@article{haque_ajmeri_singh_2023, title={Understanding dynamics of polarization via multiagent social simulation}, volume={1}, ISSN={["1435-5655"]}, DOI={10.1007/s00146-022-01626-5}, abstractNote={Abstract}, journal={AI & SOCIETY}, author={Haque, Amanul and Ajmeri, Nirav and Singh, Munindar P.}, year={2023}, month={Jan} } @inproceedings{murukannaiah_ajmeri_singh_2022, place={United States}, title={Enhancing Creativity as Innovation via Asynchronous Crowdwork}, url={https://research-information.bris.ac.uk/en/publications/bd4dc53d-7824-4a5c-aa02-d7554f6f35ff}, DOI={10.1145/3501247.3531555}, abstractNote={Synchronous, face-to-face interactions such as brainstorming are considered essential for creative tasks (the old normal). However, face-to-face interactions are difficult to arrange because of the diverse locations and conflicting availability of people—a challenge made more prominent by work-from-home practices during the COVID-19 pandemic (the new normal). In addition, face-to-face interactions are susceptible to cognitive interference. We employ crowdsourcing as an avenue to investigate creativity in asynchronous, online interactions. We choose product ideation, a natural task for the crowd since it requires human insight and creativity into what product features would be novel and useful. We compare the performance of solo crowd workers with asynchronous teams of crowd workers formed without prior coordination. Our findings suggest that, first, crowd teamwork yields fewer but more creative ideas than solo crowdwork. The enhanced team creativity results when Second, cognitive interference, known to inhibit creativity in face-to-face teams, may not be significant in crowd teams. Third, teamwork promotes better achievement emotions for crowd workers. These findings provide a basis for trading off creativity, quantity, and worker happiness in setting up crowdsourcing workflows for product ideation.}, note={Funding Information: MPS thanks the NSF (grant IIS-1908374) for partial support. Publisher Copyright: \textcopyright 2022 ACM.}, booktitle={WebSci '22}, publisher={Association for Computing Machinery (ACM)}, author={Murukannaiah, Pradeep K. and Ajmeri, Nirav and Singh, Munindar P.}, year={2022}, month={Jun}, pages={66–74} } @article{tzeng_ajmeri_singh_2022, title={FLEUR: Social Values Orientation for Robust Norm Emergence}, volume={13549}, ISBN={["978-3-031-20844-7"]}, ISSN={["1611-3349"]}, DOI={10.1007/978-3-031-20845-4_12}, abstractNote={By regulating agent interactions, norms facilitate coordination in multiagent systems. We investigate challenges and opportunities in the emergence of norms of prosociality, such as vaccination and mask wearing. Little research on norm emergence has incorporated social preferences, which determines how agents behave when others are involved. We evaluate the influence of preference distributions in a society on the emergence of prosocial norms. We adopt the Social Value Orientation (SVO) framework, which places value preferences along the dimensions of self and other. SVO brings forth the aspects of values most relevant to prosociality. Therefore, it provides an effective basis to structure our evaluation. We find that including SVO in agents enables (1) better social experience; and (2) robust norm emergence.}, journal={COORDINATION, ORGANIZATIONS, INSTITUTIONS, NORMS, AND ETHICS FOR GOVERNANCE OF MULTI-AGENT SYSTEMS XV}, author={Tzeng, Sz-Ting and Ajmeri, Nirav and Singh, Munindar P.}, year={2022}, pages={185–200} } @article{mahdavi-hezaveh_ajmeri_williams_2022, title={Feature toggles as code: Heuristics and metrics for structuring feature toggles}, volume={145}, ISSN={["1873-6025"]}, url={https://research-information.bris.ac.uk/en/publications/cf3267f4-7537-48f9-9f5d-39eae5b5ced6}, DOI={10.1016/j.infsof.2021.106813}, abstractNote={Context: Using feature toggles is a technique to turn a feature either on or off in program code by checking the value of a variable in a conditional statement.This technique is increasingly used by software practitioners to support continuous integration and continuous delivery (CI/CD).However, using feature toggles may increase code complexity, create dead code, and decrease the quality of a codebase.Objective: The goal of this research is to aid software practitioners in structuring feature toggles in the codebase by proposing and evaluating a set of heuristics and corresponding complexity, comprehensibility, and maintainability metrics based upon an empirical study of open source repositories.Method: We identified 80 GitHub repositories that use feature toggles in their development cycle.We conducted a qualitative analysis using 60 of the 80 repositories to identify heuristics and metrics.Then, we conducted a survey of practitioners of 80 repositories to obtain their feedback that the proposed heuristics can be used to guide the structure of feature toggles and to reduce technical debt.We also conducted a case study of the all 80 repositories to analyze relations between heuristics and metrics.Results: From the qualitative analysis, we proposed 7 heuristics to guide structuring feature toggles and identified 12 metrics to support the principles}, note={Funding Information: The first author is funded by North Carolina State University . The second author is funded by the National Security Agency (Science of Security Lablet) at North Carolina State University. We thank all the reviewers for their valuable feedback. We also thank the members of the RealSearch group. Publisher Copyright: \textcopyright 2022 Elsevier B.V.}, journal={INFORMATION AND SOFTWARE TECHNOLOGY}, publisher={Amsterdam:Elsevier}, author={Mahdavi-Hezaveh, Rezvan and Ajmeri, Nirav and Williams, Laurie}, year={2022}, month={May} } @inproceedings{woodgate_ajmeri_2022, title={Macro Ethics for Governing Equitable Sociotechnical Systems}, url={https://research-information.bris.ac.uk/en/publications/c32cc19d-2c8a-4d0c-a6b4-7b7532ca071c}, DOI={10.5555/3535850.3536118}, abstractNote={The evolving relationship between humans and technology entails increasing concerns about the impact on ethical issues such as bias, unfairness, and lack of accountability. There is thus a need for consistent responses to multiple-user social dilemmas that arise during interactions in sociotechnical systems, where combinations of humans and technical agents work together as ethical duos. The outcomes of these systems can be evaluated by the values that participating humans hold, which in turn influence the development of norms used to guide acceptable behaviour. However, when values are misjudged or norms conflict, dilemmas arise that must be resolved in satisfactory ways. To examine these dilemmas, we adopt a macro ethics perspective where ethics is addressed via the governance of sociotechnical systems with multiple agents (rather than through the actions of single agents). We propose that to produce satisfactory outcomes, systematic methodologies be developed to consistently integrate normative ethical principles in reasoning capacities. The application of these ethical principles would enable practitioners to think analytically and systematically about the multiple-user social dilemmas that occur in these systems, in order to resolve them in satisfactory ways. To achieve this, we need to (1) categorize ethical principles not yet used in AI, form new ways of (2) systematically integrating ethical principles into reasoning, and use these new ways to (3) develop consistent responses to multiple-user social dilemmas.