which used to
enables access the TOI. We present a framework where TOI can
enhance public safety through crowd management system, and
also provide sensing services with different types of sensors
device are available. In order to ensure trustworthiness in the
presented framework, where users can support from there
reviews with the incentive supported of network, we can also
check the trustworthiness of data, for more trustfulness. We have
design for mobile services application to demonstrate how users
our can connect to Wi-Fi hotspots and how the networks work in
crowd sourced Wi-Fi sensing system. We propose a SS scheme
namely, Sensing for Crowd Management (SCM) for front-end
access to the TOI. To collect and share user experience through
Wi-Fi hotspots in an urban and rural area. We incorporate the
network into the system. SCM is used to sensing data on cloud
model and a procedure which used to selects mobile devices for
specific tasks and identifies the payments by users through
mobile devices which provide data. The performance of SCM
shows that the impact of more users in the crowd sourced data
can be degraded by 70% while trustworthiness of a malicious
user converges to a value below 30% following few auctions.
Moreover, we show that SCM can enhance the utility of the
public safety authority up to 80%.
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
This paper offers a survey of ubiquitous computing research which is the developing a scope that
gears communication technologies into routine life accomplishments. This study paper affords a types of the
studies that extents at the ubiquitous computing exemplar. In this paper, we present collective structure principles
of ubiquitous systems and scrutinize important developments in context-conscious ubiquitous structures. In toting,
this studies work affords a novel structure of ubiquitous computing system and an evaluation of sensors needed
for applications in ubiquitous computing. The goal of this studies work are 3-fold: i) help as a parameter for
researchers who're first-hand to ubiquitous computing and want to subsidize to this research expanse, ii) provide
a unique machine architecture for ubiquitous computing system, and iii) offer auxiliary studies ways necessary
for exceptional-of-provider assertion of ubiquitous computing..
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
Ubiquitous systems require user to be dynamically and realtime informed in order to make his current activity increasingly easy. First, this paper presents and discusses a method to model the realtime interaction of the user with a ubiquitous system based on Petri-nets modelling technology. The goal deals with investigating dynamically the appropriate form of interaction depending on the context of the user. Thus, the interaction model structure should be dynamically improved with respect to the current and particular activity or goal of the user to better cope with his runtime requirements. This mechanism has been characterized as “models mutation”. Secondly, this paper proves the dynamic construction of models while basing on the dynamic composition of services. The ultimate purpose is to take advantage of the ontology of service written in OWL-S in order to describe the dynamic aspect of Petri-nets based models, especially, the realtime and automatic composition of such models. Simulation work has been conducted to validate the proposed approach.
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
Interactive systems in the mobile, ubiquitous and virtual environments are at a stage of development where designers and developers are keen to find out more about design, use, and usability of these systems. Ubiquitous Computing is the design, implementation and usability that highlight the theories, techniques, tools and best practices in these environments. This paper shows that usable and useful systems that can be achieved in ways that will improve usability to enhance user experience. Research on the usability issues for young children, teenagers, adults and the elderly is presented with different techniques for the mobile, ubiquitous and virtual environments. Interactive frameworks in the portable, omnipresent, and virtual situations are at a phase of advancement where creators and engineers are quick to discover more about the outline, use, and ease of use of these frameworks. The objective of this research paper is to assess the tools and techniques for designing, implementing, and evaluating ubiquitous computing systems used by developers so as to formulate practical solutions that address the functionality of these systems. Ideal systems ensure that designers are able to develop and predict usability of systems at all the stages of virtual environments. This is particularly essential as it increases the experience of the users. This requires one to use the best tool and techniques backed by theories to practice the same. However this varies across different fields such as ubiquitous and mobile environments. In addition all the computing tools have to share visionary tools that allow them to network while at the same time they are processing and distinctively modeling the user interface. Some of the main methods that are used for smart devices include tools such as tabs, boards and pads. Various tools are usually used in the design of the works of the computer. The need to select appropriate techniques that will allow for the efficient use of the chosen techniques for the devices is thus a necessity. This implies that the selection of such tools should be based on set out effective techniques that have been tested so that the required output is achieved.
• Intelligent objects introduce a new vision for strengthening communication, relationship and business. Each system must be able to communicate with humans and non humans and its capabilities bring scalability, adaptability, flexibility and greater efficiency.
• IoT generates a big growth of complexity and a new method is necessary to correctly design app.
