31,128 Hits in 4.5 sec

Automatic pattern detection in stakeholder networks

P.W.G. Bots, M.J.W. van Twist, J.H.R. van Duin
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences  
Automatic detection of the factors most relevant to a policy situation, and of disagreement and conflict among stakeholders may help the analyst in focussing her 1 analysis.  ...  In this paper, we investigate how certain interesting properties of stakeholder networks modeled with DANA can be determined algorithmically.  ...  This research was in part funded by the Dutch Land Water Milieu Informatietechnologie fund.  ... 
doi:10.1109/hicss.2000.926658 dblp:conf/hicss/BotsTD00 fatcat:agonsuktafe3ph6n2vublyvify

Design considerations for multi-stakeholder display analytics

Mateusz Mikusz, Sarah Clinch, Nigel Davies
2017 Proceedings of the 6th ACM International Symposium on Pervasive Displays - PerDis '17  
In this paper, we provide a comprehensive overview of analytics data that might be captured by different stakeholders in a display network, make the case for the synthesis of analytics data in such display  ...  However, in contrast to traditional sign and web analytics systems, such display networks are likely to feature multiple stakeholders each with the ability to collect a subset of the required analytics  ...  In particular, the increase in the number of stakeholders in such networks is important since each stakeholder may have opportunities to collect distinct sets of analytics data.  ... 
doi:10.1145/3078810.3078830 dblp:conf/perdis/MikuszCD17 fatcat:s6s7nx5d6bbspmvzsv3yjyhgui

Understanding the Decentralization of DPoS: Perspectives From Data-Driven Analysis on EOSIO [article]

Jieli Liu, Weilin Zheng, Dingyuan Lu, Jiajing Wu, Zibin Zheng
2022 arXiv   pre-print
Decentralization is a key element in blockchain networks. However, little is known about the evolution of decentralization in DPoS-based blockchain networks.  ...  In this paper, we conduct a systematic analysis on the decentralization of DPoS with data from up to 135,000,000 blocks in EOSIO, the first successful DPoS-based blockchain system.  ...  Fig. 7 (a) displays the votes of the large stakeholders in the top 10 detected clusters with the most staked tokens, where the y-axis depicts the index of the detected large stakeholders and the x-axis  ... 
arXiv:2201.06187v1 fatcat:4fs3edmdifgqbphcijio4rtfom

Shazam for bats: Internet of Things for continuous real‐time biodiversity monitoring

Sarah Gallacher, Duncan Wilson, Alison Fairbrass, Daniyar Turmukhambetov, Michael Firman, Stefan Kreitmayer, Oisin Mac Aodha, Gabriel Brostow, Kate Jones
2021 IET Smart Cities  
Current methods rely on significant human input and therefore present an opportunity for continuous monitoring and in situ machine learning detection of bat calls in the field.  ...  Our results demonstrate how the combination of artificial intelligence techniques and low-cost sensor networks can be used to create novel insights for ecologists and conservation decision-makers.  ...  For example, the Bat Detective project developed deep learning tools to automatically identify bat acoustic signals in recorded audio [18] .  ... 
doi:10.1049/smc2.12016 fatcat:b4hbutbkzndcrf7tgtyrgrkuri

Intrinsically resilient energy control systems

Frederick Sheldon, Daniel Fetzer, David Manz, Jingshan Huang, Stuart Goose, Thomas Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei
2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop on - CSIIRW '13  
In this position paper, we present a proof of concept of an intrinsically resilient energy control system, with the ultimate goal of ensuring availability/resiliency of energy delivery functions, along  ...  RoCIA will use collected data in CoEDS to provide an effective ontology-based reasoning tool to automatically detect suspicious activity and support post-incident investigation.  ...  In addition, RoCIA can identify assets and stakeholders affected by an attack as well as economic impacts to those stakeholders.  ... 
doi:10.1145/2459976.2460046 dblp:conf/csiirw/SheldonFMHGMDKW13 fatcat:uec3w5f7vfgzjfs5u4dqlqvvwu

Mapping Organizations' Goals and Leanings in the Lobbyist Network in Banking and Finance [chapter]

Borut Sluban, Jasmina Smailović, Petra Kralj Novak, Igor Mozetič, Stefano Battiston
2017 Studies in Computational Intelligence  
We find that constructing a similarity network based on preference patterns adds a crucial dimension in the understanding of how lobby organizations engage in the policy making process.  ...  We address the question of how can publicly accessible information be used to make a map of the political actors and their leanings, that would benefit both policy makers and stakeholders in the European  ...  activities, and with the communities detected in a similarity network of preference patterns.  ... 
doi:10.1007/978-3-319-72150-7_93 fatcat:2w2d6m4pwvgkjgzyspmet2lqxe

A Natural Language Processing Approach to Social License Management

Robert G. Boutilier, Kyle Bahr
2020 Sustainability  
Dealing with the social and political impacts of large complex projects requires monitoring and responding to concerns from an ever-evolving network of stakeholders.  ...  Using natural language processing algorithms, we designed a program that assesses the SL level and identifies stakeholders' concerns in a few hours.  ...  Additionally, efforts to link topics together based on the frequency of their co-mentions and analyze these topic networks in relation to their associated stakeholder networks are also planned for future  ... 
doi:10.3390/su12208441 fatcat:5w64xhzetfe27nbvouldwzqrku

