Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4531 - 4560 of 6727

Full-Text Articles in Physical Sciences and Mathematics

Systems And Methods For Transaction Account Offerings, Clinton Allen, Michael Digregorio, Glade Erikson, Deepinder Gulati, Jacob Plammoottil Jacob, Sanjiv Khosla, Seema Chokshi Jan 2012

Systems And Methods For Transaction Account Offerings, Clinton Allen, Michael Digregorio, Glade Erikson, Deepinder Gulati, Jacob Plammoottil Jacob, Sanjiv Khosla, Seema Chokshi

Research Collection School Of Computing and Information Systems

A method for receiving a user input for providing offerings is disclosed. Fields may be populated for creating a database query for matching a selection of offerings to a population of customers. Data may be received from the database, in response to interactively building the query and/or executing the query. Multiple rank ordered results may be produced for comparison, wherein the producing uses preprogrammed analytics, data from the database and user input, and wherein the results include customer lists linked to a distinct offering and a preferred delivery channel of the offering to a customer. A transaction account may be …


Information Extraction From Text, Jing Jiang Jan 2012

Information Extraction From Text, Jing Jiang

Research Collection School Of Computing and Information Systems

Information extraction is the task of finding structured information from unstructured or semi-structured text. It is an important task in text mining and has been extensively studied in various research communities including natural language processing, information retrieval and Web mining. It has a wide range of applications in domains such as biomedical literature mining and business intelligence. Two fundamental tasks of information extraction are named entity recognition and relation extraction. The former refers to finding names of entities such as people, organizations and locations. The latter refers to finding the semantic relations such as FounderOf and HeadquarteredIn between entities. In …


Mining Diversity On Social Media Networks, Lu Liu, Feida Zhu, Meng Jiang, Jiawei Han, Lifeng Sun, Shiqiang Yang Jan 2012

Mining Diversity On Social Media Networks, Lu Liu, Feida Zhu, Meng Jiang, Jiawei Han, Lifeng Sun, Shiqiang Yang

Research Collection School Of Computing and Information Systems

The fast development of multimedia technology and increasing availability of network bandwidth has given rise to an abundance of network data as a result of all the ever-booming social media and social websites in recent years, e.g., Flickr, Youtube, MySpace, Facebook, etc. Social network analysis has therefore become a critical problem attracting enthusiasm from both academia and industry. However, an important measure that captures a participant’s diversity in the network has been largely neglected in previous studies. Namely, diversity characterizes how diverse a given node connects with its peers. In this paper, we give a comprehensive study of this concept. …


Analysis And Synthesis Of Metadata Goals For Scientific Data, Craig Willis, Jane Greenberg, Hollie C. White Jan 2012

Analysis And Synthesis Of Metadata Goals For Scientific Data, Craig Willis, Jane Greenberg, Hollie C. White

Faculty Scholarship

The proliferation of discipline-specific metadata schemes contributes to artificial barriers that can impede interdisciplinary and transdisciplinary research. The authors considered this problem by examining the domains, objectives, and architectures of nine metadata schemes used to document scientific data in the physical, life, and social sciences. They used a mixed-methods content analysis and Greenberg’s (2005) metadata objectives, principles, domains, and architectural layout (MODAL) framework, and derived 22 metadata-related goals from textual content describing each metadata scheme. Relationships are identified between the domains (e.g., scientific discipline and type of data) and the categories of scheme objectives. For each strong correlation …


Crisis Response Information Networks, Shan L. Pan, Gary Pan, Dorothy Leidner Jan 2012

Crisis Response Information Networks, Shan L. Pan, Gary Pan, Dorothy Leidner

Research Collection School Of Accountancy

In the past two decades, organizational scholars have focused significant attention on how organizations manage crises. While most of these studies concentrate on crisis prevention, there is a growing emphasis on crisis response. Because information that is critical to crisis response may become outdated as crisis conditions change, crisis response research recognizes that the management of information flows and networks is critical to crisis response. Yet despite its importance, little is known about the various types of crisis information networks and the role of IT in enabling these information networks. Employing concepts from information flow and social network theories, this …


Economic Culture And Trading Behaviors In Information Markets, Khalid Nasser Alhayyan Jan 2012

