Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2221 - 2250 of 7454

Full-Text Articles in Physical Sciences and Mathematics

Spark: Spatial-Aware Online Incremental Attack Against Visual Tracking, Qing Guo, Xiaofei Xie, Felix Juefei-Xu, Lei Ma, Zhongguo Li, Wanli Xue, Wei Feng, Yang Liu Aug 2020

Spark: Spatial-Aware Online Incremental Attack Against Visual Tracking, Qing Guo, Xiaofei Xie, Felix Juefei-Xu, Lei Ma, Zhongguo Li, Wanli Xue, Wei Feng, Yang Liu

Research Collection School Of Computing and Information Systems

Adversarial attacks of deep neural networks have been intensively studied on image, audio, and natural language classification tasks. Nevertheless, as a typical while important real-world application, the adversarial attacks of online video tracking that traces an object’s moving trajectory instead of its category are rarely explored. In this paper, we identify a new task for the adversarial attack to visual tracking: online generating imperceptible perturbations that mislead trackers along with an incorrect (Untargeted Attack, UA) or specified trajectory (Targeted Attack, TA). To this end, we first propose a spatial-aware basic attack by adapting existing attack methods, i.e., FGSM, BIM, and …


When Doing More Requires Knowing More: Explaining The Intention To Seek Procedural Information About Recycling, Sonny Rosenthal, Yan Wah Leung Aug 2020

When Doing More Requires Knowing More: Explaining The Intention To Seek Procedural Information About Recycling, Sonny Rosenthal, Yan Wah Leung

Research Collection College of Integrative Studies

This study examines the relationship between the intention to recycle more and the intention to seek procedural information, in this case, information about how to recycle. In contrast to prior research that used information seeking as a predictor of behavior change, this study considers behavioral intention as a predictor of intention to seek information. Regression analysis of survey data from Singapore residents confirms that prediction, explaining 27% of the variance in intention to seek procedural information. Moderation analysis suggests the effect of intention to recycle more is stronger among individuals with low recycling self-efficacy. An alternative analysis suggests the greater …


Learning Transferrable Parameters For Long-Tailed Sequential User Behavior Modeling, Jianwen Yin, Chenghao Liu, Weiqing Wang, Jianling Sun, Steven C. H. Hoi Aug 2020

Learning Transferrable Parameters For Long-Tailed Sequential User Behavior Modeling, Jianwen Yin, Chenghao Liu, Weiqing Wang, Jianling Sun, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Sequential user behavior modeling plays a crucial role in online user-oriented services, such as product purchasing, news feed consumption, and online advertising. The performance of sequential modeling heavily depends on the scale and quality of historical behaviors. However, the number of user behaviors inherently follows a long-tailed distribution, which has been seldom explored. In this work, we argue that focusing on tail users could bring more benefits and address the long tails issue by learning transferrable parameters from both optimization and feature perspectives. Specifically, we propose a gradient alignment optimizer and adopt an adversarial training scheme to facilitate knowledge transfer …


Commanding And Re-Dictation: Developing Eyes-Free Voice-Based Interaction For Editing Dictated Text, Debjyoti Ghosh, Can Liu, Shengdong Zhao, Kotaro Hara Aug 2020

Commanding And Re-Dictation: Developing Eyes-Free Voice-Based Interaction For Editing Dictated Text, Debjyoti Ghosh, Can Liu, Shengdong Zhao, Kotaro Hara

Research Collection School Of Computing and Information Systems

Existing voice-based interfaces have limited support for text editing, especially when seeing the text is difficult, e.g., while walking or cooking. This research develops voice interaction techniques for eyes-free text editing. First, with a Wizard-of-Oz study, we identified two primary user strategies: using commands, e.g., “replace go with goes” and re-dictating over an erroneous portion, e.g., correcting “he go there” by saying “he goes there.” To support these user strategies with an actual system implementation, we developed two eyes-free voice interaction techniques, Commanding and Re-dictation, and evaluated them with a controlled experiment. Results showed that while Re-dictation performs significantly better …


