Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1981 - 2010 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Semantic And Influence Aware K-Representative Queries Over Social Streams, Yanhao Wang, Yuchen Li, Kianlee Tan Mar 2019

Semantic And Influence Aware K-Representative Queries Over Social Streams, Yanhao Wang, Yuchen Li, Kianlee Tan

Research Collection School Of Computing and Information Systems

Massive volumes of data continuously generated on social platforms have become an important information source for users. A primary method to obtain fresh and valuable information from social streams is social search. Although there have been extensive studies on social search, existing methods only focus on the relevance of query results but ignore the representativeness. In this paper, we propose a novel Semantic and Influence aware k-Representative (k-SIR) query for social streams based on topic modeling. Specifically, we consider that both user queries and elements are represented as vectors in the topic space. A k-SIR query retrieves a set of …


Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr. Mar 2019

Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr.

Masters Theses & Doctoral Dissertations

The Mirai botnet deploys a distributed mechanism with each Bot continually scanning for a potential new Bot Victim. A Bot continually generates a random IP address to scan the network for discovering a potential new Bot Victim. The Bot establishes a connection with the potential new Bot Victim with a Transmission Control Protocol (TCP) handshake. The Mirai botnet has recruited hundreds of thousands of Bots. With 100,000 Bots, Mirai Distributed Denial of Service (DDoS) attacks on service provider Dyn in October 2016 triggered the inaccessibility to hundreds of websites in Europe and North America (Sinanović & Mrdovic, 2017). A month …


Advanced Code-Reuse Attacks: A Novel Framework For Jop, Bramwell J. Brizendine Mar 2019

Advanced Code-Reuse Attacks: A Novel Framework For Jop, Bramwell J. Brizendine

Masters Theses & Doctoral Dissertations

Return-oriented programming is the predominant code-reuse attack, where short gadgets or borrowed chunks of code ending in a RET instruction can be discovered in binaries. A chain of ROP gadgets placed on the stack can permit control flow to be subverted, allowing for arbitrary computation. Jump-oriented programming is a class of code-reuse attack where instead of using RET instructions, indirect jumps and indirect calls are utilized to subvert the control flow. JOP is important because can allow for important mitigations and protections against ROP to be bypassed, and some protections against JOP are imperfect. This dissertation presents a design science …


Flashlight In A Dark Room: A Grounded Theory Study On Information Security Management At Small Healthcare Provider Organizations, Gerald Auger Mar 2019

Flashlight In A Dark Room: A Grounded Theory Study On Information Security Management At Small Healthcare Provider Organizations, Gerald Auger

Masters Theses & Doctoral Dissertations

Healthcare providers have a responsibility to protect patient’s privacy and a business motivation to properly secure their assets. These providers encounter barriers to achieving these objectives and limited academic research has been conducted to examine the causes and strategies to overcome them. A subset of this demographic, businesses with less than 10 providers, compose a majority 57% of provider organizations in the United States. This grounded theory study provides exploratory findings, discovering these small healthcare provider organizations (SHPO) have limited knowledge on information technology (IT) and information security that results in assumptions and misappropriations of information security implementation, who is …


Bing: Binarized Normed Gradients For Objectness Estimation At 300fps, Ming-Ming Cheng, Yun Liu, Wen-Yan Lin, Ziming Zhang, Paul L. Rosin, Philip H. S. Torr Mar 2019

Bing: Binarized Normed Gradients For Objectness Estimation At 300fps, Ming-Ming Cheng, Yun Liu, Wen-Yan Lin, Ziming Zhang, Paul L. Rosin, Philip H. S. Torr

Research Collection School Of Computing and Information Systems

Training a generic objectness measure to produce object proposals has recently become of significant interest. We observe that generic objects with well-defined closed boundaries can be detected by looking at the norm of gradients, with a suitable resizing of their corresponding image windows to a small fixed size. Based on this observation and computational reasons, we propose to resize the window to 8 × 8 and use the norm of the gradients as a simple 64D feature to describe it, for explicitly training a generic objectness measure. We further show how the binarized version of this feature, namely binarized normed …


Fine-Grained Geolocation Of Tweets In Temporal Proximity, Wen Haw Chong, Ee Peng Lim Mar 2019

