A O High-Accuracy O , O Low-Cost O Localization O System O for O Wireless O Sensor O Networks O ABSTRACT O The O problem O of O localization B-KEY of O wireless O sensor O nodes O has O long O been O regarded O as O very O difficult O to O solve O , O when O considering O the O realities O of O real O world O environments O . O In O this O paper O , O we O formally O describe O , O design O , O implement O and O evaluate O a O novel O localization B-KEY system O , O called O Spotlight O . O Our O system O uses O the O spatio-temporal O properties O of O well O controlled O events O in O the O network O -LRB- O e.g. O , O light O -RRB- O , O to O obtain O the O locations O of O sensor O nodes O . O We O demonstrate O that O a O high O accuracy B-KEY in O localization B-KEY can O be O achieved O without O the O aid O of O expensive O hardware O on O the O sensor O nodes O , O as O required O by O other O localization B-KEY systems O . O We O evaluate O the O performance B-KEY of O our O system O in O deployments O of O Mica2 O and O XSM O motes O . O Through O performance B-KEY evaluations O of O a O real O system O deployed O outdoors O , O we O obtain O a O 20cm O localization B-KEY error O . O A O sensor B-KEY network I-KEY , O with O any O number O of O nodes O , O deployed O in O a O 2500m2 O area O , O can O be O localized B-KEY in O under O 10 O minutes O , O using O a O device O that O costs O less O than O $ O 1000 O . O To O the O best O of O our O knowledge O , O this O is O the O first O report O of O a O sub-meter O localization B-KEY error O , O obtained O in O an O outdoor O environment O , O without O equipping O the O wireless O sensor O nodes O with O specialized O ranging O hardware O . O Distributed O Norm O Management O in O Regulated O Multi-Agent O Systems O * O ABSTRACT O Norms O are O widely O recognised O as O a O means O of O coordinating B-KEY multi-agent O systems O . O The O distributed O management O of O norms O is O a O challenging O issue O and O we O observe O a O lack O of O truly O distributed O computational O realisations O of O normative O models O . O In O order O to O regulate O the O behaviour O of O autonomous O agents O that O take O part O in O multiple O , O related O activities B-KEY , O we O propose O a O normative O model O , O the O Normative B-KEY Structure I-KEY -LRB- O NS O -RRB- O , O an O artifact O that O is O based O on O the O propagation O of O normative B-KEY positions I-KEY -LRB- O obligations O , O prohibitions B-KEY , O permissions O -RRB- O , O as O consequences O of O agents O ' O actions O . O Within O a O NS O , O conflicts B-KEY may O arise O due O to O the O dynamic O nature O of O the O MAS O and O the O concurrency O of O agents O ' O actions O . O However O , O ensuring O conflict-freedom O of O a O NS O at O design O time O is O computationally O intractable O . O We O show O this O by O formalising O the O notion O of O conflict B-KEY , O providing O a O mapping O of O NSs O into O Coloured O Petri O Nets O and O borrowing O well-known O theoretical O results O from O that O field O . O Since O online O conflict B-KEY resolution O is O required O , O we O present O a O tractable O algorithm B-KEY to O be O employed O distributedly O . O We O then O demonstrate O that O this O algorithm B-KEY is O paramount O for O the O distributed O enactment O of O a O NS O . O Interesting B-KEY Nuggets O and O Their O Impact O on O Definitional O Question O Answering O ABSTRACT O Current O approaches O to O identifying O definitional O sentences O in O the O context O of O Question O Answering O mainly O involve O the O use O of O linguistic O or O syntactic O patterns O to O identify O informative B-KEY nuggets I-KEY . O This O is O insufficient O as O they O do O not O address O the O novelty O factor O that O a O definitional O nugget O must O also O possess O . O This O paper O proposes O to O address O the O deficiency O by O building O a O `` O Human B-KEY Interest I-KEY Model O '' O from O external O knowledge O . O It O is O hoped O that O such O a O model O will O allow O the O computation B-KEY of I-KEY human I-KEY interest I-KEY in O the O sentence O with O respect O to O the O topic O . O We O compare O and O contrast O our O model O with O current O definitional B-KEY question I-KEY answering I-KEY models O to O show O that O interestingness O plays O an O important O factor O in O definitional B-KEY question I-KEY answering I-KEY . O Computing O Good O Nash O Equilibria O in O Graphical B-KEY Games I-KEY * O ABSTRACT O This O paper O addresses O the O problem O of O fair O equilibrium O selection O in O graphical B-KEY games I-KEY . O Our O approach O is O based O on O the O data O structure O called O the O best O response O policy O , O which O was O proposed O by O Kearns O et O al. O -LSB- O 13 O -RSB- O as O a O way O to O represent O all O Nash O equilibria O of O a O graphical B-KEY game I-KEY . O In O -LSB- O 9 O -RSB- O , O it O was O shown O that O the O best O response O policy O has O polynomial O size O as O long O as O the O underlying O graph O is O a O path O . O In O this O paper O , O we O show O that O if O the O underlying O graph O is O a O bounded-degree O tree O and O the O best O response O policy O has O polynomial O size O then O there O is O an O efficient O algorithm O which O constructs O a O Nash B-KEY equilibrium I-KEY that O guarantees O certain O payoffs O to O all O participants O . O Another O attractive O solution O concept O is O a O Nash B-KEY equilibrium I-KEY that O maximizes O the O social B-KEY welfare I-KEY . O We O show O that O , O while O exactly O computing O the O latter O is O infeasible O -LRB- O we O prove O that O solving O this O problem O may O involve O algebraic O numbers O of O an O arbitrarily O high O degree O -RRB- O , O there O exists O an O FPTAS O for O finding O such O an O equilibrium O as O long O as O the O best O response O policy O has O polynomial O size O . O These O two O algorithms O can O be O combined O to O produce O Nash O equilibria O that O satisfy O various O fairness O criteria O . O On O The O Complexity O of O Combinatorial B-KEY Auctions I-KEY : O Structured B-KEY Item I-KEY Graphs I-KEY and O Hypertree B-KEY Decompositions I-KEY ABSTRACT O The O winner O determination O problem O in O combinatorial B-KEY auctions I-KEY is O the O problem O of O determining O the O allocation O of O the O items O among O the O bidders O that O maximizes O the O sum O of O the O accepted B-KEY bid I-KEY prices I-KEY . O While O this O problem O is O in O general O NPhard O , O it O is O known O to O be O feasible O in O polynomial B-KEY time I-KEY on O those O instances O whose O associated O item O graphs O have O bounded O treewidth O -LRB- O called O structured B-KEY item I-KEY graphs I-KEY -RRB- O . O Formally O , O an O item O graph O is O a O graph O whose O nodes O are O in O one-to-one O correspondence O with O items O , O and O edges O are O such O that O for O any O bid O , O the O items O occurring O in O it O induce O a O connected O subgraph O . O Note O that O many O item O graphs O might O be O associated O with O a O given O combinatorial B-KEY auction I-KEY , O depending O on O the O edges O selected O for O guaranteeing O the O connectedness O . O In O fact O , O the O tractability O of O determining O whether O a O structured B-KEY item I-KEY graph I-KEY of O a O fixed B-KEY treewidth I-KEY exists O -LRB- O and O if O so O , O computing O one O -RRB- O was O left O as O a O crucial O open O problem O . O In O this O paper O , O we O solve O this O problem O by O proving O that O the O existence O of O a O structured B-KEY item I-KEY graph I-KEY is O computationally O intractable O , O even O for O treewidth O 3 O . O Motivated O by O this O bad O news O , O we O investigate O different O kinds O of O structural O requirements O that O can O be O used O to O isolate O tractable O classes O of O combinatorial B-KEY auctions I-KEY . O We O show O that O the O notion O of O hypertree B-KEY decomposition I-KEY , O a O recently O introduced O measure O of O hypergraph B-KEY cyclicity O , O turns O out O to O be O most O useful O here O . O Indeed O , O we O show O that O the O winner O determination O problem O is O solvable O in O polynomial B-KEY time I-KEY on O instances O whose O bidder O interactions O can O be O represented O with O -LRB- O dual O -RRB- O hypergraphs B-KEY having O bounded O hypertree O width O . O Even O more O surprisingly O , O we O show O that O the O class O of O tractable O instances O identified O by O means O of O our O approach O properly O contains O the O class O of O instances O having O a O structured B-KEY item I-KEY graph I-KEY . O Generalized B-KEY Trade I-KEY Reduction I-KEY Mechanisms O ABSTRACT O When O designing O a O mechanism O there O are O several O desirable O properties O to O maintain O such O as O incentive O compatibility O -LRB- O IC O -RRB- O , O individual O rationality O -LRB- O IR O -RRB- O , O and O budget B-KEY balance I-KEY -LRB- O BB O -RRB- O . O It O is O well O known O -LSB- O 15 O -RSB- O that O it O is O impossible O for O a O mechanism O to O maximize O social O welfare O whilst O also O being O IR O , O IC O , O and O BB O . O There O have O been O several O attempts O to O circumvent O -LSB- O 15 O -RSB- O by O trading O welfare O for O BB O , O e.g. O , O in O domains O such O as O double-sided O auctions O -LSB- O 13 O -RSB- O , O distributed O markets O -LSB- O 3 O -RSB- O and O supply O chain O problems O -LSB- O 2 O , O 4 O -RSB- O . O In O this O paper O we O provide O a O procedure O called O a O Generalized B-KEY Trade I-KEY Reduction I-KEY -LRB- O GTR O -RRB- O for O single-value O players O , O which O given O an O IR O and O IC O mechanism O , O outputs O a O mechanism O which O is O IR O , O IC O and O BB O with O a O loss O of O welfare O . O We O bound O the O welfare O achieved O by O our O procedure O for O a O wide O range O of O domains O . O In O particular O , O our O results O improve O on O existing O solutions O for O problems O such O as O double O sided O markets O with O homogenous B-KEY goods I-KEY , O distributed O markets O and O several O kinds O of O supply O chains O . O Furthermore O , O our O solution O provides O budget B-KEY balanced I-KEY mechanisms O for O several O open O problems O such O as O combinatorial O double-sided O auctions O and O distributed O markets O with O strategic O transportation O edges O . O Fast O Generation O of O Result O Snippets O in O Web O Search O ABSTRACT O The O presentation O of O query O biased O document O snippets O as O part O of O results O pages O presented O by O search B-KEY engines I-KEY has O become O an O expectation O of O search B-KEY engine I-KEY users O . O In O this O paper O we O explore O the O algorithms O and O data O structures O required O as O part O of O a O search B-KEY engine I-KEY to O allow O efficient O generation O of O query O biased O snippets O . O We O begin O by O proposing O and O analysing O a O document O compression O method O that O reduces O snippet B-KEY generation I-KEY time O by O 58 O % O over O a O baseline O using O the O zlib O compression O library O . O These O experiments O reveal O that O finding O documents O on O secondary O storage O dominates O the O total O cost O of O generating O snippets O , O and O so O caching O documents O in O RAM B-KEY is O essential O for O a O fast O snippet B-KEY generation I-KEY process O . O Using O simulation O , O we O examine O snippet B-KEY generation I-KEY performance B-KEY for O different O size O RAM B-KEY caches O . O Finally O we O propose O and O analyse O document O reordering O and O compaction O , O revealing O a O scheme O that O increases O the O number O of O document B-KEY cache I-KEY hits O with O only O a O marginal O affect O on O snippet O quality O . O This O scheme O effectively O doubles O the O number O of O documents O that O can O fit O in O a O fixed O size O cache O . O Deployment O Issues O of O a O VoIP B-KEY Conferencing O System O in O a O Virtual O Conferencing O Environment O ABSTRACT O Real-time O services O have O been O supported O by O and O large O on O circuitswitched O networks O . O Recent O trends O favour O services O ported O on O packet-switched B-KEY networks I-KEY . O For O audio O conferencing O , O we O need O to O consider O many O issues O -- O scalability O , O quality O of O the O conference O application O , O floor O control O and O load O on O the O clients/servers O -- O to O name O a O few O . O In O this O paper O , O we O describe O an O audio B-KEY service I-KEY framework I-KEY designed O to O provide O a O Virtual B-KEY Conferencing I-KEY Environment I-KEY -LRB- O VCE B-KEY -RRB- O . O The O system O is O designed O to O accommodate O a O large O number O of O end O users O speaking O at O the O same O time O and O spread O across O the O Internet O . O The O framework O is O based O on O Conference B-KEY Servers I-KEY -LSB- O 14 O -RSB- O , O which O facilitate O the O audio O handling O , O while O we O exploit O the O SIP B-KEY capabilities O for O signaling O purposes O . O Client O selection O is O based O on O a O recent O quantifier O called O `` O Loudness B-KEY Number I-KEY '' O that O helps O mimic O a O physical O face-to-face O conference O . O We O deal O with O deployment O issues O of O the O proposed O solution O both O in O terms O of O scalability O and O interactivity O , O while O explaining O the O techniques O we O use O to O reduce O the O traffic O . O We O have O implemented O a O Conference B-KEY Server I-KEY -LRB- O CS O -RRB- O application O on O a O campus-wide O network O at O our O Institute O . O Intra-flow O Loss B-KEY Recovery I-KEY and I-KEY Control I-KEY for O ABSTRACT O `` O Best O effort O '' O packet-switched O networks O , O like O the O Internet O , O do O not O offer O a O reliable O transmission O of O packets O to O applications O with O real-time O constraints O such O voice O . O Thus O , O the O loss O of O packets O impairs O the O application-level O utility O . O For O voice O this O utility O impairment O is O twofold O : O on O one O hand O , O even O short O bursts O of O lost O packets O may O decrease O significantly O the O ability O of O the O receiver O to O conceal O the O packet O loss O and O the O speech O signal O out O is O interrupted O . O On O the O other O hand O , O some O packets O may O be O particular O sensitive O to O loss O as O they O carry O more O important O information O in O terms O of O user O perception O than O other O packets O . O We O first O develop O an O end-to-end B-KEY model I-KEY based O on O loss O lengths O with O which O we O can O describe O the O loss O distribution O within O a O These O packet-level B-KEY metrics I-KEY are O then O linked O to O user-level O objective O speech O quality O metrics O . O Using O this O framework O , O we O find O that O for O low-compressing O sample-based O codecs O -LRB- O PCM O -RRB- O with O loss B-KEY concealment I-KEY isolated O packet O losses O can O be O concealed O well O , O whereas O burst O losses O have O a O higher O perceptual O impact O . O For O high-compressing O frame-based O codecs O -LRB- O G. O 729 O -RRB- O on O one O hand O the O impact O of O loss O is O amplified O through O error O propagation O caused O by O the O decoder O filter O memories O , O though O on O the O other O hand O such O coding O schemes O help O to O perform O loss B-KEY concealment I-KEY by O extrapolation O of O decoder O state O . O Contrary O to O sample-based O codecs O we O show O that O the O concealment O performance O may O `` O break O '' O at O transitions O within O the O speech O signal O however O . O We O then O propose O mechanisms O which O differentiate O between O packets O within O a O voice O data O to O minimize O the O impact O of O packet O loss O . O We O designate O these O methods O as O loss B-KEY recovery I-KEY and I-KEY control I-KEY . O At O the O end-to-end O level O , O identification O of O packets O sensitive O to O loss O -LRB- O sender O -RRB- O as O well O as O loss B-KEY concealment I-KEY -LRB- O receiver O -RRB- O takes O place O . O Hop-by-hop O support O schemes O then O allow O to O -LRB- O statistically O -RRB- O trade O the O loss O of O one O packet O , O which O is O considered O more O important O , O against O another O one O of O the O same O flow O which O is O of O lower O importance O . O As O both O ets O require O the O same O cost O in O terms O of O network O transmission O , O a O gain O in O user O perception O is O obtainable O . O We O show O that O significant O speech O quality O improvements O can O be O achieved O and O additional O data O and O delay O overhead O can O be O avoided O while O still O maintaining O a O network O service O which O is O virtually O identical O to O best O effort O in O the O long O term O . O Estimation O and O Use O of O Uncertainty O in O Pseudo-relevance B-KEY Feedback I-KEY ABSTRACT O Existing O pseudo-relevance B-KEY feedback I-KEY methods O typically O perform O averaging O over O the O top-retrieved O documents O , O but O ignore O an O important O statistical O dimension O : O the O risk O or O variance O associated O with O either O the O individual O document O models O , O or O their O combination O . O Treating O the O baseline O feedback B-KEY method I-KEY as O a O black O box O , O and O the O output O feedback B-KEY model I-KEY as O a O random O variable O , O we O estimate O a O posterior B-KEY distribution I-KEY for O the O feedback B-KEY model I-KEY by O resampling O a O given O query O 's O top-retrieved O documents O , O using O the O posterior O mean O or O mode O as O the O enhanced B-KEY feedback I-KEY model I-KEY . O We O then O perform O model O combination O over O several O enhanced O models O , O each O based O on O a O slightly O modified O query O sampled O from O the O original O query O . O We O find O that O resampling O documents O helps O increase O individual O feedback B-KEY model I-KEY precision O by O removing O noise O terms O , O while O sampling O from O the O query O improves O robustness O -LRB- O worst-case O performance O -RRB- O by O emphasizing O terms O related O to O multiple O query O aspects O . O The O result O is O a O meta-feedback O algorithm O that O is O both O more O robust O and O more O precise O than O the O original O strong O baseline O method O . O Pruning B-KEY Policies O for O Two-Tiered O Inverted B-KEY Index I-KEY with O Correctness B-KEY Guarantee I-KEY ABSTRACT O The O Web B-KEY search I-KEY engines I-KEY maintain O large-scale O inverted B-KEY indexes I-KEY which O are O queried O thousands O of O times O per O second O by O users O eager O for O information O . O In O order O to O cope O with O the O vast O amounts O of O query B-KEY loads I-KEY , O search O engines O prune B-KEY their O index O to O keep O documents O that O are O likely O to O be O returned O as O top O results O , O and O use O this O pruned B-KEY index O to O compute O the O first O batches O of O results O . O While O this O approach O can O improve O performance O by O reducing O the O size O of O the O index O , O if O we O compute O the O top O results O only O from O the O pruned B-KEY index O we O may O notice O a O significant O degradation O in O the O result O quality O : O if O a O document O should O be O in O the O top O results O but O was O not O included O in O the O pruned O index O , O it O will O be O placed O behind O the O results O computed O from O the O pruned O index O . O Given O the O fierce O competition O in O the O online B-KEY search I-KEY market I-KEY , O this O phenomenon O is O clearly O undesirable O . O In O this O paper O , O we O study O how O we O can O avoid O any O degradation B-KEY of I-KEY result I-KEY quality I-KEY due O to O the O pruning-based O performance O optimization O , O while O still O realizing O most O of O its O benefit O . O Our O contribution O is O a O number O of O modifications O in O the O pruning B-KEY techniques O for O creating O the O pruned O index O and O a O new O result O computation O algorithm O that O guarantees O that O the O top-matching O pages O are O always O placed O at O the O top O search O results O , O even O though O we O are O computing O the O first O batch O from O the O pruned O index O most O of O the O time O . O We O also O show O how O to O determine O the O optimal B-KEY size I-KEY of O a O pruned B-KEY index O and O we O experimentally O evaluate O our O algorithms O on O a O collection O of O 130 O million O Web O pages O . O Budget B-KEY Optimization I-KEY in O Search-Based O Advertising O Auctions O ABSTRACT O Internet B-KEY search O companies O sell O advertisement B-KEY slots O based O on O users O ' O search O queries O via O an O auction B-KEY . O While O there O has O been O previous O work O on O the O auction B-KEY process O and O its O game-theoretic O aspects O , O most O of O it O focuses O on O the O Internet B-KEY company O . O In O this O work O , O we O focus O on O the O advertisers B-KEY , O who O must O solve O a O complex O optimization B-KEY problem O to O decide O how O to O place O bids B-KEY on O keywords B-KEY to O maximize O their O return O -LRB- O the O number O of O user O clicks O on O their O ads O -RRB- O for O a O given O budget O . O We O model O the O entire O process O and O study O this O budget B-KEY optimization I-KEY problem O . O While O most O variants O are O NP-hard O , O we O show O , O perhaps O surprisingly O , O that O simply O randomizing O between O two O uniform O strategies O that O bid B-KEY equally O on O all O the O keywords B-KEY works O well O . O More O precisely O , O this O