894 Hits in 2.2 sec

Analysis of revisitations in online games

Ruck Thawonmas, Keisuke Yoshida, Jing-Kai Lou, Kuan-Ta Chen
2011 Entertainment Computing  
This paper analyzes revisitations in online games focusing on two types of revisitations: game revisitations and area revisitations. A player revisits a game and areas therein with purposes. For game revisitations, we conduct a large-scale analysis using Shen Zhou Online access log collected for nearly 6 years consisting of 50,000 characters and have succeeded in using in the information on game revisitations, together with the login time and login frequency information, for predicting the
more » ... rs who will be absent from the game. For area revisitations, we conduct yet another large-scale analysis using World of Warcraft access log collected for 2 years consisting of more than 60,000 characters and have discovered four main groups of area revisitation patterns. We also discuss in the paper how our findings can be utilized to support both game developers and players. Ó
doi:10.1016/j.entcom.2011.01.003 fatcat:p7wok5vq5jcvtlpeuqlzbc3rim

Personalized TV Recommendation: Fusing User Behavior and Preferences [article]

Sheng-Chieh Lin, Ting-Wei Lin, Jing-Kai Lou, Ming-Feng Tsai, Chuan-Ju Wang
2020 arXiv   pre-print
In this paper, we propose a two-stage ranking approach for recommending linear TV programs. The proposed approach first leverages user viewing patterns regarding time and TV channels to identify potential candidates for recommendation and then further leverages user preferences to rank these candidates given textual information about programs. To evaluate the method, we conduct empirical studies on a real-world TV dataset, the results of which demonstrate the superior performance of our model
more » ... terms of both recommendation accuracy and time efficiency.
arXiv:2009.08957v1 fatcat:luhjau64efg6tkiqzrmcukwgne

A Latent Representation Of Users, Sessions, And Songs For Listening Behavior Analysis

Chia-Hao Chung, Jing-Kai Lou, Homer H. Chen
2016 Zenodo  
[TODO] Add abstract here.
doi:10.5281/zenodo.1416877 fatcat:ihl5czjiyfferlk3quogalqauu

Analysis of Area Revisitation Patterns in World of Warcarft [chapter]

Ruck Thawonmas, Keisuke Yoshida, Jing-Kai Lou, Kuan-Ta Chen
2009 Lecture Notes in Computer Science  
This paper analyzes area revisitation patterns in World of Warcraft (WoW). Online-game players roam a number of in-game areas while playing the game and revisit some of them with different personal reasons. To clarify this issue, we conduct a large-scale analysis using WoW access log collected for two years consisting of more than sixty thousand characters and have discovered four main groups of area revisitation patterns. We describe also in the paper how our findings can be utilized to support both game developers and players.
doi:10.1007/978-3-642-04052-8_2 fatcat:zmvbvvshuzaflf2flafz6q3wcm

Rapid Detection of Constant-Packet-Rate Flows

Kuan-Ta Chen, Jing-Kai Lou
2008 2008 Third International Conference on Availability, Reliability and Security  
The demand for effective VoIP and online gaming traffic management methods continues to increase for purposes such as QoS provisioning, usage accounting, and blocking VoIP calls or game connections. However, identifying such flows has become a significant administrative burden because many of the applications use proprietary signaling and transport protocols. The question of how to identify proprietary VoIP traffic has yet to be solved. In this paper, we propose using a deviation-based
more » ... r to identify VoIP and gaming traffic, given that such real-time interactive services normally send out constant-packet-rate (CPR) traffic with a fixed interval, in order to maintain real-timeliness and interactivity. Our contribution is two-fold: 1) We show that scale-free variability measures are more appropriate than scaledependent ones for quantifying the network variability injected into CPR traffic. 2) Our proposed classifier is particularly lightweight in that it only requires a few inter-packet times to make a decision. The evaluation results show that by only analyzing 10 successive inter-packet times, we can distinguish between CPR and non-CPR traffic with approximately 90% accuracy.
doi:10.1109/ares.2008.153 dblp:conf/IEEEares/ChenL08 fatcat:2wxv75iv65flvf2f2kdvtv2viy

