EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book A Game Theoretical Approach for Reputation Propagation in Online Social Networks

Download or read book A Game Theoretical Approach for Reputation Propagation in Online Social Networks written by Maziar Gomrokchi and published by . This book was released on 2010 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Formation of mutual trust between users of an Online Social Network (OSN) is a function of many parameters. One of these parameters that has been widely investigated is the reputation of users. Users interact with each other with different intentions and as a result of their interactions they propagate each other's reputation. In the absence of centralized trusted parties in OSN s, the only way for an agent to estimate others' reputation is the other agents' thoughts about that agent. Therefore, intention and behavior of agents in the propagation of each other's reputation become crucial. In this thesis, we propose a game theoretic model of reputation propagation among users in OSN s. We use this model to first study the dynamics of propagation and then analyze users' behavior with respect to their reputation in the network. To do so, we expose the Nash equilibria of the proposed game. Finally, we develop some experiments on the large-scale social network of Epinons and compare our findings in the theoretical part with the observations from the experiments.

Book Learning Automata Approach for Social Networks

Download or read book Learning Automata Approach for Social Networks written by Alireza Rezvanian and published by Springer. This book was released on 2019-01-22 with total page 329 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book begins by briefly explaining learning automata (LA) models and a recently developed cellular learning automaton (CLA) named wavefront CLA. Analyzing social networks is increasingly important, so as to identify behavioral patterns in interactions among individuals and in the networks’ evolution, and to develop the algorithms required for meaningful analysis. As an emerging artificial intelligence research area, learning automata (LA) has already had a significant impact in many areas of social networks. Here, the research areas related to learning and social networks are addressed from bibliometric and network analysis perspectives. In turn, the second part of the book highlights a range of LA-based applications addressing social network problems, from network sampling, community detection, link prediction, and trust management, to recommender systems and finally influence maximization. Given its scope, the book offers a valuable guide for all researchers whose work involves reinforcement learning, social networks and/or artificial intelligence.

Book Essays on the Formation of Social Networks from a Game Theoretical Approach

Download or read book Essays on the Formation of Social Networks from a Game Theoretical Approach written by Antoni Rubí-Barceló and published by . This book was released on 2007 with total page 143 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Game Theory for Cyber Deception

Download or read book Game Theory for Cyber Deception written by Jeffrey Pawlick and published by Springer Nature. This book was released on 2021-01-30 with total page 192 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Book An Introduction to Models of Online Peer to Peer Social Networking

Download or read book An Introduction to Models of Online Peer to Peer Social Networking written by George Kesidis and published by Morgan & Claypool Publishers. This book was released on 2010-05-05 with total page 125 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book concerns peer-to-peer applications and mechanisms operating on the Internet, particularly those that are not fully automated and involve significant human interaction. So, the realm of interest is the intersection of distributed systems and online social networking. Generally, simple models are described to clarify the ideas. Beginning with short overviews of caching, graph theory and game theory, we cover the basic ideas of structured and unstructured search. We then describe a simple framework for reputations and for iterated referrals and consensus. This framework is applied to a problem of sybil identity management. The fundamental result for iterated Byzantine consensus for a relatively important issue is also given. Finally, a straight-forward epidemic model is used to describe the propagation of malware on-line and for BitTorrent-style file-sharing. This short book can be used as a preliminary orientation to this subject matter. References are given for the interested student to papers with good survey and tutorial content and to those with more advanced treatments of specific topics. For an instructor, this book is suitable for a one-semester seminar course. Alternatively, it could be the framework for a semester's worth of lectures where the instructor would supplement each chapter with additional lectures on related or more advanced subject matter. A basic background is required in the areas of computer networking, probability theory, stochastic processes, and queueing. Table of Contents: Networking overview / Graphs / Games / Search in structured networks / Search in unstructured networks / Transactions, reputations, and referrals / False Referrals / Peer-to-peer file sharing / Consensus in dynamical belief systems / Byzantine consensus / Epidemics

Book Behavior and Evolutionary Dynamics in Crowd Networks

Download or read book Behavior and Evolutionary Dynamics in Crowd Networks written by Yan Chen and published by Springer Nature. This book was released on 2020-07-28 with total page 148 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book offers a holistic framework to study behavior and evolutionary dynamics in large-scale, decentralized, and heterogeneous crowd networks. In the emerging crowd cyber-ecosystems, millions of deeply connected individuals, smart devices, government agencies, and enterprises actively interact with each other and influence each other’s decisions. It is crucial to understand such intelligent entities’ behaviors and to study their strategic interactions in order to provide important guidelines on the design of reliable networks capable of predicting and preventing detrimental events with negative impacts on our society and economy. This book reviews the fundamental methodologies to study user interactions and evolutionary dynamics in crowd networks and discusses recent advances in this emerging interdisciplinary research field. Using information diffusion over social networks as an example, it presents a thorough investigation of the impact of user behavior on the network evolution process and demonstrates how this can help improve network performance. Intended for graduate students and researchers from various disciplines, including but not limited to, data science, networking, signal processing, complex systems, and economics, the book encourages researchers in related research fields to explore the many untouched areas in this domain, and ultimately to design crowd networks with efficient, effective, and reliable services.

Book Information and Influence Propagation in Social Networks

Download or read book Information and Influence Propagation in Social Networks written by Wei Chen and published by Springer Nature. This book was released on 2022-05-31 with total page 161 pages. Available in PDF, EPUB and Kindle. Book excerpt: Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models against any available real datasets consisting of a social network and propagation traces that occurred in the past? These are just some questions studied by researchers in this area. Information propagation models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems arising in these applications have been abstracted and studied extensively by researchers under the garb of influence maximization. This book starts with a detailed description of well-established diffusion models, including the independent cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget, and time-criticality, among many others. We delve deep into the key problem of influence maximization, which selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in classic diffusion models including both the independent cascade and the linear threshold models is computationally intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn this research into practice, such as learning the strength with which individuals in a network influence each other, as well as the practical aspects of this research including the availability of datasets and software tools for facilitating research. We conclude with a discussion of various research problems that remain open, both from a technical perspective and from the viewpoint of transferring the results of research into industry strength applications.

Book Computational Models of Trust and Reputation

Download or read book Computational Models of Trust and Reputation written by Lik Mui and published by . This book was released on 2002 with total page 278 pages. Available in PDF, EPUB and Kindle. Book excerpt: (Cont.) We show that by providing an indirect inference mechanism for the propagation of trust and reputation, cooperation among selfish agents can be explained for a set of game theoretic simulations. For these simulations in particular, our proposal is shown to have provided more cooperative agent communities than existing schemes are able to.

Book Real World Applications of Game Theory and Optimization

Download or read book Real World Applications of Game Theory and Optimization written by Dun Han and published by Frontiers Media SA. This book was released on 2024-08-16 with total page 205 pages. Available in PDF, EPUB and Kindle. Book excerpt: This research topic centers on the practical application of game theory and optimization methods to address complex challenges in real-world contexts. At its core, game theory provides a framework for analyzing strategic interactions among rational decision-makers, while optimization techniques are designed to seek the most favorable outcomes. These tools have proven to be powerful assets across a wide range of domains, from economics and computer science to social sciences and engineering. The following objectives guide this exploration: (i) Understanding Game Theory and Optimization in Real-world Contexts: This objective involves investigating how these mathematical constructs are applied to model and resolve problems across various fields. (ii) Analyzing the Effectiveness of Game Theory and Optimization Techniques: This involves studying real-world case studies and practical applications with the goal of evaluating the performance and efficiency of these methods in practice. (iii) Identifying Potential Areas for Effective Application of Game Theory and Optimization: This objective aims to pinpoint sectors or disciplines that may significantly benefit from the application of these mathematical techniques. The goal of this Research Topic in Frontiers in Physics aims to produce a comprehensive understanding of the real-world applications of game theory and optimization, highlighting their practical impact and potential for future use. It will provide valuable insights for professionals and researchers working in the fields where these techniques can be applied and contribute to the body of knowledge in game theory and optimization. Potential topics include but are not limited to the following: 1. Economics and Business: How are game theory and optimization used to make strategic business decisions and to understand economic phenomena? 2. Computer Science: How do these techniques contribute to areas like network design, machine learning, and algorithm development? 3. Social Sciences: How can game theory and optimization help in understanding social dynamics, designing policies, and resolving conflicts? 4. Engineering and Operations Research: How are these techniques utilized in system design, process optimization, and decision-making?

