Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2941 - 2970 of 6721

Full-Text Articles in Physical Sciences and Mathematics

Metaflow: A Scalable Metadata Lookup Service For Distributed File Systems In Data Centers, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Haiyong Xie Sep 2016

Metaflow: A Scalable Metadata Lookup Service For Distributed File Systems In Data Centers, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Haiyong Xie

Research Collection School Of Computing and Information Systems

In large-scale distributed file systems, efficient metadata operations are critical since most file operations have to interact with metadata servers first. In existing distributed hash table (DHT) based metadata management systems, the lookup service could be a performance bottleneck due to its significant CPU overhead. Our investigations showed that the lookup service could reduce system throughput by up to 70%, and increase system latency by a factor of up to 8 compared to ideal scenarios. In this paper, we present MetaFlow, a scalable metadata lookup service utilizing software-defined networking (SDN) techniques to distribute lookup workload over network components. MetaFlow tackles …


Detecting Community Pacemakers Of Burst Topic In Twitter, Guozhong Dong, Wu Yang, Feida Zhu, Wei Wang Sep 2016

Detecting Community Pacemakers Of Burst Topic In Twitter, Guozhong Dong, Wu Yang, Feida Zhu, Wei Wang

Research Collection School Of Computing and Information Systems

Twitter has become one of largest social networks for users to broad-cast burst topics. Influential users usually have a large number of followers and play an important role in the diffusion of burst topic. There have been many studies on how to detect influential users. However, traditional influential users detection approaches have largely ignored influential users in user community. In this paper, we investigate the problem of detecting community pacemakers. Community pacemakers are defined as the influential users that promote early diffusion in the user community of burst topic. To solve this problem, we present DCPBT, a framework that can …


Autoquery: Automatic Construction Of Dependency Queries For Code Search, Shaowei Wang, David Lo, Lingxiao Jiang Sep 2016

Autoquery: Automatic Construction Of Dependency Queries For Code Search, Shaowei Wang, David Lo, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Many code search techniques have been proposed to return relevant code for a user query expressed as textual descriptions. However, source code is not mere text. It contains dependency relations among various program elements. To leverage these dependencies for more accurate code search results, techniques have been proposed to allow user queries to be expressed as control and data dependency relationships among program elements. Although such techniques have been shown to be effective for finding relevant code, it remains a question whether appropriate queries can be generated by average users. In this work, we address this concern by proposing a …


Human-Centred Design For Silver Assistants, Zhiwei Zheng, Di Wang, Ailiya Borjigin, Chunyan Miao, Ah-Hwee Tan, Cyril Leung Sep 2016

Human-Centred Design For Silver Assistants, Zhiwei Zheng, Di Wang, Ailiya Borjigin, Chunyan Miao, Ah-Hwee Tan, Cyril Leung

Research Collection School Of Computing and Information Systems

To alleviate the rapidly increasing need of the healthcare workforce to serve the enormous ageing population, leveraging intelligent and autonomous caring agents is one promising way. Working towards the design and development of dedicated personal silver assistants for older adults, we follow the human-centred design approach. Specifically, we identify a number of human factors that affect the user experience of the older adults and develop an agent named Mobile Intelligent Silver Assistant (MISA) by applying these human factors. Integrating multiple reusable services onto one platform, MISA acts as a single point of contact while simultaneously providing easy and convenient access …


Towards Autonomous Behavior Learning Of Non-Player Characters In Games, Shu Feng, Ah-Hwee Tan Sep 2016

Towards Autonomous Behavior Learning Of Non-Player Characters In Games, Shu Feng, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Non-Player-Characters (NPCs), as found in computer games, can be modelled as intelligent systems, which serve to improve the interactivity and playability of the games. Although reinforcement learning (RL) has been a promising approach to creating the behavior models of non-player characters (NPC), an initial stage of exploration and low performance is typically required. On the other hand, imitative learning (IL) is an effective approach to pre-building a NPC’s behavior model by observing the opponent’s actions, but learning by imitation limits the agent’s performance to that of its opponents. In view of their complementary strengths, this paper proposes a computational model …


Modeling Sequential Preferences With Dynamic User And Context Factors, Duc Trong Le, Yuan Fang, Hady W. Lauw Sep 2016

Modeling Sequential Preferences With Dynamic User And Context Factors, Duc Trong Le, Yuan Fang, Hady W. Lauw