Forecasting online game addictiveness

Jing-Kai Lou, Kuan-Ta Chen, Hwai-Jung Hsu, Chin-Laung Lei
2012 2012 11th Annual Workshop on Network and Systems Support for Games (NetGames)  
Online gaming has now become an extremely competitive business. As there are so many game titles released every month, gamers have become more difficult to please and fickle in their allegiances. Therefore, it would be beneficial if we could forecast how addictive a game is before publishing it on the market. With the capability of game addictiveness forecasting, developers will be able to continuously adjust the game design and publishers will be able to assess the potential market value of a
more » ... ame in its early development stages. In this paper, we propose to forecast a game's addictiveness based on players' emotional responses when they are first exploring the game. Based on the account activity traces of 11 commercial games, we develop a forecasting model that predicts a game's addictiveness index according to electromyographic measures of players' two facial muscles. We hope that with our methodology, the game industry could optimize the odds of successful investments and target more accurately the provision of a better entertaining experience.
doi:10.1109/netgames.2012.6404029 dblp:conf/netgames/LouCHL12 fatcat:7wshtjfp7nfqdprsafy7z4m6fm

A Collusion-Resistant Automation Scheme for Social Moderation Systems

Jing-Kai Lou, Kuan-Ta Chen, Chin-Laung Lei
2009 2009 6th IEEE Consumer Communications and Networking Conference  
For current Web 2.0 services, manual examination of user uploaded content is normally required to ensure its legitimacy and appropriateness, which is a substantial burden to service providers. To reduce labor costs and the delays caused by content censoring, social moderation has been proposed as a front-line mechanism, whereby user moderators are encouraged to examine content before system moderation is required. Given the immerse amount of new content added to the Web each day, there is a
more » ... for automation schemes to facilitate rear system moderation. This kind of mechanism is expected to automatically summarize reports from user moderators and ban misbehaving users or remove inappropriate content whenever possible. However, the accuracy of such schemes may be reduced by collusion attacks, where some work together to mislead the automatic summarization in order to obtain shared benefits. In this paper, we propose a collusion-resistant automation scheme for social moderation systems. Because some user moderators may collude and dishonestly claim that a user misbehaves, our scheme detects whether an accusation from a user moderator is fair or malicious based on the structure of mutual accusations of all users in the system. Through simulations we show that collusion attacks are likely to succeed if an intuitive countbased automation scheme is used. The proposed scheme, which is based on the community structure of the user accusation graph, achieves a decent performance in most scenarios.
doi:10.1109/ccnc.2009.4784911 dblp:conf/ccnc/LouCL10 fatcat:ennwytx42reltazgon3u5vga7m

Flavoured quantum Hall phase in graphene/CrOCl heterostructures [article]

Yaning Wang, Xiang Gao, Kaining Yang, Pingfan Gu, Baojuan Dong, Yuhang Jiang, Kenji Watanabe, Takashi Taniguchi, Jun Kang, Wenkai Lou, Jinhai Mao, Yu Ye (+4 others)
2021 arXiv   pre-print
Quantum Hall effect (QHE), the ground to construct modern conceptual electronic systems with emerging physics, is often much influenced by the interplay between the host two-dimensional electron gases and the substrate, sometimes predicted to exhibit exotic topological states. Yet the understanding of the underlying physics and the controllable engineering of this paradigm of interaction remain challenging. Here we demonstrate the observation of an unusual QHE, which differs markedly from the
more » ... own picture, in graphene samples in contact with an anti-ferromagnetic insulator CrOCl equipped with dual gates. Owing to the peculiar interfacial coupling, Landau levels in monolayer graphene remain intact at negative filling fractions, but largely deviated for the positive gate-doping range. The latter QHE phase even presents in the limit of zero magnetic field, with the consequential Landau quantization following a parabolic relation between the displacement field D and the magnetic field B. This characteristic prevails up to 100 K in a sufficiently wide doping range from 0 to 10^13 cm^-2. Our findings thus open up new routes for manipulating the quantum electronic states, which may find applications in such as quantum metrology.
arXiv:2110.02899v1 fatcat:3dvks3eizjhcznjepsc4gmz67e

Second-harmonic generation in one-dimensional metal gratings with dual extraordinary transmissions