Book Fuzzy Systems and Data Mining IX

Download or read book Fuzzy Systems and Data Mining IX written by A.J. Tallón-Ballesteros and published by IOS Press. This book was released on 2023-12-19 with total page 980 pages. Available in PDF, EPUB and Kindle. Book excerpt: Fuzzy systems and data mining are indispensible aspects of the digital technology on which we now all depend. Fuzzy logic is intrinsic to applications in the electrical, chemical and engineering industries, and also in the fields of management and environmental issues. Data mining is indispensible in dealing with big data, massive data, and scalable, parallel and distributed algorithms. This book presents the proceedings of FSDM 2023, the 9th International Conference on Fuzzy Systems and Data Mining, held from 10-13 November 2023 as a hybrid event, with some participants attending in Chongqing, China, and others online. The conference focuses on four main areas: fuzzy theory, algorithms and systems; fuzzy application; data mining; and the interdisciplinary field of fuzzy logic and data mining, and provides a forum for experts, researchers, academics and representatives from industry to share the latest advances in the field of fuzzy sets and data mining. This year, topics from two special sessions on granular-ball computing and the application of generative AI, as well as machine learning and neural networks, were also covered. A total of 363 submissions were received, and after careful review by the members of the international program committee, 110 papers were accepted for presentation at the conference and publication here, representing an acceptance rate of just over 30%. Covering a comprehensive range of current research and developments in fuzzy logic and data mining, the book will be of interest to all those working in the field of data science.

Book Game Theoretical Analysis for Information Diffusion Over Online Social Networks

Download or read book Game Theoretical Analysis for Information Diffusion Over Online Social Networks written by 黃任平 and published by . This book was released on 2011 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Intelligent Systems Design and Applications

Download or read book Intelligent Systems Design and Applications written by Ajith Abraham and published by Springer Nature. This book was released on with total page 500 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Advances in Knowledge Based and Intelligent Information and Engineering Systems

Download or read book Advances in Knowledge Based and Intelligent Information and Engineering Systems written by Manuel Graña and published by IOS Press. This book was released on 2012 with total page 2307 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this 2012 edition of Advances in Knowledge-Based and Intelligent Information and Engineering Systems the latest innovations and advances in Intelligent Systems and related areas are presented by leading experts from all over the world. The 228 papers that are included cover a wide range of topics. One emphasis is on Information Processing, which has become a pervasive phenomenon in our civilization. While the majority of Information Processing is becoming intelligent in a very broad sense, major research in Semantics, Artificial Intelligence and Knowledge Engineering supports the domain specific applications that are becoming more and more present in our everyday living. Ontologies play a major role in the development of Knowledge Engineering in various domains, from Semantic Web down to the design of specific Decision Support Systems. Research on Ontologies and their applications is a highly active front of current Computational Intelligence science that is addressed here. Other subjects in this volume are modern Machine Learning, Lattice Computing and Mathematical Morphology.The wide scope and high quality of these contributions clearly show that knowledge engineering is a continuous living and evolving set of technologies aimed at improving the design and understanding of systems and their relations with humans.

