How Playstyles Evolve: Progression Analysis and Profiling in Just Cause 2Johanna Pirker
Presentation at IFIP ILRN 2016 in Vienna
Authors of the Paper: Johanna Pirker, Simone Griesmayr, Anders Drachen , Rafet Sifa
Link to paper: http://link.springer.com/chapter/10.1007%2F978-3-319-46100-7_8
Design and Evaluation of a Learner-Centric Immersive Learning Environment for...Johanna Pirker
Presentation of the paper "Design and Evaluation of a Learner-Centric Immersive Learning Environment for Physics Education" at the SouthCHI Conference
Date: 02/07/2013
How Playstyles Evolve: Progression Analysis and Profiling in Just Cause 2Johanna Pirker
Presentation at IFIP ILRN 2016 in Vienna
Authors of the Paper: Johanna Pirker, Simone Griesmayr, Anders Drachen , Rafet Sifa
Link to paper: http://link.springer.com/chapter/10.1007%2F978-3-319-46100-7_8
Design and Evaluation of a Learner-Centric Immersive Learning Environment for...Johanna Pirker
Presentation of the paper "Design and Evaluation of a Learner-Centric Immersive Learning Environment for Physics Education" at the SouthCHI Conference
Date: 02/07/2013
2009 Node XL Overview: Social Network Analysis in Excel 2007Marc Smith
A quick overview of the features of NodeXL, the network overview, discovery, and exploration add-in for Excel 2007. This tool allows for visualizing directed graphs and social networks within Excel. It provides several network metrics and manipulation tools. Networks can be imported from Twitter and personal email.
How to conduct a social network analysis: A tool for empowering teams and wor...Jeromy Anglim
Slides and details available at: http://jeromyanglim.blogspot.com/2009/10/how-to-conduct-social-network-analysis.html
A talk on using social network analysis as a team development tool.
Social Network Analysis & an Introduction to ToolsPatti Anklam
This presentation was delivered as part of an intense knowledge management curriculum. It covers the basics of network analysis and then goes into the different types of tool that support analyzing networks.
AI is used to create parts of our games. It provides intelligent enemy behavior, techniques such as pathfinding or can be used to generate in-game content procedurally. AI can also play our games. The idea to train computers to beat humans in game-like environments such as Jeopardy!, Chess, or soccer is not a new one. But can AI also design our games? The role of Artificial Intelligence in the game development process is constantly expanding. In this talk, Dr. Pirker will talk about the importance of AI in the past, the present, and especially the future of game development.
An overview of the Network Overview Discovery and Exploration add-in for Excel 2007 (NodeXL), a social network analysis add-in for the familiar spreadsheet application. Visualize twitter, flickr, facebook, and email networks with just a few mouse clicks.
Presentation discusses scientific method, common pitfalls of social media experiments. Defines some terms, shows neat tools, tries to move discussion forward.
2009 Node XL Overview: Social Network Analysis in Excel 2007Marc Smith
A quick overview of the features of NodeXL, the network overview, discovery, and exploration add-in for Excel 2007. This tool allows for visualizing directed graphs and social networks within Excel. It provides several network metrics and manipulation tools. Networks can be imported from Twitter and personal email.
How to conduct a social network analysis: A tool for empowering teams and wor...Jeromy Anglim
Slides and details available at: http://jeromyanglim.blogspot.com/2009/10/how-to-conduct-social-network-analysis.html
A talk on using social network analysis as a team development tool.
Social Network Analysis & an Introduction to ToolsPatti Anklam
This presentation was delivered as part of an intense knowledge management curriculum. It covers the basics of network analysis and then goes into the different types of tool that support analyzing networks.
AI is used to create parts of our games. It provides intelligent enemy behavior, techniques such as pathfinding or can be used to generate in-game content procedurally. AI can also play our games. The idea to train computers to beat humans in game-like environments such as Jeopardy!, Chess, or soccer is not a new one. But can AI also design our games? The role of Artificial Intelligence in the game development process is constantly expanding. In this talk, Dr. Pirker will talk about the importance of AI in the past, the present, and especially the future of game development.
