Analyzing Human Negotiation using Automated Cognitive Behavior Analysis: The Effect of Personality. Pedro Sequeira & Stacy Marsella
|
|
- Lorena Marsh
- 5 years ago
- Views:
Transcription
1 Analyzing Human Negotiation using Automated Cognitive Behavior Analysis: The Effect of Personality Pedro Sequeira & Stacy Marsella
2 Outline Introduction Methodology Results Summary & Conclusions
3 Outline Introduction Methodology Results Summary & Conclusions
4 Automated Cognitive Behavior Analysis Goals Gain insight on how people process information Uncover underlying psychological structures responsible for overt behavior Questions that ACBA allows addressing Based on which task information do people make their decisions? What are the temporal dynamics of behavior? For the same task, can we identify behavioral patterns across individuals? Can we track the development of the structures over time?
5 ACBA Approach Humans as information-processing systems [Miller et al. 1960, Newell 1994, Simon 1978] Genetic Programming (GP) Idea: generate candidate programs explaining behavior Programs are combination of relevant symbols about the task and certain operators receptors Knowledge Behavior structures effectors Decisionmaking Human behavior Fitness is measured by how consistent the output is in relation to the behavior outcomes state Task Environment observed result / outcome GP progressively generates better candidates Most fit programs are chosen as hypotheses of, i.e., possible solutions for, the underlying structure of the observed behavior observed state features Symbols / Terminals Genetic Program Decisionmaking Computer output consistency measure / fitness
6 ACBA GP Post-processing Challenges Identify the underlying invariant behavioral structures Identify behavioral phenomenon of interest e.g., across individuals or across tasks How to process solutions stemming from GP? Approach Set of computational tools or components Each analyzes observed behaviors according to different criteria Each provides different insights on the underlying cognitive behavioral structures
7 Outline Introduction Methodology Results Summary & Conclusions
8 ACBA Methodology collect behavioral data discover behavioral structures analyze structural patterns Human Human Characteristics Analysis datapoints Behavior Data-set Frequency Analysis Human Humans Human Computer for each data-point Genetic Programming candidate programs Data-set solution programs Robustness Analysis Data-point Grouping Group Robustness Analysis Collection Grouping Groups Data-set Groups Characteristics Analysis Frequent- Pattern Mining
9 Scenario Investigate human negotiation behavior Cognitive social task Turn-based, multi-level, multi-issue bargaining setting [Pruitt and Lewis, 1975] 2 negotiators negotiate sequentially over: 3 records 2 lamps 1 painting
10 collect behavioral data ACBA Data Collection Human Human datapoints Behavior Data-set Human Humans Human Computer
11 Human Negotiation Data Use negotiation data collected in [Xu et. al, 2017] 405 subjects negotiating against fixed intermediate strategy Collected information on subject s personality Social value orientation (SVO) [Murphy et al., 2011] Machiavellianism (Mach) [Christie & Geis, 2013] Idea Use ACBA to understand the behavior of the human negotiator Capture the variability of negotiation behavior according to the subjects personality Can ACBA confirm the behavior predispositions attributed to different personality traits?
12 Behavioral Data Collection Negotiation scenario Each offer o k O at each round k = 1,..., K is a full partition over the items # # # O is the set of all possible partitions between the items, hence O = 24 Example of data-point d: O h = O a = o 1 o 2 o 3 o K A behavior data-set D comprises several data-points
13 Payoffs Each item has associated a certain payoff value Record is worth 11 Lamp is worth 5 Painting is worth 2 Therefore, each data-point has also two payoff sequences O h = O a = o 1 o 2 o 3 o K Payoff sequences P o h = 28, 32, 35,, 28 P o a = 35, 23, 29,, 23
14 ACBA Genetic Programming collect behavioral data discover behavioral structures Human Human Human Humans datapoints Behavior Data-set for each data-point Genetic Programming Data-set Human Computer candidate programs solution programs Collection
15 Genetic Programming Approach Search in a space of expressions for programs that best fit human negotiator s behavior Predict human negotiator s offer sequence O h = o h h 1,, o K Programs Syntax trees, nodes correspond to primitives taken from F or T Set of functions F = {(x + y), (x y), (x y), (x y), max(x, y), min(x, y), (x^y), (x? y: z: w)} T = C V are the terminals Constants: C = {0,1,2,3,5,6,7,11,23,34,45} V are variables encoding the observable state features at each round k = 2,, K
16 Genetic Programming for each data-point d Behavior Data-set Population of Programs for each program p new population Fitness Function F d p Selection Crossover Mutation new population Population of Programs for each program p Fitness Function F d p Selection Crossover Mutation new population Population of Programs for each program p Fitness Function F d p Selection Crossover Mutation
