Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3901 - 3930 of 6727

Full-Text Articles in Physical Sciences and Mathematics

Modeling Contextual Agreement In Preferences, Ha Loc Do, Hady Wirawan Lauw Apr 2014

Modeling Contextual Agreement In Preferences, Ha Loc Do, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Personalization, or customizing the experience of each individual user, is seen as a useful way to navigate the huge variety of choices on the Web today. A key tenet of personalization is the capacity to model user preferences. The paradigm has shifted from that of individual preferences, whereby we look at a user's past activities alone, to that of shared preferences, whereby we model the similarities in preferences between pairs of users (e.g., friends, people with similar interests). However, shared preferences are still too granular, because it assumes that a pair of users would share preferences across all items. We …


Celebrowser: An Example Of Browsing Big Data On Small Device, Song Tan, Chong-Wah Ngo, Jun Xu, Yong Rui Apr 2014

Celebrowser: An Example Of Browsing Big Data On Small Device, Song Tan, Chong-Wah Ngo, Jun Xu, Yong Rui

Research Collection School Of Computing and Information Systems

In this demonstration, we demonstrate a mobile-based celebrity video browsing system called CeleBrowser. Using this system, users can interactively switch among four views: people-centric, timeline-centric, month-centric and topic-centric, for browsing celebrity-related hot videos. A peculiarity of the demonstration is to highlight the advantage of multiperspective information organization and presentation in engaging users for exploratory browsing of large number of Web videos on a device with small screen. Technology-wise the demonstration shows how query logs collected for six months from two vertical search engines are leveraged for mining hot events and videos of celebrities.


Community Discovery In Social Networks Via Heterogeneous Link Association And Fusion, Lei Meng, Ah-Hwee Tan Apr 2014

Community Discovery In Social Networks Via Heterogeneous Link Association And Fusion, Lei Meng, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Discovering social communities of web users through clustering analysis of heterogeneous link associations has drawn much attention. However, existing approaches typically require the number of clusters a prior, do not address the weighting problem for fusing heterogeneous types of links and have a heavy computational cost. In this paper, we explore the feasibility of a newly proposed heterogeneous data clustering algorithm, called Generalized Heterogeneous Fusion Adaptive Resonance Theory (GHF-ART), for discovering communities in heterogeneous social networks. Different from existing algorithms, GHF-ART performs real-time matching of patterns and one-pass learning which guarantee its low computational cost. With a vigilance parameter to …


Cimloc: A Crowdsourcing Indoor Digital Map Construction System For Localization, Xiuming Zhang, Yunye Jin, Hwee Xian Tan, Wee-Seng Soh Apr 2014

Cimloc: A Crowdsourcing Indoor Digital Map Construction System For Localization, Xiuming Zhang, Yunye Jin, Hwee Xian Tan, Wee-Seng Soh

Research Collection School Of Computing and Information Systems

Indoor maps, as crucial prerequisites for many indoor localization and navigation systems, are sometimes inaccessible. The absence of an indoor map database and the high cost of manually constructing an indoor map produce a need for an inexpensive and efficient way to dynamically construct indoor maps. The ubiquity of sensor-equipped mobile devices enables us to crowdsource user trajectories, out of which indoor digital maps can be automatically constructed at low costs. Similar to other crowdsourced data, the collected user trajectories are often noisy and of low fidelity, which poses a challenge to the accurate map construction. To alleviate this problem, …


Laser: A Living Analytics Experimentation System For Large-Scale Online Controlled Experiments, Kwan-Hui Lim, Ee Peng Lim, Achananuparp Palakorn, Adrian Vu, Agus Trisnajaya Kwee, Feida Zhu Apr 2014

Laser: A Living Analytics Experimentation System For Large-Scale Online Controlled Experiments, Kwan-Hui Lim, Ee Peng Lim, Achananuparp Palakorn, Adrian Vu, Agus Trisnajaya Kwee, Feida Zhu

Research Collection School Of Computing and Information Systems

Tracking user browsing data and measuring the effectiveness of website design and web services are important to businesses that want to attract the consumers today who spend much more time online than before. Instead of using randomized controlled experiments, the existing approach simply tracks user browsing behaviors before and after a change is made to website design or web services, and evaluate the differences. To address the effects caused by hidden factors (e.g. promotion activities on the website) and to give fair comparison of different website designs, we propose the LASER system, a unified experimentation platform that enables randomized online …