Ming Kang, Yongnan Li, Kai Lou, Si-Min Li, Qiang Bai, Jing Chen, Hui-Tian Wang
2010 Journal of Applied Physics  
We investigate the enhanced second-harmonic generation ͑SHG͒ in nonlinear metal gratings with simultaneously extraordinary optical transmissions ͑EOTs͒ for the fundamental and the second-harmonic wavelengths, i.e., dual EOTs. We show that the strongly temporal and spatial dispersions at Wood's anomalies, the asymmetry in the grating structure and the intrinsic dispersion of the media are of great importance in achieving dual-EOT SHG. Metal gratings with dual EOTs are present and the maximum
more » ... ncement on SHG is around 20. Weak points of dual-EOT SHG, potential improvement and future applications are discussed.
doi:10.1063/1.3327215 fatcat:7coh642m7feibgrntcfcpxnyeq

Modeling the Diffusion of Preferences on Social Networks [chapter]

Jing-Kai Lou, Fu-Min Wang, Chin-Hua Tsai, San-Chuan Hung, Perng-Hwa Kung, Shou-De Lin
2013 Proceedings of the 2013 SIAM International Conference on Data Mining  
The information diffusion on social networks has been studied for decades. To simplify the diffusion on social networks, most models consider the propagated information or media as single values. Representing media as single values however would not suitable for certain concernful situations such as the voter preference toward the candidates in an election. In such case, the representation would better be lists instead of single values so people can try to alter others' preference through
more » ... inference. This paper studies the diffusion of preference on social networks, which is a novel problem to solve in this direction. First, we propose a preference propagation model that can handle the diffusion of vector-type information instead of only binary or numerical values. Furthermore, we theoretically prove the convergence of diffusion with the proposed model, and that a consensus among strongly connected nodes can eventually be reached with certain conditions. We further extract relevant information from a publicly available bibliography datasets to evaluate the proposed models, while such data can further serve as a benchmark for evaluating future models of the same purpose. Lastly, we exploit the extracted data to demonstrate the usefulness of our model and compare it with other well-known diffusion strategies such as independent cascade, linear threshold, and diffusion rank. We find that our model consistently outperforms other models.
doi:10.1137/1.9781611972832.67 dblp:conf/sdm/HungKLLTW13 fatcat:xtdtdumit5a2jnh6xyfyocrgaq

Gender swapping and user behaviors in online social games

Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei, Kuan-Ta Chen
2013 Proceedings of the 22nd international conference on World Wide Web - WWW '13  
Modern Massively Multiplayer Online Role-Playing Games (MMORPGs) provide lifelike virtual environments in which players can conduct a variety of activities including combat, trade, and chat with other players. While the game world and the available actions therein are inspired by their offline counterparts, the games' popularity and dedicated fan base are testaments to the allure of novel social interactions granted to people by allowing them an alternative life as a new character and persona.
more » ... n this paper we investigate the phenomenon of "gender swapping," which refers to players choosing avatars of genders opposite to their natural ones. We report the behavioral patterns observed in players of Fairyland Online, a globally serviced MMORPG, during social interactions when playing as in-game avatars of their own real gender or genderswapped. We also discuss the effect of gender role and self-image in virtual social situations and the potential of our study for improving MMORPG quality and detecting online identity frauds.
doi:10.1145/2488388.2488460 dblp:conf/www/LouPCPLC13 fatcat:axaywvtiv5fhjhanh3c5wdj6wi

Regulatory Roles of the PI3K/Akt Signaling Pathway in Rats with Severe Acute Pancreatitis

Ping Xu, Jing Wang, Zhi-wen Yang, Xiao-li Lou, Cheng Chen, Lynette Kay Rogers
2013 PLoS ONE  
Citation: Xu P, Wang J, Yang Z-w, Lou X-l, Chen C (2013) Regulatory Roles of the PI3K/Akt Signaling Pathway in Rats with Severe Acute Pancreatitis. PLoS ONE 8(11): e81767.  ... 
doi:10.1371/journal.pone.0081767 pmid:24312352 pmcid:PMC3842964 fatcat:dllnif4gw5efxcndualplfbtcq

