Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 631 - 660 of 7446

Full-Text Articles in Physical Sciences and Mathematics

An Efficient Hybrid Genetic Algorithm For The Quadratic Traveling Salesman Problem, Quang Anh Pham, Hoong Chuin Lau, Minh Hoang Ha, Lam Vu Jul 2023

An Efficient Hybrid Genetic Algorithm For The Quadratic Traveling Salesman Problem, Quang Anh Pham, Hoong Chuin Lau, Minh Hoang Ha, Lam Vu

Research Collection School Of Computing and Information Systems

The traveling salesman problem (TSP) is the most well-known problem in combinatorial optimization which hasbeen studied for many decades. This paper focuses on dealing with one of the most difficult TSP variants named thequadratic traveling salesman problem (QTSP) that has numerous planning applications in robotics and bioinformatics.The goal of QTSP is similar to TSP which finds a cycle visiting all nodes exactly once with minimum total costs. However, the costs in QTSP are associated with three vertices traversed in succession (instead of two like in TSP). This leadsto a quadratic objective function that is much harder to solve.To efficiently solve …


Adaptive Split-Fusion Transformer, Zixuan Su, Jingjing Chen, Lei Pang, Chong-Wah Ngo, Yu-Gang Jiang Jul 2023

Adaptive Split-Fusion Transformer, Zixuan Su, Jingjing Chen, Lei Pang, Chong-Wah Ngo, Yu-Gang Jiang

Research Collection School Of Computing and Information Systems

Neural networks for visual content understanding have recently evolved from convolutional ones to transformers. The prior (CNN) relies on small-windowed kernels to capture the regional clues, demonstrating solid local expressiveness. On the contrary, the latter (transformer) establishes long-range global connections between localities for holistic learning. Inspired by this complementary nature, there is a growing interest in designing hybrid models which utilize both techniques. Current hybrids merely replace convolutions as simple approximations of linear projection or juxtapose a convolution branch with attention without considering the importance of local/global modeling. To tackle this, we propose a new hybrid named Adaptive Split-Fusion Transformer …


Discriminative Reasoning With Sparse Event Representation For Document-Level Event-Event Relation Extraction, Changsen Yuan, Heyan Huang, Yixin Cao, Yonggang Wen Jul 2023

Discriminative Reasoning With Sparse Event Representation For Document-Level Event-Event Relation Extraction, Changsen Yuan, Heyan Huang, Yixin Cao, Yonggang Wen

Research Collection School Of Computing and Information Systems

Document-level Event-Event Relation Extraction (DERE) aims to extract relations between events in a document. It challenges conventional sentence-level task (SERE) with difficult long-text understanding. In this paper, we propose a novel DERE model (SENDIR) for better document-level reasoning. Different from existing works that build an event graph via linguistic tools, SENDIR does not require any prior knowledge. The basic idea is to discriminate event pairs in the same sentence or span multiple sentences by assuming their different information density: 1) low density in the document suggests sparse attention to skip irrelevant information. Our module 1 designs various types of attention …


Binalign: Alignment Padding Based Compiler Provenance Recovery, Maliha Ismail, Yan Lin, Donggyun Han, Debin Gao Jul 2023

Binalign: Alignment Padding Based Compiler Provenance Recovery, Maliha Ismail, Yan Lin, Donggyun Han, Debin Gao

Research Collection School Of Computing and Information Systems

Compiler provenance is significant in investigating the source-level indicators of binary code, like development-environment, source compiler, and optimization settings. Not only does compiler provenance analysis have important security applications in malware and vulnerability analysis, but it is also very challenging to extract useful artifacts from binary when high-level language constructs are missing. Previous works applied machine-learning techniques to predict the source compiler of binaries. However, most of the work is done on the binaries compiled on Linux operating system. We highlight the importance and need to explore Windows compilers and the complicated binaries compiled on the latest versions of these …


