Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1591 - 1620 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Route Choice Behaviour And Travel Information In A Congested Network: Static And Dynamic Recursive Models, Giselle De Moraes Ramos, Tien Mai, Winnie Daamen, Emma Frejinger May 2020

Route Choice Behaviour And Travel Information In A Congested Network: Static And Dynamic Recursive Models, Giselle De Moraes Ramos, Tien Mai, Winnie Daamen, Emma Frejinger

Research Collection School Of Computing and Information Systems

Travel information has the potential to influence travellers choices, in order to steer travellers to less congested routes and alleviate congestion. This paper investigates, on the one hand, how travel information affects route choice behaviour, and on the other hand, the impact of the travel time representation on the interpretation of parameter estimates and prediction accuracy. To this end, we estimate recursive models using data from an innovative data collection effort consisting of route choice observation data from GPS trackers, travel diaries and link travel times on the overall network. Though such combined data sets exist, these have not yet …


Rankbooster: Visual Analysis Of Ranking Predictions, Abishek Puri, Bon Kyung Ku, Yong Wang, Huamin Qu May 2020

Rankbooster: Visual Analysis Of Ranking Predictions, Abishek Puri, Bon Kyung Ku, Yong Wang, Huamin Qu

Research Collection School Of Computing and Information Systems

Ranking is a natural and ubiquitous way to facilitate decision-making in various applications. However, different rankings are often used for the same set of entities, with each ranking method placing emphasis on different factors. These factors can also be multi-dimensional in nature, compounding the problem. This complexity can make it challenging for an entity which is being ranked to understand what they can do to improve their rankings, and to analyze the effect of changes in various factors to their overall rank. In this paper, we present RankBooster, a novel visual analytics system to help users conveniently investigate ranking predictions. …


Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng Apr 2020

Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng

Department of Computer Science Faculty Scholarship and Creative Works

In mobile crowdsensing, some users jointly finish a sensing task through the sensors equipped in their intelligent terminals. In particular, the photo crowdsensing based on Mobile Edge Computing (MEC) collects pictures for some specific targets or events and uploads them to nearby edge servers, which leads to richer data content and more efficient data storage compared with the common mobile crowdsensing; hence, it has attracted an important amount of attention recently. However, the mobile users prefer uploading the photos through Wifi APs (PoIs) rather than cellular networks. Therefore, photos stored in mobile phones are exchanged among users, in order to …


Feature Extraction And Analysis Of Binaries For Classification, Micah Flack Apr 2020

Feature Extraction And Analysis Of Binaries For Classification, Micah Flack

Annual Research Symposium

The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an in-depth examination of the features shared by unlabeled binary samples, for classification into the categories of benign or malicious software using several different methods. Because of the time it takes to manually analyze or reverse engineer binaries to determine their function, the ability to gather features and then instantly classify samples without explicitly programming the solution is incredibly valuable. It is possible to use an online service; however, this is not always viable depending on the sensitivity of the binary. With Python3 and the Pefile library, we …


Need For Adoption Of Koha Integrated Library Management Software In Nigerian Academic Libraries, Isaac Echezonam Anyira Apr 2020

Need For Adoption Of Koha Integrated Library Management Software In Nigerian Academic Libraries, Isaac Echezonam Anyira

Library Philosophy and Practice (e-journal)

The main objective of this paper is to justify the need for Nigerian libraries which have not automated their functions to adopt of Koha ILMS as their automation software. The paper therefore examined the need for automation, the reasons for the choice of Koha ILMS and potential benefits accruable to the libraries, and functions that Koha can facilitate their perform in their libraries. The paper identified the need for automation to include need to handle information explosion, for effective management of library operations, to improve operation speed, resource sharing etc; the choice of Koha was informed by its features and …


Complexities Of Data, Tasks And Workflows In Health It Management, Gaurav Jetley Apr 2020

Complexities Of Data, Tasks And Workflows In Health It Management, Gaurav Jetley

USF Tampa Graduate Theses and Dissertations

This dissertation focuses on three key aspects in health IT management: (1) Complexities in the collection of health data in electronic health record (EHR) systems and the use of EHR data in research, (2) Complexities of collaboration between physicians and AI for improving healthcare delivery, and (3) Complexities of workflows and collaborations between healthcare organization (HCO) staff during the delivery of care. The first dissertation essay (Chapter 1) examines the key data quality issues that arise in recorded health information in EHR systems, provides quality thresholds that the data needs to meet for mitigating errors and increasing reproducibility of downstream …


Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps Apr 2020

Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - "Overview" delivered at Baruch College in Spring 2020 by Royce Kok and B. Madhusudan as part of the NYC Tech-in-Residence Corps program.