17 Fitness Function Calculate fitness of a program p regarding a data-point d: F d p = K k=2 V d k h p P o k 2 /K Negative RMSE between program s output and payoff observed from the negotiator s offers programs Programs attaining maximal fitness for a data-point Occam s razor principle Select from the existing hypotheses the ones with the fewest assumptions, i.e., shorter programs
18 Outline Introduction Methodology Results Summary & Conclusions
19 collect behavioral data Methodology discover behavioral structures analyze structural patterns Human Human Characteristics Analysis datapoints Behavior Data-set Frequency Analysis Human Humans Human Computer for each data-point Genetic Programming candidate programs Data-set solution programs Robustness Analysis Data-point Grouping Group Robustness Analysis Collection Grouping Groups Data-set Groups Characteristics Analysis Frequent- Pattern Mining
20 Characteristics Analysis Gather statistical information for solutions of groups of points Results First indication that proselfs may have more complex underlying strategies Consistent with [de Dreu & van Lange, 1995] count length Num. unique variables
21 Frequency Analysis Counts the frequency of solution programs and of their sub-programs for a set of data-points Proselfs: (InitOffPayoff/OffPayoff) Ratio between initial offer and current offer by the opponent Related to anchoring effect of first offers in negotiation [Galinsky & Mussweiler, 2001] Used as a scaling factor for the proposal, in line with [Murphy et al., 2011] E.g., max(offpayoff,(initproppayoff*(initoffpayoff/offpayoff))) Prosocials: (34-OffPayoff) Difference between a high payoff and the opponent s offered payoff Used to establish a minimum acceptable payoff, related with BATNA [Galinsky & Mussweiler, 2001] E.g., max(23,(34-offpayoff))
22 Robustness Analysis Assesses the robustness of solution programs and their sub-programs Robustness is mean fitness across a collection of data-points Proselfs:(24-PropPaintings) Either 24 or 23 Almost constant strategy proposing offers whose payoff is in [23,24] Disregards opponent s offers, denoting non-conceding nature of pro-selfs [de Dreu & van Lange, 1995] Prosocials: (18+(PropPayoff/6)) Slowly increasing proposal On average, the maximum target payoff is right below fairness Corresponds to highly-cooperative strategy [de Dreu & van Lange, 1995; Murphy et al., 2011]
23 Outline Introduction Methodology Results Summary & Conclusions
24 Summary Automated Cognitive Behavior Analysis Study the underlying structure of human behavior Genetic programming iteratively generates candidate programs capable of explaining behavior Implementation of different tools to aggregate the solutions relative to different data partitions Applied ACBA to human-agent negotiation data-set ACBA could uncover distinct behavioral structures in solutions for different trait groups Results are consistent with behavioral trends as described in the literature s have into account task information and lead to outcomes consistent with personality traits
25 Ongoing Work clustering Based on terminal similarity, expression similarity, tree-edit similarity Use agglomerative nesting clustering [Kaufman and Rousseeuw, 2005, Ch. 5] grouping Group solution programs from a set of data-points according to their semantic similarity Allow the identification of semantic families of solutions Data-point grouping Based on the similarity of their solution programs Identify behavior instances resulting in similar strategies and behavioral trends
26 Future Work The effect of dyads in negotiation Use ACBA to study role of opponent in framing negotiation Group by opponent characteristic and analyze underlying behavior structures Apprenticeship learning using inverse reinforcement learning Use ACBA to recover expert strategy given demonstrated behavior Does not assume prior structure or relationship (e.g., linear) between features Apply ACBA to different domains E.g., problem-solving tasks Validate ACBA by comparing with outputs from TA and CTA protocols
27 Questions? More info: web.northeastern.edu/cesar/psequeira/acba
28
Evolutionary Programming
Evolutionary Programming Searching Problem Spaces William Power April 24, 2016 1 Evolutionary Programming Can we solve problems by mi:micing the evolutionary process? Evolutionary programming is a methodology
More informationContents. Just Classifier? Rules. Rules: example. Classification Rule Generation for Bioinformatics. Rule Extraction from a trained network
Contents Classification Rule Generation for Bioinformatics Hyeoncheol Kim Rule Extraction from Neural Networks Algorithm Ex] Promoter Domain Hybrid Model of Knowledge and Learning Knowledge refinement
More informationGroup Assignment #1: Concept Explication. For each concept, ask and answer the questions before your literature search.
