An Open System for Social Computation

Part of the power of social computation comes from using the collective intelligence of humans to tame the aggregate uncertainty of (otherwise) low verac- ity data obtained from human and automated sources. We have witnessed a surge in development of social computing systems but, ironically, there have been few attempts to generalise across this activity so that creation of the underlying mechanisms themselves can be made more social. We describe a method for achieving this by standardising patterns of social computation via lightweight formal specifications (we call these social artifacts) that can be connected to existing internet architectures via a single model of computation. Upon this framework we build a mechanism for extracting provenance meta-data across social computations.

[1]  Nardine Osman,et al.  Dynamic Verification of Trust in Distributed Open Systems , 2007, IJCAI.

[2]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[3]  Lydia B. Chilton,et al.  TurKit: human computation algorithms on mechanical turk , 2010, UIST.

[4]  David Stuart Robertson,et al.  Multi-agent Coordination as Distributed Logic Programming , 2004, ICLP.

[5]  Matthew R. Pocock,et al.  Taverna: a tool for the composition and enactment of bioinformatics workflows , 2004, Bioinform..

[6]  Xi Bai Peer-to-peer, multi-agent interaction adapted to a web architecture , 2013 .

[7]  D. Clery Galaxy evolution. Galaxy zoo volunteers share pain and glory of research. , 2011, Science.

[8]  Marc Esteva,et al.  ISLANDER: an electronic institutions editor , 2002, AAMAS '02.

[9]  Jacques Bus,et al.  Personal Data Management - A Structured Discussion , 2013 .

[10]  Manuel Blum,et al.  reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.

[11]  Frank van Harmelen,et al.  Models of Interaction as a Grounding for Peer to Peer Knowledge Sharing , 2008, Advances in Web Semantics I.

[12]  Z. Popovic,et al.  Crystal structure of a monomeric retroviral protease solved by protein folding game players , 2011, Nature Structural &Molecular Biology.

[13]  Paul T. Groth,et al.  Provenance: An Introduction to PROV , 2013, Provenance.

[14]  Alex Pentland,et al.  Pickard Time-Critical Social Mobilization , 2011 .

[15]  Siani Pearson,et al.  Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.

[16]  E. Krabbe Games that agents play: A formal framework for dialogues between autonomous agents , 2001 .