Diaasq: A Benchmark Of Conversational Aspect-Based Sentiment Quadruple Analysis, Bobo Li, Hao Fei, Fei Li, Yuhan Wu, Jinsong Zhang, Shengqiong Wu, Jingye Li, Yijiang Liu, Lizi Liao, Tat-Seng Chua, Donghong Ji Jul 2023

Diaasq: A Benchmark Of Conversational Aspect-Based Sentiment Quadruple Analysis, Bobo Li, Hao Fei, Fei Li, Yuhan Wu, Jinsong Zhang, Shengqiong Wu, Jingye Li, Yijiang Liu, Lizi Liao, Tat-Seng Chua, Donghong Ji

Research Collection School Of Computing and Information Systems

The rapid development of aspect-based sentiment analysis (ABSA) within recent decades shows great potential for real-world society. The current ABSA works, however, are mostly limited to the scenario of a single text piece, leaving the study in dialogue contexts unexplored. To bridge the gap between fine-grained sentiment analysis and conversational opinion mining, in this work, we introduce a novel task of conversational aspect-based sentiment quadruple analysis, namely DiaASQ, aiming to detect the quadruple of target-aspect-opinion-sentiment in a dialogue. We manually construct a large-scale high-quality DiaASQ dataset in both Chinese and English languages. We deliberately develop a neural model to benchmark …


Finding Causally Different Tests For An Industrial Control System, Christopher M. Poskitt, Yuqi Chen, Jun Sun, Yu Jiang Jul 2023

Finding Causally Different Tests For An Industrial Control System, Christopher M. Poskitt, Yuqi Chen, Jun Sun, Yu Jiang

Research Collection School Of Computing and Information Systems

Industrial control systems (ICSs) are types of cyber-physical systems in which programs, written in languages such as ladder logic or structured text, control industrial processes through sensing and actuating. Given the use of ICSs in critical infrastructure, it is important to test their resilience against manipulations of sensor/actuator inputs. Unfortunately, existing methods fail to test them comprehensively, as they typically focus on finding the simplest-to-craft manipulations for a testing goal, and are also unable to determine when a test is simply a minor permutation of another, i.e. based on the same causal events. In this work, we propose a guided …


Imitation Improvement Learning For Large-Scale Capacitated Vehicle Routing Problems, The Viet Bui, Tien Mai Jul 2023

Imitation Improvement Learning For Large-Scale Capacitated Vehicle Routing Problems, The Viet Bui, Tien Mai

Research Collection School Of Computing and Information Systems

Recent works using deep reinforcement learning (RL) to solve routing problems such as the capacitated vehicle routing problem (CVRP) have focused on improvement learning-based methods, which involve improving a given solution until it becomes near-optimal. Although adequate solutions can be achieved for small problem instances, their efficiency degrades for large-scale ones. In this work, we propose a newimprovement learning-based framework based on imitation learning where classical heuristics serve as experts to encourage the policy model to mimic and produce similar or better solutions. Moreover, to improve scalability, we propose Clockwise Clustering, a novel augmented framework for decomposing large-scale CVRP into …


A Lightweight Privacy-Preserving Path Selection Scheme In Vanets, Guojun Wang, Huijie Yang Jul 2023

A Lightweight Privacy-Preserving Path Selection Scheme In Vanets, Guojun Wang, Huijie Yang

Research Collection School Of Computing and Information Systems

With the rapid development of edge computing, artificial intelligence and other technologies, intelligent transportation services in the vehicular ad hoc networks (VANETs) such as in-vehicle navigation and distress alert are increasingly being widely used in life. Currently, road navigation is an essential service in the vehicle network. However, when a user employs the road navigation service, his private data maybe exposed to roadside nodes. Meanwhile, when the trusted authorization sends the navigation route data to the user, the user can obtain all the road data. Especially, other unrequested data might be related to the military. Therefore, how to achieve secure …


