Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

Discipline
Keyword
Publication Year
File Type

Articles 1351 - 1380 of 6891

Full-Text Articles in Physical Sciences and Mathematics

Towards Enriching Responses With Crowd-Sourced Knowledge For Task-Oriented Dialogue, Yingxu He, Lizi Liao, Zheng Zhang, Tat-Seng Chua Nov 2021

Towards Enriching Responses With Crowd-Sourced Knowledge For Task-Oriented Dialogue, Yingxu He, Lizi Liao, Zheng Zhang, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Task-oriented dialogue agents are built to assist users in completing various tasks. Generating appropriate responses for satisfactory task completion is the ultimate goal. Hence, as a convenient and straightforward way, metrics such as success rate, inform rate etc., have been widely leveraged to evaluate the generated responses. However, beyond task completion, there are several other factors that largely affect user satisfaction, which remain under-explored. In this work, we focus on analyzing different agent behavior patterns that lead to higher user satisfaction scores. Based on the findings, we design a neural response generation model EnRG. It naturally combines the power of …


Predicting Anti-Asian Hateful Users On Twitter During Covid-19, Jisun An, Haewoon Kwak, Claire Seungeun Lee, Bogang Jun, Yong-Yeol Ahn Nov 2021

Predicting Anti-Asian Hateful Users On Twitter During Covid-19, Jisun An, Haewoon Kwak, Claire Seungeun Lee, Bogang Jun, Yong-Yeol Ahn

Research Collection School Of Computing and Information Systems

We investigate predictors of anti-Asian hate among Twitter users throughout COVID-19. With the rise of xenophobia and polarization that has accompanied widespread social media usage in many nations, online hate has become a major social issue, attracting many researchers. Here, we apply natural language processing techniques to characterize social media users who began to post anti-Asian hate messages during COVID-19. We compare two user groups—those who posted anti-Asian slurs and those who did not—with respect to a rich set of features measured with data prior to COVID-19 and show that it is possible to predict who later publicly posted anti-Asian …


Stock Market Trend Forecasting Based On Multiple Textual Features: A Deep Learning Method, Zhenda Hu, Zhaoxia Wang, Seng-Beng Ho, Ah-Hwee Tan Nov 2021

Stock Market Trend Forecasting Based On Multiple Textual Features: A Deep Learning Method, Zhenda Hu, Zhaoxia Wang, Seng-Beng Ho, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Stock market trend forecasting is a valuable and challenging research task for both industry and academia. In order to explore the influence of stock news information on the stock market trend, a textual embedding construction method is proposed to encode multiple textual features, including topic features, sentiment features, and semantic features extracted from stock news textual content. In addition, a deep learning method is designed by using financial data and multiple textual features obtained from multiple news textual embeddings for short-term stock market trend prediction. For evaluation, extensive experiments on real stock market data are conducted. The experimental results illustrate …


Contrastive Pre-Training Of Gnns On Heterogeneous Graphs, Xunqiang Jiang, Yuanfu Lu, Yuan Fang, Chuan Shi Nov 2021

Contrastive Pre-Training Of Gnns On Heterogeneous Graphs, Xunqiang Jiang, Yuanfu Lu, Yuan Fang, Chuan Shi

Research Collection School Of Computing and Information Systems

While graph neural networks (GNNs) emerge as the state-of-the-art representation learning methods on graphs, they often require a large amount of labeled data to achieve satisfactory performance, which is often expensive or unavailable. To relieve the label scarcity issue, some pre-training strategies have been devised for GNNs, to learn transferable knowledge from the universal structural properties of the graph. However, existing pre-training strategies are only designed for homogeneous graphs, in which each node and edge belongs to the same type. In contrast, a heterogeneous graph embodies rich semantics, as multiple types of nodes interact with each other via different kinds …


Finding A Needle In A Haystack: Automatic Mining Of Silent Vulnerability Fixes, Jiayuan Zhou, Michael Pacheco, Zhiyuan Wan, Xin Xia, David Lo, Yuan Wang, Ahmed E. Hassan Nov 2021

Finding A Needle In A Haystack: Automatic Mining Of Silent Vulnerability Fixes, Jiayuan Zhou, Michael Pacheco, Zhiyuan Wan, Xin Xia, David Lo, Yuan Wang, Ahmed E. Hassan