Fine-Grained Geolocation Of Tweets In Temporal Proximity, Wen Haw Chong, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In fine-grained tweet geolocation, tweets are linked to the specific venues (e.g., restaurants, shops) fromwhich they were posted. This explicitly recovers the venue context that is essential for applications such aslocation-based advertising or user profiling. For this geolocation task, we focus on geolocating tweets that arecontained in tweet sequences. In a tweet sequence, tweets are posted from some latent venue(s) by the sameuser and within a short time interval. This scenario arises from two observations: (1) It is quite common thatusers post multiple tweets in a short time and (2) most tweets are not geocoded. To more accurately geolocatea tweet, …


Bing: Binarized Normed Gradients For Objectness Estimation At 300fps, Ming-Ming Cheng, Yun Liu, Wen-Yan Lin, Ziming Zhang, Paul L. Rosin, Philip H. S. Torr Mar 2019

Bing: Binarized Normed Gradients For Objectness Estimation At 300fps, Ming-Ming Cheng, Yun Liu, Wen-Yan Lin, Ziming Zhang, Paul L. Rosin, Philip H. S. Torr

Research Collection School Of Computing and Information Systems

Training a generic objectness measure to produce object proposals has recently become of significant interest. We observe that generic objects with well-defined closed boundaries can be detected by looking at the norm of gradients, with a suitable resizing of their corresponding image windows to a small fixed size. Based on this observation and computational reasons, we propose to resize the window to 8 × 8 and use the norm of the gradients as a simple 64D feature to describe it, for explicitly training a generic objectness measure. We further show how the binarized version of this feature, namely binarized normed …


Kaggle And Click-Through Rate Prediction, Todd W. Neller Feb 2019

Kaggle And Click-Through Rate Prediction, Todd W. Neller

Computer Science Faculty Publications

Neller presented a look at Kaggle.com, an online Data Science and Machine Learning learning community, as a place to seek rapid, experiential peer education for most any Data Science topic. Using the specific challenge of Click-Through Rate Prediction (CTRP), he focused on lessons learned from relevant Kaggle competitions on how to perform CTRP.


Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah Feb 2019

Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah

Space Traffic Management Conference

The necessity for standards-based ontologies for long-term sustainability of space operations and safety of increasing space flights has been well-established [6, 7]. Current ontologies, such as DARPA’s OrbitOutlook [5], are not publicly available, complicating efforts for their broad adoption. Most sensor data is siloed in proprietary databases [2] and provided only to authorized users, further complicating efforts to create a holistic view of resident space objects (RSOs) in order to enhance space situational awareness (SSA).

The ASTRIA project is developing an open data model with the goal of aggregating data about RSOs, parts, space weather, and governing policies in order …


Context-Aware Personalized Point-Of-Interest Recommendation System, Ramesh Raj Baral Feb 2019

Context-Aware Personalized Point-Of-Interest Recommendation System, Ramesh Raj Baral

FIU Electronic Theses and Dissertations

The increasing volume of information has created overwhelming challenges to extract the relevant items manually. Fortunately, the online systems, such as e-commerce (e.g., Amazon), location-based social networks (LBSNs) (e.g., Facebook) among many others have the ability to track end users' browsing and consumption experiences. Such explicit experiences (e.g., ratings) and many implicit contexts (e.g., social, spatial, temporal, and categorical) are useful in preference elicitation and recommendation. As an emerging branch of information filtering, the recommendation systems are already popular in many domains, such as movies (e.g., YouTube), music (e.g., Pandora), and Point-of-Interest (POI) (e.g., Yelp).

The POI domain has many …


Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter Feb 2019

Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter

International Journal of Business and Technology

Today, still, ICT Governance is being regarded as a departmental concern, not an overall organizational concern. History has shown us that implementation strategies, which are based on departments, results in fractional implementations leading to ad hoc solutions with no central control and stagnation for the in-house ICT strategy. Further, this recently has created an opinion trend; many are talking about the ICT department as being redundant, a dying out breed, which should be replaced by on-demand specialized external services. Clearly, the evermore changing surroundings do force organizations to accelerate the pace of new adaptations within their ICT plans, more vivacious …


Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal Feb 2019

Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal

International Journal of Business and Technology

Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data protection rules) …


An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi Feb 2019

An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi

International Journal of Business and Technology

The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have gone …


Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith Feb 2019

Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith

International Journal of Business and Technology

The testing of simulation models has much in common with testing processes in other types of application involving software development. However, there are also important differences associated with the fact that simulation model testing involves two distinct aspects, which are known as verification and validation. Model validation is concerned with investigation of modelling errors and model limitations while verification involves checking that the simulation program is an accurate representation of the mathematical and logical structure of the underlying model. Success in model validation depends upon the availability of detailed information about all aspects of the system being modelled. It also …


