To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter reviews the first generation of sharing economy regulations and proposes an approach for developing the second generation of regulations. In the first section, the chapter argues that first-generation sharing economy regulations rely on legal categories and assumptions that have been used to address business operations that have developed over decades (sometimes centuries), but that such legal approaches are at times ill-suited to regulation of the sharing economy. In the second section, the chapter argues for a new regulatory approach that directly addresses core principles or values in the sharing economy. The chapter focuses in particular on four core principles that ought to serve as foundations for the next generation of sharing economy regulations.
This chapter provides an overview of five core dimensions that are central to the challenge of optimizing for a just sharing economy: Understanding socioeconomic externalities; pursuing resilience; charting more just and systems-oriented business directions; defining the future of work; and prioritizing access and equity. It highlights the multiple ways in which the analyses throughout the book intersect with these dimensions and argues that each of these dimensions conveys significant information about the values that must be prioritized in the next generation of sharing economy platforms. Finally, the chapter discusses a set of key questions that remain for future research and exploration.
The frog-inspired robots with amphibious locomotion ability have greatest application prospects and practical value in the fields of resource exploration and environmental reconnaissance. Although frog-inspired robots have been of interest over many years, research on frog-inspired amphibious robots is still in its infancy. Since the locomotion mechanism is the basis for the research of frog-inspired amphibious robots, the research methods of the single motion mechanism of frogs are firstly inductive analyzed, and a reference scheme is proposed to inspire the research on the amphibious motion mechanism. Then, we collect and introduce a systematic discussion of the research status of frog-inspired robots according to the locomotion mode. The characteristics of the robots are analyzed from the aspects of design concept, structural characteristics, driving method, and motion performance. Finally, the technical challenges faced by the research on the frog-inspired robots are analyzed, and the development trend is predicted. The authors hope that this study can provide an informative reference for future research in the direction of frog-inspired amphibious robot.
In relational event networks, endogenous statistics are used to summarize the past activity between actors. Typically, it is assumed that past events have equal weight on the social interaction rate in the (near) future regardless of the time that has transpired since observing them. Generally, it is unrealistic to assume that recently past events affect the current event rate to an equal degree as long-past events. Alternatively one may consider using a prespecified decay function with a prespecified rate of decay. A problem then is that the chosen decay function could be misspecified yielding biased results and incorrect conclusions. In this paper, we introduce three parametric weight decay functions (exponential, linear, and one-step) that can be embedded in a relational event model. A statistical method is presented to decide which memory decay function and memory parameter best fit the observed sequence of events. We present simulation studies that show the presence of bias in the estimates of effects of the statistics whenever the decay, as well as the memory parameter, are not properly estimated, and the ability to test different memory models against each other using the Bayes factor. Finally, we apply the methodology to two empirical case studies.
Recursion is a mature, well-understood topic in the theory and practice of programming. Yet its dual, corecursion is underappreciated and still seen as exotic. We aim to put them both on equal footing by giving a foundation for primitive corecursion based on computation, giving a terminating calculus analogous to the original computational foundation of recursion. We show how the implementation details in an abstract machine strengthens their connection, syntactically deriving corecursion from recursion via logical duality. We also observe the impact of evaluation strategy on the computational complexity of primitive (co)recursive combinators: call-by-name allows for more efficient recursion, but call-by-value allows for more efficient corecursion.
In this paper, we establish some stochastic comparison results for largest claim amounts of two sets of independent and also for interdependent portfolios under the setup of the proportional odds model. We also establish stochastic comparison results for aggregate claim amounts of two sets of independent portfolios. Further, stochastic comparisons for largest claim amounts from two sets of independent multiple-outlier claims have also been studied. The results we obtained apply to the whole family of extended distributions, also known as the Marshall–Olkin family of distributions. We have given many numerical examples to illustrate the results obtained.