Research Collection School Of Computing and Information Systems

Following the coordinated vulnerability disclosure model, a vulnerability in open source software (OSS) is suggested to be fixed “silently”, without disclosing the fix until the vulnerability is disclosed. Yet, it is crucial for OSS users to be aware of vulnerability fixes as early as possible, as once a vulnerability fix is pushed to the source code repository, a malicious party could probe for the corresponding vulnerability to exploit it. In practice, OSS users often rely on the vulnerability disclosure information from security advisories (e.g., National Vulnerability Database) to sense vulnerability fixes. However, the time between the availability of a vulnerability …


Cs-Light: Camera Sensing Based Occupancy-Aware Robust Smart Building Lighting Control, Anuradha Ravi, Kasun Pramuditha Gamlath, Siyan Hu, Archan Misra Nov 2021

Cs-Light: Camera Sensing Based Occupancy-Aware Robust Smart Building Lighting Control, Anuradha Ravi, Kasun Pramuditha Gamlath, Siyan Hu, Archan Misra

Research Collection School Of Computing and Information Systems

We describe the practical development of a smart lighting control system, CS-Light, that uses a preexisting surveillance camera infrastructure as the sole sensing substrate. At a high level, the camera feeds are used to both (a) estimate the illuminance of individual, fine-grained (roughly 12m2) sub-regions, and (b) identify sub-regions that have non-transient human occupancy. Subsequently, these estimates are used to perform fine-grained (non-binary) power optimization of a set of LED luminaires, collectively minimizing energy consumption while assuring comfort to human occupants. The key to our approach is the ability to tackle the challenging problem of translating the luminance (pixel intensity) …


Learning To Teach And Learn For Semi-Supervised Few-Shot Image Classification, Xinzhe Li, Jianqiang Huang, Yaoyao Liu, Qin Zhou, Shibao Zheng, Bernt Schiele, Qianru Sun Nov 2021

Learning To Teach And Learn For Semi-Supervised Few-Shot Image Classification, Xinzhe Li, Jianqiang Huang, Yaoyao Liu, Qin Zhou, Shibao Zheng, Bernt Schiele, Qianru Sun

Research Collection School Of Computing and Information Systems

This paper presents a novel semi-supervised few-shot image classification method named Learning to Teach and Learn (LTTL) to effectively leverage unlabeled samples in small-data regimes. Our method is based on self-training, which assigns pseudo labels to unlabeled data. However, the conventional pseudo-labeling operation heavily relies on the initial model trained by using a handful of labeled data and may produce many noisy labeled samples. We propose to solve the problem with three steps: firstly, cherry-picking searches valuable samples from pseudo-labeled data by using a soft weighting network; and then, cross-teaching allows the classifiers to teach mutually for rejecting more noisy …


On Aggregating Salaries Of Occupations From Job Post And Review Data, Chih-Chieh Hung, Ee-Peng Lim Nov 2021

On Aggregating Salaries Of Occupations From Job Post And Review Data, Chih-Chieh Hung, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

The popularity of job websites has significantly changed the way people learn about different occupations. Among the insights offered by these websites are the statistics of occupation salaries which are useful information for job seekers, career coaches, graduating students, and labor related government agencies. Such statistics include the distribution of job salaries of each occupation, such as average or quantiles. However, significant variability in salary (and review salary) can be found among jobs of the same occupation as we gather job post and review data from job websites. Such variability shows the existence of biases, including salary competitiveness in job …


Adaptive Posterior Knowledge Selection For Improving Knowledge-Grounded Dialogue Generation, Weichao Wang, Wei Gao, Shi Feng, Ling Chen, Daling Wang Nov 2021

Adaptive Posterior Knowledge Selection For Improving Knowledge-Grounded Dialogue Generation, Weichao Wang, Wei Gao, Shi Feng, Ling Chen, Daling Wang