Machine-Learning Approach To Automated Doubt Identification On Stack Overflow Comments To Guide Programming Learners, Tianhao Chen, Eng Lieh Ouh, Kar Way Tan, Siaw Ling Lo Jul 2023

Machine-Learning Approach To Automated Doubt Identification On Stack Overflow Comments To Guide Programming Learners, Tianhao Chen, Eng Lieh Ouh, Kar Way Tan, Siaw Ling Lo

Research Collection School Of Computing and Information Systems

Stack Overflow is a popular Q&A platform for developers to find solutions to programming problems. However, due to the varying quality of user-generated answers, there is a need for ways to help users find high-quality answers. While Stack Overflow's community-based approach can be effective, important technical aspects of the answer need to be captured, and users’ comments might contain doubts regarding these aspects. In this paper, we showed the feasibility of using a machine learning model to identify doubts and conducted data analysis. We found that highly reputed users tend to raise more doubts; most answers have doubt in the …


Semantic-Based Neural Network Repair, Richard Schumi, Jun Sun Jul 2023

Semantic-Based Neural Network Repair, Richard Schumi, Jun Sun

Research Collection School Of Computing and Information Systems

Recently, neural networks have spread into numerous fields including many safety-critical systems. Neural networks are built (and trained) by programming in frameworks such as TensorFlow and PyTorch. Developers apply a rich set of pre-defined layers to manually program neural networks or to automatically generate them (e.g., through AutoML). Composing neural networks with different layers is error-prone due to the non-trivial constraints that must be satisfied in order to use those layers. In this work, we propose an approach to automatically repair erroneous neural networks. The challenge is in identifying a minimal modification to the network so that it becomes valid. …


Towards Omni-Generalizable Neural Methods For Vehicle Routing Problems, Jianan Zhou, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang Jul 2023

Towards Omni-Generalizable Neural Methods For Vehicle Routing Problems, Jianan Zhou, Yaoxin Wu, Wen Song, Zhiguang Cao, Jie Zhang

Research Collection School Of Computing and Information Systems

Learning heuristics for vehicle routing problems (VRPs) has gained much attention due to the less reliance on hand-crafted rules. However, existing methods are typically trained and tested on the same task with a fixed size and distribution (of nodes), and hence suffer from limited generalization performance. This paper studies a challenging yet realistic setting, which considers generalization across both size and distribution in VRPs. We propose a generic meta-learning framework, which enables effective training of an initialized model with the capability of fast adaptation to new tasks during inference. We further develop a simple yet efficient approximation method to reduce …


Modularized Zero-Shot Vqa With Pre-Trained Models, Rui Cao, Jing Jiang Jul 2023

Modularized Zero-Shot Vqa With Pre-Trained Models, Rui Cao, Jing Jiang

Research Collection School Of Computing and Information Systems

Large-scale pre-trained models (PTMs) show great zero-shot capabilities. In this paper, we study how to leverage them for zero-shot visual question answering (VQA).Our approach is motivated by a few observations. First, VQA questions often require multiple steps of reasoning, which is still a capability that most PTMs lack. Second, different steps in VQA reasoning chains require different skills such as object detection and relational reasoning, but a single PTM may not possess all these skills. Third, recent work on zero-shot VQA does not explicitly consider multi-step reasoning chains, which makes them less interpretable compared with a decomposition-based approach. We propose …


Is Web3 Better Than Web2 For Investors? Evidence From Domain Name Auctions, Ping Fan Ke, Yi Meng Lau, Daniel Varghese Hanley Jul 2023

Is Web3 Better Than Web2 For Investors? Evidence From Domain Name Auctions, Ping Fan Ke, Yi Meng Lau, Daniel Varghese Hanley

Research Collection School Of Computing and Information Systems

Blockchain-based assets are commonly believed to attract new investors. To investigate this claim, we compared investor preferences for Web2 and Web3 domain name auctions by analyzing daily auction patterns in Namecheap and OpenSea. Our results indicate that Web3 platforms may attract extreme investors with low or high values as a niche market. We found a significantly higher number of bids per auction, higher average bid prices, and greater price spreads on OpenSea, but a significantly lower number of unique bidders per auction. Our findings highlight the importance of considering the auction platform's characteristics and asset context when evaluating bid patterns …