Group Assignment #1: Concept Explication 1. Preliminary identification of the concept. Identify and name each concept your group is interested in examining. Questions to asked and answered: Is each concept
More informationA Framework for Conceptualizing, Representing, and Analyzing Distributed Interaction. Dan Suthers
1 A Framework for Conceptualizing, Representing, and Analyzing Distributed Interaction Dan Suthers Work undertaken with Nathan Dwyer, Richard Medina and Ravi Vatrapu Funded in part by the U.S. National
More informationEmergence of Emotional Appraisal Signals in Reinforcement Learning Agents
Autonomous Agents and Multiagent Systems manuscript No. (will be inserted by the editor) Emergence of Emotional Appraisal Signals in Reinforcement Learning Agents Pedro Sequeira Francisco S. Melo Ana Paiva
More informationAN EPIC COMPUTATIONAL MODEL OF VERBAL WORKING MEMORY D. E. Kieras, D. E. Meyer, S. T. Mueller, T. L. Seymour University of Michigan Sponsored by the
AN EPIC COMPUTATIONAL MODEL OF VERBAL WORKING MEMORY D. E. Kieras, D. E. Meyer, S. T. Mueller, T. L. Seymour University of Michigan Sponsored by the U.S. Office of Naval Research 1 Introduction During
More informationUsing Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s
Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression
More informationGrounding Ontologies in the External World
Grounding Ontologies in the External World Antonio CHELLA University of Palermo and ICAR-CNR, Palermo antonio.chella@unipa.it Abstract. The paper discusses a case study of grounding an ontology in the
More informationEvaluating Social Programs Course: Evaluation Glossary (Sources: 3ie and The World Bank)
Evaluating Social Programs Course: Evaluation Glossary (Sources: 3ie and The World Bank) Attribution The extent to which the observed change in outcome is the result of the intervention, having allowed
More informationABSTRACT. sometimes an agent s preferences may involve not only its own payoff (as specified
ABSTRACT Title of dissertation: AGENT MODELING IN STOCHASTIC REPEATED GAMES Kan Leung Cheng, Doctor of Philosophy, 2014 Dissertation directed by: Professor Dana Nau Department of Computer Science There
More informationUsing a Social Orientation Model for the Evolution of Cooperative Societies
2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Using a Social Orientation Model for the Evolution of Cooperative Societies Kan-Leung Cheng, Inon Zuckerman,
More informationBayesian models of inductive generalization
Bayesian models of inductive generalization Neville E. Sanjana & Joshua B. Tenenbaum Department of Brain and Cognitive Sciences Massachusetts Institute of Technology Cambridge, MA 239 nsanjana, jbt @mit.edu
More informationLearning Classifier Systems (LCS/XCSF)
Context-Dependent Predictions and Cognitive Arm Control with XCSF Learning Classifier Systems (LCS/XCSF) Laurentius Florentin Gruber Seminar aus Künstlicher Intelligenz WS 2015/16 Professor Johannes Fürnkranz
More informationIntroduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018
Introduction to Machine Learning Katherine Heller Deep Learning Summer School 2018 Outline Kinds of machine learning Linear regression Regularization Bayesian methods Logistic Regression Why we do this
More informationThe relationship between emotional intelligence and negotiation performance:
The relationship between emotional intelligence and negotiation performance: Preliminary findings of an experimental study with international business students Andreas Zehetner, Joerg Kraigher-Krainer
More informationPO Box 19015, Arlington, TX {ramirez, 5323 Harry Hines Boulevard, Dallas, TX
From: Proceedings of the Eleventh International FLAIRS Conference. Copyright 1998, AAAI (www.aaai.org). All rights reserved. A Sequence Building Approach to Pattern Discovery in Medical Data Jorge C. G.
