Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 721 - 750 of 7453

Full-Text Articles in Physical Sciences and Mathematics

Multi-Lingual Multi-Partite Product Title Matching, Huan Lin Tay, Wei Jie Tay, Hady Wirawan Lauw May 2023

Multi-Lingual Multi-Partite Product Title Matching, Huan Lin Tay, Wei Jie Tay, Hady Wirawan Lauw

Research Collection School Of Computing and Information Systems

In a globalized marketplace, one could access products or services from almost anywhere. However, resolving which product in one language corresponds to another product in a different language remains an under-explored problem. We explore this from two perspectives. First, given two products of different languages, how to assess their similarity that could signal a potential match. Second, given products from various languages, how to arrive at a multi-partite clustering that respects cardinality constraints efficiently. We describe algorithms for each perspective and integrate them into a promising solution validated on real-world datasets.


On-Device Deep Multi-Task Inference Via Multi-Task Zipping, Xiaoxi He, Xu Wang, Zimu Zhou, Jiahang Wu, Zheng Yang, Lothar Thiele May 2023

On-Device Deep Multi-Task Inference Via Multi-Task Zipping, Xiaoxi He, Xu Wang, Zimu Zhou, Jiahang Wu, Zheng Yang, Lothar Thiele

Research Collection School Of Computing and Information Systems

Future mobile devices are anticipated to perceive, understand and react to the world on their own by running multiple correlated deep neural networks locally on-device. Yet the complexity of these deep models needs to be trimmed down both within-model and cross-model to fit in mobile storage and memory. Previous studies squeeze the redundancy within a single model. In this work, we aim to reduce the redundancy across multiple models. We propose Multi-Task Zipping (MTZ), a framework to automatically merge correlated, pre-trained deep neural networks for cross-model compression. Central in MTZ is a layer-wise neuron sharing and incoming weight updating scheme …


Re-Evaluating Natural Intelligence In The Face Of Chatgpt, Elvin T. Lim, Tze K Koh May 2023

Re-Evaluating Natural Intelligence In The Face Of Chatgpt, Elvin T. Lim, Tze K Koh

Research Collection College of Integrative Studies

How will new technologies impact the nature of higher education? Before ChatGPT, the world witnessed major shifts led by innovations in information storage and transmission. Papyrus in ancient Egypt, the Gutenberg press in 15th-century Europe, and the internet in the 20th century were all milestones in the mass dissemination of knowledge.


Generative Stresnet For Crime Prediction, Ba Phong Tran, Hoong Chuin Lau May 2023

Generative Stresnet For Crime Prediction, Ba Phong Tran, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In this work, we combine STResnet (Zhang et al., 2017) with VAE Kingma & Welling (2013) to generate crime distribution. The outputs can be used for downstream tasks such as patrol deployment planning Chase et al. (2021).


Chronos: Time-Aware Zero-Shot Identification Of Libraries From Vulnerability Reports, Yunbo Lyu, Thanh Le Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo May 2023

Chronos: Time-Aware Zero-Shot Identification Of Libraries From Vulnerability Reports, Yunbo Lyu, Thanh Le Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo

Research Collection School Of Computing and Information Systems

Tools that alert developers about library vulnerabilities depend on accurate, up-to-date vulnerability databases which are maintained by security researchers. These databases record the libraries related to each vulnerability. However, the vulnerability reports may not explicitly list every library and human analysis is required to determine all the relevant libraries. Human analysis may be slow and expensive, which motivates the need for automated approaches. Researchers and practitioners have proposed to automatically identify libraries from vulnerability reports using extreme multi-label learning (XML). While state-of-the-art XML techniques showed promising performance, their experimental settings do not practically fit what happens in reality. Previous studies …


Generation-Based Code Review Automation: How Far Are We?, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, Junda He, David Lo May 2023

Generation-Based Code Review Automation: How Far Are We?, Xin Zhou, Kisub Kim, Bowen Xu, Donggyun Han, Junda He, David Lo

Research Collection School Of Computing and Information Systems

Code review is an effective software quality assurance activity; however, it is labor-intensive and time-consuming. Thus, a number of generation-based automatic code review (ACR) approaches have been proposed recently, which leverage deep learning techniques to automate various activities in the code review process (e.g., code revision generation and review comment generation).We find the previous works carry three main limitations. First, the ACR approaches have been shown to be beneficial in each work, but those methods are not comprehensively compared with each other to show their superiority over their peer ACR approaches. Second, general-purpose pre-trained models such as CodeT5 are proven …


