Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1981 - 2010 of 7454

Full-Text Articles in Physical Sciences and Mathematics

Facial Emotion Recognition With Noisy Multi-Task Annotations, S. Zhang, Zhiwu Huang, D.P. Paudel, Gool L. Van Jan 2021

Facial Emotion Recognition With Noisy Multi-Task Annotations, S. Zhang, Zhiwu Huang, D.P. Paudel, Gool L. Van

Research Collection School Of Computing and Information Systems

Human emotions can be inferred from facial expressions. However, the annotations of facial expressions are often highly noisy in common emotion coding models, including categorical and dimensional ones. To reduce human labelling effort on multi-task labels, we introduce a new problem of facial emotion recognition with noisy multitask annotations. For this new problem, we suggest a formulation from the point of joint distribution match view, which aims at learning more reliable correlations among raw facial images and multi-task labels, resulting in the reduction of noise influence. In our formulation, we exploit a new method to enable the emotion prediction and …


Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin Jan 2021

Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin

Research Collection School Of Computing and Information Systems

Purpose: This paper aims to examine the risks associated with smart contracts, a disruptive financial technology (FinTech) innovation, and assesses how in the future they could threaten the integrity of the global financial system. Design/methodology/approach: A qualitative approach is used to identify risk factors related to the use of new financial innovations, by examining how over-the-counter (OTC) derivatives contributed to the Global Financial Crisis (GFC) which occurred during 2007 and 2008. Based on this analysis, the potential for similar concerns with smart contracts are evaluated, drawing on the failure of The DAO on the Ethereum blockchain, which involved the loss …


Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He Jan 2021

Coherence And Identity Learning For Arbitrary-Length Face Video Generation, Shuquan Ye, Chu Han, Jiaying Lin, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Face synthesis is an interesting yet challenging task in computer vision. It is even much harder to generate a portrait video than a single image. In this paper, we propose a novel video generation framework for synthesizing arbitrary-length face videos without any face exemplar or landmark. To overcome the synthesis ambiguity of face video, we propose a divide-and-conquer strategy to separately address the video face synthesis problem from two aspects, face identity synthesis and rearrangement. To this end, we design a cascaded network which contains three components, Identity-aware GAN (IA-GAN), Face Coherence Network, and Interpolation Network. IA-GAN is proposed to …


Software Engineering In Australasia, Sherlock A. Licorish, Christoph Treude, John Grundy, Kelly Blincoe, Stephen Macdonell, Chakkrit Tantithamthavorn, Li Li, Jean-Guy Schneider Jan 2021

Software Engineering In Australasia, Sherlock A. Licorish, Christoph Treude, John Grundy, Kelly Blincoe, Stephen Macdonell, Chakkrit Tantithamthavorn, Li Li, Jean-Guy Schneider

Research Collection School Of Computing and Information Systems

Six months ago an important call was made for researchers globally to provide insights into the way Software Engineering is done in their region. Heeding this call, we hereby outline the position Software Engineering in Australasia (New Zealand and Australia). This article first considers the software development methods, practices and tools that are popular in the Australasian software engineering community. We then briefly review the particular strengths of software engineering researchers in Australasia. Finally, we make an open call for collaborators by reflecting on our current position and identifying future opportunities.


Infinite-Duration All-Pay Bidding Games, Guy Avni, Ismäel Jecker, Dorde Zikelic Jan 2021

Infinite-Duration All-Pay Bidding Games, Guy Avni, Ismäel Jecker, Dorde Zikelic

Research Collection School Of Computing and Information Systems

In a two-player zero-sum graph game the players move a token throughout a graph to produce an infinite path, which determines the winner or payoff of the game. Traditionally, the players alternate turns in moving the token. In bidding games, however, the players have budgets, and in each turn, we hold an "auction" (bidding) to determine which player moves the token: both players simultaneously submit bids and the higher bidder moves the token. The bidding mechanisms differ in their payment schemes. Bidding games were largely studied with variants of first-price bidding in which only the higher bidder pays his bid. …


Unsupervised Representation Learning By Predicting Random Distances, Hu Wang, Guansong Pang, Chunhua Shen, Congbo Ma Jan 2021

Unsupervised Representation Learning By Predicting Random Distances, Hu Wang, Guansong Pang, Chunhua Shen, Congbo Ma