More informationInternational Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN
CRIME ASSOCIATION ALGORITHM USING AGGLOMERATIVE CLUSTERING Saritha Quinn 1, Vishnu Prasad 2 1 Student, 2 Student Department of MCA, Kristu Jayanti College, Bengaluru, India ABSTRACT The commission of a
More informationEmergence of Cooperative Societies in Evolutionary Games Using a Social Orientation Model
Emergence of Cooperative Societies in Evolutionary Games Using a Social Orientation Model Kan-Leung Cheng Abstract We utilize evolutionary game theory to study the evolution of cooperative societies and
More informationEvaluating Classifiers for Disease Gene Discovery
Evaluating Classifiers for Disease Gene Discovery Kino Coursey Lon Turnbull khc0021@unt.edu lt0013@unt.edu Abstract Identification of genes involved in human hereditary disease is an important bioinfomatics
More informationSexy Evolutionary Computation
University of Coimbra Faculty of Science and Technology Department of Computer Sciences Final Report Sexy Evolutionary Computation José Carlos Clemente Neves jcneves@student.dei.uc.pt Advisor: Fernando
More informationCHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL
127 CHAPTER 6 HUMAN BEHAVIOR UNDERSTANDING MODEL 6.1 INTRODUCTION Analyzing the human behavior in video sequences is an active field of research for the past few years. The vital applications of this field
More informationCOST EFFECTIVENESS STATISTIC: A PROPOSAL TO TAKE INTO ACCOUNT THE PATIENT STRATIFICATION FACTORS. C. D'Urso, IEEE senior member
COST EFFECTIVENESS STATISTIC: A PROPOSAL TO TAKE INTO ACCOUNT THE PATIENT STRATIFICATION FACTORS ABSTRACT C. D'Urso, IEEE senior member The solution here proposed can be used to conduct economic analysis
More informationGeography of the Forehead
5. Brain Areas Geography of the Forehead Everyone thinks the brain is so complicated, but let s look at the facts. The frontal lobe, for example, is located in the front! And the temporal lobe is where
More informationGames With Incomplete Information: Bayesian Nash Equilibrium
Games With Incomplete Information: Bayesian Nash Equilibrium Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu June 29th, 2016 C. Hurtado (UIUC - Economics)
More informationCentre for Education Research and Policy
THE EFFECT OF SAMPLE SIZE ON ITEM PARAMETER ESTIMATION FOR THE PARTIAL CREDIT MODEL ABSTRACT Item Response Theory (IRT) models have been widely used to analyse test data and develop IRT-based tests. An
More informationGetting the Payoff With MDD. Proven Steps to Get Your Return on Investment
Getting the Payoff With MDD Proven Steps to Get Your Return on Investment version 1.4 6/18/11 Generate Results: Real Models, Real Code, Real Fast. www.pathfindersolns.com Welcome Systems development organizations
More informationJakub Steiner The University of Edinburgh. Abstract
A trace of anger is enough: on the enforcement of social norms Jakub Steiner The University of Edinburgh Abstract It is well documented that the possibility of punishing free-riders increases contributions
More informationBayesian additive decision trees of biomarker by treatment interactions for predictive biomarkers detection and subgroup identification
Bayesian additive decision trees of biomarker by treatment interactions for predictive biomarkers detection and subgroup identification Wei Zheng Sanofi-Aventis US Comprehend Info and Tech Talk outlines
More informationBayes Linear Statistics. Theory and Methods
Bayes Linear Statistics Theory and Methods Michael Goldstein and David Wooff Durham University, UK BICENTENNI AL BICENTENNIAL Contents r Preface xvii 1 The Bayes linear approach 1 1.1 Combining beliefs
More informationCSE 258 Lecture 2. Web Mining and Recommender Systems. Supervised learning Regression
CSE 258 Lecture 2 Web Mining and Recommender Systems Supervised learning Regression Supervised versus unsupervised learning Learning approaches attempt to model data in order to solve a problem Unsupervised
More informationThe Constructional Approach
The Constructional Approach Israel Goldiamond Current relevant Terminal goals Systematic Maintenance Where are we now? Where do we want to go? How will we get there? How will we keep ourselves going? Created
More informationT. R. Golub, D. K. Slonim & Others 1999
T. R. Golub, D. K. Slonim & Others 1999 Big Picture in 1999 The Need for Cancer Classification Cancer classification very important for advances in cancer treatment. Cancers of Identical grade can have
More informationC/S/E/L :2008. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor. innovations at the intersection of people,
C/S/E/L :2008 innovations at the intersection of people, technology, and work. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor Daniel J. Zelik The Ohio State University
More informationOutlier Analysis. Lijun Zhang
Outlier Analysis Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction Extreme Value Analysis Probabilistic Models Clustering for Outlier Detection Distance-Based Outlier Detection Density-Based
More informationComputational Models of Human Behavior in Wartime Negotiations
Computational Models of Human Behavior in Wartime Negotiations David V. Pynadath (pynadath@usc.edu), USC Institute for Creative Technologies Ning Wang (ningwang@curiouslab.com), Curious Lab LLC Stacy C.