Exploring A Gradient-Based Explainable Ai Technique For Time-Series Data: A Case Study Of Assessing Stroke Rehabilitation Exercises, Min Hun Lee, Yi Jing Choy May 2023

Exploring A Gradient-Based Explainable Ai Technique For Time-Series Data: A Case Study Of Assessing Stroke Rehabilitation Exercises, Min Hun Lee, Yi Jing Choy

Research Collection School Of Computing and Information Systems

Explainable artificial intelligence (AI) techniques are increasingly being explored to provide insights into why AI and machine learning (ML) models provide a certain outcome in various applications. However, there has been limited exploration of explainable AI techniques on time-series data, especially in the healthcare context. In this paper, we describe a threshold-based method that utilizes a weakly supervised model and a gradient-based explainable AI technique (i.e. saliency map) and explore its feasibility to identify salient frames of time-series data. Using the dataset from 15 post-stroke survivors performing three upper-limb exercises and labels on whether a compensatory motion is observed or …


Trustworthy And Synergistic Artificial Intelligence For Software Engineering: Vision And Roadmaps, David Lo May 2023

Trustworthy And Synergistic Artificial Intelligence For Software Engineering: Vision And Roadmaps, David Lo

Research Collection School Of Computing and Information Systems

For decades, much software engineering research has been dedicated to devising automated solutions aimed at enhancing developer productivity and elevating software quality. The past two decades have witnessed an unparalleled surge in the development of intelligent solutions tailored for software engineering tasks. This momentum established the Artificial Intelligence for Software Engineering (AI4SE) area, which has swiftly become one of the most active and popular areas within the software engiueering field. This Future of Software Engineering (FoSE) paper navigates through several focal points. It commences with a succinct introduction and history of AI4SE. Thereafter, it underscores the core challenges inherent to …


Ncq: Code Reuse Support For Node.Js Developers, Brittany Reid, Marcelo D'Amorim, Markus Wagner, Christoph Treude May 2023

Ncq: Code Reuse Support For Node.Js Developers, Brittany Reid, Marcelo D'Amorim, Markus Wagner, Christoph Treude

Research Collection School Of Computing and Information Systems

Code reuse is an important part of software development. The adoption of code reuse practices is especially common among Node.js developers. The Node.js package manager, NPM, indexes over 1 Million packages and developers often seek out packages to solve programming tasks. Due to the vast number of packages, selecting the right package is difficult and time consuming. With the goal of improving productivity of developers that heavily reuse code through third-party packages, we present Node Code Query (NCQ), a Read-Eval-Print-Loop environment that allows developers to 1) search for NPM packages using natural language queries, 2) search for code snippets related …


She Elicits Requirements And He Tests: Software Engineering Gender Bias In Large Language Models, Christoph Treude, Hideaki Hata May 2023

She Elicits Requirements And He Tests: Software Engineering Gender Bias In Large Language Models, Christoph Treude, Hideaki Hata

Research Collection School Of Computing and Information Systems

Implicit gender bias in software development is a well-documented issue, such as the association of technical roles with men. To address this bias, it is important to understand it in more detail. This study uses data mining techniques to investigate the extent to which 56 tasks related to software development, such as assigning GitHub issues and testing, are affected by implicit gender bias embedded in large language models. We systematically translated each task from English into a genderless language and back, and investigated the pronouns associated with each task. Based on translating each task 100 times in different permutations, we …


Towards Understanding The Open Source Interest In Gender-Related Github Projects, Rita Garcia, Christoph Treude, Wendy La May 2023

Towards Understanding The Open Source Interest In Gender-Related Github Projects, Rita Garcia, Christoph Treude, Wendy La

Research Collection School Of Computing and Information Systems

The open-source community uses the GitHub platform to exchange and share software applications and services of interest. This paper aims to identify the open-source community’s interest in gender-related projects on GitHub. Our findings create research opportunities and identify resources by the open-source community that promote diversity, equity, and inclusion. We use data mining to identify GitHub projects that focus on gender-related topics. We apply quantitative and qualitative methodologies to examine the projects’ attributes and to classify them within a gender social structure and a gender bias taxonomy. We aim to understand the open-source community’s efforts and interests in gender topics …