Just-For-Me: An Adaptive Personalization System For Location-Aware Social Music Recommendation, Zhiyong Cheng, Jialie Shen Apr 2014

Just-For-Me: An Adaptive Personalization System For Location-Aware Social Music Recommendation, Zhiyong Cheng, Jialie Shen

Research Collection School Of Computing and Information Systems

The fast growth of online communities and increasing popularity of internet-accessing smart devices have significantly changed the way people consume and share music. As an emerging technology to facilitate effective music retrieval on the move, intelligent recommendation has been recently received great attentions in recent years. While a large amount of efforts have been invested in the field, the technology is still in its infancy. One of the major reasons for this stagnation is due to inability of the existing approaches to comprehensively take multiple kinds of contextual information into account. In the paper, we present a novel recommender system …


Technological, Organizational, And Environmental Factors Affecting The Adoption Of Cloud Enterprise Resource Planning (Erp) Systems, John Njenga Kinuthia Apr 2014

Technological, Organizational, And Environmental Factors Affecting The Adoption Of Cloud Enterprise Resource Planning (Erp) Systems, John Njenga Kinuthia

Master's Theses and Doctoral Dissertations

The purpose of this study was to determine the differences between organizations that adopted Cloud Enterprise Resource Planning (Cloud ERP) systems and organizations that did not adopt Cloud ERP systems based on the Technological, Organizational, and Environmental (TOE) factors. Relevant technological factors were identified as relative advantage of Cloud ERP systems, compatibility of Cloud ERP systems, and security concern of Cloud ERP system environment. Organizational factors included top management support, organizational readiness, size of the organization, centralization, and formalization. External environment factors were identified as competitive pressure and vendor support.

A survey was developed using constructs from existing studies of …


Latent Factor Transition For Dynamic Collaborative Filtering, Chengyi Zhang, Ke Wang, Hongkun Yu, Jianling Sun, Ee Peng Lim Apr 2014

Latent Factor Transition For Dynamic Collaborative Filtering, Chengyi Zhang, Ke Wang, Hongkun Yu, Jianling Sun, Ee Peng Lim

Research Collection School Of Computing and Information Systems

No abstract provided.


Online Multi-Modal Distance Metric Learning With Application To Image Retrieval, Pengcheng Wu, Steven C. H. Hoi, Peilin Zhao, Chunyan Miao, Zhi-Yong Liu Apr 2014

Online Multi-Modal Distance Metric Learning With Application To Image Retrieval, Pengcheng Wu, Steven C. H. Hoi, Peilin Zhao, Chunyan Miao, Zhi-Yong Liu

Research Collection School Of Computing and Information Systems

See https://ink.library.smu.edu.sg/sis_research/2924/. Distance metric learning (DML) is an important technique to improve similarity search in content-based image retrieval. Despite being studied extensively, most existing DML approaches typically adopt a single-modal learning framework that learns the distance metric on either a single feature type or a combined feature space where multiple types of features are simply concatenated. Such single-modal DML methods suffer from some critical limitations: (i) some type of features may significantly dominate the others in the DML task due to diverse feature representations; and (ii) learning a distance metric on the combined high-dimensional feature space can be extremely …


Recurrent Chinese Restaurant Process With A Duration-Based Discount For Event Identification From Twitter, Qiming Diao, Jing Jiang Apr 2014

Recurrent Chinese Restaurant Process With A Duration-Based Discount For Event Identification From Twitter, Qiming Diao, Jing Jiang

Research Collection School Of Computing and Information Systems

Due to the fast development of social media on the Web, Twitter has become one of the major platforms for people to express themselves. Because of the wide adoption of Twitter, events like breaking news and release of popular videos can easily catch people’s attention and spread rapidly on Twitter, and the number of relevant tweets approximately reflects the impact of an event. Event identification and analysis on Twitter has thus become an important task. Recently the Recurrent Chinese Restaurant Process (RCRP) has been successfully used for event identification from news streams and news-centric social media streams. However, these models …


[Sabbatical Report], Huanjing Wang Apr 2014

[Sabbatical Report], Huanjing Wang

Sabbatical Reports

My sabbatical leave was conducted during Spring semester 2014. The leave was successful because it strengthened my research in data mining and software engineering domains and resulted four full-paper publications in peer-reviewed international conferences and one journal paper (to be submitted to a peer-reviewed journal). The purpose of my sabbatical was to complete two main projects: (1) Investigate the stability and defect prediction model performance of feature selection techniques together on real-world software metrics data and (2) Design a novel, robust, and efficient metric selection method for imbalanced data.