}, note={Blue Sky Ideas Track; AAMAS ’ 22: International Conference on Autonomous Agents and Multi-Agent Systems ; Conference date: 09-05-2022 Through 13-05-2022}, booktitle={AAMAS '22}, publisher={IFAAMAS Press}, author={Woodgate, Jessica M and Ajmeri, Nirav}, year={2022}, month={May}, pages={1824–1828} } @article{dubljević_douglas_milojevich_ajmeri_bauer_list_singh_2022, title={Moral and social ramifications of autonomous vehicles: a qualitative study of the perceptions of professional drivers}, volume={5}, ISSN={0144-929X 1362-3001}, url={http://dx.doi.org/10.1080/0144929X.2022.2070078}, DOI={10.1080/0144929X.2022.2070078}, abstractNote={ABSTRACT Artificial intelligence raises important social and ethical concerns, especially about accountability, autonomy, dignity, and justice. We focus on the specific concerns arising from how the emerging autonomous vehicle (AV) technology will affect professional drivers. We posit that we must engage with stakeholders to understand the implications of a technology that will affect the stakeholders’ lives, livelihoods, or wellbeing. We conducted nine in-depth interviews with professional drivers, with at least two years of driving experience, to understand the ethical and societal challenges from the drivers’ perspective during the predicted widespread implementation of AVs. Safety was the most commonly discussed issue, which was mentioned by all drivers (17 times by truck drivers and 18 times by Uber/Lyft drivers). We find that although drivers agree that AVs will significantly impact future transportation systems, they are apprehensive about the prospects of reskilling for other jobs and want their employers to be straightforward in how the introduction of AVs will affect them. Additionally, drivers dismiss the suggestions that driving jobs are unsatisfying and potentially unhealthy and thus should be eliminated. These findings should be considered seriously in decision-making about questions of socioeconomic justice, and could be useful to policymakers as they shape relevant regulations.}, note={Publisher Copyright: \textcopyright 2022 Informa UK Limited, trading as Taylor & Francis Group.}, journal={Behaviour & Information Technology}, publisher={Informa UK Limited}, author={Dubljević, Veljko and Douglas, Sean and Milojevich, Jovan and Ajmeri, Nirav and Bauer, William A. and List, George and Singh, Munindar P.}, year={2022}, month={May}, pages={1–8} } @article{mashayekhi_ajmeri_list_singh_2022, title={Prosocial Norm Emergence in Multi-agent Systems}, volume={17}, ISSN={["1556-4703"]}, url={https://research-information.bris.ac.uk/en/publications/f2d52003-fcb9-4f27-98cd-07703aafe81a}, DOI={10.1145/3540202}, abstractNote={Multi-agent systems provide a basis for developing systems of autonomous entities and thus find application in a variety of domains. We consider a setting where not only the member agents are adaptive but also the multi-agent system viewed as an entity in its own right is adaptive. Specifically, the social structure of a multi-agent system can be reflected in the social norms among its members. It is well recognized that the norms that arise in society are not always beneficial to its members. We focus on prosocial norms, which help achieve positive outcomes for society and often provide guidance to agents to act in a manner that takes into account the welfare of others.}, number={1-2}, journal={ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS}, publisher={Association for Computing Machinery (ACM)}, author={Mashayekhi, Mehdi and Ajmeri, Nirav and List, George F. and Singh, Munindar P.}, year={2022}, month={Jun} } @inproceedings{agrawal_ajmeri_singh_2022, title={Socially Intelligent Genetic Agents for the Emergence of Explicit Norms}, url={https://research-information.bris.ac.uk/en/publications/eb700f15-de9e-4bc3-b02f-1c52673db3ec}, booktitle={Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI)}, publisher={International Joint Conferences on Artificial Intelligence (IJCAI)}, author={Agrawal, Rishabh and Ajmeri, Nirav and Singh, Munindar P.}, year={2022}, month={Jul}, pages={10–16} } @article{dubljevic_list_milojevich_ajmeri_bauer_singh_bardaka_birkland_edwards_mayer_et al._2021, title={Toward a rational and ethical sociotechnical system of autonomous vehicles: A novel application of multi-criteria decision analysis}, volume={16}, ISSN={1932-6203}, url={http://dx.doi.org/10.1371/journal.pone.0256224}, DOI={10.1371/journal.pone.0256224}, abstractNote={The impacts of autonomous vehicles (AV) are widely anticipated to be socially, economically, and ethically significant. A reliable assessment of the harms and benefits of their large-scale deployment requires a multi-disciplinary approach. To that end, we employed Multi-Criteria Decision Analysis to make such an assessment. We obtained opinions from 19 disciplinary experts to assess the significance of 13 potential harms and eight potential benefits that might arise under four deployments schemes. Specifically, we considered: (1) the status quo, i.e., no AVs are deployed; (2) unfettered assimilation, i.e., no regulatory control would be exercised and commercial entities would “push” the development and deployment; (3) regulated introduction, i.e., regulatory control would be applied and either private individuals or commercial fleet operators could own the AVs; and (4) fleets only, i.e., regulatory control would be applied and only commercial fleet operators could own the AVs. Our results suggest that two of these scenarios, (3) and (4), namely regulated privately-owned introduction or fleet ownership or autonomous vehicles would be less likely to cause harm than either the status quo or the unfettered options.}, number={8}, journal={PLOS ONE}, publisher={Public Library of Science (PLoS)}, author={Dubljevic, Veljko and List, George and Milojevich, Jovan and Ajmeri, Nirav and Bauer, William A. and Singh, Munindar P. and Bardaka, Eleni and Birkland, Thomas A. and Edwards, Charles H. W. and Mayer, Roger C. and et al.}, editor={Yuan, QuanEditor}, year={2021}, month={Aug}, pages={e0256224} } @inproceedings{ajmeri_guo_murukannaiah_singh_2020, title={Elessar: Ethics in Norm-Aware Agents}, url={https://research-information.bris.ac.uk/en/publications/fb85ded1-f0d2-4ef2-93bb-4a15fccafc6a}, booktitle={Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS)}, publisher={International Foundation for Autonomous Agents and MultiAgent Systems}, author={Ajmeri, Nirav and Guo, Hui and Murukannaiah, Pradeep K. and Singh, Munindar P.}, year={2020}, month={May}, pages={16–24} } @article{ajmeri_murukannaiah_singh_2020, title={Ethics in Self-* Sociotechnical Systems (Tutorial Abstract)}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85092729693&partnerID=MN8TOARS}, DOI={10.1109/acsos-c51401.2020.00070}, abstractNote={The surprising capabilities demonstrated by AI technologies overlaid on detailed data and fine-grained control give cause for concern that agents can wield enormous power over human welfare, drawing increasing attention to ethics in AI.}, journal={2020 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS COMPANION (ACSOS-C 2020)}, publisher={IEEE}, author={Ajmeri, Nirav and Murukannaiah, Pradeep K. and Singh, Munindar P.}, year={2020}, pages={249–249} } @inproceedings{murukannaiah_ajmeri_jonker_singh_2020, title={New Foundations of Ethical Multiagent Systems}, url={https://research-information.bris.ac.uk/en/publications/766baf8c-9f8a-4311-89f4-9b436a30d64c}, note={Blue Sky Ideas Track}, booktitle={Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS)}, publisher={International Foundation for Autonomous Agents and MultiAgent Systems}, author={Murukannaiah, Pradeep K. and Ajmeri, Nirav and Jonker, Catholijn M. and Singh, Munindar P.