• We have developed on the field the method Here&Now to permit to manage contextual, liquid, intelligent and connected applications. This means designing software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
This is the first webinar about an IoT design method that we have created during these months.
• Intelligent objects introduce a new vision for strengthening communication, relationship and business. Each system must be able to communicate with humans and non humans and its capabilities bring scalability, adaptability, flexibility and greater efficiency.
• IoT generates a big growth of complexity and a new method is necessary to correctly design app.
• We have developed on the field the method Here&Now to permit to manage contextual, liquid, intelligent and connected applications. This means designing software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
Meetup #3 - Cyber-physical view of the Internet of EverythingFrancesco Rago
The Internet of Everything (IoE) is built on the connections among people, processes, data, and internet of things. However, it is not about these four dimensions in isolation. Each amplifies the capabilities of the other three. It is in the intersection of all of these elements that the true power of Internet of Everything is realized.
We will examine the Cyber-physical view to explore Specification, Hybrid and Heterogeneous Models, Conceptual frameworks, Multiform Time, and much more.
Presentation held 17 September 2015 at IBM T. J. Watson Research Center, NY
Hybrid Collective Adaptive Systems (hCAS) is a new generation of socio-technical systems where both humans and machine peers complement each other and operate jointly on complex collaborative processes (e.g., collaborative question answering, ride-sharing, collaborative software development).
This presupposes deploying ad-hoc assembled teams of human and machine services that actively collaborate and communicate among each other, exchanging different artifacts and jointly processing them. hCAS are characterized by the fundamental properties of hybridity and collectiveness, hiding from users the complexities associated with managing the collaboration and coordination of hybrid human/machine teams.
In this talk, I discuss major challenges in designing such systems (e.g., team formation, adaptability, execution orchestration) and how these can be alleviated by delegating the responsibility and the know-how needed for these duties to the participating human peers, while influencing them through appropriate programming abstractions (directly) and incentive mechanisms (indirectly). I will present the design of the hCAS named SmartSociety platform, and the programming abstractions and incentive modeling language we developed for it.
Introduction to agents and multi-agent systemsAntonio Moreno
Multi-agent systems course at University Rovira i Virgili. Slides mostly based on those of Rosenschein, from the content of the book by Wooldridge.
Lecture 1-Introduction to agents and multi-agent systems.
Smart Data - How you and I will exploit Big Data for personalized digital hea...Amit Sheth
Amit Sheth's keynote at IEEE BigData 2014, Oct 29, 2014.
Abstract from:
http://cci.drexel.edu/bigdata/bigdata2014/keynotespeech.htm
Big Data has captured a lot of interest in industry, with the emphasis on the challenges of the four Vs of Big Data: Volume, Variety, Velocity, and Veracity, and their applications to drive value for businesses. Recently, there is rapid growth in situations where a big data challenge relates to making individually relevant decisions. A key example is personalized digital health that related to taking better decisions about our health, fitness, and well-being. Consider for instance, understanding the reasons for and avoiding an asthma attack based on Big Data in the form of personal health signals (e.g., physiological data measured by devices/sensors or Internet of Things around humans, on the humans, and inside/within the humans), public health signals (e.g., information coming from the healthcare system such as hospital admissions), and population health signals (such as Tweets by people related to asthma occurrences and allergens, Web services providing pollen and smog information). However, no individual has the ability to process all these data without the help of appropriate technology, and each human has different set of relevant data!
In this talk, I will describe Smart Data that is realized by extracting value from Big Data, to benefit not just large companies but each individual. If my child is an asthma patient, for all the data relevant to my child with the four V-challenges, what I care about is simply, “How is her current health, and what are the risk of having an asthma attack in her current situation (now and today), especially if that risk has changed?” As I will show, Smart Data that gives such personalized and actionable information will need to utilize metadata, use domain specific knowledge, employ semantics and intelligent processing, and go beyond traditional reliance on ML and NLP. I will motivate the need for a synergistic combination of techniques similar to the close interworking of the top brain and the bottom brain in the cognitive models.
For harnessing volume, I will discuss the concept of Semantic Perception, that is, how to convert massive amounts of data into information, meaning, and insight useful for human decision-making. For dealing with Variety, I will discuss experience in using agreement represented in the form of ontologies, domain models, or vocabularies, to support semantic interoperability and integration. For Velocity, I will discuss somewhat more recent work on Continuous Semantics, which seeks to use dynamically created models of new objects, concepts, and relationships, using them to better understand new cues in the data that capture rapidly evolving events and situations.