Autism Searches: A Modern Search Engine For Asd Related Topics, Joshua Schappel, Jonathan Simone Bar-Eli, Sachin Mahashabde, Jeremy Suero Apr 2020

Autism Searches: A Modern Search Engine For Asd Related Topics, Joshua Schappel, Jonathan Simone Bar-Eli, Sachin Mahashabde, Jeremy Suero

Petersheim Academic Exposition

No abstract provided.


Using Alteryx Designer In Audit, Nolan Asiala Apr 2020

Using Alteryx Designer In Audit, Nolan Asiala

Honors Projects

My senior project was built around data analysis and how it relates to the auditing profession. Initially, I was planning on attending a data analytics competition, but that was canceled due to the events of COVID-19. This project utilized the Alteryx Designer program to demonstrate how it can be used during an audit engagement. By creating a workflow in Alteryx Designer, a report from a client can be cleaned and reformatted into a working dataset. My project includes two Excel files, a Microsoft Word document that serves as a brief introduction to the program, and a video describing the workflow …


Are These Comments Triggering? Predicting Triggers Of Toxicity In Online Discussions, Hind Almerekhi, Haewoon Kwak, Joni Salminen, Bernard J. Jansen Apr 2020

Are These Comments Triggering? Predicting Triggers Of Toxicity In Online Discussions, Hind Almerekhi, Haewoon Kwak, Joni Salminen, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

Understanding the causes or triggers of toxicity adds a new dimension to the prevention of toxic behavior in online discussions. In this research, we define toxicity triggers in online discussions as a non-toxic comment that lead to toxic replies. Then, we build a neural network-based prediction model for toxicity trigger. The prediction model incorporates text-based features and derived features from previous studies that pertain to shifts in sentiment, topic flow, and discussion context. Our findings show that triggers of toxicity contain identifiable features and that incorporating shift features with the discussion context can be detected with a ROC-AUC score of …


Developing Agent-Based Models To Study Financial Markets, Saurav Chakraborty Apr 2020

Developing Agent-Based Models To Study Financial Markets, Saurav Chakraborty

USF Tampa Graduate Theses and Dissertations

This dissertation presents research that employs agent-based modelling to provide a framework to support simulation as a complement to traditional economic models for policy evaluation. It consists of three studies. The first study employs cluster analysis to capture the different types of banks and the associated business models that define their decision-making. The results from study one will help us get an understanding of how different banks behave and provide an insight into their lending practices. Hence, it would be very helpful in evaluating and analyzing the impact of future policies. Study two develops a fine-grained interbank lending model based …


Improving Neural Relation Extraction With Implicit Mutual Relations, Jun Kuang, Yixin Cao, Jianbing Zheng, Xiangnan He, Ming Gao, Aoying Zhou Apr 2020

Improving Neural Relation Extraction With Implicit Mutual Relations, Jun Kuang, Yixin Cao, Jianbing Zheng, Xiangnan He, Ming Gao, Aoying Zhou

Research Collection School Of Computing and Information Systems

Relation extraction (RE) aims at extracting the relation between two entities from the text corpora. It is a crucial task for Knowledge Graph (KG) construction. Most existing methods predict the relation between an entity pair by learning the relation from the training sentences, which contain the targeted entity pair. In contrast to existing distant supervision approaches that suffer from insufficient training corpora to extract relations, our proposal of mining implicit mutual relation from the massive unlabeled corpora transfers the semantic information of entity pairs into the RE model, which is more expressive and semantically plausible. After constructing an entity proximity …