}, year={2020}, month={May}, pages={1706–1710} } @article{murukannaiah_ajmeri_rahman_singh_2019, title={A Dataset of Crowdsourced Smarthome Requirements with Creativity Ratings}, url={https://research-information.bris.ac.uk/en/publications/585cb1e7-aa33-4082-9720-e32c94faec72}, DOI={10.5281/zenodo.3550721}, abstractNote={This dataset contains the data analyzed in the paper titled "Crowdsourcing Requirements: Does Teamwork Enhance Crowd Creativity?" The dataset contains the following csv files: 1. presurvey-questions: List of presurvey questions to collect demographics 2. disc-questions: List of DISC personality questions to cause a crowd worker’s personality. Each group has a set of 4 statements out of which the worker was expected to select one 3. post-survey-questions: List of postsurvey questions 4. users: List of crowd workers in the study; values 1 and 2 of the column ‘group_type’ correspond to workers in solo and interacting teams respectively 5. presurvey-responses: Workers' responses to the presurvey 6. personality_data: Workers’ IPIP (O, C, E, A, N metrics) and DISC (raw and normalized) scores 7. post-survey-responses: Workers' responses to the postsurvey 8. all_requirements: Requirements in a user story format, elicited by the crowd workers 9. creativity-ratings.csv: Authors’ average ratings for each requirement for the metrics ‘detailedness’, ‘novelty’ and ‘usefulness’}, note={Zenodo is an open science data repository created by the European Commission}, publisher={Zenodo}, author={Murukannaiah, Pradeep K. and Ajmeri, Nirav and Rahman, Muhammad Fazalul and Singh, Munindar P.}, year={2019}, month={Nov} } @inproceedings{goyal_ajmeri_singh_2019, title={Applying norms and sanctions to promote cybersecurity hygiene}, volume={4}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85077021008&partnerID=MN8TOARS}, booktitle={Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS}, author={Goyal, S. and Ajmeri, N. and Singh, M.P.}, year={2019}, pages={1991–1993} } @article{kafalı_ajmeri_singh_2019, title={DESEN: Specification of Sociotechnical Systems via Patterns of Regulation and Control}, volume={29}, url={http://dx.doi.org/10.1145/3365664}, DOI={10.1145/3365664}, abstractNote={ We address the problem of engineering a sociotechnical system (STS) with respect to its stakeholders’ requirements. We motivate a two-tier STS conception composed of a technical tier that provides control mechanisms and describes what actions are allowed by the software components, and a social tier that characterizes the stakeholders’ expectations of each other in terms of norms. We adopt agents as computational entities, each representing a different stakeholder. Unlike previous approaches, our framework, D ESEN , incorporates the social dimension into the formal verification process. Thus, D ESEN supports agents potentially violating applicable norms—a consequence of their autonomy. In addition to requirements verification, D ESEN supports refinement of STS specifications via design patterns to meet stated requirements. We evaluate D ESEN at three levels. We illustrate how D ESEN carries out refinement via the application of patterns on a hospital emergency scenario. We show via a human-subject study that a design process based on our patterns is helpful for participants who are inexperienced in conceptual modeling and norms. We provide an agent-based environment to simulate the hospital emergency scenario to compare STS specifications (including participant solutions from the human-subject study) with metrics indicating social welfare and norm compliance, and other domain dependent metrics. }, number={1}, journal={ACM Transactions on Software Engineering and Methodology (TOSEM)}, publisher={Association for Computing Machinery (ACM)}, author={Kafalı, Özgür and Ajmeri, Nirav and Singh, Munindar P.}, year={2019}, month={Feb}, pages={1–50} } @inproceedings{kalia_ajmeri_chan_cho_adalı_singh_2019, title={The Interplay of Emotions and Norms in Multiagent Systems}, volume={2019-August}, ISBN={9780999241141}, url={http://dx.doi.org/10.24963/ijcai.2019/53}, DOI={10.24963/ijcai.2019/53}, abstractNote={We study how emotions influence norm outcomes in decision-making contexts. Following the literature, we provide baseline Dynamic Bayesian models to capture an agent's two perspectives on a directed norm. Unlike the literature, these models are holistic in that they incorporate not only norm outcomes and emotions but also trust and goals. We obtain data from an empirical study involving game play with respect to the above variables. We provide a step-wise process to discover two new Dynamic Bayesian models based on maximizing log-likelihood scores with respect to the data. We compare the new models with the baseline models to discover new insights into the relevant relationships. Our empirically supported models are thus holistic and characterize how emotions influence norm outcomes better than previous approaches.}, booktitle={Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence}, publisher={International Joint Conferences on Artificial Intelligence Organization}, author={Kalia, Anup K. and Ajmeri, Nirav and Chan, Kevin S. and Cho, Jin-Hee and Adalı, Sibel and Singh, Munindar P.}, year={2019}, month={Aug}, pages={371–377} } @inproceedings{dhinakaran_pulle_ajmeri_murukannaiah_2018, place={United States}, title={App Review Analysis Via Active Learning: Reducing Supervision Effort without Compromising Classification Accuracy}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85056903791&partnerID=MN8TOARS}, DOI={10.1109/re.2018.00026}, abstractNote={Automated app review analysis is an important avenue for extracting a variety of requirements-related information. Typically, a first step toward performing such analysis is preparing a training dataset, where developers (experts) identify a set of reviews and, manually, annotate them according to a given task. Having sufficiently large training data is important for both achieving a high prediction accuracy and avoiding overfitting. Given millions of reviews, preparing a training set is laborious. We propose to incorporate active learning, a machine learning paradigm, in order to reduce the human effort involved in app review analysis. Our app review classification framework exploits three active learning strategies based on uncertainty sampling. We apply these strategies to an existing dataset of 4,400 app reviews for classifying app reviews as features, bugs, rating, and user experience. We find that active learning, compared to a training dataset chosen randomly, yields a significantly higher prediction accuracy under multiple scenarios.}, booktitle={2018 IEEE 26th International Requirements Engineering Conference (RE)}, publisher={IEEE}, author={Dhinakaran, Venkatesh T. and Pulle, Raseshwari and Ajmeri, Nirav and Murukannaiah, Pradeep K.}, editor={Ruhe, Guenther and Maalej, Walid and Amyot, DanielEditors}, year={2018}, month={Aug}, pages={170–181} } @article{ajmeri_guo_murukannaiah_singh_2018, title={Designing Ethical Personal Agents}, volume={22}, ISSN={["1941-0131"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85046152229&partnerID=MN8TOARS}, DOI={10.1109/mic.2018.022021658}, abstractNote={The authors consider the problem of engineering ethical personal agents. Such an agent would understand the applicable social norms and its users preferences among values. It would act or recommend actions that promote preferred values, especially, in scenarios where the norms conflict.}, number={2}, journal={IEEE INTERNET COMPUTING}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Ajmeri, Nirav and Guo, Hui and Murukannaiah, Pradeep K. and Singh, Munindar P.