Economic Culture And Trading Behaviors In Information Markets, Khalid Nasser Alhayyan

USF Tampa Graduate Theses and Dissertations

There are four main components for influencing traders' behaviors in an information market context: trader characteristics, organizational characteristics, market design, and external information. This dissertation focuses on investigating the impact of individual trader characteristics on trading behaviors. Two newly-developed constructs, highly relevant to information market contexts, were identified to increase our understanding about trading behaviors: trader's economic culture and trader independence. The theory of planned behavior is used as the theoretical basis to postulate hypotheses for empirical testing. Data collected from subjects through a series of web-based experiments shows that trader participation can be fostered through recruiting individuals who are …


Who Is Retweeting The Tweeters? Modeling, Originating, And Promoting Behaviors In The Twitter Network, Achananuparp Palakorn, Ee Peng Lim, Jing Jiang, Tuan Anh Hoang Jan 2012

Who Is Retweeting The Tweeters? Modeling, Originating, And Promoting Behaviors In The Twitter Network, Achananuparp Palakorn, Ee Peng Lim, Jing Jiang, Tuan Anh Hoang

Research Collection School Of Computing and Information Systems

Real-time microblogging systems such as Twitter offer users an easy and lightweight means to exchange information. Instead of writing formal and lengthy messages, microbloggers prefer to frequently broadcast several short messages to be read by other users. Only when messages are interesting, are they propagated further by the readers. In this article, we examine user behavior relevant to information propagation through microblogging. We specifically use retweeting activities among Twitter users to define and model originating and promoting behavior. We propose a basic model for measuring the two behaviors, a mutual dependency model, which considers the mutual relationships between the two …


An Improved K-Nearest-Neighbor Algorithm For Text Categorization, Shengyi Jiang, Guansong Pang, Meiling Wu, Limin Kuang Jan 2012

An Improved K-Nearest-Neighbor Algorithm For Text Categorization, Shengyi Jiang, Guansong Pang, Meiling Wu, Limin Kuang

Research Collection School Of Computing and Information Systems

Text categorization is a significant tool to manage and organize the surging text data. Many text categorization algorithms have been explored in previous literatures, such as KNN, Naive Bayes and Support Vector Machine. KNN text categorization is an effective but less efficient classification method. In this paper, we propose an improved KNN algorithm for text categorization, which builds the classification model by combining constrained one pass clustering algorithm and KNN text categorization. Empirical results on three benchmark corpora show that our algorithm can reduce the text similarity computation substantially and outperform the-state-of-the-art KNN, Naive Bayes and Support Vector Machine classifiers. …


Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson Jan 2012

Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

[First Slide]

What is WARCreate?

  • Google Chrome extension
  • Creates WARC files
  • Enables preservation by users from their browser
  • First steps in bringing Institutional Archiving facilities to the PC


Demographic Prediction Of Mobile User From Phone Usage, Shahram Mohrehkesh, Shuiwang Ji, Tamer Nadeem, Michele C. Weigle Jan 2012

Demographic Prediction Of Mobile User From Phone Usage, Shahram Mohrehkesh, Shuiwang Ji, Tamer Nadeem, Michele C. Weigle

Computer Science Faculty Publications

In this paper, we describe how we use the mobile phone usage of users to predict their demographic attributes. Using call log, visited GSM cells information, visited Bluetooth devices, visited Wireless LAN devices, accelerometer data, and so on, we predict the gender, age, marital status, job and number of people in household of users. The accuracy of developed classifiers for these classification problems ranges from 45-87% depending upon the particular classification problem.


Predictive Modeling For Navigating Social Media, Meiqun Hu Jan 2012

Predictive Modeling For Navigating Social Media, Meiqun Hu

Dissertations and Theses Collection (Open Access)

Social media changes the way people use the Web. It has transformed ordinary Web users from information consumers to content contributors. One popular form of content contribution is social tagging, in which users assign tags to Web resources. By the collective efforts of the social tagging community, a new information space has been created for information navigation. Navigation allows serendipitous discovery of information by examining the information objects linked to one another in the social tagging space. In this dissertation, we study prediction tasks that facilitate navigation in social tagging systems. For social tagging systems to meet complex navigation needs …


