Pradeep K. Murukannaiah

Pradeep K. Murukannaiah
Delft University of Technology | TU · Interactive Intelligence Section

Doctor of Philosophy

About

59
Publications
4,511
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
487
Citations
Additional affiliations
January 2010 - present
North Carolina State University
Position
  • PhD Student

Publications

Publications (59)
Conference Paper
Full-text available
As a creative discipline, Requirements Engineering (RE), lends importance to understanding the associated human factors. Crowd RE, the approach of acquiring requirements from members of the public—the so-called crowd emphasizes human factors further. We investigate how human personality and creative potential influence a requirement acquisition tas...
Article
We introduce a high-level abstraction of location called place. A place derives its meaning from a user's physical space, activities, or social context. In this manner, place can facilitate improved user experience compared to the traditional representation of location, which is spatial coordinates. We propose the Platys framework as a way to addre...
Conference Paper
Full-text available
We introduce Xipho, an agent-oriented methodology for engineering context-aware personal agents (CPAs). Xipho extends Tropos to support CPA development. Xipho's steps span a CPA's requirements acquisition, design, and implementation. Importantly, we treat context as a cognitive notion and systematically relate it to other cognitive notions such as...
Conference Paper
Full-text available
Link prediction on social media is an important problem for recommendation systems. Understanding the interplay of users' sentiments and social relationships can be potentially valuable. Specifically, we study how to exploit sentiment homophily for link prediction. We evaluate our approach on a dataset gathered from Twitter that consists of tweets...
Chapter
We propose methods for an AI agent to estimate the value preferences of individuals in a hybrid participatory system, considering a setting where participants make choices and provide textual motivations for those choices. We focus on situations where there is a conflict between participants’ choices and motivations, and operationalize the philosop...
Chapter
The key arguments underlying a large and noisy set of opinions help understand the opinions quickly and accurately. Fully automated methods can extract arguments but (1) require large labeled datasets and (2) work well for known viewpoints, but not for novel points of view. We propose HyEnA, a hybrid (human + AI) method for extracting arguments fro...
Preprint
Full-text available
Existing protocols for multilateral negotiation require a full consensus among the negotiating parties. In contrast, we propose a protocol for multilateral negotiation that allows partial consensus, wherein only a subset of the negotiating parties can reach an agreement. We motivate problems that require such a protocol and describe the protocol fo...
Article
Full-text available
The pursuit of values drives human behavior and promotes cooperation. Existing research is focused on general values (e.g., Schwartz) that transcend contexts. However, context-specific values are necessary to (1) understand human decisions, and (2) engineer intelligent agents that can elicit and align with human values. We propose Axies, a hybrid (...
Article
There is increasing interplay between humans and artificial intelligent (AI) entities in online environments. With the growing autonomy and sophistication of these AI systems, the hybrid communities which are formed start to behave like the more-familiar, human-only social systems. This sets up the challenge to find systematic ways to ensure reliab...
Preprint
Full-text available
Artificial agents that support people in their daily activities (e.g., virtual coaches and personal assistants) are increasingly prevalent. Since many daily activities are social in nature, support agents should understand a user's social situation to offer comprehensive support. However, there are no systematic approaches for developing support ag...
Article
Full-text available
Geographical characteristics have been proven to be effective in improving the quality of point-of-interest (POI) recommendation. However, existing works on POI recommendation focus on cost (time or money) of travel for a user. An important geographical aspect that has not been studied adequately is the neighborhood effect , which captures a user’s...
Preprint
Full-text available
Designers of online deliberative platforms aim to counter the degrading quality of online debates and eliminate online discrimination based on class, race or gender. Support technologies such as machine learning and natural language processing open avenues for widening the circle of people involved in deliberation, moving from small groups to ``cro...
Preprint
Full-text available
Understanding an opponent agent helps in negotiating with it. Existing works on understanding opponents focus on preference modeling (or estimating the opponent's utility function). An important but largely unexplored direction is recognizing an opponent's negotiation strategy, which captures the opponent's tactics, e.g., to be tough at the beginni...
Article
Current computational models are inadequate for the purposes of modeling interactions between autonomous parties in a way that highlights and supports their accountability. We propose a new conceptual model for business contracts based on norms motivated by a review of real-life business contracts. Our conception is of a gray box, reflecting the id...
Article
Artificial intelligence (AI), which increasingly fuels Internet applications, has huge implications on the lives of ordinary people. This article examines explanations for AI decision-making as it concerns end users through the lens of humans rights.
Article
This article approaches ride sharing from the perspectives of equity and sustainability. A lack of transportation access exacerbates the challenges faced by transportation-disadvantaged individuals and communities, reducing opportunities for employment and civic engagement. This article presents a vision for public microtransit geared toward addres...
Article
This article introduces some of the key concepts and challenges pertaining to ethics from the standpoint of Internet applications.
Article
Full-text available
Trust between developers influences the success of open source software (OSS) projects. Although existing research recognizes the importance of trust, there is a lack of an effective and scalable computational method to measure trust in an OSS community. Consequently, OSS project members must rely on subjective inferences based on fragile and incom...
Article
Full-text available
Users often share information about others and may inadvertently violate their privacy. We propose SoSharP, an agent-based approach to help users maintain their own and others privacy by guiding selection of sharing policies in multiuser scenarios. SoSharP reduces user effort by incrementally learning from user recommendations and asking for user i...
Conference Paper
Full-text available