Research Collection School Of Computing and Information Systems

In open-domain dialogue systems, knowledge information such as unstructured persona profiles, text descriptions and structured knowledge graph can help incorporate abundant background facts for delivering more engaging and informative responses. Existing studies attempted to model a general posterior distribution over candidate knowledge by considering the entire response utterance as a whole at the beginning of decoding process for knowledge selection. However, a single smooth distribution could fail to model the variability of knowledge selection patterns over different decoding steps, and make the knowledge expression less consistent. To remedy this issue, we propose an adaptive posterior knowledge selection framework, which sequentially …


Fleet Sizing And Allocation For On-Demand Last-Mile Transportation Systems, Karmel Shehadeh, Hai Wang, Peter Zhang Nov 2021

Fleet Sizing And Allocation For On-Demand Last-Mile Transportation Systems, Karmel Shehadeh, Hai Wang, Peter Zhang

Research Collection School Of Computing and Information Systems

The last-mile problem refers to the provision of travel service from the nearest public transportation node to home or other destination. Last-Mile Transportation Systems (LMTS), which have recently emerged, provide on-demand shared transportation. In this paper, we investigate the fleet sizing and allocation problem for the on-demand LMTS. Specifically, we consider the perspective of a last-mile service provider who wants to determine the number of servicing vehicles to allocate to multiple last-mile service regions in a particular city. In each service region, passengers demanding last-mile services arrive in batches, and allocated vehicles deliver passengers to their final destinations. The passenger …


Pruning Meta-Trained Networks For On-Device Adaptation, Dawei Gao, Xiaoxi He, Zimu Zhou, Yongxin Tong, Lothar Thiele Nov 2021

Pruning Meta-Trained Networks For On-Device Adaptation, Dawei Gao, Xiaoxi He, Zimu Zhou, Yongxin Tong, Lothar Thiele

Research Collection School Of Computing and Information Systems

Adapting neural networks to unseen tasks with few training samples on resource-constrained devices benefits various Internet-of-Things applications. Such neural networks should learn the new tasks in few shots and be compact in size. Meta-learning enables few-shot learning, yet the meta-trained networks can be overparameterised. However, naive combination of standard compression techniques like network pruning with meta-learning jeopardises the ability for fast adaptation. In this work, we propose adaptation-aware network pruning (ANP), a novel pruning scheme that works with existing meta-learning methods for a compact network capable of fast adaptation. ANP uses weight importance metric that is based on the sensitivity …


Leap: Leakage-Abuse Attack On Efficiently Deployable, Efficiently Searchable Encryption With Partially Known Dataset, Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng Nov 2021

Leap: Leakage-Abuse Attack On Efficiently Deployable, Efficiently Searchable Encryption With Partially Known Dataset, Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng

Research Collection School Of Computing and Information Systems

Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrialready, practical solutions at the expense of information leakages that are considered acceptable. In particular, ShadowCrypt utilizes a cryptographic approach named “efficiently deployable, efficiently searchable encryption” (EDESE) that reveals the encrypted dataset and the query tokens among other information. However, recent attacks showed that such leakages can be exploited to (partially) recover the underlying keywords of query tokens under certain assumptions on the attacker’s background knowledge. We continue this line of work by presenting LEAP, a new leakageabuse attack on EDESE schemes that can …


Intercept Graph: An Interactive Radial Visualization For Comparison Of State Changes, Shaolun Ruan, Yong Wang, Qiang Guan Nov 2021

Intercept Graph: An Interactive Radial Visualization For Comparison Of State Changes, Shaolun Ruan, Yong Wang, Qiang Guan

Research Collection School Of Computing and Information Systems

State change comparison of multiple data items is often necessary in multiple application domains, such as medical science, financial engineering, sociology, biological science, etc. Slope graphs and grouped bar charts have been widely used to show a “before-and-after” story of different data states and indicate their changes. However, they visualize state changes as either slope or difference of bars, which has been proved less effective for quantitative comparison. Also, both visual designs suffer from visual clutter issues with an increasing number of data items. In this paper, we propose Intercept Graph, a novel visual design to facilitate effective interactive comparison …


K-Sums Clustering: A Stochastic Optimization Approach, Zhao Wan-Lei, Shi Ying Lan, Run-Qing Chen, Chong-Wah Ngo Nov 2021

K-Sums Clustering: A Stochastic Optimization Approach, Zhao Wan-Lei, Shi Ying Lan, Run-Qing Chen, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