Nifty Data Structures Projects, Ed Jorgensen, Laxmi Gewali Feb 2019

Nifty Data Structures Projects, Ed Jorgensen, Laxmi Gewali

UNLV Best Teaching Practices Expo

For computer science, and many technical fields, it is recognized that projects with real-world applicability play a significant roll in what students get out of the course. Creating applicable projects for upper division such as our data structures classes is very difficult and time consuming. We have utilized the Nifty assignments concept and applied it locally to an upper division data structures course. Our primary goal is to provide a forum for the sharing of data structure project ideas and materials (as applicable).


Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf Feb 2019

Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf

The Kabod

The participation of women in specific subfields of computer science (CS) and information technology (IT) will be investigated to determine the existence of any trends that may exist indicating special interest amongst women. Specifically, the subfield of database administration will be considered to determine if women tend to enter this subfield more frequently than other subfields. Research will also acknowledge statistics regarding male participation in database administration and other relevant subfields to determine if any trends in women’s participation are unique to women or if they exist across the board. Conclusions will be drawn based on the data and any …


Cs04all: Machine Learning Module, Hunter R. Johnson Feb 2019

Cs04all: Machine Learning Module, Hunter R. Johnson

Open Educational Resources

These are materials that may be used in a CS0 course as a light introduction to machine learning.

The materials are mostly Jupyter notebooks which contain a combination of labwork and lecture notes. There are notebooks on Classification, An Introduction to Numpy, and An Introduction to Pandas.

There are also two assessments that could be assigned to students. One is an essay assignment in which students are asked to read and respond to an article on machine bias. The other is a lab-like exercise in which students use pandas and numpy to extract useful information about subway ridership in NYC. …


Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth Feb 2019

Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth

Kno.e.sis Publications

Mental Health America designed ten questionnaires that are used to determine the risk of mental disorders. They are also commonly used by Mental Health Professionals (MHPs) to assess suicidality. Specifically, the Columbia Suicide Severity Rating Scale (C-SSRS), a widely used suicide assessment questionnaire, helps MHPs determine the severity of suicide risk and offer an appropriate treatment. A major challenge in suicide treatment is the social stigma wherein the patient feels reluctance in discussing his/her conditions with an MHP, which leads to inaccurate assessment and treatment of patients. On the other hand, the same patient is comfortable freely discussing his/her mental …


Comparelda: A Topic Model For Document Comparison, Maksim Tkachenko, Hady Wirawan Lauw Feb 2019

Comparelda: A Topic Model For Document Comparison, Maksim Tkachenko, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

A number of real-world applications require comparison of entities based on their textual representations. In this work, we develop a topic model supervised by pairwise comparisons of documents. Such a model seeks to yield topics that help to differentiate entities along some dimension of interest, which may vary from one application to another. While previous supervised topic models consider document labels in an independent and pointwise manner, our proposed Comparative Latent Dirichlet Allocation (CompareLDA) learns predictive topic distributions that comply with the pairwise comparison observations. To fit the model, we derive a maximum likelihood estimation method via augmented variational approximation …


Risk Pooling, Supply Chain Hierarchy, And Analysts' Forecasts, Nan Hu, Jian-Yu Ke, Ling Liu, Yue Zhang Feb 2019

Risk Pooling, Supply Chain Hierarchy, And Analysts' Forecasts, Nan Hu, Jian-Yu Ke, Ling Liu, Yue Zhang

Research Collection School Of Computing and Information Systems

We investigate whether a firm's risk pooling affects its analysts' forecasts, specifically in terms of forecast accuracy and their use of public vs. private information, and how risk pooling interacts with a firm's position in the supply chain to affect analysts' forecasts. We use a social network analysis method to operationalize risk pooling and supply chain hierarchy, and find that risk pooling significantly reduces analysts' forecast errors and increases (decreases) their use of public (private) information. We also find that the positive (negative) relationships between risk pooling and analyst forecast accuracy and analysts' use of public (private) information are more …


Send Hardest Problems My Way: Probabilistic Path Prioritization For Hybrid Fuzzing, Lei Zhao, Yue Duan, Jifeng Xuan Feb 2019