More informationLecture 13: Finding optimal treatment policies
MACHINE LEARNING FOR HEALTHCARE 6.S897, HST.S53 Lecture 13: Finding optimal treatment policies Prof. David Sontag MIT EECS, CSAIL, IMES (Thanks to Peter Bodik for slides on reinforcement learning) Outline
More informationCognitive Modeling. Lecture 9: Intro to Probabilistic Modeling: Rational Analysis. Sharon Goldwater
Cognitive Modeling Lecture 9: Intro to Probabilistic Modeling: Sharon Goldwater School of Informatics University of Edinburgh sgwater@inf.ed.ac.uk February 8, 2010 Sharon Goldwater Cognitive Modeling 1
More informationMonte Carlo Analysis of Univariate Statistical Outlier Techniques Mark W. Lukens
Monte Carlo Analysis of Univariate Statistical Outlier Techniques Mark W. Lukens This paper examines three techniques for univariate outlier identification: Extreme Studentized Deviate ESD), the Hampel
More informationField Evaluation with Cognitively- Impaired Older Adults of Attention Management in the Embodied Conversational Agent Louise
Field Evaluation with Cognitively- Impaired Older Adults of Attention Management in the Embodied Conversational Agent Louise P. Wargnier, G. Carletti, Y. Laurent-Corniquet, S. Benveniste, P. Jouvelot and
More informationEmanuela Carbonara. 31 January University of Bologna - Department of Economics
Game Theory, Behavior and The Law - I A brief introduction to game theory. Rules of the game and equilibrium concepts. Behavioral Games: Ultimatum and Dictator Games. Entitlement and Framing effects. Emanuela
More informationCognitive Modeling. Mechanistic Modeling. Mechanistic Modeling. Mechanistic Modeling Rational Analysis
Lecture 9: Intro to Probabilistic Modeling: School of Informatics University of Edinburgh sgwater@inf.ed.ac.uk February 8, 2010 1 1 2 3 4 Reading: Anderson (2002). 2 Traditional mechanistic approach to
More informationAGENT-BASED SYSTEMS. What is an agent? ROBOTICS AND AUTONOMOUS SYSTEMS. Today. that environment in order to meet its delegated objectives.
ROBOTICS AND AUTONOMOUS SYSTEMS Simon Parsons Department of Computer Science University of Liverpool LECTURE 16 comp329-2013-parsons-lect16 2/44 Today We will start on the second part of the course Autonomous
More informationCollaborating across Cultures: Cultural Metacognition and Affect- Based Trust in Creative Collaboration
Collaborating across Cultures: Cultural Metacognition and Affect- Based Trust in Creative Collaboration Roy Chua, Harvard Business School Michael Morris, Columbia Business School Shira Mor, Columbia Business
More informationMACHIAVELLIANISM, DISCUSSION TIME, AND GROUP SHIFT. HELMUT LAMM Universitat Mannheim. DAVID G. MYERS Hope College
SOCIAL BEHAVIOR AND PERSONALITY, 1976, 4(1), 41-48 Society for Personality Research Inc. DOI 10.2224/sbp.1976.4.1.41 MACHIAVELLIANISM, DISCUSSION TIME, AND GROUP SHIFT HELMUT LAMM Universitat Mannheim
More informationCOMP329 Robotics and Autonomous Systems Lecture 15: Agents and Intentions. Dr Terry R. Payne Department of Computer Science
COMP329 Robotics and Autonomous Systems Lecture 15: Agents and Intentions Dr Terry R. Payne Department of Computer Science General control architecture Localisation Environment Model Local Map Position
More informationNational Culture Dimensions and Consumer Digital Piracy: A European Perspective
National Culture Dimensions and Consumer Digital Piracy: A European Perspective Abstract Irena Vida, irena.vida@ef.uni-lj.si Monika Kukar-Kinney, mkukarki@richmond.edu Mateja Kos Koklič, mateja.kos@ef.uni-lj.si
More informationSocial Utility in Ultimatum Bargaining
Social Justice Research, Vol. 16, No. 3, September 2003 ( C 2003) Social Utility in Ultimatum Bargaining Michel J. J. Handgraaf, 1,4 Eric Van Dijk, 2 and David De Cremer 3 In this article we will provide
More informationResearch Methodologies
Research Methodologies Quantitative, Qualitative, and Mixed Methods By Wylie J. D. Tidwell, III, Ph.D. www.linkedin.com/in/wylietidwell3 Consider... The research design is the blueprint that enables the
More informationBehavioral Game Theory
