SlideShare a Scribd company logo
1 of 47
Trust in Pervasive  Social Computing Licia Capra Dept of Computer Science University College London
EVOLUTION OF MOBILE TECHNOLOGY
TRANSFORMATION OF INTERNET USERS
A DIGITAL  TAPESTRY
PERVASIVE SOCIAL COMPUTING
A DIGITAL TAPESTRY ,[object Object],[object Object]
A DIGITAL TAPESTRY ,[object Object],[object Object]
CONNECTING SYPPLY & DEMAND ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COLLABORATIVE FILTERING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SOCIAL NETWORKS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE  TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the  Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B C D Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object]
PHILOSOPHY OF THE APPROACH ,[object Object],A B X Y Direct Trust Inferred Trust ,[object Object],[object Object],[object Object]
= Intent & Competence
PHILOSOPHY OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A D X Y Direct Trust for Judgements Direct Trust for Users C B Inferred Trust for Judgements
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],X A B C D ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd. “ The PageRank Citation Ranking: Bringing Order to the Web”. Stanford Digital Library. 1998
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],J. M. Kleinberg. “Authoritative Sources in a Hyperlinked Environment”. Journal of the ACM, 1999 ,[object Object],[object Object],0.25 0.25 0.25 0.25 0.75 0.25 0.50 0.25 0.75 1.00 1.25 0.75 0.20 0.27 0.33 0.20
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],R. Lempel and S. Moran. “SALSA: the Stochastic Approach to for Link Structure Analysis”. ACM TOIS, 2001
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REALISATION OF THE APPROACH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BROWSING THE TAPESTRY – OUTLINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.5,   =0.3 for SOFIA;   =0.3 for PPR;   =0.05 for N-SOFIA 1709 115 30 8 2 1 PPR 1136 63 12 3 1 1 N-SOFIA 855 31 4 1 1 1 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ACCURACY ,[object Object],Parameters:   =0.9,   =0.05 for SOFIA;   =0.5 for PPR;   =0.01 for N-SOFIA 16025 2188 344 66 12 5 PPR 6954 822 157 32 6 2 N-SOFIA 7429 992 174 32 6 2 SOFIA 90 75 50 25 10 5
EXPERIMENTS – ROBUSTNESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
EXPERIMENTS – ROBUSTNESS Lower values of    improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
UNLOCKING THE  TAPESTRY
UNLOCKING THE TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY Evaluate Browse Build
UNLOCKING THE TAPESTRY HOW TO  BUILD  AN UNLOCKED TAPESTRY
HOW TO BUILD AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  BROWSE  AN UNLOCKED TAPESTRY
HOW TO BROWSE AN UNLOCKED TAPESTRY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNLOCKING THE TAPESTRY HOW TO  EVALUATE  OUR APPROACHES
HOW TO EVALUATE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK YOU! ,[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationLicia Capra
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationLiquis
 
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5WebExpo
 
Tomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuTomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuWebExpo
 
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraPetr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraWebExpo
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishingjeannebarker
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuWebExpo
 
Jakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorJakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorWebExpo
 
Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015HeshamAnwar
 
Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!WebExpo
 
WebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo
 
Lukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleLukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleWebExpo
 
Jakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchJakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchWebExpo
 
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánJiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánWebExpo
 
Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?WebExpo
 

Viewers also liked (16)

Mobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness PresentationMobisys 08 - 5 Minute Madness Presentation
Mobisys 08 - 5 Minute Madness Presentation
 
Shd Portfolio Pdf Presentation
Shd Portfolio Pdf PresentationShd Portfolio Pdf Presentation
Shd Portfolio Pdf Presentation
 
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
Tom Krcha & Petr Pecháček: Adobe rocks! Flash a HTML5
 
Tomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designuTomáš Procházka: Moje zápisky z designu
Tomáš Procházka: Moje zápisky z designu
 
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developeraPetr Dvořák: Mobilní webové služby pohledem iPhone developera
Petr Dvořák: Mobilní webové služby pohledem iPhone developera
 
Jg Barker Publishing
Jg Barker PublishingJg Barker Publishing
Jg Barker Publishing
 
Michal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementuMichal Blažej: Zbavte sa account managementu
Michal Blažej: Zbavte sa account managementu
 
Hotmail Add Other Account
Hotmail Add Other AccountHotmail Add Other Account
Hotmail Add Other Account
 
Jakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with PhabricatorJakub Vrána: Code Reviews with Phabricator
Jakub Vrána: Code Reviews with Phabricator
 
Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015Endoscopy skills 2 2-2015
Endoscopy skills 2 2-2015
 
Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!Richard Fridrich: Buď punkový konzument!
Richard Fridrich: Buď punkový konzument!
 