strategy O gets O at O least O a O 1 O − O 1/e O fraction O of O the O maximum O clicks O possible O . O As O our O preliminary O experiments O show O , O such O uniform O strategies O are O likely O to O be O practical O . O We O also O present O inapproximability O results O , O and O optimal B-KEY algorithms O for O variants O of O the O budget B-KEY optimization I-KEY problem O . O Term O Feedback O for O Information B-KEY Retrieval I-KEY with O Language B-KEY Models I-KEY ABSTRACT O I O n O t O hi O s O paper O w O e O s O t O udy O t O er O m O - O based O f O eedback O f O or O i O nf O or O mat O i O on O r O etrieval O in O the O language B-KEY modeling I-KEY approach O . O With O term O feedback O a O user O directly O judges O the O relevance O of O individual O terms O without O interaction O with O feedback O documents O , O taking O full O control O of O the O query B-KEY expansion I-KEY process O . O We O propose O a O cluster-based O method O for O selecting O terms O to O present O to O the O user O for O judgment O , O as O well O as O effective O algorithms O for O constructing O refined O query O language B-KEY models I-KEY from O user O term O feedback O . O Our O algorithms O are O shown O to O bring O significant O improvement O in O retrieval O accuracy O over O a O non-feedback O baseline O , O and O achieve O comparable O performance O to O relevance O feedback O . O They O are O helpful O even O when O there O are O no O relevant O documents O in O the O top O . O Towards O Self-organising B-KEY Agent-based O Resource O Allocation O in O a O Multi-Server O Environment O ABSTRACT O Distributed O applications O require O distributed O techniques O for O efficient O resource B-KEY allocation I-KEY . O These O techniques O need O to O take O into O account O the O heterogeneity O and O potential O unreliability O of O resources O and O resource O consumers O in O a O distributed O environments O . O In O this O paper O we O propose O a O distributed B-KEY algorithm I-KEY that O solves O the O resource B-KEY allocation I-KEY problem O in O distributed O multiagent O systems O . O Our O solution O is O based O on O the O self-organisation B-KEY of O agents B-KEY , O which O does O not O require O any O facilitator O or O management O layer O . O The O resource B-KEY allocation I-KEY in O the O system O is O a O purely O emergent O effect O . O We O present O results O of O the O proposed O resource B-KEY allocation I-KEY mechanism O in O the O simulated O static O and O dynamic O multi-server O environment O . O Realistic O Cognitive O Load O Modeling O for O Enhancing O Shared O Mental O Models O in O Human-Agent O Collaboration B-KEY ABSTRACT O Human O team O members O often O develop O shared O expectations B-KEY to O predict O each O other O 's O needs O and O coordinate O their O behaviors O . O In O this O paper O the O concept O `` O Shared B-KEY Belief I-KEY Map I-KEY '' O is O proposed O as O a O basis O for O developing O realistic O shared O expectations B-KEY among O a O team O of O Human-Agent-Pairs O -LRB- O HAPs O -RRB- O . O The O establishment O of O shared B-KEY belief I-KEY maps I-KEY relies O on O inter-agent O information O sharing O , O the O effectiveness O of O which O highly O depends O on O agents O ' O processing O loads O and O the O instantaneous O cognitive O loads O of O their O human O partners O . O We O investigate O HMM-based O cognitive O load O models O to O facilitate O team O members O to O `` O share O the O right O information O with O the O right O party O at O the O right O time O '' O . O The O shared B-KEY belief I-KEY map I-KEY concept O and O the O cognitive/processing O load O models O have O been O implemented O in O a O cognitive O agent O architecture O -- O SMMall O . O A O series O of O experiments O were O conducted O to O evaluate O the O concept O , O the O models O , O and O their O impacts O on O the O evolving O of O shared O mental O models O of O HAP O teams O . O Service B-KEY Interface I-KEY : O A O New O Abstraction O for O Implementing O and O Composing O Protocols O * O ABSTRACT O In O this O paper O we O compare O two O approaches O to O the O design O of O protocol B-KEY frameworks I-KEY -- O tools O for O implementing O modular B-KEY network B-KEY protocols O . O The O most O common O approach O uses O events O as O the O main O abstraction O for O a O local O interaction O between O protocol O modules B-KEY . O We O argue O that O an O alternative O approach O , O that O is O based O on O service O abstraction O , O is O more O suitable O for O expressing O modular B-KEY protocols O . O It O also O facilitates O advanced O features O in O the O design O of O protocols O , O such O as O dynamic O update O of O distributed O protocols O . O We O then O describe O an O experimental O implementation O of O a O service-based O protocol B-KEY framework I-KEY in O Java O . O A O Formal O Road O from O Institutional B-KEY Norms O to O Organizational O Structures O ABSTRACT O Up O to O now O , O the O way O institutions B-KEY and O organizations O have O been O used O in O the O development O of O open O systems O has O not O often O gone O further O than O a O useful O heuristics O . O In O order O to O develop O systems O actually O implementing O institutions B-KEY and O organizations O , O formal B-KEY methods I-KEY should O take O the O place O of O heuristic O ones O . O The O paper O presents O a O formal O semantics O for O the O notion O of O institution B-KEY and O its O components O -LRB- O abstract O and O concrete O norms B-KEY , O empowerment O of O agents O , O roles B-KEY -RRB- O and O defines O a O formal O relation O between O institutions B-KEY and O organizational B-KEY structures I-KEY . O As O a O result O , O it O is O shown O how O institutional B-KEY norms O can O be O refined O to O constructs O -- O organizational O structures O -- O which O are O closer O to O an O implemented O system O . O It O is O also O shown O how O such O a O refinement O process O can O be O fully O formalized O and O it O is O therefore O amenable O to O rigorous O verification O . O Approximately-Strategyproof O and O Tractable O Multi-Unit O Auctions O ABSTRACT O We O present O an O approximately-efficient O and O approximatelystrategyproof O auction O mechanism O for O a O single-good O multi-unit O allocation O problem O . O The O bidding B-KEY language I-KEY in O our O auctions O allows O marginal-decreasing O piecewise O constant O curves O . O First O , O we O develop O a O fully O polynomial-time O approximation O scheme O for O the O multi-unit O allocation O problem O , O which O computes O a O -LRB- O 1 O + O e O -RRB- O approximation O in O worst-case O time O T O = O O O -LRB- O n3/e O -RRB- O , O given O n O bids O each O with O a O constant O number O of O pieces O . O Second O , O we O embed O this O approximation O scheme O within O a O Vickrey-Clarke-Groves O -LRB- O VCG O -RRB- O mechanism O and O compute O payments O to O n O agents O for O an O asymptotic O cost O of O O O -LRB- O T O log O n O -RRB- O . O The O maximal O possible O gain O from O manipulation O to O a O bidder O in O the O combined O scheme O is O bounded O by O e O / O -LRB- O 1 O + O e O -RRB- O V O , O where O V O is O the O total O surplus O in O the O efficient O outcome O . O BuddyCache B-KEY : O High-Performance O Object O Storage O for O Collaborative B-KEY Strong-Consistency I-KEY Applications I-KEY in O a O WAN O * O ABSTRACT O Collaborative O applications O provide O a O shared O work O environment O for O groups O of O networked O clients O collaborating O on O a O common O task O . O They O require O strong O consistency O for O shared O persistent O data O and O efficient O access O to O fine-grained O objects O . O These O properties O are O difficult O to O provide O in O wide-area B-KEY networks I-KEY because O of O high O network O latency O . O BuddyCache B-KEY is O a O new O transactional B-KEY caching O approach O that O improves O the O latency O of O access O to O shared O persistent O objects O for O collaborative B-KEY strong-consistency I-KEY applications I-KEY in O high-latency O network O environments O . O The O challenge O is O to O improve O performance O while O providing O the O correctness O and O availability O properties O of O a O transactional B-KEY caching O protocol O in O the O presence O of O node O failures O and O slow O peers O . O We O have O implemented O a O BuddyCache B-KEY prototype O and O evaluated O its O performance O . O Analytical O results O , O confirmed O by O measurements O of O the O BuddyCache B-KEY prototype O using O the O multiuser O 007 O benchmark O indicate O that O for O typical O Internet O latencies O , O e.g. O ranging O from O 40 O to O 80 O milliseconds O round O trip O time O to O the O storage O server O , O peers O using O BuddyCache B-KEY can O reduce O by O up O to O 50 O % O the O latency O of O access O to O shared O objects O compared O to O accessing O the O remote O servers O directly O . O Addressing O Strategic B-KEY Behavior I-KEY in O a O Deployed O Microeconomic O Resource B-KEY Allocator I-KEY ABSTRACT O While O market-based O systems O have O long O been O proposed O as O solutions O for O distributed O resource B-KEY allocation I-KEY , O few O have O been O deployed O for O production O use O in O real O computer O systems O . O Towards O this O end O , O we O present O our O initial O experience O using O Mirage O , O a O microeconomic O resource B-KEY allocation I-KEY system O based O on O a O repeated O combinatorial O auction O . O Mirage O allocates O time O on O a O heavily-used O 148-node O wireless O sensor O network O testbed O . O In O particular O , O we O focus O on O observed O strategic O user O behavior O over O a O four-month O period O in O which O 312,148 O node O hours O were O allocated O across O 11 O research O projects O . O Based O on O these O results O , O we O present O a O set O of O key O challenges O for O market-based O resource B-KEY allocation I-KEY systems O based O on O repeated O combinatorial O auctions O . O Finally O , O we O propose O refinements O to O the O system O 's O current O auction O scheme O to O mitigate O the O strategies O observed O to O date O and O also O comment O on O some O initial O steps O toward O building O an O approximately O strategyproof O repeated O combinatorial B-KEY auction I-KEY . O Betting B-KEY Boolean-Style O : O A O Framework O for O Trading O in O Securities O Based O on O Logical O Formulas O ABSTRACT O We O develop O a O framework O for O trading O in O compound B-KEY securities I-KEY : O financial O instruments O that O pay O off O contingent O on O the O outcomes O of O arbitrary O statements O in O propositional O logic O . O Buying O or O selling O securities O -- O which O can O be O thought O of O as O betting B-KEY on O or O against O a O particular O future O outcome O -- O allows O agents O both O to O hedge B-KEY risk O and O to O profit O -LRB- O in O expectation O -RRB- O on O subjective O predictions O . O A O compound B-KEY securities I-KEY market O allows O agents O to O place O bets O on O arbitrary O boolean O combinations O of O events O , O enabling O them O to O more O closely O achieve O their O optimal O risk O exposure O , O and O enabling O the O market O as O a O whole O to O more O closely O achieve O the O social O optimum O . O The O tradeoff O for O allowing O such O expressivity O is O in O the O complexity O of O the O agents O ' O and O auctioneer O 's O optimization O problems O . O We O develop O and O motivate O the O concept O of O a O compound B-KEY securities I-KEY market O , O presenting O the O framework O through O a O series O of O formal O definitions O and O examples O . O We O then O analyze O in O detail O the O auctioneer O 's O matching O problem O . O We O show O that O , O with O n O events O , O the O matching O problem O is O co-NP-complete O in O the O divisible O case O and O Σp2-complete O in O the O indivisible O case O . O We O show O that O the O latter O hardness O result O holds O even O under O severe O language O restrictions O on O bids O . O With O log O n O events O , O the O problem O is O polynomial O in O the O divisible O case O and O NP-complete O in O the O indivisible O case O . O We O briefly O discuss O matching O algorithms O and O tractable O special O cases O . O Robust O Test B-KEY Collections I-KEY for O Retrieval O Evaluation B-KEY ABSTRACT O Low-cost O methods O for O acquiring O relevance O judgments O can O be O a O boon O to O researchers O who O need O to O evaluate B-KEY new O retrieval O tasks O or O topics O but O do O not O have O the O resources O to O make O thousands O of O judgments O . O While O these O judgments O are O very O useful O for O a O one-time O evaluation B-KEY , O it O is O not O clear O that O they O can O be O trusted O when O re-used O to O evaluate B-KEY new O systems O . O In O this O work O , O we O formally O define O what O it O means O for O judgments O to O be O reusable B-KEY : O the O confidence O in O an O evaluation B-KEY of O new O systems O can O be O accurately O assessed O from O an O existing O set O of O relevance O judgments O . O We O then O present O a O method O for O augmenting O a O set O of O relevance O judgments O with O relevance O estimates O that O require O no O additional O assessor O effort O . O Using O this O method O practically O guarantees O reusability B-KEY : O with O as O few O as O five O judgments O per O topic O taken O from O only O two O systems O , O we O can O reliably O evaluate B-KEY a O larger O set O of O ten O systems O . O Even O the O smallest O sets O of O judgments O can O be O useful O for O evaluation B-KEY of O new O systems O . O Investigating O the O Querying B-KEY and O Browsing O Behavior O of O Advanced O Search B-KEY Engine I-KEY Users O ABSTRACT O One O way O to O help O all O users O of O commercial O Web O search B-KEY engines I-KEY be O more O successful O in O their O searches O is O to O better O understand O what O those O users O with O greater O search O expertise O are O doing O , O and O use O this O knowledge O to O benefit O everyone O . O In O this O paper O we O study O the O interaction O logs O of O advanced O search B-KEY engine I-KEY users O -LRB- O and O those O not O so O advanced O -RRB- O to O better O understand O how O these O user O groups O search O . O The O results O show O that O there O are O marked O differences O in O the O queries B-KEY , O result O clicks O , O post-query O browsing O , O and O search O success O of O users O we O classify O as O advanced O -LRB- O based O on O their O use O of O query O operators O -RRB- O , O relative O to O those O classified O as O non-advanced O . O Our O findings O have O implications O for O how O advanced O users O should O be O supported O during O their O searches O , O and O how O their O interactions O could O be O used O to O help O searchers O of O all O experience O levels O find O more O relevant B-KEY information O and O learn O improved O searching O strategies O . O Dynamic B-KEY Semantics I-KEY for O Agent B-KEY Communication I-KEY Languages I-KEY ABSTRACT O This O paper O proposes O dynamic B-KEY semantics I-KEY for O agent B-KEY communication I-KEY languages I-KEY -LRB- O ACLs O -RRB- O as O a O method O for O tackling O some O of O the O fundamental O problems O associated O with O agent O communication O in O open O multiagent O systems O . O Based O on O the O idea O of O providing O alternative O semantic O `` O variants O '' O for O speech O acts O and O transition O rules O between O them O that O are O contingent O on O previous O agent O behaviour O , O our O framework O provides O an O improved O notion O of O grounding O semantics O in O ongoing O interaction O , O a O simple O mechanism O for O distinguishing O between O compliant O and O expected O behaviour O , O and O a O way O to O specify O sanction O and O reward O mechanisms O as O part O of O the O ACL O itself O . O We O extend O a O common O framework O for O commitment-based O ACL O semantics O to O obtain O these O properties O , O discuss O desiderata O for O the O design O of O concrete O dynamic B-KEY semantics I-KEY together O with O examples O , O and O analyse O their O properties O . O Runtime O Metrics B-KEY Collection I-KEY for O Middleware O Supported O Adaptation B-KEY of O Mobile O Applications O ABSTRACT O This O paper O proposes O , O implements O , O and O evaluates O in O terms O of O worst O case O performance O , O an O online O metrics B-KEY collection I-KEY strategy O to O facilitate O application O adaptation B-KEY via O object O mobility O using O a O mobile B-KEY object I-KEY framework O and O supporting O middleware O . O The O solution O is O based O upon O an O abstract O representation O of O the O mobile B-KEY object I-KEY system O , O which O holds O containers O aggregating O metrics O for O each O specific O component O including O host O managers O , O runtimes O and O mobile B-KEY objects I-KEY . O A O key O feature O of O the O solution O is O the O specification O of O multiple O configurable O criteria O to O control O the O measurement B-KEY and O propagation O of O metrics O through O the O system O . O The O MobJeX B-KEY platform O was O used O as O the O basis O for O implementation O and O testing O with O a O number O of O laboratory O tests O conducted O to O measure B-KEY scalability O , O efficiency O and O the O application O of O simple O measurement B-KEY and O propagation O criteria O to O reduce O collection O overhead O . O Understanding O User O Behavior O in O Online O Feedback O Reporting O ABSTRACT O Online B-KEY reviews I-KEY have O become O increasingly O popular O as O a O way O to O judge O the O quality O of O various O products O and O services O . O Previous O work O has O demonstrated O that O contradictory O reporting O and O underlying O user O biases O make O judging O the O true O worth O of O a O service O difficult O . O In O this O paper O , O we O investigate O underlying O factors O that O influence O user O behavior O when O reporting O feedback O . O We O look O at O two O sources O of O information O besides O numerical O ratings B-KEY : O linguistic O evidence O from O the O textual O comment O accompanying O a O review O , O and O patterns O in O the O time O sequence O of O reports O . O We O first O show O that O groups O of O users O who O amply O discuss O a O certain O feature O are O more O likely O to O agree O on O a O common O rating B-KEY for O that O feature O . O Second O , O we O show O that O a O user O 's O rating B-KEY partly O reflects O the O difference O between O true O quality O and O prior O expectation O of O quality O as O inferred O from O previous O reviews O . O Both O give O us O a O less O noisy O way O to O produce O rating B-KEY estimates O and O reveal O the O reasons O behind O user O bias O . O Our O hypotheses O were O validated O by O statistical O evidence O from O hotel O reviews O on O the O TripAdvisor O website O . O Temporal O Linear B-KEY Logic I-KEY as O a O Basis O for O Flexible O Agent O Interactions O ABSTRACT O Interactions O between O agents O in O an O open O system O such O as O the O Internet O require O a O significant O degree O of O flexibility O . O A O crucial O aspect O of O the O development O of O such O methods O is O the O notion O of O commitments O , O which O provides O a O mechanism O for O coordinating O interactive B-KEY behaviors I-KEY among O agents O . O In O this O paper O , O we O investigate O an O approach O to O model O commitments O with O tight O integration O with O protocol O actions O . O This O means O that O there O is O no O need O to O have O an O explicit O mapping O from O protocols O actions O to O operations O on O commitments O and O an O external O mechanism O to O process O and O enforce O commitments O . O We O show O how O agents O can O reason O about O commitments O and O protocol O actions O to O achieve O the O end O results O of O protocols O using O a O reasoning O system O based O on O temporal O linear B-KEY logic I-KEY , O which O incorporates O both O temporal O and O resource-sensitive O reasoning O . O We O also O discuss O the O application O of O this O framework O to O scenarios O such O as O online O commerce O . O The O Role O of O Compatibility O in O the O Diffusion O of O Technologies O Through O Social O Networks O ABSTRACT O In O many O settings O , O competing O technologies O -- O for O example O , O operating O systems O , O instant O messenger O systems O , O or O document O formats O -- O can O be O seen O adopting O a O limited O amount O of O compatibility O with O one O another O ; O in O other O words O , O the O difficulty O in O using O multiple O technologies O is O balanced O somewhere O between O the O two O extremes O of O impossibility O and O effortless O interoperability B-KEY . O There O are O a O range O of O reasons O why O this O phenomenon O occurs O , O many O of O which O -- O based O on O legal O , O social O , O or O business O considerations O -- O seem O to O defy O concise O mathematical O models O . O Despite O this O , O we O show O that O the O advantages O of O limited B-KEY compatibility I-KEY can O arise O in O a O very O simple O model O of O diffusion O in O social O networks O , O thus O offering O a O basic O explanation O for O this O phenomenon O in O purely O strategic O terms O . O Our O approach O builds O on O work O on O the O diffusion B-KEY of I-KEY innovations I-KEY in O the O economics O literature O , O which O seeks O to O model O how O a O new O technology O A O might O spread O through O a O social O network O of