scholarly journals Towards Fair and Transparent Algorithmic Systems

Author(s):  
Yair Zick

My research in the past few years has focused on fostering trust in algorithmic systems. I often analyze scenarios where a variety of desirable trust-oriented goals must be simultaneously satisfied; for example, ensuring that an allocation mechanism is both fair and efficient, or that a model explanation framework is both effective and differentially private. This interdisciplinary approach requires tools from a variety of computer science disciplines, such as game theory, economics, ML and differential privacy.

2020 ◽  
Vol 20 (6) ◽  
pp. 880-894
Author(s):  
SIMON MARYNISSEN ◽  
BART BOGAERTS ◽  
MARC DENECKER

AbstractJustification theory is a unifying semantic framework. While it has its roots in non-monotonic logics, it can be applied to various areas in computer science, especially in explainable reasoning; its most central concept is a justification: an explanation why a property holds (or does not hold) in a model.In this paper, we continue the study of justification theory by means of three major contributions. The first is studying the relation between justification theory and game theory. We show that justification frameworks can be seen as a special type of games. The established connection provides the theoretical foundations for our next two contributions. The second contribution is studying under which condition two different dialects of justification theory (graphs as explanations vs trees as explanations) coincide. The third contribution is establishing a precise criterion of when a semantics induced by justification theory yields consistent results. In the past proving that such semantics were consistent took cumbersome and elaborate proofs.We show that these criteria are indeed satisfied for all common semantics of logic programming.


Author(s):  
João P. Hespanha

This book is aimed at students interested in using game theory as a design methodology for solving problems in engineering and computer science. The book shows that such design challenges can be analyzed through game theoretical perspectives that help to pinpoint each problem's essence: Who are the players? What are their goals? Will the solution to “the game” solve the original design problem? Using the fundamentals of game theory, the book explores these issues and more. The use of game theory in technology design is a recent development arising from the intrinsic limitations of classical optimization-based designs. In optimization, one attempts to find values for parameters that minimize suitably defined criteria—such as monetary cost, energy consumption, or heat generated. However, in most engineering applications, there is always some uncertainty as to how the selected parameters will affect the final objective. Through a sequential and easy-to-understand discussion, the book examines how to make sure that the selection leads to acceptable performance, even in the presence of uncertainty—the unforgiving variable that can wreck engineering designs. The book looks at such standard topics as zero-sum, non-zero-sum, and dynamic games and includes a MATLAB guide to coding. This book offers students a fresh way of approaching engineering and computer science applications.


Author(s):  
Charles Roddie

When interacting with others, it is often important for you to know what they have done in similar situations in the past: to know their reputation. One reason is that their past behavior may be a guide to their future behavior. A second reason is that their past behavior may have qualified them for reward and cooperation, or for punishment and revenge. The fact that you respond positively or negatively to the reputation of others then generates incentives for them to maintain good reputations. This article surveys the game theory literature which analyses the mechanisms and incentives involved in reputation. It also discusses how experiments have shed light on strategic behavior involved in maintaining reputations, and the adequacy of unreliable and third party information (gossip) for maintaining incentives for cooperation.


Insects ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 484
Author(s):  
Syed Arif Hussain Rizvi ◽  
Justin George ◽  
Gadi V. P. Reddy ◽  
Xinnian Zeng ◽  
Angel Guerrero

Since the first identification of the silkworm moth sex pheromone in 1959, significant research has been reported on identifying and unravelling the sex pheromone mechanisms of hundreds of insect species. In the past two decades, the number of research studies on new insect pheromones, pheromone biosynthesis, mode of action, peripheral olfactory and neural mechanisms, and their practical applications in Integrated Pest Management has increased dramatically. An interdisciplinary approach that uses the advances and new techniques in analytical chemistry, chemical ecology, neurophysiology, genetics, and evolutionary and molecular biology has helped us to better understand the pheromone perception mechanisms and its practical application in agricultural pest management. In this review, we present the most recent developments in pheromone research and its application in the past two decades.


