MCS Thesis By: Sébastien Mathieu Supervisors: Dr. Virendra C. Bhavsar and Dr. Harold Boley Examining Board: Dr. John DeDourek, Dr. Weichang Du, Dr. Donglei.

Slides:



Advertisements
Similar presentations
CLUSTERING.
Advertisements

The A-tree: An Index Structure for High-dimensional Spaces Using Relative Approximation Yasushi Sakurai (NTT Cyber Space Laboratories) Masatoshi Yoshikawa.
Nearest Neighbor Finding Using Kd-tree Ref: Andrew Moore’s PhD thesis (1991)Andrew Moore’s PhD thesis.
Danzhou Liu Ee-Peng Lim Wee-Keong Ng
Data Mining Cluster Analysis: Advanced Concepts and Algorithms
Preference Elicitation Partial-revelation VCG mechanism for Combinatorial Auctions and Eliciting Non-price Preferences in Combinatorial Auctions.
Adversarial Search Chapter 6 Section 1 – 4.
Adversarial Search Chapter 5.
An Introduction to Artificial Intelligence Lecture VI: Adversarial Search (Games) Ramin Halavati In which we examine problems.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
C++ Programming: Program Design Including Data Structures, Third Edition Chapter 21: Graphs.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
1 search CS 331/531 Dr M M Awais A* Examples:. 2 search CS 331/531 Dr M M Awais 8-Puzzle f(N) = g(N) + h(N)
DEPARTMENT OF COMPUTER SCIENCE SOFTWARE ENGINEERING, GRAPHICS, AND VISUALIZATION RESEARCH GROUP 15th International Conference on Information Visualisation.
SubSea: An Efficient Heuristic Algorithm for Subgraph Isomorphism Vladimir Lipets Ben-Gurion University of the Negev Joint work with Prof. Ehud Gudes.
Multiple Sequence alignment Chitta Baral Arizona State University.
C o n f i d e n t i a l HOME NEXT Subject Name: Data Structure Using C Unit Title: Trees.
Fast Subsequence Matching in Time-Series Databases Christos Faloutsos M. Ranganathan Yannis Manolopoulos Department of Computer Science and ISR University.
Buyer Agent Decision Process Based on Automatic Fuzzy Rules Generation Methods Roi Arapoglou, Kostas Kolomvatsos, Stathes Hadjiefthymiades Pervasive Computing.
Advanced Algorithms Analysis and Design Lecture 8 (Continue Lecture 7…..) Elementry Data Structures By Engr Huma Ayub Vine.
Ontology Alignment/Matching Prafulla Palwe. Agenda ► Introduction  Being serious about the semantic web  Living with heterogeneity  Heterogeneity problem.
1 A Weighted-Tree Similarity Algorithm for Multi-Agent Systems in e-Business Environments Virendra C.Bhavsar* Harold Boley** Lu Yang* * Faculty of Computer.
The X-Tree An Index Structure for High Dimensional Data Stefan Berchtold, Daniel A Keim, Hans Peter Kriegel Institute of Computer Science Munich, Germany.
Recursion and Dynamic Programming. Recursive thinking… Recursion is a method where the solution to a problem depends on solutions to smaller instances.
What is Genetic Programming? Genetic programming is a model of programming which uses the ideas (and some of the terminology) of biological evolution to.
Adversarial Search Chapter 6 Section 1 – 4. Outline Optimal decisions α-β pruning Imperfect, real-time decisions.
1 Lu Yang, Biplab Sarker, Virendrakumar C. Bhavsar and Harold Boley Faculty of Computer Science University of New Brunswick (UNB) Fredericton,
Constructing Optimal Wavelet Synopses Dimitris Sacharidis Timos Sellis
1 Weighted Partonomy-Taxonomy Trees with Local Similarity Measures for Semantic Buyer-Seller Match-Making Lu Yang, Marcel Ball, Virendra C. Bhavsar and.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
