Human-based computation

Human-based computation is a computer science technique in which a computational process performs its function by outsourcing certain steps to humans. This approach uses differences in abilities and alternative costs between humans and computer agents to achieve symbiotic human-computer interaction.

In traditional computation, a human employs a computer to solve a problem; a human provides a formalized problem description to a computer, and receives a solution to interpret. Human-based computation frequently reverses the roles; the computer asks a person or a large group of people to solve a problem, then collects, interprets, and integrates their solutions.

Contents

Early work

Human-based computation research has its origins in the early work on interactive evolutionary computation. The idea behind interactive evolutionary algorithms is due to Richard Dawkins. In the Biomorphs software accompanying his book The Blind Watchmaker (Dawkins, 1986) the preference of a human experimenter is used to guide the evolution of two-dimensional sets of line segments. In essence, this program asks a human to be the fitness function of an evolutionary algorithm, so that the algorithm can use human visual perception and aesthetic judgment to do something that a normal evolutionary algorithm cannot do. However, it is difficult to get enough evaluations from a single human if we want to evolve more complex shapes. Victor Johnston and Karl Sims extended this concept by harnessing power of many people for fitness evaluation (Caldwell and Johnston, 1991; Sims, 1991). As a result, their programs could evolve beautiful faces and pieces of art appealing to public. These programs effectively reversed the common interaction between computers and humans. In these programs, the computer is no longer an agent of its user, but instead, a coordinator aggregating efforts of many human evaluators. These and other similar research efforts became the topic of research in interactive evolutionary computation or aesthetic selection, however the scope of this research was limited to outsourcing evaluation and, as a result, it was not fully exploring the full potential of the outsourcing.

Human-based genetic algorithm (HBGA) encourages human participation in multiple different roles. Humans are not limited to the role of evaluator, but can choose to perform a more diverse set of functions. In particular, they can contribute their innovative solutions into the evolutionary process, make incremental changes to existing solutions, and perform intelligent recombination. In short, HBGA outsources to humans all operations of a typical genetic algorithm. As a result of this outsourcing, HBGA can process the representations for which there is no computational innovation operators available, for example, natural languages. Thus, HBGA obviated the need for a fixed representational scheme that was a limiting factor of both standard and interactive EC. These algorithms can be also be viewed as novel forms of social organization coordinated by a computer program (Kosorukoff and Goldberg, 2002).

Classes of human-based computation

Human-based computation methods combine computers and humans in different roles. Malone (2009) proposed a way to describe division of labor in computation, that groups human-based methods into three classes. The following table uses the evolutionary computation model to describe four classes of computation, three of which rely on humans in some role. For each class, a representative example is shown. The classification is in terms of the roles (innovation or selection) performed in each case by humans and computational processes. This table is a slice of three-dimensional table. The third dimension defines if the organizational function is performed by humans or a computer. Here it is assumed to be performed by a computer.

Division of labor in computation
Selection agent

Innovation agent
Computer Human
Computer Genetic Algorithm Interactive genetic algorithm
Human Computerized Tests Human-based genetic algorithm

Classes of human-based computation from this table can be referred by two-letter abbreviations: HC, CH, HH. Here the first letter identifies the type of agents performing innovation, the second letter specifies the type of selection agents. In some implementations (wiki is the most common example), human-based selection functionality might be limited, it can be shown with small h.

Methods of human-based computation

Incentives to participation

In different human-based computation projects people are motivated by one or more of the following.

Many projects had explored various combinations of these incentives. See more information about motivation of participants in these projects in Kosorukoff (2000) and von Hippel (2005).

Human-based computation as a form of social organization

Viewed as a form of social organization, human-based computation often surprisingly turns out to be more robust and productive than traditional organizations (Kosorukoff and Goldberg, 2002). The latter depend on obligations to maintain their more or less fixed structure, be functional and stable. Each of them is similar to a carefully designed mechanism with humans as its parts. However, this limits the freedom of their human employees and subjects them to various kinds of stresses. Most people, unlike mechanical parts, find it difficult to adapt to some fixed roles that best fit the organization. Evolutionary human-computation projects offer a natural solution to this problem. They adapt organizational structure to human spontaneity, accommodate human mistakes and creativity, and utilize both in a constructive way. This leaves their participants free from obligations without endangering the functionality of the whole, making people happier. There are still some challenging research problems that need to be solved before we can realize the full potential of this idea.

The algorithmic outsourcing techniques used in human-based computation are much more scalable than the manual or automated techniques used to manage outsourcing traditionally. It is this scalability that allows to easily distribute the effort among thousands of participants. It was suggested recently that this mass outsourcing is sufficiently different from traditional small-scale outsourcing to merit a new name crowdsourcing (Howe, 2006).

