ACM Transactions on

Intelligent Systems and Technology (TIST)

Latest Articles

TPM: A Temporal Personalized Model for Spatial Item Recommendation

With the rapid development of location-based social networks (LBSNs), spatial item recommendation has become an important way of helping users discover interesting locations to increase their engagement with location-based services. The availability of spatial, temporal, and social information in LBSNs offers an unprecedented opportunity to enhance... (more)

X-CLEaVER: Learning Ranking Ensembles by Growing and Pruning Trees

Learning-to-Rank (LtR) solutions are commonly used in large-scale information retrieval systems such as Web search engines, which have to return highly relevant documents in response to user query within fractions of seconds. The most effective LtR algorithms adopt a gradient boosting approach to build additive ensembles of weighted regression... (more)

Learning Urban Community Structures: A Collective Embedding Perspective with Periodic Spatial-temporal Mobility Graphs

Learning urban community structures refers to the efforts of quantifying, summarizing, and representing an urban community’s (i) static structures, e.g., Point-Of-Interests (POIs) buildings and corresponding geographic allocations, and (ii) dynamic structures, e.g., human mobility patterns among POIs. By learning the community structures,... (more)

Adaptive Online One-Class Support Vector Machines with Applications in Structural Health Monitoring

One-class support vector machine (OCSVM) has been widely used in the area of structural health... (more)

Discriminative and Orthogonal Subspace Constraints-Based Nonnegative Matrix Factorization

Nonnegative matrix factorization (NMF) is one widely used feature extraction technology in the tasks of image clustering and image classification. For... (more)

High-Precision Camera Localization in Scenes with Repetitive Patterns

This article presents a high-precision multi-modal approach for localizing moving cameras with monocular videos, which has wide potentials in many... (more)

A Cross-Domain Recommendation Mechanism for Cold-Start Users Based on Partial Least Squares Regression

Recommender systems are common in e-commerce platforms in recent years. Recommender systems are able... (more)

Characterizing User Skills from Application Usage Traces with Hierarchical Attention Recurrent Networks

Predicting users’ proficiencies is a critical component of AI-powered personal assistants.... (more)

Random-Forest-Inspired Neural Networks

Neural networks have become very popular in recent years, because of the astonishing success of deep learning in various domains such as image and speech recognition. In many of these domains, specific architectures of neural networks, such as convolutional networks, seem to fit the particular structure of the problem domain very well and can... (more)

SmartTransfer: Modeling the Spatiotemporal Dynamics of Passenger Transfers for Crowdedness-Aware Route Recommendations

In urban transportation systems, transfer stations refer to hubs connecting a variety of bus and subway lines and, thus, are the most important nodes in transportation networks. The pervasive availability of large-scale travel traces of passengers, collected from automated fare collection (AFC) systems, has provided unprecedented opportunities for... (more)

Few-Shot Text and Image Classification via Analogical Transfer Learning

Learning from very few samples is a challenge for machine learning tasks, such as text and image classification. Performance of such task can be... (more)


Recent TIST News: 

ACM Transactions on Intelligent Systems and Technology (TIST) is ranked No.1 in all ACM journals in terms of citations received per paper. Each paper published at TIST in the time span (from Jan. 2010 to Dec. 2014) has received 18 citations on average in ACM Digital Library in the past fiscal year (from July 1 2015 to June 30 2016).  

ACM Transactions on Intelligent Systems and Technology (TIST) has been a success story.  Submissions to the journal have increase 76 percent from 2013 to 2015, from 278 original papers and revisions to 488.  Despite this increase, the journal acceptance rate has remained at a steady rate of approximately 24 percent. Furthermore, the TIST Impact Factor increased from 1.251 in 2014 to 3.19 in 2016.  

Journal Metric (2016)

  • - Impact Factor: 3.19
  • - 5-year Impact Factor: 10.47
  • - Avg. Citations in ACM DL: 18 

About TIST

ACM Transactions on Intelligent Systems and Technology (ACM TIST) is a scholarly journal that publishes the highest quality papers on intelligent systems, applicable algorithms and technology with a multi-disciplinary perspective. An intelligent system is one that uses artificial intelligence (AI) techniques to offer important services (e.g., as a component of a larger system) to allow integrated systems to perceive, reason, learn, and act intelligently in the real world. READ MORE

Forthcoming Articles
A Survey of Zero-Shot Learning: Settings, Methods and Applications

Most machine learning methods focus on classifying instances whose classes have already been seen in training. In practice, many applications require classifying instances whose classes have not been seen previously. Zero-shot learning is a powerful and promising learning paradigm, in which the classes covered by training instances and the classes we aim to classify are disjoint. In this paper, we provide a comprehensive survey of zero-shot learning. First of all, we provide a formal definition of zero-shot learning and introduce related concepts. According to the data utilized in model optimization, we classify zero-shot learning into three learning settings. Secondly, we describe different semantic spaces adopted in existing zero-shot learning works. Thirdly, we categorize existing zero-shot learning methods, introduce methods in each category, and discuss their advantages and disadvantages. Fourthly, we discuss different applications of zero-shot learning. Finally, we highlight future research directions on zero-shot learning from both the problem setting and the technique perspectives.

