Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2071 - 2100 of 7454

Full-Text Articles in Physical Sciences and Mathematics

An Empirical Study Of Release Note Production And Usage In Practice, Tingting Bi, Xin Xia, David Lo, John Grundy, Thomas Zimmermann Nov 2020

An Empirical Study Of Release Note Production And Usage In Practice, Tingting Bi, Xin Xia, David Lo, John Grundy, Thomas Zimmermann

Research Collection School Of Computing and Information Systems

The release note is one of the most important software artifacts that serves as a bridge for communication among stakeholders. Release notes contain a set of crucial information, such as descriptions of enhancements, improvements, potential issues, development, evolution, testing, and maintenance of projects throughout the whole development lifestyle. A comprehensive understanding of what makes a good release note and how to write one for different stakeholders would be highly beneficial. However, in practice, the release note is often neglected by stakeholders and has not to date been systematically investigated by researchers. In this paper, we conduct a mixed methods study …


Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua Nov 2020

Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua

Research Collection School Of Computing and Information Systems

Education is very important to Singapore, and the government has continued to invest heavily in our education system to become one of the world-class systems today. A strong foundation of Science, Technology, Engineering, and Mathematics (STEM) was what underpinned Singapore's development over the past 50 years. PISA is a triennial international survey that evaluates education systems worldwide by testing the skills and knowledge of 15-year-old students who are nearing the end of compulsory education. In this paper, the authors used the PISA data from 2012 and 2015 and developed machine learning techniques to predictive the students' scores and understand the …


A Secure Flexible And Tampering-Resistant Data Sharing System For Vehicular Social Networks, Jianfei Sun, Hu Xiong, Shufan Zhang, Ximeng Liu, Jiaming Yuan, Robert H. Deng Nov 2020

A Secure Flexible And Tampering-Resistant Data Sharing System For Vehicular Social Networks, Jianfei Sun, Hu Xiong, Shufan Zhang, Ximeng Liu, Jiaming Yuan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Vehicular social networks (VSNs) have emerged as the promising paradigm of vehicular networks that can improve traffic safety, relieve traffic congestion and even provide comprehensive social services by sharing vehicular sensory data. To selectively share the sensory data with other vehicles in the vicinity and reduce the local storage burden of vehicles, the vehicular sensory data are usually outsourced to vehicle cloud server for sharing and searching. However, existing data sharing systems for VSNs can neither provide secure selective one-to-many data sharing and verifiable data retrieval over encrypted data nor ensure that the integrity of retrieved data. In this paper, …


Capitalising Product Associations In A Supermarket Retail Environment, Michelle L. F. Cheong, Yong Qing Chia Nov 2020

Capitalising Product Associations In A Supermarket Retail Environment, Michelle L. F. Cheong, Yong Qing Chia

Research Collection School Of Computing and Information Systems

This paper explores methods to capitalise on retail companies’ transactional databases, to mine meaningful product associations, and to design product placement strategies as a means to drive sales. We implemented three in-store initiatives based on our hypotheses – placing products with high associations together will induce an increase in sales of consequent; introducing an antecedent that is new to store will bring about a similar impact on sales of consequent based on established product association rules uncovered from other stores. Sales tracking over twelve weeks revealed that there were improvements in sales of consequents across all three initiatives performed in-store.


Jito: A Tool For Just-In-Time Defect Identification And Localization, Fangcheng Qiu, Meng Yan, Xin Xia, Xinyu Wang, Yuanrui Fan, Ahmed E. Hassan, David Lo Nov 2020

Jito: A Tool For Just-In-Time Defect Identification And Localization, Fangcheng Qiu, Meng Yan, Xin Xia, Xinyu Wang, Yuanrui Fan, Ahmed E. Hassan, David Lo

Research Collection School Of Computing and Information Systems

In software development and maintenance, defect localization is necessary for software quality assurance. Current defect localization techniques mainly rely on defect symptoms (e.g., bug reports or program spectrum) when the defect has been exposed. One challenge task is: can we locate buggy program prior to the appearance of the defect symptom. Such kind of localization is conducted at an early stage (e.g., when buggy program elements are being checkedin) which can be an early step of continuous quality control.In this paper, we propose a Just-In-Time defect identification and lOcalization tool, named JITO, which can help developers to locate defective lines …