1 Weighted-Tree Simplicity Algorithm for Similarity Matching of Partial Product Descriptions Lu Yang, Biplab Sarker, Virendra C. Bhavsar and Harold Boley.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 New Unsupervised Clustering Algorithm for Large Datasets.
The AgentMatcher Architecture Applied to Power Grid Transactions Riyanarto Sarno Faculty of Information Technology, Sepuluh Nopember Institute of Technology.
Graph-based Text Classification: Learn from Your Neighbors Ralitsa Angelova , Gerhard Weikum : Max Planck Institute for Informatics Stuhlsatzenhausweg.
Nearest Neighbor Queries Chris Buzzerd, Dave Boerner, and Kevin Stewart.
George Boulougaris, Kostas Kolomvatsos, Stathes Hadjiefthymiades Building the Knowledge Base of a Buyer Agent Using Reinforcement Learning Techniques Pervasive.
Efficient Processing of Top-k Spatial Preference Queries
Spatio-temporal Pattern Queries M. Hadjieleftheriou G. Kollios P. Bakalov V. J. Tsotras.
1 Inverted Matrix: Efficient Discovery of Frequent Items in Large Datasets in the Context of Interactive Mining -SIGKDD’03 Mohammad El-Hajj, Osmar R. Zaïane.
9/2/2005VLDB 2005, Trondheim, Norway1 On Computing Top-t Most Influential Spatial Sites Tian Xia, Donghui Zhang, Evangelos Kanoulas, Yang Du Northeastern.
COP5992 – DATA MINING TERM PROJECT RANDOM SUBSPACE METHOD + CO-TRAINING by SELIM KALAYCI.
A FAIR ASSIGNMENT FOR MULTIPLE PREFERENCE QUERIES
Top-k Query Processing Optimal aggregation algorithms for middleware Ronald Fagin, Amnon Lotem, and Moni Naor + Sushruth P. + Arjun Dasgupta.
ARTIFICIAL INTELLIGENCE (CS 461D) Princess Nora University Faculty of Computer & Information Systems.
Data Mining By Farzana Forhad CS 157B. Agenda Decision Tree and ID3 Rough Set Theory Clustering.
DATA STRUCTURES (CS212D) Overview & Review Instructor Information 2  Instructor Information:  Dr. Radwa El Shawi  Room: 
CS Machine Learning Instance Based Learning (Adapted from various sources)
Efficient Semantic Web Service Discovery in Centralized and P2P Environments Dimitrios Skoutas 1,2 Dimitris Sacharidis.
Explorations in Artificial Intelligence Prof. Carla P. Gomes Module 5 Adversarial Search (Thanks Meinolf Sellman!)
Mismatch String Kernals for SVM Protein Classification Christina Leslie, Eleazar Eskin, Jason Weston, William Stafford Noble Presented by Pradeep Anand.
Data Structures and Algorithms Instructor: Tesfaye Guta [M.Sc.] Haramaya University.
Dynamic Programming. What is Dynamic Programming  A method for solving complex problems by breaking them down into simpler sub problems. It is applicable.
Adversarial Search Chapter 5 Sections 1 – 4. AI & Expert Systems© Dr. Khalid Kaabneh, AAU Outline Optimal decisions α-β pruning Imperfect, real-time decisions.
ADVERSARIAL SEARCH Chapter 6 Section 1 – 4. OUTLINE Optimal decisions α-β pruning Imperfect, real-time decisions.
DATA STRUCURES II CSC QUIZ 1. What is Data Structure ? 2. Mention the classifications of data structure giving example of each. 3. Briefly explain.
Dense-Region Based Compact Data Cube
Adversarial Search Chapter 5.
Data Mining Cluster Analysis: Advanced Concepts and Algorithms
Efficient Distance Computation between Non-Convex Objects
Spatio-temporal Pattern Queries
Adversarial Search.
Artificial Intelligence
K Nearest Neighbor Classification
Game playing.
Artificial Intelligence
The BIRCH Algorithm Davitkov Miroslav, 2011/3116
INFORMATION RETRIEVAL TECHNIQUES BY DR. ADNAN ABID
Efficient Processing of Top-k Spatial Preference Queries
Presentation transcript:

MCS Thesis By: Sébastien Mathieu Supervisors: Dr. Virendra C. Bhavsar and Dr. Harold Boley Examining Board: Dr. John DeDourek, Dr. Weichang Du, Dr. Donglei Du December 5th, 2005 Match-Making in Bartering Scenarios

2 Agenda Introduction Background Bartering Trees Tree Approximation Ring Bartering Algorithm Computational Results Conclusion

3 Introduction (1/5) Internet as a market place Web portals –Simple portals ( ) –Match-making portals ( ) –Bartering portals ( ) –Advanced portal proposals ( )

4 Introduction (2/5) Bartering The practice of exchanging goods or services without using the medium of money [2]

5 Introduction (3/5) Bartering Seek 2 Offer 1 Seek 1 Offer 2 Agent 1 Agent 2 Similarity 1 Aggregate Similarity Similarity 2

6 Introduction (4/5) Ring Bartering Seek 2 Offer 1 Seek 1 Offer 2 Agent 1 Agent 2 Similarity 1 Offer 3 Seek 3 Agent 3 Similarity 4 >> Similarity 2 Similarity 3 >> Similarity 2

7 Introduction (5/5) Ring Bartering Agent 1 O S Agent 2 O S Agent k O S Agent n-1 O S Agent n O S … … s1s1 s2s2 s k-1 sksk s n-2 s n-1 snsn

8 Background (1/4) Different match-making techniques –IBM Websphere  rules and properties –Agent-Mediated eCommerce System with Decision Analysis Features [15] –Bhavsar/Boley/Yang Tree similarity algorithm [1,11,12,15,16]

9 Background (2/4) Arc labelled weighted trees Labels on Nodes, fanout- unique labels on Arcs Relative importance on Arcs  weights ( Σw i = 1.0)

10 Background (3/4) Similarity Algorithm –Computes the similarity between two arc labeled weighted trees –Top-down traversal / Bottom-up computation –Can handle trees having different arc labels and structures

11 Background (4/4) Different bartering approaches –The Trade Balance Problem [12] –Multi-Agent Learning Improvement [20] –Ring Bartering in P2P [3]

12 Bartering Trees (1/3)

13 Bartering Trees (2/3) Computing the Aggregate Similarity  Arithmetic mean not judicious E.g.: Similarity ( Offer 1, Seek 2 ) = 1.0 Similarity ( Seek 1, Offer 2 ) = 0.0 Aggregate similarity = 0.5 ?

14 Bartering Trees (2/3) Computing the Aggregate Similarity  Arithmetic mean not judicious E.g.: Similarity ( Offer 1, Seek 2 ) = 1.0 Similarity ( Seek 1, Offer 2 ) = 0.0 Aggregate similarity = 0.5 ? Aggregate similarity ~ 0.3 = (Aggregate similarity reasonably less than 0.5)

15 Bartering Trees (3/3) The Aggregation Function with a = -1.5

16 Tree Approximation (1/3) Motivations –To represent our Trees in a multi-dimensional space and use spatial data-structures –To avoid the computation of all similarity values Concepts –Base: Set of Trees formed by all possible unary trees The maximum depth is the level of the base The lower the level, the greater the approximation –Dimension: Number of Trees in the base

17 Tree Approximation (1/3)

18 Tree Approximation (2/3) Notion of Distance

19 Tree Approximation (3/3) Behavior of Distance against Similarity

20 Notion of Risk The risk takes into account: –The number of participants in the trade –The similarities between the corresponding seeks and offers that are involved in the trade

21 Ring Bartering Algorithm (1/6) Our algorithm –Returns the (finite) set of rings starting from a given agent Divided into three main phases: –Repeated selection of the closest Offers (for a given Seek)  first pruning step –Closure of the ring –Testing of the risk  second pruning step

22 Ring Bartering Algorithm (2/6) Overall Algorithm

23 Ring Bartering Algorithm (3/6) Selection of the closest Offers

24 Ring Bartering Algorithm (4/6) Closure of the ring

25 Ring Bartering Algorithm (5/6) Testing of the risk Ideal Agent = Agent having similarity equal to one with both the previous and the following agent in the ring

26 Ring Bartering Algorithm (6/6) Properties of our algorithm –A ring starting from an Agent j of the agent database will be reported by the algorithm, called with Agent j as argument, if and only if it is D max /R max acceptable –Suppose a ring is reported by the algorithm when starting with a given agent. This ring, will be also reported if we start the algorithm with any of the other agents in the ring D max = Maximum Distance R max = Maximum Risk D max /R max acceptable = Risk below R max, all Distances below D max

27 Computational Results (1/4) Influence of the Distance Highest Missing Ring = Similarity of the first missing ring when sorted by aggregate similarity Number of Highest non Missing Rings = Number of Rings before the first missing ring when sorted by aggregate similarity

28 Computational Results (2/4) Influence of the Risk

29 Computational Results (3/4) Computation Time and Size of the Rings

30 Computational Results (4/4) Computation Time without Pruning (ie D max = ∞ and R max = 1)

31 Conclusion (1/2) We moved from the restrictive buyer/seller scenario to bartering and ring bartering scenarios We developed an efficient algorithm using two pruning techniques based on the notions of Distance and Risk

32 Conclusion (2/2) Future Work –Pairing: to create the best combination of rings involving every agent in the virtual market place exactly once –Local Similarity: can improve our tree approximation by adding information without increasing the number of dimensions –Transfer tree approximation technique back to indexing in non-bartering scenario

33 Questions ? Thanks !

34 A zero Distance example with a low similarity for a level 1 base

35 Seller weights: an example Seller 1 emphasizes his/her pool  easier negotiation phase

36 An example of Base  Bases of dimension 5 and 2