O individuals O who O are O currently O users O of O technology O B O . O We O consider O several O ways O of O capturing O the O compatibility O of O A O and O B O , O focusing O primarily O on O a O model O in O which O users O can O choose O to O adopt O A O , O adopt O B O , O or O -- O at O an O extra O cost O -- O adopt O both O A O and O B O . O We O characterize B-KEY how O the O ability O of O A O to O spread O depends O on O both O its O quality O relative O to O B O , O and O also O this O additional O cost O of O adopting O both O , O and O find O some O surprising O non-monotonicity O properties O in O the O dependence O on O these O parameters O : O in O some O cases O , O for O one O technology O to O survive O the O introduction O of O another O , O the O cost O of O adopting O both O technologies O must O be O balanced O within O a O narrow O , O intermediate O range O . O We O also O extend O the O framework O to O the O case O of O multiple O technologies O , O where O we O find O that O a O simple O This O work O has O been O supported O in O part O by O NSF O grants O CCF0325453 O , O IIS-0329064 O , O CNS-0403340 O , O and O BCS-0537606 O , O a O Google O Research O Grant O , O a O Yahoo! O Research O Alliance O Grant O , O the O Institute O for O the O Social O Sciences O at O Cornell O , O and O the O John O D. O and O Catherine O T. O MacArthur O Foundation O . O model O captures O the O phenomenon O of O two O firms O adopting O a O limited O `` O strategic O alliance O '' O to O defend O against O a O new O , O third O technology O . O Sensor O Deployment B-KEY Strategy O for O Target B-KEY Detection I-KEY ABSTRACT O In O order O to O monitor O a O region O for O traffic O traversal O , O sensors O can O be O deployed B-KEY to O perform O collaborative B-KEY target I-KEY detection I-KEY . O Such O a O sensor B-KEY network I-KEY achieves O a O certain O level O of O detection O performance O with O an O associated O cost O of O deployment B-KEY . O This O paper O addresses O this O problem O by O proposing O path B-KEY exposure I-KEY as O a O measure O of O the O goodness O of O a O deployment O and O presents O an O approach O for O sequential O deployment O in O steps O . O It O illustrates O that O the O cost O of O deployment B-KEY can O be O minimized O to O achieve O the O desired O detection O performance O by O appropriately O choosing O the O number B-KEY of I-KEY sensors I-KEY deployed B-KEY in O each O step O . O Live O Data B-KEY Center I-KEY Migration I-KEY across O WANs B-KEY : O A O Robust O Cooperative O Context O Aware O Approach O ABSTRACT O A O significant O concern O for O Internet-based O service O providers O is O the O continued O operation O and O availability O of O services O in O the O face O of O outages O , O whether O planned O or O unplanned O . O In O this O paper O we O advocate O a O cooperative O , O context-aware O approach O to O data B-KEY center I-KEY migration I-KEY across O WANs B-KEY to O deal O with O outages O in O a O non-disruptive O manner O . O We O specifically O seek O to O achieve O high O availability O of O data O center O services O in O the O face O of O both O planned O and O unanticipated O outages O of O data O center O facilities O . O We O make O use O of O server O virtualization O technologies O to O enable O the O replication O and O migration O of O server O functions O . O We O propose O new O network O functions O to O enable O server O migration O and O replication O across O wide O area O networks O -LRB- O e.g. O , O the O Internet O -RRB- O , O and O finally O show O the O utility O of O intelligent O and O dynamic O storage B-KEY replication O technology O to O ensure O applications O have O access O to O data O in O the O face O of O outages O with O very O tight O recovery O point O objectives O . O Real-Time O Agent O Characterization O and O Prediction B-KEY ABSTRACT O Reasoning O about O agents O that O we O observe O in O the O world O is O challenging O . O Our O available O information O is O often O limited O to O observations O of O the O agent O 's O external B-KEY behavior I-KEY in O the O past O and O present O . O To O understand O these O actions O , O we O need O to O deduce O the O agent O 's O internal B-KEY state I-KEY , O which O includes O not O only O rational O elements O -LRB- O such O as O intentions O and O plans O -RRB- O , O but O also O emotive B-KEY ones O -LRB- O such O as O fear O -RRB- O . O In O addition O , O we O often O want O to O predict B-KEY the O agent O 's O future O actions O , O which O are O constrained O not O only O by O these O inward O characteristics O , O but O also O by O the O dynamics B-KEY of O the O agent O 's O interaction O with O its O environment O . O BEE O -LRB- O Behavior O Evolution B-KEY and O Extrapolation O -RRB- O uses O a O faster-than-real-time O agentbased O model O of O the O environment O to O characterize O agents O ' O internal O state O by O evolution O against O observed O behavior O , O and O then O predict O their O future O behavior O , O taking O into O account O the O dynamics O of O their O interaction O with O the O environment O . O A O Support O Vector O Method O for O Optimizing O Average O Precision O ABSTRACT O Machine B-KEY learning I-KEY is O commonly O used O to O improve O ranked B-KEY retrieval O systems O . O Due O to O computational O difficulties O , O few O learning B-KEY techniques I-KEY have O been O developed O to O directly O optimize O for O mean B-KEY average I-KEY precision I-KEY -LRB- O MAP O -RRB- O , O despite O its O widespread O use O in O evaluating O such O systems O . O Existing O approaches O optimizing O MAP O either O do O not O find O a O globally O optimal B-KEY solution I-KEY , O or O are O computationally O expensive O . O In O contrast O , O we O present O a O general O SVM O learning O algorithm O that O efficiently O finds O a O globally O optimal B-KEY solution I-KEY to O a O straightforward O relaxation B-KEY of I-KEY MAP I-KEY . O We O evaluate O our O approach O using O the O TREC O 9 O and O TREC O 10 O Web O Track O corpora O -LRB- O WT10g O -RRB- O , O comparing O against O SVMs O optimized O for O accuracy O and O ROCArea O . O In O most O cases O we O show O our O method O to O produce O statistically O significant O improvements O in O MAP O scores O . O Encryption-Enforced O Access O Control O in O Dynamic O Multi-Domain B-KEY Publish/Subscribe O Networks O ABSTRACT O Publish/subscribe O systems O provide O an O efficient O , O event-based O , O wide-area O distributed O communications O infrastructure O . O Large O scale O publish/subscribe O systems O are O likely O to O employ O components O of O the O event O transport O network O owned O by O cooperating O , O but O independent O organisations O . O As O the O number O of O participants O in O the O network O increases O , O security O becomes O an O increasing O concern O . O This O paper O extends O previous O work O to O present O and O evaluate O a O secure O multi-domain B-KEY publish/subscribe O infrastructure O that O supports O and O enforces O fine-grained O access O control O over O the O individual O attributes O of O event O types O . O Key O refresh O allows O us O to O ensure O forward O and O backward O security O when O event O brokers O join O and O leave O the O network O . O We O demonstrate O that O the O time O and O space O overheads O can O be O minimised O by O careful O consideration O of O encryption B-KEY techniques O , O and O by O the O use O of O caching O to O decrease O unnecessary O decryptions O . O We O show O that O our O approach O has O a O smaller O overall B-KEY communication I-KEY overhead I-KEY than O existing O approaches O for O achieving O the O same O degree O of O control O over O security O in O publish/subscribe O networks O . O A O Framework O for O Architecting O Peer-to-Peer O Receiver-driven O Overlays O ABSTRACT O This O paper O presents O a O simple O and O scalable O framework O for O architecting O peer-to-peer O overlays O called O Peer-to-peer O Receiverdriven O Overlay O -LRB- O or O PRO B-KEY -RRB- O . O PRO B-KEY is O designed B-KEY for O non-interactive O streaming O applications O and O its O primary O design B-KEY goal O is O to O maximize O delivered O bandwidth O -LRB- O and O thus O delivered O quality O -RRB- O to O peers O with O heterogeneous O and O asymmetric O bandwidth O . O To O achieve O this O goal O , O PRO B-KEY adopts O a O receiver-driven O approach O where O each O receiver O -LRB- O or O participating O peer O -RRB- O -LRB- O i O -RRB- O independently O discovers O other O peers O in O the O overlay O through O gossiping O , O and O -LRB- O ii O -RRB- O selfishly O determines O the O best O subset O of O parent O peers O through O which O to O connect O to O the O overlay O to O maximize O its O own O delivered O bandwidth O . O Participating O peers O form O an O unstructured O overlay O which O is O inherently O robust O to O high O churn O rate O . O Furthermore O , O each O receiver O leverages O congestion B-KEY controlled I-KEY bandwidth O from O its O parents O as O implicit O signal O to O detect O and O react O to O long-term O changes O in O network O or O overlay O condition O without O any O explicit O coordination O with O other O participating O peers O . O Independent O parent O selection O by O individual O peers O dynamically O converge O to O an O efficient O overlay O structure O . O A O Study O of O Poisson O Query B-KEY Generation I-KEY Model O for O Information O Retrieval O ABSTRACT O Many O variants O of O language B-KEY models I-KEY have O been O proposed O for O information O retrieval O . O Most O existing O models O are O based O on O multinomial B-KEY distribution I-KEY and O would O score O documents O based O on O query O likelihood O computed O based O on O a O query B-KEY generation I-KEY probabilistic O model O . O In O this O paper O , O we O propose O and O study O a O new O family O of O query B-KEY generation I-KEY models O based O on O Poisson B-KEY distribution I-KEY . O We O show O that O while O in O their O simplest O forms O , O the O new O family O of O models O and O the O existing O multinomial O models O are O equivalent O , O they O behave O differently O for O many O smoothing O methods O . O We O show O that O the O Poisson O model O has O several O advantages O over O the O multinomial O model O , O including O naturally O accommodating O per-term O smoothing O and O allowing O for O more O accurate O background O modeling O . O We O present O several O variants O of O the O new O model O corresponding O to O different O smoothing O methods O , O and O evaluate O them O on O four O representative O TREC O test O collections O . O The O results O show O that O while O their O basic O models O perform O comparably O , O the O Poisson O model O can O outperform O multinomial O model O with O per-term O smoothing O . O The O performance O can O be O further O improved O with O two-stage O smoothing O . O Personalized O Query B-KEY Expansion I-KEY for O the O Web O ABSTRACT O The O inherent O ambiguity O of O short B-KEY keyword I-KEY queries I-KEY demands O for O enhanced O methods O for O Web B-KEY retrieval I-KEY . O In O this O paper O we O propose O to O improve O such O Web B-KEY queries I-KEY by O expanding O them O with O terms O collected O from O each O user O 's O Personal B-KEY Information I-KEY Repository I-KEY , O thus O implicitly O personalizing O the O search B-KEY output I-KEY . O We O introduce O five O broad O techniques O for O generating O the O additional B-KEY query I-KEY keywords I-KEY by O analyzing O user O data O at O increasing O granularity B-KEY levels I-KEY , O ranging O from O term B-KEY and I-KEY compound I-KEY level I-KEY analysis I-KEY up O to O global B-KEY co-occurrence I-KEY statistics I-KEY , O as O well O as O to O using O external O thesauri O . O Our O extensive B-KEY empirical I-KEY analysis I-KEY under O four O different O scenarios O shows O some O of O these O approaches O to O perform O very O well O , O especially O on O ambiguous B-KEY queries I-KEY , O producing O a O very O strong O increase O in O the O quality B-KEY of O the O output B-KEY rankings I-KEY . O Subsequently O , O we O move O this O personalized B-KEY search I-KEY framework I-KEY one O step O further O and O propose O to O make O the O expansion B-KEY process I-KEY adaptive O to O various B-KEY features I-KEY of I-KEY each I-KEY query I-KEY . O A O separate O set O of O experiments O indicates O the O adaptive B-KEY algorithms I-KEY to O bring O an O additional O statistically O significant B-KEY improvement I-KEY over O the O best O static B-KEY expansion I-KEY approach I-KEY . O Efficient O Bayesian O Hierarchical O User O Modeling B-KEY for O Recommendation B-KEY Systems I-KEY ABSTRACT O A O content-based O personalized B-KEY recommendation B-KEY system I-KEY learns O user O specific O profiles O from O user O feedback O so O that O it O can O deliver O information O tailored O to O each O individual O user O 's O interest O . O A O system O serving O millions O of O users O can O learn O a O better O user O profile O for O a O new O user O , O or O a O user O with O little O feedback O , O by O borrowing O information O from O other O users O through O the O use O of O a O Bayesian B-KEY hierarchical I-KEY model I-KEY . O Learning O the O model B-KEY parameters B-KEY to O optimize O the O joint O data O likelihood O from O millions O of O users O is O very O computationally O expensive O . O The O commonly O used O EM B-KEY algorithm I-KEY converges O very O slowly O due O to O the O sparseness O of O the O data O in O IR B-KEY applications O . O This O paper O proposes O a O new O fast O learning B-KEY technique I-KEY to O learn O a O large O number O of O individual O user O profiles O . O The O efficacy O and O efficiency O of O the O proposed O algorithm O are O justified O by O theory O and O demonstrated O on O actual O user O data O from O Netflix O and O MovieLens O . O Sharing O Experiences O to O Learn O User O Characteristics O in O Dynamic O Environments O with O Sparse O Data O ABSTRACT O This O paper O investigates O the O problem O of O estimating O the O value O of O probabilistic B-KEY parameters I-KEY needed O for O decision B-KEY making I-KEY in O environments O in O which O an O agent B-KEY , O operating O within O a O multi-agent O system O , O has O no O a O priori O information O about O the O structure O of O the O distribution O of O parameter O values O . O The O agent B-KEY must O be O able O to O produce O estimations O even O when O it O may O have O made O only O a O small O number O of O direct O observations O , O and O thus O it O must O be O able O to O operate O with O sparse O data O . O The O paper O describes O a O mechanism O that O enables O the O agent B-KEY to O significantly O improve O its O estimation O by O augmenting O its O direct O observations O with O those O obtained O by O other O agents B-KEY with O which O it O is O coordinating O . O To O avoid O undesirable O bias O in O relatively O heterogeneous O environments O while O effectively O using O relevant O data O to O improve O its O estimations O , O the O mechanism O weighs O the O contributions O of O other O agents B-KEY ' O observations O based O on O a O real-time O estimation O of O the O level O of O similarity O between O each O of O these O agents B-KEY and O itself O . O The O `` O coordination O autonomy O '' O module O of O a O coordination-manager O system O provided O an O empirical O setting O for O evaluation O . O Simulation-based O evaluations O demonstrated O that O the O proposed O mechanism O outperforms O estimations O based O exclusively O on O an O agent B-KEY 's O own O observations O as O well O as O estimations O based O on O an O unweighted O aggregate O of O all O other O agents B-KEY ' O observations O . O Researches O on O Scheme O of O Pairwise O Key O Establishment O for O Distributed O Sensor B-KEY Networks I-KEY ABSTRACT O Security B-KEY schemes O of O pairwise O key O establishment O , O which O enable O sensors O to O communicate O with O each O other O securely B-KEY , O play O a O fundamental O role O in O research O on O security B-KEY issue O in O wireless O sensor B-KEY networks I-KEY . O A O new O kind O of O cluster O deployed O sensor B-KEY networks I-KEY distribution O model O is O presented O , O and O based O on O which O , O an O innovative O Hierarchical B-KEY Hypercube I-KEY model I-KEY - O H O -LRB- O k O , O u O , O m O , O v O , O n O -RRB- O and O the O mapping O relationship O between O cluster O deployed O sensor B-KEY networks I-KEY and O the O H O -LRB- O k O , O u O , O m O , O v O , O n O -RRB- O are O proposed O . O By O utilizing O nice O properties O of O H O -LRB- O k O , O u O , O m O , O v O , O n O -RRB- O model O , O a O new O general O framework O for O pairwise O key O predistribution O and O a O new O pairwise O key O establishment O algorithm O are O designed O , O which O combines O the O idea O of O KDC O -LRB- O Key O Distribution O Center O -RRB- O and O polynomial O pool O schemes O . O Furthermore O , O the O working O performance O of O the O newly O proposed O pairwise O key O establishment O algorithm O is O seriously O inspected O . O Theoretic O analysis O and O experimental O figures O show O that O the O new O algorithm O has O better O performance O and O provides O higher O possibilities O for O sensor O to O establish O pairwise O key O , O compared O with O previous O related O works O . O Interactions O between O Market B-KEY Barriers I-KEY and O Communication O Networks O in O Marketing B-KEY Systems I-KEY ABSTRACT O We O investigate O a O framework O where O agents O search O for O satisfying O products O by O using O referrals O from O other O agents O . O Our O model O of O a O mechanism O for O transmitting O word-of-mouth O and O the O resulting O behavioural O effects O is O based O on O integrating O a O module O governing O the O local O behaviour O of O agents O with O a O module O governing O the O structure O and O function O of O the O underlying O network O of O agents O . O Local O behaviour O incorporates O a O satisficing O model O of O choice O , O a O set O of O rules O governing O the O interactions O between O agents O , O including O learning O about O the O trustworthiness O of O other O agents O over O time O , O and O external O constraints O on O behaviour O that O may O be O imposed O by O market B-KEY barriers I-KEY or O switching B-KEY costs I-KEY . O Local O behaviour O takes O place O on O a O network O substrate O across O which O agents O exchange O positive O and O negative O information O about O products O . O We O use O various O degree O distributions O dictating O the O extent O of O connectivity O , O and O incorporate O both O small-world O effects O and O the O notion O of O preferential O attachment O in O our O network O models O . O We O compare O the O effectiveness O of O referral B-KEY systems I-KEY over O various O network O structures O for O easy O and O hard O choice O tasks O , O and O evaluate O how O this O effectiveness O changes O with O the O imposition O of O market B-KEY barriers I-KEY . O A O Reinforcement B-KEY Learning I-KEY based O Distributed B-KEY Search I-KEY Algorithm I-KEY For O Hierarchical O Peer-to-Peer O Information O Retrieval O Systems O ABSTRACT O The O dominant O existing O routing O strategies O employed O in O peerto-peer O -LRB- O P2P O -RRB- O based O information O retrieval O -LRB- O IR O -RRB- O systems O are O similarity-based O approaches O . O In O these O approaches O , O agents O depend O on O the O content O similarity O between O incoming O queries B-KEY and O their O direct O neighboring O agents O to O direct O the O distributed O search O sessions O . O However O , O such O a O heuristic O is O myopic O in O that O the O neighboring O agents O may O not O be O connected O to O more O relevant O agents O . O In O this O paper O , O an O online O reinforcement-learning O based O approach O is O developed O to O take O advantage O of O the O dynamic O run-time O characteristics O of O P2P O IR O systems O as O represented O by O information O about O past O search O sessions O . O Specifically O , O agents O maintain O estimates O on O the O downstream O agents O ' O abilities O to O provide O relevant O documents O for O incoming O queries B-KEY . O These O estimates O are O updated O gradually O by O learning O from O the O feedback O information O returned O from O previous O search O sessions O . O Based O on O this O information O , O the O agents O derive O corresponding O routing B-KEY policies I-KEY . O Thereafter O , O these O agents O route O the O queries B-KEY based O on O the O learned O policies O and O update O the O estimates O based O on O the O new O routing B-KEY policies I-KEY . O Experimental O results O demonstrate O that O the O learning B-KEY algorithm I-KEY improves O considerably O the O routing O performance O on O two O test O collection O sets O that O have O been O used O in O a O variety O of O distributed O IR O studies O . O Computing O the O Optimal B-KEY Strategy I-KEY to O Commit B-KEY to O ∗ O ABSTRACT O In O multiagent B-KEY systems I-KEY , O strategic O settings O are O often O analyzed O under O the O assumption O that O the O players O choose O their O strategies O simultaneously O . O However O , O this O model O is O not O always O realistic O . O In O many O settings O , O one O player O is O able O to O commit B-KEY to O a O strategy O before O the O other O player O makes O a O decision O . O Such O models O are O synonymously O referred O to O as O leadership B-KEY , O