Papers by Maksim Tsvetovat
Multi-agent systems can be effective tools for reasoning about human and group behavior. Their ef... more Multi-agent systems can be effective tools for reasoning about human and group behavior. Their effectiveness is enhanced when the algorithms lead the simulated agents to behave as humans behave, rather than doing what is optimal for the task. Such systems are even more effective when the model's inputs are real data and the generated outputs are comparable to actual data files in the real world.
Abstract In this paper we adapt Axelrod's metanorms model to run on arbitrary interaction structu... more Abstract In this paper we adapt Axelrod's metanorms model to run on arbitrary interaction structures. We propose a hybrid analytical methodology combining computer simulations with a novel mathematical approach that abstracts some details of evolutionary dynamics while retaining explicit and exact representation of underlying network topology.
Abstract: Given the increasing threat of terrorism and spread of terrorist organizations, it is o... more Abstract: Given the increasing threat of terrorism and spread of terrorist organizations, it is of vital importance to understand the properties of such organizations and to devise successful strategies for destabilizing them or decreasing their efficiency. However, intelligence information on these organizations is often incomplete, inaccurate or simply not available. This makes the study of terrorist networks and the evaluation of destabilization strategies difficult.
Abstract In an automated contracting environment, where a contractor agent must negotiate with ot... more Abstract In an automated contracting environment, where a contractor agent must negotiate with other self-interested supplier agents in order to execute its plans, there is a tradeoff between giving the suppliers sufficient flexibility to incorporate the requirements of the contractor's call-for-bids into their own resource schedules, and ensuring the contractor that any bids received can be composed into a feasible plan.
Abstract: Testing large-scale dynamic network simulation packages, such as NetWatch, requires a l... more Abstract: Testing large-scale dynamic network simulation packages, such as NetWatch, requires a large quantity of test data to be available for each of the experiments. The test data includes initial topologies of agents' social networks and specification of knowledge networks for each of the agents to fit an empirically derived distribution of knowledge.
Abstract In an automated contracting environment, where a" contractor" agent must negotiate with ... more Abstract In an automated contracting environment, where a" contractor" agent must negotiate with other selfinterested" supplier" agents in order to execute its plans, there is a tradeoff between giving the suppliers sufficient flexibility to incorporate the requirements of the contractor's call-for-bids into their own resource schedules, and ensuring that any bids received can be composed into a feasible plan.
Abstract On December 16, 2005, a New York Times article [31] revealed that in the immediate after... more Abstract On December 16, 2005, a New York Times article [31] revealed that in the immediate aftermath of the September 11th attacks, the US Government began a broad program of domestic signal intelligence collection. As press reports indicated [28], NSA implemented its new collections program based on the snowball sampling methods, which is generally used in surveying hidden populations and networks.
Abstract. Bid evaluation in a multi-agent automated contracting environment presents a challengin... more Abstract. Bid evaluation in a multi-agent automated contracting environment presents a challenging search problem. We introduce a multicriterion, anytime bid evaluation strategy that incorporates cost, task coverage, temporal feasibility, and risk estimation into a simulated annealing framework. We report on an experimental evaluation using a set of increasingly informed search heuristics within simulated annealing.
1 In the last few years, the electronic marketplace has witnessed an exponential growth in worth ... more 1 In the last few years, the electronic marketplace has witnessed an exponential growth in worth and size, and projections are for this trend to intensify in coming years. Yet, the tools available to market players are very limited, thus imposing restrictions on their ability to exploit market opportunities. While the Internet offers great possibilities for creation of spontaneous communities, this potential has not been explored as a means for creating economies of scale among similar-minded customers.
Abstract U-Mart International Experiment (UMIE 200x) has held by U-Mart Organizing Committee and ... more Abstract U-Mart International Experiment (UMIE 200x) has held by U-Mart Organizing Committee and U-Mart System Operating Committee since 2002. This is the annual series of open experiment of artificial market using U-Mart System–virtual futures market of stock index. Machine agents were recruited publicly and compete their performance of investment each other.
Abstract This paper seeks to expand upon what we know regarding the structure of interest group n... more Abstract This paper seeks to expand upon what we know regarding the structure of interest group networks. To explore the potential for Social Network Analysis in the larger context of group behavior and information sharing, we make use of existing federal contribution data to explore how non-corporate political action committees are linked to one another at the federal level via regulated campaign finance. Thus, we explore the density of networks, who the central players are and group relationships with respect to investment behavior.
Abstract. It has been observed in many instances that markets have a tendency to segment themselv... more Abstract. It has been observed in many instances that markets have a tendency to segment themselves into distinct sub-markets. This paper presents a multi-agent model that illustrates emergent market segmentation. The model illustrates the way local optimization processes result in an emergent global behavior.
Abstract We describe an approach to agent-based contracting that combines the advantages of autom... more Abstract We describe an approach to agent-based contracting that combines the advantages of automated negotiation and evaluation of alternatives, with the realities of human decision-making and authority. The MAGNET architecture for multi-agent automated contracting provides a secure market-based infrastructure for complex negotiation, including an extensible ontology layer that defines the terms of discourse for inter-agent communication.
Abstract: Given the increasing threat of terrorism and spread of terrorist organizations, it is o... more Abstract: Given the increasing threat of terrorism and spread of terrorist organizations, it is of vital importance to understand the properties of such organizations and to devise successful strategies for destabilizing them or decreasing their efficiency. However, intelligence information on these organizations is often incomplete, inaccurate or simply not available. This makes the study of terrorist networks and the evaluation of destabilization strategies difficult.
To facilitate the analysis of real and simulated data on groups, organizations and societies, too... more To facilitate the analysis of real and simulated data on groups, organizations and societies, tools and measures are needed that can handle relational or network data that is multi-mode, multi-link and multi-time period in which nodes and edges have attributes with possible data errors and missing data. The integrated CASOS dynamic network analysis toolkit described in this paper is an interoperable set of scalable software tools.
Link mining, social network and semantic network construction are data fitting problems for which... more Link mining, social network and semantic network construction are data fitting problems for which relevant information content is encoded in language and names. Norbert Wiener [7] noted that those features that distinguish human communication are “...(1) the delicacy and complexity of the code used, and (2) the high degree of arbitrariness of this code.”
Abstract We define a universal data interchange format to enable exchange of rich social network ... more Abstract We define a universal data interchange format to enable exchange of rich social network data and improve compatibility of analysis and visualization tools. DyNetML is an XML-derived language that provides means to express rich social network data. DyNetML also provides an extensible facility for linking anthropological, process description and other data with social networks. DyNetML has been implemented and in use by the CASOS group at Carnegie Mellon University as a data interchange format.
Abstract. In this paper, we introduce a computational model of asymmetric conflict between organi... more Abstract. In this paper, we introduce a computational model of asymmetric conflict between organizations. First, we describe a tactical simulation of organizational behavior and learning, based on Belief-Desire-Intention heuristics. Later, we introduce strategic reasoning using n-th order rationality and anchor it within the tactical simulation. The paper concludes with tests of our approach using artificial scenarios. Key words: Multiagent Simulation, Organizational Learning, Bounded Rationality, Irregular Warfare
In the field of social network analysis, we are used to competing – sometimes contradictory – the... more In the field of social network analysis, we are used to competing – sometimes contradictory – theories coexisting with each other for decades. For example, let's take the idea of homophily [12], a promising theory of why and how social networks form – that states that people are more likely to form ties with others that are similar (”birds of a feather flock together”).
Uploads
Papers by Maksim Tsvetovat