}, year={2018}, pages={16–22} } @inproceedings{ajmeri_guo_murukannaiah_singh_2018, place={United States}, title={Poster: Ethics, values, and personal agents}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85047223801&partnerID=MN8TOARS}, DOI={10.1145/3190619.3191678}, abstractNote={We address the problem of designing privacy-preserving ethical personal agents that understand and act according to their users' preferred values and ethical principles, and provide a satisfying social experience to all their stakeholders.}, booktitle={ACM International Conference Proceeding Series}, publisher={Association for Computing Machinery (ACM)}, author={Ajmeri, Nirav and Guo, Hui and Murukannaiah, Pradeep K. and Singh, Munindar P.}, year={2018}, pages={1–1} } @inproceedings{ajmeri_guo_murukannaiah_singh_2018, title={Robust Norm Emergence by Revealing and Reasoning about Context: Socially Intelligent Agents for Enhancing Privacy}, volume={2018-July}, ISBN={9780999241127}, url={http://dx.doi.org/10.24963/ijcai.2018/4}, DOI={10.24963/ijcai.2018/4}, abstractNote={Norms describe the social architecture of a society and govern the interactions of its member agents. It may be appropriate for an agent to deviate from a norm; the deviation being indicative of a specialized norm applying under a specific context. Existing approaches for norm emergence assume simplified interactions wherein deviations are negatively sanctioned. We investigate via simulation the benefits of enriched interactions where deviating agents share selected elements of their contexts. We find that as a result (1) the norms are learned better with fewer sanctions, indicating improved social cohesion; and (2) the agents are better able to satisfy their individual goals. These results are robust under societies of varying sizes and characteristics reflecting pragmatic, considerate, and selfish agents.}, booktitle={Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence}, publisher={International Joint Conferences on Artificial Intelligence Organization}, author={Ajmeri, Nirav and Guo, Hui and Murukannaiah, Pradeep K. and Singh, Munindar P.}, year={2018}, month={Jul}, pages={28–34} } @article{guo_ajmeri_singh_2018, title={Teaching Crowdsourcing: An Experience Report}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85041650454&partnerID=MN8TOARS}, DOI={10.1109/mic.2018.112102348}, abstractNote={Crowdsourcing is the process of accomplishing a task by using a typically open call to invite members of the public (the “crowd”) to work on one's task. The authors describe a project assignment in which students received the opportunity of practicing crowdsourcing to accomplish a hummed song recognition task, yielding improved comprehension of the concept and high student satisfaction.}, journal={IEEE Internet Computing}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Guo, Hui and Ajmeri, Nirav and Singh, Munindar}, year={2018}, pages={1–1} } @article{guo_ajmeri_singh_2018, title={Teaching Crowdsourcing: An Experience Report}, volume={22}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85056567210&partnerID=MN8TOARS}, DOI={10.1109/mic.2018.2881515}, abstractNote={Crowdsourcing is the process of accomplishing a task by using a typically open call to invite members of the public (the “crowd”) to work on one's task. The authors describe a project assignment in which students received the opportunity of practicing crowdsourcing to accomplish a hummed song recognition task, yielding improved comprehension of the concept and high student satisfaction.}, number={6}, journal={IEEE Internet Computing}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Guo, Hui and Ajmeri, Nirav and Singh, Munindar P.}, year={2018}, month={Nov}, pages={44–52} } @article{al-amin_ajmeri_du_berglund_singh_2018, title={Toward effective adoption of secure software development practices}, volume={85}, ISSN={["1878-1462"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85045638469&partnerID=MN8TOARS}, DOI={10.1016/j.simpat.2018.03.006}, abstractNote={Security tools, including static and dynamic analysis tools, can guide software developers to identify and fix potential vulnerabilities in their code. However, the use of security tools is not common among developers. The goal of this research is to develop a framework for modeling the adoption of security practices in software development and to explore sanctioning mechanisms that may promote greater adoption of these practices among developers. We propose a multiagent simulation framework that incorporates developers and manager roles, where developers maximize task completion and compliance with security policies, and the manager enforces sanctions based on functionality and security of the project. The adoption of security practices emerges through the interaction of manager and developer agents in time-critical projects. Using the framework, we evaluate the adoption of security practices for developers with different preferences and strategies under individual and group sanctions. We use a real case study for demonstrating the model and initialize the occurrence of bugs using a 13 year database of bug reports for the Eclipse Java Development Tools. Results indicate that adoption of security practices are significantly dictated by the preferences of the developers. We also observed that repetitive sanctions may cause lower retention of developers and an overall decrease in security practices. The model provides comparison of security adoption in developers with different preferences and provides guidance for managers to identify appropriate sanctioning mechanism for increasing the adoption of security tools in software development.}, journal={SIMULATION MODELLING PRACTICE AND THEORY}, publisher={Elsevier BV}, author={Al-Amin, Shams and Ajmeri, Nirav and Du, Hongying and Berglund, Emily Z. and Singh, Munindar P.}, year={2018}, month={Jun}, pages={33–46} } @article{ajmeri_hang_parsons_singh_2017, title={Aragorn: Eliciting and Maintaining Secure Service Policies}, volume={50}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85040916633&partnerID=MN8TOARS}, DOI={10.1109/mc.2017.4451210}, abstractNote={Services are configured via policies that capture expected behaviors, but stakeholder requirements can change, making policy errors a surprisingly common occurrence. Aragorn applies formal argumentation to produce policies that balance stakeholder concerns.}, number={12}, journal={Computer}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Ajmeri, Nirav and Hang, Chung-Wei and Parsons, Simon D. and Singh, Munindar P.}, year={2017}, pages={50–58} } @inproceedings{ajmeri_guo_murukannaiah_singh_2017, title={Arnor: Modeling Social Intelligence via Norms to Engineer Privacy-Aware Personal Agents}, url={https://research-information.bris.ac.uk/en/publications/1abb3707-460c-4cf4-aba0-fefca322f6d8}, booktitle={Proceedings of the 16th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS)}, publisher={International Foundation for Autonomous Agents and MultiAgent Systems}, author={Ajmeri, Nirav and Guo, Hui and Murukannaiah, Pradeep K. and Singh, Munindar P.}, year={2017}, month={May}, pages={230–238} } @inproceedings{ajmeri_murukannaiah_guot_singh_2017, title={Arnor: Modeling social intelligence via norms to engineer privacy-Aware personal agents}, volume={1}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85046117998&partnerID=MN8TOARS}, booktitle={Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS}, author={Ajmeri, N. and Murukannaiah, P.K. and Guot, H. and Singh, M.P.