skip to main content
10.1145/1988688.1988768acmotherconferencesArticle/Chapter ViewAbstractPublication PageswimsConference Proceedingsconference-collections
research-article

Intelligent social networks

Published: 25 May 2011 Publication History

Abstract

Personal homepages, blogs or virtual communities have contributed to the birth of the Social Networks. The success of these platforms will continue to increase while they are able to offer tools and services to improve users' social relationships. The rapid evolution of social networks, the growing business opportunities and the possibility to apply new techniques to a relatively unexplored domain, have awakened strong interest among researchers. The potential benefits have generated the need to be the first one to achieve an enough level of autonomy to provide customized services for both users and product providers.
But the true revolution will arrive when social networks become "smart". To build these new intelligent systems we propose to use Artificial Intelligence techniques, more concretely plan recognition. In this paper we propose an architecture able to recognize the users intentions from partial observations of their actions. In addition, we present three scenarios where our system can be useful: Online commercial intentions, adaptive user interfaces and identity theft and extortion detection.

References

[1]
D. W. Albrecht, I. Zuckerman, A. E. Nicholson, and A. Bud. Towards a bayesian model for keyhole plan recognition in large domains. In Proceedings of the Sixth International Conference on User Modeling, pages 365--376. Springer-Verlag, 1997.
[2]
J. Allen and C. R. Perrault. Analyzing intention in utterances, pages 441--458. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1986.
[3]
M. Armentano and A. Amandi. Plan recognition for interface agents. Artificial Intelligence Review, 28:131--162, 2007. 10.1007/s10462-009-9095-8.
[4]
J. Azarewicz, G. Fala, R. Fink, and C. Heithecker. Plan recognition for airborne tactical decision making. In Proceedings of the Fifth National Conference On Artificial Intelligence (AAAI-86), pages 805--811, 1986.
[5]
M. Bauer. Acquisition of abstract plan descriptions for plan recognition. In Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence, AAAI '98/IAAI '98, pages 936--941, Menlo Park, CA, USA, 1998. American Association for Artificial Intelligence.
[6]
E. Charniak and R. Goldman. A probabilistic model of plan recognition. In Proceedings of the ninth National conference on Artificial intelligence - Volume 1, AAAI'91, pages 160--165. AAAI Press, 1991.
[7]
C. W. Geib and R. P. Goldman. Plan recognition in intrusion detection systems. In DARPA Information Survivability Conference and Exposition (DISCEX, 2001.
[8]
M. Ghallab, D. Nau, and P. Traverso. Automated planning: theory and practice. Morgan Kaufmann Publishers, 2004.
[9]
D. L. Hoffman, T. P. Novak, and P. Chatterjee. Commercial scenarios for the web: Opportunities and challenges. Journal of Computer-Mediated Communication, 1(3):0--0, 1995.
[10]
J. Hong. Goal recognition through goal graph analysis. Journal of Artificial Intelligence Research, 15:1--30, 2001.
[11]
D. H. Hu, Q. Yang, and Y. Li. An algorithm for analyzing personalized online commercial intention. In Proceedings of the 2nd International Workshop on Data Mining and Audience Intelligence for Advertising, ADKDD '08, pages 27--36, New York, NY, USA, 2008. ACM.
[12]
P. A. Jarvis, T. F. Lunt, and K. L. Myers. Identifying terrorist activity with ai plan-recognition technology. AI Magazine, 26(3):73--81, 2005.
[13]
J. B. D. Joshi, W. G. Aref, A. Ghafoor, and E. H. Spafford. Security models for web-based applications. Commun. ACM, 44:38--44, February 2001.
[14]
S. Kambhampati, E. Parker, and E. Lambrecht. Understanding and extending graphplan. In S. Steel and R. Alami, editors, Recent Advances in AI Planning, volume 1348 of Lecture Notes in Computer Science, pages 260--272. Springer Berlin/Heidelberg, 1997.
[15]
M. Kantardzic. Data Mining: Concepts, Models, Methods and Algorithms. John Wiley & Sons, Inc., New York, NY, USA, 2002.
[16]
H. Kautz and J. Allen. Generalized plan recognition. In Proceedings of AAAI, pages 32--38, 1986.
[17]
R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Trawling the web for emerging cyber-communities. In Computer Networks, pages 1481--1493, 1999.
[18]
N. Lesh. Scalable and adaptive goal recognition. In Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, pages 1208--1214. Morgan Kaufmann, 1998.
[19]
R. Metcalfe. Metcalfe's law: a network becomes more valuable as it reaches more users. Infoworld, (10--2), 1995.
[20]
M. Ramírez and H. Geffner. Plan recognition as planning. In Proceedings of the 21st international jont conference on Artifical intelligence, pages 1778--1783, San Francisco, CA, USA, 2009. Morgan Kaufmann Publishers Inc.
[21]
M. Steinbach, G. Karypis, and V. Kumar. A comparison of document clustering techniques. In In KDD Workshop on Text Mining, 2000.
[22]
J. Sun and M. Yin. Recognizing the agent's goals incrementally: planning graph as a basis. Frontiers of Computer Science in China, 1:26--36, 2007.
[23]
H. C. Triandis and M. J. Gelfand. Converging measurement of horizontal and vertical individualism and collectivism. Journal of Personality and Social Psychology, 74(1):118--128, 1998.
[24]
A. Waern. Recognising Human Plans: Issues for Plan Recognition in Human - Computer Interaction. PhD thesis, Royal Institute of Technology, 1996.
[25]
S. Wasserman. Social network analysis: methods and applications. Cambridge University Press, 1994.
[26]
R. Wilensky. Why John married Mary: Understanding stories involving recurring goals. Cognitive Science, 2(3):235--266, 1978.

Cited By

View all
  • (2013)Challenges and issues of web intelligence researchProceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics10.1145/2479787.2479868(1-4)Online publication date: 12-Jun-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
WIMS '11: Proceedings of the International Conference on Web Intelligence, Mining and Semantics
May 2011
563 pages
ISBN:9781450301480
DOI:10.1145/1988688
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 May 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. custom services
  2. extortion detection
  3. online-commercial intention
  4. plan recognition
  5. social networks

Qualifiers

  • Research-article

Funding Sources

  • Castilla-La Mancha project

Conference

WIMS '11

Acceptance Rates

Overall Acceptance Rate 140 of 278 submissions, 50%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Challenges and issues of web intelligence researchProceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics10.1145/2479787.2479868(1-4)Online publication date: 12-Jun-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media