Balancing Privacy And Flexibility Of Cloud-Based Personal Health Records Sharing System, Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang Jul 2023

Balancing Privacy And Flexibility Of Cloud-Based Personal Health Records Sharing System, Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

The Internet of Things and cloud services have been widely adopted in many applications, and personal health records (PHR) can provide tailored medical care. The PHR data is usually stored on cloud servers for sharing. Weighted attribute-based encryption (ABE) is a practical and flexible technique to protect PHR data. Under a weighted ABE policy, the data user's attributes will be “scored”, if and only if the score reaches the threshold value, he/she can access the data. However, while this approach offers a flexible access policy, the data owners have difficulty controlling their privacy, especially sharing PHR data in collaborative e-health …


Cone: An Efficient Coarse-To-Fine Alignment Framework For Long Video Temporal Grounding, Zhijian Hou, Wanjun Zhong, Lei Ji, Difei Gao, Kun Yan, Wing-Kwong Chan, Chong-Wah Ngo, Mike Z. Shou, Nan. Duan Jul 2023

Cone: An Efficient Coarse-To-Fine Alignment Framework For Long Video Temporal Grounding, Zhijian Hou, Wanjun Zhong, Lei Ji, Difei Gao, Kun Yan, Wing-Kwong Chan, Chong-Wah Ngo, Mike Z. Shou, Nan. Duan

Research Collection School Of Computing and Information Systems

This paper tackles an emerging and challenging problem of long video temporal grounding (VTG) that localizes video moments related to a natural language (NL) query. Compared with short videos, long videos are also highly demanded but less explored, which brings new challenges in higher inference computation cost and weaker multi-modal alignment. To address these challenges, we propose CONE, an efficient COarse-to-fiNE alignment framework. CONE is a plug-and-play framework on top of existing VTG models to handle long videos through a sliding window mechanism. Specifically, CONE (1) introduces a query-guided window selection strategy to speed up inference, and (2) proposes a …


Mdps As Distribution Transformers: Affine Invariant Synthesis For Safety Objectives, S. Akshay, Krishnendu Chatterjee, Tobias Meggendorfer, Dorde Zikelic Jul 2023

Mdps As Distribution Transformers: Affine Invariant Synthesis For Safety Objectives, S. Akshay, Krishnendu Chatterjee, Tobias Meggendorfer, Dorde Zikelic

Research Collection School Of Computing and Information Systems

Markov decision processes can be viewed as transformers of probability distributions. While this view is useful from a practical standpoint to reason about trajectories of distributions, basic reachability and safety problems are known to be computationally intractable (i.e., Skolem-hard) to solve in such models. Further, we show that even for simple examples of MDPs, strategies for safety objectives over distributions can require infinite memory and randomization.In light of this, we present a novel overapproximation approach to synthesize strategies in an MDP, such that a safety objective over the distributions is met. More precisely, we develop a new framework for template-based …


Synthesizing Speech Test Cases With Text-To-Speech? An Empirical Study On The False Alarms In Automated Speech Recognition Testing, Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo Jul 2023

Synthesizing Speech Test Cases With Text-To-Speech? An Empirical Study On The False Alarms In Automated Speech Recognition Testing, Julia Kaiwen Lau, Kelvin Kai Wen Kong, Julian Hao Yong, Per Hoong Tan, Zhou Yang, Zi Qian Yong, Joshua Chern Wey Low, Chun Yong Chong, Mei Kuan Lim, David Lo

