Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 7445

Full-Text Articles in Physical Sciences and Mathematics

Reinforcement Learning For Strategic Airport Slot Scheduling: Analysis Of State Observations And Reward Designs, Anh Nguyen-Duy, Duc-Thinh Pham, Jian-Yi Lye, Nguyen Binh Duong Ta Jul 2024

Reinforcement Learning For Strategic Airport Slot Scheduling: Analysis Of State Observations And Reward Designs, Anh Nguyen-Duy, Duc-Thinh Pham, Jian-Yi Lye, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Due to the NP-hard nature, the strategic airport slot scheduling problem is calling for exploring sub-optimal approaches, such as heuristics and learning-based approaches. Moreover, the continuous increase in air traffic demand requires approaches that can work well in new scenarios. While heuristics rely on a fixed set of rules, which limits the ability to explore new solutions, Reinforcement Learning offers a versatile framework to automate the search and generalize to unseen scenarios. Finding a suitable state observation and reward structure design is essential in using Reinforcement Learning. In this paper, we investigate the impact of providing the Reinforcement Learning agent …


Sequential Decision Learning For Social Good And Fairness, Dexun Li Jul 2024

Sequential Decision Learning For Social Good And Fairness, Dexun Li

Dissertations and Theses Collection (Open Access)

Sequential decision learning is one of the key research areas in artificial intelligence. Typically, a sequence of events is observed through a transformation that introduces uncertainty into the observations and based on these observations, the recognition process produces a hypothesis of the underlying events. This learning process is characterized by maximizing the sum of the reward signals. However, many real-life problems are inherently constrained by limited resources. Besides, when the learning algorithms are used to inform decisions involving human beings (e.g., Security and justice, health intervention, etc), they may inherit the potential, pre-existing bias in the dataset and exhibit similar …


Creating And Delivering Audio Descriptions For Videos, Rosiana Natalie Jul 2024

Creating And Delivering Audio Descriptions For Videos, Rosiana Natalie

Dissertations and Theses Collection (Open Access)

Despite anti-discrimination regulations mandating the provision of audio descriptions (ADs), the majority of online video content remains inaccessible to blind and low-vision (BLV) individuals. This is because these ADs are either absent or fail to adequately address the diverse and unique needs of the audience. Traditionally, content creators have relied on professionals to author ADs. However, this gold standard may not be accessible for some content creators because this method is still costly and has a long turnaround time. Moreover, when ADs are available, they tend to be static and unalterable, failing to cater to the unique preferences of BLV …


Certified Robust Accuracy Of Neural Networks Are Bounded Due To Bayes Errors, Ruihan Zhang, Jun Sun Jul 2024

Certified Robust Accuracy Of Neural Networks Are Bounded Due To Bayes Errors, Ruihan Zhang, Jun Sun

Research Collection School Of Computing and Information Systems

Adversarial examples pose a security threat to many critical systems built on neural networks. While certified training improves robustness, it also decreases accuracy noticeably. Despite various proposals for addressing this issue, the significant accuracy drop remains. More importantly, it is not clear whether there is a certain fundamental limit on achieving robustness whilst maintaining accuracy. In this work, we offer a novel perspective based on Bayes errors. By adopting Bayes error to robustness analysis, we investigate the limit of certified robust accuracy, taking into account data distribution uncertainties. We first show that the accuracy inevitably decreases in the pursuit of …


Towards Automated Slide Augmentation To Discover Credible And Relevant Links, Dilan Dinushka Senarath Arachchige, Christopher M. Poskitt, Kwan Chin (Xu Guangjin) Koh, Heng Ngee Mok, Hady Wirawan Lauw Jul 2024

Towards Automated Slide Augmentation To Discover Credible And Relevant Links, Dilan Dinushka Senarath Arachchige, Christopher M. Poskitt, Kwan Chin (Xu Guangjin) Koh, Heng Ngee Mok, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

