35,627 research outputs found

    Using cognitive work analysis to explore activity allocation within military domains

    Get PDF
    Cognitive Work Analysis (CWA) is frequently advocated as an approach for the analysis of complex sociotechnical systems. Much of the current CWA literature within the military domain pays particular attention to its initial phases; Work Domain Analysis and Contextual Task Analysis. Comparably, the analysis of the social and organisational constraints receives much less attention. Through the study of a helicopter Mission Planning System (MPS) software tool, this paper describes an approach for investigating the constraints affecting the distribution of work. The paper uses this model to evaluate the potential benefits of the social and organisational analysis phase within a military context. The analysis shows that, through its focus on constraints the approach provides a unique description of the factors influencing the social organisation within a complex domain. This approach appears to be compatible with existing approaches and serves as a validation of more established social analysis techniques

    Evaluating Overfit and Underfit in Models of Network Community Structure

    Full text link
    A common data mining task on networks is community detection, which seeks an unsupervised decomposition of a network into structural groups based on statistical regularities in the network's connectivity. Although many methods exist, the No Free Lunch theorem for community detection implies that each makes some kind of tradeoff, and no algorithm can be optimal on all inputs. Thus, different algorithms will over or underfit on different inputs, finding more, fewer, or just different communities than is optimal, and evaluation methods that use a metadata partition as a ground truth will produce misleading conclusions about general accuracy. Here, we present a broad evaluation of over and underfitting in community detection, comparing the behavior of 16 state-of-the-art community detection algorithms on a novel and structurally diverse corpus of 406 real-world networks. We find that (i) algorithms vary widely both in the number of communities they find and in their corresponding composition, given the same input, (ii) algorithms can be clustered into distinct high-level groups based on similarities of their outputs on real-world networks, and (iii) these differences induce wide variation in accuracy on link prediction and link description tasks. We introduce a new diagnostic for evaluating overfitting and underfitting in practice, and use it to roughly divide community detection methods into general and specialized learning algorithms. Across methods and inputs, Bayesian techniques based on the stochastic block model and a minimum description length approach to regularization represent the best general learning approach, but can be outperformed under specific circumstances. These results introduce both a theoretically principled approach to evaluate over and underfitting in models of network community structure and a realistic benchmark by which new methods may be evaluated and compared.Comment: 22 pages, 13 figures, 3 table

    From techno-scientific grammar to organizational syntax. New production insights on the nature of the firm

    Get PDF
    The paper aims at providing the conceptual building blocks of a theory of the firm which addresses its "ontological questions" (existence,boundaries and organization) by placing production at its core. We draw on engineering for a more accurate description of the production process itself, highlighting its inner complexity and potentially chaotic nature, and on computational linguistics for a production-based account of the nature of economic agents and of the mechanisms through which they build ordered production sets. In so doing, we give a "more appropriate" production basis to the crucial issues of how firm's boundaries are set, how its organisational structure is defined, and how it changes over time. In particular, we show how economic agents select some tasks to be performed internally, while leaving some other to external suppliers, on the basis of criteria based on both the different degrees of internal congruence of the tasks to be performed (i.e. the internal environment), and on the outer relationships carried out with other agents (i.e. the external environment)

    Complementarity constraints and induced innovation: Some evidence from the first IT regime

    Get PDF
    Technological search is often depicted to be random. This paper takes a different view and analyses how innovative recombinant search is triggered, how it is done and what initial conditions influence the final design of technological artefacts. We argue that complementarities (non-separabilities) play an important role as focusing devices guiding the search for new combinations. Our analysis takes the perspective of technology adopters and not that of inventors or innovators of new products. We illustrate the process of decomposition and re-composition under the presence of binding complementarity constraints with a historical case study on the establishment of the First IT Regime at the turn of the 19th century.Technological regimes, systemic innovation, adoption of technologies, complexity,information technology 1870-1930
    corecore