Models of the behavior of people searching the Internet A Petri Net approach

合集下载

英语作文对天文的解释

英语作文对天文的解释

英语作文对天文的解释Astronomy is the study of celestial objects, such as stars, planets, comets, and galaxies. It is one of theoldest sciences and has been studied for thousands of years. Astronomy is a fascinating subject that has captured the imaginations of people for centuries. It is a science that has helped us to understand our place in the universe and has inspired us to explore the unknown.The study of astronomy can be divided into several branches, including observational astronomy, theoretical astronomy, and astrophysics. Observational astronomyinvolves the use of telescopes and other instruments to study celestial objects. Theoretical astronomy involves the development of mathematical models to explain the behaviorof these objects. Astrophysics is a branch of astronomythat focuses on the physical properties of celestial objects.One of the most important discoveries in astronomy wasmade by the Polish astronomer Nicolaus Copernicus in the 16th century. Copernicus proposed that the sun, not the Earth, was the center of the solar system. This idea was revolutionary at the time and challenged the prevailing view that the Earth was the center of the universe. Copernicus' theory was later confirmed by the observations of Galileo Galilei and others.Another important discovery in astronomy was made by the German astronomer Johannes Kepler in the 17th century. Kepler discovered that the planets move in elliptical orbits around the sun, rather than in perfect circles as had been previously thought. This discovery helped to explain the observed motions of the planets and laid the groundwork for the development of modern astronomy.The study of astronomy has also led to many practical applications. For example, astronomers use their knowledge of celestial objects to develop accurate calendars and timekeeping systems. They also use their understanding of the properties of light to develop technologies such as telescopes and cameras.In recent years, astronomy has also played a key role in the search for extraterrestrial life. Astronomers have discovered thousands of planets orbiting other stars, and are working to determine whether any of these planets could support life as we know it.In conclusion, astronomy is a fascinating subject that has contributed greatly to our understanding of the universe. From the ancient observations of the stars to the cutting-edge research of modern astronomers, this science has captured the imaginations of people for centuries. As we continue to explore the universe, we are sure to make many more exciting discoveries in the field of astronomy.。

新视野大学英语第三版读写教程第二册翻译及填空题答案

新视野大学英语第三版读写教程第二册翻译及填空题答案

Unit 11.中国书法(calligraphy)是一门独特的艺术、是世界上独一无二的艺术瑰宝。

Chinese calligraphy is a unique art and the unique art treasure in the world2.中国书法艺术的形成,发展与汉文字的产生与演进存在着密不可分的关系。

The formation and development of the Chinese calligraphy is closely related to the emergence and evolution of Chinese characters.3.汉字在漫长的演变发展过程中,一方面起着交流思想、继承文化的重要作用,另一方面它本身又形成了一种独特的艺术。

In this long evolutionary process, Chinese characters have not only played an important role in exchanging ideas and transmitting culture but also developed into a unique art form. 4.书法能够通过作品把书法家个人的生活感受、学识、修养、个性等折射出来,所以,通常有“字如其人”的说法。

Calligraphic works well reflect calligraphers' personal feelings, knowledge, self-cultivation, personality, and so forth, thus there is an expression that "seeing the calligrapher's handwriting is like seeing the person".5.中国书法不仅是中华民族的文化瑰宝,而且在世界文化艺术宝库中独放异彩。