Cross-Thought For Sentence Encoder Pre-Training, Shuohang Wang, Yuwei Fang, Siqi Sun, Zhe Gan, Yu Cheng, Jingjing Liu, Jing Jiang Nov 2020

Cross-Thought For Sentence Encoder Pre-Training, Shuohang Wang, Yuwei Fang, Siqi Sun, Zhe Gan, Yu Cheng, Jingjing Liu, Jing Jiang

Research Collection School Of Computing and Information Systems

In this paper, we propose Cross-Thought, a novel approach to pre-training sequence encoder, which is instrumental in building reusable sequence embeddings for large-scale NLP tasks such as question answering. Instead of using the original signals of full sentences, we train a Transformer-based sequence encoder over a large set of short sequences, which allows the model to automatically select the most useful information for predicting masked words. Experiments on question answering and textual entailment tasks demonstrate that our pre-trained encoder can outperform state-of-the-art encoders trained with continuous sentence signals as well as traditional masked language modeling baselines. Our proposed approach also …


Effort-Aware Just-In-Time Defect Identification In Practice: A Case Study At Alibaba, Meng Yan, Xin Xia, Yuanrui Fan, David Lo, Ahmed E. Hassan, Xindong Zhang Nov 2020

Effort-Aware Just-In-Time Defect Identification In Practice: A Case Study At Alibaba, Meng Yan, Xin Xia, Yuanrui Fan, David Lo, Ahmed E. Hassan, Xindong Zhang

Research Collection School Of Computing and Information Systems

Effort-aware Just-in-Time (JIT) defect identification aims at identifying defect-introducing changes just-in-time with limited code inspection effort. Such identification has two benefits compared with traditional module-level defect identification, i.e., identifying defects in a more cost-effective and efficient manner. Recently, researchers have proposed various effort-aware JIT defect identification approaches, including supervised (e.g., CBS+, OneWay) and unsupervised approaches (e.g., LT and Code Churn). The comparison of the effectiveness between such supervised and unsupervised approaches has attracted a large amount of research interest. However, the effectiveness of the recently proposed approaches and the comparison among them have never been investigated in an industrial setting.In …


Leveraging Profanity For Insincere Content Detection: A Neural Network Approach, Swapna Gottipati, Annabel Tan, David Jing Shan Chow, Joel Wee Kiat Lim Nov 2020

Leveraging Profanity For Insincere Content Detection: A Neural Network Approach, Swapna Gottipati, Annabel Tan, David Jing Shan Chow, Joel Wee Kiat Lim

Research Collection School Of Computing and Information Systems

Community driven social media sites are rich sources of knowledge and entertainment and at the same vulnerable to the flames or toxic content that can be dangerous to various users of these platforms as well as to the society. Therefore, it is crucial to identify and remove such content to have a better and safe online experience. Manually eliminating flames is tedious and hence many research works focus on machine learning or deep learning models for automated methods. In this paper, we primarily focus on detecting the insincere content using neural network-based learning methods. We also integrated the profanity features …


A Theory Of The Engagement In Open Source Projects Via Summer Of Code Programs, Jefferson Silva, Igor Wiese, Daniel M. German, Christoph Treude, Marco A. Gerosa, Igor Steinmacher Nov 2020

A Theory Of The Engagement In Open Source Projects Via Summer Of Code Programs, Jefferson Silva, Igor Wiese, Daniel M. German, Christoph Treude, Marco A. Gerosa, Igor Steinmacher

Research Collection School Of Computing and Information Systems

Summer of code programs connect students to open source software (OSS) projects, typically during the summer break from school. Analyzing consolidated summer of code programs can reveal how college students, who these programs usually target, can be motivated to participate in OSS, and what onboarding strategies OSS communities adopt to receive these students. In this paper, we study the well-established Google Summer of Code (GSoC) and devise an integrated engagement theory grounded in multiple data sources to explain motivation and onboarding in this context. Our analysis shows that OSS communities employ several strategies for planning and executing student participation, socially …


Answerfact: Fact Checking In Product Question Answering, Wenxuan Zhang, Yang Deng, Jing Ma, Wai Lam Nov 2020

Answerfact: Fact Checking In Product Question Answering, Wenxuan Zhang, Yang Deng, Jing Ma, Wai Lam

