Filters








20 Hits in 10.7 sec

Quality Control Attack Schemes in Crowdsourcing

Alessandro Checco, Jo Bates, Gianluca Demartini
2019 Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence  
We implement and validate the attack scheme, by means of experiments on real-world data from a popular crowdsourcing platform.  ...  One of the most popular quality assurance mechanisms, especially in paid micro-task crowdsourcing, is the use of a small set of pre-annotated tasks as gold standard, to assess in real time the annotators  ...  Acknowledgments This project is supported by the EU's H2020 research and innovation programme under grant agreement No. 732328 and by the Australian Research Council (ARC) Discovery Project scheme (DP190102141  ... 
doi:10.24963/ijcai.2019/850 dblp:conf/ijcai/CheccoBD19 fatcat:7q6ikxqmprgnfg44wbqpsv4eu4

Adversarial Attacks on Crowdsourcing Quality Control

Alessandro Checco, Jo Bates, Gianluca Demartini
2020 The Journal of Artificial Intelligence Research  
In this paper, we show that such mechanism is prone to an attack carried out by a group of colluding crowd workers that is easy to implement and deploy: the inherent size limit of the gold set can be exploited  ...  One of the most popular quality assurance mechanisms in paid micro-task crowdsourcing is based on gold questions: the use of a small set of tasks of which the requester knows the correct answer and, thus  ...  Acknowledgments This project is supported by the European Union's Horizon 2020 research and innovation programme under grant agreement No. 732328 and by the Australian Research Council Discovery Project  ... 
doi:10.1613/jair.1.11332 fatcat:kfbstvmvqnabdli3a6teyknhzy

Report on the Sixth AAAI Conference on Human Computation and Crowdsourcing (HCOMP 2018)

Yiling Chen, Gabriella Kazai
2018 The AI Magazine  
The Association for the Advancement of Artificial Intelligence's Sixth AAAI Conference on Human Computation and Crowdsourcing was held on the campus of the University of Zurich in Zurich, Switzerland from  ...  This report, based on the preface to the HCOMP-18 proceedings and program, summarizes the event.  ...  It is hoped that the HCOMP conference will continue to play an important role in the development of research and the exchange of ideas among researchers, engineers, and practitioners across a spectrum  ... 
doi:10.1609/aimag.v39i4.2839 fatcat:rlitgsmxcjhvvc5dpjhrmfbd3i

Program

2013 The International Conference on Information Networking 2013 (ICOIN)  
It is our pleasure to welcome all of the attendees, authors, invited speakers, and guests. Networking and so on.  ...  Ladyboy Cabaret is a breathless blend of incredible sets, glittering costumes and thrilling musical acts.  ...  This is an entertaining night out for families, couples and any curious souls expecting to be surprised. Siam Niramit Show Siam  ... 
doi:10.1109/icoin.2013.6496341 fatcat:3zva3cixsbefrc7wqvdrxckbwa

Design and Analysis of a Collaborative Story Generation Game for Social Robots

Eric Nichols, Leo Gao, Yurii Vasylkiv, Randy Gomez
2021 Frontiers in Computer Science  
Storytelling plays a central role in human socializing and entertainment, and research on conducting storytelling with robots is gaining interest.  ...  However, much of this research assumes that story content is curated.  ...  ACKNOWLEDGMENTS The work presented here includes content that was previously presented at the 13th on Motion, Interaction and Games (Nichols et al., 2020) and work that is to appear at the 2021 IEEE/  ... 
doi:10.3389/fcomp.2021.674333 doaj:d3c95c4d289944e69470335b1c3042ab fatcat:cqkicw5sy5aujjguli7c5gzt5m

Novelty Detection: A Perspective from Natural Language Processing

Tirthankar Ghosal, Tanik Saikh, Tameesh Biswas, Asif Ekbal, Pushpak Bhattacharyya
2021 Computational Linguistics  
With the exponential growth of information all across the web, there is an accompanying menace of redundancy.  ...  On top of that, non-novel/redundant information in a document may have assimilated from multiple source documents, not just one.  ...  to do our investigations on Textual Novelty.  ... 
doi:10.1162/coli_a_00429 fatcat:2c7qctjchrhirpcpamhisiygke

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
A report addressing and analysing the factors underpinning the development and use of surveillance systems and technologies by both public authorities and private actors, and their implications in fighting  ...  classifications", 2002. 256 Danna, A., and Oscar Gandy, Jr., "All that Glitters is Not Gold: Digging Beneath the Surface of Data Mining", Journal of Business Ethics, Vol. 40, No. 4, 2002, pp. 373-386  ...  But on the other hand, Europe also experienced severe terrorist attacks, such as that in Madrid in 2004 and London in 2005, which had an impact on the EU's sense of security and surveillance measures.  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