Understanding Event Organization at Scale in Event-based Social Networks

Understanding real-world event participation behavior has been a subject of active research and can offer valuable insights for event-related recommendation and advertisement. The emergence of event-based social networks (EBSNs), which attract online users to host/attend offline events, has enabled exciting new research in this domain. However, most existing works focus on understanding or predicting individual users' event participation behavior or recommending events to individual users. Few study has addressed the problem of event popularity from the event organizer's point of view. In this work, we study the latent factors for determining event popularity using large-scale datasets collected from the popular EBSN in five major cities around the world. We analyze and model four contextual factors: spatial factor using location convenience, quality, popularity density and competitiveness; group factor using group member entropy and loyalty; temporal factor using temporal preference and weekly event patterns; and semantic factor using readability, sentiment, part-of-speech and text novelty. In addition, we have developed a group-based social influence propagation network to model group-specific influences on events. By combining the COntextual features and Social Influence NEtwork, our integrated prediction framework COSINE can capture the diverse influential factors of event participation and can be used by event organizers to predict/improve the popularity of their events. Detailed evaluations demonstrate that our COSINE framework achieves high accuracy for event popularity prediction in all five cities with diverse cultures and user event behaviors.

A Simple Baseline for Travel Time Estimation using Large-Scale Trip Data

The increased availability of large-scale trajectory data provides rich information for the study of urban dynamics. For example, New York City Taxi & Limousine Commission regularly releases source/destination information of taxi trips, where 173 million taxi trips released for Year 2013. Such a big dataset provides us potential new perspectives to address the traditional traffic problems. In this paper, we study the travel time estimation problem. Instead of following the traditional route-based travel time estimation, we propose to simply use a large amount of taxi trips without using the intermediate trajectory points to estimate the travel time between source and destination. Our experiments show very promising results. The proposed big data-driven approach significantly outperforms both state-of-the-art route-based method and online map services. Our study indicates that novel simple approaches could be empowered by the big data and these approaches could serve as new baselines for some traditional computational problems.

Reconstruction of Hidden Representation for Robust Feature Extraction

This paper aims to develop a new and robust approach to feature representation. Motivated by the success of Auto-Encoders, we frst theoretically analyze and summarize the general properties of all algorithms that are based on traditional Auto-Encoders: 1) The reconstruction error of the input can not be lower than a lower bound, which can be viewed as a guiding principle for reconstructing the input. Additionally, when the input is corrupted with noises, the reconstruction error of the corrupted input also can not be lower than a lower bound. 2) The reconstruction of a hidden representation achieving its ideal situation is the necessary condition for the reconstruction of the input to reach the ideal state. 3) Minimizing the Frobenius norm of the Jacobian matrix of the hidden representation has a defciency and may result in a much worse local optimum value. We believe that minimizing the reconstruction error of the hidden representation is more robust than minimizing the Frobenius norm of the Jacobian matrix of the hidden representation. Based on the above analysis, we propose a new model termed Double Denoising Auto-Encoders (DDAEs), which uses corruption and reconstruction on both the input and the hidden representation. We demonstrate that the proposed model is highly exible and extensible and has a potentially better capability to learn invariant and robust feature representations. We also show that for dealing with noises or inessential features, our model is more robust than Denoising Auto-Encoders (DAEs). Furthermore, we will detail how to train DDAEs with two dierent pre-training methods by optimizing the objective function in a combined and separate manner, respectively. Comparative experiments illustrate that the proposed model is signifcantly better for representation learning than the state-of-the-art models.

Federated Machine Learning: Concept and Applications

Today's AI still faces two major challenges. One is that in most industries, data exists in the form of isolated islands. The other is the strengthening of data privacy and security. We propose a possible solution to these challenges: secure federated learning. Beyond the federated learning framework first proposed by Google in 2016, we introduce a comprehensive secure federated learning framework, which includes horizontal federated learning, vertical federated learning and federated transfer learning. We provide definitions, architectures and applications for the federated learning framework, and provide a comprehensive survey of existing works on this subject. In addition, we propose building data networks among organizations based on federated mechanisms as an effective solution to allows knowledge to be shared without compromising user privacy.