Research Collection School Of Computing and Information Systems

Deep neural networks have gained great success in a broad range of tasks due to its remarkable capability to learn semantically rich features from high-dimensional data. However, they often require large-scale labelled data to successfully learn such features, which significantly hinders their adaption in unsupervised learning tasks, such as anomaly detection and clustering, and limits their applications to critical domains where obtaining massive labelled data is prohibitively expensive. To enable unsupervised learning on those domains, in this work we propose to learn features without using any labelled data by training neural networks to predict data distances in a randomly projected …


Learning Adl Daily Routines With Spatiotemporal Neural Networks, Shan Gao, Ah-Hwee Tan, Rossi Setchi Jan 2021

Learning Adl Daily Routines With Spatiotemporal Neural Networks, Shan Gao, Ah-Hwee Tan, Rossi Setchi

Research Collection School Of Computing and Information Systems

The activities of daily living (ADLs) refer to the activities performed by individuals on a daily basis and are the indicators of a person’s habits, lifestyle, and wellbeing. Learning an individual’s ADL daily routines has significant value in the healthcare domain. Specifically, ADL recognition and inter-ADL pattern learning problems have been studied extensively in the past couple of decades. However, discovering the patterns performed in a day and clustering them into ADL daily routines has been a relatively unexplored research area. In this paper, a self-organizing neural network model, called the Spatiotemporal ADL Adaptive Resonance Theory (STADLART), is proposed for …


Rapid Transition Of A Technical Course From Face-To-Face To Online, Swapna Gottipatti, Venky Shankaraman Jan 2021

Rapid Transition Of A Technical Course From Face-To-Face To Online, Swapna Gottipatti, Venky Shankaraman

Research Collection School Of Computing and Information Systems

Just like most universities around the world, the senior management at Singapore Management University decided to move all courses to a virtual, online, synchronous mode, giving instructors a very short notice period—one week—to make this transition. In this paper, we describe the challenges, practical solutions adopted, and the lessons learnt in rapidly transitioning a face-to-face Master’s degree course in Text Analytics and Applications into a virtual, online, course format that could deliver a quality learning experience.


Privattnet: Predicting Privacy Risks In Images Using Visual Attention, Zhang Chen, Thivya Kandappu, Vigneshwaran Subbaraju Jan 2021

Privattnet: Predicting Privacy Risks In Images Using Visual Attention, Zhang Chen, Thivya Kandappu, Vigneshwaran Subbaraju

Research Collection School Of Computing and Information Systems

Visual privacy concerns associated with image sharing is a critical issue that need to be addressed to enable safe and lawful use of online social platforms. Users of social media platforms often suffer from no guidance in sharing sensitive images in public, and often face with social and legal consequences. Given the recent success of visual attention based deep learning methods in measuring abstract phenomena like image memorability, we are motivated to investigate whether visual attention based methods could be useful in measuring psychophysical phenomena like “privacy sensitivity”. In this paper we propose PrivAttNet – a visual attention based approach, …


Partial Adversarial Behavior Deception In Security Games, Thanh H. Nguyen, Arunesh Sinha, He He Jan 2021

Partial Adversarial Behavior Deception In Security Games, Thanh H. Nguyen, Arunesh Sinha, He He

Research Collection School Of Computing and Information Systems

Learning attacker behavior is an important research topic in security games as security agencies are often uncertain about attackers’ decision making. Previous work has focused on developing various behavioral models of attackers based on historical attack data. However, a clever attacker can manipulate its attacks to fail such attack-driven learning, leading to ineffective defense strategies. We study attacker behavior deception with three main contributions. First, we propose a new model, named partial behavior deception model, in which there is a deceptive attacker (among multiple attackers) who controls a portion of attacks. Our model captures real-world security scenarios such as wildlife …


Attribute-Aware Pedestrian Detection In A Crowd, Jialiang Zhang, Lixiang Lin, Jianke Zhu, Yang Li, Yun-Chen Chen, Yao Hu, Steven C. H. Hoi Jan 2021

Attribute-Aware Pedestrian Detection In A Crowd, Jialiang Zhang, Lixiang Lin, Jianke Zhu, Yang Li, Yun-Chen Chen, Yao Hu, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Pedestrian detection is an initial step to perform outdoor scene analysis, which plays an essential role in many real-world applications. Although having enjoyed the merits of deep learning frameworks from the generic object detectors, pedestrian detection is still a very challenging task due to heavy occlusions, and highly crowded group. Generally, the conventional detectors are unable to differentiate individuals from each other effectively under such a dense environment. To tackle this critical problem, we propose an attribute-aware pedestrian detector to explicitly model people's semantic attributes in a high-level feature detection fashion. Besides the typical semantic features, center position, target's scale, …