commitment B-KEY , O or O Stackelberg B-KEY models O , O and O optimal O play O in O such O models O is O often O significantly O different O from O optimal O play O in O the O model O where O strategies O are O selected O simultaneously O . O The O recent O surge O in O interest O in O computing O game-theoretic O solutions O has O so O far O ignored O leadership B-KEY models O -LRB- O with O the O exception O of O the O interest O in O mechanism O design O , O where O the O designer O is O implicitly O in O a O leadership O position O -RRB- O . O In O this O paper O , O we O study O how O to O compute O optimal B-KEY strategies I-KEY to O commit B-KEY to O under O both O commitment B-KEY to O pure B-KEY strategies I-KEY and O commitment B-KEY to O mixed B-KEY strategies I-KEY , O in O both O normal-form O and O Bayesian B-KEY games I-KEY . O We O give O both O positive O results O -LRB- O efficient O algorithms O -RRB- O and O negative O results O -LRB- O NP-hardness B-KEY results O -RRB- O . O Edge B-KEY Indexing I-KEY in O a O Grid O for O Highly O Dynamic B-KEY Virtual I-KEY Environments I-KEY ∗ O ABSTRACT O Newly O emerging O game O -- O based O application O systems O such O as O Second O Life1 O provide O 3D O virtual O environments O where O multiple O users O interact O with O each O other O in O real O -- O time O . O They O are O filled O with O autonomous O , O mutable B-KEY virtual I-KEY content I-KEY which O is O continuously O augmented O by O the O users O . O To O make O the O systems O highly O scalable O and O dynamically O extensible O , O they O are O usually O built O on O a O client O -- O server O based O grid O subspace O division O where O the O virtual O worlds O are O partitioned O into O manageable O sub O -- O worlds O . O In O each O sub O -- O world O , O the O user O continuously O receives O relevant O geometry O updates O of O moving O objects O from O remotely O connected O servers O and O renders O them O according O to O her O viewpoint O , O rather O than O retrieving O them O from O a O local O storage O medium O . O In O such O systems O , O the O determination O of O the O set O of O objects O that O are O visible O from O a O user O 's O viewpoint O is O one O of O the O primary O factors O that O affect O server O throughput O and O scalability O . O Specifically O , O performing O real O -- O time O visibility O tests O in O extremely O dynamic B-KEY virtual I-KEY environments I-KEY is O a O very O challenging O task O as O millions O of O objects O and O sub-millions O of O active O users O are O moving O and O interacting O . O We O recognize O that O the O described O challenges O are O closely O related O to O a O spatial B-KEY database I-KEY problem O , O and O hence O we O map O the O moving O geometry O objects O in O the O virtual O space O to O a O set O of O multi-dimensional O objects O in O a O spatial B-KEY database I-KEY while O modeling O each O avatar O both O as O a O spatial O object O and O a O moving O query O . O Unfortunately O , O existing O spatial B-KEY indexing I-KEY methods O are O unsuitable O for O this O kind O of O new O environments O . O The O main O goal O of O this O paper O is O to O present O an O efficient O spatial B-KEY index I-KEY structure O that O minimizes O unexpected O object B-KEY popping I-KEY and O supports O highly O scalable O real O -- O time O visibility O determination O . O We O then O uncover O many O useful O properties O of O this O structure O and O compare O the O index O structure O with O various O spatial B-KEY indexing I-KEY methods O in O terms O of O query O quality O , O system O throughput O , O and O resource O utilization O . O We O expect O our O approach O to O lay O the O groundwork O for O next O -- O generation O virtual O frameworks O that O may O merge O into O existing O web O -- O based O services O in O the O near O future O . O ∗ O This O research O has O been O funded O in O part O by O NSF O grants O EEC9529152 O -LRB- O IMSC O ERC O -RRB- O and O IIS-0534761 O , O and O equipment O gifts O from O Intel O Corporation O , O Hewlett-Packard O , O Sun O Microsystems O and O Raptor O Networks O Technology O . O Categories O and O Subject O Descriptors O : O C. O 2.4 O -LSB- O Computer O -- O Com O Combinatorial B-KEY Agency I-KEY ABSTRACT O Much O recent O research O concerns O systems O , O such O as O the O Internet O , O whose O components O are O owned O and O operated O by O different O parties O , O each O with O his O own O `` O selfish O '' O goal O . O The O field O of O Algorithmic O Mechanism O Design O handles O the O issue O of O private O information O held O by O the O different O parties O in O such O computational O settings O . O This O paper O deals O with O a O complementary O problem O in O such O settings O : O handling O the O `` O hidden O actions O '' O that O are O performed O by O the O different O parties O . O Our O model O is O a O combinatorial O variant O of O the O classical O principalagent O problem O from O economic O theory O . O In O our O setting O a O principal O must O motivate O a O team O of O strategic O agents O to O exert O costly O effort O on O his O behalf O , O but O their O actions O are O hidden O from O him O . O Our O focus O is O on O cases O where O complex O combinations O of O the O efforts O of O the O agents O influence O the O outcome O . O The O principal O motivates O the O agents O by O offering O to O them O a O set O of O contracts O , O which O together O put O the O agents O in O an O equilibrium O point O of O the O induced O game O . O We O present O formal O models O for O this O setting O , O suggest O and O embark O on O an O analysis O of O some O basic O issues O , O but O leave O many O questions O open O . O Strong B-KEY Equilibrium I-KEY in O Cost B-KEY Sharing I-KEY Connection I-KEY Games I-KEY * O ABSTRACT O In O this O work O we O study O cost B-KEY sharing I-KEY connection I-KEY games I-KEY , O where O each O player O has O a O source O and O sink O he O would O like O to O connect O , O and O the O cost B-KEY of I-KEY the I-KEY edges I-KEY is O either O shared O equally O -LRB- O fair B-KEY connection I-KEY games I-KEY -RRB- O or O in O an O arbitrary O way O -LRB- O general B-KEY connection I-KEY games I-KEY -RRB- O . O We O study O the O graph B-KEY topologies I-KEY that O guarantee O the O existence O of O a O strong B-KEY equilibrium I-KEY -LRB- O where O no O coalition B-KEY can O improve O the O cost O of O each O of O its O members O -RRB- O regardless O of O the O specific B-KEY costs I-KEY on O the O edges O . O Our O main O existence O results O are O the O following O : O -LRB- O 1 O -RRB- O For O a O single B-KEY source I-KEY and I-KEY sink I-KEY we O show O that O there O is O always O a O strong B-KEY equilibrium I-KEY -LRB- O both O for O fair O and O general B-KEY connection I-KEY games I-KEY -RRB- O . O -LRB- O 2 O -RRB- O For O a O single B-KEY source I-KEY multiple I-KEY sinks I-KEY we O show O that O for O a O series O parallel O graph O a O strong B-KEY equilibrium I-KEY always O exists O -LRB- O both O for O fair O and O general B-KEY connection I-KEY games I-KEY -RRB- O . O -LRB- O 3 O -RRB- O For O multi B-KEY source I-KEY and I-KEY sink I-KEY we O show O that O an O extension B-KEY parallel I-KEY graph I-KEY always O admits O a O strong B-KEY equilibrium I-KEY in O fair B-KEY connection I-KEY games I-KEY . O As O for O the O quality O of O the O strong B-KEY equilibrium I-KEY we O show O that O in O any O fair B-KEY connection I-KEY games I-KEY the O cost O of O a O strong B-KEY equilibrium I-KEY is O Θ O -LRB- O log O n O -RRB- O from O the O optimal B-KEY solution I-KEY , O where O n O is O the O number B-KEY of I-KEY players I-KEY . O -LRB- O This O should O be O contrasted O with O the O Ω O -LRB- O n O -RRB- O price B-KEY of I-KEY anarchy I-KEY for O the O same O setting O . O -RRB- O For O single O source O general B-KEY connection I-KEY games I-KEY and O single O source O single O sink O fair B-KEY connection I-KEY games I-KEY , O we O show O that O a O strong B-KEY equilibrium I-KEY is O always O an O optimal B-KEY solution I-KEY . O * O Research O supported O in O part O by O a O grant O of O the O Israel O Science O Foundation O , O Binational O Science O Foundation O -LRB- O BSF O -RRB- O , O GermanIsraeli O Foundation O -LRB- O GIF O -RRB- O , O Lady O Davis O Fellowship O , O an O IBM O faculty O award O , O and O the O IST O Programme O of O the O European O Community O , O under O the O PASCAL O Network O of O Excellence O , O IST-2002-506778 O . O This O publication O only O reflects O the O authors O ' O views O . O Commitment B-KEY and O Extortion B-KEY * O ABSTRACT O Making O commitments B-KEY , O e.g. O , O through O promises O and O threats O , O enables O a O player O to O exploit O the O strengths O of O his O own O strategic B-KEY position I-KEY as O well O as O the O weaknesses O of O that O of O his O opponents O . O Which O commitments B-KEY a O player O can O make O with O credibility B-KEY depends O on O the O circumstances O . O In O some O , O a O player O can O only O commit B-KEY to O the O performance O of O an O action O , O in O others O , O he O can O commit B-KEY himself O conditionally O on O the O actions O of O the O other O players O . O Some O situations O even O allow O for O commitments B-KEY on O commitments B-KEY or O for O commitments B-KEY to O randomized O actions O . O We O explore O the O formal O properties O of O these O types O of O -LRB- O conditional O -RRB- O commitment B-KEY and O their O interrelationships O . O So O as O to O preclude O inconsistencies O among O conditional O commitments B-KEY , O we O assume O an O order O in O which O the O players O make O their O commitments B-KEY . O Central O to O our O analyses O is O the O notion O of O an O extortion B-KEY , O which O we O define O , O for O a O given O order O of O the O players O , O as O a O profile O that O contains O , O for O each O player O , O an O optimal O commitment B-KEY given O the O commitments B-KEY of O the O players O that O committed B-KEY earlier O . O On O this O basis O , O we O investigate O for O different O commitment B-KEY types O whether O it O is O advantageous O to O commit B-KEY earlier O rather O than O later O , O and O how O the O outcomes O obtained O through O extortions B-KEY relate O to O backward O induction O and O Pareto B-KEY efficiency I-KEY . O Computing O the O Banzhaf B-KEY Power I-KEY Index I-KEY in O Network O Flow O Games O ABSTRACT O Preference B-KEY aggregation I-KEY is O used O in O a O variety O of O multiagent B-KEY applications I-KEY , O and O as O a O result O , O voting B-KEY theory O has O become O an O important O topic O in O multiagent O system O research O . O However O , O power O indices O -LRB- O which O reflect O how O much O `` O real O power O '' O a O voter O has O in O a O weighted O voting B-KEY system O -RRB- O have O received O relatively O little O attention O , O although O they O have O long O been O studied O in O political O science O and O economics O . O The O Banzhaf B-KEY power I-KEY index I-KEY is O one O of O the O most O popular O ; O it O is O also O well-defined O for O any O simple O coalitional O game O . O In O this O paper O , O we O examine O the O computational B-KEY complexity I-KEY of O calculating O the O Banzhaf B-KEY power I-KEY index I-KEY within O a O particular O multiagent O domain O , O a O network O flow O game O . O Agents O control O the O edges O of O a O graph O ; O a O coalition O wins O if O it O can O send O a O flow O of O a O given O size O from O a O source O vertex O to O a O target O vertex O . O The O relative O power O of O each O edge/agent O reflects O its O significance O in O enabling O such O a O flow O , O and O in O real-world O networks O could O be O used O , O for O example O , O to O allocate O resources O for O maintaining O parts O of O the O network O . O We O show O that O calculating O the O Banzhaf B-KEY power I-KEY index I-KEY of O each O agent O in O this O network O flow O domain O is O #P O - O complete O . O We O also O show O that O for O some O restricted O network O flow O domains O there O exists O a O polynomial O algorithm O to O calculate O agents O ' O Banzhaf O power O indices O . O Reasoning O about O Judgment O and O Preference B-KEY Aggregation I-KEY ◦ O ABSTRACT O Agents O that O must O reach O agreements O with O other O agents O need O to O reason O about O how O their O preferences O , O judgments O , O and O beliefs O might O be O aggregated O with O those O of O others O by O the O social O choice O mechanisms O that O govern O their O interactions O . O The O recently O emerging O field O of O judgment B-KEY aggregation I-KEY studies O aggregation O from O a O logical O perspective O , O and O considers O how O multiple O sets O of O logical O formulae O can O be O aggregated O to O a O single O consistent O set O . O As O a O special O case O , O judgment B-KEY aggregation I-KEY can O be O seen O to O subsume O classical O preference B-KEY aggregation I-KEY . O We O present O a O modal B-KEY logic I-KEY that O is O intended O to O support O reasoning O about O judgment B-KEY aggregation I-KEY scenarios O -LRB- O and O hence O , O as O a O special O case O , O about O preference B-KEY aggregation I-KEY -RRB- O : O the O logical O language O is O interpreted O directly O in O judgment B-KEY aggregation I-KEY rules O . O We O present O a O sound O and O complete B-KEY axiomatisation I-KEY of O such O rules O . O We O show O that O the O logic O can O express B-KEY aggregation O rules O such O as O majority O voting O ; O rule O properties O such O as O independence O ; O and O results O such O as O the O discursive B-KEY paradox I-KEY , O Arrow B-KEY 's I-KEY theorem I-KEY and O Condorcet O 's O paradox O -- O which O are O derivable O as O formal O theorems O of O the O logic O . O The O logic O is O parameterised O in O such O a O way O that O it O can O be O used O as O a O general O framework O for O comparing O the O logical O properties O of O different O types O of O aggregation O -- O including O classical O preference B-KEY aggregation I-KEY . O Robust O Classification O of O Rare O Queries O Using O Web O Knowledge O ABSTRACT O We O propose O a O methodology O for O building O a O practical O robust O query B-KEY classification I-KEY system O that O can O identify O thousands O of O query O classes O with O reasonable O accuracy O , O while O dealing O in O realtime O with O the O query O volume O of O a O commercial O web B-KEY search I-KEY engine O . O We O use O a O blind O feedback O technique O : O given O a O query O , O we O determine O its O topic O by O classifying O the O web B-KEY search I-KEY results O retrieved O by O the O query O . O Motivated O by O the O needs O of O search B-KEY advertising I-KEY , O we O primarily O focus O on O rare O queries O , O which O are O the O hardest O from O the O point O of O view O of O machine B-KEY learning I-KEY , O yet O in O aggregation O account O for O a O considerable O fraction O of O search B-KEY engine I-KEY traffic O . O Empirical O evaluation O confirms O that O our O methodology O yields O a O considerably O higher O classification O accuracy O than O previously O reported O . O We O believe O that O the O proposed O methodology O will O lead O to O better O matching O of O online O ads O to O rare O queries O and O overall O to O a O better O user O experience O . O Collaboration O Among O a O Satellite B-KEY Swarm I-KEY ABSTRACT O The O paper O deals O with O on-board B-KEY planning I-KEY for O a O satellite B-KEY swarm I-KEY via O communication B-KEY and I-KEY negotiation I-KEY . O We O aim O at O defining O individual O behaviours O that O result O in O a O global O behaviour O that O meets O the O mission O requirements O . O We O will O present O the O formalization O of O the O problem O , O a O communication O protocol O , O a O solving O method O based O on O reactive B-KEY decision I-KEY rules I-KEY , O and O first O results O . O An O Advanced B-KEY Bidding I-KEY Agent I-KEY for O Advertisement O Selection O on O Public O Displays O ABSTRACT O In O this O paper O we O present O an O advanced B-KEY bidding I-KEY agent I-KEY that O participates O in O first-price O sealed O bid O auctions O to O allocate O advertising O space O on O BluScreen O -- O an O experimental O public O advertisement O system O that O detects O users O through O the O presence O of O their O Bluetooth O enabled O devices O . O Our O bidding B-KEY agent I-KEY is O able O to O build O probabilistic B-KEY models I-KEY of O both O the O behaviour O of O users O who O view O the O adverts O , O and O the O auctions B-KEY that O it O participates O within O . O It O then O uses O these O models O to O maximise O the O exposure O that O its O adverts O receive O . O We O evaluate O the O effectiveness O of O this O bidding B-KEY agent I-KEY through O simulation O against O a O range O of O alternative O selection O mechanisms O including O a O simple O bidding O strategy O , O random O allocation O , O and O a O centralised B-KEY optimal I-KEY allocation I-KEY with O perfect O foresight O . O Our O bidding B-KEY agent I-KEY significantly O outperforms O both O the O simple O bidding O strategy O and O the O random O allocation O , O and O in O a O mixed O population O of O agents O it O is O able O to O expose O its O adverts O to O 25 O % O more O users O than O the O simple O bidding O strategy O . O Moreover O , O its O performance O is O within O 7.5 O % O of O that O of O the O centralised B-KEY optimal I-KEY allocation I-KEY despite O the O highly O uncertain O environment O in O which O it O must O operate O . O The O Impact O of O Caching B-KEY on O Search O Engines O ABSTRACT O In O this O paper O we O study O the O trade-offs O in O designing O efficient O caching B-KEY systems O for O Web O search O engines O . O We O explore O the O impact O of O different O approaches O , O such O as O static O vs. O dynamic B-KEY caching I-KEY , O and O caching O query O results O vs. O caching O posting O lists O . O Using O a O query B-KEY log I-KEY spanning O a O whole O year O we O explore O the O limitations O of O caching B-KEY and O we O demonstrate O that O caching B-KEY posting O lists O can O achieve O higher O hit O rates O than O caching O query O answers O . O We O propose O a O new O algorithm O for O static B-KEY caching I-KEY of O posting O lists O , O which O outperforms O previous O methods O . O We O also O study O the O problem O of O finding O the O optimal O way O to O split O the O static B-KEY cache I-KEY between O answers O and O posting O lists O . O Finally O , O we O measure O how O the O changes O in O the O query B-KEY log I-KEY affect O the O effectiveness B-KEY of I-KEY static I-KEY caching I-KEY , O given O our O observation O that O the O distribution O of O the O queries O changes O slowly O over O time O . O Our O results O and O observations O are O applicable O to O different O levels O of O the O data-access B-KEY hierarchy I-KEY , O for O instance O , O for O a O memory/disk O layer O or O a O broker/remote O server O layer O . O Revenue B-KEY Analysis O of O a O Family O of O Ranking B-KEY Rules I-KEY for O Keyword B-KEY Auctions I-KEY ABSTRACT O Keyword B-KEY auctions I-KEY lie O at O the O core O of O the O business O models O of O today O 's O leading O search B-KEY engines I-KEY . O Advertisers B-KEY bid O for O placement O alongside O search O results O , O and O are O charged O for O clicks O on O their O ads O . O Advertisers B-KEY are O typically O ranked O according O to O a O score O that O takes O into O account O their O bids O and O potential O clickthrough O rates O . O We O consider O a O family O of O ranking B-KEY rules I-KEY that O contains O those O typically O used O to O model O Yahoo! O and O Google O 's O auction O designs O as O special O cases O . O We O find O that O in O general O neither O of O these O is O necessarily O revenue-optimal O in O equilibrium O , O and O that O the O choice O of O ranking B-KEY rule I-KEY can O be O guided O by O considering O the O correlation O between O bidders O ' O values O and O click-through O rates O . O We O propose O a O simple O approach O to O determine O a O revenue-optimal O ranking B-KEY rule I-KEY within O our O family O , O taking O into O account O effects O on O advertiser B-KEY satisfaction O and O user O experience O . O We O illustrate O the O approach O using O Monte-Carlo O simulations O based O on O distributions O fitted O to O Yahoo! O bid O and O click-through O rate O data O for O a O high-volume O keyword O . O Generalized O Value O Decomposition O and O Structured O Multiattribute B-KEY Auctions I-KEY ABSTRACT O Multiattribute B-KEY auction I-KEY mechanisms O generally O either O remain O agnostic O about O traders O ' O preferences O , O or O presume O highly O restrictive O forms O , O such O as O full O additivity O . O Real O preferences O often O exhibit O dependencies O among O attributes O , O yet O may O possess O some O structure O that O can O be O usefully O exploited O to O streamline O communication O and O simplify O operation O of O a O multiattribute B-KEY auction I-KEY . O We O develop O such O a O structure O using O the O theory B-KEY of I-KEY measurable I-KEY value I-KEY functions I-KEY , O a O cardinal O utility O representation O based O on O an O underlying O order O over O preference O differences O . O A O set O of O local O conditional O independence O relations O over O such O differences O supports O a O generalized O additive O preference O representation O , O which O decomposes O utility O across O overlapping O clusters O