Learning from concise educational materials, such as lecture notes and presentation slides, often prompts students to seek additional resources. Newcomers to a subject may struggle to find the best keywords or lack confidence in the credibility of the supplementary materials they discover. To address these problems, we introduce Slide++, an automated tool that identifies keywords from lecture slides, and uses them to search for relevant links, videos, and Q&As. This interactive website integrates the original slides with recommended resources, and further allows instructors to 'pin' the most important ones. To evaluate the effectiveness of the tool, we trialled the system …


Jigsaw: Edge-Based Streaming Perception Over Spatially Overlapped Multi-Camera Deployments, Ila Gokarn, Yigong Hu, Tarek Abdelzaher, Archan Misra Jul 2024

Jigsaw: Edge-Based Streaming Perception Over Spatially Overlapped Multi-Camera Deployments, Ila Gokarn, Yigong Hu, Tarek Abdelzaher, Archan Misra

Research Collection School Of Computing and Information Systems

We present JIGSAW, a novel system that performs edge-based streaming perception over multiple video streams, while additionally factoring in the redundancy offered by the spatial overlap often exhibited in urban, multi-camera deployments. To assure high streaming throughput, JIGSAW extracts and spatially multiplexes multiple regions-of-interest from different camera frames into a smaller canvas frame. Moreover, to ensure that perception stays abreast of evolving object kinematics, JIGSAW includes a utility-based weighted scheduler to preferentially prioritize and even skip object-specific tiles extracted from an incoming stream of camera frames. Using the CityflowV2 traffic surveillance dataset, we show that JIGSAW can simultaneously process 25 …


Generalization Analysis Of Deep Nonlinear Matrix Completion, Antoine Ledent, Rodrigo Alves Jul 2024

Generalization Analysis Of Deep Nonlinear Matrix Completion, Antoine Ledent, Rodrigo Alves

Research Collection School Of Computing and Information Systems

We provide generalization bounds for matrix completion with Schatten $p$ quasi-norm constraints, which is equivalent to deep matrix factorization with Frobenius constraints. In the uniform sampling regime, the sample complexity scales like $\widetilde{O}\left( rn\right)$ where $n$ is the size of the matrix and $r$ is a constraint of the same order as the ground truth rank in the isotropic case. In the distribution-free setting, the bounds scale as $\widetilde{O}\left(r^{1-\frac{p}{2}}n^{1+\frac{p}{2}}\right)$, which reduces to the familiar $\sqrt{r}n^{\frac{3}{2}}$ for $p=1$. Furthermore, we provide an analogue of the weighted trace norm for this setting which brings the sample complexity down to $\widetilde{O}(nr)$ in all …


How People Prompt Generative Ai To Create Interactive Vr Scenes, Setareh Aghel Manesh, Tianyi Zhang, Yuki Onishi, Kotaro Hara, Scott Bateman, Jiannan Li, Anthony Tang Jul 2024

How People Prompt Generative Ai To Create Interactive Vr Scenes, Setareh Aghel Manesh, Tianyi Zhang, Yuki Onishi, Kotaro Hara, Scott Bateman, Jiannan Li, Anthony Tang

Research Collection School Of Computing and Information Systems

Generative AI tools can provide people with the ability to create virtual environments and scenes with natural language prompts. Yet, how people will formulate such prompts is unclear---particularly when they inhabit the environment that they are designing. For instance, it is likely that a person might say, "Put a chair here,'' while pointing at a location. If such linguistic and embodied features are common to people's prompts, we need to tune models to accommodate them. In this work, we present a Wizard of Oz elicitation study with 22 participants, where we studied people's implicit expectations when verbally prompting such programming …


A Deep Learning Method To Predict Bacterial Adp-Ribosyltransferase Toxins, Dandan Zheng, Siyu Zhou, Lihong Chen, Guansong Pang, Jian Yang Jul 2024

A Deep Learning Method To Predict Bacterial Adp-Ribosyltransferase Toxins, Dandan Zheng, Siyu Zhou, Lihong Chen, Guansong Pang, Jian Yang