Discovering Hidden Topical Hubs And Authorities Across Multiple Online Social Networks, Ka Wei, Roy Lee, Tuan-Anh Hoang, Ee-Peng Lim Jan 2021

Discovering Hidden Topical Hubs And Authorities Across Multiple Online Social Networks, Ka Wei, Roy Lee, Tuan-Anh Hoang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Finding influential users in online social networks (OSNs) is an important problem with many possible useful applications. Many methods have been proposed to identify influential users in OSNs. PageRank and HITs are two well known examples that determine influential users through link analysis. In recent years, new models that consider both content and social network links have been developed. The Hub and Authority Topic (HAT) model is one that extends HITS to identify topic-specific hubs and authorities by jointly learning hubs, authorities, and topical interests from users’ relationship and textual content. However, many of the previous works are confined to …


Zone Path Construction (Zac) Based Approaches For Effective Real-Time Ridesharing, Meghna Lowalekar, Pradeep Varakantham, Patrick Jaillet Jan 2021

Zone Path Construction (Zac) Based Approaches For Effective Real-Time Ridesharing, Meghna Lowalekar, Pradeep Varakantham, Patrick Jaillet

Research Collection School Of Computing and Information Systems

Real-time ridesharing systems such as UberPool, Lyft Line and GrabShare have become hugely popular as they reduce the costs for customers, improve per trip revenue for drivers and reduce traffic on the roads by grouping customers with similar itineraries. The key challenge in these systems is to group the “right” requests to travel together in the “right” available vehicles in real-time, so that the objective (e.g., requests served, revenue or delay) is optimized. This challenge has been addressed in existing work by: (i) generating as many relevant feasible combinations of requests (with respect to the available delay for customers) as …


Creators And Backers In Rewards-Based Crowdfunding: Will Incentive Misalignment Affect Kickstarter's Sustainability?, Michael Wessel, Rob Gleasure, Robert John Kauffman Jan 2021

Creators And Backers In Rewards-Based Crowdfunding: Will Incentive Misalignment Affect Kickstarter's Sustainability?, Michael Wessel, Rob Gleasure, Robert John Kauffman

Research Collection School Of Computing and Information Systems

Incentive misalignment in rewards-based crowd-funding occurs because creators may benefit disproportionately from fundraising, while backers may benefit disproportionately from the quality of project deliverables. The resulting principal-agent relationship means backers rely on campaign information to identify signs of moral hazard, adverse selection, and risk attitude asymmetry. We analyze campaign information related to fundraising, and compare how different information affects eventual backer satisfaction, based on an extensive dataset from Kickstarter. The data analysis uses a multi-model comparison to reveal similarities and contrasts in the estimated drivers of dependent variables that capture different outcomes in Kickstarter’s funding campaigns, using a linear probability …


A Continual Deepfake Detection Benchmark: Dataset, Methods, And Essentials, Chuqiao Li, Zhiwu Huang, Danda Pani Paudel, Yabin Wang, Mohamad Shahbazi, Xiaopeng Hong, Van Gool Luc Jan 2021

A Continual Deepfake Detection Benchmark: Dataset, Methods, And Essentials, Chuqiao Li, Zhiwu Huang, Danda Pani Paudel, Yabin Wang, Mohamad Shahbazi, Xiaopeng Hong, Van Gool Luc

Research Collection School Of Computing and Information Systems

There have been emerging a number of benchmarks and techniques for the detection of deepfakes. However, very few works study the detection of incrementally appearing deepfakes in the real-world scenarios. To simulate the wild scenes, this paper suggests a continual deepfake detection benchmark (CDDB) over a new collection of deepfakes from both known and unknown generative models. The suggested CDDB designs multiple evaluations on the detection over easy, hard, and long sequence of deepfake tasks, with a set of appropriate measures. In addition, we exploit multiple approaches to adapt multiclass incremental learning methods, commonly used in the continual visual recognition, …


3d Dental Biometrics: Automatic Pose-Invariant Dental Arch Extraction And Matching, Xin Zhong, Zhiyuan Zhang Jan 2021

3d Dental Biometrics: Automatic Pose-Invariant Dental Arch Extraction And Matching, Xin Zhong, Zhiyuan Zhang