A Unified Framework For Sparse Online Learning, Peilin Zhao, Dayong Wong, Pengcheng Wu, Steven C. H. Hoi Aug 2020

A Unified Framework For Sparse Online Learning, Peilin Zhao, Dayong Wong, Pengcheng Wu, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

The amount of data in our society has been exploding in the era of big data. This article aims to address several open challenges in big data stream classification. Many existing studies in data mining literature follow the batch learning setting, which suffers from low efficiency and poor scalability. To tackle these challenges, we investigate a unified online learning framework for the big data stream classification task. Different from the existing online data stream classification techniques, we propose a unified Sparse Online Classification (SOC) framework. Based on SOC, we derive a second-order online learning algorithm and a cost-sensitive sparse online …


An Analysis Of Sketched Irls For Accelerated Sparse Residual Regression, Daichi Iwata, Michael Waechter, Wen-Yan Lin, Yasuyuki Matsushita Aug 2020

An Analysis Of Sketched Irls For Accelerated Sparse Residual Regression, Daichi Iwata, Michael Waechter, Wen-Yan Lin, Yasuyuki Matsushita

Research Collection School Of Computing and Information Systems

This paper studies the problem of sparse residual regression, i.e., learning a linear model using a norm that favors solutions in which the residuals are sparsely distributed. This is a common problem in a wide range of computer vision applications where a linear system has a lot more equations than unknowns and we wish to find the maximum feasible set of equations by discarding unreliable ones. We show that one of the most popular solution methods, iteratively reweighted least squares (IRLS), can be significantly accelerated by the use of matrix sketching. We analyze the convergence behavior of the proposed method …


Aim 2020 Challenge On Video Extreme Super-Resolution: Methods And Results, D. Fuoli, Zhiwu Huang, S. Gu, R. Timofte, A. Raventos, A. Esfandiari, S. Karout, X. Xu, X. Li, X. Xiong, J. Wang, Michelini P. Navarrete, W. Zhang, D. Zhang, H. Zhu, D. Xia, H. Chen, J. Gu, Z. Zhang, T. Zhao Aug 2020

Aim 2020 Challenge On Video Extreme Super-Resolution: Methods And Results, D. Fuoli, Zhiwu Huang, S. Gu, R. Timofte, A. Raventos, A. Esfandiari, S. Karout, X. Xu, X. Li, X. Xiong, J. Wang, Michelini P. Navarrete, W. Zhang, D. Zhang, H. Zhu, D. Xia, H. Chen, J. Gu, Z. Zhang, T. Zhao

Research Collection School Of Computing and Information Systems

This paper reviews the video extreme super-resolution challenge associated with the AIM 2020 workshop at ECCV 2020. Common scaling factors for learned video super-resolution (VSR) do not go beyond factor 4. Missing information can be restored well in this region, especially in HR videos, where the high-frequency content mostly consists of texture details. The task in this challenge is to upscale videos with an extreme factor of 16, which results in more serious degradations that also affect the structural integrity of the videos. A single pixel in the lowresolution (LR) domain corresponds to 256 pixels in the high-resolution (HR) domain. …


Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu Cai, Xuexin Chen, Yuan Fang, Min Wu, Yuexing Hao Aug 2020

Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu Cai, Xuexin Chen, Yuan Fang, Min Wu, Yuexing Hao

Research Collection School Of Computing and Information Systems

Motivation: Synthetic lethality (SL) is a promising form of gene interaction for cancer therapy, as it is able to identify specific genes to target at cancer cells without disrupting normal cells. As high-throughput wet-lab settings are often costly and face various challenges, computational approaches have become a practical complement. In particular, predicting SLs can be formulated as a link prediction task on a graph of interacting genes. Although matrix factorization techniques have been widely adopted in link prediction, they focus on mapping genes to latent representations in isolation, without aggregating information from neighboring genes. Graph convolutional networks (GCN) can capture …


