57,074 research outputs found
Distilling Information Reliability and Source Trustworthiness from Digital Traces
Online knowledge repositories typically rely on their users or dedicated
editors to evaluate the reliability of their content. These evaluations can be
viewed as noisy measurements of both information reliability and information
source trustworthiness. Can we leverage these noisy evaluations, often biased,
to distill a robust, unbiased and interpretable measure of both notions?
In this paper, we argue that the temporal traces left by these noisy
evaluations give cues on the reliability of the information and the
trustworthiness of the sources. Then, we propose a temporal point process
modeling framework that links these temporal traces to robust, unbiased and
interpretable notions of information reliability and source trustworthiness.
Furthermore, we develop an efficient convex optimization procedure to learn the
parameters of the model from historical traces. Experiments on real-world data
gathered from Wikipedia and Stack Overflow show that our modeling framework
accurately predicts evaluation events, provides an interpretable measure of
information reliability and source trustworthiness, and yields interesting
insights about real-world events.Comment: Accepted at 26th World Wide Web conference (WWW-17
Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1
This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal Verification and Static Analysis of ML Systems. Part 2: Simulation and Dynamic Testing, Defence in Depth and Diversity, Security-Informed Safety Analysis, Standards and Guidelines
Trust beyond reputation: A computational trust model based on stereotypes
Models of computational trust support users in taking decisions. They are
commonly used to guide users' judgements in online auction sites; or to
determine quality of contributions in Web 2.0 sites. However, most existing
systems require historical information about the past behavior of the specific
agent being judged. In contrast, in real life, to anticipate and to predict a
stranger's actions in absence of the knowledge of such behavioral history, we
often use our "instinct"- essentially stereotypes developed from our past
interactions with other "similar" persons. In this paper, we propose
StereoTrust, a computational trust model inspired by stereotypes as used in
real-life. A stereotype contains certain features of agents and an expected
outcome of the transaction. When facing a stranger, an agent derives its trust
by aggregating stereotypes matching the stranger's profile. Since stereotypes
are formed locally, recommendations stem from the trustor's own personal
experiences and perspective. Historical behavioral information, when available,
can be used to refine the analysis. According to our experiments using
Epinions.com dataset, StereoTrust compares favorably with existing trust models
that use different kinds of information and more complete historical
information
Exploring Standards of Rigour for Design Cases
Designers share their specialized knowledge by developing design cases, which we define as representations of design efforts and outcomes disseminated to peers. In the field of instructional design this practice is not well established. In addition, many fields in which design is practiced are examining how knowledge is built by designers, and considering the methods of research most applicable to building design knowledge. We consider design cases to be the method of dissemination for that design research which is wholly of apiece with the act of design (as compared to design research carried out in the process of designing or research on design). In considering the factors required to establish this practice, we understand the issue of rigour to be critical, since without standards by which to judge the rigour of a representation this form of knowledge building may always be undervalued in comparison to others. We look to naturalistic inquiry and action research to begin exploring how rigour might be approached in developing design cases, presenting from the perspective of instructional designers and hoping to engage designers from other fields insofar as these ideas are useful to them.
Keywords:
Design Knowledge; Knowledge Building; Case Study/Studies; Design Research</p
Cyber physical systems implementation for asset management improvement: A framework for the transition
Libro en Open AccessThe transformation of the industry due to recent technologies introduction is an evolving
process whose engines are competitiveness and sustainability, understood in its broadest sense (environmental,
economic and social). This process is facing, due to the current state of scientific and technological
development, a new challenge yet even more important: the transition from discrete technological solutions
that respond to isolated problems, to a global conception where the assets, plant, processes and engineering
systems are conceived, designed and operated as an integrated complex unit. This vision is evolving
besides a set of concepts that are, in some way, to guide this development: Smart Factories, Cyber-Physical
Systems, Factory of the Future or Industry 4.0, are examples. The full integration of the operation and
maintenance (O&M) processes in the production systems is a key topic within this new paradigm. Not
only that, this evolution necessarily results in the emergence of new processes and needs of O&M, i.e.
also, the O&M will undergo a profound transformation. The transition from actual isolated production
assets to such Industry 4.0 with CPS is far from easy. This document presents a proposal to develop such
transition adapting one iteration of the Model of Maintenance Management (MMM) integrated into
ISO 55000 to the complexity of incorporating “System of Systems” CPSs maintenance. It involves several
stages: identification, prioritization, risk management, planning, scheduling, execution, control, and
improvement supported by system engineering techniques and agile/concurrent project managemen
Evaluating trust in electronic commerce : a study based on the information provided on merchants' websites
Lack of trust has been identified as a major problem hampering the growth of Electronic Commerce (EC). It is reported by many studies that a large number of online shoppers abandon their transactions because they do not trust the website when they are asked to provide personal information. To support trust, we developed an information framework model based on research on EC trust. The model is based on the information a consumer expects to find on an EC website and that is shown from the literature to increase his/her trust towards online merchants. An information extraction system is then developed to help the user find this information. In this paper, we present the development of the information extraction system and its evaluation. This is then followed by a study looking at the use of the identified variables on a sample of EC websites
- …