Crowd Sensing System for Public Participation

Matthew Tenney, Renee Sieber, G.B. Hall
2016 International Conference on GIScience Short Paper Proceedings  
We propose a crowd sensing system to capture certain dynamics of public participation in a city. Crowd sensing systems (CSS) attempt to capture the opinions of local publics from webresources.  ...  We define our CSS using a spatially-situated social network graph where users along with different variables, such as time, location, social interaction, service usage, and human activities can be studied  ...  Community detection in our CSS attempts to decompose a complex network into groups of nodes and edges that are densely connected.  ... 
doi:10.21433/b3116pw0r1dz fatcat:vaunvnxxerhshmolxcuxpzr5te

Data Science

Sebastian Maneth, Alexandra Poulovassilis
2016 Computer journal  
ACKNOWLEDGEMENTS The guest editors of this special issue thank the Computer Journal Editor-in-Chief Professor Fionn Murtagh for his valuable suggestions and help in preparing this issue.  ...  Special thanks go to all the reviewers for their thorough comments that helped in enhancing the quality of the papers.  ...  The authors explore how this problem can be approached using graph pattern matching techniques, with the virtual network being expressed as a graph pattern and the physical network substrate as a graph  ... 
doi:10.1093/comjnl/bxw073 fatcat:jtkw54sz65hf5bov6knkr6iazm

A log mining approach for process monitoring in SCADA

Dina Hadžiosmanović, Damiano Bolzoni, Pieter H. Hartel
2012 International Journal of Information Security  
A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular process workflow.  ...  We propose a methodology to systematically identify potential process-related threats in SCADA.  ...  Process-related attacks typically cannot be detected by observing network traffic or protocol specifications in the system.  ... 
doi:10.1007/s10207-012-0163-8 fatcat:d2hna6wybje75jlka6tjrsb6ba

Editorial: The Impact of Open Science for Evaluation of Volcanic Hazards

Elisa Trasatti, Fidel Costa, Michelle Parks
2021 Frontiers in Earth Science  
In particular, proper management of volcanic crises, such as during unrest and eruption, needs rapid access to scientific data and results by stakeholders and decision-makers.  ...  This data-sharing system is named the Japan Volcanological Data Network and will serve as a platform for the analysis of branch nodes of probabilistic event trees for volcanic crises in the coming decades  ...  The system is able to detect, locate and quantify thermal anomalies in near real-time on over 200 volcanoes worldwide.  ... 
doi:10.3389/feart.2021.659772 fatcat:tqteype455hszipabcuoyqirum

Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability

Kathleen Van Royen, Karolien Poels, Walter Daelemans, Heidi Vandebosch
2015 Telematics and informatics  
Experts in the field of cyberbullying, as excellent sources of valuable insight into these issues, were solicited based on three open-ended questions relating to the desirability of automatic monitoring  ...  Although technological advancements are made to optimise automatic cyberbullying detection systems, little is known about its desirability and requirements.  ...  Acknowledgments The authors thank all experts who participated in this study.  ... 
doi:10.1016/j.tele.2014.04.002 fatcat:yzib2keljbecpowkiz7p6hpvha

A Problem-Based Approach for Computer-Aided Privacy Threat Identification [chapter]

Kristian Beckers, Stephan Faßbender, Maritta Heisel, Rene Meis
2014 Lecture Notes in Computer Science  
Our approach does not rely entirely on the privacy analyst to detect privacy threats, but allows a computer aided privacy threat identification that is derived from the relations between stakeholders,  ...  We define a UML profile for privacy requirements and a reasoning technique that identifies stakeholders, whose personal information are stored or transmitted in the system-to-be and stakeholders from whom  ...  This analysis is carried out semi-automatically using graph patterns.  ... 
doi:10.1007/978-3-642-54069-1_1 fatcat:mdxn3qqxvzaqvayki73474xmxu

Web platform architecture for ambient assisted living

Ioana Stefan, Constantin Lucian Aldea, Cosmin Septimiu Nechifor
2018 Journal of Ambient Intelligence and Smart Environments  
door lock, indoor mobility patterns.  ...  Survey data and end-users feedback were collected and processed in order to identify the most frequent types of use cases, such as in-home health monitoring, house monitoring, fall down detector, automatic  ...  Acknowledgements This paper is supported by the NITICS project, Networked InfrasTructure for Innovative home Care Solutions (  ... 
doi:10.3233/ais-170470 fatcat:ss7rvwzexfa2rb6g6xdm4zkhjm

Implementation of Real-Time Laboratory-Based Influenza Surveillance System, Thailand

Phunlerd Piyaraj, Nira Pet-hoi, Chaiyos Kunanusont, Supanee Sangiamsak, Somsak Wankijcharoen, Jarupa Kanjanakornhirun, Paithoon Boonma
2018 Online Journal of Public Health Informatics  
Based on the long-term monitoring of collected information, this system can delineate the epidemiologic pattern of circulating viruses in near real-time manner, which clearly shows annual peaks in winter  ...  Thailand and provides timely reports and feedback to all stakeholders.  ...  to all stakeholders.  ... 
doi:10.5210/ojphi.v10i1.8921 fatcat:hxat5iqv7bdn3bmqmyagvjussu
« Previous Showing results 1 — 15 out of 31,128 results