Norms describe the social architecture of a society and govern the interactions of its member agents. It may be appropriate for an agent to deviate from a norm; the deviation being indicative of a specialized norm applying under a specific context. Existing approaches for norm emergence assume simplified interactions wherein deviations are negative...
Conference Paper
We address the problem of designing privacy-preserving ethical personal agents that understand and act according to their users' preferred values and ethical principles, and provide a satisfying social experience to all their stakeholders.
Article
Full-text available
The authors consider the problem of engineering ethical personal agents. Such an agent would understand the applicable social norms and its users preferences among values. It would act or recommend actions that promote preferred values, especially, in scenarios where the norms conflict.
Conference Paper
In an increasingly digital urban setting, connected & concerned Citizens typically voice their opinions on various civic topics via social media. Efficient and scalable analysis of these citizen voices on social media to derive actionable insights is essential to the development of smart cities. The very nature of the data: heterogeneity and dynami...
Article
Full-text available
Users often share information about others; sometimes this inadvertently violates others’ privacy. Thus, here the authors propose SoSharP, an agent-based approach to help users maintain their own and others’ privacy by guiding a selection of sharing policies in multiuser scenarios. SoSharP learns incrementally and asks for users’ input only when re...
Conference Paper
Engineering secure software is challenging. Software development organizations leverage a host of processes and tools to enable developers to prevent vulnerabilities in software. Code reviewing is one such approach which has been instrumental in improving the overall quality of a software system. In a typical code review, developers critique a prop...
Conference Paper
Full-text available
A repository of privacy incidents is essential for understanding the attributes of products and policies that lead to privacy incidents. We describe our vision for a novel privacy incidents database and our progress toward building a prototype. Key challenges in gathering such a database include bootstrapping and sustainability. We propose a semi-a...
Conference Paper
Full-text available
A clear and efficient process for responding to privacy incidents is widely viewed as necessary for a strong privacy program. In addition, analysis of privacy incidents is advocated to understand risk trends. Both incident response and analysis require an actionable definition of privacy incident, which is challenging to derive given that privacy a...
Article
Social network services enable users to conveniently share personal information. Often, the information shared concerns other people, especially other members of the social network service. In such situations, two or more people can have conflicting privacy preferences; thus, an appropriate sharing policy may not be apparent. We identify such situa...
Conference Paper
User location is crucial in understanding the dynamics of user activities, especially in relating their online and offline aspects. However, users’ social media activities, such as tweets sent, do not always reveal their location. We consider the problem of estimating geo-tags for tweets and develop a comprehensive approach that incorporates textua...
Thesis
A personal agent acts and interacts on behalf of its human user. We envision a computing infrastructure in which autonomous personal agents realize social applications similar to how human societies operate. We develop computational tools, techniques, and abstractions to engineer personal agents. Personal agents enable smart spaces ranging homes, c...
Article
Full-text available
Experience with a social application depends crucially upon how it supports or interferes with the users' social expectations. Because privacy is central to the user's experience, the authors introduce Danio, a methodology based on modeling users' expectations in various contexts. Preliminary evaluation involving 34 developers suggests that Danio s...
Conference Paper
Full-text available
Trust is an important element of achieving secure collaboration that deals with human judgment and decision making. We consider trust as it arises in and influences people-driven service engagements. Existing approaches for estimating trust between people suffer from two important limitations. One, they consider only commitment as the primary means...
Conference Paper
Full-text available
Trust is an important element of achieving secure collaboration that deals with human judgment and decision making. We consider trust as it arises in and influences people-driven service engagements. Existing approaches for estimating trust between people suffer from two important limitations. One, they consider only commitment as the primary means...
Conference Paper
Full-text available
A stakeholder's beliefs influence his or her goals. However, a stakeholder's beliefs may not be consistent with the goals of all stakeholders of a system being constructed. Such belief-goal inconsistencies could manifest themselves as conflicting goals of the system to be. We propose Arg-ACH, a novel approach for capturing inconsistencies between s...
Article
Full-text available
The Platys project focuses on developing a high-level, semantic notion of location called place. A place, unlike a geospa-tial position, derives its meaning from a user's actions and interactions in addition to the physical location where they occur. Our aim is to enable the construction of a large variety of applications that take advantage of pla...
Article
As location-based applications increase in scope and variety, engineering them to deliver a high-quality user experience becomes increasingly important. The authors describe how user experience criteria map to location-based applications, the special demands these criteria place on modeling, and how to realize such applications to obtain high-quali...
Article
Emerging mobile applications rely upon knowing a user's location. A (geospatial) position is a low-level conception of location. A place is a high-level, user-centric conception of location that corresponds to a well-delineated set of positions. Place recognition deals with how to identify a place. Traditional place-recognition approaches (1) presu...
Article
In the traditional, offline world, users naturally group their connections—the people they know—into social circles, assigning them different priorities. Social circles and priorities among connections facilitate intelligent collaboration by helping a user determine how to interact with whom. Social circles can be valuable in online applications. Ho...
Conference Paper
Link analysis tasks are fundamental to analytical applications in scientific research, business, national security, etc. Such tasks involve finding associations or interactions between entities e.g. people, chemical or genes. In graph theoretic terms, this amounts to finding arbitrary sub-graph structures that link a given set of entities. On the o...

Network

Cited By