Ageism has become a social problem in an aged society. This study re-examines an ageism affirmation strategy; the designs and plans for this study were pre-registered. Participants were randomly assigned to either an experimental group (in which they read an explanatory text about the stereotype embodiment theory and related empirical findings) or a control group (in which they read an irrelevant text). The hypothesis was that negative attitudes toward older adults are reduced in the experimental group compared with the control group. Bayesian analysis was used for hypothesis testing. The results showed that negative attitudes toward older adults were reduced in the experimental group. These findings contribute to the development of psychological and gerontological interventions aimed at affirming ageism. In addition, continued efforts to reduce questionable research practices and the spread of Bayesian analysis in psychological research are expected.
There has been a continuous interest in multi-robot formation systems in the last few years due to several significant advantages such as robustness, scalability, and efficiency. However, multi-robot formation systems suffer from well-known problems such as energy consumption, processing speed, and security. Therefore, developers are continuously researching for optimal solutions that can gather the benefits of multi-robot formation systems while overcoming the possible challenges. A backbone process required by any multi-robot system is path planning. Thus, path planning for multi-robot systems is a recent top research topic. However, the literature lacks a recent comprehensive review of path planning works designed for multi-robot systems. The aim of this review paper is to provide a comprehensive assessment and an insightful look into various path planning techniques developed in multi-robot formation systems, in addition to highlighting the basic problems involved in this field. This will allow the reader to discover the research gaps that must be solved for a better path planning experience for multi-robot formation systems. Finally, an illustrative comparative example is presented at the end of the paper to show the advantages and disadvantages of some popular path planning techniques.
With the aid of recently proposed word embedding algorithms, the study of semantic relatedness has progressed rapidly. However, word-level representations are still lacking for many natural language processing tasks. Various sense-level embedding learning algorithms have been proposed to address this issue. In this paper, we present a generalized model derived from existing sense retrofitting models. In this generalization, we take into account semantic relations between the senses, relation strength, and semantic strength. Experimental results show that the generalized model outperforms previous approaches on four tasks: semantic relatedness, contextual word similarity, semantic difference, and synonym selection. Based on the generalized sense retrofitting model, we also propose a standardization process on the dimensions with four settings, a neighbor expansion process from the nearest neighbors, and combinations of these two approaches. Finally, we propose a Procrustes analysis approach that inspired from bilingual mapping models for learning representations that outside of the ontology. The experimental results show the advantages of these approaches on semantic relatedness tasks.
Increasingly, laws are being proposed and passed by governments around the world to regulate artificial intelligence (AI) systems implemented into the public and private sectors. Many of these regulations address the transparency of AI systems, and related citizen-aware issues like allowing individuals to have the right to an explanation about how an AI system makes a decision that impacts them. Yet, almost all AI governance documents to date have a significant drawback: they have focused on what to do (or what not to do) with respect to making AI systems transparent, but have left the brunt of the work to technologists to figure out how to build transparent systems. We fill this gap by proposing a stakeholder-first approach that assists technologists in designing transparent, regulatory-compliant systems. We also describe a real-world case study that illustrates how this approach can be used in practice.
The current sharing economy suffers from system-wide deficiencies even as it produces distinctive benefits and advantages for some participants. The first generation of sharing markets has left us to question: Will there be any workers in the sharing economy? Can we know enough about these technologies to regulate them? Is there any way to avoid the monopolization of assets, information, and wealth? Using convergent, transdisciplinary perspectives, this volume examines the challenge of reengineering a sharing economy that is more equitable, democratic, sustainable, and just. The volume enhances the reader's capacity for integrating applicable findings and theories in business, law and social science into ethical engineering design and practice. At the same time, the book helps explain how technological innovations in the sharing economy create value for different stakeholders and how they impact society at large. Reengineering the Sharing Economy is also available as Open Access on Cambridge Core.