Research Collection School Of Computing and Information Systems

Product-related question answering platforms nowadays are widely employed in many E-commerce sites, providing a convenient way for potential customers to address their concerns during online shopping. However, the misinformation in the answers on those platforms poses unprecedented challenges for users to obtain reliable and truthful product information, which may even cause a commercial loss in E-commerce business. To tackle this issue, we investigate to predict the veracity of answers in this paper and introduce AnswerFact, a large scale fact checking dataset from product question answering forums. Each answer is accompanied by its veracity label and associated evidence sentences, providing a …


Coupled Hierarchical Transformer For Stance-Aware Rumor Verification In Social Media Conversations, Jianfei Yu, Jing Jiang, Ling Min Serena Khoo, Hai Leong Chieu, Rui Xia Nov 2020

Coupled Hierarchical Transformer For Stance-Aware Rumor Verification In Social Media Conversations, Jianfei Yu, Jing Jiang, Ling Min Serena Khoo, Hai Leong Chieu, Rui Xia

Research Collection School Of Computing and Information Systems

The prevalent use of social media enables rapid spread of rumors on a massive scale, which leads to the emerging need of automatic rumor verification (RV). A number of previous studies focus on leveraging stance classification to enhance RV with multi-task learning (MTL) methods. However, most of these methods failed to employ pre-trained contextualized embeddings such as BERT, and did not exploit inter-task dependencies by using predicted stance labels to improve the RV task. Therefore, in this paper, to extend BERT to obtain thread representations, we first propose a Hierarchical Transformer1 , which divides each long thread into shorter subthreads, …


Bugsinpy: A Database Of Existing Bugs In Python Programs To Enable Controlled Testing And Debugging Studies, Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo, Eng Lieh Ouh Nov 2020

Bugsinpy: A Database Of Existing Bugs In Python Programs To Enable Controlled Testing And Debugging Studies, Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

The 2019 edition of Stack Overflow developer survey highlights that, for the first time, Python outperformed Java in terms of popularity. The gap between Python and Java further widened in the 2020 edition of the survey. Unfortunately, despite the rapid increase in Python's popularity, there are not many testing and debugging tools that are designed for Python. This is in stark contrast with the abundance of testing and debugging tools for Java. Thus, there is a need to push research on tools that can help Python developers.One factor that contributed to the rapid growth of Java testing and debugging tools …


Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi Nov 2020

Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

The overestimation caused by function approximation is a well-known property in Q-learning algorithms, especially in single-critic models, which leads to poor performance in practical tasks. However, the opposite property, underestimation, which often occurs in Q-learning methods with double critics, has been largely left untouched. In this article, we investigate the underestimation phenomenon in the recent twin delay deep deterministic actor-critic algorithm and theoretically demonstrate its existence. We also observe that this underestimation bias does indeed hurt performance in various experiments. Considering the opposite properties of single-critic and double-critic methods, we propose a novel triplet-average deep deterministic policy gradient algorithm that …


Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun Nov 2020

Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun

Research Collection School Of Computing and Information Systems

Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, …


Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra Nov 2020

Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra

Research Collection School Of Computing and Information Systems

We present ERICA, a digital personal trainer for users performing free weights exercises, with two key differentiators: (a) First, unlike prior approaches that either require multiple on-body wearables or specialized infrastructural sensing, ERICA uses a single in-ear "earable" device (piggybacking on a form factor routinely used by millions of gym-goers) and a simple inertial sensor mounted on each weight equipment; (b) Second, unlike prior work that focuses primarily on quantifying a workout, ERICA additionally identifies a variety of fine-grained exercising mistakes and delivers real-time, in-situ corrective instructions. To achieve this, we (a) design a robust approach for user-equipment association that …


Multi-Hop Inference For Question-Driven Summarization, Yang Deng, Wenxuan Zhang, Wai Lam Nov 2020

Multi-Hop Inference For Question-Driven Summarization, Yang Deng, Wenxuan Zhang, Wai Lam