Poster Abstract: Data Communication Using Switchable Privacy Glass, Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu Apr 2020

Poster Abstract: Data Communication Using Switchable Privacy Glass, Changshuo Hu, Dong Ma, Mahbub Hassan, Wen Hu

Research Collection School Of Computing and Information Systems

Switchable privacy glass can electronically change its state between opaque and transparent. In this work, we propose to exploit the electronic configurability of switchable glass to modulate natural light, which can be demodulated by a nearby receiver with light sensing capability to realise data communication over natural light. A key advantage is that no energy is used to generate light, as it simply modulates the existing light in the nature. We demonstrate that the proposed data communication using switchable glass modulation can achieve 33.33 bits per second communication with a bit rate below 1% under a wide range of ambient …


Reinforced Negative Sampling Over Knowledge Graph For Recommendation, Xiang Wang, Yaokun Xu, Xiangnan He, Yixin Cao, Meng Wang, Tat-Seng Chua Apr 2020

Reinforced Negative Sampling Over Knowledge Graph For Recommendation, Xiang Wang, Yaokun Xu, Xiangnan He, Yixin Cao, Meng Wang, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Properly handling missing data is a fundamental challenge in recommendation. Most present works perform negative sampling from unobserved data to supply the training of recommender models with negative signals. Nevertheless, existing negative sampling strategies, either static or adaptive ones, are insufficient to yield high-quality negative samples — both informative to model training and reflective of user real needs. In this work, we hypothesize that item knowledge graph (KG), which provides rich relations among items and KG entities, could be useful to infer informative and factual negative samples. Towards this end, we develop a new negative sampling model, Knowledge Graph Policy …


A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang Apr 2020

A Cue Adaptive Decoder For Controllable Neural Response Generation, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang

Research Collection School Of Computing and Information Systems

In open-domain dialogue systems, dialogue cues such as emotion, persona, and emoji can be incorporated into conversation models for strengthening the semantic relevance of generated responses. Existing neural response generation models either incorporate dialogue cue into decoder’s initial state or embed the cue indiscriminately into the state of every generated word, which may cause the gradients of the embedded cue to vanish or disturb the semantic relevance of generated words during back propagation. In this paper, we propose a Cue Adaptive Decoder (CueAD) that aims to dynamically determine the involvement of a cue at each generation step in the decoding. …


Review-Guided Helpful Answer Identification In E-Commerce, Wenxuan Zhang, Wai Lam, Yang Deng, Jing Ma Apr 2020

Review-Guided Helpful Answer Identification In E-Commerce, Wenxuan Zhang, Wai Lam, Yang Deng, Jing Ma

Research Collection School Of Computing and Information Systems

Product-specific community question answering platforms can greatly help address the concerns of potential customers. However, the user-provided answers on such platforms often vary a lot in their qualities. Helpfulness votes from the community can indicate the overall quality of the answer, but they are often missing. Accurately predicting the helpfulness of an answer to a given question and thus identifying helpful answers is becoming a demanding need. Since the helpfulness of an answer depends on multiple perspectives instead of only topical relevance investigated in typical QA tasks, common answer selection algorithms are insufficient for tackling this task. In this paper, …


Recipegpt: Generative Pre-Training Based Cooking Recipe Generation And Evaluation System, Helena Huey Chong Lee, Ke Shu, Palakorn Achananuparp, Philips Kokoh Prasetyo, Yue Liu, Ee-Peng Lim, Lav R. Varshney Apr 2020

Recipegpt: Generative Pre-Training Based Cooking Recipe Generation And Evaluation System, Helena Huey Chong Lee, Ke Shu, Palakorn Achananuparp, Philips Kokoh Prasetyo, Yue Liu, Ee-Peng Lim, Lav R. Varshney

Research Collection School Of Computing and Information Systems

Interests in the automatic generation of cooking recipes have been growing steadily over the past few years thanks to a large amount of online cooking recipes. We present RecipeGPT, a novel online recipe generation and evaluation system. The system provides two modes of text generations: (1) instruction generation from given recipe title and ingredients; and (2) ingredient generation from recipe title and cooking instructions. Its back-end text generation module comprises a generative pre-trained language model GPT-2 fine-tuned on a large cooking recipe dataset. Moreover, the recipe evaluation module allows the users to conveniently inspect the quality of the generated recipe …