Tweets And Votes: A Study Of The 2011 Singapore General Election, Marko M. Skoric, Nathaniel D. Poor, Palakorn Achananuparp, Ee Peng Lim, Jing Jiang Jan 2012

Tweets And Votes: A Study Of The 2011 Singapore General Election, Marko M. Skoric, Nathaniel D. Poor, Palakorn Achananuparp, Ee Peng Lim, Jing Jiang

Research Collection School Of Computing and Information Systems

This study focuses on the uses of Twitter during the elections, examining whether the messages posted online are reflective of the climate of public opinion. Using Twitter data obtained during the official campaign period of the 2011 Singapore General Election, we test the predictive power of tweets in forecasting the election results. In line with some previous studies, we find that during the elections the Twitter sphere represents a rich source of data for gauging public opinion and that the frequency of tweets mentioning names of political parties, political candidates and contested constituencies could be used to make predictions about …


Automatic Document Classification In Small Environments, Jonathan David Mcelroy Jan 2012

Automatic Document Classification In Small Environments, Jonathan David Mcelroy

Master's Theses

Document classification is used to sort and label documents. This gives users quicker access to relevant data. Users that work with large inflow of documents spend time filing and categorizing them to allow for easier procurement. The Automatic Classification and Document Filing (ACDF) system proposed here is designed to allow users working with files or documents to rely on the system to classify and store them with little manual attention. By using a system built on Hidden Markov Models, the documents in a smaller desktop environment are categorized with better results than the traditional Naive Bayes implementation of classification.


A Data-Descriptive Feedback Framework For Data Stream Management Systems, Rafael J. Fernández Moctezuma Jan 2012

A Data-Descriptive Feedback Framework For Data Stream Management Systems, Rafael J. Fernández Moctezuma

Dissertations and Theses

Data Stream Management Systems (DSMSs) provide support for continuous query evaluation over data streams. Data streams provide processing challenges due to their unbounded nature and varying characteristics, such as rate and density fluctuations. DSMSs need to adapt stream processing to these changes within certain constraints, such as available computational resources and minimum latency requirements in producing results. The proposed research develops an inter-operator feedback framework, where opportunities for run-time adaptation of stream processing are expressed in terms of descriptions of substreams and actions applicable to the substreams, called feedback punctuations. Both the discovery of adaptation opportunities and the exploitation of …


Structural Analysis In Multi-Relational Social Networks, Bingtian Dai, Freddy Chua, Ee Peng Lim Jan 2012

Structural Analysis In Multi-Relational Social Networks, Bingtian Dai, Freddy Chua, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Modern social networks often consist of multiple relations among individuals. Understanding the structure of such multi-relational network is essential. In sociology, one way of structural analysis is to identify different positions and roles using blockmodels. In this paper, we generalize stochastic blockmodels to Generalized Stochastic Blockmodels (GSBM) for performing positional and role analysis on multi-relational networks. Our GSBM generalizes many different kinds of Multivariate Probability Distribution Function (MVPDF) to model different kinds of multirelational networks. In particular, we propose to use multivariate Poisson distribution for multi-relational social networks.


Evaluating The Use Of A Mobile Annotation System For Geography Education, Dion Hoe-Lian Goh, Khasfariyati Razikin, Chei Sian Lee, Ee Peng Lim, Kalyani Chatterjea, Chew-Hung Chang Jan 2012

Evaluating The Use Of A Mobile Annotation System For Geography Education, Dion Hoe-Lian Goh, Khasfariyati Razikin, Chei Sian Lee, Ee Peng Lim, Kalyani Chatterjea, Chew-Hung Chang

Research Collection School Of Computing and Information Systems

Mobile devices used in educational settings are usually employed within a collaborative learning activity in which learning takes place in the form of social interactions between team members while performing a shared task. The authors aim to introduce MobiTOP (Mobile Tagging of Objects and People), a mobile annotation system that allows users to contribute and share geospatial multimedia annotations via mobile devices. Field observations and interviews were conducted. A group of trainee teachers involved in a geography field study were instructed to identify rock formations by collaborating with each other using the MobiTOP system. The trainee teachers who were in …


Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador Dec 2011

Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador

Angela M Labrador

Archaeological database management systems serve the basic and important functions of ordering, archiving, and disseminating archaeological data. The increased availability of computers and data storage over the past two decades has enabled the exponential growth of archaeological databases and data models. Despite their importance and ubiquity, archaeological database systems are rarely the subject of theoretical analysis within the discipline due to their ‘‘black box’’ nature and the perceived objectivity of computerized systems. Inspired by H. Martin Wobst’s meditations on materiality and disciplinary ethics, in this paper I explore how archaeological database systems structure archaeological interpretation and disciplinary practice. In turn, …


Support System For Novice Researchers (Ssnr): Usability Evaluation Of The First Use, Maizatul Akmar Ismail Dec 2011

Support System For Novice Researchers (Ssnr): Usability Evaluation Of The First Use, Maizatul Akmar Ismail

Maizatul Akmar Ismail

Scholars make use of research output in the form of conference proceedings, journal and theses as references as guideline in generating new knowledge for the use of future generations. Support in the early stage of study is crucial for novice researchers as it will give them some insights of where to seek for extra information on relevant literature, institutions, people and research trend without having to go through tedious process of identifying this information all by themselves. The result of the implementation of SSNR shows significant information that can be utilized by novice researchers in accelerating research process. Thus, this …


Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello Dec 2011

Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello

Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN,

Information can be briefly defined as processed data. Information is crucial to the success of any organization because it must be exchanged in one form or the other before activities can be carried out. However, too much information can be overwhelming and lead to poor decision-making. Further, as organizations face an ever-growing wave of digital data, they need to analyze that data and make timely decisions to achieve effective management .Formerly, information was viewed simply as a means of expression, they now serve as the foundation for an organization’s effectiveness and efficiency. Additionally, increased pressures to manage information appropriately, communicate …


A Grid Enabled E-Theses And Dissertations Repository System, Maizatul Akmar Ismail Dec 2011

A Grid Enabled E-Theses And Dissertations Repository System, Maizatul Akmar Ismail

Maizatul Akmar Ismail

Some of the universities in Malaysia are still implementing hybrid Electronic Theses and Dissertations (ETD) approach in managing Theses and Dissertations (TD). One of the limitations of the hybrid ETD approach is its online cataloguing method, which is only available at the physical location of the TD instead of enabling the information to be retrieved online. Maintaining the performance and the data accessing rate of an ETD system has become challenging, due in part to the high number of scholars who utilise and access the system. In order to allow remote access and maintain the services such as scalability, accessibility, …


Networks - I: Pre-Coordination Mechanism For Self Configuration Of Neighborhood Cells In Mobile Wi-Max, Abdul Qadeer, Khalid Khan Dec 2011

Networks - I: Pre-Coordination Mechanism For Self Configuration Of Neighborhood Cells In Mobile Wi-Max, Abdul Qadeer, Khalid Khan

International Conference on Information and Communication Technologies

WiMax broadband services successfully providing triple play (Voice, Video and Data) support with combating the challenges of better quality and interoperability. Support for smooth mobility in real time with no wired infrastructure and being surrounded by GSM waves demanding a comprehensive and powerful network. Covering large areas through number of base stations which not only require time to configure but also need resources for implementation with a recurring cost of functionality. Automation is everywhere and to provide novel wireless services it is necessary to come up with some distinct features like intelligent base stations which have the capability of doing …


Its Training Update, Veronica Trammell Dec 2011

Its Training Update, Veronica Trammell

Veronica O. Trammell

No abstract provided.


Finding Relevant Answers In Software Forums, Swapna Gottopati, David Lo, Jing Jiang Dec 2011

Finding Relevant Answers In Software Forums, Swapna Gottopati, David Lo, Jing Jiang

David LO

Online software forums provide a huge amount of valuable content. Developers and users often ask questions and receive answers from such forums. The availability of a vast amount of thread discussions in forums provides ample opportunities for knowledge acquisition and summarization. For a given search query, current search engines use traditional information retrieval approach to extract webpages containing relevant keywords. However, in software forums, often there are many threads containing similar keywords where each thread could contain a lot of posts as many as 1,000 or more. Manually finding relevant answers from these long threads is a painstaking task to …