“人肉搜索”的英文文献

“人肉搜索”的英文文献

The Most Heated Discussion About "Human Flesh Search"Abstract: in recent years, appeared in the field of Internet "human flesh search" phenomenon, has been more and more attention by people. On the one hand, the "human flesh search" has a certain significance to social supervision by public opinion, on the other hand, it usually is a group for one person to the so-called moral judgment, often involving violations of personal privacy and infringement of citizens' other legitimate rights and interests. Therefore, in order to protect the lawful rights and interests of citizens and at the same time, play a role of "human flesh search" positive, rational of constraint has important theoretical and realistic significance.Key words: the Internet; Human flesh search; The infringement; The right to privacy1 what is "human flesh search"In the online world, people mainly adopt the way of network retrieval or search the Internet for information. At present, the Internet offers a variety of search tools, such as classification of type directory search engine, search engine keywords retrieval, content retrieval technology, such as additional search sites such as baidu, Google, to the people a lot of information retrieval provides a lot of help. And "human flesh search" is in recent years, after traditional search tools, in the field of Internet search of the new network search tool.(1) the concept of "human flesh search""Human flesh search" as a way to search, is relying on tens of thousands of natives and is no longer just rely on the network database, is a kind of natives spontaneously, the collective action. Internet users can make use of Google, Baidu, such as super search engine, enter different keyword; Query from the object of the search target, the target object and friends blog, podcast, BBS, QQ space, etc., to find clues; And use some common and community websites such as taboo, Tanya, mop,baidu tibia, sina BBS, etc., to search for the target object could leave the registration of marks; Through the search target ID or email address, check the IP Numbers, lock the target range in real life, and then determine the true identity, etc.(2) the characteristics of the "human flesh search"Compared with traditional search engines, "human flesh search" has its own characteristics: first, the "human flesh search" is a kind of intelligent type search has the universality. Second, the "human flesh search" can be used as a way of self-help. Because "human flesh search" generalized, their comments can serve as a kind of evaluation mechanism. But, "human flesh search" also has certain blindness. Thanks to answer the question of objects of all kinds, each have each type of knowledge and personality, which must answer the question with some irrational factors. Even too emotional respondents in quite a rough way to attack object of discussion. As we saw, was human flesh search on the net after the identity is "search" exposure, proper criticism is should, but the irrational abuse had strayed from the right reason. This kind of irrational factors, caused by search people great harm, even violated the legitimacy of its personal rights.2 the legal nature of "human flesh search"(1) "human flesh search" is a double-edged sword, "justice" or "evil"First of all, in terms of the essence of "human flesh search", it is a way of searching for information, to make up for the inadequacy of traditional search engines. On the one hand, from a technical point of view, it is of superiority, its itself is not evil, the source of rational use of information retrieval technology innovation performance. "5 • 12" wenchuan after the earthquake, Google's technical personnel are first made specifically for "human flesh search engine" find relatives. The mailbag search platform gathered in the short term and earthquake emergency hospital site news, let users search anxiously looking for loved ones. It also highlighted the "human flesh search" justice of the engine. As months of the south China tiger event can eventuallyfalls out, "human flesh search" power also is obvious. But on the other hand, if the "human flesh search" improper use of words, is a disaster for the people. As in the China central television (CCTV) reported on the network audio and video news, appeared a Beijing middle school schoolgirls zhang said in an interview. The girl said in an interview: "the last time I use the Internet, suddenly pop up a web page, very erotic, very violent, I hasten to give it to shut." In the end, the students' personal information are exposed, give zhang caused great impact, because the victim is a minor, and thus the case caused more people to the problem of human flesh search invasion of privacy.(2) the "human flesh search" violated the legitimate rights and interests of citizensThe scholar thinks, network has played a positive role in supervision, public opinion, prompted both parties on the conscience of the enlightenment, also others have touched and constraints to the society. However, these are the information that "human flesh search", did not consult the opinion of the search, under the condition of the client without knowing or reluctant, became public, and from the social various aspects attack even scratch faze. The author believed that person don't scruple the legitimate rights and interests of others, such as personal privacy and dignity of the law has given all the rights and interests of people in search of such a "human flesh search" improper network, should belong to the infringement behavior in legal nature. Therefore, in such event, whether online or in real life, "human flesh search" is a violation of the parties legitimate rights and interests, also to the real life of the parties caused serious influence, just very special tort way and carrier.