Stop Words For Processing Software Engineering Documents: Do They Matter, Yaohou Fan, Chetan Arora, Christoph Treude May 2023

Stop Words For Processing Software Engineering Documents: Do They Matter, Yaohou Fan, Chetan Arora, Christoph Treude

Research Collection School Of Computing and Information Systems

Stop words, which are considered non-predictive, are often eliminated in natural language processing tasks. However, the definition of uninformative vocabulary is vague, so most algorithms use general knowledge-based stop lists to remove stop words. There is an ongoing debate among academics about the usefulness of stop word elimination, especially in domainspecific settings. In this work, we investigate the usefulness of stop word removal in a software engineering context. To do this, we replicate and experiment with three software engineering research tools from related work. Additionally, we construct a corpus of software engineering domain-related text from 10,000 Stack Overflow questions and …


Lpt: Long-Tailed Prompt Tuning For Image Classification, Bowen Dong, Pan Zhou, Shuicheng Yan, Wangmeng Zuo May 2023

Lpt: Long-Tailed Prompt Tuning For Image Classification, Bowen Dong, Pan Zhou, Shuicheng Yan, Wangmeng Zuo

Research Collection School Of Computing and Information Systems

For long-tailed classification tasks, most works often pretrain a big model on a large-scale (unlabeled) dataset, and then fine-tune the whole pretrained model for adapting to long-tailed data. Though promising, fine-tuning the whole pretrained model tends to suffer from high cost in computation and deployment of different models for different tasks, as well as weakened generalization capability for overfitting to certain features of long-tailed data. To alleviate these issues, we propose an effective Long-tailed Prompt Tuning (LPT) method for long-tailed classification tasks. LPT introduces several trainable prompts into a frozen pretrained model to adapt it to long-tailed data. For better …


Towards Understanding Why Mask Reconstruction Pretraining Helps In Downstream Tasks, Jiachun Pan, Pan Zhou, Shuicheng Yan May 2023

Towards Understanding Why Mask Reconstruction Pretraining Helps In Downstream Tasks, Jiachun Pan, Pan Zhou, Shuicheng Yan

Research Collection School Of Computing and Information Systems

For unsupervised pretraining, mask-reconstruction pretraining (MRP) approaches, e.g. MAE (He et al., 2021) and data2vec (Baevski et al., 2022), randomly mask input patches and then reconstruct the pixels or semantic features of these masked patches via an auto-encoder. Then for a downstream task, supervised fine-tuning the pretrained encoder remarkably surpasses the conventional “supervised learning" (SL) trained from scratch. However, it is still unclear 1) how MRP performs semantic feature learning in the pretraining phase and 2) why it helps in downstream tasks. To solve these problems, we first theoretically show that on an auto-encoder of a two/one-layered convolution encoder/decoder, MRP …


Colefunda: Explainable Silent Vulnerability Fix Identification, Jiayuan Zhou, Michael Pacheco, Jinfu Chen, Xing Hu, Xin Xia, David Lo, Ahmed E. Hassan May 2023

Colefunda: Explainable Silent Vulnerability Fix Identification, Jiayuan Zhou, Michael Pacheco, Jinfu Chen, Xing Hu, Xin Xia, David Lo, Ahmed E. Hassan

Research Collection School Of Computing and Information Systems

It is common practice for OSS users to leverage and monitor security advisories to discover newly disclosed OSS vulnerabilities and their corresponding patches for vulnerability remediation. It is common for vulnerability fixes to be publicly available one week earlier than their disclosure. This gap in time provides an opportunity for attackers to exploit the vulnerability. Hence, OSS users need to sense the fix as early as possible so that the vulnerability can be remediated before it is exploited. However, it is common for OSS to adopt a vulnerability disclosure policy which causes the majority of vulnerabilities to be fixed silently, …


Learning-Based Stock Trending Prediction By Incorporating Technical Indicators And Social Media Sentiment, Zhaoxia Wang, Zhenda Hu, Fang Li, Seng-Beng Ho, Erik Cambria May 2023

Learning-Based Stock Trending Prediction By Incorporating Technical Indicators And Social Media Sentiment, Zhaoxia Wang, Zhenda Hu, Fang Li, Seng-Beng Ho, Erik Cambria