WebExpo 2008 Glogster
WebExpo 2008 GlogsterWebExpo 2008 Glogster
WebExpo 2008 Glogster
 
Lukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživateleLukáš Zaplatílek: Kašlete na uživatele
Lukáš Zaplatílek: Kašlete na uživatele
 
Jakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiíchJakub Krč: Typografie v elektronických médiích
Jakub Krč: Typografie v elektronických médiích
 
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pánJiří Sekera: Vzory: dobrý sluha, ale špatný pán
Jiří Sekera: Vzory: dobrý sluha, ale špatný pán
 
Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?Petr Ludwig: Jak bojovat s prokrastinací?
Petr Ludwig: Jak bojovat s prokrastinací?
 

Similar to ARM'08 - Keynote Talk

Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systemsguest77b0cd12
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkLora Aroyo
 
Telefonica Lunch Seminar
Telefonica Lunch SeminarTelefonica Lunch Seminar
Telefonica Lunch SeminarNeal Lathia
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfBalasundaramSr
 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network SitesXenia K-i
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Xiaohan Zeng
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyoLora Aroyo
 
Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Shalin Hai-Jew
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreWael Elrifai
 
Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Wael Elrifai
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018Arsalan Khan
 
A recommender system for social learning platforms
A recommender system for social learning platformsA recommender system for social learning platforms
A recommender system for social learning platformsSoudé Fazeli
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisWael Elrifai
 
Learning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksLearning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksSymeon Papadopoulos
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Daniel Katz
 

Similar to ARM'08 - Keynote Talk (20)

Content-based link prediction
Content-based link predictionContent-based link prediction
Content-based link prediction
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Telefonica Lunch Seminar
Telefonica Lunch SeminarTelefonica Lunch Seminar
Telefonica Lunch Seminar
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network Sites
 
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
Social Network Analysis: What It Is, Why We Should Care, and What We Can Lear...
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyo
 
Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...Extracting Social Network Data and Multimedia Communications from Social Medi...
Extracting Social Network Data and Multimedia Communications from Social Medi...
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
 
Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...Social network analysis (SNA) - Big data and social data - Telecommunications...
Social network analysis (SNA) - Big data and social data - Telecommunications...
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
A recommender system for social learning platforms
A recommender system for social learning platformsA recommender system for social learning platforms
A recommender system for social learning platforms
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Ppt
PptPpt
Ppt
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence09 Diffusion Models & Peer Influence
09 Diffusion Models & Peer Influence
 
Learning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction NetworksLearning to Classify Users in Online Interaction Networks
Learning to Classify Users in Online Interaction Networks
 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

ARM'08 - Keynote Talk

  • 1. Trust in Pervasive Social Computing Licia Capra Dept of Computer Science University College London
  • 2. EVOLUTION OF MOBILE TECHNOLOGY
  • 4. A DIGITAL TAPESTRY
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. BROWSING THE TAPESTRY Joint work with Matteo Dell’Amico @ Eurecom Presented at the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 08
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. = Intent & Competence
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. EXPERIMENTS – ROBUSTNESS 2583 5 5165 10 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 35. EXPERIMENTS – ROBUSTNESS 2297 1285 334 2583 5 4459 2353 559 5165 10 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 36. EXPERIMENTS – ROBUSTNESS 1 34 2297 1285 334 2583 5 1 85 4459 2353 559 5165 10 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 37. EXPERIMENTS – ROBUSTNESS Lower values of  improve attack resilience, at the expense (small) of accuracy 679 2264 41 1082 1 215 1 34 2297 1285 334 2583 5 1386 4409 132 2126 2 391 1 85 4459 2353 559 5165 10 31765 33064 2815 14718 197 5571 11182 19186 1311 8779 74 2649 3406 9599 469 4612 13 1040 Victim Other Victim Other Victim Other 1 10 100 SOFIA 1 3132 1 1185 1 348 Victim Other N-SOFIA 33322 13371 3101 20493 8757 2012 10730 4759 1092 1 10 100 PPR 38741 25827 12914 No attack - Any 75 50 25 Role k Algorithm
  • 38. UNLOCKING THE TAPESTRY
  • 39.
  • 40. UNLOCKING THE TAPESTRY Evaluate Browse Build
  • 41. UNLOCKING THE TAPESTRY HOW TO BUILD AN UNLOCKED TAPESTRY
  • 42.
  • 43. UNLOCKING THE TAPESTRY HOW TO BROWSE AN UNLOCKED TAPESTRY
  • 44.
  • 45. UNLOCKING THE TAPESTRY HOW TO EVALUATE OUR APPROACHES
  • 46.
  • 47.