}, year={2017}, pages={230–238} } @inproceedings{ajmeri_2017, title={Engineering Socially Intelligent Personal Agents via Norms}, url={https://research-information.bris.ac.uk/en/publications/a57d9424-afc0-4e03-a80f-991adf4697c5}, note={Doctoral Consortium}, booktitle={Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS)}, publisher={International Foundation for Autonomous Agents and MultiAgent Systems}, author={Ajmeri, Nirav}, editor={Larson, Kate and Winikoff, Michael and Das, Sanmay and Durfee, Edmund H.Editors}, year={2017}, month={May}, pages={1822–1823} } @inproceedings{ajmeri_singh_2017, title={Engineering socially intelligent personal agents via norms}, volume={3}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85046418467&partnerID=MN8TOARS}, booktitle={Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS}, author={Ajmeri, N. and Singh, M.P.}, year={2017}, pages={1822–1823} } @inproceedings{kafali_ajmeri_singh_2017, title={Formal understanding of tradeoffs among liveness and safety requirements}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85013105511&partnerID=MN8TOARS}, DOI={10.1109/REW.2016.20}, booktitle={Proceedings - 2016 IEEE 24th International Requirements Engineering Conference Workshops, REW 2016}, author={Kafali, O. and Ajmeri, N. and Singh, M.P.}, year={2017}, pages={17–18} } @inproceedings{kafali_ajmeri_singh_2017, place={United States}, title={KONT: Computing tradeoffs in normative multiagent systems}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85027718735&partnerID=MN8TOARS}, booktitle={31st AAAI Conference on Artificial Intelligence, AAAI 2017}, publisher={AAAI Press}, author={Kafali, Özgür and Ajmeri, Nirav and Singh, Munindar P.}, year={2017}, pages={3006–3012} } @article{sheshadri_ajmeri_staddon_2017, place={United States}, title={No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016}, ISSN={["1712-364X"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85055867902&partnerID=MN8TOARS}, DOI={10.1109/PST.2017.00027}, abstractNote={Privacy news influences end-user attitudes and behaviors as well as product and policy development, and so is an important data source for understanding privacy perceptions. We provide a largescale text mining of privacy news, focusing on patterns in sentiment and keywords. This is a challenging task given the lack of a privacy news repository and a ground truth for sentiment. Using high-precision data sets from two popular news sources in the U. S. and U. K., the New York Times and the Guardian, we find negative privacy news is far more common than positive. In addition, in the NYT, privacy news is more prominently reported than many world events involving significant human suffering. Our analysis provides a rich snapshot of this driver of privacy perceptions and demonstrates that news facilitates the systematization of privacy knowledge.}, journal={2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)}, publisher={IEEE}, author={Sheshadri, Karthik and Ajmeri, Nirav and Staddon, Jessica}, year={2017}, pages={159–168} } @inproceedings{kafali_ajmeri_singh_2017, title={Normative requirements in sociotechnical systems}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85013073005&partnerID=MN8TOARS}, DOI={10.1109/REW.2016.21}, booktitle={Proceedings - 2016 IEEE 24th International Requirements Engineering Conference Workshops, REW 2016}, author={Kafali, O. and Ajmeri, N. and Singh, M.P.}, year={2017}, pages={259–260} } @article{murukannaiah_ajmeri_singh_2017, place={United States}, title={Toward Automating Crowd RE}, ISSN={["2332-6441"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85032807658&partnerID=MN8TOARS}, DOI={10.1109/re.2017.74}, abstractNote={Crowd RE is an emerging avenue for engaging the general public or the so called crowd in variety of requirements engineering tasks. Crowd RE scales RE by involving, potentially, millions of users. Although humans are at the center of Crowd RE, automated techniques are necessary (1) to derive useful insights from large amounts of raw data the crowd can produce; and (2) to drive the Crowd RE process, itself, by facilitating novel workflows combining crowd and machine intelligence.To facilitate automated techniques for Crowd RE, first, we showcase a crowd-acquired dataset, consisting of requirements and their ratings on multiple dimensions for the smart homes application domain. Our dataset is unique in that it contains not only requirements, but also the characteristics of the crowd workers who produced those requirements including their demographics, personality traits, and creative potential. Understanding the crowd characteristics is essential to developing effective Crowd RE processes. Second, we outline key challenges involved in automating Crowd RE and describe, how our dataset can serve as a foundation for developing such automated techniques.}, note={Data Track}, journal={2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE)}, publisher={IEEE}, author={Murukannaiah, Pradeep K. and Ajmeri, Nirav and Singh, Munindar P.}, year={2017}, pages={512–515} } @article{murukannaiah_ajmeri_singh_2016, place={United States}, title={Acquiring Creative Requirements from the Crowd Understanding the Influences of Personality and Creative Potential in Crowd RE}, ISSN={["2332-6441"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85007232627&partnerID=MN8TOARS}, DOI={10.1109/re.2016.68}, abstractNote={As a creative discipline, Requirements Engineering (RE), lends importance to understanding the associated human factors. Crowd RE, the approach of acquiring requirements from members of the public-the so-called crowd-emphasizes human factors further. We investigate how human personality and creative potential influence a requirement acquisition task. These factors are of specific importance to Crowd RE because (1) crowd workers are generally not trained in RE, and (2) a key motivation in engaging them is to benefit from their creativity. We propose a sequential Crowd RE process, where workers in one stage review requirements from the previous stage and produce additional requirements. To reduce potential information overload in this process, we propose strategies for selecting requirements from one stage to expose to workers in later stages. We conducted a study on Amazon Mechanical Turk tasking 300 workers with creating requirements via the above sequential process (in the domain of smart home applications for concreteness) and tasking an additional 300 workers to rate the creativity (novelty and usefulness) of those requirements. Our findings offer insights on how to carry out Crowd RE effectively. First, we find that a crowd worker's (1) creative potential, and personality traits of openness and conscientiousness have significant positive influence on the novelty of the worker's ideas, and (2) personality traits of agreeableness and conscientiousness have significant positive influence, but extraversion has significant negative influence on the usefulness of the worker's ideas. Second, we find that exposing a worker to ideas from previous workers cognitively stimulates the worker to produce creative ideas. Third, we identify effective strategies based on personality traits and creative potential for selecting a few requirements from a pool of previous requirements to stimulate a worker.}, journal={2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE)}, publisher={IEEE}, author={Murukannaiah, Pradeep K. and Ajmeri, Nirav and Singh, Munindar P.}, year={2016}, pages={176–185} } @article{nardin_balke-visser_ajmeri_kalia_sichman_singh_2016, title={Classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems}, volume={31}, ISSN={0269-8889 1469-8005}, url={http://dx.doi.org/10.1017/s0269888916000023}, DOI={10.1017/s0269888916000023}, abstractNote={Abstract}, number={2}, journal={The Knowledge Engineering Review}, publisher={Cambridge University Press (CUP)}, author={Nardin, Luis G. and Balke-Visser, Tina and Ajmeri, Nirav and Kalia, Anup K. and Sichman, Jaime S. and Singh, Munindar P.