Research Collection School Of Computing and Information Systems

Users express their preferences for items in diverse forms, through their liking for items, as well as through the sequence in which they consume items. The latter, referred to as “sequential preference”, manifests itself in scenarios such as song or video playlists, topics one reads or writes about in social media, etc. The current approach to modeling sequential preferences relies primarily on the sequence information, i.e., which item follows another item. However, there are other important factors, due to either the user or the context, which may dynamically affect the way a sequence unfolds. In this work, we develop generative …


Probabilistic Models For Contextual Agreement In Preferences, Loc Do, Hady W. Lauw Sep 2016

Probabilistic Models For Contextual Agreement In Preferences, Loc Do, Hady W. Lauw

Research Collection School Of Computing and Information Systems

The long-tail theory for consumer demand implies the need for more accurate personalization technologies to target items to the users who most desire them. A key tenet of personalization is the capacity to model user preferences. Most of the previous work on recommendation and personalization has focused primarily on individual preferences. While some focus on shared preferences between pairs of users, they assume that the same similarity value applies to all items. Here we investigate the notion of "context," hypothesizing that while two users may agree on their preferences on some items, they may also disagree on other items. To …


Control Flow Integrity Enforcement With Dynamic Code Optimization, Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu Sep 2016

Control Flow Integrity Enforcement With Dynamic Code Optimization, Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu

Research Collection School Of Computing and Information Systems

Control Flow Integrity (CFI) is an attractive security property with which most injected and code reuse attacks can be defeated, including advanced attacking techniques like Return-Oriented Programming (ROP). However, comprehensive enforcement of CFI is expensive due to additional supports needed (e.g., compiler support and presence of relocation or debug information) and performance overhead. Recent research has been trying to strike the balance among reasonable approximation of the CFI properties, minimal additional supports needed, and acceptable performance. We investigate existing dynamic code optimization techniques and find that they provide an architecture on which CFI can be enforced effectively and efficiently. In …


Efficient Community Maintenance For Dynamic Social Networks, Hongchao Qin, Ye Yuan, Feida Zhu, Guoren Wang Sep 2016

Efficient Community Maintenance For Dynamic Social Networks, Hongchao Qin, Ye Yuan, Feida Zhu, Guoren Wang

Research Collection School Of Computing and Information Systems

Community detection plays an important role in a wide range of research topics for social networks including personalized recommendation services and information dissemination. The highly dynamic nature of social platforms, and accordingly the constant updates to the underlying network, all present a serious challenge for efficient maintenance of the identified communities. How to avoid computing from scratch the whole community detection result in face of every update, which constitutes small changes more often than not. To solve this problem, we propose a novel and efficient algorithm to maintain the communities in dynamic social networks by identifying and updating only those …


Is Only One Gps Position Sufficient To Locate You To The Road Network Accurately?, Hao Wu, Weiwei Sun, Baihua Zheng Sep 2016

Is Only One Gps Position Sufficient To Locate You To The Road Network Accurately?, Hao Wu, Weiwei Sun, Baihua Zheng

Research Collection School Of Computing and Information Systems

Locating only one GPS position to a road segment accurately is crucial to many location-based services such as mobile taxihailing service, geo-tagging, POI check-in, etc. This problem is challenging because of errors including the GPS errors and the digital map errors (misalignment and the same representation of bidirectional roads) and a lack of context information. To the best of our knowledge, no existing work studies this problem directly and the work to reduce GPS signal errors by considering hardware aspect is the most relevant. Consequently, this work is the first attempt to solve the problem of locating one GPS position …


Representation Learning For Homophilic Preferences, Trong T. Nguyen, Hady W. Lauw Sep 2016

Representation Learning For Homophilic Preferences, Trong T. Nguyen, Hady W. Lauw

Research Collection School Of Computing and Information Systems

Users express their personal preferences through ratings, adoptions, and other consumption behaviors. We seek tolearn latent representations for user preferences from such behavioral data. One representation learning model that has been shown to be effective for large preference datasets is Restricted Boltzmann Machine (RBM). While homophily, or the tendency of friends to share their preferences at some level, is an established notion in sociology, thus far it has not yet been clearly demonstrated on RBM-based preference models. The question lies in how to appropriately incorporate social network into the architecture of RBM-based models for learning representations of preferences. In this …


Soft Confidence-Weighted Learning, Jialei Wang, Peilin Zhao, Hoi, Steven C. H. Sep 2016

Soft Confidence-Weighted Learning, Jialei Wang, Peilin Zhao, Hoi, Steven C. H.