Voicecoach: Interactive Evidence-Based Training For Voice Modulation Skills In Public Speaking, Xingbo Wang, Haipeng Zeng, Yong Wang, Aoyu Wu, Zhida Sun, Xiaojuan Ma, Qu Huamin Apr 2020

Voicecoach: Interactive Evidence-Based Training For Voice Modulation Skills In Public Speaking, Xingbo Wang, Haipeng Zeng, Yong Wang, Aoyu Wu, Zhida Sun, Xiaojuan Ma, Qu Huamin

Research Collection School Of Computing and Information Systems

The modulation of voice properties, such as pitch, volume, and speed, is crucial for delivering a successful public speech. However, it is challenging to master different voice modulation skills. Though many guidelines are available, they are often not practical enough to be applied in different public speaking situations, especially for novice speakers. We present VoiceCoach, an interactive evidence-based approach to facilitate the effective training of voice modulation skills. Specifically, we have analyzed the voice modulation skills from 2623 high-quality speeches (i.e., TED Talks) and use them as the benchmark dataset. Given a voice input, VoiceCoach automatically recommends good voice modulation …


Predictive Task Assignment In Spatial Crowdsourcing: A Data-Driven Approach, Yan Zhao, Kai Zheng, Yue Cui, Han Su, Feida Zhu, Xiaofang Zhou Apr 2020

Predictive Task Assignment In Spatial Crowdsourcing: A Data-Driven Approach, Yan Zhao, Kai Zheng, Yue Cui, Han Su, Feida Zhu, Xiaofang Zhou

Research Collection School Of Computing and Information Systems

With the rapid development of mobile networks and the widespread usage of mobile devices, spatial crowdsourcing, which refers to assigning location-based tasks to moving workers, has drawn increasing attention. One of the major issues in spatial crowdsourcing is task assignment, which allocates tasks to appropriate workers. However, existing works generally assume the static offline scenarios, where the spatio-temporal information of all the workers and tasks is determined and known a priori. Ignorance of the dynamic spatio-temporal distributions of workers and tasks can often lead to poor assignment results. In this work we study a novel spatial crowdsourcing problem, namely Predictive …


Cartographic Vandalism In The Era Of Location-Based Games—The Case Of Openstreetmap And Pokémon Go, Levente Juhasz, Tessio Novack, Hartwig H. Hochmair, Sen Qiao Mar 2020

Cartographic Vandalism In The Era Of Location-Based Games—The Case Of Openstreetmap And Pokémon Go, Levente Juhasz, Tessio Novack, Hartwig H. Hochmair, Sen Qiao

GIS Center

User-generated map data is increasingly used by the technology industry for background mapping, navigation and beyond. An example is the integration of OpenStreetMap (OSM) data in widely-used smartphone and web applications, such as Pokémon GO (PGO), a popular augmented reality smartphone game. As a result of OSM’s increased popularity, the worldwide audience that uses OSM through external applications is directly exposed to malicious edits which represent cartographic vandalism. Multiple reports of obscene and anti-semitic vandalism in OSM have surfaced in popular media over the years. These negative news related to cartographic vandalism undermine the credibility of collaboratively generated maps. Similarly, …


Relational Database Design And Multi-Objective Database Queries For Position Navigation And Timing Data, Sean A. Mochocki Mar 2020

Relational Database Design And Multi-Objective Database Queries For Position Navigation And Timing Data, Sean A. Mochocki

Theses and Dissertations

Performing flight tests is a natural part of researching cutting edge sensors and filters for sensor integration. Unfortunately, tests are expensive, and typically take many months of planning. A sensible goal would be to make previously collected data readily available to researchers for future development. The Air Force Institute of Technology (AFIT) has hundreds of data logs potentially available to aid in facilitating further research in the area of navigation. A database would provide a common location where older and newer data sets are available. Such a database must be able to store the sensor data, metadata about the sensors, …