of O related O attributes O . O We O introduce O an O iterative O auction B-KEY mechanism O that O maintains O prices O on O local O clusters O of O attributes O rather O than O the O full O space O of O joint O configurations O . O When O traders O ' O preferences O are O consistent O with O the O auction B-KEY 's O generalized O additive O structure O , O the O mechanism O produces O approximately O optimal O allocations O , O at O approximate O VCG O prices O . O Bidding O Optimally O in O Concurrent O Second-Price O Auctions O of O Perfectly O Substitutable O Goods O ABSTRACT O We O derive O optimal B-KEY bidding I-KEY strategies I-KEY for O a O global B-KEY bidding I-KEY agent I-KEY that O participates O in O multiple O , O simultaneous O second-price O auctions O with O perfect B-KEY substitutes I-KEY . O We O first O consider O a O model O where O all O other O bidders O are O local O and O participate O in O a O single O auction O . O For O this O case O , O we O prove O that O , O assuming O free O disposal O , O the O global O bidder O should O always O place O non-zero O bids O in O all O available O auctions O , O irrespective O of O the O local O bidders O ' O valuation O distribution O . O Furthermore O , O for O non-decreasing B-KEY valuation I-KEY distributions I-KEY , O we O prove O that O the O problem O of O finding O the O optimal O bids O reduces O to O two O dimensions O . O These O results O hold O both O in O the O case O where O the O number O of O local O bidders O is O known O and O when O this O number O is O determined O by O a O Poisson O distribution O . O This O analysis O extends O to O online B-KEY markets I-KEY where O , O typically O , O auctions O occur O both O concurrently O and O sequentially O . O In O addition O , O by O combining O analytical O and O simulation O results O , O we O demonstrate O that O similar O results O hold O in O the O case O of O several O global O bidders O , O provided O that O the O market O consists O of O both O global O and O local O bidders O . O Finally O , O we O address O the O efficiency O of O the O overall O market O , O and O show O that O information O about O the O number O of O local O bidders O is O an O important O determinant O for O the O way O in O which O a O global O bidder O affects O efficiency O . O Learning B-KEY From I-KEY Revealed I-KEY Preference I-KEY ABSTRACT O A O sequence O of O prices O and O demands O are O rationalizable B-KEY if O there O exists O a O concave O , O continuous O and O monotone O utility O function O such O that O the O demands O are O the O maximizers O of O the O utility O function O over O the O budget O set O corresponding O to O the O price O . O Afriat O -LSB- O 1 O -RSB- O presented O necessary O and O sufficient O conditions O for O a O finite O sequence O to O be O rationalizable B-KEY . O Varian O -LSB- O 20 O -RSB- O and O later O Blundell O et O al. O -LSB- O 3 O , O 4 O -RSB- O continued O this O line O of O work O studying O nonparametric O methods O to O forecasts B-KEY demand O . O Their O results O essentially O characterize O learnability O of O degenerate O classes O of O demand B-KEY functions I-KEY and O therefore O fall O short O of O giving O a O general O degree O of O confidence O in O the O forecast B-KEY . O The O present O paper O complements O this O line O of O research O by O introducing O a O statistical O model O and O a O measure O of O complexity O through O which O we O are O able O to O study O the O learnability O of O classes O of O demand B-KEY functions I-KEY and O derive O a O degree O of O confidence O in O the O forecasts B-KEY . O Our O results O show O that O the O class O of O all O demand B-KEY functions I-KEY has O unbounded O complexity O and O therefore O is O not O learnable O , O but O that O there O exist O interesting O and O potentially O useful O classes O that O are O learnable O from O finite O samples O . O We O also O present O a O learning O algorithm O that O is O an O adaptation O of O a O new O proof O of O Afriat O 's O theorem O due O to O Teo O and O Vohra O -LSB- O 17 O -RSB- O . O Clearing O Algorithms O for O Barter B-KEY Exchange B-KEY Markets O : O Enabling O Nationwide O Kidney O Exchanges B-KEY ABSTRACT O In O barter-exchange O markets O , O agents O seek O to O swap O their O items O with O one O another O , O in O order O to O improve O their O own O utilities O . O These O swaps O consist O of O cycles O of O agents O , O with O each O agent O receiving O the O item O of O the O next O agent O in O the O cycle O . O We O focus O mainly O on O the O upcoming O national O kidney-exchange O market O , O where O patients O with O kidney O disease O can O obtain O compatible O donors O by O swapping O their O own O willing O but O incompatible O donors O . O With O over O 70,000 O patients O already O waiting O for O a O cadaver O kidney O in O the O US O , O this O market O is O seen O as O the O only O ethical O way O to O significantly O reduce O the O 4,000 O deaths O per O year O attributed O to O kidney O disease O . O The O clearing O problem O involves O finding O a O social O welfare O maximizing O exchange B-KEY when O the O maximum O length O of O a O cycle O is O fixed O . O Long O cycles O are O forbidden O , O since O , O for O incentive O reasons O , O all O transplants B-KEY in O a O cycle O must O be O performed O simultaneously O . O Also O , O in O barter-exchanges O generally O , O more O agents O are O affected O if O one O drops O out O of O a O longer O cycle O . O We O prove O that O the O clearing O problem O with O this O cycle-length O constraint O is O NP-hard O . O Solving O it O exactly O is O one O of O the O main O challenges O in O establishing O a O national O kidney O exchange B-KEY . O We O present O the O first O algorithm O capable O of O clearing O these O markets O on O a O nationwide O scale O . O The O key O is O incremental O problem O formulation O . O We O adapt O two O paradigms O for O the O task O : O constraint O generation O and O column B-KEY generation I-KEY . O For O each O , O we O develop O techniques O that O dramatically O improve O both O runtime O and O memory O usage O . O We O conclude O that O column B-KEY generation I-KEY scales O drastically O better O than O constraint O generation O . O Our O algorithm O also O supports O several O generalizations O , O as O demanded O by O real-world O kidney O exchanges B-KEY . O Our O algorithm O replaced O CPLEX O as O the O clearing O algorithm O of O the O Alliance O for O Paired O Donation O , O one O of O the O leading O kidney O exchanges B-KEY . O The O match B-KEY runs O are O conducted O every O two O weeks O and O transplants B-KEY based O on O our O optimizations O have O already O been O conducted O . O Learn O from O Web O Search O Logs O to O Organize O Search O Results O ABSTRACT O Effective O organization O of O search O results O is O critical O for O improving O the O utility O of O any O search O engine O . O Clustering O search O results O is O an O effective O way O to O organize O search O results O , O which O allows O a O user O to O navigate O into O relevant O documents O quickly O . O However O , O two O deficiencies O of O this O approach O make O it O not O always O work O well O : O -LRB- O 1 O -RRB- O the O clusters O discovered O do O not O necessarily O correspond O to O the O interesting B-KEY aspects I-KEY of O a O topic O from O the O user O 's O perspective O ; O and O -LRB- O 2 O -RRB- O the O cluster O labels O generated O are O not O informative O enough O to O allow O a O user O to O identify O the O right O cluster O . O In O this O paper O , O we O propose O to O address O these O two O deficiencies O by O -LRB- O 1 O -RRB- O learning O `` O interesting B-KEY aspects I-KEY '' O of O a O topic O from O Web O search O logs O and O organizing O search O results O accordingly O ; O and O -LRB- O 2 O -RRB- O generating O more O meaningful B-KEY cluster I-KEY labels I-KEY using O past B-KEY query I-KEY words O entered O by O users O . O We O evaluate O our O proposed O method O on O a O commercial O search B-KEY engine I-KEY log I-KEY data O . O Compared O with O the O traditional O methods O of O clustering O search O results O , O our O method O can O give O better O result O organization O and O more O meaningful O labels O . O New B-KEY Event I-KEY Detection I-KEY Based O on O Indexing-tree O and O Named B-KEY Entity I-KEY ABSTRACT O New B-KEY Event I-KEY Detection I-KEY -LRB- O NED O -RRB- O aims O at O detecting O from O one O or O multiple O streams O of O news O stories O that O which O one O is O reported O on O a O new O event O -LRB- O i.e. O not O reported O previously O -RRB- O . O With O the O overwhelming O volume O of O news O available O today O , O there O is O an O increasing O need O for O a O NED O system O which O is O able O to O detect O new O events O more O efficiently O and O accurately O . O In O this O paper O we O propose O a O new O NED O model O to O speed O up O the O NED O task O by O using O news O indexing-tree O dynamically O . O Moreover O , O based O on O the O observation O that O terms O of O different O types O have O different O effects O for O NED O task O , O two O term B-KEY reweighting I-KEY approaches I-KEY are O proposed O to O improve O NED B-KEY accuracy I-KEY . O In O the O first O approach O , O we O propose O to O adjust O term B-KEY weights I-KEY dynamically O based O on O previous O story O clusters O and O in O the O second O approach O , O we O propose O to O employ O statistics B-KEY on O training B-KEY data I-KEY to O learn O the O named B-KEY entity I-KEY reweighting O model O for O each O class B-KEY of I-KEY stories I-KEY . O Experimental O results O on O two O Linguistic B-KEY Data I-KEY Consortium I-KEY -LRB- O LDC O -RRB- O datasets O TDT2 O and O TDT3 O show O that O the O proposed O model O can O improve O both O efficiency O and O accuracy O of O NED O task O significantly O , O compared O to O the O baseline B-KEY system I-KEY and O other O existing B-KEY systems I-KEY . O Resolving O Conflict O and O Inconsistency O in O Norm-Regulated O Virtual B-KEY Organizations I-KEY ABSTRACT O Norm-governed O virtual B-KEY organizations I-KEY define O , O govern O and O facilitate O coordinated O resource O sharing O and O problem O solving O in O societies O of O agents B-KEY . O With O an O explicit O account O of O norms O , O openness O in O virtual B-KEY organizations I-KEY can O be O achieved O : O new O components O , O designed O by O various O parties O , O can O be O seamlessly O accommodated O . O We O focus O on O virtual B-KEY organizations I-KEY realised O as O multi-agent O systems O , O in O which O human O and O software O agents B-KEY interact O to O achieve O individual O and O global O goals O . O However O , O any O realistic O account O of O norms O should O address O their O dynamic O nature O : O norms O will O change O as O agents B-KEY interact O with O each O other O and O their O environment O . O Due O to O the O changing O nature O of O norms O or O due O to O norms O stemming O from O different O virtual B-KEY organizations I-KEY , O there O will O be O situations O when O an O action O is O simultaneously O permitted O and O prohibited O , O that O is O , O a O conflict O arises O . O Likewise O , O there O will O be O situations O when O an O action O is O both O obliged O and O prohibited O , O that O is O , O an O inconsistency O arises O . O We O introduce O an O approach O , O based O on O first-order O unification O , O to O detect O and O resolve O such O conflicts O and O inconsistencies O . O In O our O proposed O solution O , O we O annotate O a O norm O with O the O set O of O values O their O variables O should O not O have O in O order O to O avoid O a O conflict O or O an O inconsistency O with O another O norm O . O Our O approach O neatly O accommodates O the O domain-dependent O interrelations O among O actions O and O the O indirect O conflicts/inconsistencies O these O may O cause O . O More O generally O , O we O can O capture O a O useful O notion O of O inter-agent O -LRB- O and O inter-role O -RRB- O delegation O of O actions O and O norms O associated O to O them O , O and O use O it O to O address O conflicts/inconsistencies O caused O by O action O delegation O . O We O illustrate O our O approach O with O an O e-Science O example O in O which O agents B-KEY support O Grid O services O . O Regularized B-KEY Clustering O for O Documents O * O ABSTRACT O In O recent O years O , O document B-KEY clustering I-KEY has O been O receiving O more O and O more O attentions O as O an O important O and O fundamental O technique O for O unsupervised O document O organization O , O automatic O topic O extraction O , O and O fast O information O retrieval O or O filtering O . O In O this O paper O , O we O propose O a O novel O method O for O clustering O documents O using O regularization B-KEY . O Unlike O traditional O globally B-KEY regularized I-KEY clustering O methods O , O our O method O first O construct O a O local O regularized O linear O label O predictor O for O each O document O vector O , O and O then O combine O all O those O local O regularizers O with O a O global O smoothness O regularizer O . O So O we O call O our O algorithm O Clustering O with O Local O and O Global B-KEY Regularization I-KEY -LRB- O CLGR O -RRB- O . O We O will O show O that O the O cluster O memberships O of O the O documents O can O be O achieved O by O eigenvalue O decomposition O of O a O sparse O symmetric O matrix O , O which O can O be O efficiently O solved O by O iterative O methods O . O Finally O our O experimental O evaluations O on O several O datasets O are O presented O to O show O the O superiorities O of O CLGR O over O traditional O document B-KEY clustering I-KEY methods O . O Implementation O and O Performance O Evaluation O of O CONFLEX-G B-KEY : O Grid-enabled O Molecular O Conformational B-KEY Space I-KEY Search I-KEY Program O with O OmniRPC B-KEY ABSTRACT O CONFLEX-G B-KEY is O the O grid-enabled O version O of O a O molecular O conformational B-KEY space I-KEY search I-KEY program O called O CONFLEX O . O We O have O implemented O CONFLEX-G B-KEY using O a O grid B-KEY RPC I-KEY system I-KEY called O OmniRPC B-KEY . O In O this O paper O , O we O report O the O performance O of O CONFLEX-G B-KEY in O a O grid O testbed O of O several O geographically O distributed O PC B-KEY clusters I-KEY . O In O order O to O explore O many O conformation O of O large O bio-molecules B-KEY , O CONFLEX-G B-KEY generates O trial O structures O of O the O molecules O and O allocates O jobs O to O optimize O a O trial O structure O with O a O reliable O molecular B-KEY mechanics I-KEY method O in O the O grid O . O OmniRPC B-KEY provides O a O restricted O persistence O model O to O support O the O parametric O search O applications O . O In O this O model O , O when O the O initialization B-KEY procedure I-KEY is O defined O in O the O RPC B-KEY module I-KEY , O the O module O is O automatically O initialized O at O the O time O of O invocation O by O calling O the O initialization B-KEY procedure I-KEY . O This O can O eliminate O unnecessary O communication O and O initialization O at O each O call O in O CONFLEX-G B-KEY . O CONFLEXG O can O achieve O performance O comparable O to O CONFLEX O MPI O and O can O exploit O more O computing O resources O by O allowing O the O use O of O a O cluster O of O multiple O clusters O in O the O grid O . O The O experimental O result O shows O that O CONFLEX-G B-KEY achieved O a O speedup O of O 56.5 O times O in O the O case O of O the O 1BL1 O molecule O , O where O the O molecule O consists O of O a O large O number O of O atoms O , O and O each O trial O structure O optimization O requires O significant O time O . O The O load O imbalance O of O the O optimization O time O of O the O trial O structure O may O also O cause O performance O degradation O . O Computation O in O a O Distributed B-KEY Information I-KEY Market O ∗ O ABSTRACT O According O to O economic B-KEY theory I-KEY -- O supported O by O empirical B-KEY and I-KEY laboratory I-KEY evidence I-KEY -- O the O equilibrium B-KEY price I-KEY of O a O financial B-KEY security I-KEY reflects O all O of O the O information O regarding O the O security O 's O value O . O We O investigate O the O computational B-KEY process I-KEY on O the O path B-KEY toward I-KEY equilibrium I-KEY , O where O information O distributed O among O traders B-KEY is O revealed O step-by-step O over O time O and O incorporated O into O the O market B-KEY price I-KEY . O We O develop O a O simplified B-KEY model I-KEY of O an O information B-KEY market I-KEY , O along O with O trading B-KEY strategies I-KEY , O in O order O to O formalize O the O computational B-KEY properties I-KEY of I-KEY the I-KEY process I-KEY . O We O show O that O securities B-KEY whose O payoffs B-KEY can O not O be O expressed O as O weighted O threshold B-KEY functions I-KEY of O distributed O input O bits O are O not O guaranteed O to O converge O to O the O proper O equilibrium O predicted O by O economic B-KEY theory I-KEY . O On O the O other O hand O , O securities B-KEY whose O payoffs B-KEY are O threshold B-KEY functions I-KEY are O guaranteed O to O converge O , O for O all O prior O probability B-KEY distributions I-KEY . O Moreover O , O these O threshold O securities B-KEY converge O in O at O most O n O rounds B-KEY , O where O n O is O the O number B-KEY of I-KEY bits I-KEY of O distributed B-KEY information I-KEY . O We O also O prove O a O lower B-KEY bound I-KEY , O showing O a O type O of O threshold O security B-KEY that O requires O at O least O n/2 O rounds B-KEY to O converge O in O the O worst B-KEY case I-KEY . O ∗ O This O work O was O supported O by O the O DoD O University O Research O Initiative O -LRB- O URI O -RRB- O administered O by O the O Office O of O Naval O Research O under O Grant O N00014-01-1-0795 O . O † O Supported O in O part O by O ONR O grant O N00014-01-0795 O and O NSF O grants O CCR-0105337 O , O CCR-TC-0208972 O , O ANI-0207399 O , O and O ITR-0219018 O . O ‡ O This O work O conducted O while O at O NEC O Laboratories O America O , O Princeton O , O NJ O . O Nash O Equilibria O in O Graphical B-KEY Games I-KEY on O Trees O Revisited O * O Graphical B-KEY games I-KEY have O been O proposed O as O a O game-theoretic O model O of O large-scale O distributed O networks O of O non-cooperative O agents O . O When O the O number O of O players O is O large O , O and O the O underlying O graph O has O low O degree B-KEY , O they O provide O a O concise O way O to O represent O the O players O ' O payoffs O . O It O has O recently O been O shown O that O the O problem O of O finding O Nash O equilibria O in O a O general O degree-3 O graphical B-KEY game I-KEY with O two O actions O per O player O is O complete O for O the O complexity O class O PPAD O , O indicating O that O it O is O unlikely O that O there O is O any O polynomial-time O algorithm O for O this O problem O . O In O this O paper O , O we O study O the O complexity O of O graphical B-KEY games I-KEY with O two O actions O per O player O on O bounded-degree O trees O . O This O setting O was O first O considered O by O Kearns O , O Littman O and O Singh O , O who O proposed O a O dynamic O programming-based O algorithm O that O computes O all O Nash O equilibria O of O such O games O . O The O running O time O of O their O algorithm O is O exponential O , O though O approximate O equilibria O can O be O computed O efficiently O . O Later O , O Littman O , O Kearns O and O Singh O proposed O a O modification O to O this O algorithm O that O can O find O a O single O Nash B-KEY equilibrium I-KEY in O polynomial O time O . O We O show O that O this O modified O algorithm O is O incorrect O -- O the O output O is O not O always O a O Nash B-KEY equilibrium I-KEY . O We O then O propose O a O new O algorithm O that O is O based O on O the O ideas O of O Kearns O et O al. O and O computes O all O Nash O equilibria O in O quadratic O time O if O the O input O graph O is O a O path O , O and O in O polynomial O time O if O it O is O an O arbitrary O graph O of O maximum O degree B-KEY 2 O . O Moreover O , O our O algorithm O can O be O used O to O compute O Nash O equilibria O of O graphical B-KEY games I-KEY on O arbitrary O trees O , O but O the O running O time O can O be O exponential O , O even O when O the O tree O has O bounded O degree B-KEY . O We O show O that O this O is O inevitable O -- O any O algorithm O of O this O type O will O take O exponential O time O , O even O on O bounded-degree O trees O with O pathwidth O 2 O . O It O is O an O open O question O whether O our O algorithm O runs O in O polynomial O time O on O graphs O with O pathwidth O 1 O , O but O we O show O that O finding O a O Nash B-KEY equilibrium I-KEY for O a O 2-action O graphical B-KEY game I-KEY in O which O the O underlying O graph O has O maximum O degree B-KEY 3 O and O constant O pathwidth O is O PPAD-complete B-KEY -LRB- O so O is O unlikely O to O be O tractable O -RRB- O . O * O This O research O is O supported O by O the O EPSRC O research O grants O `` O Algorithmics O of O Network-sharing O Games O '' O and O `` O Discontinuous O Behaviour O in O the O Complexity O of O randomized O Algorithms O '' O . O Implementation B-KEY with O a O Bounded B-KEY Action I-KEY Space I-KEY ABSTRACT O While O traditional O mechanism O design O typically O assumes O isomorphism O between O the O agents O ' O type O - O and O action O spaces O , O in O many O situations O the O agents O face O strict O restrictions O on O their O action O space O due O to O , O e.g. O , O