An overview of the Network Overview Discovery and Exploration add-in for Excel 2007 (NodeXL), a social network analysis add-in for the familiar spreadsheet application. Visualize twitter, flickr, facebook, and email networks with just a few mouse clicks.
Presentation discusses scientific method, common pitfalls of social media experiments. Defines some terms, shows neat tools, tries to move discussion forward.
Social Network Analysis Introduction including Data Structure Graph overview. Doug Needham
Social Network Analysis Introduction including Data Structure Graph overview. Given in Cincinnati August 18th 2015 as part of the DataSeed Meetup group.
Evolving social data mining and affective analysis Athena Vakali
Evolving social data mining and affective analysis methodologies, framework and applications - Web 2.0 facts and social data
Social associations and all kinds of graphs
Evolving social data mining
Emotion-aware social data analysis
Frameworks and Applications
Highcharts and Elsevier share recent research into making interactive web charts more accessible. Our usability studies focused on three areas, including stacked column charts, scatter plots, and charts with drill-down interactivity. We will share design considerations for keyboard navigation and the understandability of non-visual representations of data visualizations.
Deep Learning for Recommendations: Fundamentals and Advances
In this part, we focus on Graph Neural Networks for Recommendations.
Tutorial Website/slides: https://advanced-recommender-systems.github.io/ijcai2021-tutorial/
https://youtu.be/4aXk3LNTJRc
Extracting Social Network Data and Multimedia Communications from Social Medi...Shalin Hai-Jew
This presentation provides an overview of some of the data extractions that may be achieved on social media platforms using their respective APIs and a free open-source tool (NodeXL).
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Essentials of Automations: The Art of Triggers and Actions in FME
Social Network Analysis of the Global Game Jam Network
1. S C I E N C E * PA S S I O N * T E C H N O L O G Y
SOCIAL NETWORK ANALYSIS OF THE
GLOBAL GAME JAM NETWORK
J O H A N N A P I R K E R , T U G R A Z , A U S T R I A
F O A A D K H O S M O O D , C A L P O LY, C A
C H R I S T I A N G Ü T L , C U R T I N U N I V E R S I T Y, A U S T R A L I A
F E B - 2 6 : : I C G J 2 0 1 7 , S A N F R A N C I S C O
2. JOHANNA PIRKER
▸ Computer Scientist & Software Engineering @Graz University of
Technology
▸ Virtual Worlds @Massachusetts Institute of Technology
▸ Researcher at Institute for Information Systems & Computer Media, TU
Graz
▸ Virtual, Immersive Realities & Worlds
▸ HCI, E-Learning, UX, Data Analysis (SNA)
▸ Games Education (for CS) & Research, Design, Development & Analysis
▸ Website: www.jpirker.com
@JOEYPRINK
3. DATA ANALYTICS
▸ Understanding jammer behaviour to create better or
innovative jam experiences
▸ Understanding and identifying patterns in jammer
data
▸ -> who is the jammer?
▸ -> statistics on jam behaviour (retention rate,
concurrency, ..)
▸ -> social behaviour of jammers?
5. SOCIAL NETWORK ANALYSIS
▸ “Strategy for investigating social structures through
the use of network and graph theories”
▸ Nodes (actors, people, topics)
▸ Ties / Edges (relationships)
▸ We can model the world around us as networks
▸ To get new information
Further reading: jis.sagepub.com/content/28/6/441.short
6. SIX DEGREES OF SEPARATION
▸ In 1967, Stanley Milgram (social psychologist at Yale &
Harvard) conducted the small-world-experiment that
is the basis of the “six degrees of separation” concept.
▸ He sent several packages to randomly selected
individuals in the US, asking them to forward the
package to a target contact person in Boston. The
average path length for the received packages was
around 5.5.