Research Collection School Of Computing and Information Systems

Online learning plays an important role in many big datamining problems because of its high efficiency and scalability. In theliterature, many online learning algorithms using gradient information havebeen applied to solve online classification problems. Recently, more effectivesecond-order algorithms have been proposed, where the correlation between thefeatures is utilized to improve the learning efficiency. Among them,Confidence-Weighted (CW) learning algorithms are very effective, which assumethat the classification model is drawn from a Gaussian distribution, whichenables the model to be effectively updated with the second-order informationof the data stream. Despite being studied actively, these CW algorithms cannothandle nonseparable datasets and noisy datasets very …


Extracting Food Substitutes From Food Diary Via Distributional Similarity, Palakorn Achananuparp, Ingmar Weber Sep 2016

Extracting Food Substitutes From Food Diary Via Distributional Similarity, Palakorn Achananuparp, Ingmar Weber

Research Collection School Of Computing and Information Systems

In this paper, we explore the problem of identifying substitute relationship between food pairs from real-world food consumption data as the first step towards the healthier food recommendation. Our method is inspired by the distributional hypothesis in linguistics. Specifically, we assume that foods that are consumed in similar contexts are more likely to be similar dietarily. For example, a turkey sandwich can be considered a suitable substitute for a chicken sandwich if both tend to be consumed with french fries and salad. To evaluate our method, we constructed a real-world food consumption dataset from MyFitnessPal's public food diary entries and …


Cross-Cultural User Perceptions Of Website Design And Security: Introduction To A Commentary And Response On Cyr (2013), Robert John Kauffman Sep 2016

Cross-Cultural User Perceptions Of Website Design And Security: Introduction To A Commentary And Response On Cyr (2013), Robert John Kauffman

Research Collection School Of Computing and Information Systems

Just as the well-known statistician, George Box, commented in a 1978 paper, “All models are wrong, but some are useful,” so are there many ways to design research inquiry approaches to explore issues in various e-commerce contexts – all useful too. In the two brief essays that follow, the reader will see a written commentary and a response that illustrates this idea. It occurred between a technology researcher who published an article on cross-cultural issues in website design in Cyr (2013), and an economist who is able to offer useful insights on the statistical work and data analytics with methods …


High Correlation Of Middle East Respiratory Syndrome Spread With Google Search And Twitter Trends In Korea, Soo-Yong Shin, Dong-Woo Seo, Jisun An, Haewoon Kwak, Sung-Han Kim, Jin Gwack, Min-Woo Jo Sep 2016

High Correlation Of Middle East Respiratory Syndrome Spread With Google Search And Twitter Trends In Korea, Soo-Yong Shin, Dong-Woo Seo, Jisun An, Haewoon Kwak, Sung-Han Kim, Jin Gwack, Min-Woo Jo

Research Collection School Of Computing and Information Systems

The Middle East respiratory syndrome coronavirus (MERS-CoV) was exported to Korea in 2015, resulting in a threat to neighboring nations. We evaluated the possibility of using a digital surveillance system based on web searches and social media data to monitor this MERS outbreak. We collected the number of daily laboratory-confirmed MERS cases and quarantined cases from May 11, 2015 to June 26, 2015 using the Korean government MERS portal. The daily trends observed via Google search and Twitter during the same time period were also ascertained using Google Trends and Topsy. Correlations among the data were then examined using Spearman …


Complex Event Processing As A Service In Multi-Cloud Environments, Wilson A. Higashino Aug 2016

Complex Event Processing As A Service In Multi-Cloud Environments, Wilson A. Higashino

Electronic Thesis and Dissertation Repository

The rise of mobile technologies and the Internet of Things, combined with advances in Web technologies, have created a new Big Data world in which the volume and velocity of data generation have achieved an unprecedented scale. As a technology created to process continuous streams of data, Complex Event Processing (CEP) has been often related to Big Data and used as a tool to obtain real-time insights. However, despite this recent surge of interest, the CEP market is still dominated by solutions that are costly and inflexible or too low-level and hard to operate.

To address these problems, this research …


Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini Aug 2016

Using Blockchain Technology To Facilitate Anti-Money Laundering Efforts, Dominick J. Battistini

Economic Crime Forensics Capstones

Money laundering can be defined as any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources (Money Laundering, 2016). It is difficult to determine the magnitude of money laundering because these illicit financial flows remain hidden (Schott, 2006). A report issued by the United Nations Office on Drugs and Crime (UNODC) quoted that the total of all criminal proceeds amounted to $2.1 trillion in 2009. The study also shows that “Less than 1 percent of global illicit financial flows are currently seized and frozen” (Pietschmann …


Study On The Application Of Information Technology In Inland Maritime Supervision, Chong He Aug 2016

Study On The Application Of Information Technology In Inland Maritime Supervision, Chong He

Maritime Safety & Environment Management Dissertations (Dalian)

No abstract provided.