Research Collection School Of Computing and Information Systems

Stock trending prediction is a challenging task due to its dynamic and nonlinear characteristics. With the development of social platform and artificial intelligence (AI), incorporating timely news and social media information into stock trending models becomes possible. However, most of the existing works focus on classification or regression problems when predicting stock market trending without fully considering the effects of different influence factors in different phases. To address this gap, this research solves stock trending prediction problem utilizing both technical indicators and sentiments of the social media text as influence factors in different situations. A 3-phase hybrid model is proposed …


Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan May 2023

Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan

Research Collection School Of Computing and Information Systems

Cloud Computing skills have been increasing in demand. Many software engineers are learning these skills and taking cloud certification examinations to be job competitive. Preparing undergraduates to be cloud-certified remains challenging as cloud computing is a relatively new topic in the computing curriculum, and many of these certifications require working experience. In this paper, we report our experiences designing a course with experiential learning to prepare our computing undergraduates to take the cloud certification. We adopt a university project-based experiential learning framework to engage industry partners who provide project requirements for students to develop cloud solutions and an experiential risk …


Assessing The Effectiveness Of A Chatbot Workshop As Experiential Teaching And Learning Tool To Engage Undergraduate Students, Kyong Jin Shim, Thomas Menkhoff, Ying Qian Teo, Clement Shi Qi Ong May 2023

Assessing The Effectiveness Of A Chatbot Workshop As Experiential Teaching And Learning Tool To Engage Undergraduate Students, Kyong Jin Shim, Thomas Menkhoff, Ying Qian Teo, Clement Shi Qi Ong

Research Collection School Of Computing and Information Systems

In this paper, we empirically examine and assess the effectiveness of a chatbot workshop as experiential teaching and learning tool to engage undergraduate students enrolled in an elective course “Doing Business with A.I.” in the Lee Kong Chian School of Business (LKCSB) at Singapore Management University. The chatbot workshop provides non-STEM students with an opportunity to acquire basic skills to build a chatbot prototype using the ‘Dialogflow’ program. The workshop and the experiential learning activity are designed to impart conversation and user-centric design know how and know why to students. A key didactical aspect which informs the design and flow …


Mando-Hgt: Heterogeneous Graph Transformers For Smart Contract Vulnerability Detection, Huu Hoang Nguyen, Nhat Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang May 2023

Mando-Hgt: Heterogeneous Graph Transformers For Smart Contract Vulnerability Detection, Huu Hoang Nguyen, Nhat Minh Nguyen, Chunyao Xie, Zahra Ahmadi, Daniel Kudendo, Thanh-Nam Doan, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Smart contracts in blockchains have been increasingly used for high-value business applications. It is essential to check smart contracts' reliability before and after deployment. Although various program analysis and deep learning techniques have been proposed to detect vulnerabilities in either Ethereum smart contract source code or bytecode, their detection accuracy and scalability are still limited. This paper presents a novel framework named MANDO-HGT for detecting smart contract vulnerabilities. Given Ethereum smart contracts, either in source code or bytecode form, and vulnerable or clean, MANDO-HGT custom-builds heterogeneous contract graphs (HCGs) to represent control-flow and/or function-call information of the code. It then …


Link Prediction On Latent Heterogeneous Graphs, Trung Kien Nguyen, Zemin Liu, Yuan Fang May 2023

Link Prediction On Latent Heterogeneous Graphs, Trung Kien Nguyen, Zemin Liu, Yuan Fang

Research Collection School Of Computing and Information Systems

On graph data, the multitude of node or edge types gives rise to heterogeneous information networks (HINs). To preserve the heterogeneous semantics on HINs, the rich node/edge types become a cornerstone of HIN representation learning. However, in real-world scenarios, type information is often noisy, missing or inaccessible. Assuming no type information is given, we define a so-called latent heterogeneous graph (LHG), which carries latent heterogeneous semantics as the node/edge types cannot be observed. In this paper, we study the challenging and unexplored problem of link prediction on an LHG. As existing approaches depend heavily on type-based information, they are suboptimal …


Contrabert: Enhancing Code Pre-Trained Models Via Contrastive Learning, Shangqing Liu, Bozhi Wu, Xiaofei Xie, Guozhu Meng, Yang. Liu May 2023

Contrabert: Enhancing Code Pre-Trained Models Via Contrastive Learning, Shangqing Liu, Bozhi Wu, Xiaofei Xie, Guozhu Meng, Yang. Liu