Applications

Human-assisted search ranking

An approach to improving internet search involves combining automated ranking with human editorial input.[2]

See also

References

  • Dawkins, R. (1986) The Blind Watchmaker, Longman, 1986; Penguin Books 1988.
  • Caldwell, C. and Johnston V. S. (1991), Tracking a Criminal Suspect through "Face-Space" with a Genetic Algorithm, in Proceedings of the Fourth International Conference on Genetic Algorithm, Morgan Kaufmann Publisher, pp. 416-421, July 1991. (US Patent 5,375,195 filed 1992.06.29) U.S. Patent 5,375,195
  • Sims, K. (1991) Artificial Evolution for Computer Graphics, Computer Graphics, 25(4) (SIGGRAPH'91), 319-328 (US Patent 6,088,510 filed 1992.07.02) U.S. Patent 6,088,510
  • Herdy, M. (1996) Evolution strategies with subjective selection. In Parallel Problem Solving from Nature, PPSN IV, Volume 1141 of LNCS (pp. 22-31)
  • Moni Naor (1996) Verification of a human in the loop, or Identification via the Turing Test, online.
  • Unemi, T. (1998) A Design of multi-field user interface for simulated breeding, Proceedings of the Third Asian Fuzzy and Intelligent System Symposium, 489-494
  • Kosorukoff (1998) Alex Kosorukoff, Free Knowledge Exchange, human-based genetic algorithm on the web archive description
  • Lillibridge, M.D., et al. (1998) Method for selectively restricting access to computer systems, US Patent U.S. Patent 6,195,698
  • Burgener (1999) Twenty questions: the neural-net on the Internet archive website
  • Kosorukoff, A. (2000) Social classification structures. Optimal decision making in an organization, Genetic and Evolutionary Computation Conference, GECCO-2000, Late breaking papers, 175-178 online
  • Kosorukoff, A. (2000) Human-based genetic algorithm online
  • Cunningham, Ward and Leuf, Bo (2001): The Wiki Way. Quick Collaboration on the Web. Addison-Wesley, ISBN 0-201-71499-X.
  • Hideyuki Takagi (2001) Interactive Evolutionary Computation: Fusion of the Capabilities of EC Optimization and Human Evaluation, Proceedings of the IEEE, vol.89, no. 9, pp. 1275-1296
  • Kosorukoff, A. (2001) Human-based Genetic Algorithm. IEEE Transactions on Systems, Man, and Cybernetics, SMC-2001, 3464-3469
  • Kosorukoff, A. & Goldberg, D. E. (2001) Genetic algorithms for social innovation and creativity (Illigal report No 2001005). Urbana, IL: University of Illinois at Urbana-Champaign online
  • Kosorukoff, A., Goldberg D. E. (2002) Genetic algorithm as a form of organization, Proceedings of Genetic and Evolutionary Computation Conference, GECCO-2002, pp 965-972 online
  • Fogarty, T.C., (2003) Automatic concept evolution, Proceedings of The Second IEEE International Conference on Cognitive Informatics.
  • von Ahn, L., Blum, M., Hopper, N., and Langford, J. (2003) CAPTCHA: Using Hard AI Problems for Security, in Advances in Cryptology, E. Biham, Ed., vol. 2656 of Lecture Notes in Computer Science (Springer, Berlin, 2003), pp. 294–311. online
  • von Ahn, L. (2003) Method for labeling images through a computer game US Patent Application 10/875913
  • von Ahn, L. and Dabbish, L. (2004) Labeling Images with a Computer Game. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Association for Computing Machinery, New York, 2004), pp. 319–326. online
  • Fogarty, T.C. and Hammond, M.O. (2005) Co-operative OuLiPian Generative Literature using Human Based Evolutionary Computing, GECCO 2005, Washington DC.
  • von Hippel, E. (2005) Democratizing Innovation, MIT Press online
  • Gentry, C., et al. (2005) Secure Distributed Human Computation In Ninth International Conference on Financial Cryptography and Data Security FC'2005 online
  • Howe, J. (2006) The Rise of Crowdsourcing, Wired Magazine, June 2006. online
  • von Ahn, L., Kedia, M., and Blum, M. (2006) Verbosity: A Game for Collecting Common-Sense Facts, ACM CHI Notes 2006 online
  • von Ahn, L., Ginosar, S., Kedia, M., and Blum, M. (2006) Improving Accessibility of the Web with a Computer Game, ACM CHI Notes 2006 online
  • Sunstein, C. (2006) Infotopia: How Many Minds Produce Knowledge, Oxford University Press, website
  • Tapscott, D., Williams, A. D. (2007) Wikinomics, Portfolio Hardcover website
  • von Ahn, L., Maurer, B., McMillen, C., Abraham, D., and Blum, M. (2008) reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science, September 12, 2008. Pages 1465-1468. online
  • Malone, T.W., Laubacher, R., Dellarocas (2009) Harnessing Crowds: Mapping the Genome of Collective Intelligence online
  • Yu, L. and Nickerson, J. V. (2011) Cooks or Cobblers? Crowd Creativity through Combination online

Footnotes

External links