Mining Top-K Large Structural Patterns In A Massive Network, Feida Zhu, Qiang Qu, David Lo, Xifeng Yan, Jiawei Han, Philip S. Yu Dec 2011

Mining Top-K Large Structural Patterns In A Massive Network, Feida Zhu, Qiang Qu, David Lo, Xifeng Yan, Jiawei Han, Philip S. Yu

David LO

With ever-growing popularity of social networks, web and bio-networks, mining large frequent patterns from a single huge network has become increasingly important. Yet the existing pattern mining methods cannot offer the efficiency desirable for large pattern discovery. We propose Spider- Mine, a novel algorithm to efficiently mine top-K largest frequent patterns from a single massive network with any user-specified probability of 1 − ϵ. Deviating from the existing edge-by-edge (i.e., incremental) pattern-growth framework, SpiderMine achieves its efficiency by unleashing the power of small patterns of a bounded diameter, which we call “spiders”. With the spider structure, our approach adopts a …


Towards Succinctness In Mining Scenario-Based Specifications, David Lo, Shahar Maoz Dec 2011

Towards Succinctness In Mining Scenario-Based Specifications, David Lo, Shahar Maoz

David LO

Specification mining methods are used to extract candidate specifications from system execution traces. A major challenge for specification mining is succinctness. That is, in addition to the soundness, completeness, and scalable performance of the specification mining method, one is interested in producing a succinct result, which conveys a lot of information about the system under investigation but uses a short, machine and human-readable representation. In this paper we address the succinctness challenge in the context of scenario-based specification mining, whose target formalism is live sequence charts (LSC), an expressive extension of classical sequence diagrams. We do this by adapting three …


Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang Dec 2011

Automated Detection Of Likely Design Flaws In Layered Architectures, Aditya Budi, - Lucia, David Lo, Lingxiao Jiang, Shaowei Wang

David LO

Layered architecture prescribes a good principle for separating concerns to make systems more maintainable. One example of such layered architectures is the separation of classes into three groups: Boundary, Control, and Entity, which are referred to as the three analysis class stereotypes in UML. Classes of different stereotypes are interacting with one another, when properly designed, the overall interaction would be maintainable, flexible, and robust. On the other hand, poor design would result in less maintainable system that is prone to errors. In many software projects, the stereotypes of classes are often missing, thus detection of design flaws becomes non-trivial. …


Effective Security By Obscurity, John Christian Smith Dec 2011

Effective Security By Obscurity, John Christian Smith

John Christian Smith

"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …


User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun Dec 2011

User Choice Between Traditional And Computerized Methods: An Activity Perspective, Jun Sun

Information Systems Faculty Publications and Presentations

Numerous computerized methods emerge to replace traditional methods in people’s personal, work and social lives, but many are hesitant to make the transition. This study examines the factors that influence human choice between different methods. According to Activity Theory, traditional and computerized methods are both tools that a person uses for a certain task. The situated experiences with various methods shape people’s attitude toward using them later in terms of tool readiness. The understanding leads to hypothesized relationships between user-, method- and task-specific factors and the dependent variable. The results from an empirical study support that method experiences have strong …


A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo Dec 2011

A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo

Department of Computer Electronics and Engineering: Dissertations, Theses, and Student Research

When using the Gene Ontology (GO), nucleotide and amino acid sequences are annotated by terms in a structured and controlled vocabulary organized into relational graphs. The usage of the vocabulary (GO terms) in the annotation of these sequences may diverge from the relations defined in the ontology. We measure the consistency of the use of GO terms by comparing GO's defined structure to the terms' application. To do this, we first use synthetic data with different characteristics to understand how these characteristics influence the correlation values determined by various similarity measures. Using these results as a baseline, we found that …


The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra Dec 2011

The Mechanics Of Implementing Rss - Really Simple Syndication, Umakant Mishra

Umakant Mishra

RSS is a format to update the frequently updated content in the Internet such as blog entries, news headlines etc. An RSS document contains full or summarized texts plus metadata such as publishing dates and authorship. RSS stands for Really simple Syndication. RSS feeds benefits publishers by letting them syndicate content automatically. A standardized XML file format is used to publish once and viewed by many different programs.