(3) the "human flesh search" relating to the infringement behavior characteristics"Human flesh search" in our country also has a number of sensational network events. Such as: "women's abuse cat" events, events, "Beijing female white-collar Jiang Yan suicide", wenchuan earthquake call names "liaoning women" event. We see, this kind of event mode of "human flesh search", is the lock person or event in reallife as the search object, and then launch a native, release the related information, such as name, age, phone number, QQ number, email, home address, etc. Also appeared in some so-called "fatwa" network, online outrage, hunting on the parties, even out of the network virtual world, spread into the real world. That the parties not powerful mental pressure and social pressure, normal life, work, study to a party with devastating effect. Based on above the summary of the events of "human flesh search", "human flesh search" involved in the infringement, usually has the following several characteristics: first, the universality of infringement behavior person. Second, the diversity of the object of infringement. Third, the complexity of tort liability cognizance.In a word, "human flesh search" involving infringement fact is that not to hide, especially some interference with the privacy of citizens has over the normal moral bottom line. As is known to all, "the law is the minimum moral". Although some events of "human flesh search" has a certain moral can condemn sex, but because of the "human flesh search" behavior such as infringement of reputation, privacy, and disturb others life must be the regulation of the law.3 how to regulate the "human flesh search""Human flesh search" starting from the date of birth has been hovering between law and morality, in which the illegal behavior, have already beyond the bottom line of justice. There is no doubt that the "human flesh search" regulation in legislation is imperative. Rather than on the legal regulation, must pay attention to the following two aspects:(1) clear "human flesh search" relating to the infringement behavior subject and its legal liability"Human flesh search" relating to the infringement behavior main body shall include: "bounty hunters", Internet users and network operators.First of all, as a problem to search the original publisher, "bounty hunters" will be released. On the one hand, some questions have a Ming harm the directivity of infringing upon the citizen right of privacy. When they publish information or, on theother hand, published articles, make the party in the reality is accordingly under attack, or the damaged caused by false public comments, would be easy to violate the privacy rights of the parties and reputation. So it should be correct motive, guarantee the authenticity of the comment, active protection related to people's privacy.Second, "human flesh search" the biggest characteristic is of many Internet users get to participate in, for "human flesh search" of Internet users, there are the following several types: one is the organization launched a "human flesh search", is one is in real life according to oneself know the victim's personal information and privacy, etc, shall be publicly disclosed on the Internet users for the first time. One is referring to on the network, has publicly on the Internet for various kinds of normal reasons of information collecting, comparing and sorting, summary of the victim's personal information and privacy and other content focused issue in Internet users on the "human flesh search" page. There is a Internet users, is the illegal use of victims of disclosure of personal information and privacy, the implementation of other tort, such as telephone harassment, personal attacks, violation of property, etc. Nettie’s, we think, the irrational expression and the abuse of network freedom of speech is the main reason for the "human flesh search". In addition, the majority of Internet users actually belong to the "cross type", and "enthusiasm" to participate in online abuse, privacy, while "tireless" in real-life harassment on the parties. Although there are real violence is not in network, but overall, netizens online infringement, also extends to the real life directly. So we must to netizens in the network space and corresponding regulation behavior in real life, to stop the infringement occurred.Finally, network management is between the publisher and disseminator of intermediary platform provider, on the one hand, it is not before the user articles to read, modify, or delete, but it can in the user will be uploaded and published by the system automatically, its content can be abridged, amended, or even completely delete to prevent from there continue to spread, in order to prevent the injury consequence expands, and not for profit purpose, violated its own obligation to review. On the other hand, because of lack of ZeRenHua network anonymous propagation characteristics, make "searcher" forget the real life of legal responsibility, this is actually a misunderstanding and abuse of network virtual property. As soon as possible, therefore, we should also establish network identity authentication system, network news system, strengthen the supervision of online comments, reduce the emergence of the Internet mob, realize the violators of the criminal law.(2) must strengthen the legislation of right of privacy protection"Human flesh search" is related to the object of infringement, the most main is the privacy of the parties. But at present our country constitution, criminal law, procedure law and administrative laws and regulations are made rules to protect privacy. Current civil law, however, there is no direct provision of privacy protection, just in the 101th regulation: "citizens and legal persons shall enjoy reputation, only the personal dignity of citizens of protected by law, and banned with insult, libel and otherwise damage the reputation of citizens and legal persons." But caused by "human flesh search" privacy breaches, apply for the settlement of reputation tort law nature is inappropriate.conclusionIn contemporary society public opinion is a good moral character and integrity maintenance and purification of powerful weapons. If somebody's behavior is out of line, often with social public opinion, strong criticism and condemnation. "Human flesh search" as a "network of public opinion" in maintaining social public opinion, is good. We can take advantage of the "human flesh search" exert its social function of public opinion, but at the same time, it must be to spec with the help of a network of malicious rumors, slander, exposure privacy as well as some irrational behavior. Network space is also calling for rational, this behavior is not only belongs to morality itself, therefore, gradually involved in the "human flesh search" infringement of citizens' legitimate interests, we must strengthen legislation regulating them, at the same time, improve the quality of netizens. Anyway, regardless of how the development of Internet technology, it is still a double-edged sword, both benefit for us, and come back to hurt us, the key lies in how we use it.人肉搜索”当前热议问题探究摘要:近年来,在互联网领域出现的“人肉搜索”现象,已经受到人们越来越多的关注。

