Monday, August 31, 2009

Last day of the IEEE Social Computing conference

I missed the keynote address by Victor Bahl today, so if anyone has blogged about this, please send to me. Today is the last day of the IEEE Social Computing conference and right now, I'm in the first session of the day in the Social Intelligence and Networking workshop, listened to a talk on Expertise Modeling and Recommendation in Online Question and Answer Forums where they used clustering on Yahoo Answers. There is an interesting talk on A Language of Life: Characterizing People Using Cell Phone Tracks by Alexy Khrabrov that is exploring whether can determine actions based on sensor data that is captured by Nokia phones with connection to cell towers. They use the dataset from the Reality Mining group of Sandy Pentland and Nathan Eagle from MIT, and use N-grams from languagemodelsto model the sensor data as text.

The next session of the Social Intelligence and Networking workshop is starting. First talk is on Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing. I never knew that people would actually offer couches to others to sleep on on Couchsurfing.com! Reciprocity is based on whether the two people offer couches to each other. The second talk is on Virtually There: Exploring Proximity and Homophily in a Virtual World presented by Noshir Contractor. People tend to form social relations with those who are geographically close to them (theory of proximity). The implications of understanding proximity and homophily could be used for finding experts in online social networks. The third talk is on The Altruistic Searcher which talks about collaborative web search, their search engine is HeyStaks. An interesting talk now is on Inferring Unobservable Inter-community Links in Large Social Networks where the motivation is that social networks are reconstructed from partially observable data of social interactions, and the social graph is an approximation of the real social graph.

Sunday, August 30, 2009

Social Intelligence and Networking workshop

I'm in the Social Intelligence and Networking workshop where I will present my work called Finding Cohesive Subgroups and Relevant Members in the Nokia Friend View Mobile Social Network. There is a talk now on a model for collaborative decision making. To model this decision making, they create a two-player game where the computer and user have different goals.
Second keynote in Social Computing conference by Fei-Yue Wang. There will be a national conference on social computing in Beijing, China in December. He is giving examples of social computing from Chinese case studies
Ben Schneiderman is talking how social computing is becoming widely recognized in schools.Social computing is a transformative moment. Ben is now challenging the audience on the vision of social computing and how we can provide impact in the world. We need to drive social computing to combat natural disasters. The take home message is that is your work focussing on national priorities and impact

Second day of IEEE SocialCom conference

Yesterday, after the conference, there was a very great reception (thanks organizers!) at the Renaissance hotel where I was able to network with important people and eat great food! Today is the second day of the conference with lots of parallel sessions and workshops, so it's going to be a busy day. There is a workshop on Mobile Phones sensing which I'm attending. The first is an invited talk on Social Computing with Mobile Phones and Sensors and the talk is about creating social computing applications using sensory data from the mobile phone, for example, one application for determining where to put recycling bins based on pictures, tagging, geocoding and location traces. Another application is for health and wellness, one example is AndWellness.

The first paper in this workshop is on Touch Me Wear, which is about physical contact with social networks presented by Aaron Beach. They created a touch me shirt where if you hug people, it will show on Facebook who are the people you have hugged. It uses Bluetooth to upload the hug to Facebook through a contact access point. This group is the author of the paper WhozThat. There are lots of mobile social networking companies like BrightKite that can find out who are around you and what are you doing through activity inference. This is a very good example of merging actual physical interaction with social interaction and bringing it to virtual communities like Facebook.

Saturday, August 29, 2009

Session on Social Computing - IEEE SocialCom'09

I'm now in the session on Social Computing, one of the sessions in IEEE SocialCom conference. The first talk that I attended was about Guangxi on the Chinese Web where the presenter showed work that they did in doing an empirical study of Guangxi web sites using PageRank, compared to the general web and structures that come about from the Guangxi web sites by modelling Guangxi and identifying Guangxi links. The question that comes to mind, is how do the Guangxi web social networks compare with regular social networks, and can this help explain why Facebook and Twitter are not popular with Chinese users?

Another interesting paper was on Structure of Neighborhoods in a Large Social Network using a dataset obtained from Orange mobile phone users. They used "characteristic patterns" to identify neighbourhoods. The first talk in the second session on Social Computing is on Deriving Expertise Profiles from Tags. Their assumptions are that the set of tags defines a resource, and that these tags are correlated with skills. They performed a study with Dogear and IBMr, internal IBM social computing systems. They also create a scoring model to correlate tags with skills, and did find out that the tags do represent the skills. It would be interesting to see how finding similar users and experts could be used for tag recommendations. The third paper is on Probabilistic Generative Models of the Social Annotation Process addressing the challenge of uncovering hidden structure in social annotations, can we discover communities of users and categories of related tags. Their inspiration is on text-based topic models and their solution is Community-Based Probabilistic Social Annotation (PSA), instead of modelling tags, they also model users. Users belong to hidden communities so how can we find these communities, also related to my paper that I will present tomorrow. They recover communities and categories based on the Gibbs Sampler and used Delicious for their experiments. The PSA is better at predicting unsessn data, and they also did a user study to determine if the tags were correctly specified in the categories.

The next paper is on Detecting Communities from Bipartite Networks Based on Bipartite Modularities.

First day of IEEE Social Computing - Keynote 1

After a series of introductionary remarks to the conference (there are multiple conferences here of which IEEE Social Computing is one), now there is a keynote speech by Stephen Lau on Privacy, Security, Risk and Trust in Service-Oriented Environments. Alex Pentland of MIT introduced the IEEE Social Computing conference of which my paper is part of the SIN workshop (Social Intelligence and Networking). If you're in the conference, then please talk to me, I will give a talk in SIN at the last session on Monday called "Finding Cohesive Subgroups and Relevant Members in the Nokia Friend View Mobile Social Network".

Dr. Lau is talking about information assurance in Service-Oriented Environments. Now, we are entering service-oriented computing. This is nothing new, IBM Research has advocated service-oriented computing for many years, and in academia and research, service-oriented computing is very important. However, there are challenges in service-oriented computing environments, like for example system reliability, must be easy to use, privacy, trust and tracking users. There are XML-based policies to help with this and software engineering is being used to tackle this.

So, what is Dr. Lau's research to address these issues? They have developed a framework for systematically managing and enforcing security policies and a model for flexible security policies. He just showed the workflow of the architecture of their framework. The complicated part of this research is the integrated framework for managing and evaluating security, privacy, trust and risk. We need to have new models for trust and risk considering technical, human and social aspects.

Monday, August 24, 2009

Nokia Booklet 3G

Nokia has just announced the Nokia Booklet 3G, which is a netbook between the size of a laptop and a mobile with 10 inch screen, running Windows with 3G, GPS, Bluetooth and Wi-Fi. Check out the video below, it looks really nice! It will be fully announced at Nokia World 2009 which is coming soon!



On Technorati: , ,