}, year={2016}, month={Mar}, pages={142–166} } @misc{classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems_2016, volume={31}, number={2}, journal={Knowledge Engineering Review}, year={2016}, pages={142–166} } @inproceedings{ajmeri_jiang_chirkova_doyle_singh_2016, title={Coco: Runtime reasoning about conflicting commitments}, volume={2016-January}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85006107006&partnerID=MN8TOARS}, booktitle={IJCAI International Joint Conference on Artificial Intelligence}, publisher={IJCAI}, author={Ajmeri, Nirav and Jiang, Jiaming and Chirkova, Rada Y. and Doyle, Jon and Singh, Munindar P.}, year={2016}, pages={17–23} } @article{murukannaiah_ajmeri_singh_2016, title={Engineering Privacy in Social Applications}, volume={20}, ISSN={["1941-0131"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-84963904023&partnerID=MN8TOARS}, DOI={10.1109/mic.2016.30}, abstractNote={Experience with a social application depends crucially upon how it supports or interferes with the users' social expectations. Because privacy is central to the user's experience, the authors introduce Danio, a methodology based on modeling users' expectations in various contexts. Preliminary evaluation involving 34 developers suggests that Danio simplifies the development of social applications and saves time during implementation and testing.}, number={2}, journal={IEEE INTERNET COMPUTING}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Murukannaiah, Pradeep K. and Ajmeri, Nirav and Singh, Munindar P.}, year={2016}, pages={72–76} } @article{jiang_ajmeri_chirkova_doyle_singh_2016, place={United States}, title={Expressing and Reasoning about Conflicting Norms in Cybersecurity: Poster}, url={https://research-information.bris.ac.uk/en/publications/e9671b9b-a86b-4588-af75-a5ccf018632e}, DOI={10.1145/2898375.2898395}, abstractNote={Secure collaboration requires the collaborating parties to apply the right policies for their interaction. We adopt a notion of conditional, directed norms as a way to capture the standards of correctness for a collaboration. How can we handle conflicting norms? We describe an approach based on knowledge of what norm dominates what norm in what situation. Our approach adapts answer-set programming to compute stable sets of norms with respect to their computed conflicts and dominance. It assesses agent compliance with respect to those stable sets. We demonstrate our approach on a healthcare scenario.}, journal={SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY}, publisher={ACM Press}, author={Jiang, Jiaming and Ajmeri, Nirav and Chirkova, Rada Y. and Doyle, Jon and Singh, Munindar P.}, year={2016}, pages={63–64} } @inproceedings{kafali_ajmeri_singh_2016, place={United States}, title={Formal Understanding of Tradeoffs among Liveness and Safety Requirements}, url={https://research-information.bris.ac.uk/en/publications/d97ca86f-725a-4585-aaa9-803fcd3ccbe6}, DOI={10.1109/rew.2016.017}, abstractNote={Understanding tradeoffs among stakeholder requirements regarding liveness (something good happens) and safety (nothing bad happens) is crucial for designing sociotechnical systems (STSs). Safety-focused specifications restrict agents' actions to avoid undesired executions. However, such restrictions hinder liveness. We formalize such tradeoffs using the elements of an STS specification to understand how much a specification promotes liveness or safety. We propose metrics to measure liveness and safety, and demonstrate how constraint logic programming is used to compute such metrics.}, note={Extended abstract}, booktitle={2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)}, publisher={IEEE}, author={Kafali, Ozgur and Ajmeri, Nirav and Singh, Munindar P.}, year={2016}, month={Sep}, pages={17–18} } @inproceedings{kafali_ajmeri_singh_2016, place={United States}, title={Normative Requirements in Sociotechnical Systems}, url={https://research-information.bris.ac.uk/en/publications/3b03def6-4931-4756-9383-8db0edc5156b}, DOI={10.1109/rew.2016.049}, abstractNote={Refining a sociotechnical system (STS) specification with respect to its requirements is a nontrivial task. Previous work on verification and refinement of software systems either ignores the social dimension, or limits the autonomy of agents by controlling their interactions. We address these limitations by proposing an STS specification that provides not only regimentation via control mechanisms that describe how agents interact with software components, but also regulation via norms that characterize the expectations of agents from each other. We use formal verification techniques to understand whether an STS specification meets the functional, security, and privacy requirements of its stakeholders. If a requirement is not satisfied, we suggests refinements based on normative design patterns.}, note={Extended abstract}, booktitle={2016 IEEE 24th International Requirements Engineering Conference Workshops (REW)}, publisher={IEEE}, author={Kafali, Ozgur and Ajmeri, Nirav and Singh, Munindar P.}, year={2016}, month={Sep}, pages={259–260} } @article{kafaly_ajmeri_singh_2016, title={Revani: Revising and Verifying Normative Specifications for Privacy}, volume={31}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-84991491953&partnerID=MN8TOARS}, DOI={10.1109/mis.2016.89}, abstractNote={Privacy remains a major challenge today, partly because it brings together social and technical considerations. Yet, current software engineering focuses only on the technical aspects. In contrast, the authors' approach, Revani, understands privacy from the standpoint of sociotechnical systems (STSs), with particular attention on the social elements of STSs. They specify STSs via a combination of technical mechanisms and social norms founded on accountability. Revani provides a way to formally represent mechanisms and norms and applies model checking to verify whether specified mechanisms and norms would satisfy stakeholder requirements. Additionally, Revani provides a set of design patterns and a revision tool to update an STS specification as necessary. The authors demonstrate the work of Revani on a healthcare emergency use case pertaining to patient privacy during disasters.}, number={5}, journal={IEEE Intelligent Systems}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Kafaly, Ozgur and Ajmeri, Nirav and Singh, Munindar P.}, year={2016}, month={Sep}, pages={8–15} } @inproceedings{lauren_pigg_2016, title={Toward entrepreneurial pedagogies: rethinking professional networking as knowledge making}, DOI={10.1109/ipcc.2016.7740535}, abstractNote={This paper offers initial suggestions for teaching professional social networking as a technical communication practice. Our guidelines build from recent qualitative research analyzing the networking relationships, practices, and technologies that support technical communication entrepreneurship. This research demonstrated how technical communication entrepreneurs perceive networking to be steeped in learning and sharing knowledge across professional and personal social fields. Based on what was learned from participants, we offer a model for and guidelines toward teaching networking as connected to knowledge sharing and building. This paper next offers an example assignment sequence from a master's level technical communication course focused on online information design. Through research and theory building, we suggest that instructors and students should understand professional social networking as a multilayered practice of learning and sharing collective knowledge.}, booktitle={2016 ieee international professional communication conference (ipcc)}, author={Lauren, B. and Pigg, S.