technical O , O behavioral O or O regulatory O reasons O . O We O devise O a O general O framework O for O the O study O of O mechanism O design O in O single-parameter O environments O with O restricted O action O spaces O . O Our O contribution O is O threefold O . O First O , O we O characterize O sufficient O conditions O under O which O the O information-theoretically O optimal O social-choice O rule O can O be O implemented B-KEY in O dominant B-KEY strategies I-KEY , O and O prove O that O any O multilinear O social-choice O rule O is O dominant-strategy O implementable B-KEY with O no O additional O cost O . O Second O , O we O identify O necessary O conditions O for O the O optimality O of O action-bounded B-KEY mechanisms I-KEY , O and O fully O characterize O the O optimal B-KEY mechanisms I-KEY and O strategies O in O games O with O two O players O and O two O alternatives O . O Finally O , O we O prove O that O for O any O multilinear O social-choice O rule O , O the O optimal B-KEY mechanism I-KEY with O k O actions O incurs O an O expected O loss O of O O O -LRB- O k21 O -RRB- O compared O to O the O optimal B-KEY mechanisms I-KEY with O unrestricted O action O spaces O . O Our O results O apply O to O various O economic O and O computational O settings O , O and O we O demonstrate O their O applicability O to O signaling O games O , O public-good O models O and O routing O in O networks O . O Sequential O Decision B-KEY Making O in O Parallel O Two-Sided O Economic O Search O ABSTRACT O This O paper O presents O a O two-sided O economic O search O model O in O which O agents O are O searching O for O beneficial O pairwise B-KEY partnerships I-KEY . O In O each O search O stage O , O each O of O the O agents O is O randomly O matched B-KEY with O several O other O agents O in O parallel O , O and O makes O a O decision B-KEY whether O to O accept O a O potential O partnership B-KEY with O one O of O them O . O The O distinguishing O feature O of O the O proposed O model O is O that O the O agents O are O not O restricted O to O maintaining O a O synchronized O -LRB- O instantaneous O -RRB- O decision B-KEY protocol O and O can O sequentially O accept O and O reject O partnerships B-KEY within O the O same O search O stage O . O We O analyze O the O dynamics O which O drive O the O agents O ' O strategies O towards O a O stable O equilibrium O in O the O new O model O and O show O that O the O proposed O search O strategy O weakly O dominates O the O one O currently O in O use O for O the O two-sided O parallel O economic O search O model O . O By O identifying O several O unique O characteristics O of O the O equilibrium O we O manage O to O efficiently O bound O the O strategy O space O that O needs O to O be O explored O by O the O agents O and O propose O an O efficient O means O for O extracting O the O distributed O equilibrium B-KEY strategies I-KEY in O common O environments O . O SMILE O : O Sound O Multi-agent O Incremental B-KEY LEarning I-KEY ;--RRB- O * O ABSTRACT O This O article O deals O with O the O problem O of O collaborative O learning O in O a O multi-agent O system O . O Here O each O agent B-KEY can O update O incrementally O its O beliefs O B O -LRB- O the O concept O representation O -RRB- O so O that O it O is O in O a O way O kept O consistent O with O the O whole O set O of O information O K O -LRB- O the O examples O -RRB- O that O he O has O received O from O the O environment O or O other O agents B-KEY . O We O extend O this O notion O of O consistency O -LRB- O or O soundness O -RRB- O to O the O whole O MAS O and O discuss O how O to O obtain O that O , O at O any O moment O , O a O same O consistent O concept O representation O is O present O in O each O agent B-KEY . O The O corresponding O protocol O is O applied O to O supervised O concept O learning O . O The O resulting O method O SMILE O -LRB- O standing O for O Sound O Multiagent O Incremental B-KEY LEarning I-KEY -RRB- O is O described O and O experimented O here O . O Surprisingly O some O difficult O boolean O formulas O are O better O learned O , O given O the O same O learning O set O , O by O a O Multi O agent B-KEY system O than O by O a O single O agent B-KEY . O PackageBLAST B-KEY : O An O Adaptive B-KEY Multi-Policy I-KEY Grid I-KEY Service I-KEY for O Biological B-KEY Sequence I-KEY Comparison I-KEY * O ABSTRACT O In O this O paper O , O we O propose O an O adaptive O task B-KEY allocation I-KEY framework O to O perform O BLAST B-KEY searches I-KEY in O a O grid B-KEY environment I-KEY against O sequence O database O segments O . O The O framework O , O called O PackageBLAST B-KEY , O provides O an O infrastructure O to O choose O or O incorporate O task B-KEY allocation I-KEY strategies O . O Furthermore O , O we O propose O a O mechanism O to O compute O grid O nodes O execution O weight O , O adapting O the O chosen O allocation O policy O to O the O current O computational O power O of O the O nodes O . O Our O results O present O very O good O speedups O and O also O show O that O no O single O allocation O strategy O is O able O to O achieve O the O lowest O execution O times O for O all O scenarios O . O Analyzing O Feature O Trajectories O for O Event B-KEY Detection I-KEY ABSTRACT O We O consider O the O problem O of O analyzing O word B-KEY trajectories I-KEY in O both O time O and O frequency O domains O , O with O the O specific O goal O of O identifying O important O and O less-reported O , O periodic O and O aperiodic O words O . O A O set O of O words O with O identical O trends O can O be O grouped O together O to O reconstruct O an O event O in O a O completely O unsupervised O manner O . O The O document O frequency O of O each O word O across O time O is O treated O like O a O time B-KEY series I-KEY , O where O each O element O is O the O document O frequency O - O inverse O document O frequency O -LRB- O DFIDF O -RRB- O score O at O one O time O point O . O In O this O paper O , O we O 1 O -RRB- O first O applied O spectral B-KEY analysis I-KEY to O categorize O features O for O different O event O characteristics O : O important O and O less-reported O , O periodic O and O aperiodic O ; O 2 O -RRB- O modeled O aperiodic O features O with O Gaussian B-KEY density O and O periodic O features O with O Gaussian B-KEY mixture O densities O , O and O subsequently O detected O each O feature O 's O burst O by O the O truncated O Gaussian B-KEY approach O ; O 3 O -RRB- O proposed O an O unsupervised O greedy O event B-KEY detection I-KEY algorithm O to O detect O both O aperiodic O and O periodic B-KEY events I-KEY . O All O of O the O above O methods O can O be O applied O to O time B-KEY series I-KEY data O in O general O . O We O extensively O evaluated O our O methods O on O the O 1-year O Reuters O News O Corpus O -LSB- O 3 O -RSB- O and O showed O that O they O were O able O to O uncover O meaningful O aperiodic O and O periodic B-KEY events I-KEY . O Studying O the O Use O of O Popular B-KEY Destinations I-KEY to O Enhance B-KEY Web I-KEY Search I-KEY Interaction O ABSTRACT O We O present O a O novel O Web B-KEY search I-KEY interaction I-KEY feature O which O , O for O a O given O query O , O provides O links O to O websites O frequently O visited O by O other O users O with O similar O information O needs O . O These O popular B-KEY destinations I-KEY complement O traditional O search O results O , O allowing O direct O navigation O to O authoritative O resources O for O the O query O topic O . O Destinations O are O identified O using O the O history O of O search O and O browsing O behavior O of O many O users O over O an O extended O time O period O , O whose O collective O behavior O provides O a O basis O for O computing O source O authority O . O We O describe O a O user B-KEY study I-KEY which O compared O the O suggestion O of O destinations O with O the O previously O proposed O suggestion O of O related B-KEY queries I-KEY , O as O well O as O with O traditional O , O unaided O Web O search O . O Results O show O that O search O enhanced O by O destination O suggestions O outperforms O other O systems O for O exploratory O tasks O , O with O best O performance O obtained O from O mining O past O user O behavior O at O query-level O granularity O . O Scalable O Grid B-KEY Service I-KEY Discovery I-KEY Based O on O UDDI O * O ABSTRACT O Efficient O discovery B-KEY of O grid O services O is O essential O for O the O success O of O grid B-KEY computing I-KEY . O The O standardization O of O grids O based O on O web B-KEY services I-KEY has O resulted O in O the O need O for O scalable O web B-KEY service I-KEY discovery B-KEY mechanisms O to O be O deployed O in O grids O Even O though O UDDI B-KEY has O been O the O de O facto O industry O standard O for O web-services O discovery B-KEY , O imposed O requirements O of O tight-replication O among O registries O and O lack O of O autonomous B-KEY control I-KEY has O severely O hindered O its O widespread O deployment O and O usage O . O With O the O advent O of O grid B-KEY computing I-KEY the O scalability B-KEY issue I-KEY of O UDDI B-KEY will O become O a O roadblock O that O will O prevent O its O deployment O in O grids O . O In O this O paper O we O present O our O distributed O web-service O discovery B-KEY architecture O , O called O DUDE O -LRB- O Distributed O UDDI O Deployment O Engine O -RRB- O . O DUDE O leverages O DHT B-KEY -LRB- O Distributed O Hash O Tables O -RRB- O as O a O rendezvous O mechanism O between O multiple O UDDI B-KEY registries O . O DUDE O enables O consumers O to O query B-KEY multiple O registries O , O still O at O the O same O time O allowing O organizations O to O have O autonomous B-KEY control I-KEY over O their O registries O . O . O Based O on O preliminary O prototype O on O PlanetLab O , O we O believe O that O DUDE O architecture O can O support O effective O distribution O of O UDDI B-KEY registries O thereby O making O UDDI O more O robust O and O also O addressing O its O scaling O issues O . O Furthermore O , O The O DUDE O architecture O for O scalable O distribution O can O be O applied O beyond O UDDI B-KEY to O any O Grid B-KEY Service I-KEY Discovery I-KEY mechanism O . O An O Adversarial B-KEY Environment I-KEY Model O for O Bounded O Rational O Agents B-KEY in O Zero-Sum O Interactions B-KEY ABSTRACT O Multiagent B-KEY environments I-KEY are O often O not O cooperative O nor O collaborative O ; O in O many O cases O , O agents B-KEY have O conflicting O interests O , O leading O to O adversarial B-KEY interactions I-KEY . O This O paper O presents O a O formal O Adversarial B-KEY Environment I-KEY model O for O bounded O rational O agents B-KEY operating O in O a O zero-sum O environment O . O In O such O environments O , O attempts O to O use O classical O utility-based O search O methods O can O raise O a O variety O of O difficulties O -LRB- O e.g. O , O implicitly O modeling O the O opponent O as O an O omniscient O utility O maximizer O , O rather O than O leveraging O a O more O nuanced O , O explicit O opponent O model O -RRB- O . O We O define O an O Adversarial B-KEY Environment I-KEY by O describing O the O mental O states O of O an O agent B-KEY in O such O an O environment O . O We O then O present O behavioral B-KEY axioms I-KEY that O are O intended O to O serve O as O design O principles O for O building O such O adversarial O agents B-KEY . O We O explore O the O application O of O our O approach O by O analyzing O log O files O of O completed O Connect-Four B-KEY games I-KEY , O and O present O an O empirical O analysis O of O the O axioms O ' O appropriateness O . O Worst-Case O Optimal O Redistribution O of O VCG O Payments O in O Heterogeneous-Item O Auctions O with O Unit O Demand O ABSTRACT O Many O important O problems O in O multiagent O systems O involve O the O allocation O of O multiple O resources O among O the O agents O . O For O resource O allocation O problems O , O the O well-known O VCG O mechanism B-KEY satisfies O a O list O of O desired O properties O , O including O efficiency O , O strategy-proofness O , O individual O rationality O , O and O the O non-deficit O property O . O However O , O VCG O is O generally O not O budget-balanced O . O Under O VCG O , O agents O pay O the O VCG O payments O , O which O reduces O social O welfare O . O To O offset O the O loss O of O social O welfare O due O to O the O VCG O payments O , O VCG O redistribution O mechanisms B-KEY were O introduced O . O These O mechanisms B-KEY aim O to O redistribute O as O much O VCG O payments O back O to O the O agents O as O possible O , O while O maintaining O the O aforementioned O desired O properties O of O the O VCG O mechanism B-KEY . O We O continue O the O search O for O worst-case O optimal O VCG O redistribution O mechanisms B-KEY -- O mechanisms B-KEY that O maximize O the O fraction O of O total O VCG O payment B-KEY redistributed I-KEY in O the O worst O case O . O Previously O , O a O worst-case O optimal O VCG O redistribution O mechanism B-KEY -LRB- O denoted O by O WCO O -RRB- O was O characterized O for O multi-unit O auctions O with O nonincreasing O marginal O values O -LSB- O 7 O -RSB- O . O Later O , O WCO O was O generalized O to O settings O involving O heterogeneous O items O -LSB- O 4 O -RSB- O , O resulting O in O the O HETERO O mechanism B-KEY . O -LSB- O 4 O -RSB- O conjectured O that O HETERO O is O feasible O and O worst-case O optimal O for O heterogeneous-item O auctions O with O unit O demand O . O In O this O paper O , O we O propose O a O more O natural O way O to O generalize O the O WCO O mechanism B-KEY . O We O prove O that O our O generalized O mechanism B-KEY , O though O represented O differently O , O actually O coincides O with O HETERO O . O Based O on O this O new O representation O of O HETERO O , O we O prove O that O HETERO O is O indeed O feasible O and O worst-case O optimal O in O heterogeneous-item O auctions O with O unit O demand O . O Finally O , O we O conjecture O that O HETERO O remains O feasible O and O worst-case O optimal O in O the O even O more O general O setting O of O combinatorial O auctions O with O gross O substitutes O . O Rewards-Based O Negotiation B-KEY for O Providing O Context O Information O ABSTRACT O How O to O provide O appropriate O context O information O is O a O challenging O problem O in O context-aware B-KEY computing O . O Most O existing O approaches O use O a O centralized O selection O mechanism O to O decide O which O context O information O is O appropriate O . O In O this O paper O , O we O propose O a O novel O approach O based O on O negotiation B-KEY with O rewards O to O solving O such O problem O . O Distributed O context B-KEY providers I-KEY negotiate B-KEY with O each O other O to O decide O who O can O provide O context O and O how O they O allocate O proceeds O . O In O order O to O support O our O approach O , O we O have O designed O a O concrete O negotiation B-KEY model O with O rewards O . O We O also O evaluate O our O approach O and O show O that O it O indeed O can O choose O an O appropriate O context B-KEY provider I-KEY and O allocate O the O proceeds O fairly O . O Topic B-KEY Segmentation I-KEY with O Shared B-KEY Topic I-KEY Detection O and O Alignment O of O Multiple O Documents O ABSTRACT O Topic B-KEY detection I-KEY and O tracking B-KEY -LSB- O 26 O -RSB- O and O topic B-KEY segmentation I-KEY -LSB- O 15 O -RSB- O play O an O important O role O in O capturing O the O local B-KEY and I-KEY sequential I-KEY information I-KEY of I-KEY documents I-KEY . O Previous O work O in O this O area O usually O focuses O on O single B-KEY documents I-KEY , O although O similar O multiple B-KEY documents I-KEY are O available O in O many O domains O . O In O this O paper O , O we O introduce O a O novel O unsupervised O method O for O shared B-KEY topic I-KEY detection O and O topic O segmentation O of O multiple O similar O documents O based O on O mutual O information O -LRB- O MI O -RRB- O and O weighted O mutual O information O -LRB- O WMI O -RRB- O that O is O a O combination O of O MI O and O term O weights O . O The O basic O idea O is O that O the O optimal O segmentation O maximizes O MI O -LRB- O or O WMI O -RRB- O . O Our O approach O can O detect O shared B-KEY topics I-KEY among O documents O . O It O can O find O the O optimal B-KEY boundaries I-KEY in O a O document O , O and O align O segments O among O documents O at O the O same O time O . O It O also O can O handle O single-document O segmentation O as O a O special O case O of O the O multi-document O segmentation O and O alignment O . O Our O methods O can O identify O and O strengthen O cue B-KEY terms I-KEY that O can O be O used O for O segmentation O and O partially O remove O stop B-KEY words I-KEY by O using O term B-KEY weights I-KEY based O on O entropy O learned O from O multiple B-KEY documents I-KEY . O Our O experimental O results O show O that O our O algorithm O works O well O for O the O tasks O of O single-document O segmentation O , O shared B-KEY topic I-KEY detection O , O and O multi-document O segmentation O . O Utilizing O information O from O multiple B-KEY documents I-KEY can O tremendously O improve O the O performance B-KEY of I-KEY topic I-KEY segmentation I-KEY , O and O using O WMI O is O even O better O than O using O MI O for O the O multi-document O segmentation O . O EDAS B-KEY : O Providing O an O Environment O for O Decentralized O Adaptive B-KEY Services O ABSTRACT O As O the O idea O of O virtualisation O of O compute O power O , O storage O and O bandwidth O becomes O more O and O more O important O , O grid B-KEY computing I-KEY evolves O and O is O applied O to O a O rising O number O of O applications O . O The O environment O for O decentralized O adaptive B-KEY services O -LRB- O EDAS O -RRB- O provides O a O grid-like O infrastructure O for O user-accessed O , O longterm O services O -LRB- O e.g. O webserver O , O source-code O repository O etc. O -RRB- O . O It O aims O at O supporting O the O autonomous O execution O and O evolution O of O services O in O terms O of O scalability O and O resource-aware O distribution O . O EDAS B-KEY offers O flexible O service O models O based O on O distributed O mobile O objects O ranging O from O a O traditional O clientserver O scenario O to O a O fully O peer-to-peer O based O approach O . O Automatic O , O dynamic O resource B-KEY management O allows O optimized O use O of O available O resources O while O minimizing O the O administrative O complexity O . O Distributed O Task B-KEY Allocation I-KEY in O Social O Networks O ABSTRACT O This O paper O proposes O a O new O variant O of O the O task B-KEY allocation I-KEY problem O , O where O the O agents O are O connected O in O a O social O network O and O tasks O arrive O at O the O agents O distributed O over O the O network O . O We O show O that O the O complexity O of O this O problem O remains O NPhard O . O Moreover O , O it O is O not O approximable O within O some O factor O . O We O develop O an O algorithm B-KEY based O on O the O contract-net O protocol O . O Our O algorithm B-KEY is O completely O distributed O , O and O it O assumes O that O agents B-KEY have O only O local O knowledge O about O tasks O and O resources B-KEY . O We O conduct O a O set O of O experiments O to O evaluate O the O performance O and O scalability O of O the O proposed O algorithm B-KEY in O terms O of O solution O quality O and O computation O time O . O Three O different O types O of O networks O , O namely O small-world O , O random O and O scale-free O networks O , O are O used O to O represent O various O social B-KEY relationships I-KEY among O agents B-KEY in O realistic O applications O . O The O results O demonstrate O that O our O algorithm B-KEY works O well O and O that O it O scales O well O to O large-scale O applications O . O Towards O Task-based O Personal B-KEY Information I-KEY Management I-KEY Evaluations O ABSTRACT O Personal B-KEY Information I-KEY Management I-KEY -LRB- O PIM O -RRB- O is O a O rapidly O growing O area O of O research O concerned O with O how O people O store O , O manage O and O re-find B-KEY information I-KEY . O A O feature O of O PIM O research O is O that O many O systems O have O been O designed O to O assist O users O manage O and O re-find B-KEY information I-KEY , O but O very O few O have O been O evaluated O . O This O has O been O noted O by O several O scholars O and O explained O by O the O difficulties O involved O in O performing O PIM O evaluations O . O The O difficulties O include O that O people O re-find B-KEY information I-KEY from O within O unique O personal O collections O ; O researchers O know O little O about O the O tasks O that O cause O people O to O re-find B-KEY information I-KEY ; O and O numerous O privacy B-KEY issues I-KEY concerning O personal O information O . O In O this O paper O we O aim O to O facilitate O PIM O evaluations O by O addressing O each O of O these O difficulties O . O In O the O first O part O , O we O present O a O diary O study O of O information O re-finding O tasks O . O The O study O examines O the O kind O of O tasks O that O require O users O to O re-find B-KEY information I-KEY and O produces O a O taxonomy B-KEY of O re-finding O tasks O for O email B-KEY messages I-KEY and O web O pages O . O In O the O second O part O , O we O propose O a O task-based O evaluation O methodology O based O on O our O findings O and O examine O the O feasibility O of O the O approach O using O two O different O methods O of O task O creation O . O Distributed O Management B-KEY of O Flexible B-KEY Times I-KEY Schedules B-KEY ABSTRACT O We O consider O the O problem O of O managing