Research Collection School Of Computing and Information Systems

Motivation: ADP-ribosylation is a critical modification involved in regulating diverse cellular processes, including chromatin structure regulation, RNA transcription, and cell death. Bacterial ADP-ribosyltransferase toxins (bARTTs) serve as potent virulence factors that orchestrate the manipulation of host cell functions to facilitate bacterial pathogenesis. Despite their pivotal role, the bioinformatic identification of novel bARTTs poses a formidable challenge due to limited verified data and the inherent sequence diversity among bARTT members. Results: We proposed a deep learning-based model, ARTNet, specifically engineered to predict bARTTs from bacterial genomes. Initially, we introduced an effective data augmentation method to address the issue of data scarcity …


Large Language Model Powered Agents For Information Retrieval, An Zhang, Yang Deng, Yankai Lin, Xu Chen, Ji-Rong Wen, Tat-Seng Chua Jul 2024

Large Language Model Powered Agents For Information Retrieval, An Zhang, Yang Deng, Yankai Lin, Xu Chen, Ji-Rong Wen, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

The vital goal of information retrieval today extends beyond merely connecting users with relevant information they search for. It also aims to enrich the diversity, personalization, and interactivity of that connection, ensuring the information retrieval process is as seamless, beneficial, and supportive as possible in the global digital era. Current information retrieval systems often encounter challenges like a constrained understanding of queries, static and inflexible responses, limited personalization, and restricted interactivity. With the advent of large language models (LLMs), there's a transformative paradigm shift as we integrate LLM-powered agents into these systems. These agents bring forth crucial human capabilities like …


Microkarta: Visualising Microservice Architectures, Oscar Manglaras, Alex Farkas, Peter Fule, Christoph Treude, Markus Wagner Jul 2024

Microkarta: Visualising Microservice Architectures, Oscar Manglaras, Alex Farkas, Peter Fule, Christoph Treude, Markus Wagner

Research Collection School Of Computing and Information Systems

Conceptualising and debugging a microservice architecture can be a challenge for developers due to the complex topology of inter-service communication, which may only apparent when viewing the architecture as a whole. In this paper, we present MicroKarta, a dashboard containing three types of network diagram that visualise complex microservice architectures, and that are designed to address problems faced by developers of these architectures. Initial feedback from industry developers has been positive. This dashboard can be used by developers to explore and debug microservice architectures, and can be used to compare the effectiveness of different types of network visualisation for assisting …


Toward Effective Secure Code Reviews: An Empirical Study Of Security-Related Coding Weaknesses, Wachiraphan Charoenwet, Patanamon Thongtanunam, Thuan Pham, Christoph Treude Jul 2024

Toward Effective Secure Code Reviews: An Empirical Study Of Security-Related Coding Weaknesses, Wachiraphan Charoenwet, Patanamon Thongtanunam, Thuan Pham, Christoph Treude

Research Collection School Of Computing and Information Systems

Identifying security issues early is encouraged to reduce the latent negative impacts on software systems. Code review is a widely-used method that allows developers to manually inspect modified code, catching security issues during a software development cycle. However, existing code review studies often focus on known vulnerabilities, neglecting coding weaknesses, which can introduce real-world security issues that are more visible through code review. The practices of code reviews in identifying such coding weaknesses are not yet fully investigated. To better understand this, we conducted an empirical case study in two large open-source projects, OpenSSL and PHP. Based on 135,560 code …


Partial Solution Based Constraint Solving Cache In Symbolic Execution, Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang Jul 2024

Partial Solution Based Constraint Solving Cache In Symbolic Execution, Ziqi Shuai, Zhenbang Chen, Kelin Ma, Kunlin Liu, Yufeng Zhang, Jun Sun, Ji Wang

Research Collection School Of Computing and Information Systems

Constraint solving is one of the main challenges for symbolic execution. Caching is an effective mechanism to reduce the number of the solver invocations in symbolic execution and is adopted by many mainstream symbolic execution engines. However, caching can not perform well on all programs. How to improve caching’s effectiveness is challenging in general. In this work, we propose a partial solution-based caching method for improving caching’s effectiveness. Our key idea is to utilize the partial solutions inside the constraint solving to generate more cache entries. A partial solution may satisfy other constraints of symbolic execution. Hence, our partial solution-based …