Outline (September 3, 2007) Outline (September 3, 2007) Introduction Outline (September 3, 2007) Introduction Examples of laboratory experiments Outline (September 3, 2007) Introduction Examples of laboratory
More informationA study of association between demographic factor income and emotional intelligence
EUROPEAN ACADEMIC RESEARCH Vol. V, Issue 1/ April 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A study of association between demographic factor income and emotional
More informationBayesian (Belief) Network Models,
Bayesian (Belief) Network Models, 2/10/03 & 2/12/03 Outline of This Lecture 1. Overview of the model 2. Bayes Probability and Rules of Inference Conditional Probabilities Priors and posteriors Joint distributions
More informationGoal. Security Risk-Oriented Misuse Cases
Fundamentals of Secure System Modelling Springer, 2017 Chapter 7: Security Risk-Oriented Misuse Cases Raimundas Matulevičius University of Tartu, Estonia, rma@ut.ee Goal Understand how security risks can
More informationPLANNING THE RESEARCH PROJECT
Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm page 1 Part I PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm
More informationA HMM-based Pre-training Approach for Sequential Data
A HMM-based Pre-training Approach for Sequential Data Luca Pasa 1, Alberto Testolin 2, Alessandro Sperduti 1 1- Department of Mathematics 2- Department of Developmental Psychology and Socialisation University
More informationTesting the level of consistency between choices and beliefs in games using eye-tracking
Testing the level of consistency between choices and beliefs in games using eye-tracking Luca Polonio a,b* and Giorgio Coricelli c a Department of Economics, University of Minnesota, 4-101 Hanson Hall,
More informationTowards an instrument for measuring sensemaking and an assessment of its theoretical features
http://dx.doi.org/10.14236/ewic/hci2017.86 Towards an instrument for measuring sensemaking and an assessment of its theoretical features Kholod Alsufiani Simon Attfield Leishi Zhang Middlesex University
More informationUNIVERSITY OF WASHINGTON PSYCHIATRY RESIDENCY PROGRAM COGNITIVE-BEHAVIORAL THERAPY (CBT) COMPETENCIES
UNIVERSITY OF WASHINGTON PSYCHIATRY RESIDENCY PROGRAM COGNITIVE-BEHAVIORAL THERAPY (CBT) COMPETENCIES Knowledge The resident will demonstrate: The ability to articulate the key principles related to cognitive-behavioral
More informationCase-based reasoning using electronic health records efficiently identifies eligible patients for clinical trials
Case-based reasoning using electronic health records efficiently identifies eligible patients for clinical trials Riccardo Miotto and Chunhua Weng Department of Biomedical Informatics Columbia University,
More informationCLASSIFICATION TREE ANALYSIS:
CLASSIFICATION TREE ANALYSIS: A USEFUL STATISTICAL TOOL FOR PROGRAM EVALUATORS Meredith L. Philyaw, MS Jennifer Lyons, MSW(c) Why This Session? Stand up if you... Consider yourself to be a data analyst,
More informationEffect of Positive and Negative Instances on Rule Discovery: Investigation Using Eye Tracking
Effect of Positive and Negative Instances on Rule Discovery: Investigation Using Eye Tracking Miki Matsumuro (muro@cog.human.nagoya-u.ac.jp) Kazuhisa Miwa (miwa@is.nagoya-u.ac.jp) Graduate School of Information
More informationSVM-based Discriminative Accumulation Scheme for Place Recognition
SVM-based Discriminative Accumulation Scheme for Place Recognition Andrzej Pronobis CAS/CVAP, KTH Stockholm, Sweden pronobis@csc.kth.se Óscar Martínez Mozos AIS, University Of Freiburg Freiburg, Germany
More informationHigh-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany
High-level Vision Bernd Neumann Slides for the course in WS 2004/05 Faculty of Informatics Hamburg University Germany neumann@informatik.uni-hamburg.de http://kogs-www.informatik.uni-hamburg.de 1 Contents
More informationCEMO RESEARCH PROGRAM
1 CEMO RESEARCH PROGRAM Methodological Challenges in Educational Measurement CEMO s primary goal is to conduct basic and applied research seeking to generate new knowledge in the field of educational measurement.