Further reading: en.wikipedia.org/wiki/Small-world_experiment
7. SIX DEGREES OF SEPARATION
▸ In 2008, a study of Microsoft showed that the average
chain of contacts between users of MSN was 6.6
people.
▸ In 2016, Facebook observed an average connection
distance between Facebook users of 3.57.
Further reading: en.wikipedia.org/wiki/Small-world_experiment
8. www.tugraz.at n
Hier könnte Ihr
Logo stehen
Six Degrees of Separation
April 28, 2015
Christian Gütl, Johanna Pirker - Institute of Information Systems and Computer Media
8
9. www.tugraz.at n
Hier könnte Ihr
Logo stehen
Social Network Analysis - Applications
§ Political Blogs
§ Prior to the 2004 U.S. Presidential election
April 28, 2015
Christian Gütl, Johanna Pirker - Institute of Information Systems and Computer Media
10
Reading: http://dl.acm.org/citation.cfm?id=1134277
10. www.tugraz.at n
Hier könnte Ihr
Logo stehen
Social Network Analysis – Applications
§ Organizations
§ Email delivery at HP labs
§ Informal communication
April 28, 2015
Christian Gütl, Johanna Pirker - Institute of Information Systems and Computer Media
11
Reading: http://www.cs.princeton.edu/~chazelle/courses/BIB/HubermanAdamic.pdf
11. www.tugraz.at n
Hier könnte Ihr
Logo stehen
Social Network Analysis – Applications
§ Ingredient networks
April 28, 2015
Christian Gütl, Johanna Pirker - Institute of Information Systems and Computer Media
12
Reading: http://dl.acm.org/citation.cfm?id=2380757
12. S O C I A L N E T W O R K S I N D E S T I N Y
Rattinger, A., Wallner, G., Drachen, A., Pirker, J., & Sifa, R. (2016, September) Integrating and Inspecting Combined Behavioral Profiling and Social Network Models in Destiny,15th International Conference on Entertainment
Computing (in press).
14. MAIN CONTRIBUTION
▸ First construction of social jammer networks within
Global Game Jam
▸ Basic social network analysis of the jammer
network
▸ Discussion of potential social networks for the GGJ
and future game jam research
15. GLOBAL GAME JAM
▸ “world’s largest game development event taking
place around the world at physical locations”
▸ each game uploaded to GGJ website and linked to
jammer profiles
▸ -> social interactions
▸ -> international context
16. DATASET
▸ Dataset crawled from GGJ website
▸ 2014-2016
▸ registered jam sites (1.637 dp)
▸ location, country, jammers,
uploaded games
▸ jammer entries (85.387 dp)
▸ locations, skills, uploaded games
▸ uploaded games (15.955 dp)
▸ name, platforms, tools, description
▸ Data set pre-processing (cleaning):
▸ names replaced by IDs
▸ only jammers who submitted required
information (18.426)
17. NETWORK RELATIONSHIP
explicit (friend, follow information) vs implicit (shared
interests) networks
▸ Jammer Network: describes connections between
jammers through the games they have developed together
(v= jammer, e = developed games together)
▸ Location Network: demonstrates the connectivity between
various locations or nations through (moving) jammers (v =
location, e = jammers developed games together)
▸ Game Network: represents a network of all games
developed connected through jammers (v = games, e =
common jammers in the development process)
18. NETWORK RELATIONSHIP
‣ Jammer Network
‣ three-year span
‣ v: jammers
‣ e: developed a game
together
‣ undirected, weighted graph
‣ (weight: # games developed
together)
JAMMER 1
JAMMER 2
JAMMER 3
3
1
20. GOAL
▸ look at subset of network to get an understanding of the
structure in the GGJ network
▸ identify potential future research possibilities with this data
▸ identify potential of graphs as tool
23. NETWORK STRUCTURE
▸ Average degree
▸ avg # of connections j2j: 4.335;
most 2-6 jammers
▸ almost 1.500 jammers degree of
1 :-(, a few 9+
24. NETWORK STRUCTURE
▸ Average weighted degree
▸ avg # of weighted connections
j2j: 5.515
▸ likely to work with same
people
25. NETWORK STRUCTURE
▸ Of 39,939 edges, which represent
the collaboration through games,
▸ 8,631 (21.61%) collaborate
more than one time with the
same jammer,
▸ 1,998 (0.50%) more than twice,
and
▸ 233 (0.58%) more than 3 times.