Goal and Plan Recognition Design for Plan Libraries

The paper provides new techniques for optimizing domain design for goal and plan recognition using plan libraries. We define two new problems: Goal Recognition Design for Plan Libraries (GRD-PL) and Plan Recognition Design (PRD). Solving the GRD-PL helps to infer which goal the agent is trying to achieve, while solving PRD can help to infer how the agent is going to achieve its goal. For each problem, we define a worst-case distinctiveness measure that is an upper bound on the number of observations that are necessary to unambiguously recognize the agent's goal or plan. The paper studies the relationship between these measures, showing that the worst-case distinctiveness of GRD-PL is a lower bound of the worst-case plan distinctiveness of PRD, and that they are equal under certain conditions. We provide two complete algorithms for minimizing the worst-case distinctiveness of plan libraries without reducing the agent's ability to complete its goals: One is a brute force search over all possible plans and one a constraint-based search that identifies plans that are most difficult to distinguish in the domain. These algorithms are evaluated in three hierarchical plan recognition settings from the literature. We were able to reduce the worst case distinctiveness of the domains using our approach, in some cases reaching 100% improvement within a predesignated time window. Our iterative algorithm outperforms the brute force approach by an order of magnitude in terms of runtime.

Enumerating Connected Subgraphs and Computing the Myerson and Shapley Values in Graph-restricted Games

At the heart of multi-agent systems is the ability to cooperate in order to improve the performance of individual agents and/or the system as a whole. While a widespread assumption in the literature is that such cooperation is essentially unrestricted, in many realistic settings this assumption does not hold. A highly-influential approach for modelling such scenarios are graph-restricted games introduced by Myerson. In this approach, agents are represented by nodes in a graph, edges represent communication channels, and a group can generate an arbitrary value only if there exists a direct or indirect communication channel between every pair of agents within the group. Two fundamental solution concepts that were proposed for such games are the Myerson value and the Shapley value. While an algorithm has been developed to compute the Shapley value in arbitrary graph-restricted games, no such general-purpose algorithm has been developed for the Myerson value to date. With this in mind, we set to develop for such games a general-purpose algorithm to compute the Myerson value, and a more efficient algorithm to compute the Shapley value. Since the computation of either value involves enumerating all connected induced subgraphs of the games underlying graph, we start by developing an algorithm dedicated to this enumeration, and show empirically that it is faster than the state of the art in the literature. Finally, we present a sample application of both algorithms, in which we test the Myerson value and the Shapley value as advanced measures of node centrality in networks.

Predicting Academic Performance for College Students: A Campus Behavior Perspective

Detecting abnormal behaviors of students in time and providing personalized intervention and guidance at the early stage is important in educational management. Academic performance prediction is an important building block to enabling this pre-intervention and guidance. Most of the previous studies are based on questionnaire surveys and self-reports, which suffer from a small sample size and social desirability bias. In this paper, we collect longitudinal behavioral data from 6,597 students' smart cards and propose three major types of discriminative behavioral factors, diligence, orderliness, and sleep patterns. Empirical analysis demonstrates these behavioral factors are strongly correlated with academic performance. Furthermore, motivated by social influence theory, we analyze the correlation of each student's academic performance with his/her behaviorally similar students'. Statistical tests indicate this correlation is significant. Based on these factors, we further build a multi-task predictive framework based on a learning-to-rank algorithm for academic performance prediction. This framework captures inter-semester correlation, inter-major correlation and integrates student similarity to predict students' academic performance. The experiments on a large-scale real-world dataset show the effectiveness of our methods for predicting academic performance and the effectiveness of proposed behavioral factors.

Inferring Online Social Ties from Offline Geographical Activities

As mobile devices are becoming ubiquitous nowadays, the geographical activities and interactions of human beings can be easily recorded and accessed. Each mobile individual can belong to an online social network. Unfortunately, the underlying online social relationships are hidden and only available to service providers. Acquiring the social network of mobile users would enrich lots of mobile applications, such as friend recommendation and energy-saving mobile database management. In this work, we propose to infer online social ties using purely offline geographical activities of users, such as check-in records and spatial meeting events. To tackle the problem, we devise a novel inference framework, O2O-Inf, which consists of two components, Feature Modeling and Link Inference. Feature modeling is to characterize both direct and indirect geographical interactions between nodes from co-location and graph features. Link inference aims to infer the social ties based on a small set of observed social links, and the idea is that pairs of nodes sharing similar geographical behaviors have the same tendency of linkage (i.e., either being friends or non-friends). Experiments conducted on a Gowalla location-based social network and a Meetup event-based social network exhibit satisfying performance in comparison to state-of-the-art prediction methods under the settings of offline-to-online network inference and geo-link prediction.

All ACM Journals | See Full Journal Index

Search TIST
enter search term and/or author name