Toward an understanding of the processing delay of peer-to-peer relay nodes

Kuan-Ta Chen, Jing-Kai Lou
2008 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)  
Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not natively supported by the Internet, it is usually implemented at the application layer. Also, in a modern operating system, the processor is shared, so the receive-process-forward process for each relay packet may take a considerable amount of time if the host is busy handling some other tasks. Thus, if we happen to select a
more » ... d relay node, the relaying may introduce significant delays to the packet transmission time and even degrade the application performance. In this work, based on an extensive set of Internet traces, we pursue an understanding of the processing delays incurred at relay nodes and their impact on the application performance. Our contribution is three-fold: 1) we propose a methodology for measuring the processing delays at any relay node on the Internet; 2) we characterize the workload patterns of a variety of Internet relay nodes; and 3) we show that, serious VoIP quality degradation may occur due to relay processing, thus we have to monitor the processing delays of a relay node continuously to prevent the application performance from being degraded. Index Terms-E-Model, Internet Measurement, Peer-to-Peer Systems, QoS, VoIP I. INTRODUCTION Voice communication over IP is becoming one of the most profitable Internet businesses. It has been shown that VoIP users are willing to pay for value-added services, such as intercommunication with a PSTN phone (dialing to a PSTN phone and vice versa), voice mails, and call forwarding. Although one of the major players, Skype [25], was not the first company to provide VoIP service, but it did pioneer the delivery of such services to an unprecedented wide range of end-users. From a technical point of view, we believe that three factors are responsible for Skype's popularity: the user-friendly interface, the high quality audio codecs, and the sophisticated peer-to-peer network infrastructure. Skype is well-known, or perhaps notorious, for its capability to "steal" computation and communication resources from a computer with a Skype instance running. This is because Skype employs a technique called peer-to-peer relaying, where the network communications between two call parties can be made through a third intermediate node, commonly called a relay node. Peer-to-peer relaying brings the following advantages to VoIP applications: 1) the voice quality can often be
doi:10.1109/dsn.2008.4630111 dblp:conf/dsn/ChenL08 fatcat:iejofbtesfhi7oivmyfpdnsndi

A Social Diffusion Model with an Application on Election Simulation

Jing-Kai Lou, Fu-Min Wang, Chin-Hua Tsai, San-Chuan Hung, Perng-Hwa Kung, Shou-De Lin, Kuan-Ta Chen, Chin-Laung Lei
2014 The Scientific World Journal  
Issues about opinion diffusion have been studied for decades. It has so far no empirical approach to model the interflow and formation of crowd's opinion in elections due to two reasons. First, unlike the spread of information or flu, individuals have their intrinsic attitudes to election candidates in advance. Second, opinions are generally simply assumed as single values in most diffusion models. However, in this case, an opinion should represent preference toward multiple candidates.
more » ... ly done models thus may not intuitively interpret such scenario. This work is to design a diffusion model which is capable of managing the aforementioned scenario. To demonstrate the usefulness of our model, we simulate the diffusion on the network built based on a publicly available bibliography dataset. We compare the proposed model with other well-known models such as independent cascade. It turns out that our model consistently outperforms other models. We additionally investigate electoral issues with our model simulator.
doi:10.1155/2014/180590 pmid:24995351 pmcid:PMC4068049 fatcat:45ztsfszurbhxgh5seoci7wwbi

Fairness-Aware Loan Recommendation for Microfinance Services

Eric L. Lee, Jing-Kai Lou, Wei-Ming Chen, Yen-Chi Chen, Shou-De Lin, Yen-Sheng Chiang, Kuan-Ta Chen
2014 Proceedings of the 2014 International Conference on Social Computing - SocialCom '14  
Up to date, more than 15 billion US dollars have been invested in microfinance that benefited more than 160 million people in developing countries. The Kiva organization is one of the successful examples that use a decentralized matching process to match lenders and borrowers. Interested lenders from around the world can look for cases among thousands of applicants they found promising to lend the money to. But how can loan borrowers and lenders be successfully matched up in a microfinance
more » ... orm like Kiva? We argue that a sophisticate recommender not only pairs up loan lenders and borrowers in accordance to their preferences, but should also help to diversify the distribution of donations to reduce the inequality of loans is highly demanded, as altruism, like any resource, can be congestible. In this paper, we propose a fairness-aware recommendation system based on one-class collaborative-filtering techniques for charity and micro-loan platform such as Our experiments on real dataset indicates that the proposed method can largely improve the loan distribution fairness while retaining the accuracy of recommendations.
doi:10.1145/2639968.2640064 dblp:conf/socialcom/LeeLCCLCC14 fatcat:cs3jgzqrlbh6pa37hkwz2rnkiq
« Previous Showing results 1 — 15 out of 894 results