Online social networks are complex systems often involving millions or even billions of users. Understanding the dynamics of a social network requires analysing characteristics of the network (in its ...entirety) and the users (as individuals). This paper focuses on calculating user’s social influence, which depends on (i) the user’s positioning in the social network and (ii) interactions between the user and all other users in the social network. Given that data on all users in the social network is required to calculate social influence, something not applicable for today’s social networks, alternative approaches relying on a limited set of data on users are necessary. However, these approaches introduce uncertainty in calculating (i.e., predicting) the value of social influence. Hence, a methodology is proposed for evaluating algorithms that calculate social influence in complex social networks; this is done by identifying the most accurate and precise algorithm. The proposed methodology extends the traditional ground truth approach, often used in descriptive statistics and machine learning. Use of the proposed methodology is demonstrated using a case study incorporating four algorithms for calculating a user’s social influence.
This paper proposes the implicit social networking as an innovative methodology for approaching consumers who possess information-rich user profiles based on aplethora of online services they use. An ...implicit social network is not explicitly built by consumers themselves, but implicitly calculated by third parties based on a level of a common interest between consumers (i.e., profile matchmaking). The analysis of aconsumer social network created in such a manner enables discovery of hidden roles, relationships and communities among consumers and represents a basis for provisioning of innovative services (e.g., personalized and/or context-aware services such as recommender systems). The implicit social networking methodology is evaluated through two pilot cases: (i) implicit social networking based on the SmartSocial platform; and (ii) implicit social networking of IPTV users. The generalizability of the implicit social networking is demonstrated through additional example aimed not at external company stakeholders (e.g., company consumers), but at internal stakeholders (i.e., company employees) through the implicit corporate social networking pilot case.
This paper describes a new effort estimation model based on use case reuse, called the use case reusability (UCR), intended for the projects that are reusing artifacts previously developed in past ...projects with similar scope. Analysis of the widely spread effort estimation techniques for software development projects shows that these techniques were primarily intended for the development of new software solutions. The baseline for the new effort estimation model is the use case points model. The UCR model introduces new classification of use cases based on their reusability, and it includes only those technical and environmental factors that according to the effort estimation experts have significant impact on effort for the target projects. This paper also presents a study which validates the usage of UCR model. The study is conducted within industry and academic environments using industry project teams and postgraduate students as subjects. The analysis results show that UCR model can be applied in different project environments and that according to the observed mean magnitude relative error, it produced very promising effort estimates.
This paper describes a new effort estimation model based on use case reuse, called the use case reusability (UCR), intended for the projects that are reusing artifacts previously developed in past projects with similar scope. The baseline for the new effort estimation model is the use case points model. The UCR model introduces new classification of use cases based on their reusability, and it includes only those technical and environmental factors that according to the effort estimation experts have significant impact on effort for the target projects.
The three volume set LNAI 5177, LNAI 5178, and LNAI 5179, constitutes the refereed proceedings of the 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, ...KES 2008, held in Zagreb, Croatia, in September 2008. The 316 revised papers presented were carefully reviewed and selected. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the second volume are artificial intelligence driven engineering design optimization; biomedical informatics: intelligent information management from nanomedicine to public health; communicative intelligence; computational intelligence for image processing and pattern recognition; computational intelligence in human cancer research; computational intelligence techniques for Web personalization; computational intelligent techniques for bioprocess modelling, monitoring and control; intelligent computing for Grid; intelligent security techniques; intelligent utilization of soft computing techniques; reasoning-based intelligent systems: relevant reasoning for discovery and prediction; spatio-temporal database concept support for organizing virtual earth; advanced knowledge-based systems; chance discovery; innovation-oriented knowledge management platform; knowledge-based creativity support systems; knowledge-based interface systems; knowledge-based multi-criteria decision support; and knowledge-based systems for e-business.
The three volume set LNAI 5177, LNAI 5178, and LNAI 5179, constitutes the refereed proceedings of the 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, ...KES 2008, held in Zagreb, Croatia, in September 2008. The 316 revised papers presented were carefully reviewed and selected. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the third volume are intelligent data processing in process systems and plants; neural information processing for data mining; soft computing approach to management engineering; advanced groupware; agent and multi-agent systems: technologies and applications; engineered applications of semantic Web; evolvable hardware and adaptive systems; evolvable hardware applications in the area of electronic circuits design; hyperspectral imagery for remote sensing; immunity-based systems; innovations in intelligent multimedia systems and virtual reality; intelligent environment support for collaborative learning; intelligent systems in medicine and healthcare; knowledge interaction for creative learning; novel foundation and applications of intelligent systems; skill acquisition and ubiquitous human computer interaction; smart sustainability; unsupervised clustering for exploratory data anlysis; and use of AI techniques to build enterprise systems.
Social network services such as Facebook, MySpace or Twitter support more or less permanent social relationships, where user interaction takes place via fixed or mobile access to the Internet. ...However, in many situations social relationships are ad-hoc (i.e., set up by (mobile) users located in a limited geographical area during a certain period in time). To effectively support this kind of social relationships, we propose an extension of basic social networking model – the ad-hoc social networking. This paper defines the model for ad-hoc social networking, describes functionalities and architecture of a platform for ad-hoc social networking and explains why software agents are opportune technology for platform implementation. Finally, paper presents several applications of ad-hoc social networking.
Machine-to-Machine (M2M) communication is characterized by communication between two or more entities that do not need human intervention in a heterogeneous environment. M2M entities in some cases ...need to turn off communication in order to preserve energy in which cases other entities can not communicate with them. The M2M entities can be aware of such context information and utilize it to perform optimisation in communication. Such information is defined as rich presence information and is used in this paper. The paper extends the mobile agent network with presence context information and applies it in experiments.
Machine-to-Machine (M2M) communication refers to communication among machines without or with only limited human inter- vention. The paper deals with context-awareness in M2M communication and ...proposes rich presence information as a concept to address context information in a multi-agent system supporting networking of machines. Rich Presence Information Data (RPID) extensions suitable for M2M are introduced into Context-aware Mobile Agent Network model. Case study describing context information related to energy consumption and energy saving is presented. Results based on simulations and measurements in a laboratory test-bed are discussed.
In this article we propose an agent-based solution for enabling paradigm shift from CRM (Customer Relationship Management) to CMR (Customer-Managed Relationship). Namely, Telco Agent is a software ...agent which represents telecom operator in interactions with its customers. Customers provide Telco Agent with their profiles and afterwards Telco Agent uses its mechanisms for semantic matchmaking of customer profiles and creation of customer social network to facilitate autonomous CMR.