《跨文化交际》_名词解释

《跨文化交际》_名词解释

1.Globalization is considered as a process of increasing involvment in international businessoperations.经济学视角中的全球化表现为不断增加的国际商务往来过程。

2.Macroculture:The term macroculture implies losing ethnic differences and forming onelarge society.宏观文化意味着种族差异的消失和一个大社会的形成。

3.Melting pot means a sociocultural assimilation of people of different backgrounds andnationlities.熔炉:不同背景和国籍的人们之间的社会文化的同化。

4.Microcultures:cultures within cultures微观文化:文化中的文化5.Intercultural communication refers to communication between people whose cultureperceptions and symbol systems are distinct enough to alter the communication event.跨文化交际:指拥有不同文化认知和符号体系的人文之间进行的交际。

Chapter 16.Culture is a learned set of shared interpretations about beliefs,values,and norms,which affectthe behavior of a relatively large group of people.文化是习得的一套关于信仰,价值观,规范的公认的解释,这些信仰,价值观,规范对相当大人类群体的行为产生影响。

62.《跨文化交际》_名词解释

62.《跨文化交际》_名词解释

名词解释1.Intercultural communication refers to communication between people whose cultureperceptions and symbol systems are distinct enough to alter the communication event.跨文化交际:指拥有不同文化认知和符号体系的人文之间进行的交际。

2.Culture is a learned set of shared interpretations about beliefs, values, and norms, whichaffect the behavior of a relatively large group of people.文化是习得的一套关于信仰,价值观,标准的公认的解释,这些信仰,价值观,标准对相当大人类群体的行为产生影响。

3.Culture identity refers to one’s sense of belonging to a particular culture or ethnic group.文化身份:指有意识地把自己归为某一特定文化或种族群体。

4.Subculture are formed by groups of people possessing characteristic traits that set apart anddistinguish them from others within a larger society or dominant culture.亚文化:具有能在更大的一个社会范围内或主流文化中使自己有别于他人的特点的人类群体所形成的文化。

5.Norms are culturally ingrained principles of correct and incorrect behaviors which, if brokencarry a form of overt or covert penalty.标准指的是正确和不正确行为根深蒂固的文化原那么,这种不正确的行为一旦发生,就意味着一种显性或隐性的处分。

高中新教材英语课件必修第三册MoralsandVirtues晨读晚诵

高中新教材英语课件必修第三册MoralsandVirtues晨读晚诵

Emotional Attitude Values Objective
To cultivate students' moral awareness and social responsibility, guide them to establish correct values and moral values, and form a sound personality and quality.
In addition, the article also employs some rhetorical devices, such as metaphors, parallelism, etc., to enhance the expressive and infectious power of the article.
The fundamental task of this textbook is to cultivate students' socialist core values and guide them to form correct worldviews, outlooks on life, and values.
Moral cultivation refers to the process of improving an individual's moral character and behavioral level through learning and practice.
Sentence structure analysis
• Through multiple perspectives and examples, the article demonstrates the power and influence of morality and virtue, as well as the importance of cultivating morality and virtue.

孔融让梨英文版ppt

孔融让梨英文版ppt
• By emphasizing the importance of family harmony, Kong Rong hopped to promote positive relationships among family members He believed that a harmonious family is the foundation for a happy and successful life, and that family members should respect and care for each other
02
The Story of Kong Rongrang's Pearl
Story Overview
Plot
The story revolves around Kong Rongrang, a poor yet intelligent boy, and his request to find a ray and valuable pear
modern society • Conclusion
01
Introduction
Story background
Period Setting
Set in the Three Kingdoms period of Chinese history, when the land is divided into threThe symbol of Kong Rong making pearls
The reality of humanity
• Kong Rong, a common figure in Chinese history, is known for his humanity and modernity He made pearls as a symbol of humility, emphasizing the importance of being a hammer and not an arrow