Research Collection School Of Computing and Information Systems

A novel automatic pose-invariant dental arch extraction and matching framework is developed for 3D dental identification using laser-scanned dental plasters. In our previous attempt [1-5], 3D point-based algorithms have been developed and they have shown a few advantages over existing 2D dental identifications. This study is a continuous effort in developing arch-based algorithms to extract and match dental arch feature in an automatic and pose-invariant way. As best as we know, this is the first attempt at automatic dental arch extraction and matching for 3D dental identification. A Radial Ray Algorithm (RRA) is proposed by projecting dental arch shape from …


Why My Code Summarization Model Does Not Work: Code Comment Improvement With Category Prediction, Qiuyuan Chen, Xin Xia, Han Hu, David Lo, Shanping Li Jan 2021

Why My Code Summarization Model Does Not Work: Code Comment Improvement With Category Prediction, Qiuyuan Chen, Xin Xia, Han Hu, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

Code summarization aims at generating a code comment given a block of source code and it is normally performed by training machine learning algorithms on existing code block-comment pairs. Code comments in practice have different intentions. For example, some code comments might explain how the methods work, while others explain why some methods are written. Previous works have shown that a relationship exists between a code block and the category of a comment associated with it. In this article, we aim to investigate to which extent we can exploit this relationship to improve code summarization performance. We first classify comments …


What Makes A Popular Academic Ai Repository?, Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan, Shanping Li Jan 2021

What Makes A Popular Academic Ai Repository?, Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan, Shanping Li

Research Collection School Of Computing and Information Systems

Many AI researchers are publishing code, data and other resources that accompany their papers in GitHub repositories. In this paper, we refer to these repositories as academic AI repositories. Our preliminary study shows that highly cited papers are more likely to have popular academic AI repositories (and vice versa). Hence, in this study, we perform an empirical study on academic AI repositories to highlight good software engineering practices of popular academic AI repositories for AI researchers. We collect 1,149 academic AI repositories, in which we label the top 20% repositories that have the most number of stars as popular, and …


Technical Q8a Site Answer Recommendation Via Question Boosting, Zhipeng Gao, Xin Xia, David Lo, John Grundy Jan 2021

Technical Q8a Site Answer Recommendation Via Question Boosting, Zhipeng Gao, Xin Xia, David Lo, John Grundy

Research Collection School Of Computing and Information Systems

Software developers have heavily used online question and answer platforms to seek help to solve their technical problems. However, a major problem with these technical Q&A sites is "answer hungriness" i.e., a large number of questions remain unanswered or unresolved, and users have to wait for a long time or painstakingly go through the provided answers with various levels of quality. To alleviate this time-consuming problem, we propose a novel DeepAns neural network-based approach to identify the most relevant answer among a set of answer candidates. Our approach follows a three-stage process: question boosting, label establishment, and answer recommendation. Given …


Do Blockchain And Iot Architecture Create Informedness To Support Provenance Tracking In The Product Lifecycle?, Somnath Mazumdar, Thomas Jensen, Raghava Rao Mukkamala, Robert John Kauffman, Jan Damsgaard Jan 2021

Do Blockchain And Iot Architecture Create Informedness To Support Provenance Tracking In The Product Lifecycle?, Somnath Mazumdar, Thomas Jensen, Raghava Rao Mukkamala, Robert John Kauffman, Jan Damsgaard

Research Collection School Of Computing and Information Systems

Consumers often lack information about the origin and provenance of the products they buy. They may ask: Is a food product truly organic? Or, what is the origin of the gemstone in the ring I purchased? They also may have sustainability concerns about the footprint of a product at the end of its life. Producers and sellers, meanwhile, wish to know how longitudinal tracking of the provenance of products and their components can boost their sales prices and after-market value, and re- veal new business opportunities. We focus on how the product lifecycle (PLC) can be leveraged to track information …


A Data-Driven Method For Online Monitoring Tube Wall Thinning Process In Dynamic Noisy Environment, Chen Zhang, Jun Long Lim, Ouyang Liu, Aayush Madan, Yongwei Zhu, Shili Xiang, Kai Wu, Rebecca Yen-Ni Wong, Jiliang Eugene Phua, Karan M. Sabnani, Keng Boon Siah, Wenyu Jiang, Yixin Wang, Emily Jianzhong Hao, Hoi, Steven C. H. Jan 2021

A Data-Driven Method For Online Monitoring Tube Wall Thinning Process In Dynamic Noisy Environment, Chen Zhang, Jun Long Lim, Ouyang Liu, Aayush Madan, Yongwei Zhu, Shili Xiang, Kai Wu, Rebecca Yen-Ni Wong, Jiliang Eugene Phua, Karan M. Sabnani, Keng Boon Siah, Wenyu Jiang, Yixin Wang, Emily Jianzhong Hao, Hoi, Steven C. H.