Research Collection School Of Computing and Information Systems

Recent studies have proposed the use of Text-To-Speech (TTS) systems to automatically synthesise speech test cases on a scale and uncover a large number of failures in ASR systems. However, the failures uncovered by synthetic test cases may not reflect the actual performance of an ASR system when it transcribes human audio, which we refer to as false alarms. Given a failed test case synthesised from TTS systems, which consists of TTS-generated audio and the corresponding ground truth text, we feed the human audio stating the same text to an ASR system. If human audio can be correctly transcribed, an …


Safe Mdp Planning By Learning Temporal Patterns Of Undesirable Trajectories And Averting Negative Side Effects, Siow Meng Low, Akshat Kumar, Scott Sanner Jul 2023

Safe Mdp Planning By Learning Temporal Patterns Of Undesirable Trajectories And Averting Negative Side Effects, Siow Meng Low, Akshat Kumar, Scott Sanner

Research Collection School Of Computing and Information Systems

In safe MDP planning, a cost function based on the current state and action is often used to specify safety aspects. In real world, often the state representation used may lack sufficient fidelity to specify such safety constraints. Operating based on an incomplete model can often produce unintended negative side effects (NSEs). To address these challenges, first, we associate safety signals with state-action trajectories (rather than just immediate state-action). This makes our safety model highly general. We also assume categorical safety labels are given for different trajectories, rather than a numerical cost function, which is harder to specify by the …


Social Troubleshooting Workshops: Upskilling Students' Soft And Self-Reflection Skills, Sandra Schulz, Rita Garcia, Christoph Treude Jul 2023

Social Troubleshooting Workshops: Upskilling Students' Soft And Self-Reflection Skills, Sandra Schulz, Rita Garcia, Christoph Treude

Research Collection School Of Computing and Information Systems

This poster focuses on workshops to support students’ soft and selfreflection skills during collaborative learning. These workshops intend to help reduce anxiety during group work and to promote inclusive and equitable collaborative learning environments. Unfortunately, single-paced instructional approaches are typically applied in learning environments [3] and do not consider students’ needs when learning nor provide soft-skills guidance that encourages equal participation. The workshops offer educator and student support for equitable group work through upskilling students’ soft skills, such as leadership and communication, that promote better teamwork. By assisting students in developing and practising soft and self-reflection skills, they might have …


Knowledge-Enhanced Mixed-Initiative Dialogue System For Emotional Support Conversations, Yang Deng, Wenxuan Zhang, Yifei Yuan, Wai Lam Jul 2023

Knowledge-Enhanced Mixed-Initiative Dialogue System For Emotional Support Conversations, Yang Deng, Wenxuan Zhang, Yifei Yuan, Wai Lam

Research Collection School Of Computing and Information Systems

Unlike empathetic dialogues, the system in emotional support conversations (ESC) is expected to not only convey empathy for comforting the help-seeker, but also proactively assist in exploring and addressing their problems during the conversation. In this work, we study the problem of mixed-initiative ESC where the user and system can both take the initiative in leading the conversation. Specifically, we conduct a novel analysis on mixed-initiative ESC systems with a tailor-designed schema that divides utterances into different types with speaker roles and initiative types. Four emotional support metrics are proposed to evaluate the mixed-initiative interactions. The analysis reveals the necessity …


Peerda: Data Augmentation Via Modeling Peer Relation For Span Identification Tasks, Weiwen Xu, Xin Li, Yang Deng, Wai Lam, Lidong Bing Jul 2023

Peerda: Data Augmentation Via Modeling Peer Relation For Span Identification Tasks, Weiwen Xu, Xin Li, Yang Deng, Wai Lam, Lidong Bing

Research Collection School Of Computing and Information Systems

Span identification aims at identifying specific text spans from text input and classifying them into pre-defined categories. Different from previous works that merely leverage the Subordinate (SUB) relation (i.e. if a span is an instance of a certain category) to train models, this paper for the first time explores the Peer (PR) relation, which indicates that two spans are instances of the same category and share similar features. Specifically, a novel Peer Data Augmentation (PeerDA) approach is proposed which employs span pairs with the PR relation as the augmentation data for training. PeerDA has two unique advantages: (1) There are …