In this paper, we revisit the decades-old clustering method k-means. The egg-chicken loop in traditional k-means has been replaced by a pure stochastic optimization procedure. The optimization is undertaken from the perspective of each individual sample. Different from existing incremental k-means, an individual sample is tentatively joined into a new cluster to evaluate its distance to the corresponding new centroid, in which the contribution from this sample is accounted. The sample is moved to this new cluster concretely only after we find the reallocation makes the sample closer to the new centroid than it is to the current one. Compared …


Automating User Notice Generation For Smart Contract Functions, Xing Hu, Zhipeng Gao, Xin Xia, David Lo, Xiaohu Yang Nov 2021

Automating User Notice Generation For Smart Contract Functions, Xing Hu, Zhipeng Gao, Xin Xia, David Lo, Xiaohu Yang

Research Collection School Of Computing and Information Systems

Smart contracts have obtained much attention and are crucial for automatic financial and business transactions. For end-users who have never seen the source code, they can read the user notice shown in end-user client to understand what a transaction does of a smart contract function. However, due to time constraints or lack of motivation, user notice is often missing during the development of smart contracts. For endusers who lack the information of the user notices, there is no easy way for them to check the code semantics of the smart contracts. Thus, in this paper, we propose a new approach …


Profiling Student Learning From Q&A Interactions In Online Discussion Forums, De Lin Ong, Kyong Jin Shim, Gottipati Swapna Nov 2021

Profiling Student Learning From Q&A Interactions In Online Discussion Forums, De Lin Ong, Kyong Jin Shim, Gottipati Swapna

Research Collection School Of Computing and Information Systems

The last two decades have witnessed an explosive growth in technology adoption in education. Proliferation of digital learning resources through Massive Open Online Courses (MOOCs) and social media platforms coupled with significantly lowered cost of learning has brought and is continuing to take education to every doorstep globally. In recent years, the use of asynchronous online discussion forums has become pervasive in tertiary education institutions. Online discussion forums are widely used for facilitating interactions both during the lesson time and beyond. Numerous prior studies have reported benefits of using online discussion forums including enhanced quality of learning, improved level of …


Self-Supervised Multi-Class Pre-Training For Unsupervised Anomaly Detection And Segmentation In Medical Images, Yu Tian, Fengbei Liu, Guansong Pang, Yuanhong Chen, Yuyuan Liu, Johan W. Verjans, Rajvinder Singh Nov 2021

Self-Supervised Multi-Class Pre-Training For Unsupervised Anomaly Detection And Segmentation In Medical Images, Yu Tian, Fengbei Liu, Guansong Pang, Yuanhong Chen, Yuyuan Liu, Johan W. Verjans, Rajvinder Singh

Research Collection School Of Computing and Information Systems

Unsupervised anomaly detection (UAD) that requires only normal (healthy) training images is an important tool for enabling the development of medical image analysis (MIA) applications, such as disease screening, since it is often difficult to collect and annotate abnormal (or disease) images in MIA. However, heavily relying on the normal images may cause the model training to overfit the normal class. Self-supervised pre-training is an effective solution to this problem. Unfortunately, current self-supervision methods adapted from computer vision are sub-optimal for MIA applications because they do not explore MIA domain knowledge for designing the pretext tasks or the training process. …


Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe L. Jiang, Qian Chen, Peng Xu Nov 2021

Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe L. Jiang, Qian Chen, Peng Xu

Research Collection School Of Computing and Information Systems

With the ubiquity of mobile devices and rapid development of cloud computing, mobile cloud computing (MCC) has been considered as an essential computation setting to support complicated, scalable and flexible mobile applications by overcoming the physical limitations of mobile devices with the aid of cloud. In the MCC setting, since many mobile applications (e.g., map apps) interacting with cloud server and application server need to perform computation with the private data of users, it is important to realize secure computation for MCC. In this article, we propose an efficient server-aided secure two-party computation (2PC) protocol for MCC. This is the …


Investigating The Effects Of Dimension-Specific Sentiments On Product Sales: The Perspective Of Sentiment Preferences, Cuiqing Jiang, Jianfei Wang, Qian Tang, Xiaozhong Lyu Nov 2021