Research Collection School Of Computing and Information Systems

Tube internal erosion, which corresponds to its wall thinning process, is one of the major safety concerns for tubes. Many sensing technologies have been developed to detect a tube wall thinning process. Among them, fiber Bragg grating (FBG) sensors are the most popular ones due to their precise measurement properties. Most of the current works focus on how to design different types of FBG sensors according to certain physical laws and only test their sensors in controlled laboratory conditions. However, in practice, an industrial system usually suffers from harsh and dynamic environmental conditions, and FBG signals are affected by many …


Can We Trust Your Explanations? Sanity Checks For Interpreters In Android Malware Analysis, Min Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu Jan 2021

Can We Trust Your Explanations? Sanity Checks For Interpreters In Android Malware Analysis, Min Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu

Research Collection School Of Computing and Information Systems

With the rapid growth of Android malware, many machine learning-based malware analysis approaches are proposed to mitigate the severe phenomenon. However, such classifiers are opaque, non-intuitive, and difficult for analysts to understand the inner decision reason. For this reason, a variety of explanation approaches are proposed to interpret predictions by providing important features. Unfortunately, the explanation results obtained in the malware analysis domain cannot achieve a consensus in general, which makes the analysts confused about whether they can trust such results. In this work, we propose principled guidelines to assess the quality of five explanation approaches by designing three critical …


Analyzing Tweets On New Norm: Work From Home During Covid-19 Outbreak, Swapna Gottipati, Kyong Jin Shim, Hui Hian Teo, Karthik Nityanand, Shreyansh Shivam Jan 2021

Analyzing Tweets On New Norm: Work From Home During Covid-19 Outbreak, Swapna Gottipati, Kyong Jin Shim, Hui Hian Teo, Karthik Nityanand, Shreyansh Shivam

Research Collection School Of Computing and Information Systems

The COVID-19 pandemic triggered a large-scale work-from-home trend globally in recent months. In this paper, we study the phenomenon of “work-from-home” (WFH) by performing social listening. We propose an analytics pipeline designed to crawl social media data and perform text mining analyzes on textual data from tweets scrapped based on hashtags related to WFH in COVID-19 situation. We apply text mining and NLP techniques to analyze the tweets for extracting the WFH themes and sentiments (positive and negative). Our Twitter theme analysis adds further value by summarizing the common key topics, allowing employers to gain more insights on areas of …


Chronic Customers Or Increased Awareness? The Dynamics Of Social Media Customer Service, Shujing Sun, Yang Gao, Huaxia Rui Jan 2021

Chronic Customers Or Increased Awareness? The Dynamics Of Social Media Customer Service, Shujing Sun, Yang Gao, Huaxia Rui

Research Collection School Of Computing and Information Systems

Despite that social media has become a promising alternative to traditional call centers, managers hesitate to fully harness its power because they worry that active service intervention may encourage excessive use of the channel by disgruntled customers. This paper sheds light on such a concern by examining the dynamics between brand-level customer complaints and service interventions on social media. Using details of customer-brand interactions of 40 airlines on Twitter, we find that more service interventions indeed cause more customer complaints, accounting for the online customer population and service quality. However, the increased complaints are primarily driven by the awareness enhancement …


Proxy-Free Privacy-Preserving Task Matching With Efficient Revocation In Crowdsourcing, Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, Robert H. Deng Jan 2021

Proxy-Free Privacy-Preserving Task Matching With Efficient Revocation In Crowdsourcing, Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Task matching in crowdsourcing has been extensively explored with the increasing popularity of crowdsourcing. However, privacy of tasks and workers is usually ignored in most of exiting solutions. In this paper, we study the problem of privacy-preserving task matching for crowdsourcing with multiple requesters and multiple workers. Instead of utilizing proxy re-encryption, we propose a proxy-free task matching scheme for multi-requester/multi-worker crowdsourcing, which achieves task-worker matching over encrypted data with scalability and non-interaction. We further design two different mechanisms for worker revocation including ServerLocal Revocation (SLR) and Global Revocation (GR), which realize efficient worker revocation with minimal overhead on the …


Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma Dec 2020

Vision-Based Analytics For Improved Ai-Driven Iot Applications, Amit Sharma

Dissertations and Theses Collection (Open Access)

Proliferation of Internet of Things (IoT) sensor systems, primarily driven by cheaper embedded hardware platforms and wide availability of light-weight software platforms, has opened up doors for large-scale data collection opportunities. The availability of massive amount of data has in-turn given way to rapidly growing machine learning models e.g. You Only Look Once (YOLO), Single-Shot-Detectors (SSD) and so on. There has been a growing trend of applying machine learning techniques, e.g., object detection, image classification, face detection etc., on data collected from camera sensors and therefore enabling plethora of vision-sensing applications namely self-driving cars, automatic crowd monitoring, traffic-flow analysis, occupancy …


Generating Concept Based Api Element Comparison Using A Knowledge Graph, Yang Liu, Mingwei Liu, Xin Peng, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang Dec 2020

Generating Concept Based Api Element Comparison Using A Knowledge Graph, Yang Liu, Mingwei Liu, Xin Peng, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang

Research Collection School Of Computing and Information Systems

Recommender systems are a valuable tool for software engineers. For example, they can provide developers with a ranked list of files likely to contain a bug, or multiple auto-complete suggestions for a given method stub. However, the way these recommender systems interact with developers is often rudimentary—a long list of recommendations only ranked by the model’s confidence. In this vision paper, we lay out our research agenda for re-imagining how recommender systems for software engineering communicate their insights to developers. When issuing recommendations, our aim is to recommend diverse rather than redundant solutions and present them in ways that highlight …


Design Of A Two-Echelon Freight Distribution System In An Urban Area Considering Third-Party Logistics And Loading-Unloading Zones, Vincent F. Yu, Winarno, Shih-Wei Lin, Aldy Gunawan Dec 2020

Design Of A Two-Echelon Freight Distribution System In An Urban Area Considering Third-Party Logistics And Loading-Unloading Zones, Vincent F. Yu, Winarno, Shih-Wei Lin, Aldy Gunawan

Research Collection School Of Computing and Information Systems

This research examines the problem of designing a two-echelon freight distribution system in a dense urban area that considers third-party logistics (TPL) and loading–unloading zones (LUZs). The proposed system takes advantage of outsourcing the last mile deliveries to a TPL provider and utilizing LUZs as temporary intermediate facilities instead of using permanent intermediate facilities to consolidate freight. A mathematical model and a simulated annealing (SA) algorithm are developed to solve the problem. The efficiency and effectiveness of the proposed SA heuristic are verified by testing it on existing benchmark instances. Computational results show that the performance of the proposed SA …


Causal Intervention For Weakly-Supervised Semantic Segmentation, Zhang Dong, Hanwang Zhang, Jinhui Tang, Xian-Sheng Hua, Qianru Sun Dec 2020

Causal Intervention For Weakly-Supervised Semantic Segmentation, Zhang Dong, Hanwang Zhang, Jinhui Tang, Xian-Sheng Hua, Qianru Sun

Research Collection School Of Computing and Information Systems

We present a causal inference framework to improve Weakly-Supervised Semantic Segmentation (WSSS). Specifically, we aim to generate better pixel-level pseudo-masks by using only image-level labels --- the most crucial step in WSSS. We attribute the cause of the ambiguous boundaries of pseudo-masks to the confounding context, e.g., the correct image-level classification of "horse'' and "person'' may be not only due to the recognition of each instance, but also their co-occurrence context, making the model inspection (e.g., CAM) hard to distinguish between the boundaries. Inspired by this, we propose a structural causal model to analyze the causalities among images, contexts, and …


A Bert-Based Dual Embedding Model For Chinese Idiom Prediction, Minghuan Tan, Jing Jiang Dec 2020

A Bert-Based Dual Embedding Model For Chinese Idiom Prediction, Minghuan Tan, Jing Jiang

Research Collection School Of Computing and Information Systems

Chinese idioms are special fixed phrases usually derived from ancient stories, whose meanings are oftentimes highly idiomatic and non-compositional. The Chinese idiom prediction task is to select the correct idiom from a set of candidate idioms given a context with a blank. We propose a BERT-based dual embedding model to encode the contextual words as well as to learn dual embeddings of the idioms. Specifically, we first match the embedding of each candidate idiom with the hidden representation corresponding to the blank in the context. We then match the embedding of each candidate idiom with the hidden representations of all …