Research Collection School Of Computing and Information Systems

Question-driven summarization has been recently studied as an effective approach to summarizing the source document to produce concise but informative answers for non-factoid questions. In this work, we propose a novel question-driven abstractive summarization method, Multi-hop Selective Generator (MSG), to incorporate multi-hop reasoning into question-driven summarization and, meanwhile, provide justifications for the generated summaries. Specifically, we jointly model the relevance to the question and the interrelation among different sentences via a human-like multi-hop inference module, which captures important sentences for justifying the summarized answer. A gated selective pointer generator network with a multi-view coverage mechanism is designed to integrate diverse …


Learning Personal Conscientiousness From Footprints In E-Learning Systems, Lo Pang-Yun Ting, Shan Yun Teng, Kun Ta Chuang, Ee-Peng Lim Nov 2020

Learning Personal Conscientiousness From Footprints In E-Learning Systems, Lo Pang-Yun Ting, Shan Yun Teng, Kun Ta Chuang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Personality inference has received widespread attention for its potential to infer psychological well being, job satisfaction, romantic relationship success, and professional performance. In this research, we focus on Conscientiousness, one of the well studied Big Five personality traits, which determines if a person is self-disciplined, organized, and hard-working. Research has shown that Conscientiousness is related to a person's academic and workplace success. For an expert to evaluate a person's Conscientiousness, long-term observation of the person's behavior at work place or at home is usually required. To reduce this evaluation effort as well as to cope with the increasing trend of …


Attribute-Based Keyword Search Over Hierarchical Data In Cloud Computing, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang Nov 2020

Attribute-Based Keyword Search Over Hierarchical Data In Cloud Computing, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang

Research Collection School Of Computing and Information Systems

Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. The facts that the single keyword search will yield many irrelevant search results and the revoked users can access the unauthorized data with the old …


Beyond Accuracy: Assessing Software Documentation Quality, Christoph Treude, Justin Middleton, Thushari Atapattu Nov 2020

Beyond Accuracy: Assessing Software Documentation Quality, Christoph Treude, Justin Middleton, Thushari Atapattu

Research Collection School Of Computing and Information Systems

Good software documentation encourages good software engineering, but the meaning of “good” documentation is vaguely defined in the software engineering literature. To clarify this ambiguity, we draw on work from the data and information quality community to propose a framework that decomposes documentation quality into ten dimensions of structure, content, and style. To demonstrate its application, we recruited technical editors to apply the framework when evaluating examples from several genres of software documentation. We summarise their assessments—for example, reference documentation and README files excel in quality whereas blog articles have more problems—and we describe our vision for reasoning about software …


Selecting Third-Party Libraries: The Practitioners' Perspective, Enrique Larios Vargas, Maurício Aniche, Christoph Treude, Magiel Bruntink, Georgios Gousios Nov 2020

Selecting Third-Party Libraries: The Practitioners' Perspective, Enrique Larios Vargas, Maurício Aniche, Christoph Treude, Magiel Bruntink, Georgios Gousios

Research Collection School Of Computing and Information Systems

The selection of third-party libraries is an essential element of virtually any software development project. However, deciding which libraries to choose is a challenging practical problem. Selecting the wrong library can severely impact a software project in terms of cost, time, and development effort, with the severity of the impact depending on the role of the library in the software architecture, among others. Despite the importance of following a careful library selection process, in practice, the selection of third-party libraries is still conducted in an ad-hoc manner, where dozens of factors play an influential role in the decision. In this …


Exploring The Impact Of Covid-19 On Aviation Industry: A Text Mining Approach, Gottipati Swapna, Kyong Jin Shim, Weiling Angeline Jiang, Sheng Wei Andre Justin Lee Nov 2020

Exploring The Impact Of Covid-19 On Aviation Industry: A Text Mining Approach, Gottipati Swapna, Kyong Jin Shim, Weiling Angeline Jiang, Sheng Wei Andre Justin Lee

Research Collection School Of Computing and Information Systems

Our study presents a comprehensive analysis of news articles from FlightGlobal website during the first half of 2020. Our analyses reveal useful insights on themes and trends concerning the aviation industry during the COVID-19 period. We applied text mining and NLP techniques to analyse the articles for extracting the aviation themes and article sentiments (positive and negative). Our results show that there is a variation in the sentiment trends for themes aligned with the real-world developments of the pandemic. The article sentiment analysis can offer industry players a quick sense of the nature of developments in the industry. Our article …