Important Considerations For Human Activity Recognition Using Sensor Data, Matt Buckner Aug 2016

Important Considerations For Human Activity Recognition Using Sensor Data, Matt Buckner

Rose-Hulman Undergraduate Research Publications

Automated human activity recognition has received much attention in recent years due to increasing focus on interconnected devices in The Internet of Things (IoT) and the miniaturization and proliferation of sensor systems with the adoption of smartphones. In this work, we focus on the current status of human activity recognition across multiple studies, including methodology, accuracy of results, and current challenges to implementation. We include some preliminary work we have completed on a sensor system for classifying treadmill usage.


Real Time Activity Recognition Of Treadmill Usage Via Machine Learning, Nathan Blank, Matt Buckner, Christian Owen, Anna Scott Aug 2016

Real Time Activity Recognition Of Treadmill Usage Via Machine Learning, Nathan Blank, Matt Buckner, Christian Owen, Anna Scott

Rose-Hulman Undergraduate Research Publications

Our objective is to provide real-time classification of treadmill usage patterns based on accelerometer and magnetometer measurements. We collected data from treadmills in the Rose-Hulman Student Recreation Center (SRC) using Shimmer3 sensor units. We identified useful data features and classifiers for predicting treadmill usage patterns. We also prototyped a proof of concept wireless, real-time classification system.


Topic Extraction From Microblog Posts Using Conversation Structures, Jing Li, Ming Liao, Wei Gao, Yulan He, Kam-Fai Wong Aug 2016

Topic Extraction From Microblog Posts Using Conversation Structures, Jing Li, Ming Liao, Wei Gao, Yulan He, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Conventional topic models are ineffective for topic extraction from microblog messages since the lack of structure and context among the posts renders poor message-level word co-occurrence patterns. In this work, we organize microblog posts as conversation trees based on reposting and replying relations, which enrich context information to alleviate data sparseness. Our model generates words according to topic dependencies derived from the conversation structures. In specific, we differentiate messages as leader messages, which initiate key aspects of previously focused topics or shift the focus to different topics, and follower messages that do not introduce any new information but simply echo …


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney Aug 2016

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Paul B. Sweeney

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development. The data showed that the CIOs who …


Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman Aug 2016

Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman

Michael F. Gorman

We propose improved pricing and market mix can improve the profitability of the freight transportation provider through the reduction of equipment repositioning costs. We hypothesize that because of complexities surrounding pricing and equipment repositioning costing, existing pricing strategies in freight transportation fail to fully consider these costs. We test this hypothesis in an applied setting in which Monte Carlo simulation captures the stochasticity of market conditions inherent in the problem. We use a heuristic to improve the nondifferentiable, discontinuous objective function. Our results from test cases show with high confidence that current prices are not optimal, as indicated by a …


Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman Aug 2016

Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman

Michael F. Gorman

In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.

Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.


The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt Aug 2016

The Promises And Challenges Of Innovating Through Big Data And Analytics In Healthcare, Donald E. Wynn, Renée M. E. Pratt

Donald Wynn

In this article, we present the promises and challenges of big data and analytics (BD&A) in healthcare, informed by our observations of and interviews with healthcare providers in the US and European Union (EU). We then provide a set of recommendations for capitalizing on the extraordinary innovation opportunities available through big data.


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Donald Wynn

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams Aug 2016

Principles For Conducting Critical Realist Case Study Research In Information Systems, Donald E. Wynn, Clay K. Williams

Donald Wynn

Critical realism is emerging as a viable philosophical paradigm for conducting social science research, and has been proposed as an alternative to the more prevalent paradigms of positivism and interpretivism. Few papers, however, have offered clear guidance for applying this philosophy to actual research methodologies. Under critical realism, a causal explanation for a given phenomenon is inferred by explicitly identifying the means by which structural entities and contextual conditions interact to generate a given set of events. Consistent with this view of causality, we propose a set of methodological principles for conducting and evaluating critical realism-based explanatory case study research …


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn Aug 2016

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Donald Wynn

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is emphasized in …


Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh Aug 2016

Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh

Harvey Enns

Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations. Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via relational means. Most …


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns Aug 2016

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Harvey Enns

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating and …