Send Hardest Problems My Way: Probabilistic Path Prioritization For Hybrid Fuzzing, Lei Zhao, Yue Duan, Jifeng Xuan

Research Collection School Of Computing and Information Systems

Hybrid fuzzing which combines fuzzing and concolic execution has become an advanced technique for software vulnerability detection. Based on the observation that fuzzing and concolic execution are complementary in nature, the state-of-the-art hybrid fuzzing systems deploy ``demand launch'' and ``optimal switch'' strategies. Although these ideas sound intriguing, we point out several fundamental limitations in them, due to oversimplified assumptions. We then propose a novel ``discriminative dispatch'' strategy to better utilize the capability of concolic execution. We design a novel Monte Carlo based probabilistic path prioritization model to quantify each path's difficulty and prioritize them for concolic execution. This model treats …


Vistanet: Visual Aspect Attention Network For Multimodal Sentiment Analysis, Quoc Tuan Truong, Hady Wirawan Lauw Feb 2019

Vistanet: Visual Aspect Attention Network For Multimodal Sentiment Analysis, Quoc Tuan Truong, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Detecting the sentiment expressed by a document is a key task for many applications, e.g., modeling user preferences, monitoring consumer behaviors, assessing product quality. Traditionally, the sentiment analysis task primarily relies on textual content. Fueled by the rise of mobile phones that are often the only cameras on hand, documents on the Web (e.g., reviews, blog posts, tweets) are increasingly multimodal in nature, with photos in addition to textual content. A question arises whether the visual component could be useful for sentiment analysis as well. In this work, we propose Visual Aspect Attention Network or VistaNet, leveraging both textual and …


Adaptive Cost-Sensitive Online Classification, Peilin Zhao, Yifan Zhang, Min Wu, Steven C. H. Hoi, Mingkui Tan, Junzhou Huang Feb 2019

Adaptive Cost-Sensitive Online Classification, Peilin Zhao, Yifan Zhang, Min Wu, Steven C. H. Hoi, Mingkui Tan, Junzhou Huang

Research Collection School Of Computing and Information Systems

Cost-Sensitive Online Classification has drawn extensive attention in recent years, where the main approach is to directly online optimize two well-known cost-sensitive metrics: (i) weighted sum of sensitivity and specificity; (ii) weighted misclassification cost. However, previous existing methods only considered first-order information of data stream. It is insufficient in practice, since many recent studies have proved that incorporating second-order information enhances the prediction performance of classification models. Thus, we propose a family of cost-sensitive online classification algorithms with adaptive regularization in this paper. We theoretically analyze the proposed algorithms and empirically validate their effectiveness and properties in extensive experiments. Then, …


Social Media Mining For Journalism, Arkaitz Zubiaga, Bahareh Heravi, Jisun An, Haewoon Kwak Feb 2019

Social Media Mining For Journalism, Arkaitz Zubiaga, Bahareh Heravi, Jisun An, Haewoon Kwak

Research Collection School Of Computing and Information Systems

The exponential growth of social media as a central communication practice, and its agility in capturing and announcing breaking news events more rapidly than traditional media, has changed the journalistic landscape: social media has been adopted as a significant source by professional journalists, and conversely, citizens are able to use social media as a form of direct reportage. This brings along new opportunities for newsrooms and journalists by providing new means for newsgathering through access to a wealth of citizen reportage and updates about current affairs, as well as an additional showcase for news dissemination.


Multi-Task Learning With Multi-View Attention For Answer Selection And Knowledge Base Question Answering, Yang Deng, Yuexiang Xie, Yaliang Li, Min Yang, Nan Du, Wei Fan, Kai Lei, Ying Shen Feb 2019

Multi-Task Learning With Multi-View Attention For Answer Selection And Knowledge Base Question Answering, Yang Deng, Yuexiang Xie, Yaliang Li, Min Yang, Nan Du, Wei Fan, Kai Lei, Ying Shen

Research Collection School Of Computing and Information Systems

Answer selection and knowledge base question answering (KBQA) are two important tasks of question answering (QA) systems. Existing methods solve these two tasks separately, which requires large number of repetitive work and neglects the rich correlation information between tasks. In this paper, we tackle answer selection and KBQA tasks simultaneously via multi-task learning (MTL), motivated by the following motivations. First, both answer selection and KBQA can be regarded as a ranking problem, with one at text-level while the other at knowledge-level. Second, these two tasks can benefit each other: answer selection can incorporate the external knowledge from knowledge base (KB), …


