11:00 am | [Paper Session 1]
11:00 am | V. Nallur, J. Monteil, T. Sammons, M. Bouroche, and S. Clarke "Increasing Information in MAS Considered Contentious":
Nallur et al. suggest that, under certain conditions, adding information to socio-technical systems involving non-rational behaviour may be detrimental to the overall system performance. To substantiate this claim, they provide multi-agent simulations based on the minority game and self-coordination in vehicular ad hoc networks, analysing the performance based on mean dispersion and fairness metrics. |
11:30 pm | S. Niro, J. López, D. Westhoff, and A. Christ "A Keyless Gossip Algorithm Providing Light-Weight Data Privacy for Prosumer Markets":
Niro et al. introduce a privacy-preserving extension of gossip-based aggregation algorithms for the distributed computation of the average in a network. By adding a pseudo-random perturbation featuring appropriate statistical properties, the degree of privacy as well as the accuracy of the calculated average can be controlled. A fully distributed power market whose participants compute the average consumed and produced energy as indicator for the development of prices serves as case study. |
12:00 pm | J. Kantert, C. Ringwald, G. von Zengen, S. Tomforde, L. Wolf, and C. Müller-Schloer "Enhancing RPL for Robust and Efficient Routing in Challenging Environments":
Kantert et al. discuss an extension of the RPL routing protocol by end-to-end trust relationships in order to discover and isolate malicious nodes in large-scale wireless sensor networks. An adaptive signature mechanism for blocks of trust values is proposed which reduces the distribution overhead compared to signing each value individually. |
12:30 pm | T.Patkos, G.Flouris, P.Papadakos, A.Bikakis, P.Casanovas, J. González-Conejero, R. Varela, A. Hunter, G. Idir, G. Ioannidis, M. Kacprzyk-Murawska, A. Nowak, J. Pitt, D. Plexousakis, A. Rychwalska, and A. Stan "Privacy-by-Norms, Privacy Expectations in Online Interactions":
Patkos et al. sketch an approach based on collective awareness enabling the users of online services to specify privacy policies in the form of data collection and data protection norms, thereby encouraging big data innovations. The presented Privacy-by-Norms approach relies on (1) a set of computational logical rules enforcing data privacy and data protection prescriptions, (2) a visual representation of the norms allowing to decide whether they are fit for purpose, and (3) a collective choice process in which all affected individuals can participate in modifying the rules. |
|
02:00 pm | [Paper Session 2]
02:00 pm | Invited Talk by Pascal Perez (University of Wollongong)
Citizen-driven Flood Mapping in Jakarta |
02:30 pm | G.Valetto, A.Bucchiarone, K.Geihs, M.Buscher, K.Petersen, A. Nowak, A. Rychwalska, J. Pitt, J. Shalhoub, F. Rossi, P. Silingardi, and P. Bernardeschi "All Together Now: Collective Intelligence for Computer-Supported Collective Action":
In their contribution, Valetto et al. outline a new methodological paradigm and software platform for designing sustainable computer-supported collective action in smart communities. This enables, for instance, collaborative energy conservation within smart cities. The presented platform is based on the idea of "Collective Intelligence as a Service" and uses insights from dynamic psychological processes and social practices. |
|
03:30 pm | [Paper Session 3]
03:30 pm | J. Botev, S. Rothkugel, and J. Klein "Socio-Inspired Design Approaches for Self-Adaptive and Self-Organizing Collaborative Systems":
Discussing a series of sociological concepts and their application to socio-technical systems, Botev et al. argue in favour of such concepts as being fundamental to the efficiency, operation, and generally a meaningful design. The reviewed examples range from decentralised collaborative filtering and self-organised resource allocation in peer-to-peer networks to consistency management approaches for distributed collaborative authoring. |
04:00 pm | Invited Talk by Ingo Scholtes (ETH Zürich) Understanding Complex Systems: When Big Data meets Network Science |
|