Research Collection School Of Computing and Information Systems

Large-scale pre-trained models such as CodeBERT, GraphCodeBERT have earned widespread attention from both academia and industry. Attributed to the superior ability in code representation, they have been further applied in multiple downstream tasks such as clone detection, code search and code translation. However, it is also observed that these state-of-the-art pre-trained models are susceptible to adversarial attacks. The performance of these pre-trained models drops significantly with simple perturbations such as renaming variable names. This weakness may be inherited by their downstream models and thereby amplified at an unprecedented scale. To this end, we propose an approach namely ContraBERT that aims …


Win: Weight-Decay-Integrated Nesterov Acceleration For Adaptive Gradient Algorithms, Pan Zhou, Xingyu Xie, Shuicheng Yan May 2023

Win: Weight-Decay-Integrated Nesterov Acceleration For Adaptive Gradient Algorithms, Pan Zhou, Xingyu Xie, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Training deep networks on large-scale datasets is computationally challenging. In this work, we explore the problem of “how to accelerate adaptive gradient algorithms in a general manner”, and aim to provide practical efficiency-boosting insights. To this end, we propose an effective and general Weight-decay-Integrated Nesterov acceleration (Win) to accelerate adaptive algorithms. Taking AdamW and Adam as examples, we minimize a dynamical loss per iteration which combines the vanilla training loss and a dynamic regularizer inspired by proximal point method (PPM) to improve the convexity of the problem. To introduce Nesterov-alike-acceleration into AdamW and Adam, we respectively use the first- and …


Fine-Grained Commit-Level Vulnerability Type Prediction By Cwe Tree Structure, Shengyi Pan, Lingfeng Bao, Xin Xia, David Lo, Shanping Li May 2023

Fine-Grained Commit-Level Vulnerability Type Prediction By Cwe Tree Structure, Shengyi Pan, Lingfeng Bao, Xin Xia, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

Identifying security patches via code commits to allow early warnings and timely fixes for Open Source Software (OSS) has received increasing attention. However, the existing detection methods can only identify the presence of a patch (i.e., a binary classification) but fail to pinpoint the vulnerability type. In this work, we take the first step to categorize the security patches into fine-grained vulnerability types. Specifically, we use the Common Weakness Enumeration (CWE) as the label and perform fine-grained classification using categories at the third level of the CWE tree. We first formulate the task as a Hierarchical Multi-label Classification (HMC) problem, …


A Study Of Variable-Role-Based Feature Enrichment In Neural Models Of Code, Aftab. Hussain, Md. Rafiqul Islam. Rabin, Bowen. Xu, David Lo, Mohammad Amin. Alipour May 2023

A Study Of Variable-Role-Based Feature Enrichment In Neural Models Of Code, Aftab. Hussain, Md. Rafiqul Islam. Rabin, Bowen. Xu, David Lo, Mohammad Amin. Alipour

Research Collection School Of Computing and Information Systems

Although deep neural models substantially reduce the overhead of feature engineering, the features readily available in the inputs might significantly impact training cost and the performance of the models. In this paper, we explore the impact of an unsuperivsed feature enrichment approach based on variable roles on the performance of neural models of code. The notion of variable roles (as introduced in the works of Sajaniemi et al. [1], [2]) has been found to help students' abilities in programming. In this paper, we investigate if this notion would improve the performance of neural models of code. To the best of …


Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo May 2023

Niche: A Curated Dataset Of Engineered Machine Learning Projects In Python, Ratnadira Widyasari, Zhou Yang, Ferdian Thung, Sheng Qin Sim, Fiona Wee, Camellia Lok, Jack Phan, Haodi Qi, Constance Tan, David Lo, David Lo

Research Collection School Of Computing and Information Systems

Machine learning (ML) has gained much attention and has been incorporated into our daily lives. While there are numerous publicly available ML projects on open source platforms such as GitHub, there have been limited attempts in filtering those projects to curate ML projects of high quality. The limited availability of such a high-quality dataset poses an obstacle to understanding ML projects. To help clear this obstacle, we present NICHE, a manually labelled dataset consisting of 572 ML projects. Based on the evidence of good software engineering practices, we label 441 of these projects as engineered and 131 as non-engineered. This …


What's Behind Tight Deadlines? Business Causes Of Technical Debt, Rodrigo Rebouças De Almeida, Christoph Treude, Uirá Kulesza May 2023