}, year={2016} } @inproceedings{du_narron_ajmeri_berglund_doyle_singh_2015, title={ENGMAS -- Understanding Sanction under Variable Observability in a Secure Environment}, url={https://research-information.bris.ac.uk/en/publications/fc2ee9eb-cd0d-4d86-b8c2-18e02413c28d}, booktitle={Proceedings of the 2nd International Workshop on Agents and CyberSecurity (ACySE)}, author={Du, Hongying and Narron, Bennett Y. and Ajmeri, Nirav and Berglund, Emily and Doyle, Jon and Singh, Munindar P.}, year={2015}, month={May}, pages={15–22} } @inproceedings{yuan_ajmeri_allred_telang_wilson_singh_2015, place={United States}, title={Modeling analytics as knowledge work: Computing meets organizational psychology}, volume={2015-June}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-84937926189&partnerID=MN8TOARS}, DOI={10.1109/rcis.2015.7128899}, abstractNote={This paper reports on an ongoing interdisciplinary study of analytic workflow, describing our preliminary understanding and findings as well as some directions for further investigation and validation. Specifically, we exploit knowledge from organizational psychology to develop a computational organizational model. Our proposed organizational model provides a framework to understand the impact of organizational level variables and worker characteristics on workflow performance, providing a view to create justifiable interventions to improve performance. To evaluate the viability of the model, we develop a multiagent simulation framework and design an experimental study.}, number={June}, booktitle={Proceedings - International Conference on Research Challenges in Information Science}, publisher={IEEE}, author={Yuan, Guangchao and Ajmeri, Nirav S. and Allred, Chris and Telang, Pankaj R. and Wilson, Mark and Singh, Munindar P.}, year={2015}, pages={382–387} } @inproceedings{du_narron_ajmeri_berglund_doyle_singh_2015, place={United States}, title={Understanding sanction under variable observability in a secure, collaborative environment}, volume={21-22-April-2015}, ISBN={9781450333764}, url={http://dx.doi.org/10.1145/2746194.2746206}, DOI={10.1145/2746194.2746206}, abstractNote={Norms are a promising basis for governance in secure, collaborative environments---systems in which multiple principals interact. Yet, many aspects of norm-governance remain poorly understood, inhibiting adoption in real-life collaborative systems. This work focuses on the combined effects of sanction and the observability of the sanctioner in a secure, collaborative environment. We present CARLOS, a multiagent simulation of graduate students performing research within a university lab setting, to explore these phenomena. The simulation consists of agents maintaining "compliance" to enforced security norms while remaining "motivated" as researchers. We hypothesize that (1) delayed observability of the environment would lead to greater motivation of agents to complete research tasks than immediate observability and (2) sanctioning a group for a violation would lead to greater compliance to security norms than sanctioning an individual. We find that only the latter hypothesis is supported. Group sanction is an interesting topic for future research regarding a means for norm-governance which yields significant compliance with enforced security policy at a lower cost. Our ultimate contribution is to apply social simulation as a way to explore environmental properties and policies to evaluate key transitions in outcome, as a basis for guiding further and more demanding empirical research.}, booktitle={Proceedings of the 2015 Symposium and Bootcamp on the Science of Security - HotSoS '15}, publisher={ACM Press}, author={Du, Hongying and Narron, Bennett and Ajmeri, Nirav and Berglund, Emily and Doyle, Jon and Singh, Munindar P.}, year={2015}, pages={12:1–12:10} } @inproceedings{kalia_ajmeri_chan_cho_adalı_singh_2014, title={A model of trust, moods, and emotions in multiagent systems and its empirical evaluation}, volume={1740}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-85006168135&partnerID=MN8TOARS}, booktitle={CEUR Workshop Proceedings}, author={Kalia, Anup K. and Ajmeri, Nirav and Chan, Kevin and Cho, Jin-Hee and Adalı, Sibel and Singh, Munindar P.}, year={2014}, pages={1–11} } @article{daneva_veen_amrit_ghaisas_sikkel_kumar_ajmeri_ramteerthkar_wieringa_2013, title={Agile requirements prioritization in large-scale outsourced system projects: An empirical study}, volume={86}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-84875238853&partnerID=MN8TOARS}, DOI={10.1016/j.jss.2012.12.046}, abstractNote={The application of agile practices for requirements prioritization in distributed and outsourced projects is a relatively recent trend. Hence, not all of its facets are well-understood. This exploratory study sets out to uncover the concepts that practitioners in a large software organization use in the prioritization process and the practices that they deem good. We seek to provide a rich analysis and a deep understanding of three cases in an exploratory study that was carried out in a large and mature company, widely recognized for its excellence and its engagement in outsourced software development. We used in-depth interviews for data collection and grounded theory techniques for data analysis. Our exploration efforts yielded the following findings: (i) understanding requirements dependencies is of paramount importance for the successful deployment of agile approaches in large outsourced projects. (ii) Next to business value, the most important prioritization criterion in the setting of outsourced large agile projects is risk. (iii) The software organization has developed a new artefact that seems to be a worthwhile contribution to agile software development in the large: ‘delivery stories’, which complement user stories with technical implications, effort estimation and associated risk. The delivery stories play a pivotal role in requirements prioritization. (iv) The vendor's domain knowledge is a key asset for setting up successful client-developer collaboration. (v) The use of agile prioritization practices depends on the type of project outsourcing arrangement. Our findings contribute to the empirical software engineering literature by bringing a rich analysis of cases in agile and distributed contexts, from a vendor's perspective. We also discuss the possible implications of the results for research and in practice.}, number={5}, journal={Journal of Systems and Software}, publisher={Elsevier Inc.}, author={Daneva, Maya and Veen, Egbert and Amrit, Chintan and Ghaisas, Smita and Sikkel, Klaas and Kumar, Ramesh and Ajmeri, Nirav and Ramteerthkar, Uday and Wieringa, Roel}, year={2013}, pages={1333–1353} } @inproceedings{hang_ajmeri_singh_parsons_2013, title={Argumentation, Evidence, and Schemes: Abstract}, url={https://research-information.bris.ac.uk/en/publications/3b00f0ba-3768-4e45-94f5-93d1a4661f2b}, booktitle={Proceedings of the 10th International Workshop on Argumentation in Multi-Agent Systems (ArgMAS 2013)}, author={Hang, Chung-Wei and Ajmeri, Nirav and Singh, Munindar P. and Parsons, Simon D.}, year={2013}, month={May}, pages={37} } @article{ghaisas_ajmeri_2013, title={Knowledge-Assisted Ontology-Based Requirements Evolution}, DOI={10.1007/978-3-642-34419-0_7}, journal={Managing Requirements Knowledge}, publisher={Springer Berlin Heidelberg}, author={Ghaisas, S. and Ajmeri, N.