Meta-Learning On Heterogeneous Information Networks For Cold-Start Recommendation, Yuanfu Lu, Yuan Fang, Chuan Shi Aug 2020

Meta-Learning On Heterogeneous Information Networks For Cold-Start Recommendation, Yuanfu Lu, Yuan Fang, Chuan Shi

Research Collection School Of Computing and Information Systems

Cold-start recommendation has been a challenging problem due to sparse user-item interactions for new users or items. Existing efforts have alleviated the cold-start issue to some extent, most of which approach the problem at the data level. Earlier methods often incorporate auxiliary data as user or item features, while more recent methods leverage heterogeneous information networks (HIN) to capture richer semantics via higher-order graph structures. On the other hand, recent meta-learning paradigm sheds light on addressing cold-start recommendation at the model level, given its ability to rapidly adapt to new tasks with scarce labeled data, or in the context of …


Social Participation Performance Of Wheelchair Users Using Clustering And Geolocational Sensor's Data, Yukun Yin, Kar Way Tan Aug 2020

Social Participation Performance Of Wheelchair Users Using Clustering And Geolocational Sensor's Data, Yukun Yin, Kar Way Tan

Research Collection School Of Computing and Information Systems

For wheelchair users, social participation and physical mobility play a significant part in determining their mental health and quality of life outcomes. However, little is known about how wheelchair users move about and engage in social interactions within their life-spaces. In this project, we investigate the social participation performance of the wheelchair users based on a combination of geolocational and lifestyle survey data collected over a period of three months. This paper adopts a multi-variate approach combining geolocational travel patterns and various factors such as independence, willingness and self-perception to provide multi-faceted analysis to their lifestyles. We provide profiles of …


An Attention-Based Rumor Detection Model With Tree-Structured Recursive Neural Networks, Jing Ma, Wei Gao, Shafiq Joty, Kam-Fai Wong Aug 2020

An Attention-Based Rumor Detection Model With Tree-Structured Recursive Neural Networks, Jing Ma, Wei Gao, Shafiq Joty, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Rumor spread in social media severely jeopardizes the credibility of online content. Thus, automatic debunking of rumors is of great importance to keep social media a healthy environment. While facing a dubious claim, people often dispute its truthfulness sporadically in their posts containing various cues, which can form useful evidence with long-distance dependencies. In this work, we propose to learn discriminative features from microblog posts by following their non-sequential propagation structure and generate more powerful representations for identifying rumors. For modeling non-sequential structure, we first represent the diffusion of microblog posts with propagation trees, which provide valuable clues on how …


Activation Of Trpa1 Nociceptor Promotes Systemic Adult Mammalian Skin Regeneration, Jenny J. Wei, Hali S. Kim, Casey A. Spencer, Donna Brennan-Crispi, Ying Zheng, Nicolette M. Johnson, Misha Rosenbach, Christopher Miller, Denis H. Y. Leung, George Cotsarelis, Thomas H. Leung Aug 2020

Activation Of Trpa1 Nociceptor Promotes Systemic Adult Mammalian Skin Regeneration, Jenny J. Wei, Hali S. Kim, Casey A. Spencer, Donna Brennan-Crispi, Ying Zheng, Nicolette M. Johnson, Misha Rosenbach, Christopher Miller, Denis H. Y. Leung, George Cotsarelis, Thomas H. Leung

Research Collection School Of Economics

Adult mammalian wounds, with rare exception, heal with fibrotic scars that severely disrupt tissue architecture and function. Regenerative medicine seeks methods to avoid scar formation and restore the original tissue structures. We show in three adult mouse models that pharmacologic activation of the nociceptor TRPA1 on cutaneous sensory neurons reduces scar formation and can also promote tissue regeneration. Local activation of TRPA1 induces tissue regeneration on distant untreated areas of injury, demonstrating a systemic effect. Activated TRPA1 stimulates local production of interleukin-23 (IL-23) by dermal dendritic cells, leading to activation of circulating dermal IL-17–producing γδ T cells. Genetic ablation of …


