Global network structure of dominance hierarchy of ant workersAntnet slides-s...Naoki Masuda
Presentation slides for the following paper:
Hiroyuki Shimoji, Masato S. Abe, Kazuki Tsuji, Naoki Masuda.
Global network structure of dominance hierarchy of ant workers.
Journal of the Royal Society Interface, in press (2014).
Participation costs dismiss the advantage of heterogeneous networks in evolut...Naoki Masuda
Presentation slides for the following two papers (mainly (1)):
(1) Masuda. Proceedings of the Royal Society B: Biological Sciences, 274, 1815-1821 (2007).
(2) Masuda and Aihara. Physics Letters A, 313, 55-61 (2003).
10 common misconceptions in feng shui - understand why popular beliefs about the do's and don't in feng shui are wrong.
I wrote this in response to some of the more commonly misunderstood and commonly believed aspects of feng shui in order to offer a little clarity to the customers I consult and also my readers. All of the instances listed below are well-known feng shui beliefs (by even people with just passing knowledge of feng shui) although I found out most only have surface understanding and often believed at face-value, just because it was written in a book or said by someone famous. Some of the misconception had caused needless worry and in some cases panic. The problem is some of them are also perpetuated by feng shui practitioners themselves. Whether it was through erroneous knowledge or just simple misunderstanding I will never know.
The 10 common feng shui misconceptions are the findings based on my own practical feng shui consultation experience while in the field and the actual results I got back. I hope this can offer some clearer understanding and help clear up the confusion.
Preparing Students for Collaborative Leadership: Lowering the walls and cross...Lyle Birkey
Preparing Students for Collaborative Leadership: Lowering the walls and crossing boundaries using business-based professional assessments to develop interdisciplinary teams
Global network structure of dominance hierarchy of ant workersAntnet slides-s...Naoki Masuda
Presentation slides for the following paper:
Hiroyuki Shimoji, Masato S. Abe, Kazuki Tsuji, Naoki Masuda.
Global network structure of dominance hierarchy of ant workers.
Journal of the Royal Society Interface, in press (2014).
Participation costs dismiss the advantage of heterogeneous networks in evolut...Naoki Masuda
Presentation slides for the following two papers (mainly (1)):
(1) Masuda. Proceedings of the Royal Society B: Biological Sciences, 274, 1815-1821 (2007).
(2) Masuda and Aihara. Physics Letters A, 313, 55-61 (2003).
10 common misconceptions in feng shui - understand why popular beliefs about the do's and don't in feng shui are wrong.
I wrote this in response to some of the more commonly misunderstood and commonly believed aspects of feng shui in order to offer a little clarity to the customers I consult and also my readers. All of the instances listed below are well-known feng shui beliefs (by even people with just passing knowledge of feng shui) although I found out most only have surface understanding and often believed at face-value, just because it was written in a book or said by someone famous. Some of the misconception had caused needless worry and in some cases panic. The problem is some of them are also perpetuated by feng shui practitioners themselves. Whether it was through erroneous knowledge or just simple misunderstanding I will never know.
The 10 common feng shui misconceptions are the findings based on my own practical feng shui consultation experience while in the field and the actual results I got back. I hope this can offer some clearer understanding and help clear up the confusion.
Preparing Students for Collaborative Leadership: Lowering the walls and cross...Lyle Birkey
Preparing Students for Collaborative Leadership: Lowering the walls and crossing boundaries using business-based professional assessments to develop interdisciplinary teams
High-performance graph analysis is unlocking knowledge in computer security, bioinformatics, social networks, and many other data integration areas. Graphs provide a convenient abstraction for many data problems beyond linear algebra. Some problems map directly to linear algebra. Others, like community detection, look eerily similar to sparse linear algebra techniques. And then there are algorithms that strongly resist attempts at making them look like linear algebra. This talk will cover recent results with an emphasis on streaming graph problems where the graph changes and results need updated with minimal latency. We’ll also touch on issues of sensitivity and reliability where graph analysis needs to learn from numerical analysis and linear algebra.