Book Analytics  Operations  and Strategic Decision Making in the Public Sector

Download or read book Analytics Operations and Strategic Decision Making in the Public Sector written by Evans, Gerald William and published by IGI Global. This book was released on 2019-02-15 with total page 441 pages. Available in PDF, EPUB and Kindle. Book excerpt: Analytics for the public sector involves the application of operations research and statistical techniques to solve various problems existing outside of the private sector. The use of analytics for the public sector results in more efficient and effective services for the clients and users of these systems. Analytics, Operations, and Strategic Decision Making in the Public Sector is an essential reference source that discusses analytics applications in various public sector organizations, and addresses the difficulties associated with the design and operation of these systems including multiple conflicting objectives, uncertainties and resulting risk, ill-structured nature, combinatorial design aspects, and scale. Featuring research on topics such as analytical modeling techniques, data mining, and statistical analysis, this book is ideally designed for academicians, educators, researchers, students, and public sector professionals including those in local, state, and federal governments; criminal justice systems; healthcare; energy and natural resources; waste management; emergency response; and the military.

Book ECAI 2020

    Book Details:
  • Author : G. De Giacomo
  • Publisher : IOS Press
  • Release : 2020-09-11
  • ISBN : 164368101X
  • Pages : 3122 pages

Download or read book ECAI 2020 written by G. De Giacomo and published by IOS Press. This book was released on 2020-09-11 with total page 3122 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents the proceedings of the 24th European Conference on Artificial Intelligence (ECAI 2020), held in Santiago de Compostela, Spain, from 29 August to 8 September 2020. The conference was postponed from June, and much of it conducted online due to the COVID-19 restrictions. The conference is one of the principal occasions for researchers and practitioners of AI to meet and discuss the latest trends and challenges in all fields of AI and to demonstrate innovative applications and uses of advanced AI technology. The book also includes the proceedings of the 10th Conference on Prestigious Applications of Artificial Intelligence (PAIS 2020) held at the same time. A record number of more than 1,700 submissions was received for ECAI 2020, of which 1,443 were reviewed. Of these, 361 full-papers and 36 highlight papers were accepted (an acceptance rate of 25% for full-papers and 45% for highlight papers). The book is divided into three sections: ECAI full papers; ECAI highlight papers; and PAIS papers. The topics of these papers cover all aspects of AI, including Agent-based and Multi-agent Systems; Computational Intelligence; Constraints and Satisfiability; Games and Virtual Environments; Heuristic Search; Human Aspects in AI; Information Retrieval and Filtering; Knowledge Representation and Reasoning; Machine Learning; Multidisciplinary Topics and Applications; Natural Language Processing; Planning and Scheduling; Robotics; Safe, Explainable, and Trustworthy AI; Semantic Technologies; Uncertainty in AI; and Vision. The book will be of interest to all those whose work involves the use of AI technology.

Book Mining Lurkers in Online Social Networks

Download or read book Mining Lurkers in Online Social Networks written by Andrea Tagarelli and published by Springer. This book was released on 2018-11-09 with total page 95 pages. Available in PDF, EPUB and Kindle. Book excerpt: This SpringerBrief brings order to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs) lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs. All large-scale online social networks (OSNs) are characterized by a participation inequality principle, i.e., the crowd of an OSN does not actively contribute, rather it takes on a silent role. Silent users are also referred to as lurkers, since they gain benefit from others' information without significantly giving back to the community. Nevertheless, lurkers acquire knowledge from the OSN, therefore a major goal is to encourage them to more actively participate. Lurking behavior analysis has been long studied in social science and human-computer interaction fields, but it has also matured over the last few years in social network analysis and mining. While the main target audience corresponds to computer, network, and web data scientists, this brief might also help increase the visibility of the topic by bridging different closely related research fields. Practitioners, researchers and students interested in social networks, web search, data mining, computational social science and human-computer interaction will also find this brief useful research material .