18 Million Links In Commit Messages: Purpose, Evolution, And Decay, Tao Xiao, Sebastian Baltes, Hideaki Hata, Christoph Treude, Raula Kula, Takashi Ishio, Kenichi Matsumoto Jul 2023

18 Million Links In Commit Messages: Purpose, Evolution, And Decay, Tao Xiao, Sebastian Baltes, Hideaki Hata, Christoph Treude, Raula Kula, Takashi Ishio, Kenichi Matsumoto

Research Collection School Of Computing and Information Systems

Commit messages contain diverse and valuable types of knowledge in all aspects of software maintenance and evolution. Links are an example of such knowledge. Previous work on “9.6 million links in source code comments” showed that links are prone to decay, become outdated, and lack bidirectional traceability. We conducted a large-scale study of 18,201,165 links from commits in 23,110 GitHub repositories to investigate whether they suffer the same fate. Results show that referencing external resources is prevalent and that the most frequent domains other than github.com are the external domains of Stack Overflow and Google Code. Similarly, links serve as …


Air Pollution, Regulations On Emission And Firms' Social Responsibility, Jun Myung Song Jun 2023

Air Pollution, Regulations On Emission And Firms' Social Responsibility, Jun Myung Song

Sim Kee Boon Institute for Financial Economics

This paper examines whether firms adjust their strategy in emission when air pollution is severe. Considering high PM 2.5 as severe air pollution across 65 countries, I show that firms from countries with severe air pollution have low emission score, suggesting that they put less effort in reducing emission. This is because if they improve emission strategy, firm performance deteriorates. However, such relationship disappears when the government’s environmental stringency is strong, suggesting that government’s intervention is crucial for sustainable environment. This paper concludes with analysis on the factors which can mediate the negative impact of air pollution on firms’ emission …


Generalizing Graph Neural Networks Across Graphs, Time, And Tasks, Zhihao Wen Jun 2023

Generalizing Graph Neural Networks Across Graphs, Time, And Tasks, Zhihao Wen

Dissertations and Theses Collection (Open Access)

Graph-structured data are ubiquitous across numerous real-world contexts, encompassing social networks, commercial graphs, bibliographic networks, and biological systems. Delving into the analysis of these graphs can yield significant understanding pertaining to their corresponding application fields.Graph representation learning offers a potent solution to graph analytics challenges by transforming a graph into a low-dimensional space while preserving its information to the greatest extent possible. This conversion into low-dimensional vectors enables the efficient computation of subsequent graph algorithms. The majority of prior research has concentrated on deriving node representations from a single, static graph. However, numerous real-world situations demand rapid generation of representations …


Is Carbon Risk Priced In The Cross Section Of Corporate Bond Returns?, Tinghua Duan, Frank Weikai Li, Quan Wen Jun 2023

Is Carbon Risk Priced In The Cross Section Of Corporate Bond Returns?, Tinghua Duan, Frank Weikai Li, Quan Wen

Research Collection Lee Kong Chian School Of Business

This article examines the pricing of a firm’s carbon risk in the corporate bond market. Contrary to the “carbon risk premium” hypothesis, bonds of more carbon-intensive firms earn significantly lower returns. This effect cannot be explained by a comprehensive list of bond characteristics and exposure to known risk factors. Investigating sources of the low carbon alpha, we find the underperformance of bonds issued by carbon-intensive firms cannot be fully explained by divestment from institutional investors. Instead, our evidence is most consistent with investor underreaction to the predictability of carbon intensity for firm cash-flow news, creditworthiness, and environmental incidents.