Slides from our PacificVis 2015 presentation.
The paper tackles the problems of the “giant hairballs”, the dense and tangled structures often resulting from visualiza- tion of large social graphs. Proposed is a high-dimensional rotation technique called AGI3D, combined with an ability to filter elements based on social centrality values. AGI3D is targeted for a high-dimensional embedding of a social graph and its projection onto 3D space. It allows the user to ro- tate the social graph layout in the high-dimensional space by mouse dragging of a vertex. Its high-dimensional rotation effects give the user an illusion that he/she is destructively reshaping the social graph layout but in reality, it assists the user to find a preferred positioning and direction in the high- dimensional space to look at the internal structure of the social graph layout, keeping it unmodified. A prototype im- plementation of the proposal called Social Viewpoint Finder is tested with about 70 social graphs and this paper reports four of the analysis results.
We develop a new method to optimize portfolios of options in a market where European calls and puts are available with many exercise prices for each of several potentially correlated underlying assets. We identify the combination of asset-specific option payoffs that maximizes the Sharpe ratio of the overall portfolio: such payoffs are the unique solution to a system of integral equations, which reduce to a linear matrix equation under suitable representations of the underlying probabilities. Even when implied volatilities are all higher than historical volatilities, it can be optimal to sell options on some assets while buying options on others, as hedging demand outweighs demand for asset-specific returns.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
High-performance graph analysis is unlocking knowledge in computer security, bioinformatics, social networks, and many other data integration areas. Graphs provide a convenient abstraction for many data problems beyond linear algebra. Some problems map directly to linear algebra. Others, like community detection, look eerily similar to sparse linear algebra techniques. And then there are algorithms that strongly resist attempts at making them look like linear algebra. This talk will cover recent results with an emphasis on streaming graph problems where the graph changes and results need updated with minimal latency. We’ll also touch on issues of sensitivity and reliability where graph analysis needs to learn from numerical analysis and linear algebra.
Slides from our PacificVis 2015 presentation.
The paper tackles the problems of the “giant hairballs”, the dense and tangled structures often resulting from visualiza- tion of large social graphs. Proposed is a high-dimensional rotation technique called AGI3D, combined with an ability to filter elements based on social centrality values. AGI3D is targeted for a high-dimensional embedding of a social graph and its projection onto 3D space. It allows the user to ro- tate the social graph layout in the high-dimensional space by mouse dragging of a vertex. Its high-dimensional rotation effects give the user an illusion that he/she is destructively reshaping the social graph layout but in reality, it assists the user to find a preferred positioning and direction in the high- dimensional space to look at the internal structure of the social graph layout, keeping it unmodified. A prototype im- plementation of the proposal called Social Viewpoint Finder is tested with about 70 social graphs and this paper reports four of the analysis results.
We develop a new method to optimize portfolios of options in a market where European calls and puts are available with many exercise prices for each of several potentially correlated underlying assets. We identify the combination of asset-specific option payoffs that maximizes the Sharpe ratio of the overall portfolio: such payoffs are the unique solution to a system of integral equations, which reduce to a linear matrix equation under suitable representations of the underlying probabilities. Even when implied volatilities are all higher than historical volatilities, it can be optimal to sell options on some assets while buying options on others, as hedging demand outweighs demand for asset-specific returns.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Tag-based indirect reciprocity
1. Tag-based indirect reciprocity by
incomplete social information
Naoki Masuda1 and Hisashi Ohtsuki2
The University of Tokyo, Japan
2
Harvard University
http://www.stat.t.u-tokyo.ac.jp/~masuda
1
Ref: Masuda & Ohtsuki, Proc. R. Soc. B, 274,
689-695 (2007).
3. A Prisoner’s Dilemma
• A donor may donate
cost c to benefit the
recipient by b (>c).