What's Behind Tight Deadlines? Business Causes Of Technical Debt, Rodrigo Rebouças De Almeida, Christoph Treude, Uirá Kulesza

Research Collection School Of Computing and Information Systems

What are the business causes behind tight deadlines? What drives the prioritization of features that pushes quality matters to the back burner? We conducted a survey with 71 experienced practitioners and did a thematic analysis of the openended answers to the question: “Could you give examples of how business may contribute to technical debt?” Business-related causes were organized into two categories: pure-business and business/IT gap, and they were related to ‘tight deadlines’ and ‘features over quality’, the most frequently cited management reasons for technical debt. We contribute a cause-effect model which relates the various business causes of tight deadlines and …


Message From The Chairs: Techdebt 2023, Christoph Treude, Yuanfang Cai, Xin Xia, Zadia Codabux, Hideaki Hata, Florian Deissenboeck, Rodrigo Spinola May 2023

Message From The Chairs: Techdebt 2023, Christoph Treude, Yuanfang Cai, Xin Xia, Zadia Codabux, Hideaki Hata, Florian Deissenboeck, Rodrigo Spinola

Research Collection School Of Computing and Information Systems

Welcome to the 6th ACM/IEEE International Conference on Technical Debt, TechDebt 2023, co-located with the International Conference on Software Engineering (ICSE) 2023, in the beautiful city of Melbourne, Australia. After several years of virtual and hybrid conferences, TechDebt 2023 marks the first predominantly in-person edition of the conference series since the onset of the Covid-19 pandemic.


Neural Episodic Control With State Abstraction, Zhuo Li, Derui Zhu, Yujing Hu, Xiaofei Xie, Lei Ma, Yan Zheng, Yan Song, Yingfeng Chen, Jianjun Zhao May 2023

Neural Episodic Control With State Abstraction, Zhuo Li, Derui Zhu, Yujing Hu, Xiaofei Xie, Lei Ma, Yan Zheng, Yan Song, Yingfeng Chen, Jianjun Zhao

Research Collection School Of Computing and Information Systems

Existing Deep Reinforcement Learning (DRL) algorithms suffer from sample inefficiency.Generally, episodic control-based approaches are solutions that leveragehighly-rewarded past experiences to improve sample efficiency of DRL algorithms.However, previous episodic control-based approaches fail to utilize the latentinformation from the historical behaviors (e.g., state transitions, topological similarities,etc.) and lack scalability during DRL training. This work introducesNeural Episodic Control with State Abstraction (NECSA), a simple but effectivestate abstraction-based episodic control containing a more comprehensive episodicmemory, a novel state evaluation, and a multi-step state analysis. We evaluate ourapproach to the MuJoCo and Atari tasks in OpenAI gym domains. The experimentalresults indicate that NECSA achieves higher …


Resale Hdb Price Prediction Considering Covid-19 Through Sentiment Analysis, Srinaath Anbu Durai, Zhaoxia Wang May 2023

Resale Hdb Price Prediction Considering Covid-19 Through Sentiment Analysis, Srinaath Anbu Durai, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

Twitter sentiment has been used as a predictor to predict price values or trends in both the stock market and housing market. The pioneering works in this stream of research drew upon works in behavioural economics to show that sentiment or emotions impact economic decisions. Latest works in this stream focus on the algorithm used as opposed to the data used. A literature review of works in this stream through the lens of data used shows that there is a paucity of work that considers the impact of sentiments caused due to an external factor on either the stock or …


Wearing Masks Implies Refuting Trump?: Towards Target-Specific User Stance Prediction Across Events In Covid-19 And Us Election 2020, Hong Zhang, Haewoon Kwak, Wei Gao, Jisun An May 2023

Wearing Masks Implies Refuting Trump?: Towards Target-Specific User Stance Prediction Across Events In Covid-19 And Us Election 2020, Hong Zhang, Haewoon Kwak, Wei Gao, Jisun An

Research Collection School Of Computing and Information Systems

People who share similar opinions towards controversial topics could form an echo chamber and may share similar political views toward other topics as well. The existence of such connections, which we call connected behavior, gives researchers a unique opportunity to predict how one would behave for a future event given their past behaviors. In this work, we propose a framework to conduct connected behavior analysis. Neural stance detection models are trained on Twitter data collected on three seemingly independent topics, i.e., wearing a mask, racial equality, and Trump, to detect people’s stance, which we consider as their online behavior in …