Bisimulation is a concept that captures behavioural equivalence of states in a variety of types of transition systems. It has been widely studied in a discrete-time setting. The core of this work is to generalise the discrete-time picture to continuous time by providing a notion of behavioural equivalence for continuous-time Markov processes. In Chen et al. [(2019). Electronic Notes in Theoretical Computer Science347 45–63.], we proposed two equivalent definitions of bisimulation for continuous-time stochastic processes where the evolution is a flow through time: the first one as an equivalence relation and the second one as a cospan of morphisms. In Chen et al. [(2020). Electronic Notes in Theoretical Computer Science.], we developed the theory further: we introduced different concepts that correspond to different behavioural equivalences and compared them to bisimulation. In particular, we studied the relation between bisimulation and symmetry groups of the dynamics. We also provided a game interpretation for two of the behavioural equivalences. The present work unifies the cited conference presentations and gives detailed proofs.
There are few studies on the intelligent guidance of unmanned sailboats, which should coordinate pluralistic tasks at sea in the nature of its maneuvring intractability. To ensure the algorithmic practicability, this paper proposes a path-following and collision-avoidance guidance approach of unmanned sailboats with total formulaic description. The risk-detecting mechanism is fabricated by setting a circular detecting zone and using the time to the closest point of approach. Then, the risk of collision, the path deviation, the speed loss, and the course loss can be judged by constructing the cost functions and applying the distance to closest point of approach. The optimized heading angle is deemed as the one minimizing the aggregate cost functions, which is sought by applying and improving the beetle antennae search (BAS) algorithm. In the proposed modified BAS, the searching step is redesigned to enhance the searching efficiency. To ensure the convergence of the real heading angle to the reference, the backstepping-based control law is fabricated for the high-order sailboat model and in the linear form. The control parameters are offline optimized through the modified BAS. Compared with the adaptive control, this controller can guarantee more computation simplicity and the optimized control performance. Finally, simulation corroborates that the sailboat can successfully complete path following and collision avoidance while encountering multiple static and moving obstacles under the proposed schemes.
The past decade has seen the rise of “data portals” as online devices for making data public. They have been accorded a prominent status in political speeches, policy documents, and official communications as sites of innovation, transparency, accountability, and participation. Drawing on research on data portals around the world, data portal software, and associated infrastructures, this paper explores three approaches for studying the social life of data portals as technopolitical devices: (a) interface analysis, (b) software analysis, and (c) metadata analysis. These three approaches contribute to the study of the social lives of data portals as dynamic, heterogeneous, and contested sites of public sector datafication. They are intended to contribute to critically assessing how participation around public sector datafication is invited and organized with portals, as well as to rethinking and recomposing them.
With the increasing utilization of machine learning (ML) to enhance products’ capabilities, the design research community has begun to explore how to support the conceptual design of ML-enhanced products. However, UX value creation of ML-enhanced products is still challenging because of ML's unique characteristics and numerous complex factors in conceptual design. To help designers create UX value for ML-enhanced products, we developed the UX value framework and the CoMLUX design process. The proposed framework describes how ML, stakeholders, and context co-create the UX value of ML-enhanced products, and identifies the growability and opacity of ML, helping designers systematically understand the co-creators while avoiding cognitive overload. The CoMLUX design process provides practical guidance for designing ML-enhanced products with growability and transparency. At last, we demonstrate the usage methods of the framework and process in an actual project and summarize the inspirations and limitations of our work.
With the increase of user-generated content on social media, the detection of abusive language has become crucial and is therefore reflected in several shared tasks that have been performed in recent years. The development of automatic detection systems is desirable, and the classification of abusive social media content can be solved with the help of machine learning. The basis for successful development of machine learning models is the availability of consistently labeled training data. But a diversity of terms and definitions of abusive language is a crucial barrier. In this work, we analyze a total of nine datasets—five English and four German datasets—designed for detecting abusive online content. We provide a detailed description of the datasets, that is, for which tasks the dataset was created, how the data were collected, and its annotation guidelines. Our analysis shows that there is no standard definition of abusive language, which often leads to inconsistent annotations. As a consequence, it is difficult to draw cross-domain conclusions, share datasets, or use models for other abusive social media language tasks. Furthermore, our manual inspection of a random sample of each dataset revealed controversial examples. We highlight challenges in data annotation by discussing those examples, and present common problems in the annotation process, such as contradictory annotations and missing context information. Finally, to complement our theoretical work, we conduct generalization experiments on three German datasets.