2008 ◽  
Vol 51 (8) ◽  
pp. 74-79 ◽  
Author(s):  
Yoav Shoham
Keyword(s):  

PEDIATRICS ◽  
1992 ◽  
Vol 90 (3) ◽  
pp. V-V
Author(s):  
ROBERT J. HAGGERTY

The William T. Grant Foundation supports eight consortia, each devoted to a specific issue, and each consisting of ten to twenty members from a Variety of scientific disciplines. Our purpose is to provide a forum for discussion of ideas, research, and conceptual and theoretical bases of that research to individuals who work in related areas, but who might not under other circumstances have easy communication with each other, especially in the preliminary stages of the development of their research projects. By the time national meetings occur, projects are of necessity completed, and there is no chance for modification using an interdisciplinary approach. We have been very pleased with this device to bring research workers of different disciplines together. The newest of these consortia is devoted to the Developmental Psychobiology of Stress and includes pediatricians, psychologists, and anthropologists who work on both human and animal models. This group moved promptly in their first meeting to bring together a talented group of researchers from different disciplines; the results of their research are presented in this supplement. They well exemplify the advances that have been made in recent years in methodology to study mind-body interactions in infants and older children. Methodologic barriers in the past have limited research on stress in humans. It is stimulating and exciting to see that these barriers are beginning to be overcome, and that research such as is presented here is illuminating this exciting new field. It has enormous application to pediatric practice and child health in the future.


Author(s):  
Jane S. Gerber

Sephardi identity has meant different things at different times, but has always entailed a connection with Spain, from which the Jews were expelled in 1492. While Sephardi Jews have lived in numerous cities and towns throughout history, certain cities had a greater impact on the shaping of their culture. This book focuses on those that may be considered most important, from Cordoba in the tenth century to Toledo, Venice, Safed, Istanbul, Salonica, and Amsterdam at the dawn of the seventeenth century. Each served as a venue in which a particular dimension of Sephardi Jewry either took shape or was expressed in especially intense form. Significantly, these cities were mostly heterogeneous in their population and culture — half of them under Christian rule and half under Muslim rule — and this too shaped the Sephardi worldview and attitude. While Sephardim cultivated a distinctive identity, they felt at home in the cultures of their adopted lands. The book demonstrates that Sephardi history and culture have always been multifaceted. The book's interdisciplinary approach captures the many contexts in which the life of the Jews from Iberia unfolded, without either romanticizing the past or diluting its reality.


2019 ◽  
Vol 2019 (3) ◽  
pp. 170-190
Author(s):  
Archita Agarwal ◽  
Maurice Herlihy ◽  
Seny Kamara ◽  
Tarik Moataz

Abstract The problem of privatizing statistical databases is a well-studied topic that has culminated with the notion of differential privacy. The complementary problem of securing these differentially private databases, however, has—as far as we know—not been considered in the past. While the security of private databases is in theory orthogonal to the problem of private statistical analysis (e.g., in the central model of differential privacy the curator is trusted) the recent real-world deployments of differentially-private systems suggest that it will become a problem of increasing importance. In this work, we consider the problem of designing encrypted databases (EDB) that support differentially-private statistical queries. More precisely, these EDBs should support a set of encrypted operations with which a curator can securely query and manage its data, and a set of private operations with which an analyst can privately analyze the data. Using such an EDB, a curator can securely outsource its database to an untrusted server (e.g., on-premise or in the cloud) while still allowing an analyst to privately query it. We show how to design an EDB that supports private histogram queries. As a building block, we introduce a differentially-private encrypted counter based on the binary mechanism of Chan et al. (ICALP, 2010). We then carefully combine multiple instances of this counter with a standard encrypted database scheme to support differentially-private histogram queries.


Author(s):  
K. S. Prasath

Abstract: Image processing is a method to perform some operations on an image, in order to get an enhanced image or to extract some useful information from it. It is a type of signal processing in which input is an image and output may be image or characteristics/features associated with that image. Nowadays, image processing is one among rapidly growing technologies. It forms core research area within engineering and computer science disciplines too. Image detection on road is primarily carried out with the help of camera with Raspberry pi 3 model b+ and stimulation software. The device is built in such a way that we can identify any potholes in the respective roads and able to rectify as soon as possible with the help of the device. The data signals shared by the device will be converted to text signals from which we can get it right. These devices are fixed at top of the lamppost which is located at the corners of the road from where the device is monitoring the road at 120 degree for weekly once respectively. Keywords: Image processing, Image detection on road, Raspberry pi 3, 120 degree


Sign in / Sign up

Export Citation Format

Share Document