Esem: To Harden Process Synchronization For Servers, Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu Jul 2024

Esem: To Harden Process Synchronization For Servers, Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu

Research Collection School Of Computing and Information Systems

Process synchronization primitives lubricate server computing involving a group of processes as they ensure those processes to properly coordinate their executions for a common purpose such as provisioning a web service. A malfunctioned synchronization due to attacks causes friction among processes and leads to unexpected, and often hard-to-detect, application transaction errors. Unfortunately, synchronization primitives are not naturally protected by existing hardware-assisted isolation techniques e.g., SGX, because their process-oriented isolation conflicts with the primitive's demand for cross-process operations.This paper introduces the Enclave-Semaphore service (ESem) which shelters application semaphores and their operations against kernel-privileged attacks. ESem encapsulates all semaphores in the platform …


Mvmoe: Multi-Task Vehicle Routing Solver With Mixture-Of-Experts, Jianan Zhou, Zhiguang Cao, Yaoxin Wu, Wen Song, Yining Ma, Jie Zhang, Chi Xu Jul 2024

Mvmoe: Multi-Task Vehicle Routing Solver With Mixture-Of-Experts, Jianan Zhou, Zhiguang Cao, Yaoxin Wu, Wen Song, Yining Ma, Jie Zhang, Chi Xu

Research Collection School Of Computing and Information Systems

Learning to solve vehicle routing problems (VRPs) has garnered much attention. However, most neural solvers are only structured and trained independently on a specific problem, making them less generic and practical. In this paper, we aim to develop a unified neural solver that can cope with a range of VRP variants simultaneously. Specifically, we propose a multi-task vehicle routing solver with mixture-of-experts (MVMoE), which greatly enhances the model capacity without a proportional increase in computation. We further develop a hierarchical gating mechanism for the MVMoE, delivering a good trade-off between empirical performance and computational complexity. Experimentally, our method significantly promotes …


Learning Topological Representations With Bidirectional Graph Attention Network For Solving Job Shop Scheduling Problem, Cong Zhang, Zhiguang Cao, Yaoxin Wu, Wen Song, Jing Sun Jul 2024

Learning Topological Representations With Bidirectional Graph Attention Network For Solving Job Shop Scheduling Problem, Cong Zhang, Zhiguang Cao, Yaoxin Wu, Wen Song, Jing Sun

Research Collection School Of Computing and Information Systems

Existing learning-based methods for solving job shop scheduling problems (JSSP) usually use off-the-shelf GNN models tailored to undirected graphs and neglect the rich and meaningful topological structures of disjunctive graphs (DGs). This paper proposes the topology-aware bidirectional graph attention network (TBGAT), a novel GNN architecture based on the attention mechanism, to embed the DG for solving JSSP in a local search framework. Specifically, TBGAT embeds the DG from a forward and a backward view, respectively, where the messages are propagated by following the different topologies of the views and aggregated via graph attention. Then, we propose a novel operator based …


Adaptive Stabilization Based On Machine Learning For Column Generation, Yunzhuang Shen, Yuan Sun, Xiaodong Li, Zhiguang Cao, Eberhard Andrew, Guangquan Zhang Jul 2024

Adaptive Stabilization Based On Machine Learning For Column Generation, Yunzhuang Shen, Yuan Sun, Xiaodong Li, Zhiguang Cao, Eberhard Andrew, Guangquan Zhang

Research Collection School Of Computing and Information Systems

Column generation (CG) is a well-established method for solving large-scale linear programs. It involves iteratively optimizing a subproblem containing a subset of columns and using its dual solution to generate new columns with negative reduced costs. This process continues until the dual values converge to the optimal dual solution to the original problem. A natural phenomenon in CG is the heavy oscillation of the dual values during iterations, which can lead to a substantial slowdown in the convergence rate. Stabilization techniques are devised to accelerate the convergence of dual values by using information beyond the state of the current subproblem. …