Enhancing Developer Interactions With Programming Screencasts Through Accurate Code Extraction, Lingfeng Bao, Shengyi Pan, Zhenchang Xing, Xin Xia, David Lo, Xiaohu Yang Nov 2020

Enhancing Developer Interactions With Programming Screencasts Through Accurate Code Extraction, Lingfeng Bao, Shengyi Pan, Zhenchang Xing, Xin Xia, David Lo, Xiaohu Yang

Research Collection School Of Computing and Information Systems

Programming screencasts have become a pervasive resource on the Internet, which is favoured by many developers for learning new programming skills. For developers, the source code in screencasts is valuable and important. However, the streaming nature of screencasts limits the choice that they have for interacting with the code. Many studies apply the Optical Character Recognition (OCR) technique to convert screen images into text, which can be easily searched and indexed. However, we observe that the noise in the screen images significantly affects the quality of OCRed code.In this paper, we develop a tool named psc2code, which has two components, …


Machine Learning Integrated Design For Additive Manufacturing, Jingchao Jiang, Yi Xiong, Zhiyuan Zhang, David W. Rosen Nov 2020

Machine Learning Integrated Design For Additive Manufacturing, Jingchao Jiang, Yi Xiong, Zhiyuan Zhang, David W. Rosen

Research Collection School Of Computing and Information Systems

For improving manufacturing efficiency and minimizing costs, design for additive manufacturing (AM) has been accordingly proposed. The existing design for AM methods are mainly surrogate model based. Due to the increasingly available data nowadays, machine learning (ML) has been applied to medical diagnosis, image processing, prediction, classification, learning association, etc. A variety of studies have also been carried out to use machine learning for optimizing the process parameters of AM with corresponding objectives. In this paper, a ML integrated design for AM framework is proposed, which takes advantage of ML that can learn the complex relationships between the design and …


Global Context Aware Convolutions For 3d Point Cloud Understanding, Zhiyuan Zhang, Binh-Son Hua, Wei Chen, Yibin Tian, Sai-Kit Yeung Nov 2020

Global Context Aware Convolutions For 3d Point Cloud Understanding, Zhiyuan Zhang, Binh-Son Hua, Wei Chen, Yibin Tian, Sai-Kit Yeung

Research Collection School Of Computing and Information Systems

Recent advances in deep learning for 3D point clouds have shown great promises in scene understanding tasks thanks to the introduction of convolution operators to consume 3D point clouds directly in a neural network. Point cloud data, however, could have arbitrary rotations, especially those acquired from 3D scanning. Recent works show that it is possible to design point cloud convolutions with rotation invariance property, but such methods generally do not perform as well as translation-invariant only convolution. We found that a key reason is that compared to point coordinates, rotation-invariant features consumed by point cloud convolution are not as distinctive. …


Tangi: Tangible Proxies For Embodied Object Exploration And Manipulation In Virtual Reality, Martin Feick, Scott Bateman, Anthony Tang, Anthony Tang Nov 2020

Tangi: Tangible Proxies For Embodied Object Exploration And Manipulation In Virtual Reality, Martin Feick, Scott Bateman, Anthony Tang, Anthony Tang

Research Collection School Of Computing and Information Systems

Exploring and manipulating complex virtual objects is challenging due to limitations of conventional controllers and free-hand interaction techniques. We present the TanGi toolkit which enables novices to rapidly build physical proxy objects using Composable Shape Primitives. TanGi also provides Manipulators allowing users to build objects including movable parts, making them suitable for rich object exploration and manipulation in VR. With a set of different use cases and applications we show the capabilities of the TanGi toolkit and evaluate its use. In a study with 16 participants, we demonstrate that novices can quickly build physical proxy objects using the Composable Shape …


Highly Efficient And Scalable Multi-Hop Ride-Sharing, Yixin Xu, Lars Kulik, Renata Borovica‐Gajic, Abdullah Aldwyish, Jianzhong Qi Nov 2020

Highly Efficient And Scalable Multi-Hop Ride-Sharing, Yixin Xu, Lars Kulik, Renata Borovica‐Gajic, Abdullah Aldwyish, Jianzhong Qi