2024届贵州省贵阳市第一中学高三4月大联考英语试题理试题含解析

2024届贵州省贵阳市第一中学高三4月大联考英语试题理试题含解析

2024届贵州省贵阳市第一中学高三4月大联考英语试题理试题注意事项:1.答题前,考生先将自己的姓名、准考证号码填写清楚,将条形码准确粘贴在条形码区域内。

2.答题时请按要求用笔。

3.请按照题号顺序在答题卡各题目的答题区域内作答,超出答题区域书写的答案无效;在草稿纸、试卷上答题无效。

4.作图可先使用铅笔画出,确定后必须用黑色字迹的签字笔描黑。

5.保持卡面清洁,不要折暴、不要弄破、弄皱,不准使用涂改液、修正带、刮纸刀。

第一部分(共20小题,每小题1.5分,满分30分)1.The police have anyone with information to come forward and talk to them.A.appealed to B.attended toC.responded to D.attached to2.Among the crises that face humans ________ the lack of natural resources.A.is B.are C.is there D.are there3.I am sorry I am very busy now. If I time, I would certainly go to the movies with you.A.have B.hadC.have had D.had had4.I was caught in a traffic jam for over an hour, otherwise, I ________ you waiting for such a long time.A.had not kept B.will not keepC.would not have kept D.have not kept5.The auto factory ______ new profit records through technical innovation — 10% growth rate in the last two years and hopefully 15% this year.A.set B.has setC.is setting D.has been setting6.F/ f riendships fade away if there isn’t ___good balance between the give and the take.A.The;/ B./;a C.The; a D./;the7.If she ________ generous as she makes out she would have donated more money in the catastrophe.A.had been B.wereC.would be D.was8.—What a consequence!—Yes. I ________ him about it, but without success.A.will remind B.would remindC.was reminding D.had reminded9.It is what you do rather than what you say __________ matters.A.that B.whatC.which D.this10.He ________ in a university for five years, but now he runs a company of his own.A.has taught B.had taughtC.taught D.has been teaching11._____________equal opportunities, both Frank and Billy may accomplish the task.A.Given B.GivingC.To give D.to be given12.volleyball is her main focus, she is also great at basketball.A.Since B.OnceC.Unless D.While13.--It is really fun to hike and I often go hiking in the forest.--But hiking alone in the forest ______ be very dangerous.A.can B.must C.shall D.will14.—Mum, I am worrying about my pet dog while we are away.—Boy, you ________. Our neighbor has offered to help us.A.can’t B.wouldn’t C.needn’t D.mustn’t15.What he liked to do was to take an idea and ______ it by finding every possible consequence.A.squeeze B.wrestleC.switch D.shrink16.Enter our prize ______and win a break in a National Trust holiday cottage of your choice anywhere in the country. A.draw B.search C.match D.collection17.Anna was in Inner Mongolia for two years, ____ as a volunteer teacher.A.having worked B.working C.worked D.to work18.All the dishes in this menu,_____ otherwise stated,will serve two to three people.A.as B.if C.though D.unless19.It _____ a Saturday afternoon in May ____ Margaret could arrange for me to meet her elder ,sister.A.was until; when B.was until;thatC.was not until; when D.was not until; that20.—People should stop using their cars and start using public transport.—________. The roads are too crowded as it is.A.All right B.ExactlyC.Go ahead D.Fine第二部分阅读理解(满分40分)阅读下列短文,从每题所给的A、B、C、D四个选项中,选出最佳选项。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Models of the Behavior of People Searching the Internet: A Petri Net ApproachPaul B. KantorAPLab, SCILS, Rutgers University4 Huntington St., New Brunswick, NJ 08903kantor@Ragnar NordlieOslo College, Oslo, Norwayragnar.nordlie@jbi.hioslo.noAbstractPrevious models of searching behavior have taken as their foundation the Markov model of random processes. In this model, the next action that a user takes is determined by a probabilistic rule which is conditioned by the most recent experiences of the user. This model, which has achieved very limited success in describing real data, is at odds with the evidence of introspection in a crucial way. Introspection reveals that when we search we are, more or less, in a state of expectancy, which can be satisfied in a number of ways. In addition, the state can be modified by the accumulated evidence of our searches. The Markov model approach can not readily accommodate such persistence of intention and behavior. The Petri Net model, which has been developed to analyze the interdependencies among events in a communications network, can be adapted to this situation. In this adaptation, the so-called "transitions" of the Petri Net occur only when their necessary pre-conditions have been met. We are able to show that various key abstractions of information finding, such as "document relevance", "a desired number of relevant documents", "discouragement", "exhaustion" and "satisfaction" can all be modeled using the Petri Net framework. Further, we show that this model leads naturally to a new approach to the collection of user data, and to the analysis of transaction logs, by providing a far richer description of the user's present state, without inducing a combinatorial explosion.INTRODUCTIONIt was proposed some twenty years ago (Penniman, 1975) that models of the behavior of users of search systems could be helpful in developing systems that are more effective in serving the user. The overall argument goes like this: if we have an effective model of the behavior of the user of the system, then when we observe deviations from this effective model we can recognize that something strange is happening to the user and invoke some sort of adaptive or corrective mechanism. In the early days this was imagined to be some kind of help demon that would pop up and provide a suggestion. The idea remains an attractive one and forms the basis of new research proposals every year. The idea, however, stands or falls on the existence of an effective model describing the behavior of the user of a search system. To be effective the model must be fairly accurate. Since human beings are not automata, we can not expect that the model will be perfectly accurate. However, it needs to make some kind of prediction about what the user will do next, given information about what the user has done already. In fact, the prediction it makes must be sufficiently sharp that we can also algorithmically decide whether the behavior of the user has deviated from the prediction. This means that we must generate a mathematical approximately predictive model of the user’s behavior.This technical requirement means that some models which are conceptually very interesting, such as a model which characterizes a search in terms of cycles of behavior, recurrent through a special search behavior or state thought of as a fresh start, are not satisfactory for this purpose. A typical model of this form regards