Ocapo: Occupancy-Aware, Pdc Control For Open-Plan, Shared Workspaces, Anaradha Ravi, Archan Misra Jun 2023

Ocapo: Occupancy-Aware, Pdc Control For Open-Plan, Shared Workspaces, Anaradha Ravi, Archan Misra

Research Collection School Of Computing and Information Systems

Passive Displacement Cooling (PDC) has gained popularity as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we evaluate the impact of different parameters affecting occupant comfort in a 1000m2 open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort. We tackle two key practical challenges: (a) the zone-level (i.e., occupant-experienced) temperature differs …


Gnnlens: A Visual Analytics Approach For Prediction Error Diagnosis Of Graph Neural Networks., Zhihua Jin, Yong Wang, Qianwen Wang, Yao Ming, Tengfei Ma, Huamin Qu Jun 2023

Gnnlens: A Visual Analytics Approach For Prediction Error Diagnosis Of Graph Neural Networks., Zhihua Jin, Yong Wang, Qianwen Wang, Yao Ming, Tengfei Ma, Huamin Qu

Research Collection School Of Computing and Information Systems

Graph Neural Networks (GNNs) aim to extend deep learning techniques to graph data and have achieved significant progress in graph analysis tasks (e.g., node classification) in recent years. However, similar to other deep neural networks like Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), GNNs behave like a black box with their details hidden from model developers and users. It is therefore difficult to diagnose possible errors of GNNs. Despite many visual analytics studies being done on CNNs and RNNs, little research has addressed the challenges for GNNs. This paper fills the research gap with an interactive visual analysis …


Tracing The Twenty-Year Evolution Of Developing Ai For Eye Screening In Singapore: A Master Chronology Of Sidrp, Selena+ And Eyris, Steven M. Miller Jun 2023

Tracing The Twenty-Year Evolution Of Developing Ai For Eye Screening In Singapore: A Master Chronology Of Sidrp, Selena+ And Eyris, Steven M. Miller

Research Collection School Of Computing and Information Systems

This working paper is entirely comprised of a timeline table that begins in 2002 and runs through mid-2023. Across these two decades, this timeline traces the evolutionary development of the following:

  • The early Singapore R&D efforts to apply software-based image analysis algorithms and methods to analyse eye retina images for diabetic retinopathy and other eye diseases. This was based on a collaboration between the Singapore Eye Research Institute (SERI) and its parent organization, the Singapore National Eye Centre (SNEC), with faculty from the School of Computing at National University of Singapore.
  • The establishment and operation of the Singapore Integrated Diabetic …


Ldptrace: Locally Differentially Private Trajectory Synthesis, Yuntao Du, Yujia Hu, Zhikun Zhang, Ziquan Fang, Lu Chen, Baihua Zheng, Yunjun Gao Jun 2023

Ldptrace: Locally Differentially Private Trajectory Synthesis, Yuntao Du, Yujia Hu, Zhikun Zhang, Ziquan Fang, Lu Chen, Baihua Zheng, Yunjun Gao

Research Collection School Of Computing and Information Systems

Trajectory data has the potential to greatly benefit a wide-range of real-world applications, such as tracking the spread of the disease through people's movement patterns and providing personalized location-based services based on travel preference. However, privacy concerns and data protection regulations have limited the extent to which this data is shared and utilized. To overcome this challenge, local differential privacy provides a solution by allowing people to share a perturbed version of their data, ensuring privacy as only the data owners have access to the original information. Despite its potential, existing point-based perturbation mechanisms are not suitable for real-world scenarios …


Non-Binary Evaluation Of Next-Basket Food Recommendation, Yue Liu, Palakorn Achananuparp, Ee-Peng Lim Jun 2023

Non-Binary Evaluation Of Next-Basket Food Recommendation, Yue Liu, Palakorn Achananuparp, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Next-basket recommendation (NBR) is a recommendation task that predicts a basket or a set of items a user is likely to adopt next based on his/her history of basket adoption sequences. It enables a wide range of novel applications and services from predicting next basket of items for grocery shopping to recommending food items a user is likely to consume together in the next meal. Even though much progress has been made in the algorithmic NBR research over the years, little research has been done to broaden knowledge about the evaluation of NBR methods, which is largely based on the …