More informationSymbolic CTL Model Checking
Symbolic CTL Model Checking Crystal Chang Din Precise Modeling and Analysis group (PMA), University of Oslo INF9140 - Specification and Verification of Parallel Systems Crystal Chang Din @ UiO Symbolic
More informationVisualizing Data for Hypothesis Generation Using Large-Volume Health care Claims Data
Visualizing Data for Hypothesis Generation Using Large-Volume Health care Claims Data Eberechukwu Onukwugha PhD, School of Pharmacy, UMB Margret Bjarnadottir PhD, Smith School of Business, UMCP Shujia
More informationInternational Association for Conflict Management (IACM) Presentations
International Association for Conflict Management (IACM) Presentations Several doctoral students and research assistants traveled with the ICCCR s Director, Dr. Peter Coleman, to Stellenbosch, South Africa
More informationSequential, Multiple Assignment, Randomized Trials
Sequential, Multiple Assignment, Randomized Trials Module 2 Experimental Design and Analysis Methods for Developing Adaptive Interventions: Getting SMART Daniel Almirall, Ahnalee Brincks, Billie Nahum-Shani
More informationLearning to Identify Irrelevant State Variables
Learning to Identify Irrelevant State Variables Nicholas K. Jong Department of Computer Sciences University of Texas at Austin Austin, Texas 78712 nkj@cs.utexas.edu Peter Stone Department of Computer Sciences
More informationIrrationality in Game Theory
Irrationality in Game Theory Yamin Htun Dec 9, 2005 Abstract The concepts in game theory have been evolving in such a way that existing theories are recasted to apply to problems that previously appeared
More informationReinforcement Learning : Theory and Practice - Programming Assignment 1
Reinforcement Learning : Theory and Practice - Programming Assignment 1 August 2016 Background It is well known in Game Theory that the game of Rock, Paper, Scissors has one and only one Nash Equilibrium.
More informationEmbracing Complexity in System of Systems Analysis and Architecting
Embracing Complexity in System of Systems Analysis and Architecting Complex Adaptive System 2013 November 13-15, 2013, Baltimore, MA Cihan H. Dagli INCOSE and IIE Fellow Founder Director Systems Engineering
More informationA Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models
A Decision-Theoretic Approach to Evaluating Posterior Probabilities of Mental Models Jonathan Y. Ito and David V. Pynadath and Stacy C. Marsella Information Sciences Institute, University of Southern California
More informationBiostatistics for Med Students. Lecture 1
Biostatistics for Med Students Lecture 1 John J. Chen, Ph.D. Professor & Director of Biostatistics Core UH JABSOM JABSOM MD7 February 14, 2018 Lecture note: http://biostat.jabsom.hawaii.edu/education/training.html
More informationSeeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma. February 04, Tao Chen. Sining Wang.
Seeing is Behaving : Using Revealed-Strategy Approach to Understand Cooperation in Social Dilemma February 04, 2019 Tao Chen Wan Wang Sining Wang Lei Chen University of Waterloo University of Waterloo
More informationBeliefs about lying and spreading of dishonesty
Beliefs about lying and spreading of dishonesty Further experimental evidence on the preventive effect of ignorance on normative compliance Heiko Rauhut 1,2,* 1 University of Zurich, Institute of Sociology
More informationHuman Activities: Handling Uncertainties Using Fuzzy Time Intervals
The 19th International Conference on Pattern Recognition (ICPR), Tampa, FL, 2009 Human Activities: Handling Uncertainties Using Fuzzy Time Intervals M. S. Ryoo 1,2 and J. K. Aggarwal 1 1 Computer & Vision
More informationEquilibrium Selection In Coordination Games
Equilibrium Selection In Coordination Games Presenter: Yijia Zhao (yz4k@virginia.edu) September 7, 2005 Overview of Coordination Games A class of symmetric, simultaneous move, complete information games
More informationA critical look at the use of SEM in international business research
sdss A critical look at the use of SEM in international business research Nicole F. Richter University of Southern Denmark Rudolf R. Sinkovics The University of Manchester Christian M. Ringle Hamburg University
More informationDiscovering Meaningful Cut-points to Predict High HbA1c Variation
Proceedings of the 7th INFORMS Workshop on Data Mining and Health Informatics (DM-HI 202) H. Yang, D. Zeng, O. E. Kundakcioglu, eds. Discovering Meaningful Cut-points to Predict High HbAc Variation Si-Chi
More informationApplication of Local Control Strategy in analyses of the effects of Radon on Lung Cancer Mortality for 2,881 US Counties
Application of Local Control Strategy in analyses of the effects of Radon on Lung Cancer Mortality for 2,881 US Counties Bob Obenchain, Risk Benefit Statistics, August 2015 Our motivation for using a Cut-Point
More informationGood youth work works?