Public Data Resources And Total Factor Productivity Of Enterprises: A Quasi-Natural Experiment Based On Local Government Data Opening, Wuping Wu, Qiheng Li, Liuyi Zhang, Yue Zhao Jun 2024

Public Data Resources And Total Factor Productivity Of Enterprises: A Quasi-Natural Experiment Based On Local Government Data Opening, Wuping Wu, Qiheng Li, Liuyi Zhang, Yue Zhao

Research Collection School Of Accountancy

The opening of public data is the government’s major strategic move to release the value of data factor. However, whether these data resources are used by the public to release their value needs to be empirically tested. Therefore, based on the perspective of high-quality development of firms, this paper examines the relation between open public data and firms’ total factor productivity so as to reflect the value of public data resources in driving force of promoting firms’ high-quality development. Taking A-share listed firms from 2010 to 2019 as samples, using a natural experiment based on the launch of the local …


Enhancing Government Service Delivery: A Case Study Of Acqar Implementation And Lessons Learned From Chatgpt Integration In A Singapore Government Agency, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh Jun 2024

Enhancing Government Service Delivery: A Case Study Of Acqar Implementation And Lessons Learned From Chatgpt Integration In A Singapore Government Agency, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh

Research Collection Lee Kong Chian School Of Business

This paper presents the pilot implementation of AI Based Citizen Question-Answer Recommender (ACQAR) as an attempt to enhance citizen service delivery within a Singaporean government agency. Drawing insights from previous studies on the Empath library's use in Service Level Agreement (SLA) prediction and the implementation of the Citizen Question-Answer system (CQAS), we redesigned the pilot system, ACQAR. ACQAR integrates the outputs from Empath X SLA predictor and CQAS as essential inputs to the ChatGPT engine, creating contextually aware responses for customer service officers to use as responses to the citizens.Empath X SLA predictor anticipates the expected service response time based …


Towards Faster Inference Of Transformers: Strategies For Accelerating Decoding Processes, Cunxiao Du Jun 2024

Towards Faster Inference Of Transformers: Strategies For Accelerating Decoding Processes, Cunxiao Du

Dissertations and Theses Collection (Open Access)

This thesis delves into the acceleration and optimization of Transformer inference, a subject of increasing importance with the emergence of Large Language Models (LLMs). The study primarily addresses the challenges posed by two inherent properties of Transformers during inference: the quadratic complexity of the attention mechanism and the sequential nature of autoregressive inference. The research is structured into three main parts. The first part enhances the learning capabilities of non-autoregressive Transformers, achieving a remarkable 15.0x acceleration on machine translation tasks. The following section focuses on lossless acceleration through speculative decoding, where the proposed algorithm, Glide with CAPE, is shown to …


Refining Chatgpt-Generated Code: Characterizing And Mitigating Code Quality Issues, Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, David Lo Jun 2024

Refining Chatgpt-Generated Code: Characterizing And Mitigating Code Quality Issues, Yue Liu, Thanh Le-Cong, Ratnadira Widyasari, David Lo

Research Collection School Of Computing and Information Systems

Since its introduction in November 2022, ChatGPT has rapidly gained popularity due to its remarkable ability in language understanding and human-like responses. ChatGPT, based on GPT-3.5 architecture, has shown great promise for revolutionizing various research fields, including code generation. However, the reliability and quality of code generated by ChatGPT remain unexplored, raising concerns about potential risks associated with the widespread use of ChatGPT-driven code generation.In this article, we systematically study the quality of 4,066 ChatGPT-generated programs of code implemented in two popular programming languages, i.e., Java and Python, for 2,033 programming tasks. The goal of this work is threefold. First, …


Assessing Impact Of Urban Densification On Outdoor Microclimate And Thermal Comfort Using Envi-Met Simulations For Combined Spatial-Climatic Design (Cscd) Approach, Shreya Banerjee, Rachel X.Y. Pek, Sin Kang Yik, Graces N. Ching, Xiang Tian Ho, Dzyuban Yuliya, Peter J. Crank, Juan A. Acero, Winston T. L. Chow Jun 2024