Research Collection School Of Computing and Information Systems

On-demand ride-sharing services such as Uber and Lyft have gained tremendous popularity over the past decade, largely driven by the omnipresence of mobile devices. Ride-sharing services can provide economic and environmental benefits such as reducing traffic congestion and vehicle emissions. Multi-hop ride-sharing enables passengers to transfer between vehicles within a single trip, which significantly extends the benefits of ride-sharing and provides ride opportunities that are not possible otherwise. Despite its advantages, offering real-time multi-hop ride-sharing services at large scale is a challenging computational task due to the large combination of vehicles and passenger transfer points. To address these challenges, we …


Base-Package Recommendation Framework Based On Consumer Behaviours In Iptv Platform, Kuruparan Shanmugalingam, Ruwinda Ranganayanke, Chanka Gunawardhaha, Rajitha Navarathna Nov 2020

Base-Package Recommendation Framework Based On Consumer Behaviours In Iptv Platform, Kuruparan Shanmugalingam, Ruwinda Ranganayanke, Chanka Gunawardhaha, Rajitha Navarathna

Research Collection School Of Computing and Information Systems

Internet Protocol TeleVision (IPTV) provides many services such as live television streaming, time-shifted media, and Video On Demand (VOD). However, many customers do not engage properly with their subscribed packages due to a lack of knowledge and poor guidance. Many customers fail to identify the proper IPTV service package based on their needs and to utilise their current package to the maximum. In this paper, we propose a base-package recommendation model with a novel customer scoring-meter based on customers behaviour. Initially, our paper describes an algorithm to measure customers engagement score, which illustrates a novel approach to track customer engagement …


How Should We Understand The Digital Economy In Asia? Critical Assessment And Research Agenda, Kai Li, Dan J. Kim, Karl R. Lang, Robert J. Kauffman, Maurizio Naldi Nov 2020

How Should We Understand The Digital Economy In Asia? Critical Assessment And Research Agenda, Kai Li, Dan J. Kim, Karl R. Lang, Robert J. Kauffman, Maurizio Naldi

Research Collection School Of Computing and Information Systems

By Asian digital economy, we refer to high-tech developments, business and social transformations, and information-driven changes in the region's growth. We discuss its background and foundations, significance in Asia and contribution to removal of historical barriers in traditional business. We assess how new value chains are transforming country-level involvement in worldwide manufacturing and note "smiling curve theory" predictions about the global value chain in Asia for high-tech firms and their economies. The takeaway is that the digital economy in Asian nations involves revamping business processes through technology innovation, government policies for growth, and digital entrepreneurship. We analyze the "digital economy …


Empowering Singapore’S Smes: Fintech P2p Lending — A Lifeline For Smes’ Survival?, Grace Lee, Alan Megargel Nov 2020

Empowering Singapore’S Smes: Fintech P2p Lending — A Lifeline For Smes’ Survival?, Grace Lee, Alan Megargel

Research Collection School Of Computing and Information Systems

The COVID-19 pandemic has sent shock waves throughout the world, pushed countries into lockdown, and wreaked havoc on the world’s people and the global economy. The damage to economies around the world caused by the COVID-19 pandemic has far exceeded that of the global financial crisis. While all businesses suffered hugely, it would be of grave consequence if the small and medium-sized enterprises (SMEs), an important segment of every country’s economy, are unable to withstand the shock wave and sustain themselves beyond this pandemic. The COVID-19 pandemic has highlighted the importance of cash flow or working capital for the viability …


Perceptions, Expectations, And Challenges In Defect Prediction, Zhiyuan Wan, Xin Xia, Ahmed E. Hassan, David Lo, Jianwei Yin, Xiaohu Yang Nov 2020

Perceptions, Expectations, And Challenges In Defect Prediction, Zhiyuan Wan, Xin Xia, Ahmed E. Hassan, David Lo, Jianwei Yin, Xiaohu Yang

Research Collection School Of Computing and Information Systems

Defect prediction has been an active research area for over four decades. Despite numerous studies on defect prediction, the potential value of defect prediction in practice remains unclear. To address this issue, we performed a mixed qualitative and quantitative study to investigate what practitioners think, behave and expect in contrast to research findings when it comes to defect prediction. We collected hypotheses from open-ended interviews and a literature review, followed by a validation survey. We received 395 responses from practitioners. Some of our key findings include: 1) Over 90% of respondents are willing to adopt defect prediction techniques. 2) There …