Good youth work works? 1 About London Youth Our vision is that all young Londoners access a wide range of high quality opportunities for learning and fun, beyond family and formal education, building strong
More informationFairness and Reciprocity in the Hawk-Dove game
Fairness and Reciprocity in the Hawk-Dove game Tibor Neugebauer*, Anders Poulsen**, and Arthur Schram*** Abstract We study fairness and reciprocity in a Hawk-Dove game. This allows us to test various models
More informationBayesian models of inductive generalization
Bayesian models of inductive generalization Neville E. Sanjana & Joshua B. Tenenbaum Department of Brain and Cognitive Sciences Massachusetts Institute of Technology Cambridge, MA 239 {nsanjana, jbt}@mit.edu
More informationModels of Parent-Offspring Conflict Ethology and Behavioral Ecology
Models of Parent-Offspring Conflict Ethology and Behavioral Ecology A. In this section we will look the nearly universal conflict that will eventually arise in any species where there is some form of parental
More informationIncrementally Clustering Legislative Interpellation Documents
2012 45th Hawaii International Conference on System Sciences Incrementally Clustering Legislative Interpellation Documents Fu-Ren Lin Institute of Service Science, National Tsing Hua University, Taiwan
More informationStepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework
Stepwise Knowledge Acquisition in a Fuzzy Knowledge Representation Framework Thomas E. Rothenfluh 1, Karl Bögl 2, and Klaus-Peter Adlassnig 2 1 Department of Psychology University of Zurich, Zürichbergstraße
More informationJournal of American Science 2010;6(10) Age and gender differences and construct of the children s emotional intelligence
Age and gender differences and construct of the children s emotional intelligence Mojgan Mirza, Ma rof Redzuan* Department of Social anddevelopment Science Faculty of Human Ecology, University Putra Malaysia
More informationAnswers to end of chapter questions
Answers to end of chapter questions Chapter 1 What are the three most important characteristics of QCA as a method of data analysis? QCA is (1) systematic, (2) flexible, and (3) it reduces data. What are
More informationAdaptive Aspirations in an American Financial Services Organization: A Field Study
Adaptive Aspirations in an American Financial Services Organization: A Field Study Stephen J. Mezias Department of Management and Organizational Behavior Leonard N. Stern School of Business New York University
More informationFrailty Ascertainment: Beginning of the pathway to treatment
Frailty Ascertainment: Beginning of the pathway to treatment Karen Bandeen-Roche, Ph.D. Johns Hopkins Older Americans Independence Center Introduction Whither frailty ascertainment? Geronmetrics a.k.a.:
More informationA to Z OF RESEARCH METHODS AND TERMS APPLICABLE WITHIN SOCIAL SCIENCE RESEARCH
A to Z OF RESEARCH METHODS AND TERMS APPLICABLE WITHIN SOCIAL SCIENCE RESEARCH QUANTATIVE RESEARCH METHODS Are concerned with trying to quantify things; they ask questions such as how long, how many or
More informationMotivated Information Processing, Strategic Choice, and the Quality of Negotiated Agreement
Journal of Personality and Social Psychology Copyright 2006 by the American Psychological Association 2006, Vol. 90, No. 6, 927 943 0022-3514/06/$12.00 DOI: 10.1037/0022-3514.90.6.927 Motivated Information
More informationNegotiation From a Near and Distant Time Perspective
Journal of Personality and Social Psychology Copyright 2006 by the American Psychological Association 2006, Vol. 91, No. 4, 712 729 0022-3514/06/$12.00 DOI: 10.1037/0022-3514.91.4.712 Negotiation From
More informationValidity and Reliability. PDF Created with deskpdf PDF Writer - Trial ::
Validity and Reliability PDF Created with deskpdf PDF Writer - Trial :: http://www.docudesk.com Validity Is the translation from concept to operationalization accurately representing the underlying concept.
More informationWhy Prosocials Exhibit Greater Cooperation
European Journal of Personality DOI: 10.1002/per.418 Why Prosocials Exhibit Greater Cooperation than Proselfs: The Roles of Social Responsibility and Reciprocity DAVID DE CREMER 1 * and PAUL A. M. VAN
More informationUC Merced Proceedings of the Annual Meeting of the Cognitive Science Society
UC Merced Proceedings of the Annual Meeting of the Cognitive Science Society Title Learning to cooperate in the Prisoner's Dilemma: Robustness of Predictions of an Instance- Based Learning Model Permalink
More informationRationale and Types of Research in Obstetrics and Gynaecology.. Professor Friday Okonofua
Rationale and Types of Research in Obstetrics and Gynaecology. Professor Friday Okonofua Why Research in Obstetrics and Gynaecology? To provide evidence for action termed evidence-based decision making
More informationFormulating the Experiment
Concept Development and Experimentation Course Formulating the Experiment January 29, 2007 Mark R. Sinclair Senior Analyst, Evidence Based Research, Inc. 1500 Breezeport Way, Suite 400 Suffolk, VA 23435
More informationCognitive Social Simulation Incorporating Cognitive Architectures
Cognitive Social Simulation Incorporating Cognitive Architectures Ron Sun June 15, 2007 Abstract Agent-based social simulation (with multi-agent systems), which is an important aspect of social computing,
More information