Smart Data applications in development at Kno.e.sis come from the domains of personalized health, energy, disaster response, and smart city.
Applicability of big data techniques to smart cities deploymentsNexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
Software Engineering Challenges in Pervasive Computing: A reviewEditor IJCATR
Moving away from decades of machine-centric computing and making pervasive human-centric computing, the new
wave of computing, a reality revolutionizes the relationship between humans and computing systems. There is a growing interest
in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and
capable of acting autonomously on behalf of users The software challenges to turn such pervasive or ubiquitous computing
environments into reality are enormous In this paper, we review some of the challenges of software engineering in pervasive
computing.
Teaching cognitive computing with ibm watsondiannepatricia
Ralph Badinelli, Lenz Chair in the Department of Business Information Technology, Pamplin College of Business of Virginia Tech. presented "Teaching Cognitive Computing with IBM Watson" as part of the Cognitive Systems Institute Speaker Series.
Cognitive systems institute talk 8 june 2017 - v.1.0diannepatricia
José Hernández-Orallo, Full Professor, Department of Information Systems and Computation at the Universitat Politecnica de València, presentation “Evaluating Cognitive Systems: Task-oriented or Ability-oriented?” as part of the Cognitive Systems Institute Speaker Series.
Building Compassionate Conversational Systemsdiannepatricia
Rama Akkiraju, Distinguished Engineer and Master Inventor at IBM, presention "Building Compassionate Conversational Systems" as part of the Cognitive Systems Institute Speaker Series.
“Artificial Intelligence, Cognitive Computing and Innovating in Practice”diannepatricia
Cristina Mele, Full Professor of Management at the University of Napoli “Federico II”, presentation as part of Cognitive Systems Institute Speaker Series
Eric Manser and Will Scott from IBM Research, presentation on "Cognitive Insights Drive Self-driving Accessibility" as part of the Cognitive Systems Institute Speaker Series
Roberto Sicconi and Malgorzata (Maggie) Stys, founders of TeleLingo, presented "AI in the Car" as part of the Cognitive Systems Institute Speaker Series.
“Semantic PDF Processing & Document Representation”diannepatricia
Sridhar Iyengar, IBM Distinguished Engineer at the IBM T. J. Watson Research Center, presention “Semantic PDF Processing & Document Representation” as part of the Cognitive Systems Institute Group Speaker Series.
Joining Industry and Students for Cognitive Solutions at Karlsruhe Services R...diannepatricia
Gerhard Satzger, Director of the Karlsruhe Service Research Institute and two former students and IBMers, Sebastian Hirschl and Kathrin Fitzer, presention"Joining Industry and Students for Cognitive Solutions at Karlsruhe Services Research Center" as part of the Cognitive Systems Institute Speaker Series.
170330 cognitive systems institute speaker series mark sherman - watson pr...diannepatricia
Dr. Mark Sherman, Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. , presention “Experiences Developing an IBM Watson Cognitive Processing Application to Support Q&A of Application Security Diagnostics” as part of the Cognitive Systems Institute Speaker Series.
“Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption”diannepatricia
Chuck Howell, Chief Engineer for Intelligence Programs and Integration at the MITRE Corporation, presentation “Fairness Cases as an Accelerant and Enabler for Cognitive Assistance Adoption” as part of the Cognitive Systems Institute Speaker Series.
From complex Systems to Networks: Discovering and Modeling the Correct Network"diannepatricia
From complex Systems to Networks: Discovering and Modeling the Correct Network" by Nitesh Chawla as part of the Cognitive Systems Institute Speaker Series
Nitesh Chawla is the Frank M. Freimann Professor of Computer Science and Engineering, and director of the research center on network and data sciences (iCeNSA) at the University of Notre Dame.
Developing Cognitive Systems to Support Team Cognitiondiannepatricia
Steve Fiore from the University of Central Florida presented “Developing Cognitive Systems to Support Team Cognition” as part of the Cognitive Systems Institute Speaker Series
Kevin Sullivan from the University of Virginia presented: "Cyber-Social Learning Systems: Take-Aways from First Community Computing Consortium Workshop on Cyber-Social Learning Systems" as part of the Cognitive Systems Institute Speaker Series.