A 12-Lead Ecg Database To Identify Origins Of Idiopathic Ventricular Arrhythmia Containing 334 Patients, Jianwei Zhang, Guohua Fu, Kyle Anderson, Huimin Chu, Cyril Rakovski Mar 2020

A 12-Lead Ecg Database To Identify Origins Of Idiopathic Ventricular Arrhythmia Containing 334 Patients, Jianwei Zhang, Guohua Fu, Kyle Anderson, Huimin Chu, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

Cardiac catheter ablation has shown the effectiveness of treating the idiopathic premature ventricular complex and ventricular tachycardia. As the most important prerequisite for successful therapy, criteria based on analysis of 12-lead ECGs are employed to reliably speculate the locations of idiopathic ventricular arrhythmia before a subsequent catheter ablation procedure. Among these possible locations, right ventricular outflow tract and left outflow tract are the major ones. We created a new 12-lead ECG database under the auspices of Chapman University and Ningbo First Hospital of Zhejiang University that aims to provide high quality data enabling detection of the distinctions between idiopathic ventricular …


Hierarchical Group And Attribute-Based Access Control: Incorporating Hierarchical Groups And Delegation Into Attribute-Based Access Control, Daniel Servos Mar 2020

Hierarchical Group And Attribute-Based Access Control: Incorporating Hierarchical Groups And Delegation Into Attribute-Based Access Control, Daniel Servos

Electronic Thesis and Dissertation Repository

Attribute-Based Access Control (ABAC) is a promising alternative to traditional models of access control (i.e. Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access control (RBAC)) that has drawn attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large-scale adoption is still in its infancy. The relatively recent popularity of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, etc. have been largely ignored or left to future work. This thesis seeks to aid in the adoption of ABAC by filling in …


Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot Mar 2020

Balancing Security, Performance And Deployability In Encrypted Search, David Joel Pouliot

Dissertations and Theses

Encryption is an important tool for protecting data, especially data stored in the cloud. However, standard encryption techniques prevent efficient search. Searchable encryption attempts to solve this issue, protecting the data while still providing search functionality. Retaining the ability to search comes at a cost of security, performance and/or utility.

An important practical aspect of utility is compatibility with legacy systems. Unfortunately, the efficient searchable encryption constructions that are compatible with these systems have been proven vulnerable to attack, even against weaker adversary models.

The goal of this work is to address this security problem inherent with efficient, legacy compatible …


A Nwb-Based Dataset And Processing Pipeline Of Human Single-Neuron Activity During A Declarative Memory Task, N. Chandravadia, D. Liang, A. G. P. Schjetnan, A. Carlson, M. Faraut, J. M. Chung, C. M. Reed, B. Dichter, Uri Maoz, S. K. Kalia, T. A. Valiante, A. N. Mamelak, U. Rutishauser Mar 2020

A Nwb-Based Dataset And Processing Pipeline Of Human Single-Neuron Activity During A Declarative Memory Task, N. Chandravadia, D. Liang, A. G. P. Schjetnan, A. Carlson, M. Faraut, J. M. Chung, C. M. Reed, B. Dichter, Uri Maoz, S. K. Kalia, T. A. Valiante, A. N. Mamelak, U. Rutishauser

Psychology Faculty Articles and Research

A challenge for data sharing in systems neuroscience is the multitude of different data formats used. Neurodata Without Borders: Neurophysiology 2.0 (NWB:N) has emerged as a standardized data format for the storage of cellular-level data together with meta-data, stimulus information, and behavior. A key next step to facilitate NWB:N adoption is to provide easy to use processing pipelines to import/export data from/to NWB:N. Here, we present a NWB-formatted dataset of 1863 single neurons recorded from the medial temporal lobes of 59 human subjects undergoing intracranial monitoring while they performed a recognition memory task. We provide code to analyze and export/import …


Light Structure From Pin Motion: Geometric Point Light Source Calibration, Hiroaki Santo, Michael Waechter, Wen-Yan Lin, Yusuke Sugano, Yasuyuki Matsushita Mar 2020

Light Structure From Pin Motion: Geometric Point Light Source Calibration, Hiroaki Santo, Michael Waechter, Wen-Yan Lin, Yusuke Sugano, Yasuyuki Matsushita