B-KEY schedules O in O an O uncertain O , O distributed O environment O . O We O assume O a O team O of O collaborative O agents O , O each O responsible O for O executing O a O portion O of O a O globally O pre-established O schedule B-KEY , O but O none O possessing O a O global O view O of O either O the O problem O or O solution O . O The O goal O is O to O maximize O the O joint O quality O obtained O from O the O activities O executed O by O all O agents O , O given O that O , O during O execution O , O unexpected O events O will O force O changes O to O some O prescribed O activities O and O reduce O the O utility O of O executing O others O . O We O describe O an O agent B-KEY architecture I-KEY for O solving O this O problem O that O couples O two O basic O mechanisms O : O -LRB- O 1 O -RRB- O a O `` O flexible B-KEY times I-KEY '' O representation O of O the O agent O 's O schedule B-KEY -LRB- O using O a O Simple O Temporal O Network O -RRB- O and O -LRB- O 2 O -RRB- O an O incremental O rescheduling O procedure O . O The O former O hedges O against O temporal O uncertainty O by O allowing O execution O to O proceed O from O a O set O of O feasible O solutions O , O and O the O latter O acts O to O revise O the O agent O 's O schedule B-KEY when O execution O is O forced O outside O of O this O set O of O solutions O or O when O execution O events O reduce O the O expected O value O of O this O feasible O solution O set O . O Basic O coordination O with O other O agents O is O achieved O simply O by O communicating O schedule B-KEY changes O to O those O agents O with O inter-dependent B-KEY activities I-KEY . O Then O , O as O time O permits O , O the O core O local O problem O solving O infra-structure O is O used O to O drive O an O inter-agent O option O generation O and O query O process O , O aimed O at O identifying O opportunities O for O solution O improvement O through O joint O change O . O Using O a O simulator O to O model O the O environment O , O we O compare O the O performance B-KEY of O our O multi-agent O system O with O that O of O an O expected O optimal O -LRB- O but O non-scalable O -RRB- O centralized O MDP O solver O . O Laplacian O Optimal O Design O for O Imag O e O Retrieval O ABSTRACT O Relevance B-KEY feedback I-KEY is O a O powerful O technique O to O enhance O ContentBased B-KEY Image I-KEY Retrieval I-KEY -LRB- O CBIR O -RRB- O performance O . O It O solicits O the O user O 's O relevance O judgments O on O the O retrieved O images O returned O by O the O CBIR O systems O . O The O user O 's O labeling B-KEY is O then O used O to O learn O a O classifier O to O distinguish O between O relevant O and O irrelevant O images O . O However O , O the O top B-KEY returned I-KEY images I-KEY may O not O be O the O most O informative O ones O . O The O challenge O is O thus O to O determine O which O unlabeled O images O would O be O the O most O informative O -LRB- O i.e. O , O improve O the O classifier O the O most O -RRB- O if O they O were O labeled B-KEY and O used O as O training O samples O . O In O this O paper O , O we O propose O a O novel O active B-KEY learning I-KEY algorithm O , O called O Laplacian O Optimal O Design O -LRB- O LOD O -RRB- O , O for O relevance B-KEY feedback I-KEY image B-KEY retrieval I-KEY . O Our O algorithm O is O based O on O a O regression O model O which O minimizes O the O least O square O error O on O the O measured O -LRB- O or O , O labeled B-KEY -RRB- O images O and O simultaneously O preserves O the O local O geometrical O structure O of O the O image O space O . O Specifically O , O we O assume O that O if O two O images O are O sufficiently O close O to O each O other O , O then O their O measurements O -LRB- O or O , O labels B-KEY -RRB- O are O close O as O well O . O By O constructing O a O nearest O neighbor O graph O , O the O geometrical O structure O of O the O image O space O can O be O described O by O the O graph O Laplacian O . O We O discuss O how O results O from O the O field O of O optimal B-KEY experimental I-KEY design I-KEY may O be O used O to O guide O our O selection O of O a O subset O of O images O , O which O gives O us O the O most O amount O of O information O . O Experimental O results O on O Corel O database O suggest O that O the O proposed O approach O achieves O higher O precision O in O relevance B-KEY feedback I-KEY image B-KEY retrieval I-KEY . O Apocrita B-KEY : O A O Distributed O Peer-to-Peer O File B-KEY Sharing I-KEY System O for O Intranets O ABSTRACT O Many O organizations O are O required O to O author B-KEY documents B-KEY for O various O purposes O , O and O such O documents B-KEY may O need O to O be O accessible O by O all O member O of O the O organization O . O This O access O may O be O needed O for O editing O or O simply O viewing O a O document B-KEY . O In O some O cases O these O documents B-KEY are O shared O between O authors B-KEY , O via O email O , O to O be O edited O . O This O can O easily O cause O incorrect O version O to O be O sent O or O conflicts O created O between O multiple O users O trying O to O make O amendments O to O a O document B-KEY . O There O may O even O be O multiple O different O documents B-KEY in O the O process O of O being O edited O . O The O user O may O be O required O to O search O for O a O particular O document B-KEY , O which O some O search O tools O such O as O Google O Desktop O may O be O a O solution O for O local O documents B-KEY but O will O not O find O a O document B-KEY on O another O user O 's O machine O . O Another O problem O arises O when O a O document B-KEY is O made O available O on O a O user O 's O machine O and O that O user O is O offline O , O in O which O case O the O document B-KEY is O no O longer O accessible O . O In O this O paper O we O present O Apocrita B-KEY , O a O revolutionary O distributed O P2P B-KEY file B-KEY sharing I-KEY system O for O Intranets O . O Mediators B-KEY in O Position B-KEY Auctions I-KEY ABSTRACT O A O mediator B-KEY is O a O reliable O entity O , O which O can O play O on O behalf O of O agents B-KEY in O a O given O game O . O A O mediator B-KEY however O can O not O enforce O the O use O of O its O services O , O and O each O agent B-KEY is O free O to O participate O in O the O game O directly O . O In O this O paper O we O introduce O a O study O of O mediators B-KEY for O games O with O incomplete O information O , O and O apply O it O to O the O context O of O position B-KEY auctions I-KEY , O a O central O topic O in O electronic O commerce O . O VCG O position B-KEY auctions I-KEY , O which O are O currently O not O used O in O practice O , O possess O some O nice O theoretical O properties O , O such O as O the O optimization O of O social O surplus O and O having O dominant O strategies O . O These O properties O may O not O be O satisfied O by O current O position B-KEY auctions I-KEY and O their O variants O . O We O therefore O concentrate O on O the O search O for O mediators B-KEY that O will O allow O to O transform O current O position B-KEY auctions I-KEY into O VCG O position O auctions O . O We O require O that O accepting O the O mediator B-KEY services O , O and O reporting O honestly O to O the O mediator B-KEY , O will O form O an O ex B-KEY post I-KEY equilibrium I-KEY , O which O satisfies O the O following O rationality O condition O : O an O agent O 's O payoff O can O not O be O negative O regardless O of O the O actions O taken O by O the O agents O who O did O not O choose O the O mediator O 's O services O , O or O by O the O agents O who O report O false O types O to O the O mediator O . O We O prove O the O existence O of O such O desired O mediators B-KEY for O the O next-price O -LRB- O Google-like O -RRB- O position B-KEY auctions I-KEY , O as O well O as O for O a O richer O class O of O position O auctions O , O including O all O k-price O position O auctions O , O k O > O 1 O . O For O k O = O 1 O , O the O self-price O position B-KEY auction I-KEY , O we O show O that O the O existence O of O such O mediator O depends O on O the O tie O breaking O rule O used O in O the O auction O . O A O Strategic O Model O for O Information B-KEY Markets I-KEY ABSTRACT O Information B-KEY markets I-KEY , O which O are O designed O specifically O to O aggregate O traders O ' O information O , O are O becoming O increasingly O popular O as O a O means O for O predicting O future O events O . O Recent O research O in O information B-KEY markets I-KEY has O resulted O in O two O new O designs O , O market B-KEY scoring I-KEY rules I-KEY and O dynamic B-KEY parimutuel I-KEY markets I-KEY . O We O develop O an O analytic O method O to O guide O the O design O and O strategic B-KEY analysis I-KEY of O information B-KEY markets I-KEY . O Our O central O contribution O is O a O new O abstract O betting O game O , O the O projection B-KEY game I-KEY , O that O serves O as O a O useful O model O for O information B-KEY markets I-KEY . O We O demonstrate O that O this O game O can O serve O as O a O strategic O model O of O dynamic B-KEY parimutuel I-KEY markets I-KEY , O and O also O captures O the O essence O of O the O strategies O in O market B-KEY scoring I-KEY rules I-KEY . O The O projection B-KEY game I-KEY is O tractable O to O analyze O , O and O has O an O attractive O geometric O visualization O that O makes O the O strategic O moves O and O interactions O more O transparent O . O We O use O it O to O prove O several O strategic O properties O about O the O dynamic B-KEY parimutuel I-KEY market I-KEY . O We O also O prove O that O a O special O form O of O the O projection B-KEY game I-KEY is O strategically O equivalent O to O the O spherical B-KEY scoring I-KEY rule I-KEY , O and O it O is O strategically O similar O to O other O scoring O rules O . O Finally O , O we O illustrate O two O applications O of O the O model O to O analysis O of O complex O strategic O scenarios O : O we O analyze O the O precision O of O a O market O in O which O traders O have O inertia O , O and O a O market O in O which O a O trader O can O profit O by O manipulating O another O trader O 's O beliefs O . O Aborting O Tasks B-KEY in O BDI O Agents B-KEY ABSTRACT O Intelligent B-KEY agents I-KEY that O are O intended O to O work O in O dynamic O environments O must O be O able O to O gracefully O handle O unsuccessful O tasks O and O plans O . O In O addition O , O such O agents B-KEY should O be O able O to O make O rational O decisions O about O an O appropriate O course O of O action O , O which O may O include O aborting O a O task B-KEY or O plan O , O either O as O a O result O of O the O agent B-KEY 's O own O deliberations O , O or O potentially O at O the O request O of O another O agent B-KEY . O In O this O paper O we O investigate O the O incorporation O of O aborts O into O a O BDI-style O architecture O . O We O discuss O some O conditions O under O which O aborting O a O task B-KEY or O plan O is O appropriate O , O and O how O to O determine O the O consequences O of O such O a O decision O . O We O augment O each O plan O with O an O optional O abort-method B-KEY , O analogous O to O the O failure B-KEY method O found O in O some O agent B-KEY programming O languages O . O We O provide O an O operational B-KEY semantics I-KEY for O the O execution O cycle O in O the O presence O of O aborts O in O the O abstract O agent B-KEY language O CAN O , O which O enables O us O to O specify O a O BDI-based O execution O model O without O limiting O our O attention O to O a O particular O agent B-KEY system O -LRB- O such O as O JACK O , O Jadex O , O Jason O , O or O SPARK O -RRB- O . O A O key O technical O challenge O we O address O is O the O presence O of O parallel O execution O threads O and O of O sub-tasks O , O which O require O the O agent O to O ensure O that O the O abort O methods O for O each O plan O are O carried O out O in O an O appropriate O sequence O . O Bullet B-KEY : O High O Bandwidth B-KEY Data B-KEY Dissemination I-KEY Using O an O Overlay O Mesh O ABSTRACT O In O recent O years O , O overlay O networks O have O become O an O effective O alternative O to O IP B-KEY multicast I-KEY for O efficient O point O to O multipoint B-KEY communication I-KEY across O the O Internet O . O Typically O , O nodes O self-organize O with O the O goal O of O forming O an O efficient O overlay O tree O , O one O that O meets O performance O targets O without O placing O undue O burden O on O the O underlying O network O . O In O this O paper O , O we O target O high-bandwidth O data O distribution O from O a O single O source O to O a O large O number O of O receivers O . O Applications O include O large-file O transfers O and O real-time O multimedia O streaming O . O For O these O applications O , O we O argue O that O an O overlay O mesh O , O rather O than O a O tree O , O can O deliver O fundamentally O higher O bandwidth B-KEY and O reliability O relative O to O typical O tree O structures O . O This O paper O presents O Bullet B-KEY , O a O scalable O and O distributed O algorithm O that O enables O nodes O spread O across O the O Internet O to O self-organize O into O a O high O bandwidth B-KEY overlay O mesh O . O We O construct O Bullet B-KEY around O the O insight O that O data O should O be O distributed O in O a O disjoint O manner O to O strategic O points O in O the O network O . O Individual O Bullet B-KEY receivers O are O then O responsible O for O locating O and O retrieving O the O data O from O multiple O points O in O parallel O . O Key O contributions O of O this O work O include O : O i O -RRB- O an O algorithm O that O sends O data O to O different O points O in O the O overlay O such O that O any O data O object O is O equally O likely O to O appear O at O any O node O , O ii O -RRB- O a O scalable O and O decentralized O algorithm O that O allows O nodes O to O locate O and O recover O missing O data O items O , O and O iii O -RRB- O a O complete O implementation O and O evaluation O of O Bullet B-KEY running O across O the O Internet O and O in O a O large-scale O emulation O environment O reveals O up O to O a O factor O two O bandwidth B-KEY improvements O under O a O variety O of O circumstances O . O In O addition O , O we O find O that O , O relative O to O tree-based O solutions O , O Bullet B-KEY reduces O the O need O to O perform O expensive O bandwidth B-KEY probing O . O In O a O tree O , O it O is O critical O that O a O node O 's O parent O delivers O a O high O rate O of O application O data O to O each O child O . O In O Bullet B-KEY however O , O nodes O simultaneously O receive O data O from O multiple O sources O in O parallel O , O making O it O less O important O to O locate O any O single O source O capable O of O sustaining O a O high O transmission O rate O . O Implementation O of O a O Dynamic O Adjustment O Mechanism O with O Efficient O Replica B-KEY Selection O in O Data O Grid O Environments O ABSTRACT O The O co-allocation B-KEY architecture O was O developed O in O order O to O enable O parallel O downloading O of O datasets O from O multiple O servers B-KEY . O Several O co-allocation B-KEY strategies O have O been O coupled O and O used O to O exploit O rate O differences O among O various O client-server O links O and O to O address O dynamic O rate O fluctuations O by O dividing O files O into O multiple O blocks O of O equal O sizes O . O However O , O a O major O obstacle O , O the O idle O time O of O faster O servers B-KEY having O to O wait O for O the O slowest O server B-KEY to O deliver O the O final O block O , O makes O it O important O to O reduce O differences O in O finishing O time O among O replica B-KEY servers B-KEY . O In O this O paper O , O we O propose O a O dynamic O coallocation O scheme O , O namely O Recursive-Adjustment O Co-Allocation B-KEY scheme O , O to O improve O the O performance B-KEY of O data B-KEY transfer I-KEY in O Data B-KEY Grids I-KEY . O Our O approach O reduces O the O idle O time O spent O waiting O for O the O slowest O server B-KEY and O decreases O data B-KEY transfer I-KEY completion O time O . O We O also O provide O an O effective O scheme O for O reducing O the O cost O of O reassembling O data O blocks O . O Using O Query B-KEY Contexts I-KEY in O Information O Retrieval O ABSTRACT O User O query O is O an O element O that O specifies O an O information B-KEY need I-KEY , O but O it O is O not O the O only O one O . O Studies O in O literature O have O found O many O contextual O factors O that O strongly O influence O the O interpretation O of O a O query O . O Recent O studies O have O tried O to O consider O the O user O 's O interests O by O creating O a O user B-KEY profile I-KEY . O However O , O a O single O profile O for O a O user O may O not O be O sufficient O for O a O variety O of O queries O of O the O user O . O In O this O study O , O we O propose O to O use O query-specific O contexts O instead O of O user-centric O ones O , O including O context O around O query O and O context O within O query O . O The O former O specifies O the O environment O of O a O query O such O as O the O domain B-KEY of I-KEY interest I-KEY , O while O the O latter O refers O to O context O words O within O the O query O , O which O is O particularly O useful O for O the O selection O of O relevant O term B-KEY relations I-KEY . O In O this O paper O , O both O types O of O context O are O integrated O in O an O IR O model O based O on O language B-KEY modeling I-KEY . O Our O experiments O on O several O TREC O collections O show O that O each O of O the O context B-KEY factors I-KEY brings O significant O improvements O in O retrieval O effectiveness O . O Self-Adaptive B-KEY Applications O on O the O Grid O Abstract O Grids O are O inherently O heterogeneous O and O dynamic O . O One O important O problem O in O grid B-KEY computing I-KEY is O resource B-KEY selection I-KEY , O that O is O , O finding O an O appropriate O resource O set O for O the O application O . O Another O problem O is O adaptation O to O the O changing O characteristics O of O the O grid B-KEY environment I-KEY . O Existing O solutions O to O these O two O problems O require O that O a O performance O model O for O an O application O is O known O . O However O , O constructing O such O models O is O a O complex O task O . O In O this O paper O , O we O investigate O an O approach O that O does O not O require O performance O models O . O We O start O an O application O on O any O set O of O resources O . O During O the O application O run O , O we O periodically O collect O the O statistics O about O the O application O run O and O deduce O application O requirements O from O these O statistics O . O Then O , O we O adjust O the O resource O set O to O better O fit O the O application O needs O . O This O approach O allows O us O to O avoid O performance O bottlenecks O , O such O as O overloaded O WAN O links O or O very O slow O processors O , O and O therefore O can O yield O significant O performance O improvements O . O We O evaluate O our O approach O in O a O number O of O scenarios O typical O for O the O Grid O . O Truthful B-KEY Mechanism I-KEY Design I-KEY for O Multi-Dimensional O Scheduling O via O Cycle O Monotonicity O ABSTRACT O We O consider O the O problem O of O makespan B-KEY minimization I-KEY on O m O unrelated O machines O in O the O context O of O algorithmic B-KEY mechanism B-KEY design I-KEY , O where O the O machines O are O the O strategic O players O . O This O is O a O multidimensional O scheduling B-KEY domain O , O and O the O only O known O positive O results O for O makespan B-KEY minimization I-KEY in O such O a O domain O are O O O -LRB- O m O -RRB- O - O approximation O truthful O mechanisms O -LSB- O 22 O , O 20 O -RSB- O . O We O study O a O well-motivated O special O case O of O this O problem O , O where O the O processing O time O of O a O job O on O each O machine O may O either O be O `` O low O '' O or O `` O high O '' O , O and O the O low O and O high O values O are O public O and O job-dependent O . O This O preserves O the O multidimensionality O of O the O domain O , O and O generalizes O the O restricted-machines O -LRB- O i.e. O , O -LCB- O pj O , O ∞ O -RCB- O -RRB- O setting O in O scheduling B-KEY . O We O give O a O general O technique O to O convert O any O c-approximation O algorithm O to O a O 3capproximation O truthful-in-expectation O mechanism O . O This O is O one O of O the O few O known O results O that O shows O how O to O export O approximation B-KEY algorithms I-KEY for O a O multidimensional O problem O into O truthful O mechanisms O in O a O black-box O fashion O . O When O the O low O and O high O values O are O the O same O for O all O jobs O , O we O devise O a O deterministic O 2-approximation O truthful O mechanism O . O These O are O the O first O truthful O mechanisms O with O non-trivial O performance O guarantees O for O a O multidimensional O scheduling B-KEY domain O . O Our O constructions O are O novel O in O two O respects O . O First O , O we O do O not O utilize O or O rely O on O explicit O price O definitions O to O prove O truthfulness O ; O instead O we O design O algorithms B-KEY that O satisfy O cycle B-KEY monotonicity I-KEY . O Cycle B-KEY monotonicity I-KEY -LSB- O 23 O -RSB- O is O a O necessary O and O sufficient O condition O for O truthfulness O , O is O a O generalization O of O value O monotonicity O for O multidimensional O domains O . O However O , O whereas O value O monotonicity O has O been O used O extensively O and O successfully O to O design O truthful O mechanisms O in O singledimensional O domains O , O ours O is O the O first O work O that O leverages O cycle B-KEY monotonicity