“IT Technology Trends in 2017… and Beyond”diannepatricia
William Chamberlin, IBM Distinguished Market Intelligence Professional, presented “IT Technology Trends in 2017… and Beyond” as part of the Cognitive Systems Institute Speaker Series on January 26, 2017.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
How world-class product teams are winning in the AI era by CEO and Founder, P...
Elastic cognitive systems 18 6-2015-dustdar
1. Elastic Cognitive Systems
Cognitive Systems Institute Group, 18 June 2015
Schahram Dustdar
Distributed Systems Group
TU Vienna
dsg.tuwien.ac.at
2. eHealth &
Smart Health
networksGame Machine
Telephone
PC
DVD
Audio
TV
STBDVC
Smart
Homes
Smart eGovernments &
eAdministrationsSmart Energy
Networks
Smart Evolution – People, Services,Things
Elastic Systems
Smart Transport
Networks
3. Marine Ecosystem: http://www.xbordercurrents.co.uk/wildlife/marine-ecosystem-2
Think Ecosystems:
People, Services, Things
Diverse users with
complex networked
dependencies and
intrinsic adaptive
behavior – has:
1. Robustness
mechanisms:
achieving stability in
the presence of
disruption
2. Measures of health:
diversity, population
trends, other key
indicators
7. Connecting machines and people
Event Analyzer on
PaaS
Peak Operation
Other stakeholders
...
events stream
Normal Operation
Human Analysts
Peak OperationNormal Operation
Machine/Human
Event Analyzers
Critical
situation 1
Experts
SCU
(Big) Data analytics
Wf. A
Wf. B
Critical
situation 2
Cloud DaaS
Data analytics
M2M PaaS
Cloud IaaS
Operation
problem
Maintenance
process
Core principles:
Human computation capabilities under elastic service units
Augmenting human-based units together with software-based units
9. Specifying and controling elasticity
Basic primitives
Schahram Dustdar, Yike Guo, Rui Han,
Benjamin Satzger, Hong Linh Truong:
Programming Directives for Elastic Computing.
IEEE Internet Computing 16(6): 72-77 (2012)
SYBL (Simple Yet Beautiful Language) for
specifying elasticity requirements
SYBL-supported requirement levels
Cloud Service Level
Service Topology Level
Service Unit Level
Relationship Level
Programming/Code Level
Current SYBL implementation
in Java using Java annotations
@SYBLAnnotation(monitoring=„“,constraints=„“,strategies=„
“)
in XML
<ProgrammingDirective><Constraints><Constraint
name=c1>...</Constraint></Constraints>...</Programm
ingDirective>
as TOSCA Policies
<tosca:ServiceTemplate name="PilotCloudService">
<tosca:Policy name="St1"
policyType="SYBLStrategy"> St1:STRATEGY
minimize(Cost) WHEN high(overallQuality)
</tosca:Policy>...
10. Elasticity Model for Cloud Services
Moldovan D., G. Copil,Truong H.-L., Dustdar S. (2013). MELA:
Monitoring and Analyzing Elasticity of Cloud Service. CloudCom
2013
Elasticity space functions: to determine if a
service unit/service is in the “elasticity behavior”
Elasticity Pathway functions: to characterize the
elasticity behavior from a general/particular view
Elasticity Space
12. Human-based service elasticity
Which types of human-based service instances
can we provision?
How to provision these instances?
How to utilize these instances for different types
of tasks?
Can we program these human-based services
together with software-based services
How to program incentive strategies for human
services?
14. Specifying and controling elasticity
of human-based services
What if we need to
invoke a human?
#predictive maintanance analyzing chiller measurement
#SYBL.ServiceUnitLevel
Mon1 MONITORING accuracy = Quality.Accuracy
Cons1 CONSTRAINT accuracy < 0.7
Str1 STRATEGY CASE Violated(Cons1):
Notify(Incident.DEFAULT, ServiceUnitType.HBS)
15. Evolution of Human-Based Computing
• Tim Berners-Lee’s Social Machines:
“a computational entity that blends
computational and social processes”
• Our view:
• People AND Computational Units
• Complex Workflows
• Respond to ad-hoc situations
• Leverage human creativity
• Embrace uncertainty
• No over-regulation
• Human-driven adaptation
16. Complex collaborative patterns/workflows
On-demand (machine-driven)
Open-call (human-driven)
Crowd satisfaction and non-monetary motivation
Incentives and rewards
Reputation, accountability
Career ladders, reputation transfer, virtual careers, hierarchy
Developments in Human-Based Comp.
