Searched for: subject%3A%22elicitation%22
(1 - 20 of 28)

Pages

document
Corrente, Salvatore (author), Greco, Salvatore (author), Rezaei, J. (author)
Despite its recent introduction in literature, the Best–Worst Method (BWM) is among the most well-known and applied methods in Multicriteria Decision-Making. The method can be used to elicit the relative importance (weight) of the criteria as well as to get the priorities of the alternatives on the criteria at hand. In this paper, we will...
journal article 2024
document
Raja, A.A. (author), Pinson, Pierre (author), Kazempour, Jalal (author), Grammatico, S. (author)
In many areas of industry and society, including energy, healthcare, and logistics, agents collect vast amounts of data that are deemed proprietary. These data owners extract predictive information of varying quality and relevance from data depending on quantity, inherent information content, and their own technical expertise. Aggregating...
journal article 2024
document
Kastelein, Pien (author)
This research paper focuses on the accuracy and limitations of user values elicited through a textual interface with questions asked in isolation. The primary objective was to conduct a user study using a textual interface that uses questions in isolation to assess the effectiveness and accuracy of this interface type and questioning style. The...
bachelor thesis 2023
document
Mendez, Selena (author)
The alignment of behavior support systems with our personal values becomes increasingly important as behavior support systems continue to influence our daily lives. The purpose of this paper was to explore the use of graphical interfaces and isolation questions to elicit personal values and build accurate user models. An experiment was conducted...
bachelor thesis 2023
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André M.H. (author), van Gelder, P.H.A.J.M. (author)
Both intentional attacks and accidental technical failures can lead to abnormal behaviour in components of industrial control systems. In our previous work, we developed a framework for constructing Bayesian Network (BN) models to enable operators to distinguish between those two classes, including knowledge elicitation to construct the directed...
journal article 2023
document
Cong, Yangfan (author), Yu, Suihuai (author), Chu, Jianjie (author), Su, Zhaojing (author), Huang, Y. (author), Li, Feilong (author)
Eliciting user needs from mass online reviews is playing a significant role in the product iteration process. Efficient user needs elicitation does achieve considerable benefits for maintaining higher competitiveness and a speedier lifecycle. However, there is inevitably an online review scarcity about new products due to the short time on...
journal article 2023
document
Migoni Alejandre, E. (author), Scherer, L.A. (author), Guinée, J.B. (author), Aizen, Marcelo A. (author), Albrecht, Matthias (author), Balzan, Mario V. (author), Bartomeus, Ignasi (author), Clough, Yann (author), van Bodegom, Peter M. (author)
While wild pollinators play a key role in global food production, their assessment is currently missing from the most commonly used environmental impact assessment method, Life Cycle Assessment (LCA). This is mainly due to constraints in data availability and compatibility with LCA inventories. To target this gap, relative pollinator abundance...
journal article 2023
document
Väljataga, Terje (author), Pata, Kai (author), Annus, Andrea (author), Calisto, Michelle Andrade (author), Cambronero, Agueda Gomez (author), Eisemann, E. (author), Marroquim, Ricardo (author), Szécsi, László (author), Zaidi, A. (author)
Disruptive technology has become an integral part of our lives, and it has brought about a significant transformation in the way we interact, communicate, and share information, also in the field of education. Innovation in technology needs to be based on ethics and values of the intended result. As the use of disruptive technology continues...
conference paper 2023
document
Balayn, A.M.A. (author), He, G. (author), Hu, Andrea (author), Yang, J. (author), Gadiraju, Ujwal (author)
Access to commonsense knowledge is receiving renewed interest for developing neuro-symbolic AI systems, or debugging deep learning models. Little is currently understood about the types of knowledge that can be gathered using existing knowledge elicitation methods. Moreover, these methods fall short of meeting the evolving requirements of...
conference paper 2022
document
Lim, Jeffrey (author)
We introduce Swipe for Science, a single-player mobile game designed for collecting discriminative evidence from crowds. When people play this game, we collect data about how certain concepts are associated with different contexts, which is valuable knowledge for machine learning systems. The main gameplay loop consists of swiping concepts up,...
bachelor thesis 2021
document
Hu, Andrea (author)
Despite the ever-growing advances in artificial intelligence (AI), common sense acquisition and reasoning is still comparingly in their early stages to other fields in AI. To further advance this field, it is necessary to collect large amounts of common sense facts or tacit knowledge to train such AI models. One effective way is to use...
bachelor thesis 2021
document
Hanea, Anca M. (author), Hemming, Victoria (author), Nane, G.F. (author)
Expert elicitation is deployed when data are absent or uninformative and critical decisions must be made. In designing an expert elicitation, most practitioners seek to achieve best practice while balancing practical constraints. The choices made influence the required time and effort investment, the quality of the elicited data, experts’...
journal article 2021
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), van Gelder, P.H.A.J.M. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
journal article 2021
document
Chockalingam, S. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
doctoral thesis 2020
document
Höfer, Solveig (author), Ziemba, A.M. (author), El Serafy, G.Y.H. (author)
The concept of ecosystem services is gaining attention in the context of sustainable resource management. However, it is inherently difficult to account for tangible and intangible services in a combined model. The aim of this study is to extend the definition of ecosystem service trade-offs by using Bayesian Networks to capture the...
journal article 2019
document
Smit, Kai (author)
The dispenser project focused on developing an external vision for a dispenser range for the future washroom in office buildings, retirement homes, and hotels. The project resulted in a foldable dispenser that reduces sustainable impact by decreasing its volume during transport. Another part was wrapping the dispenser to let end customers be...
master thesis 2017
document
Kox, S.A.J. (author)
The main objective of this study is the realisation of a computer tool. The function of the tool is to estimate the required dimensions and quantities of essential container, dry and liquid bulk terminal elements, in an early design phase. As well as to give an estimate of the construction costs of these marine terminals. Terminal element...
master thesis 2017
document
Quaeghebeur, Erik (author), Wesseling, C. (author), Beauxis-Aussalet, E. (author), Piovesan, T. (author), Sterkenburg, T. (author)
We present an interface for eliciting sets of acceptable gambles on a three-outcome possibility space, discuss an experiment conducted for testing this interface, and present the results of this experiment. Sets of acceptable gambles form a representation for imprecise probabilities that is close to human behavior and eliciting them directly may...
journal article 2017
document
Roungas, V. (author), Meijer, S.A. (author), Verbraeck, A. (author)
Games for decision making have developed into a powerful tool for corporations. Irrespective of their size, corporations have been increasingly using these games in order to evaluate and ascertain impact-ful business decisions and strategies. Despite their proven added value to the decision making process, there is still lack of research on...
conference paper 2017
document
Bamber, J.L. (author), Aspinall, W.P. (author), Cooke, R.M. (author)
We clarify key aspects of the evaluation, by de Vries and van de Wal (2015), of our expert elicitation paper on the contributions of ice sheet melting to sea level rise due to future global temperature rise scenarios (Bamber and Aspinall 2013), and extend the conversation with further analysis of their proposed approach for combining expert...
journal article 2016
Searched for: subject%3A%22elicitation%22
(1 - 20 of 28)

Pages