An Exact Algorithm For Agile Earth Observation Satellite Scheduling With Time-Dependent Profits, Guansheng Peng, Guopeng Song, Lining Xing, Aldy Gunawan, Pieter Vansteenwegen Aug 2020

An Exact Algorithm For Agile Earth Observation Satellite Scheduling With Time-Dependent Profits, Guansheng Peng, Guopeng Song, Lining Xing, Aldy Gunawan, Pieter Vansteenwegen

Research Collection School Of Computing and Information Systems

The scheduling of an Agile Earth Observation Satellite (AEOS) consists of selecting and scheduling a subset of possible targets for observation in order to maximize the collected profit related to the images while satisfying its operational constraints. In this problem, a set of candidate targets for observation is given, each with a time-dependent profit and a visible time window. The exact profit of a target depends on the start time of its observation, reaching its maximum at the midpoint of its visible time window. This time dependency stems from the fact that the image quality is determined by the look …


A Multicut Outer-Approximation Approach For Competitive Facility Location Under Random Utilities, Tien Mai, Andrea Lodi Aug 2020

A Multicut Outer-Approximation Approach For Competitive Facility Location Under Random Utilities, Tien Mai, Andrea Lodi

Research Collection School Of Computing and Information Systems

This work concerns the maximum capture facility location problem with random utilities, i.e., the problem of seeking to locate new facilities in a competitive market such that the captured demand of users is maximized, assuming that each individual chooses among all available facilities according to a random utility maximization model. The main challenge lies in the nonlinearity of the objective function. Motivated by the convexity and separable structure of such an objective function, we propose an enhanced implementation of the outer approximation scheme. Our algorithm works in a cutting plane fashion and allows to separate the objective function into a …


Adaptive Task Sampling For Meta-Learning, Chenghao Liu, Zhihao Wang, Doyen Sahoo, Yuan Fang, Kun Zhang, Steven C. H. Hoi Aug 2020

Adaptive Task Sampling For Meta-Learning, Chenghao Liu, Zhihao Wang, Doyen Sahoo, Yuan Fang, Kun Zhang, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Meta-learning methods have been extensively studied and applied in computer vision, especially for few-shot classification tasks. The key idea of meta-learning for few-shot classification is to mimic the few-shot situations faced at test time by randomly sampling classes in meta-training data to construct fewshot tasks for episodic training. While a rich line of work focuses solely on how to extract meta-knowledge across tasks, we exploit the complementary problem on how to generate informative tasks. We argue that the randomly sampled tasks could be sub-optimal and uninformative (e.g., the task of classifying “dog” from “laptop” is often trivial) to the meta-learner. …


A Generalised Bound For The Wiener Attack On Rsa, Willy Susilo, Joseph Tonien, Guomin Yang Aug 2020

A Generalised Bound For The Wiener Attack On Rsa, Willy Susilo, Joseph Tonien, Guomin Yang

Research Collection School Of Computing and Information Systems

Since Wiener pointed out that the RSA can be broken if the private exponent d is relatively small compared to the modulus N, it has been a general belief that the Wiener attack works for d


A Fast Anderson-Chebyshev Acceleration For Nonlinear Optimization, Zhize Li, Jian Li Aug 2020

A Fast Anderson-Chebyshev Acceleration For Nonlinear Optimization, Zhize Li, Jian Li

Research Collection School Of Computing and Information Systems

Anderson acceleration (or Anderson mixing) is an efficient acceleration method for fixed point iterations $x_{t+1}=G(x_t)$, e.g., gradient descent can be viewed as iteratively applying the operation $G(x) \triangleq x-\alpha\nabla f(x)$. It is known that Anderson acceleration is quite efficient in practice and can be viewed as an extension of Krylov subspace methods for nonlinear problems. In this paper, we show that Anderson acceleration with Chebyshev polynomial can achieve the optimal convergence rate $O(\sqrt{\kappa}\ln\frac{1}{\epsilon})$, which improves the previous result $O(\kappa\ln\frac{1}{\epsilon})$ provided by (Toth and Kelley, 2015) for quadratic functions. Moreover, we provide a convergence analysis for minimizing general nonlinear problems. Besides, …


Prevalence, Contents And Automatic Detection Of Kl-Satd, Leevi Rantala, Mika Mantyla, David Lo Aug 2020

Prevalence, Contents And Automatic Detection Of Kl-Satd, Leevi Rantala, Mika Mantyla, David Lo

Research Collection School Of Computing and Information Systems

When developers use different keywords such as TODO and FIXME in source code comments to describe self-admitted technical debt (SATD), we refer it as Keyword-Labeled SATD (KL-SATD). We study KL-SATD from 33 software repositories with 13,588 KL-SATD comments. We find that the median percentage of KL-SATD comments among all comments is only 1,52%. We find that KL-SATD comment contents include words expressing code changes and uncertainty, such as remove, fix, maybe and probably. This makes them different compared to other comments. KL-SATD comment contents are similar to manually labeled SATD comments of prior work. Our machine learning classifier using logistic …


Off-Policy Reinforcement Learning For Efficient And Effective Gan Architecture Search, Tian Yuan, Wang Qin, Zhiwu Huang, Wen Li, Dengxin Dai, Minghao Yang, Jun Wang, Olga Fink Aug 2020

Off-Policy Reinforcement Learning For Efficient And Effective Gan Architecture Search, Tian Yuan, Wang Qin, Zhiwu Huang, Wen Li, Dengxin Dai, Minghao Yang, Jun Wang, Olga Fink

Research Collection School Of Computing and Information Systems

In this paper, we introduce a new reinforcement learning (RL) based neural architecture search (NAS) methodology for effective and efficient generative adversarial network (GAN) architecture search. The key idea is to formulate the GAN architecture search problem as a Markov decision process (MDP) for smoother architecture sampling, which enables a more effective RL-based search algorithm by targeting the potential global optimal architecture. To improve efficiency, we exploit an off-policy GAN architecture search algorithm that makes efficient use of the samples generated by previous policies. Evaluation on two standard benchmark datasets (i.e., CIFAR-10 and STL-10) demonstrates that the proposed method is …


How Practitioners Perceive Automated Bug Report Management Techniques, Weiqin Zou, David Lo, Zhenyu Chen, Xin Xia, Yang Feng, Baowen Xu Aug 2020

How Practitioners Perceive Automated Bug Report Management Techniques, Weiqin Zou, David Lo, Zhenyu Chen, Xin Xia, Yang Feng, Baowen Xu

Research Collection School Of Computing and Information Systems

Bug reports play an important role in the process of debugging and fixing bugs. To reduce the burden of bug report managers and facilitate the process of bug fixing, a great amount of software engineering research has been invested into automated bug report management techniques. However, the verdict is still open whether such techniques are actually required and applicable outside of the theoretical research domain. To fill this gap, in this paper, we conducted a survey among 327 practitioners to gain their insights into various categories of automated bug report management techniques. Specifically, in the survey, we asked them to …


Tenet: Triple Excitation Network For Video Salient Object Detection, Sucheng Ren, Chu Han, Xin Yang, Guoqiang Han, Shengfeng He Aug 2020

Tenet: Triple Excitation Network For Video Salient Object Detection, Sucheng Ren, Chu Han, Xin Yang, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

In this paper, we propose a simple yet effective approach, named Triple Excitation Network, to reinforce the training of video salient object detection (VSOD) from three aspects, spatial, temporal, and online excitations. These excitation mechanisms are designed following the spirit of curriculum learning and aim to reduce learning ambiguities at the beginning of training by selectively exciting feature activations using ground truth. Then we gradually reduce the weight of ground truth excitations by a curriculum rate and replace it by a curriculum complementary map for better and faster convergence. In particular, the spatial excitation strengthens feature activations for clear object …


A Systematic Density-Based Clustering Method Using Anchor Points, Yizhang Wang, Di Wang, Wei Pang, Ah-Hwee Tan, You Zhou Aug 2020

A Systematic Density-Based Clustering Method Using Anchor Points, Yizhang Wang, Di Wang, Wei Pang, Ah-Hwee Tan, You Zhou

Research Collection School Of Computing and Information Systems

Clustering is an important unsupervised learning method in machine learning and data mining. Many existing clustering methods may still face the challenge in self-identifying clusters with varying shapes, sizes and densities. To devise a more generic clustering method that considers all the aforementioned properties of the natural clusters, we propose a novel clustering algorithm named Anchor Points based Clustering (APC). The anchor points in APC are characterized by having a relatively large distance from data points with higher densities. We take anchor points as centers to obtain intermediate clusters, which can divide the whole dataset more appropriately so as to …


Accelerating Exact Constrained Shortest Paths On Gpus, Shengliang Lu, Bingsheng He, Yuchen Li, Hao Fu Aug 2020

Accelerating Exact Constrained Shortest Paths On Gpus, Shengliang Lu, Bingsheng He, Yuchen Li, Hao Fu

Research Collection School Of Computing and Information Systems

The recently emerging applications such as software-defined networks and autonomous vehicles require efficient and exact solutions for constrained shortest paths (CSP), which finds the shortest path in a graph while satisfying some user-defined constraints. Compared with the common shortest path problems without constraints, CSP queries have a significantly larger number of subproblems. The most widely used labeling algorithm becomes prohibitively slow and impractical. Other existing approaches tend to find approximate solutions and build costly indices on graphs for fast query processing, which are not suitable for emerging applications with the requirement of exact solutions. A natural question is whether and …


Predictive Insights For Improving The Resilience Of Global Food Security Using Artificial Intelligence, Meng Leong How, Yong Jiet Chan, Sin Mei Cheah Aug 2020

Predictive Insights For Improving The Resilience Of Global Food Security Using Artificial Intelligence, Meng Leong How, Yong Jiet Chan, Sin Mei Cheah

Research Collection Lee Kong Chian School Of Business

Unabated pressures on food systems affect food security on a global scale. A human-centric artificial intelligence-based probabilistic approach is used in this paper to perform a unified analysis of data from the Global Food Security Index (GFSI). The significance of this intuitive probabilistic reasoning approach for predictive forecasting lies in its simplicity and user-friendliness to people who may not be trained in classical computer science or in software programming. In this approach, predictive modeling using a counterfactual probabilistic reasoning analysis of the GFSI dataset can be utilized to reveal the interplay and tensions between the variables that underlie food affordability, …


Refactoring From 9 To 5? What And When Employees And Volunteers Contribute To Oss, Luiz Felipe Dias, Caio Barbosa, Gustavo Pinto, Igor Steinmacher, Baldoino Fonseca, Márcio Ribeiro, Christoph Treude, Daniel Alencar Da Costa Aug 2020

Refactoring From 9 To 5? What And When Employees And Volunteers Contribute To Oss, Luiz Felipe Dias, Caio Barbosa, Gustavo Pinto, Igor Steinmacher, Baldoino Fonseca, Márcio Ribeiro, Christoph Treude, Daniel Alencar Da Costa

Research Collection School Of Computing and Information Systems

In this paper we characterize the contributions made by employees (developers that work for GitHub, the company) and volunteers (developers that use GitHub, the platform) to OSS projects maintained by GitHub (the company) on GitHub (the platform). By mining activities performed in five well-known company-owned OSS projects, we investigate what they do and when they do it. We found that the majority of the volunteers' contributions are related to reengineering (e.g., refactoring), while employees focus more on management (e.g., documentation). When it comes to the working hours, we found that contributions are made mostly from 9am-5pm, even for the volunteers.


A Longitudinal Study Of A Capstone Course, Benjamin Gan, Eng Lieh Ouh, Yin Yin Fiona Lee Aug 2020

A Longitudinal Study Of A Capstone Course, Benjamin Gan, Eng Lieh Ouh, Yin Yin Fiona Lee

Research Collection School Of Computing and Information Systems

This is a 7 years study on a capstone course completed by 1700+ students for 200+ organizations involving 300+ projects. Student teams deliver a system to solve real-world problems proposed by industry partners. We want to understand what independent variables influence student performance. We analyzed the deployment status of systems delivered, the type of organization/industry, the number of meetings and the technology used. Our results show some organization value proof of concept over fully deployed systems, student strengths are in Infocomm and Finance projects, the number of meetings is a weak correlation to performance and best performing projects are fully …


An Ensemble Of Epoch-Wise Empirical Bayes For Few-Shot Learning, Yaoyao Liu, Bernt Schiele, Qianru Sun Aug 2020

An Ensemble Of Epoch-Wise Empirical Bayes For Few-Shot Learning, Yaoyao Liu, Bernt Schiele, Qianru Sun

Research Collection School Of Computing and Information Systems

Few-shot learning aims to train efficient predictive models with a few examples. The lack of training data leads to poor models that perform high-variance or low-confidence predictions. In this paper, we propose to meta-learn the ensemble of epoch-wise empirical Bayes models (E3BM) to achieve robust predictions. “Epoch-wise'' means that each training epoch has a Bayes model whose parameters are specifically learned and deployed. ”Empirical'' means that the hyperparameters, e.g., used for learning and ensembling the epoch-wise models, are generated by hyperprior learners conditional on task-specific data. We introduce four kinds of hyperprior learners by considering inductive vs. transductive, and epoch-dependent …


A Visual Analytics Tool For Personalized Competency Feedback, Joelle Elmaleh, Shankararaman, Venky Aug 2020

A Visual Analytics Tool For Personalized Competency Feedback, Joelle Elmaleh, Shankararaman, Venky

Research Collection School Of Computing and Information Systems

In this paper we report our study on the design and implementation of a visual analytics tool, Competency Analytics System (CAS), which provides feedback to instructors on both the cohort and individual student’s competency acquisition rate, as well as provide personalized dashboard to each student on his or her competency acquisition for a specific course. We present the key functionalities of CAS and describe a case study on the implementation of CAS in a first-year programming course. Data from a student survey indicates that the personalized dashboard provided by CAS contributed to enhancing their ability to clearly identify the extent …


Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui Aug 2020

Novel Deep Learning Methods Combined With Static Analysis For Source Code Processing, Duy Quoc Nghi Bui

Dissertations and Theses Collection (Open Access)

It is desirable to combine machine learning and program analysis so that one can leverage the best of both to increase the performance of software analytics. On one side, machine learning can analyze the source code of thousands of well-written software projects that can uncover patterns that partially characterize software that is reliable, easy to read, and easy to maintain. On the other side, the program analysis can be used to define rigorous and unique rules that are only available in programming languages, which enrich the representation of source code and help the machine learning to capture the patterns better. …


Statistical And Deep Learning Models For Software Engineering Corpora, Van Duc Thong Hoang Aug 2020

Statistical And Deep Learning Models For Software Engineering Corpora, Van Duc Thong Hoang

Dissertations and Theses Collection (Open Access)

This dissertation focuses on proposing statistical and deep learning models for software engineering corpora to detect bugs in software system. The dissertation aims to solve three main software engineering problems, i.e., bug localization (locating the potential buggy source files in a software project given a bug report or failing test cases), just-in-time defect prediction (identifying the potential defective commits as they are introduced into a version control system), and bug fixing patch identification (identifying commits repairing bugs for their propagation to parallelly maintained versions) to save developers’ time and e↵ort in improving software system quality. Moreover, I also propose a …