repetitions as a non-event. In other words, it doesn’t actually make a prediction as to whetherthe next thing that a user will do is to continue in the present part of the cycle, or to move to another part of the cycle, or perhaps start a new cycle completely.In the search for mathematical models that can make predictions, the field has been dominated by the initial work of Penniman (1975,1982) and Tolle (1983)who postulated a so-called “first order Markov model”. Markov models, although they can be quite complex, can be summarized in a very simple way. When we describe a user by such a Markov model we say that the user (or the user’s behaviors) can be classified into a relatively small number of well-defined groups called “states”. The Markov model says that when a user is in one of those states, the users next action will be to move to one of the other states, according to a fixed random law. The notion of a fixed random law means that for any particular state there is a definite set of probabilities governing the chance that any particular state will be the next one. For example, if there are three states in the system (new start, save results, continue present search), which we will represent in shorthand as (N,S,C,), a typical Markov model might say that if a person is in situation “C” the chance of going to each of the three states is given by some probabilities whose sum is 1, such as (20%, 30%,50%). These probabilities mean that if a searcher is continuing (that is, has just continued at his most recent step,) then the chance that he will continue at the next step is given by 50%. The chance that he will make a new start is 20%, and the chance that he will save his search results is 30%. Subject to all the usual difficulties of dealing with probabilities, this is a very concrete and specific model. Over a reasonably short term, if a user were generally described by such a model, it would be possible to see that he has deviated from his usual behavior.Unfortunately, however, these first-order Markov models, fail almost immediately. This can be verified as follows. If any particular behavior is governed by a first-order Markov process, then the chance of observing a string or chain of length l decreases geometrically with the length of the chain. In other words, if there’s a 50% chance that a continuation will be followed by a continuation, that means that there’s a 25% chance that a continuation is followed by two continuations and there’s a 12.5 % chance that is followed by three continuations and so forth. It is easy to take almost any set of search behavior data, isolate the chains of repeated events, and verify that they do not follow a geometric law. In other words, the first-order Markov model fails.There are three different approaches that can be taken when a model of this type fails. The first which has been explored both by Penniman (1982) and Chapman (1981) is to go to higher order Markov models. In a higher order model, for example a second order model, the description is still in terms of probabilities, but the probability that my next step will be a continuation depends not only on my present state, but also on the immediately preceding state. Models of this type can be built up to be more and more complex, and there has been some effort apply them particularly by Qiu (1993). In a general way the best we can say is that these models are not yet really satisfactory.There are two other directions in which research on salvaging the Markov idea could be pursued, although they have not yet been. The first is to redefine the set of states. States have been chosen on the basis of some qualitative understanding of the search process, and the choice is not really validated by any deep cognitive understanding of the way people search. So perhaps if we were to replace our present choice of states by others we would see that what looks to us now like a long chain in exactly the same state really represents a series of transitions among other states.The second way of extending a Markov model is to ask whether there are some states which are “amnesiac”. This is exactly what the Markov model would like. When I fall into one of the amnesiac states I do forget where I’ve been and my choice of a next state can be accurately described by a random model. On the other hand, there would be states which are “memoryful” in which a person really does remember what has happened before and so the transition or the state following that state is determined by the deeper history. While there is much to be said for random models, in terms of their clarity and simplicity, and while they have been used with success to describe some kinds of human behavior (voting behavior, purchase behavior, and so forth) we believe that another perspective provides a better foundation for tackling the issue of modeling human searching behavior.A MEMORYFUL PERSPECTIVEFrom the point of view of introspection, which is available to all of us, the idea that we do what we do because we remember the past seems entirely natural. In other words, it would seem to us that in trying to fit Markovian models to our human behavior we’re really starting at the wrong end of the spectrum. We ought to start with something that recognizes that we do remember the past. To remember or to know the past does not mean that you have to lack volition or be capricious in your behavior. There is a very precise technical sense in which physical systems remember the past excellently. In other words, while the present state of motion of all the particles in the world is supposed to be able to form the basis for predicting the future motion, it’s also true that that present basis is supposed to be able (under a very deep principle called time reversal invariance) to let us retrodict the entire past. In other words, that present state of information contains complete knowledge about the past as well as whatever it can predict about the future.Guided to some degree by this kind of thinking we can propose what might be called a First Law of Motion relating to searching behavior. Newton’s First Law, which describes the motion of inert physical masses, states that a body at rest tends to remain at rest and a body in motion tends to remain in motion. In much the same way we would like to sharpen the idea that a person engaged in searching tends to remain in motion, whatever that may precisely mean, more or less in the same way that he is in motion now.In the world of physics obviously things don’t remain at rest