Research Collection School Of Computing and Information Systems

We present a method for geometric point light source calibration. Unlike prior works that use Lambertian spheres, mirror spheres, or mirror planes, we use a calibration target consisting of a plane and small shadow casters at unknown positions above the plane. We show that shadow observations from a moving calibration target under a fixed light follow the principles of pinhole camera geometry and epipolar geometry, allowing joint recovery of the light position and 3D shadow caster positions, equivalent to how conventional structure from motion jointly recovers camera parameters and 3D feature positions from observed 2D features. Moreover, we devised a …


Using Knowledge Bases For Question Answering, Yunshi Lan Mar 2020

Using Knowledge Bases For Question Answering, Yunshi Lan

Dissertations and Theses Collection (Open Access)

A knowledge base (KB) is a well-structured database, which contains many of entities and their relations. With the fast development of large-scale knowledge bases such as Freebase, DBpedia and YAGO, knowledge bases have become an important resource, which can serve many applications, such as dialogue system, textual entailment, question answering and so on. These applications play significant roles in real-world industry.

In this dissertation, we try to explore the entailment information and more general entity-relation information from the KBs. Recognizing textual entailment (RTE) is a task to infer the entailment relations between sentences. We need to decide whether a hypothesis …


Privacy-Preserving Data Processing With Flexible Access Control, Wenxiu Ding, Zheng Yan, Robert H. Deng Mar 2020

Privacy-Preserving Data Processing With Flexible Access Control, Wenxiu Ding, Zheng Yan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens. However, due to the lack of full trust in cloud service providers, the cloud users generally prefer to outsource their sensitive data in an encrypted form, which, however, seriously complicates data processing, analysis, as well as access control. Homomorphic encryption (HE) as a single key system cannot flexibly control data sharing and access after encrypted data processing. How to realize various computations over encrypted data in …


The Spatial Optimization And Evaluation Of The Economic, Ecological, And Social Value Of Urban Green Space In Shenzhen, Yuhan Yu, Wenting Zhang, Peihong Fu, Wei Huang, Keke Li, Kai Cao Mar 2020

The Spatial Optimization And Evaluation Of The Economic, Ecological, And Social Value Of Urban Green Space In Shenzhen, Yuhan Yu, Wenting Zhang, Peihong Fu, Wei Huang, Keke Li, Kai Cao

Research Collection School Of Computing and Information Systems

Urban green space (UGS) is important in urban systems, as it benefits economic development, ecological conservation, and living conditions. Many studies have evaluated the economic, ecological, and social value of UGS worldwide, and spatial optimization for UGS has been carried out to maximize its value. However, few studies have simultaneously examined these three values of UGS in one optimization system. To fill this gap, this study evaluated the economic value of UGS in terms of promoting housing prices, its ecological value through the relief of high land surface temperature (LST), and its social value through the provision of recreation spaces …


Approximation And Computational Complexity Of Some Hammock Variations Of The Poset Cover Problem, Ivy Ordanel, Proceso L. Fernandez Jr, Richelle Ann B. Juayong, Henry N. Adorna Mar 2020

Approximation And Computational Complexity Of Some Hammock Variations Of The Poset Cover Problem, Ivy Ordanel, Proceso L. Fernandez Jr, Richelle Ann B. Juayong, Henry N. Adorna

Department of Information Systems & Computer Science Faculty Publications

The Hammock(⏟𝟐, 𝟐 , … , 𝟐 / 𝒌 )-Poset Cover Problem is a variation of the Poset Cover Problem with the same input – set {𝑳𝟏, 𝑳𝟐, … , 𝑳𝒎} of linear orders over the set {𝟏, 𝟐, … ,𝒏}, but the solution is restricted to a set of simple hammock(𝟐⏟, 𝟐 , … , 𝟐 / 𝒌 ) posets. The problem is NP-Hard when 𝒌 ≥ 𝟑 but is in 𝑷 when 𝒌 = 𝟏. The computational complexity of the problem when 𝒌 = 𝟐 is not yet known. In this paper, …