• If each player serves
as donor and
recipient in different
(random) pairings, the
game is symmetric
PD.
recipient
donor
C
(-c, b)
D
(0, 0)
(b > c)
C
D
C (b-c, b-c)
(-c, b)
D
(0, 0)
(b, -c)
4. Origins of altruism
• Kin selection
• Direct reciprocity
– Iterated Prisoner’s dilemma
•
•
•
•
•
Spatial reciprocity
Indirect reciprocity
Network reciprocity
Group selection
Others
• Is ‘helping similar others’ a viable (stable)
strategy?
5. An affirmative answer by
Riolo, Cohen & Axelrod, Nature 2001
• b=1.0, c=0.1
• Player i has
– Tag wi ∈ [ 0,1]
– Tolerance µi ∈ [ 0,1]
• i cooperates with j if w j − wi ≤ µi
• Players copy tag and tolerance of successful others.
• mutation:
– Random allocation of tag
– Neutral drift of tolerance
• Results of their numerical simulations of evol dynamics:
– Donation rate is maintained high (~ 75%).
– The mean tolerance level is small (0.01-0.03).
– With some sudden changes though.
6. However, rebuttal
by Roberts & Sherratt (Nature 2002)
Criticism 1
i was assumed to coopreate if
w j − wi ≤ µi &
µi ∈ [ 0,1]
Criticism 2
Neutral drift & µi ∈ [ 0,1]
A player cooperate with birds
with exactly the same feather
Random walk with
reflecting boundary
Cooperation is lost if µi ∈ [ 0,1] is
replaced by µi ∈ [ − 10 −6 ,1]
Positive bias. Why
mutation increases
generosity?
7. We establish a viable model of tagbased reciprocity.
[
]
µi ∈ − 10 −6 ,1
• Use a kind of
• q: prob that μj is public to others
• If player i gets to know μj <|wj-wi|, i does
not donate even if μi ≥|wj-wi|
• q=0 → eventually ALLD (μi <0)
• q=1 → eventually ALLC (μi takes max)
• No mutation of tags
8. 2-tag model
• Same or different only.
tag
tolerance
wi ∈ [ 0,1]
[
]
µi ∈ − 10 ,1
−6
{
→ wi ∈ w , w
→
a
b
}
µi ∈ { − 1,0,1}
μ
phenotype
-1 no donate (D)
0
tag user
1
donate (C)
9. Payoffs of 6 subpopulations
tag = a
tag = b
h: assortativity
10. Replicator dynamics
• Symmetric case
– Full theoretical analysis
(global analysis)
• Asymmetric case
6 vars, 4 dim
note: no tag evolution
– Best-response theory
(local analysis only)
– Numerical simulations
11. Symmetric case
Small q
μ
phenotype
-1 no donate (D)
0
tag user
1
donate (C)
Intermediate q
Large q
c (1 − q )
A≡
< 1 ⇒ bq > c
( b − c) q
is the condition for tag users
to emerge.
13. Asymmetric case (best response)
A=
p >A
b
1
p1b ≤ A
A − (1 − ( t + h − ht ) ) p1b
X=
.
t + h − ht
μ
Among 9 pure strategies, only (μa,μb)=(-1,-1), (1,0), (0,-1), (0,0), and (1,1) are viable.
c (1 − q )
,
( b − c) q
phenotype
-1 no donate (D)
0
tag user
1
donate (C)
14. Basin areas (numerical)
(1, 1)
(-1, -1)
μ
phenotype
-1 no donate (D)
0
(0, -1)
(-1, 0)
(0, 0)
q
tag user
1
donate (C)
15. Best response (continuous tag)
• Any μi = μ is ESS if
bq>c
• If μi is uniformly
distributed,
bq − c
µ opt =
,
( b − c) q
µ opt = 0,
( bq > c )
( bq ≤ c )
optimal μ
b/c=4
2
1.2
q