Partially Observable Multi-Sensor Sequential Change Detection: A Combinatorial Multi-Armed Bandit Approach, Chen Zhang, Steven C. H. Hoi Feb 2019

Partially Observable Multi-Sensor Sequential Change Detection: A Combinatorial Multi-Armed Bandit Approach, Chen Zhang, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

This paper explores machine learning to address a problem of Partially Observable Multi-sensor Sequential Change Detection (POMSCD), where only a subset of sensors can be observed to monitor a target system for change-point detection at each online learning round. In contrast to traditional Multisensor Sequential Change Detection tasks where all the sensors are observable, POMSCD is much more challenging because the learner not only needs to detect on-the-fly whether a change occurs based on partially observed multi-sensor data streams, but also needs to cleverly choose a subset of informative sensors to be observed in the next learning round, in order …


Robust Estimation Of Similarity Transformation For Visual Object Tracking, Yang Li, Jianke Zhu, Steven C. H. Hoi, Wenjie Song, Zhefeng Wang, Hantang Liu Feb 2019

Robust Estimation Of Similarity Transformation For Visual Object Tracking, Yang Li, Jianke Zhu, Steven C. H. Hoi, Wenjie Song, Zhefeng Wang, Hantang Liu

Research Collection School Of Computing and Information Systems

Most of existing correlation filter-based tracking approaches only estimate simple axis-aligned bounding boxes, and very few of them is capable of recovering the underlying similarity transformation. To tackle this challenging problem, in this paper, we propose a new correlation filter-based tracker with a novel robust estimation of similarity transformation on the large displacements. In order to efficiently search in such a large 4-DoF space in real-time, we formulate the problem into two 2-DoF sub-problems and apply an efficient Block Coordinates Descent solver to optimize the estimation result. Specifically, we employ an efficient phase correlation scheme to deal with both scale …


Dish: Democracy In State Houses, Nicholas A. Russo Feb 2019

Dish: Democracy In State Houses, Nicholas A. Russo

Master's Theses

In our current political climate, state level legislators have become increasingly impor- tant. Due to cuts in funding and growing focus at the national level, public oversight for these legislators has drastically decreased. This makes it difficult for citizens and activists to understand the relationships and commonalities between legislators. This thesis provides three contributions to address this issue. First, we created a data set containing over 1200 features focused on a legislator’s activity on bills. Second, we created embeddings that represented a legislator’s level of activity and engagement for a given bill using a custom model called Democracy2Vec. Third, we …


Explainable Reasoning Over Knowledge Graphs For Recommendation, Xiang Wang, Dingxian Wang, Canran Xu, Xiangnan He, Yixin Cao, Tat-Seng Chua Feb 2019

Explainable Reasoning Over Knowledge Graphs For Recommendation, Xiang Wang, Dingxian Wang, Canran Xu, Xiangnan He, Yixin Cao, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Incorporating knowledge graph into recommender systems has attracted increasing attention in recent years. By exploring the interlinks within a knowledge graph, the connectivity between users and items can be discovered as paths, which provide rich and complementary information to user-item interactions. Such connectivity not only reveals the semantics of entities and relations, but also helps to comprehend a user’s interest. However, existing efforts have not fully explored this connectivity to infer user preferences, especially in terms of modeling the sequential dependencies within and holistic semantics of a path. In this paper, we contribute a new model named Knowledgeaware Path Recurrent …


Discrete Social Recommendation, Chenghao Liu, Xin Wang, Tao Lu, Wenwu Zhu, Jianling Sun, Steven C. H. Hoi Feb 2019

Discrete Social Recommendation, Chenghao Liu, Xin Wang, Tao Lu, Wenwu Zhu, Jianling Sun, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Social recommendation, which aims at improving the performance of traditional recommender systems by considering social information, has attracted broad range of interests. As one of the most widely used methods, matrix factorization typically uses continuous vectors to represent user/item latent features. However, the large volume of user/item latent features results in expensive storage and computation cost, particularly on terminal user devices where the computation resource to operate model is very limited. Thus when taking extra social information into account, precisely extracting K most relevant items for a given user from massive candidates tends to consume even more time and memory, …