This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Optimizing Information Credibility in Social Swarming Applications
June 2012 (vol. 23 no. 6)
pp. 1147-1158
Bin Liu, University of Southern California, Los Angeles
Peter Terlecky, CUNY Graduate Center, New York
Amotz Bar-Noy, Brooklyn College and CUNY Graduate Center, New York
Ramesh Govindan, University of Southern California, Los Angeles
Micheal J. Neely, University of Southern California, Los Angeles
Dror Rawitz, Tel-Aviv University, Tel-Aviv
With the advent of smartphone technology, it has become possible to conceive of entirely new classes of applications. Social swarming, in which users armed with smartphones are directed by a central director to report on events in the physical world, has several real-world applications: search and rescue, coordinated fire-fighting, and the DARPA balloon hunt challenge. In this paper, we focus on the following problem: how does the director optimize the selection of reporters to deliver credible corroborating information about an event. We first propose a model, based on common notions of believability, about the credibility of information. We then cast the problem posed above as a discrete optimization problem, prove hardness results, introduce optimal centralized solutions, and design an approximate solution amenable to decentralized implementation whose performance is about 20 percent off, on average, from the optimal (on real-world data sets derived from Google News) while being three orders of magnitude more computationally efficient. More interesting, a time-averaged version of the problem is amenable to a novel stochastic utility optimization formulation, and can be solved optimally, while in some cases yielding decentralized solutions. To our knowledge, we are the first to propose and explore the problem of extracting credible information from a network of smartphones.

[1] M. Min et al., "PEIR, the Personal Environmental Impact Report," Proc. Seventh Int'l Conf. Mobile Systems, Applications, and Services (Mobisys), June 2009.
[2] E. Miluzzo et al., "Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the Cenceme Application," Proc. Sixth ACM Conf. Embedded Network Sensor Systems (SenSys), Nov. 2008.
[3] S. Kang et al., "SeeMon: Scalable and Energy-Efficient Context Monitoring Framework for Sensor-Rich Mobile Environments," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys), June 2008.
[4] R. Balan, D. Gergle, M. Satyanarayanan, and J. Herbsleb, "Simplifying Cyber Foraging for Mobile Devices," Proc. Fifth Int'l Conf. Mobile Systems, Applications and Services (MobiSys), June 2007.
[5] M. Rivera, S. Soderstrom, and B. Uzzi, "Dyads: Dynamics of Dyads in Social Networks: Assortative, Relational, and Proximity Mechanisms," Ann. Rev. Sociology, vol. 36, pp. 91-115, 2010.
[6] S. Martello and P. Toth, Knapsack Problems: Algorithms and Computer Implementations. Wiley, 1990.
[7] L. Georgiadis, M.J. Neely, and L. Tassiulas, "Resource Allocation and Cross-Layer Control in Wireless Networks," Foundations and Trends in Networking, vol. 1, no. 1, pp. 1-149, 2006.
[8] M.J. Neely, Stochastic Network Optimization with Application to Communication and Queueing Systems. Morgan and Claypool, 2010.
[9] B. Hilligoss and S. Rieh, "Developing a Unifying Framework of Credibility Assessment: Construct, Heuristics, and Interaction in Context," Information Processing and Management, vol. 44, pp. 1467-1484, 2008.
[10] C.I. Hovland and W. Weiss, "The Influence of Source Credibility on Communication Effectiveness," Public Opinion Quarterly, vol. 15, pp. 635-650, 1951.
[11] D.H. McKnight and C.J. Kacmar, "Factors and Effects of Information Credibility," Proc. Ninth Int'l Conf. Electronic Commerce (ICEC), 2007.
[12] B.J. Fogg and H. Tseng, "The Elements of Computer Credibility," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI), 2004.
[13] S. Rieh and D. Danielson, "Credibility Models for Multi-Source Fusion," Ann. Rev. Information Science and Technology, vol. 41, pp. 307-364, 2007.
[14] P. Chen, "Information Credibility Assessment and Meta Data Modeling in Integrating Heterogeneous Data Sources," Technical Report AFRL-IF-RS-TR-2002-298, Air Force Research Laboratory, 2002.
[15] E. Wright and K. Laskey, "Trust in Virtual Teams: Towards an Integrative Model of Trust Formation," Proc. Fusion, 2006.
[16] R.B. Cialdini, "The Science of Persuasion," Scientific Am. Mind, vol. 14, pp. 71-77, Jan. 2004.
[17] S. Saavedra, B. Uzzi, and K. Hagerty, "Synchronicity and the Collective Genius of Profitable Day Traders," Working Paper, Kellogg School of Management, 2010.
[18] A. Schrijver, Combinatorial Optimization: Polyhedra and Efficiency. Springer, 2004.
[19] A. Kehagias and V. Petridis, "Predictive Modular Neural Networks for Time Series Classification," Neural Networks, vol. 10, no. 1, pp. 31-49, 1997.
[20] M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, 1979.

Index Terms:
Discrete optimization, stochastic optimization, corroboration.
Citation:
Bin Liu, Peter Terlecky, Amotz Bar-Noy, Ramesh Govindan, Micheal J. Neely, Dror Rawitz, "Optimizing Information Credibility in Social Swarming Applications," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp. 1147-1158, June 2012, doi:10.1109/TPDS.2011.281
Usage of this product signifies your acceptance of the Terms of Use.