or in uniform motion all the time. In fact all kinds of interesting things happen. The way this is accommodated in physical law is to say that something called “forces” act on particles or masses and cause them to change the way they are moving. In a very simple analogy, we propose that there are various kinds of cognitive and informational forces which act on a human searcher and cause her to change her behavior or motion.In thinking about people as they are searching, we want to look for a model which captures the notion that there is a kind of momentum in the search process and that the key events are changes that deflect the course of the search process. In the physical analogy these changes are caused by external forces. In the case of humans searching we propose that they be thought of as transitions, caused by or occurring in response to external events.There is a quite well developed mathematical model for discussing systems whose key events are transitions. This model, called the Petri Net Model (Reisig, 1985), was first developed to study problems of synchronization and timing in computer networks and has since been expanded. The central concept of the Petri Net Model is the transition. A transition can be thought of as a node or point in some kind of a network. Every transition has associated with it a set of abstractions called its “input places” and another set of abstractions called it “output places”. Under the basic rules of Petri Nets a transition “fires” if and only if there is at least one marker or token in every one of its input places. In usual operation, when a transition fires it removes exactly one token from each of the input places and distributes one token (tokens are not real things, they are abstractions and the number of tokens distributed may be quite different from the number of tokens removed) to each of the output places.It is easy to see that this basic framework can accommodate the description of many of the kinds of transitions that may occur during searching. For example, we could have a transition called “quit” which has one input place which is called “find a good document”. This model rule means that when a good document is found, a token is placed in the “find a good document” place, the quit transition realizes that its firing conditions are satisfied and it fires. To complete the cycle we could say that there’s a place called “quit” and the “quit” transition places a token in it.In fact an enormous mathematical theory has been developed around these apparently simple concepts, in which the state of the system is a very complex structure represented by a complete listing of how many tokens there are in each of the places of all of the transitions in the network. This complexity is encouraging, because we like to think that mental states of human searchers are very complex, even though we hope to describe them in terms of a relatively simple number of basic transitions.An old idea in information retrieval is that a person may be looking not for a single good or relevant document but for some specific number of them, say 5. The reader may wish to try the exercise of developing a Petri Net using places and transitions as we’ve just defined them to describe a person who keeps searching until 5 good documents have been found, and then quits. However, we warn you in advance that you won’t be able to do that. It turns out that some extension of the Petri Net concept is required in order to do basic arithmetic computations. The simplest way to make the extension is to add two more concepts. The first concept is multi-token removal. If a transition cannot fire until there are, for example 5 tokens in one of its input places (and perhaps just one in each of the other input places) then we can do the kind of counting that we just described. We would just say that this person has a link of weight 5 between the input place for good documents and the transition representing quitting.For more complicated calculations, it turns out also to be necessary to introduce a suppressor link. What this means is that a particular input place may have a negative effect on its transition. So, if this place is occupied, the transition cannot occur. This can be used to hold one transition off and prevent it from occurring until a certain other trigger transition has occurred. This is shown in Fig. 7 where transition A will take a token out of the place called “S” and when that token is removed, transition B will be free to fire.With these added complexities it turns out that the Petri Net Model becomes very rich indeed. In fact, it has been shown mathematically that extended Petri Nets, including these two additional concepts, are able to perform all the computations that can be performed by a Turing Machine; in other words, they are general purpose computers of a very high order.MODELING SOME COMMON SEARCH BEHAVIORS BY PETRI NETSBasics of Petri NetsThe central notion of Petri Nets is the dynamic conceptof a transition, represented by a circle. (Figure 1.) Atransition (T) is an abstraction of the notion that someevent, represented by T, occurs only when other events,on which it depends, have occurred. Those events arerepresented by input places , shown on the left. Whenthe transition occurs, it establishes that some new set ofconditions have been satisfied. These are representedby the output places , to the right of the diagram As the conditions represented by the various places are met, this is indicated by tokens (represented by the shaded circles) in the places. The transition shown in Figure 2 is ready to fire, as all of its input places are filled.In Figure 3, the transition has fired, and tokens nowappear in the output places.Figure 4 shows that the links in a diagram can be given weights. For example, a transition with an input place having a link of weight 3 will not fire until there three tokens in the place, and when it does, it will remove all three of them. Note that if an input place with link weight 1 has accumulated 2tokens, there will be one left. The transition in Figure 4 is ready to fire when one more token arrrives in input place In-P1.Figure 5. After one more token arrived to input P1 ofFigure 4, the output link of weight 2 results in theappearance of two tokens in the place Out-P1. Notethat one token has been left in place In-P3.Figure 6. An even more powerful concept is the suppressor link, indicated by the minus sign in Figure 6. As long as there is a token in place In-P1, the transition T cannot fire.This