I-KEY in O the O multidimensional O setting O . O Second O , O our O randomized B-KEY mechanisms I-KEY are O obtained O by O first O constructing O a O fractional O truthful O mechanism O for O a O fractional O relaxation O of O the O problem O , O and O then O converting O it O into O a O truthfulin-expectation O mechanism O . O This O builds O upon O a O technique O of O -LSB- O 16 O -RSB- O , O and O shows O the O usefulness O of O fractional O mechanisms O in O truthful B-KEY mechanism I-KEY design I-KEY . O Frugality B-KEY Ratios O And O Improved O Truthful O Mechanisms O for O Vertex O Cover O * O In O set-system O auctions B-KEY , O there O are O several O overlapping O teams O of O agents O , O and O a O task O that O can O be O completed O by O any O of O these O teams O . O The O auctioneer B-KEY 's O goal O is O to O hire O a O team O and O pay O as O little O as O possible O . O Examples O of O this O setting O include O shortest-path O auctions B-KEY and O vertex-cover O auctions B-KEY . O Recently O , O Karlin O , O Kempe O and O Tamir O introduced O a O new O definition O offrugality O ratio O for O this O problem O . O Informally O , O the O `` O frugality B-KEY ratio O '' O is O the O ratio O of O the O total O payment O of O a O mechanism O to O a O desired O payment O bound O . O The O ratio O captures O the O extent O to O which O the O mechanism O overpays O , O relative O to O perceived O fair O cost O in O a O truthful O auction B-KEY . O In O this O paper O , O we O propose O a O new O truthful O polynomial-time O auction B-KEY for O the O vertex B-KEY cover I-KEY problem O and O bound O its O frugality B-KEY ratio O . O We O show O that O the O solution O quality O is O with O a O constant O factor O of O optimal O and O the O frugality B-KEY ratio O is O within O a O constant O factor O of O the O best O possible O worst-case O bound O ; O this O is O the O first O auction O for O this O problem O to O have O these O properties O . O Moreover O , O we O show O how O to O transform O any O truthful O auction B-KEY into O a O frugal B-KEY one O while O preserving O the O approximation O ratio O . O Also O , O we O consider O two O natural O modifications O of O the O definition O of O Karlin O et O al. O , O and O we O analyse O the O properties O of O the O resulting O payment O bounds O , O such O as O monotonicity O , O computational O hardness O , O and O robustness O with O respect O to O the O draw-resolution O rule O . O We O study O the O relationships O between O the O different O payment O bounds O , O both O for O general O set O systems O and O for O specific O set-system O auctions B-KEY , O such O as O path O auctions B-KEY and O vertex-cover O auctions B-KEY . O We O use O these O new O definitions O in O the O proof O of O our O main O result O for O vertex-cover O auctions B-KEY via O a O bootstrapping B-KEY technique I-KEY , O which O may O be O of O independent O interest O . O Information B-KEY Searching I-KEY and I-KEY Sharing I-KEY in O Large-Scale O Dynamic O Networks O ABSTRACT O Finding O the O right O agents O in O a O large O and O dynamic O network O to O provide O the O needed O resources O in O a O timely O fashion O , O is O a O long O standing O problem O . O This O paper O presents O a O method O for O information B-KEY searching I-KEY and I-KEY sharing I-KEY that O combines O routing O indices O with O tokenbased O methods O . O The O proposed O method O enables O agents O to O search O effectively O by O acquiring O their O neighbors O ' O interests O , O advertising O their O information O provision O abilities O and O maintaining O indices O for O routing O queries O , O in O an O integrated O way O . O Specifically O , O the O paper O demonstrates O through O performance B-KEY experiments O how O static O and O dynamic O networks O of O agents O can O be O ` O tuned O ' O to O answer O queries O effectively O as O they O gather O evidence O for O the O interests O and O information O provision O abilities O of O others O , O without O altering O the O topology O or O imposing O an O overlay O structure O to O the O network O of O acquaintances O . O Trading B-KEY Networks I-KEY with O Price-Setting O Agents O ABSTRACT O In O a O wide O range O of O markets B-KEY , O individual O buyers O and O sellers O often O trade O through O intermediaries O , O who O determine O prices O via O strategic O considerations O . O Typically O , O not O all O buyers O and O sellers O have O access O to O the O same O intermediaries O , O and O they O trade O at O correspondingly O different O prices O that O reflect O their O relative O amounts O of O power O in O the O market B-KEY . O We O model O this O phenomenon O using O a O game O in O which O buyers O , O sellers O , O and O traders O engage O in O trade O on O a O graph O that O represents O the O access O each O buyer O and O seller O has O to O the O traders O . O In O this O model O , O traders O set O prices O strategically O , O and O then O buyers O and O sellers O react O to O the O prices O they O are O offered O . O We O show O that O the O resulting O game O always O has O a O subgame O perfect O Nash O equilibrium O , O and O that O all O equilibria O lead O to O an O efficient O -LRB- O i.e. O socially O optimal O -RRB- O allocation O of O goods O . O We O extend O these O results O to O a O more O general O type O of O matching O market B-KEY , O such O as O one O finds O in O the O matching O of O job O applicants O and O employers O . O Finally O , O we O consider O how O the O profits O obtained O by O the O traders O depend O on O the O underlying O graph O -- O roughly O , O a O trader O can O command O a O positive O profit O if O and O only O if O it O has O an O `` O essential O '' O connection O in O the O network O structure O , O thus O providing O a O graph-theoretic O basis O for O quantifying O the O amount O of O competition O among O traders O . O Our O work O differs O from O recent O studies O of O how O price O is O affected O by O network O structure O through O our O modeling O of O price-setting O as O a O strategic O activity O carried O out O by O a O subset O of O agents O in O the O system O , O rather O than O studying O prices O set O via O competitive O equilibrium O or O by O a O truthful O mechanism O . O An O Initial O Analysis O and O Presentation O of O Malware B-KEY Exhibiting O Swarm-Like O Behavior O ABSTRACT O The O Slammer O , O which O is O currently O the O fastest O computer O worm O in O recorded O history O , O was O observed O to O infect O 90 O percent O of O all O vulnerable O Internets O hosts O within O 10 O minutes O . O Although O the O main O action O that O the O Slammer B-KEY worm I-KEY takes O is O a O relatively O unsophisticated O replication O of O itself O , O it O still O spreads O so O quickly O that O human O response O was O ineffective O . O Most O proposed O countermeasures O strategies O are O based O primarily O on O rate O detection O and O limiting O algorithms O . O However O , O such O strategies O are O being O designed O and O developed O to O effectively O contain O worms O whose O behaviors O are O similar O to O that O of O Slammer O . O In O our O work O , O we O put O forth O the O hypothesis O that O next O generation O worms O will O be O radically O different O , O and O potentially O such O techniques O will O prove O ineffective O . O Specifically O , O we O propose O to O study O a O new O generation O of O worms O called O '' O Swarm B-KEY Worms I-KEY '' O , O whose O behavior O is O predicated O on O the O concept O of O '' O emergent B-KEY intelligence I-KEY '' O . O Emergent B-KEY Intelligence I-KEY is O the O behavior O of O systems O , O very O much O like O biological O systems O such O as O ants O or O bees O , O where O simple O local O interactions O of O autonomous O members O , O with O simple O primitive O actions O , O gives O rise O to O complex O and O intelligent O global O behavior O . O In O this O manuscript O we O will O introduce O the O basic O principles O behind O the O idea O of O '' O Swarm B-KEY Worms I-KEY '' O , O as O well O as O the O basic O structure O required O in O order O to O be O considered O a O '' O swarm B-KEY worm I-KEY '' O . O In O addition O , O we O will O present O preliminary O results O on O the O propagation O speeds O of O one O such O swarm B-KEY worm I-KEY , O called O the O ZachiK B-KEY worm O . O We O will O show O that O ZachiK B-KEY is O capable O of O propagating O at O a O rate O 2 O orders O of O magnitude O faster O than O similar O worms O without O swarm O capabilities O . O Betting O on O Permutations O ABSTRACT O We O consider O a O permutation B-KEY betting I-KEY scenario O , O where O people O wager O on O the O final O ordering O of O n O candidates O : O for O example O , O the O outcome O of O a O horse O race O . O We O examine O the O auctioneer O problem O of O risklessly O matching O up O wagers O or O , O equivalently O , O finding O arbitrage O opportunities O among O the O proposed O wagers O . O Requiring O bidders O to O explicitly O list O the O orderings O that O they O 'd O like O to O bet O on O is O both O unnatural O and O intractable O , O because O the O number O of O orderings O is O n O ! O and O the O number O of O subsets O of O orderings O is O 2n O ! O . O We O propose O two O expressive B-KEY betting I-KEY languages O that O seem O natural O for O bidders O , O and O examine O the O computational B-KEY complexity I-KEY of O the O auctioneer O problem O in O each O case O . O Subset B-KEY betting I-KEY allows O traders O to O bet O either O that O a O candidate O will O end O up O ranked O among O some O subset O of O positions O in O the O final O ordering O , O for O example O , O `` O horse O A O will O finish O in O positions O 4 O , O 9 O , O or O 13-21 O '' O , O or O that O a O position O will O be O taken O by O some O subset O of O candidates O , O for O example O `` O horse O A O , O B O , O or O D O will O finish O in O position O 2 O '' O . O For O subset B-KEY betting I-KEY , O we O show O that O the O auctioneer O problem O can O be O solved O in O polynomial O time O if O orders O are O divisible O . O Pair O betting O allows O traders O to O bet O on O whether O one O candidate O will O end O up O ranked O higher O than O another O candidate O , O for O example O `` O horse O A O will O beat O horse O B O '' O . O We O prove O that O the O auctioneer O problem O becomes O NP-hard O for O pair O betting O . O We O identify O a O sufficient O condition O for O the O existence O of O a O pair O betting O match O that O can O be O verified O in O polynomial O time O . O We O also O show O that O a O natural O greedy B-KEY algorithm I-KEY gives O a O poor O approximation O for O indivisible O orders O . O Design O and O Implementation O of O a O Distributed B-KEY Content I-KEY Management I-KEY System O ABSTRACT O The O convergence O of O advances O in O storage O , O encoding O , O and O networking O technologies O has O brought O us O to O an O environment O where O huge O amounts O of O continuous O media O content O is O routinely O stored O and O exchanged O between O network O enabled O devices O . O Keeping O track O of O -LRB- O or O managing O -RRB- O such O content O remains O challenging O due O to O the O sheer O volume O of O data O . O Storing O `` O live O '' O continuous O media O -LRB- O such O as O TV O or O radio O content O -RRB- O adds O to O the O complexity O in O that O this O content O has O no O well O defined O start O or O end O and O is O therefore O cumbersome O to O deal O with O . O Networked O storage O allows O content O that O is O logically O viewed O as O part O of O the O same O collection O to O in O fact O be O distributed O across O a O network O , O making O the O task O of O content O management O all O but O impossible O to O deal O with O without O a O content O management O system O . O In O this O paper O we O present O the O design O and O implementation O of O the O Spectrum B-KEY content I-KEY management I-KEY system I-KEY , O which O deals O with O rich O media O content O effectively O in O this O environment O . O Spectrum O has O a O modular O architecture O that O allows O its O application O to O both O stand-alone O and O various O networked O scenarios O . O A O unique O aspect O of O Spectrum O is O that O it O requires O one O -LRB- O or O more O -RRB- O retention O policies O to O apply O to O every O piece O of O content O that O is O stored O in O the O system O . O This O means O that O there O are O no O eviction O policies O . O Content O that O no O longer O has O a O retention O policy O applied O to O it O is O simply O removed O from O the O system O . O Different O retention O policies O can O easily O be O applied O to O the O same O content O thus O naturally O facilitating O sharing O without O duplication O . O This O approach O also O allows O Spectrum O to O easily O apply O time O based O policies O which O are O basic O building O blocks O required O to O deal O with O the O storage O of O live O continuous O media O , O to O content O . O We O not O only O describe O the O details O of O the O Spectrum O architecture O but O also O give O typical O use O cases O . O Latent O Concept O Expansion O Using O Markov B-KEY Random I-KEY Fields I-KEY ABSTRACT O Query B-KEY expansion I-KEY , O in O the O form O of O pseudo-relevance B-KEY feedback I-KEY or O relevance O feedback O , O is O a O common O technique O used O to O improve O retrieval O effectiveness O . O Most O previous O approaches O have O ignored O important O issues O , O such O as O the O role O of O features O and O the O importance O of O modeling O term O dependencies O . O In O this O paper O , O we O propose O a O robust O query B-KEY expansion I-KEY technique O based O on O the O Markov O random O field O model O for O information O retrieval O . O The O technique O , O called O latent O concept O expansion O , O provides O a O mechanism O for O modeling O term O dependencies O during O expansion O . O Furthermore O , O the O use O of O arbitrary O features O within O the O model O provides O a O powerful O framework O for O going O beyond O simple O term O occurrence O features O that O are O implicitly O used O by O most O other O expansion O techniques O . O We O evaluate O our O technique O against O relevance O models O , O a O state-of-the-art O language O modeling O query B-KEY expansion I-KEY technique O . O Our O model O demonstrates O consistent O and O significant O improvements O in O retrieval O effectiveness O across O several O TREC O data O sets O . O We O also O describe O how O our O technique O can O be O used O to O generate O meaningful O multi-term O concepts O for O tasks O such O as O query O suggestion/reformulation O . O Meta-Level O Coordination O for O Solving O Negotiation B-KEY Chains I-KEY in O Semi-Cooperative O Multi-Agent O Systems O ABSTRACT O A O negotiation B-KEY chain I-KEY is O formed O when O multiple O related O negotiations O are O spread O over O multiple B-KEY agents I-KEY . O In O order O to O appropriately O order O and O structure O the O negotiations O occurring O in O the O chain O so O as O to O optimize O the O expected O utility O , O we O present O an O extension O to O a O singleagent O concurrent O negotiation B-KEY framework I-KEY . O This O work O is O aimed O at O semi-cooperative O multi-agent O systems O , O where O each O agent B-KEY has O its O own O goals O and O works O to O maximize O its O local O utility O ; O however O , O the O performance O of O each O individual O agent B-KEY is O tightly O related O to O other O agent B-KEY 's O cooperation O and O the O system O 's O overall O performance O . O We O introduce O a O pre-negotiation B-KEY phase O that O allows O agents B-KEY to O transfer O meta-level O information O . O Using O this O information O , O the O agent B-KEY can O build O a O more O accurate O model O of O the O negotiation O in O terms O of O modeling O the O relationship O of O flexibility B-KEY and O success O probability O . O This O more O accurate O model O helps O the O agent B-KEY in O choosing O a O better O negotiation O solution O in O the O global O negotiation B-KEY chain I-KEY context O . O The O agent B-KEY can O also O use O this O information O to O allocate O appropriate O time O for O each O negotiation O , O hence O to O find O a O good O ordering O of O all O related O negotiations O . O The O experimental O data O shows O that O these O mechanisms O improve O the O agents B-KEY ' O and O the O system O 's O overall O performance O significantly O . O The O Influence O of O Caption B-KEY Features I-KEY on O Clickthrough B-KEY Patterns I-KEY in O Web B-KEY Search I-KEY ABSTRACT O Web B-KEY search I-KEY engines O present O lists O of O captions O , O comprising O title O , O snippet B-KEY , O and O URL O , O to O help O users O decide O which O search O results O to O visit O . O Understanding O the O influence O of O features O of O these O captions O on O Web B-KEY search I-KEY behavior O may O help O validate O algorithms O and O guidelines O for O their O improved O generation O . O In O this O paper O we O develop O a O methodology O to O use O clickthrough O logs O from O a O commercial O search O engine O to O study O user O behavior O when O interacting O with O search O result O captions O . O The O findings O of O our O study O suggest O that O relatively O simple O caption B-KEY features I-KEY such O as O the O presence O of O all O terms O query O terms O , O the O readability O of O the O snippet B-KEY , O and O the O length O of O the O URL O shown O in O the O caption O , O can O significantly O influence O users O ' O Web B-KEY search I-KEY behavior O . O Utility-based O Information O Distillation O Over O Temporally O Sequenced O Documents O ABSTRACT O This O paper O examines O a O new O approach O to O information O distillation O over O temporally B-KEY ordered I-KEY documents I-KEY , O and O proposes O a O novel O evaluation O scheme O for O such O a O framework O . O It O combines O the O strengths O of O and O extends O beyond O conventional O adaptive B-KEY filtering I-KEY , O novelty B-KEY detection I-KEY and O non-redundant O passage B-KEY ranking I-KEY with O respect O to O long-lasting O information O needs O -LRB- O ` O tasks O ' O with O multiple O queries O -RRB- O . O Our O approach O supports O fine-grained O user O feedback O via O highlighting O of O arbitrary O spans O of O text O , O and O leverages O such O information O for O utility O optimization O in O adaptive O settings O . O For O our O experiments O , O we O defined O hypothetical O tasks O based O on O news O events O in O the O TDT4 O corpus O , O with O multiple O queries O per O task O . O Answer O keys O -LRB- O nuggets O -RRB- O were O generated O for O each O query O and O a O semiautomatic O procedure O was O used O for O acquiring O rules O that O allow O automatically O matching O nuggets O against O system O responses O . O We O also O propose O an O extension O of O the O NDCG B-KEY metric I-KEY for O assessing O the O utility O of O ranked O passages O as O a O combination O of O relevance O and O novelty O . O Our O results O show O encouraging O utility O enhancements O using O the O new O approach O , O compared O to O the O baseline O systems O without O incremental O learning O or O the O novelty B-KEY detection I-KEY components O . O Operation B-KEY Context I-KEY and O Context-based O Operational B-KEY Transformation I-KEY ABSTRACT O Operational B-KEY Transformation I-KEY -LRB- O OT B-KEY -RRB- O is O a O technique O for O consistency B-KEY maintenance I-KEY and O group O undo B-KEY , O and O is O being O applied O to O an O increasing O number O of O collaborative O applications O . O The O theoretical O foundation O for O OT B-KEY is O crucial O in O determining O its O capability O to O solve O existing O and O new O problems O , O as O well O as O the O quality O of O those O solutions O . O The O theory O of O causality O has O been O the O foundation O of O all O prior O OT B-KEY systems O , O but O it O is O inadequate O to O capture O essential O correctness O requirements O . O Past O research O had O invented O various O patches O to O work O around O this O problem O , O resulting O in O increasingly O intricate O and O complicated O OT B-KEY algorithms O . O After O having O designed O , O implemented O , O and O experimented O with O a O series O of O OT B-KEY algorithms O , O we O reflected O on O what O had O been O learned O and O set O out O to O develop O a O new O theoretical O framework O for O better O understanding O and O resolving O OT B-KEY problems O , O reducing O its O complexity O , O and O supporting O its O continual O evolution O . O In O this O paper O , O we O report O the O main O results O of O this O effort O : O the O theory O of O operation B-KEY context I-KEY and O the O COT B-KEY -LRB- O Context-based O OT B-KEY -RRB- O algorithm O . O The O COT B-KEY algorithm O is O capable O of O supporting O both O do O and O undo B-KEY of O any O operations O at O anytime O , O without O requiring O transformation O functions O to O preserve O Reversibility O Property O , O Convergence O Property O 2 O , O Inverse O Properties O 2 O and O 3 O . O The O COT B-KEY algorithm O is O not O only O simpler O and O more O efficient O than O prior O OT B-KEY control O algorithms O , O but O also O simplifies O the O design O of O transformation O functions O . O We O have O implemented O the O COT B-KEY algorithm O in O a O generic O collaboration O engine O and O used O it O for O supporting O a O range O of O novel O collaborative O applications O . O