Do You Know The Speaker?: An Online Experiment With Authority Messages On Event Websites, Kwan-Hui Lim, Binyan Jiang, Ee Peng Lim, Achananuparp Palakorn Apr 2014

Do You Know The Speaker?: An Online Experiment With Authority Messages On Event Websites, Kwan-Hui Lim, Binyan Jiang, Ee Peng Lim, Achananuparp Palakorn

Research Collection School Of Computing and Information Systems

With the widespread adoption of the Web, many companies and organizations have established websites that provide information and support online transactions (e.g., buying products or viewing content). Unfortunately, users have limited attention to spare for interacting with online sites. Hence, it is of utmost importance to design sites that attract user attention and effectively guide users to the product or content items they like. Thus, we propose a novel and scalable experimentation approach to evaluate the effectiveness of online site designs. Our case study focuses on the effects of an authority message on visitors' browsing behavior on workshop and seminar …


Assessing The Impact Of Electronic Health Record Systems Implementation On Hospital Patient Perceptions Of Care, Katherine Sofia Palacio Salgar Apr 2014

Assessing The Impact Of Electronic Health Record Systems Implementation On Hospital Patient Perceptions Of Care, Katherine Sofia Palacio Salgar

Engineering Management & Systems Engineering Theses & Dissertations

The delivery of health care services has been impacted by advances in Knowledge Management Information Systems (KMIS) and Information Technology (IT). The literature reveals that Electronic Health Records Systems (EHRs) are a comprehensive KMIS. There is a wide recognition in the body of knowledge that demonstrates the potential of EHRs to transform all aspects of health care services and, in consequence, the performance of Health Care Delivery Organizations (HCDO). Authors of published research also agree that there is a need for more empirical contributions that demonstrate the impact of EHRs upon HCDO. It is argued that in most cases, studies …


On Modeling Community Behaviors And Sentiments In Microblogging, Tuan Anh Hoang, William Cohen, Ee Peng Lim Apr 2014

On Modeling Community Behaviors And Sentiments In Microblogging, Tuan Anh Hoang, William Cohen, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In this paper, we propose the CBS topic model, a probabilistic graphical model, to derive the user communities in microblogging networks based on the sentiments they express on their generated content and behaviors they adopt. As a topic model, CBS can uncover hidden topics and derive user topic distribution. In addition, our model associates topic-specific sentiments and behaviors with each user community. Notably, CBS has a general framework that accommodates multiple types of behaviors simultaneously. Our experiments on two Twitter datasets show that the CBS model can effectively mine the representative behaviors and emotional topics for each community. We also …


On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo Apr 2014

On Finding The Point Where There Is No Return: Turning Point Mining On Game Data, Wei Gong, Ee Peng Lim, Feida Zhu, Achananuparp Palakorn, David Lo

Research Collection School Of Computing and Information Systems

Gaming expertise is usually accumulated through playing or watching many game instances, and identifying critical moments in these game instances called turning points. Turning point rules (shorten as TPRs) are game patterns that almost always lead to some irreversible outcomes. In this paper, we formulate the notion of irreversible outcome property which can be combined with pattern mining so as to automatically extract TPRs from any given game datasets. We specifically extend the well-known PrefixSpan sequence mining algorithm by incorporating the irreversible outcome property. To show the usefulness of TPRs, we apply them to Tetris, a popular game. We mine …


Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Z. Garcia, Miriam A M Capretz, M. Beatriz F. Toledo Mar 2014

Semantic Privacy Policies For Service Description And Discovery In Service-Oriented Architecture, Diego Z. Garcia, Miriam A M Capretz, M. Beatriz F. Toledo

