Skip to main content

A Subsequent Speaker Selection Method for Online Discussions Based on the Multi-armed Bandit Algorithm

  • Conference paper
  • First Online:
  • 3481 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11013))

Abstract

This paper proposes a method to select subsequent speakers in an online discussion, which is one of the important functions of facilitators, using the multi-armed bandit algorithm. Bandit algorithms can be applied to speaker determination by considering each participant as an arm of a slot machine and a facilitator as a player. We define a “discussion score” to evaluate each post, and it is then considered to be equivalent to the reward of the slot machine method. The discussion score of each post is defined based on the following three metrics: (1) Whether the post helps to settle a discussion or not. (2) How interested are the other participants in the post (3) The intention of the post. To consider conflict between participants, our method classifies the participants into groups and determines the next speaker based on clustering results. We demonstrate that our method can select participants who posted good ideas and opinions and promote participants to engage other participants by using questionnaires.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kotani, T., Seki, K., Matsui, T., Okamoto, T.: Development of discussion supporting system based on the “value of favorable words’ influence”. Jpn. Soc. Artif. Intell. 19(2), 95–104 (2004)

    Google Scholar 

  2. Kuleshov, V., Precup, D.: Algorithms for the multi-armed bandit problem. J. Mach. Learn. Res. 1, 1–48 (2000)

    Google Scholar 

  3. Nakahara, T., Ouchi, A., Uno, T., Hamuro, Y.: Extracted opinions from twitter using bipartite graph polishing. In: The 30th Annual Conference of the Japanese Society for Artificial Intelligence, pp. 1–4 (2016)

    Google Scholar 

  4. Nihei, F., Hayashi, Y., Nakano, Y.: Detecting discussion state shifts in group discussions. In: The 28th Annual Conference of the Japanese Society for Artificial Intelligence, pp. 1–4 (2014)

    Google Scholar 

  5. Ohmoto, Y., Toda, Y., Ueda, K., Nishida, T.: Analyses of the facilitating behavior by using participant’s agreement and nonverbal behavior. In: 2011 Information Processing Society of Japan, pp. 3659–3670 (2011)

    Google Scholar 

  6. Ontanon, S.: Bandit algorithms in game tree search: application to computer renju. J. Artif. Intell. Res. 58, 665–702 (2017)

    Article  MathSciNet  Google Scholar 

  7. Villara, S.S., Bowden, J., Wason, J.: Multi-armed bandit models for the optimal design of clinical trials: benefits and challenges. Stat. Sci. 30(2), 199–215 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgement

This work was supported by JST CREST Grant Number JPMJCR15E1, Japan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mio Kurii .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kurii, M., Fujita, K. (2018). A Subsequent Speaker Selection Method for Online Discussions Based on the Multi-armed Bandit Algorithm. In: Geng, X., Kang, BH. (eds) PRICAI 2018: Trends in Artificial Intelligence. PRICAI 2018. Lecture Notes in Computer Science(), vol 11013. Springer, Cham. https://doi.org/10.1007/978-3-319-97310-4_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-97310-4_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-97309-8

  • Online ISBN: 978-3-319-97310-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics