Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2641 - 2670 of 7471

Full-Text Articles in Physical Sciences and Mathematics

Nonuniform Timeslicing Of Dynamic Graphs Based On Visual Complexity, Yong Wang, Daniel Archambault, Hammad Haleem, Torsten Moeller, Yanhong Wu, Huamin Qu Oct 2019

Nonuniform Timeslicing Of Dynamic Graphs Based On Visual Complexity, Yong Wang, Daniel Archambault, Hammad Haleem, Torsten Moeller, Yanhong Wu, Huamin Qu

Research Collection School Of Computing and Information Systems

Uniform timeslicing of dynamic graphs has been used due to its convenience and uniformity across the time dimension. However, uniform timeslicing does not take the data set into account, which can generate cluttered timeslices with edge bursts and empty timeslices with few interactions. The graph mining filed has explored nonuniform timeslicing methods specifically designed to preserve graph features for mining tasks. In this paper, we propose a nonuni-form timeslicing approach for dynamic graph visualization. Our goal is to create timeslices of equal visual complexity. To this end, we adapt histogram equalization to create timeslices with a similar number of events, …


Smartembed: A Tool For Clone And Bug Detection In Smart Contracts Through Structural Code Embedding, Zhipeng Gao, Magalle Hewa Vinoj Yasanga Jayasundara, Lingxiao Jiang, Xin Xia, David Lo, John C. Grundy Oct 2019

Smartembed: A Tool For Clone And Bug Detection In Smart Contracts Through Structural Code Embedding, Zhipeng Gao, Magalle Hewa Vinoj Yasanga Jayasundara, Lingxiao Jiang, Xin Xia, David Lo, John C. Grundy

Research Collection School Of Computing and Information Systems

Ethereum has become a widely used platform to enable secure, Blockchain-based financial and business transactions. However, a major concern in Ethereum is the security of its smart contracts. Many identified bugs and vulnerabilities in smart contracts not only present challenges to maintenance of blockchain, but also lead to serious financial loses. There is a significant need to better assist developers in checking smart contracts and ensuring their reliability. In this paper, we propose a web service tool, named SMARTEMBED, which can help Solidity developers to find repetitive contract code and clone-related bugs in smart contracts. Our tool is based on …


Collaborative Online Ranking Algorithms For Multitask Learning, Guangxia Li, Peilin Zhao, Tao Mei, Peng Yang, Yulong Shen, Julian K. Y. Chang, Steven C. H. Hoi Oct 2019

Collaborative Online Ranking Algorithms For Multitask Learning, Guangxia Li, Peilin Zhao, Tao Mei, Peng Yang, Yulong Shen, Julian K. Y. Chang, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

There are many applications in which it is desirable to rank or order instances that belong to several different but related problems or tasks. Although unique, the individual ranking problem often shares characteristics with other problems in the group. Conventional ranking methods treat each task independently without considering the latent commonalities. In this paper, we study the problem of learning to rank instances that belong to multiple related tasks from the multitask learning perspective. We consider a case in which the information that is learned for a task can be used to enhance the learning of other tasks and propose …


Tracy: A Business-Driven Technical Debt Prioritization Framework, Rodrigo Rebouças De Almeida, Christoph Treude, Uirá Kulesza Oct 2019

Tracy: A Business-Driven Technical Debt Prioritization Framework, Rodrigo Rebouças De Almeida, Christoph Treude, Uirá Kulesza

Research Collection School Of Computing and Information Systems

Technical debt is a pervasive problem in software development. Software development teams have to prioritize debt items and determine whether they should address debt or develop new features at any point in time. This paper presents "Tracy", a framework for the prioritization of technical debt using a business-driven approach built on top of business processes. The current stage of the proposed framework is at the beginning of the third phase of Design Science Research, which is usually divided into the phases of exploration, engineering, and evaluation. The exploration and engineering phases involved the participation of 49 professionals from 12 different …


Fusion Of Multimodal Embeddings For Ad-Hoc Video Search, Danny Francis, Phuong Anh Nguyen, Benoit Huet, Chong-Wah Ngo Oct 2019

Fusion Of Multimodal Embeddings For Ad-Hoc Video Search, Danny Francis, Phuong Anh Nguyen, Benoit Huet, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

The challenge of Ad-Hoc Video Search (AVS) originates from free-form (i.e., no pre-defined vocabulary) and freestyle (i.e., natural language) query description. Bridging the semantic gap between AVS queries and videos becomes highly difficult as evidenced from the low retrieval accuracy of AVS benchmarking in TRECVID. In this paper, we study a new method to fuse multimodal embeddings which have been derived based on completely disjoint datasets. This method is tested on two datasets for two distinct tasks: on MSR-VTT for unique video retrieval and on V3C1 for multiple videos retrieval.


Evaluation Of Sigfox Lpwan For Sensor-Enabled Homes To Identify At Risk Community Dwelling Seniors, Crys Tan, Hwee-Pink Tan Oct 2019

Evaluation Of Sigfox Lpwan For Sensor-Enabled Homes To Identify At Risk Community Dwelling Seniors, Crys Tan, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

It is projected that Singapore will become superaged (where 20% of its population will comprise seniors) by 2025. Although various community programs are available to promote active ageing among seniors who are well, provide befriending services for seniors at risk of isolation and care and support for frail and vulnerable seniors, it is not easy to differentiate between `well' seniors and `at risk' seniors. While privacy-preserving z-wave based sensor-enabled homes have been piloted in 100 homes of seniors living alone and have been successful in the timely detection of at-risk seniors, they have limited scalability due to high costs, reliability …


Cognitive And Social Interaction Analysis In Graduate Discussion Forums, Mallika Gokarn Nitin, Swapna Gottipati, Venky Shankararaman Oct 2019

Cognitive And Social Interaction Analysis In Graduate Discussion Forums, Mallika Gokarn Nitin, Swapna Gottipati, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Discussion forums play a key role in building knowledge repositories in an education institute. Asynchronous discussion forums enable part-time graduate professionals to have a better learning experience. This paper reports how a carefully curated discussion forum enhances the cognitive and social interactions among students in a graduate information systems course. In particular, we analyse the cognitive and social interactions and their impact on the student grades. To our surprise, the graduate students with their limited time resources, have higher order cognitive contributions and reasonable amount of social posts. We present the discussion forum design, cognitive and social behaviour analysis, grade …


Why Reinventing The Wheels? An Empirical Study On Library Reuse And Re-Implementation, Bowen Xu, Le An, Ferdian Thung, Foutse Khomh, David Lo Sep 2019

Why Reinventing The Wheels? An Empirical Study On Library Reuse And Re-Implementation, Bowen Xu, Le An, Ferdian Thung, Foutse Khomh, David Lo

Research Collection School Of Computing and Information Systems

Nowadays, with the rapid growth of open source software (OSS), library reuse becomes more and more popular since a large amount of third- party libraries are available to download and reuse. A deeper understanding on why developers reuse a library (i.e., replacing self-implemented code with an external library) or re-implement a library (i.e., replacing an imported external library with self-implemented code) could help researchers better understand the factors that developers are concerned with when reusing code. This understanding can then be used to improve existing libraries and API recommendation tools for researchers and practitioners by using the developers concerns identified …


Efficient Distributed Reachability Querying Of Massive Temporal Graphs, Tianming Zhang, Yunjun Gao, Chen Lu, Wei Guo, Shiliang Pu, Baihua Zheng, Christian S. Jensen Sep 2019

Efficient Distributed Reachability Querying Of Massive Temporal Graphs, Tianming Zhang, Yunjun Gao, Chen Lu, Wei Guo, Shiliang Pu, Baihua Zheng, Christian S. Jensen

Research Collection School Of Computing and Information Systems

Reachability computation is a fundamental graph functionality with a wide range of applications. In spite of this, little work has as yet been done on efficient reachability queries over temporal graphs, which are used extensively to model time-varying networks, such as communication networks, social networks, and transportation schedule networks. Moreover, we are faced with increasingly large real-world temporal networks that may be distributed across multiple data centers. This state of affairs motivates the paper's study of efficient reachability queries on distributed temporal graphs. We propose an efficient index, called Temporal Vertex Labeling (TVL), which is a labeling scheme for distributed …


Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Fu Xiao, Kai Xing, Zheng Yang, Yunhao Liu, Chunyi Peng Sep 2019

Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Fu Xiao, Kai Xing, Zheng Yang, Yunhao Liu, Chunyi Peng

Research Collection School Of Computing and Information Systems

Understanding and predicting cellular traffic at large-scale and fine-granularity is beneficial and valuable to mobile users, wireless carriers and city authorities. Predicting cellular traffic in modern metropolis is particularly challenging because of the tremendous temporal and spatial dynamics introduced by diverse user Internet behaviours and frequent user mobility citywide. In this paper, we characterize and investigate the root causes of such dynamics in cellular traffic through a big cellular usage dataset covering 1.5 million users and 5,929 cell towers in a major city of China. We reveal intensive spatiotemporal dependency even among distant cell towers, which is largely overlooked in …


An Urban Ecohydrological Model To Quantify The Effect Of Vegetation On Urban Climate And Hydrology (Ut&C V1.0), Naika Meili, Gabriele Manoli, Paolo Burlando, Elie Bou-Zeid, Winston T. L. Chow, Andrew M. Coutts, Edoardo Daly, Kerry A. Nice, Matthias Roth, Nigel J. Tapper, Erik Velasco, Enrique R. Vivoni, Simone Fatichi Sep 2019

An Urban Ecohydrological Model To Quantify The Effect Of Vegetation On Urban Climate And Hydrology (Ut&C V1.0), Naika Meili, Gabriele Manoli, Paolo Burlando, Elie Bou-Zeid, Winston T. L. Chow, Andrew M. Coutts, Edoardo Daly, Kerry A. Nice, Matthias Roth, Nigel J. Tapper, Erik Velasco, Enrique R. Vivoni, Simone Fatichi

Research Collection School of Social Sciences

Increasing urbanization is likely to intensify the urban heat island effect, decrease outdoor thermal comfort and enhance runoff generation in cities. Urban green spaces are often proposed as a mitigation strategy to counteract these adverse effects and many recent developments of urban climate models focus on the inclusion of green and blue infrastructure to inform urban planning. However, many models still lack the ability to account for different plant types and oversimplify the interactions between the built environment, vegetation, and hydrology. In this study, we present an urban ecohydrological model, Urban Tethys-Chloris (UT&C), that combines principles of ecosystem modelling with …


Rotation Invariant Convolutions For 3d Point Clouds Deep Learning, Zhiyuan Zhang, Binh-Son Hua, David W. Rosen, Sai-Kit Yeung Sep 2019

Rotation Invariant Convolutions For 3d Point Clouds Deep Learning, Zhiyuan Zhang, Binh-Son Hua, David W. Rosen, Sai-Kit Yeung

Research Collection School Of Computing and Information Systems

Recent progresses in 3D deep learning has shown that it is possible to design special convolution operators to consume point cloud data. However, a typical drawback is that rotation invariance is often not guaranteed, resulting in networks that generalizes poorly to arbitrary rotations. In this paper, we introduce a novel convolution operator for point clouds that achieves rotation invariance. Our core idea is to use low-level rotation invariant geometric features such as distances and angles to design a convolution operator for point cloud learning. The well-known point ordering problem is also addressed by a binning approach seamlessly built into the …


Detecting Toxicity Triggers In Online Discussions, Hamad Bin Khalifa University, Haewoon Kwak Sep 2019

Detecting Toxicity Triggers In Online Discussions, Hamad Bin Khalifa University, Haewoon Kwak

Research Collection School Of Computing and Information Systems

Despite the considerable interest in the detection of toxic comments, there has been little research investigating the causes -- i.e., triggers -- of toxicity. In this work, we first propose a formal definition of triggers of toxicity in online communities. We proceed to build an LSTM neural network model using textual features of comments, and then, based on a comprehensive review of previous literature, we incorporate topical and sentiment shift in interactions as features. Our model achieves an average accuracy of 82.5% of detecting toxicity triggers from diverse Reddit communities.


Self-Refining Deep Symmetry Enhanced Network For Rain Removal, Hong Liu, Hanrong Ye, Xia Li, Wei Shi, Mengyuan Liu, Qianru Sun Sep 2019

Self-Refining Deep Symmetry Enhanced Network For Rain Removal, Hong Liu, Hanrong Ye, Xia Li, Wei Shi, Mengyuan Liu, Qianru Sun

Research Collection School Of Computing and Information Systems

Rain removal aims to remove the rain streaks on rain images. Traditional methods based on convolutional neural network (CNN) have achieved impressive results. However, these methods are under-performed when dealing with tilted rain streaks, because CNN is not equivariant to object rotations. To tackle this problem, we propose the Deep Symmetry Enhanced Network (DSEN) that explicitly extracts and learns from rotation-equivariant features from rain images. In addition, we design a self-refining strategy to remove rain streaks in a coarse-to-fine manner. The key idea is to reuse DSEN with an information link which passes the gradient flow to the finer stage. …


Finding Flaws From Password Authentication Code In Android Apps, Siqi Ma, Elisa Bertino, Surya Nepal, Jianru Li, Ostry Diethelm, Robert H. Deng, Sanjay Jha Sep 2019

Finding Flaws From Password Authentication Code In Android Apps, Siqi Ma, Elisa Bertino, Surya Nepal, Jianru Li, Ostry Diethelm, Robert H. Deng, Sanjay Jha

Research Collection School Of Computing and Information Systems

Password authentication is widely used to validate users’ identities because it is convenient to use, easy for users to remember, and simple to implement. The password authentication protocol transmits passwords in plaintext, which makes the authentication vulnerable to eavesdropping and replay attacks, and several protocols have been proposed to protect against this. However, we find that secure password authentication protocols are often implemented incorrectly in Android applications (apps). To detect the implementation flaws in password authentication code, we propose GLACIATE, a fully automated tool combining machine learning and program analysis. Instead of creating detection templates/rules manually, GLACIATE automatically and accurately …


Can Earables Support Effective User Engagement During Weight-Based Gym Exercises?, Meeralakshmi Radhakrishnan, Archan Misra Sep 2019

Can Earables Support Effective User Engagement During Weight-Based Gym Exercises?, Meeralakshmi Radhakrishnan, Archan Misra

Research Collection School Of Computing and Information Systems

We explore the use of personal ‘earable’ devices (widely used by gym-goers) in providing personalized, quantified insights and feedback to users performing gym exercises. As in-ear sensing by itself is often too weak to pick up exercise-driven motion dynamics, we propose a novel, low-cost system that can monitor multiple concurrent users by fusing data from (a) wireless earphones, equipped with inertial and physiological sensors and (b) inertial sensors attached to exercise equipment. We share preliminary findings from a small-scale study to demonstrate the promise of this approach, as well as identify open challenges.


Confusion And Information Triggered By Photos In Persona Profiles, Joni Salminen, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Lene Nielsen, Bernard J. Jansen Sep 2019

Confusion And Information Triggered By Photos In Persona Profiles, Joni Salminen, Soon-Gyo Jung, Jisun An, Haewoon Kwak, Lene Nielsen, Bernard J. Jansen

Research Collection School Of Computing and Information Systems

We investigate whether additional photos beyond a single headshot makes a persona profile more informative without confusing the end user. We conduct an eye-tracking experiment and qualitative interviews with digital content creators after varying the persona in photos via a single headshot, a headshot and photo of the persona in different contexts, and a headshot with photos of different people with key persona attributes the gender and age. Findings show that contextual photos provide significantly more persona information to end users; however, showing photos of multiple people engenders confusion and lowers informativeness. Also, as anticipated, viewing additional photos requires more …


Automatic Generation Of Non-Intrusive Updates For Third-Party Libraries In Android Applications, Yue Duan, Lian Gao, Jie Hu, Heng Yin Sep 2019

Automatic Generation Of Non-Intrusive Updates For Third-Party Libraries In Android Applications, Yue Duan, Lian Gao, Jie Hu, Heng Yin

Research Collection School Of Computing and Information Systems

Third-Party libraries, which are ubiquitous in Android apps,have exposed great security threats to end users as they rarelyget timely updates from the app developers, leaving manysecurity vulnerabilities unpatched. This issue is due to thefact that manually updating libraries can be technically nontrivialand time-consuming for app developers. In this paper,we propose a technique that performs automatic generationof non-intrusive updates for third-party libraries in Androidapps. Given an Android app with an outdated library and anewer version of the library, we automatically update the oldlibrary in a way that is guaranteed to be fully backward compatibleand imposes zero impact to the library’s interactionswith …


Be Sensitive And Collaborative: Analyzing Impact Of Coverage Metrics In Greybox Fuzzing, Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song Sep 2019

Be Sensitive And Collaborative: Analyzing Impact Of Coverage Metrics In Greybox Fuzzing, Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song

Research Collection School Of Computing and Information Systems

Coverage-guided greybox fuzzing has become one of the most common techniques for finding software bugs. Coverage metric, which decides how a fuzzer selects new seeds, is an essential parameter of fuzzing and can significantly affect the results. While there are many existing works on the effectiveness of different coverage metrics on software testing, little is known about how different coverage metrics could actually affect the fuzzing results in practice. More importantly, it is unclear whether there exists one coverage metric that is superior to all the other metrics. In this paper, we report the first systematic study on the impact …


A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses, Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong Sep 2019

A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses, Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong

Research Collection School Of Computing and Information Systems

First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed Linkable Ring Signature and a corresponding Key Derivation Mechanism (KeyDerM) for keeping the payer and payee of a transaction anonymous and unlinkable. The KeyDerM is used for generating a fresh signing key and the corresponding public key, referred to as a stealth address, for the transaction payee. The stealth address will then be used in the linkable ring signature next time when the payee spends the coin. However, in all existing works, including Monero, the privacy model only considers the two cryptographic primitives separately. In addition, to be …


Lightweight Fine-Grained Search Over Encrypted Data In Fog Computing, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li Sep 2019

Lightweight Fine-Grained Search Over Encrypted Data In Fog Computing, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li

Research Collection School Of Computing and Information Systems

Fog computing, as an extension of cloud computing, outsources the encrypted sensitive data to multiple fog nodes on the edge of Internet of Things (IoT) to decrease latency and network congestion. However, the existing ciphertext retrieval schemes rarely focus on the fog computing environment and most of them still impose high computational and storage overhead on resource-limited end users. In this paper, we first present a Lightweight Fine-Grained ciphertexts Search (LFGS) system in fog computing by extending Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Searchable Encryption (SE) technologies, which can achieve fine-grained access control and keyword search simultaneously. The LFGS can shift …


Puncturable Proxy Re-Encryption Supporting To Group Messaging Service, Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu Sep 2019

Puncturable Proxy Re-Encryption Supporting To Group Messaging Service, Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu

Research Collection School Of Computing and Information Systems

This work envisions a new encryption primitive for many-to-many paradigms such as group messaging systems. Previously, puncturable encryption (PE) was introduced to provide forward security for asynchronous messaging services. However, existing PE schemes were proposed only for one-to-one communication, and causes a significant overhead for a group messaging system. In fact, the group communication over PE can only be achieved by encrypting a message multiple times for each receiver by the sender’s device, which is usually suitable to restricted resources such as mobile phones or sensor devices. Our new suggested scheme enables to re-encrypt ciphertexts of puncturable encryption by a …


Efficient Oblivious Transfer With Membership Verification, Weiwei Liu, Dazhi Sun, Yangguang Tian Sep 2019

Efficient Oblivious Transfer With Membership Verification, Weiwei Liu, Dazhi Sun, Yangguang Tian

Research Collection School Of Computing and Information Systems

In this article, we introduce a new concept of oblivious transfer with membership verification that allows any legitimate group users to obtain services from a service provider in an oblivious manner. We present two oblivious transfer with membership verification schemes, differing in design. In the first scheme, a trusted group manager issues credentials for a pre-determined group of users so that the group of users with a valid group credential can obtain services from the service provider, while the choices made by group users remain oblivious to the service provider. The second scheme avoids the trusted group manager, which allows …


Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh Sep 2019

Exploiting Approximation, Caching And Specialization To Accelerate Vision Sensing Applications, Nguyen Loc Huynh

Dissertations and Theses Collection (Open Access)

Over the past few years, deep learning has emerged as state-of-the-art solutions for many challenging computer vision tasks such as face recognition, object detection, etc. Despite of its outstanding performance, deep neural networks (DNNs) are computational intensive, which prevent them to be widely adopted on billions of mobile and embedded devices with scarce resources. To address that limitation, we
focus on building systems and optimization algorithms to accelerate those models, making them more computational-efficient.
First, this thesis explores the computational capabilities of different existing processors (or co-processors) on modern mobile devices. It recognizes that by leveraging the mobile Graphics Processing …


Generating Expensive Relationship Features From Cheap Objects, Xiaogang Wang, Qianru Sun, Tat-Seng Chua, Marcelo Ang Sep 2019

Generating Expensive Relationship Features From Cheap Objects, Xiaogang Wang, Qianru Sun, Tat-Seng Chua, Marcelo Ang

Research Collection School Of Computing and Information Systems

We investigate the problem of object relationship classification of visual scenes. For a relationship object1-predicate-object2 that captures the object interaction, its representation is composed by the combination of object1 and object2 features. As a result, relationship classification models usually bias to the frequent objects, leading to poor generalization to rare or unseen objects. Inspired by the data augmentation methods, we propose a novel Semantic Transform Generative Adversarial Network (ST-GAN) that synthesizes relationship features for rare objects, conditioned on the features from random instances of the objects. Specifically, ST-GAN essentially offers a semantic transform function from cheap object features to expensive …


A Case Study On Automated Fuzz Target Generation For Large Codebases, Matthew Kelly, Christoph Treude, Alex Murray Sep 2019

A Case Study On Automated Fuzz Target Generation For Large Codebases, Matthew Kelly, Christoph Treude, Alex Murray

Research Collection School Of Computing and Information Systems

Fuzz Testing is a largely automated testing technique that provides random and unexpected input to a program in attempt to trigger failure conditions. Much of the research conducted thus far into Fuzz Testing has focused on developing improvements to available Fuzz Testing tools and frameworks in order to improve efficiency. In this paper however, we instead look at a way in which we can reduce the amount of developer time required to integrate Fuzz Testing to help maintain an existing codebase. We accomplish this with a new technique for automatically generating Fuzz Targets, the modified versions of programs on which …


A Common Approach For Consumer And Provider Fairness In Recommendations, Dimitris Sacharidis, Kyriakos Mouratidis, Dimitrios Kleftogiannis Sep 2019

A Common Approach For Consumer And Provider Fairness In Recommendations, Dimitris Sacharidis, Kyriakos Mouratidis, Dimitrios Kleftogiannis

Research Collection School Of Computing and Information Systems

We present a common approach for handling consumer and provider fairness in recommendations. Our solution requires defining two key components, a classification of items and a target distribution, which together define the case of perfect fairness. This formulation allows distinct fairness concepts to be specified in a common framework. We further propose a novel reranking algorithm that optimizes for a desired trade-off between utility and fairness of a recommendation list.


Preference Learning And Similarity Learning Perspectives On Personalized Recommendation, Duy Dung Le Sep 2019

Preference Learning And Similarity Learning Perspectives On Personalized Recommendation, Duy Dung Le

Dissertations and Theses Collection (Open Access)

Personalized recommendation, whose objective is to generate a limited list of items (e.g., products on Amazon, movies on Netflix, or pins on Pinterest, etc.) for each user, has gained extensive attention from both researchers and practitioners in the last decade. The necessity of personalized recommendation is driven by the explosion of available options online, which makes it difficult, if not downright impossible, for each user to investigate every option. Product and service providers rely on recommendation algorithms to identify manageable number of the most likely or preferred options to be presented to each user. Also, due to the limited screen …


Enhancing Python Compiler Error Messages Via Stack Overflow, Emillie Thiselton, Christoph Treude Sep 2019

Enhancing Python Compiler Error Messages Via Stack Overflow, Emillie Thiselton, Christoph Treude

Research Collection School Of Computing and Information Systems

Background: Compilers tend to produce cryptic and uninformative error messages, leaving programmers confused and requiring them to spend precious time to resolve the underlying error. To find help, programmers often take to online question-and-answer forums such as Stack Overflow to start discussion threads about the errors they encountered.Aims: We conjecture that information from Stack Overflow threads which discuss compiler errors can be automatically collected and repackaged to provide programmers with enhanced compiler error messages, thus saving programmers' time and energy.Method: We present Pycee, a plugin integrated with the popular Sublime Text IDE to provide enhanced compiler error messages for the …


Foodai: Food Image Recognition Via Deep Learning For Smart Food Logging, Doyen Sahoo, Hao Wang, Ke Shu, Xiongwei Wu, Hung Le, Palakorn Achananuparp, Ee-Peng Lim, Hoi, Steven C. H. Aug 2019

Foodai: Food Image Recognition Via Deep Learning For Smart Food Logging, Doyen Sahoo, Hao Wang, Ke Shu, Xiongwei Wu, Hung Le, Palakorn Achananuparp, Ee-Peng Lim, Hoi, Steven C. H.

Research Collection School Of Computing and Information Systems

An important aspect of health monitoring is effective logging of food consumption. This can help management of diet-related diseases like obesity, diabetes, and even cardiovascular diseases. Moreover, food logging can help fitness enthusiasts, and people who wanting to achieve a target weight. However, food-logging is cumbersome, and requires not only taking additional effort to note down the food item consumed regularly, but also sufficient knowledge of the food item consumed (which is difficult due to the availability of a wide variety of cuisines). With increasing reliance on smart devices, we exploit the convenience offered through the use of smart phones …