①
②
③
18. Elastic SCU provisioning
Elastic profile
SCU (pre-)runtime/static formation
Cloud APIs
Muhammad Z.C. Candra, Hong-Linh Truong, and Schahram
Dustdar, Provisioning Quality-aware Social Compute Units in
the Cloud, ICSOC 2013.
Algorithms
Ant Colony
Optimization
variants
FCFS
Greedy
SCU
extension/reduction
Task reassignment
based on trust, cost,
availability
Mirela Riveni, Hong-Linh Truong, and Schahram
Dustdar, On the Elasticity of Social Compute Units,
CAISE 2014
①
20. Open-call Collaborative Use-case
The platform composes the possible/optimal execution plans based on
subtask offers submitted by crowd members.
Plans are recommended/offered to interested crowd members
Crowd members are able to negotiate for participating in execution of
multiple plans concurrently, effectively making only a subset of them
happen.
Negotiation orchestrated by the platform
Composition
Recommendation
NegotiationExecution
Feedback
②
request
21. SmartSociety Platform
M. Rovatsos et al., Agent protocols for social computation Quality-aware Social Compute Units,
in Metaheuristics for Smart Cities, 2015.
P. Zeppezauer et al., Virtualizing communication for hybrid and diversity-aware collective adaptive
systems, WESOA@ICSOC, 2014.
http://www.smart-society-project.eu/publications/deliverables/D_6_1/
users
crowd of human and
machine peers
②
22. Crowd satisfaction and
non-monetary motivation
[2] Kittur, A., et al.: The future of crowd work. Proc. of CSCW ’13, New York, USA.
• How to make virtual labor market competitive
and attractive for skilled workers? [2]
Complex collaborative patterns/workflows
Hierarchy/structure
Worker satisfaction and non-monetary motivation
Reputation, accountability
Career ladders, reputation transfer, virtual careers
Incentive
Management
③
26. Modeling Incentives
Examined incentive strategies in over 200 existing
social computing platforms
Examined incentive mechanisms in economics,
management science, sociology, psychology
Identified fundamental incentive mechanisms
in use today and their constituent elements
New mechanisms can be built by composing
and customizing well-known incentive elements
[3] Scekic, O., Truong, H.-L., Dustdar, S.: Incentives and rewarding in social computing.
Communications of the ACM, 56(6), 72 (2013).
③
27. Research Questions
abstraction
interlayer
• Virtualize system-specific worker team representations into a system-
agnostic model amenable to the application of incentives.
• Develop primitives for executing (applying) incentive actions.
③
28. Abstraction Interlayer
PRINC (PRogrammable INcentives) framework.
Allows modeling of human worker teams
– storing and altering worker metrics
– storing and altering worker structure
– storing behavioral history and scheduling of incentive actions
Event-based communication with underlying socio-technical system
[4] Scekic, O., Truong, H.-L., Dustdar, S.: Modeling
rewards and incentive mechanisms for social BPM.
Proc. BPM’12 (pp. 150–155), Talinn, (2013).
[5] Scekic, O., Truong, H.-L., Dustdar, S.:
Programming incentives in information systems. In
Proc. CAiSE’13 (pp. 688–703), Valencia (2013).
③
29. Research Questions
abstraction
interlayer
• Design a declarative, human-friendly way of modeling incentives
out of fundamental incentive elements.
• Translate the modeled incentive strategy into executable actions.
③
30. A Domain-Specific Language for
Incentives
[6] Scekic, O., Truong, H.-L., Dustdar, S.:
Managing Incentives in Social Computing Systems with PRINGL. WISE’14 (pp. 415—424), Thessaloniki, Greece
PRINGL – PRogrammable INcentive Graphical Language
Visuo-textual language
– Graphical elements for modeling and
composing incentive elements
– Traditional code snippets for additional
business logic
System-independent
Human-friendly syntax
Elements can be stored, shared, reused
Translated to code executable on abstraction interlayer
③
32. Conclusions
Elastic Cognitive Computing is the next step in the man &
machine „symbiosis“
Novel environments needed for
Complex collaboration patterns-> include Things, Services
Incentive management
Reputation transfer
Virtual careers
33. Thanks for your attention!
Prof. Dr. Schahram Dustdar
Distributed Systems Group
TU Wien
dsg.tuwien.ac.at