Electrical and Computer Engineering Publications

Privacy preservation in Service-Oriented Architecture (SOA) is an open problem. This paper focuses on the areas of service description and discovery. The problems in these areas are that currently it is not possible to describe how a service provider deals with information received from a service consumer as well as discover a service that satisfies the privacy preferences of a consumer. There is currently no framework which offers a solution that supports a rich description of privacy policies and their integration in the process of service discovery. Thus, the main goal of this paper is to propose a privacy preservation …


Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray Mar 2014

Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray

Faculty Articles

Many scholarly social networking sites targeting an audience of academicians and researchers have appeared on the Internet in recent years. Their vision is to change the way researchers connect, share and collaborate to solve real world problems. Despite the hype, however, their impact on higher education is unclear. Studies exist that address the benefits of these sites, but studies that investigate the implications of how scholarly social networking systems vet information, including data related to user profiles and uploaded content, is nonexistent. This paper chronicles the system management of user information for an inactive user of a scholarly social networking …


Algorithmic Accountability, Tamara Kneese Mar 2014

Algorithmic Accountability, Tamara Kneese

Media Studies

Accountability is fundamentally about checks and balances to power. In theory, both government and corporations are kept accountable through social, economic, and political mechanisms. Journalism and public advocates serve as an additional tool to hold powerful institutions and individuals accountable. But in a world of data and algorithms, accountability is often murky. Beyond questions about whether the market is sufficient or governmental regulation is necessary, how should algorithms be held accountable? For example what is the role of the fourth estate in holding data-oriented practices accountable?


Data Supply Chains, Tamara Kneese Mar 2014

Data Supply Chains, Tamara Kneese

Media Studies

As data moves between actors and organizations, what emerges is a data supply chain. Unlike manufacturing supply chains, transferred data is often duplicated in the process, challenging the essence of ownership. What does ethical data labor look like? How are the various stakeholders held accountable for being good data guardians? What does clean data transfer look like? What kinds of best practices can business and government put into place? What upstream rights to data providers have over downstream commercialization of their data?


Predicting Human Behavior, Tamara Kneese Mar 2014

Predicting Human Behavior, Tamara Kneese

Media Studies

Countless highly accurate predictions can be made from trace data, with varying degrees of personal or societal consequence (e.g., search engines predict hospital admission, gaming companies can predict compulsive gambling problems, government agencies predict criminal activity). Predicting human behavior can be both hugely beneficial and deeply problematic depending on the context. What kinds of predictive privacy harms are emerging? And what are the implications for systems of oversight and due process protections? For example, what are the implications for employment, health care and policing when predictive models are involved? How should varied organizations address what they can predict?


Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon Mar 2014

Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon

Ming Gao

Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …


R-Energy For Evaluating Robustness Of Dynamic Networks, Ming Gao, Ee Peng Lim, David Lo Mar 2014

R-Energy For Evaluating Robustness Of Dynamic Networks, Ming Gao, Ee Peng Lim, David Lo

Ming Gao

The robustness of a network is determined by how well its vertices are connected to one another so as to keep the network strong and sustainable. As the network evolves its robustness changes and may reveal events as well as periodic trend patterns that affect the interactions among users in the network. In this paper, we develop R-energy as a new measure of network robustness based on the spectral analysis of normalized Laplacian matrix. R-energy can cope with disconnected networks, and is efficient to compute with a time complexity of O (jV j + jEj) where V and E are …


Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash Mar 2014

Critical Considerations For Developing Mis For Ngos, Umakant Mishra, Kailash Chandra Dash

Umakant Mishra

Although Information Systems and Information Technology (IS & IT) has become a major driving force for many of the current day organizations, the NGOs have not been able to utilize the benefits up to a satisfactory level. Most organizations use standard office tools to manage huge amount for field data and never feel the need for a central repository of data. While many people argue that an NGO should not spend too much money on information management, it is a fact that organizing the information requires more of a mindset and an organized behavior than a huge financial investment.