Behavioral Finance: The Second Generation

Meir Statman
2019 Social Science Research Network  
People in 23 countries answered this question. Loss aversion is common to all of them.  ...  On the vertical axis is an index of value efficiency, measured as the average discrepancy 362 If all investors believed that all prices already equaled values, no one would search for exclusively and  ...  But that student never reciprocated. I remember the smirk on his face as we left the building.  ... 
doi:10.2139/ssrn.3668963 fatcat:waqkeknib5dbvmy3pmsweel6s4

Intermediality and Media Change

Pauliina Tuomi
2013 Historical Journal of Film, Radio and Television  
the Ecrea conference in Hamburg in order to further develop my thoughts on the concept of medium put forward in the article 'Convergence by means of globalized remediation' (Fetveit 2007) .  ...  Acknowledgement: I want express my gratitude to professor Taisto Hujanen and his research team on the project From Convergence to Intermediality for generously inviting me to Tampere and thereafter to  ...  On the contrary, they have an effect on one another at all times.  ... 
doi:10.1080/01439685.2013.853372 fatcat:bignqfjpr5dp5lslc2jnndlcj4

The level of mental load during a functional task is reflected in oculometrics [chapter]

Ramtin Zargari Marandi, Afshin Samani, Pascal Madeleine
2017 International Federation for Medical and Biological Engineering Proceedings  
solid organ transplantation: all that glitters is not gold Chair: Paolo De Simone (Italy) Co-chair: Sabina De Geest Co-chair: Juri Ducci • Applying a human-centred design process to increase the  ...  (Leon Straker) • What is the evidence that mobile touch screen device use is related to musculoskeletal risk in school children?  ... 
doi:10.1007/978-981-10-5122-7_15 fatcat:vaq2jz2o3zgofdi4tkkn2ksfje

The Child in Games: From the Meek, to the Mighty, to the Monstrous

Emma Reay, Apollo-University Of Cambridge Repository, Zoe Jaques
2022
It poses two questions: 1) How are children represented in contemporary video games?  ...  This typology is not intended to work against the granular detail of the information recorded in the dataset, but to draw attention to patterns of coherence and divergence that occur between particular  ...  Her eeriness, then, is "fundamentally tied up with questions of agency. What kind of agent is acting here? Is there an agent at all?" (Fisher, p.11) .  ... 
doi:10.17863/cam.82249 fatcat:ycxl2v2lhjc7jjoofpjyuotvpi

The good life in Asia's digital 21st century [article]

Digital Asia Hub, Policy Online
2015
Acknowledgments This book is the result of a concerted effort by an extraordinary team of authors and collaborations from around the globe.  ...  First and foremost, we wish to express our gratitude to all the authors who have contributed essays to this collection, as well as all the other colleagues who submitted their thoughtful contributions  ...  The first film uploaded on this platform was in response to an attack on a female Dalit Panchayat President, which is the sort of issue that is rarely even featured in the mainstream mass media.  ... 
doi:10.4225/50/566f568c2be19 fatcat:2yh4cmzipjc5zn62wx2gmeede4

The politics of innovation, entrepreneurship and community as a discursive practice. Researching a startup incubator in Milan [article]

ANNA PAOLA QUAGLIA
2018
Its allure was, indeed, extremely seductive, but, as the colloquial expression suggests, "all that glitter ain't gold".  ...  What these rhetorical questions all share in nuce is that they generate a social expectation by implying a correct response based on perceived public acceptance of the answer itself.  ... 
doi:10.6092/polito/porto/2710170 fatcat:klurbqaqkvejfdz5fpkvfs53fe

Sad affects and contemporary women's media: depression, anxiety, and neoliberal (post)feminism in the post-recessionary West

Anna Fredrika Thelandersson
2020
It shows that there was an increase in conversations around mental illness in popular culture and on social media from 2015 and onwards.  ...  ; and online ethnography of communities that focus on these issues on social media.  ...  An example of this, in addition to the one above about self-harm, is an article about pop group One Direction canceling a concert because one of their members had an anxiety attack.  ... 
doi:10.7282/t3-7jqn-hv17 fatcat:wh5yvq5aqrflvisla5lxiqbdx4

Threatened Innocents and the News: The History of a National Preoccupation

Alexandra Meltzer Goldman
2017
The overarching contention is that the stories we tell shape our lives personally and publicly, establishing a social reality that is often untethered to fact.  ...  Charting the evolution of this narrative through the centuries, it contends that these stories are rooted in the Puritan captivity narratives of the late 1600s, when the kidnapping of Europeans by Indians  ...  All is right and lovable on one side, all ugly and hateful on the other. As in the old Romances, there is no uncertainty as to which way our sympathies should turn.  ... 
doi:10.7916/d81c1v19 fatcat:vdjzrhdx3nd5thefts53273xqq
« Previous Showing results 1 — 15 out of 20 results