}, year={2013}, pages={143–167} } @inbook{ghaisas_ajmeri_2013, place={Germany}, title={Knowledge-Assisted Ontology-Based Requirements Evolution}, url={https://research-information.bris.ac.uk/en/publications/9d328913-4eb3-4403-bf6f-bbf20ed08017}, booktitle={Managing Requirements Knowledge (MaRK)}, publisher={Springer Berlin Heidelberg}, author={Ghaisas, Smita and Ajmeri, Nirav}, editor={Maalej, Walid and Thurimella, Anil KumarEditors}, year={2013}, pages={143–167} } @inproceedings{ajmeri_vidhani_bhat_ghaisas_2011, place={United States}, title={An Ontology-based method and tool for cross-domain requirements visualization}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-80555133306&partnerID=MN8TOARS}, DOI={10.1109/MARK.2011.6046558}, abstractNote={The complexity associated with understanding the cross-domain scope of a requirement has always been a challenge. Requirement Analysts use their experience in determining the functional scope boundaries of requirements. However, chances of missing out key concepts in domains peripheral to the domain of interest are quite high. Ontologies are increasingly becoming the standard way of representing shared understanding of a domain and their use in understanding and visualizing the cross-domain scope of requirements can be a step towards improving the completeness of requirements. We present a method - based on ontology mapping technique, and an assisting tool that would help Requirement Analysts visualize - how requirements span across multiple domains.}, booktitle={2011 4th International Workshop on Managing Requirements Knowledge, MaRK'11 - Part of the 19th IEEE International Requirements Engineering Conference, RE'11}, publisher={IEEE}, author={Ajmeri, Nirav and Vidhani, Kumar and Bhat, Manoj and Ghaisas, Smita}, editor={Maalej, Walid and Thurimella, Anil KumarEditors}, year={2011}, pages={22–23} } @inproceedings{rose_bhat_vidhani_ajmeri_gole_ghaisas_2011, title={Intelligent informatics platform for nano-agriculture}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-84858984936&partnerID=MN8TOARS}, DOI={10.1109/NANO.2011.6144536}, abstractNote={The application of nanotechnology in the agricultural sector is likely to facilitate and frame the next stage of development of genetically modified crops, precision farming techniques (remote and local sensing), remediation (water treatment plants, pesticide removal from ground water), nano-sensors, nano-agricultural chemicals and most importantly designing smart delivery systems for nutrients and pesticides[1]. Although most of these applications are still in their infancy, they have a great potential to revolutionalize the entire agricultural value chain [2]. The wide spectrum of applications has resulted into emergence of multiple stakeholders such as nano-agriculture researchers, practitioners (agriculturists/ farmers), manufacturers and regulatory bodies. They would be seeking and using knowledge in this nascent area from different perspectives such as research and technology, consumer safety, environmental impact and ethical, legal and social implications. No informatics platform exists to cater to the knowledge needs of various stakeholders in this field. To address this gap, we have developed an intelligent Nano-Agriculture Informatics System (NAIS), wherein these stakeholders can carry out multiple activities of their interest. NAIS incorporates a collaborative and semantically guided process to facilitate knowledge-based activities.}, booktitle={Proceedings of the IEEE Conference on Nanotechnology}, publisher={IEEE}, author={Rose, Preethu and Bhat, Manoj and Vidhani, Kumar and Ajmeri, Nirav and Gole, Anand and Ghaisas, Smita}, year={2011}, pages={916–919} } @inproceedings{ajmeri_sejpal_ghaisas_2010, title={A semantic and collaborative platform for agile requirements evolution}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-78650508595&partnerID=MN8TOARS}, DOI={10.1109/MARK.2010.5623810}, abstractNote={The characteristics of web-based and community-oriented social software are very useful in the context of software engineering in general and requirements engineering in particular. Their ease of use, transparency of communication, user orientation, self organization and emergent nature resulting from a continual social feedback are particularly relevant to an agile requirements definition exercise. The reason is that agile requirements are inherently meant to be collaboration-intensive. However, while the benefits of social platforms are valuable, they are necessary and not sufficient in themselves for making the exercise effective. The emerging social software engineering discipline is about enabling community-driven creation, management and deployment of software by applying methods, processes and tools in online environments. In this paper, we report our work on a semantic and collaborative platform that combines the virtues of social software principles and the semantic web concepts to enable knowledge-assisted agile requirements definition.}, booktitle={2010 3rd International Workshop on Managing Requirements Knowledge, MaRK'10}, publisher={IEEE}, author={Ajmeri, Nirav and Sejpal, Riddhima and Ghaisas, Smita}, year={2010}, pages={32–40} } @inproceedings{kumar_ajmeri_ghaisas_2010, place={United States}, title={Towards knowledge assisted agile requirements evolution}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-77954974537&partnerID=MN8TOARS}, DOI={10.1145/1808920.1808924}, abstractNote={This paper presents work on a recommendation system for Knowledge assisted Agile Requirements Evolution (K-gileRE). We treat requirements engineering as a special case of knowledge engineering and emphasize the fact that providing a domain knowledge edge can impart agility to the requirements definition exercise. The approach differs from existing agile methods in that it seamlessly incorporates a domain knowledge base into an agile requirements definition framework and explicitly provides to requirement analysts, relevant online domain specific recommendations based on underlying ontologies. The framework presents a 'domain knowledge seed' to requirement analysts. The seed provides a view of core features in a given domain and associated knowledge elements such as business processes, rules, policies, partial data models, use cases and test cases,. These in turn are mapped with agile requirements elements such as user stories, features, tasks, product backlog, sprints and prototype plans. The requirement analyst can evolve the seed to suit her specific project needs. As she modifies and evolves the seed specification, she receives domain-specific online recommendations to improve the correctness, consistency and completeness of her requirement specification documents and executable models. Using the domain knowledge seed as a point of departure provides a jump-start to her project. Each exercise of requirements definition thus becomes an evolution from the seed instead of the traditional 'clean slate' Requirements Engineering (RE) that typically starts from the scratch. Hence, the term K-gileRE. We elaborate how K-gileRE helps in practicing the essence of agile doctrines while defining software requirements by providing just-in-time recommendations.}, booktitle={Proceedings - International Conference on Software Engineering}, publisher={Association for Computing Machinery (ACM)}, author={Kumar, Manish and Ajmeri, Nirav and Ghaisas, Smita}, editor={Holmes, Reid and Robillard, Martin P. and Walker, Robert J. and Zimmermann, ThomasEditors}, year={2010}, pages={16–20} } @inproceedings{rose_kumar_ajmeri_agrawal_sivakumar_ghaisas_2009, title={A method and framework for domain knowledge assisted requirements evolution (k-re)}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-84898822394&partnerID=MN8TOARS}, booktitle={CONSEG 2009 - Proceedings of the International Conference on Software Engineering}, author={Rose, P. and Kumar, M. and Ajmeri, N. and Agrawal, M. and Sivakumar, V. and Ghaisas, S.}, year={2009}, pages={87–97} }