Computer Science
Permanent URI for this collectionhttps://hdl.handle.net/10679/9120
Browse
Browsing by Indexed at "SCOPUS"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Conference ObjectPublication Metadata only Effects of agent's embodiment in human-agent negotiations(ACM, 2023-09-19) Çakan, Umut; Keskin, Mehmet Onur; Aydoǧan, Reyhan; Computer Science; AYDOĞAN, Reyhan; Çakan, Umut; Keskin, Mehmet OnurHuman-agent negotiation has recently attracted researchers’ attention due to its complex nature and potential usage in daily life scenarios. While designing intelligent negotiating agents, they mainly focus on the interaction protocol (i.e., what to exchange and how) and strategy (i.e., how to generate offers and when to accept). Apart from these components, the embodiment may implicitly influence the negotiation process and outcome. The perception of a physically embodied agent might differ from the virtually embodied one; thus, it might influence human negotiators’ decisions and responses. Accordingly, this work empirically studies the effect of physical and virtual embodiment in human-agent negotiations. We designed and conducted experiments where human participants negotiate with a humanoid robot in one setting, whereas they negotiate with a virtually embodied replica of that robot in another setting. The experimental results showed that social welfare was statistically significantly higher when the negotiation was held with a virtually embodied robot rather than a physical robot. Human participants took the negotiation more seriously against physically embodied agents and made more collaborative moves in the virtual setting. Furthermore, their survey responses indicate that participants perceived our robot as more humanlike when it is physically embodied.ArticlePublication Metadata only Provenance aware run-time verification of things for self-healing Internet of Things applications(Wiley, 2019-02-10) Aktas, M. S.; Astekin, Merve; Astekin, MerveWe propose a run-time verification mechanism of things for self-healing capability in the Internet of Things domain. We discuss the software architecture of the proposed verification mechanism and its prototype implementations. To identify faulty running behavior of things, we utilize a complex event processing technique by applying rule-based pattern detection on the events generated real time. For events, we use a descriptor metadata of the measurements (such as CPU usage, memory usage, and bandwidth usage) taken from Internet of Things devices. To understand the usability and effectiveness of the proposed mechanism, we developed prototype applications using different event processing platforms. We test the prototype implementations for performance and scalability under increasing message rates. The results are promising because the processing overhead of the proposed verification mechanism is negligible.ArticlePublication Open Access Towards interactive explanation-based nutrition virtual coaching systems(Springer, 2024-01) Buzcu, Berk; Tessa, M.; Tchappi, I.; Najjar, A.; Hulstijn, J.; Calvaresi, D.; Aydoğan, Reyhan; Computer Science; AYDOĞAN, Reyhan; Buzcu, BerkThe awareness about healthy lifestyles is increasing, opening to personalized intelligent health coaching applications. A demand for more than mere suggestions and mechanistic interactions has driven attention to nutrition virtual coaching systems (NVC) as a bridge between human–machine interaction and recommender, informative, persuasive, and argumentation systems. NVC can rely on data-driven opaque mechanisms. Therefore, it is crucial to enable NVC to explain their doing (i.e., engaging the user in discussions (via arguments) about dietary solutions/alternatives). By doing so, transparency, user acceptance, and engagement are expected to be boosted. This study focuses on NVC agents generating personalized food recommendations based on user-specific factors such as allergies, eating habits, lifestyles, and ingredient preferences. In particular, we propose a user-agent negotiation process entailing run-time feedback mechanisms to react to both recommendations and related explanations. Lastly, the study presents the findings obtained by the experiments conducted with multi-background participants to evaluate the acceptability and effectiveness of the proposed system. The results indicate that most participants value the opportunity to provide feedback and receive explanations for recommendations. Additionally, the users are fond of receiving information tailored to their needs. Furthermore, our interactive recommendation system performed better than the corresponding traditional recommendation system in terms of effectiveness regarding the number of agreements and rounds.Conference ObjectPublication Metadata only Towards test automation for certification tests in the banking domain(IEEE, 2023) Elakas, A.; Tarlan, Ozan; Safak, I.; Çakmakçı, Kübra Kalkan; Sözer, Hasan; Computer Science; SÖZER, Hasan; ÇAKMAKCİ, Kübra Kalkan; Tarlan, OzanSoftware systems in the banking domain are business-critical applications that provide financial services. These systems are subject to rigorous certification tests, which are performed manually, and take weeks to complete. In this paper, we suggest that automation of the certificate tests are possible and it will save a considerable amount of time. A certification testing operation which can take a few weeks can be reduced to a few seconds. Firstly, we review the existing test activities to identify the ones that can be automated and introduce a prototype tool for automating some of the tests used for certification. We focus on rules that are verified by analyzing the banking infrastructure. Our tool takes the network topology of the banking infrastructure as input and verifies a subset of these rules. The tool can be extended with additional rules in order to reduce the effort for certification tests. In addition to this tool, we introduce softwaredefined network-based tests to automatically verify compliance with the rules by checking the firewall constraints and host connections. In particular, we focus on a security certification standard named Payment Card Industry Data Security Standard. This certification aims to reduce the risk of data breaches in cardholder data by ensuring industry standard practices for payment card transactions. Our tool offers effort reduction in auditing through automation. It supports continuous auditing and network security enhancement processes.