Time-Series Data Mining In Transportation: A Case Study On Singapore Public Train Commuter Travel Patterns, Tin Seong Kam, Roy Ka Wei Lee Mar 2014

Time-Series Data Mining In Transportation: A Case Study On Singapore Public Train Commuter Travel Patterns, Tin Seong Kam, Roy Ka Wei Lee

Research Collection School Of Computing and Information Systems

The adoption of smart cards technologies and automated data collection systems (ADCS) in transportation domain had provided public transport planners opportunities to amass a huge and continuously increasing amount of time-series data about the behaviors and travel patterns of commuters. However the explosive growth of temporal related databases has far outpaced the transport planners’ ability to interpret these data using conventional statistical techniques, creating an urgent need for new techniques to support the analyst in transforming the data into actionable information and knowledge. This research study thus explores and discusses the potential use of time-series data mining, a relatively new …


Online Feature Selection And Its Applications, Jialei Wang, Peilin Zhao, Steven C. H. Hoi, Rong Jin Mar 2014

Online Feature Selection And Its Applications, Jialei Wang, Peilin Zhao, Steven C. H. Hoi, Rong Jin

Research Collection School Of Computing and Information Systems

Feature selection is an important technique for data mining. Despite its importance, most studies of feature selection are restricted to batch learning. Unlike traditional batch learning methods, online learning represents a promising family of efficient and scalable machine learning algorithms for large-scale applications. Most existing studies of online learning require accessing all the attributes/features of training instances. Such a classical setting is not always appropriate for real-world applications when data instances are of high dimensionality or it is expensive to acquire the full set of attributes/features. To address this limitation, we investigate the problem of online feature selection (OFS) in …


Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu, Mei Tao, Jiebo Luo Mar 2014

Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu, Mei Tao, Jiebo Luo

Research Collection School Of Computing and Information Systems

Auto face annotation, which aims to detect human faces from a facial image and assign them proper human names, is a fundamental research problem and beneficial to many real-world applications. In this work, we address this problem by investigating a retrieval-based annotation scheme of mining massive web facial images that are freely available over the Internet. In particular, given a facial image, we first retrieve the top n similar instances from a large-scale web facial image database using content-based image retrieval techniques, and then use their labels for auto annotation. Such a scheme has two major challenges: 1) how to …


L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan Mar 2014

L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan

Research Collection School Of Computing and Information Systems

The wealth of information contained in online social networks has created a demand for the publication of such data as graphs. Yet, publication, even after identities have been removed, poses a privacy threat. Past research has suggested ways to publish graph data in a way that prevents the re-identification of nodes. However, even when identities are effectively hidden, an adversary may still be able to infer linkage between individuals with sufficiently high confidence. In this paper, we focus on the privacy threat arising from such link disclosure. We suggest L-opacity, a sufficiently strong privacy model that aims to control an …


Information-Theoretic Multi-View Domain Adaptation: A Theoretical And Empirical Study, Pei Yang, Wei Gao Mar 2014

Information-Theoretic Multi-View Domain Adaptation: A Theoretical And Empirical Study, Pei Yang, Wei Gao

Research Collection School Of Computing and Information Systems

Multi-view learning aims to improve classification performance by leveraging the consistency among different views of data. The incorporation of multiple views was paid little attention in the studies of domain adaptation, where the view consistency based on source data is largely violated in the target domain due to the distribution gap between different domain data. In this paper, we leverage multiple views for cross-domain document classification. The central idea is to strengthen the views' consistency on target data by identifying the associations of domain-specific features from different domains. We present an Information-theoretic Multi-view Adaptation Model (IMAM) using a multi-way clustering …


On Predicting User Affiliations Using Social Features In Online Social Networks, Minh Thap Nguyen Mar 2014

On Predicting User Affiliations Using Social Features In Online Social Networks, Minh Thap Nguyen

Dissertations and Theses Collection (Open Access)

User profiling such as user affiliation prediction in online social network is a challenging task, with many important applications in targeted marketing and personalized recommendation. The research task here is to predict some user affiliation attributes that suggest user participation in different social groups.


L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan Feb 2014

L-Opacity: Linkage-Aware Graph Anonymization, Sadegh Nobari, Panagiotis Karras, Hwee Hwa Pang, Stephane Bressan

Sadegh Nobari

The wealth of information contained in online social networks has created a demand for the publication of such data as graphs. Yet, publication, even after identities have been removed, poses a privacy threat. Past research has suggested ways to publish graph data in a way that prevents the re-identification of nodes. However, even when identities are effectively hidden, an adversary may still be able to infer linkage between individuals with sufficiently high confidence. In this paper, we focus on the privacy threat arising from such link disclosure. We suggest L-opacity, a sufficiently strong privacy model that aims to control an …