Assessing Impact Of Urban Densification On Outdoor Microclimate And Thermal Comfort Using Envi-Met Simulations For Combined Spatial-Climatic Design (Cscd) Approach, Shreya Banerjee, Rachel X.Y. Pek, Sin Kang Yik, Graces N. Ching, Xiang Tian Ho, Dzyuban Yuliya, Peter J. Crank, Juan A. Acero, Winston T. L. Chow

Research Collection College of Integrative Studies

Future urban planning requires context-specific integration of spatial design and microclimate especially for tropical cities with extreme weather conditions. Thus, we propose a Combined Spatial-Climatic Design approach to assess impact of urban densification on annual outdoor thermal comfort performance employing ENVI-met simulations for Singapore. We first consider building bylaws and residential site guidelines to develop eight urban-density site options for a target population range. We further classify annual weather data into seven weather-types and use them as boundary conditions for the simulations. Comparing such fifty-six combined spatial-climatic simulation outputs by analyzing Outdoor Thermal Comfort Autonomy, we report the influence of …


Network-Based Representations And Dynamic Discrete Choice Models For Multiple Discrete Choice Analysis, Huy Hung Tran, Tien Mai Jun 2024

Network-Based Representations And Dynamic Discrete Choice Models For Multiple Discrete Choice Analysis, Huy Hung Tran, Tien Mai

Research Collection School Of Computing and Information Systems

In many choice modeling applications, consumer demand is frequently characterized as multiple discrete, which means that consumer choose multiple items simultaneously. The analysis and prediction of consumer behavior in multiple discrete choice situations pose several challenges. In this paper, to address this, we propose a random utility maximization (RUM) based model that considers each subset of choice alternatives as a composite alternative, where individuals choose a subset according to the RUM framework. While this approach offers a natural and intuitive modeling approach for multiple-choice analysis, the large number of subsets of choices in the formulation makes its estimation and application …


Smart Hpa: A Resource-Efficient Horizontal Pod Auto-Scaler For Microservice Architectures, Hussain Ahmad, Christoph Treude, Markus Wagner, Claudia Szabo Jun 2024

Smart Hpa: A Resource-Efficient Horizontal Pod Auto-Scaler For Microservice Architectures, Hussain Ahmad, Christoph Treude, Markus Wagner, Claudia Szabo

Research Collection School Of Computing and Information Systems

Microservice architectures have gained prominence in both academia and industry, offering enhanced agility, reusability, and scalability. To simplify scaling operations in microservice architectures, container orchestration platforms such as Kubernetes feature Horizontal Pod Auto-scalers (HPAs) designed to adjust the resources of microservices to accommodate fluctuating workloads. However, existing HPAs are not suitable for resourceconstrained environments, as they make scaling decisions based on the individual resource capacities of microservices, leading to service unavailability and performance degradation. Furthermore, HPA architectures exhibit several issues, including inefficient data processing and a lack of coordinated scaling operations. To address these concerns, we propose Smart HPA, a …


Violet: Visual Analytics For Explainable Quantum Neural Networks, Shaolun Ruan, Zhiding Liang, Qiang Guan, Paul Robert Griffin, Xiaolin Wen, Yanna Lin, Yong Wang Jun 2024

Violet: Visual Analytics For Explainable Quantum Neural Networks, Shaolun Ruan, Zhiding Liang, Qiang Guan, Paul Robert Griffin, Xiaolin Wen, Yanna Lin, Yong Wang

Research Collection School Of Computing and Information Systems

With the rapid development of Quantum Machine Learning, quantum neural networks (QNN) have experienced great advancement in the past few years, harnessing the advantages of quantum computing to significantly speed up classical machine learning tasks. Despite their increasing popularity, the quantum neural network is quite counter-intuitive and difficult to understand, due to their unique quantum-specific layers (e.g., data encoding and measurement) in their architecture. It prevents QNN users and researchers from effectively understanding its inner workings and exploring the model training status. To fill the research gap, we propose VIOLET , a novel visual analytics approach to improve the explainability …


Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye Jun 2024

Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye

Research Collection School Of Computing and Information Systems

The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized list of smart contract weaknesses specific to the Ethereum platform. Despite the SWC Registry not being updated with new entries since 2020, the sustained development of smart contract analysis tools for detecting SWC-listed weaknesses highlights their ongoing significance in the field. However, evaluating these tools has proven challenging due to the absence of a large, unbiased, real-world dataset. To address this problem, we aim to build a large-scale SWC weakness dataset from real-world DApp projects. We recruited 22 participants and spent 44 person-months analyzing 1,199 open-source audit reports …


Inceptionnext: When Inception Meets Convnext, Weihao Yu, Pan Zhou, Shuicheng Yan, Xinchao Wang Jun 2024

Inceptionnext: When Inception Meets Convnext, Weihao Yu, Pan Zhou, Shuicheng Yan, Xinchao Wang

Research Collection School Of Computing and Information Systems

Inspired by the long-range modeling ability of ViTs, large-kernel convolutions are widely studied and adopted recently to enlarge the receptive field and improve model performance, like the remarkable work ConvNeXt which employs 7×7 depthwise convolution. Although such depthwise operator only consumes a few FLOPs, it largely harms the model efficiency on powerful computing devices due to the high memory access costs. For example, ConvNeXtT has similar FLOPs with ResNet-50 but only achieves ∼ 60% throughputs when trained on A100 GPUs with full precision. Although reducing the kernel size of ConvNeXt can improve speed, it results in significant performance degradation, which …


Jollygesture: Exploring Dual-Purpose Gestures In Vr Presentations, Gun Woo Warren Park, Anthony Tang, Fanny Chevalier Jun 2024

Jollygesture: Exploring Dual-Purpose Gestures In Vr Presentations, Gun Woo Warren Park, Anthony Tang, Fanny Chevalier

Research Collection School Of Computing and Information Systems

Virtual reality (VR) offers new opportunities for presenters to use expressive body language to engage their audience. Yet, most VR presentation systems have adopted control mechanisms that mimic those found in face-to-face presentation systems. We explore the use of gestures that have dual-purpose: first, for the audience, a communicative purpose; second, for the presenter, a control purpose to alter content in slides. To support presenters, we provide guidance on what gestures are available and their effects. We realize our design approach in JollyGesture, a VR technology probe that recognizes dual-purpose gestures in a presentation scenario. We evaluate our approach through …


Usability Versus Collectibility In Nft: The Case Of Web3 Domain Names, Ping Fan Ke, Yi Meng Lau Jun 2024

Usability Versus Collectibility In Nft: The Case Of Web3 Domain Names, Ping Fan Ke, Yi Meng Lau

Research Collection School Of Computing and Information Systems

This study examines the market’s inclination towards usability and collectibility aspects of Non-Fungible Tokens (NFTs) within Web3 domain name marketplaces, drawing insights from resale records. Our findings reveal a prevailing preference for usability, as evidenced by consistently higher average resale prices observed for Ethereum Name Service (ENS) domains compared to Linagee Name Registrar (LNR) domains. However, domains with diminished usability, such as those containing non-ASCII characters, tend to attract investors due to their enhanced collectibility. Our analysis on the effect from previous resale suggests a potential aversion towards second-hand acquisitions among NFT investors when value derives primarily from usability, while …


Poster: Profiling Event Vision Processing On Edge Devices, Ila Nitin Gokarn, Archan Misra Jun 2024

Poster: Profiling Event Vision Processing On Edge Devices, Ila Nitin Gokarn, Archan Misra

Research Collection School Of Computing and Information Systems

As RGB camera resolutions and frame-rates improve, their increased energy requirements make it challenging to deploy fast, efficient, and low-power applications on edge devices. Newer classes of sensors, such as the biologically inspired neuromorphic event-based camera, capture only changes in light intensity per-pixel to achieve operational superiority in sensing latency (O(μs)), energy consumption (O(mW)), high dynamic range (140dB), and task accuracy such as in object tracking, over traditional RGB camera streams. However, highly dynamic scenes can yield an event rate of up to 12MEvents/second, the processing of which could overwhelm …