powerful tool permits the use of Petri nets as generalized arithmetic and decision making devices, in a way that can represent many kinds of human behavoir.Representative Simple User ModelsIn Figure 7 we show the key elements of a Petri Netrepresenting the decision to stop some activity. Thereare two transitions. The one on the right, whichresults in a change, is suppressed by the token in theplace labeled “S”. But as soon as the place labeled“IN” acquires a token, the transition on the left willfire, removing the suppression token in place S.With these basic principles we can build simple networks of transitions to represent possible rules used by human searchers. For example, the network of Figure 8 is a generalized network for a searcher who want to find 5 relevant documents, and will quitwhen, and only when she finds them all.More sophisticated model allow for other circumstances under which user’s change their behavior – in other words, respond to external stimuli or forces with a change in search direction. Still considering that inputs are simply relevant or not relevant, we can model some other kinds of behavior.For example, users may base their decision on some rough estimate of how likely they are to find additional useful documents.Here we show a user who will quit if either of twocircumstances occurs: starting off with 3 bad (that is,not relevant or encouraging) documents, or developing a running average in which more than 1/3 of the documents are not relevant. The QUIT place will be occupied if the first three documents examined are "BAD", as that will exhaust the tokens in the intermediate place. But if a good document is seen, it will add two more tokens to the place, prolonging the time until the user quits.One possible evolution of the model shown in Fig. 9 is detailed in Table 1.Table 1 A possible evolution of Figure 9.Status BAD GOODINT QUIT Initial 0030See a bad doc.10300020See a bad doc.10200010See a good doc.01100030See a bad doc 10300020See a bad doc.10200010See a bad doc 1010001Figure 10 models a searcher with a finite appetite for the entire search process. As soon as three good documents have been seen, the upper intermediate place is empty, and transition “2” can fire, leading to “QUIT”. In addition, however, each document seen,whether good (relevant) or bad, removes one of the 45tokens in the lower intermediate place. And when 45documents have been seen, the lower transition is free to fire, and does so, resulting in a “QUIT”.These basic elements show that the reasonable parameters of "expectancy" can be modeled using Petri nets.As the documents are examined, the user stays in qualitatively the same state (for example, continue) until some crucial accumulation of evidence or influences causes the final transition to a major different state (in this case, QUIT). In other words, the intuitively defined states representing user behavior are collections of the more precisely defined states. A user with no token in QUIT, but with only 10 tokens in the central intermediate state is still "CONTINUING", but examination of the interior state detail shows that he is "running out of patience".PROBLEMS OF APPLICATIONUp to this point we have presented only a theoretical or conceptual framework for describing the behavior of searchers. We find it philosophically appealing because it shifts emphasis from random jumping from one state to another, as in the older Markov Models, to fact-driven behavior consisting of transitions among various kinds of persistent search activity.In order to confront this theory with reality we need to be much more specific about the map between these abstractions and behavior of real people as they search. In doing this we have to operationalize some fundamental kinds of transitions. Our thoughts on this are still somewhat speculative. We believe that in the course of searching in a networked environment there are several kinds of transitions that are apparent to the user. One is to give up. A second is to change the way in which you think of the question. A third is to persist with the same question but to use some kind of a search engine and describe your same quest in new terms or key word (reformulation). A fourth is to find a particular item to be useful for navigation. A fifth is to find a particular item to provide some useful information. A sixth is to find a particular item to not provide any useful information.While these alternatives seem conceptually clear, it is not obvious that we can elicit information from real searchers about which of these events or transitions has just occurred to them. In fact, it is not apparent that searchers can be enabled to recount their search experiences in a language of persistences and transitions. We propose here to embark on an empirical program of investigation which builds on these theoretical ideas and seeks to determine whether Petri Net, transition-based models of searcher behavior can provide an effective characterization of human searching behavior.Due to very rapid advances in technology, we are planning to conduct research using screen capture and post-search interview techniques which we believe will be minimally disruptive to the searchers mental processes. We are presently developing a tools and instruments for the formalization of this process and they will be described in subsequent reports.REFERENCESChapman, J.L. (1981). A state transition analysis of on-line information-seeking behavior. Journal of the American Society for Information Science, 32, 325-333.Fenichel, C.H. (1981). Online searching: measures that discriminate among users with different types of experiences. Journal of the American Society for Information Science, 32, 23-32.Penniman, W.D. (1975). Rythms of dialogue in human-computer conversation. Unpubl. Doctoral diss., Ohio State University, Columbus, OH, 1975.Penniman, W.D. (1982). Modeling and evaluation of on-line user behavior. Information interaction: Proceedings of the 45th ASIS information meeting, Columbus, OH, October 17-21, 1982. White Plains, NY: Knowledge Industry Publications, 1982.Qiu, L. (1992). Markov models of search state patterns in a hypertext information retrieval system. Journal of the American Society for Information Science, 44(7), 413-427.Reisig, Wolfgang (1985). Petri nets : an introduction. Berlin ; New York : Springer-Verlag,.Tolle, J.E. (1983). Current utilization of online catalogs: Transaction analysis. Final report to the Council on Library Resources, 1. Dublin, OH: OCLC, 1983.。

相关文档
最新文档