▸ 29 (0.07%) even worked
together 4 or more times with
the same partner (e.g. working on
two games at the same jam).
26. NETWORK STRUCTURE
▸ Largest Component (LCC)
▸ very small!
▸ 56 nodes, 194 edges
▸ Game jam location in Brazil
▸ avg degree: 6.929
▸ weighted degree: 12.786
▸ Many of these jammers have participated every
year, some have even worked on more than one
game per year.
28. GOALS
• Improve our understanding of the jammer
engagement and behaviours to improve experience
• Find issues to avoid drop-outs
• Find “important” nodes (bridges) and “weak” nodes
• Find flaws early and maybe also automatically/
dynamically
29. OBSERVATIONS
• Jammer graph is not connected: several subgraphs
representing the location, and barely connected to
other sites
• Degree can be used to predict tasks (e.g. high degree
refers to audio engineers)
• Network metrics can be used to correlate with aspects
such as retention rates or engagement (future work)
30. IDEAS
Social Networks to Strengthen the Community:
Social network can be used to identify weak ties and important
nodes, which are ”bridges” or ”hubs” and are connecting many
other nodes and components. is knowledge can be useful to avoid
drop-outs.
Additionally, SNA can be used to identify ”strong” nodes (with a
high degree). These nodes are often very experienced with game
jams and can be used as ”experts” to create new jam sites or to help
organizing events, or as part of a group, which is not very
experienced yet.
31. IDEAS
Social Networks for Dynamic Group Formation
Graph-based recommendation tools are already popular in
various fields, such as games, recipes and products. Forming
proper and meaningful groups can be a struggle in large game
jam settings, as no widely adopted methods exist.
Using social networks in a tool for group formation could be a
fast, easy, and interesting replacement of traditional methods.
32. IDEAS
Collaboration Graph as Engagement Tool
Based on the social network measure a new form of social engagement can be
created. Similar to the Small World Problem or the Erdos number, the collaboration
graph can be used to engage jammers, to collaborate with new jammers, or jammers
at different locations.
As gamification tools, jammers could be motivated through their ”degree”, or the
path length to another person (e.g. a famous game developer, the ”Carmack
number”) to collaborate with new jammers.
Carmack Number 0
Carmack Number n
Carmack Number 1
33. IDEAS
Collaboration Graph as Engagement Tool
Based on the social network measure a new form of social engagement can be
created. Similar to the Small World Problem or the Erdos number, the collaboration
graph can be used to engage jammers, to collaborate with new jammers, or jammers
at different locations.
As gamification tools, jammers could be motivated through their ”degree”, or the
path length to another person (e.g. a famous game developer, the ”Romero
number”) to collaborate with new jammers.
Romero Number 0
Romero Number n
Romero Number 1
34. IDEAS
Collaboration Graph as Engagement Tool
Based on the social network measure a new form of social engagement can be
created. Similar to the Small World Problem or the Erdos number, the collaboration
graph can be used to engage jammers, to collaborate with new jammers, or jammers
at different locations.
As gamification tools, jammers could be motivated through their ”degree”, or the
path length to another person (e.g. a famous game developer, the ”Pirker number”)
to collaborate with new jammers.
Pirker Number 0
Pirker Number n
Pirker Number n-1Pirker Number n-1
35. THANK YOU FOR YOUR
ATTENTION.
JOHANNA PIRKER, JPIRKER@MIT.EDU, @JOEYPRINK
Further information:
jpirker.com
Thanks to GGJ Foundation!
Thanks to the reviewers!