Investigating The Effects Of Dimension-Specific Sentiments On Product Sales: The Perspective Of Sentiment Preferences, Cuiqing Jiang, Jianfei Wang, Qian Tang, Xiaozhong Lyu

Research Collection School Of Computing and Information Systems

While literature has reached a consensus on the awareness effect of online word-of-mouth (eWOM), this paper studies its persuasive effect, specifically, the dimension-specific sentiment effects on product sales. We allow the sentiment information in eWOM along different product dimensions to have different persuasive effects on consumers’ purchase decisions. This occurs because of consumers’ sentiment preference, which is defined as the relative importance consumers place on various dimension-specific sentiments. We use an aspect-level sentiment analysis to derive the dimension-specific sentiments and PVAR (panel vector auto-regression) models to estimate their effects on product sales using a movie panel dataset. The findings show …


Figcps: Effective Failure-Inducing Input Generation For Cyber-Physical Systems With Deep Reinforcement Learning, Shaohua Zhang, Shuang Liu, Jun Sun, Yuqi Chen, Wenzhi Huang, Jinyi Liu, Jian Liu, Jianye Hao Nov 2021

Figcps: Effective Failure-Inducing Input Generation For Cyber-Physical Systems With Deep Reinforcement Learning, Shaohua Zhang, Shuang Liu, Jun Sun, Yuqi Chen, Wenzhi Huang, Jinyi Liu, Jian Liu, Jianye Hao

Research Collection School Of Computing and Information Systems

Cyber-Physical Systems (CPSs) are composed of computational control logic and physical processes, that intertwine with each other. CPSs are widely used in various domains of daily life, including those safety-critical systems and infrastructures, such as medical monitoring, autonomous vehicles, and water treatment systems. It is thus critical to effectively test them. However, it is not easy to obtain test cases which can fail the CPS. In this work, we propose a failure-inducing input generation approach FIGCPS for CPS, which requires no knowledge of the CPS under test or any history logs of the CPS which are usually hard to obtain. …


Using Role Play To Develop An Empathetic Mindset In Executive Education, Anuradha Ravi, Kasun Gamlath, Siyan Hu, Archan Misra Nov 2021

Using Role Play To Develop An Empathetic Mindset In Executive Education, Anuradha Ravi, Kasun Gamlath, Siyan Hu, Archan Misra

Research Collection School Of Computing and Information Systems

We describe the practical development of a smart lighting control system, CS-Light, that uses a preexisting surveillance camera infrastructure as the sole sensing substrate. At a high level, the camera feeds are used to both (a) estimate the illuminance of individual, fine-grained (roughly 12m2) sub-regions, and (b) identify sub-regions that have non-transient human occupancy. Subsequently, these estimates are used to perform fine-grained (non-binary) power optimization of a set of LED luminaires, collectively minimizing energy consumption while assuring comfort to human occupants. The key to our approach is the ability to tackle the challenging problem of translating the luminance (pixel intensity) …


Representation Learning On Multi-Layered Heterogeneous Network, Delvin Ce Zhang, Hady W. Lauw Nov 2021

Representation Learning On Multi-Layered Heterogeneous Network, Delvin Ce Zhang, Hady W. Lauw

Research Collection School Of Computing and Information Systems

Network data can often be represented in a multi-layered structure with rich semantics. One example is e-commerce data, containing user-user social network layer and item-item context layer, with cross-layer user-item interactions. Given the dual characters of homogeneity within each layer and heterogeneity across layers, we seek to learn node representations from such a multi-layered heterogeneous network while jointly preserving structural information and network semantics. In contrast, previous works on network embedding mainly focus on single-layered or homogeneous networks with one type of nodes and links. In this paper we propose intra- and cross-layer proximity concepts. Intra-layer proximity simulates propagation along …


Patchnet: Hierarchical Deep Learning-Based Stable Patch Identification For The Linux Kernel, Thong Hoang, Julia Lawall, Yuan Tian, Richard J. Oentaryo, David Lo Nov 2021

Patchnet: Hierarchical Deep Learning-Based Stable Patch Identification For The Linux Kernel, Thong Hoang, Julia Lawall, Yuan Tian, Richard J. Oentaryo, David Lo

Research Collection School Of Computing and Information Systems

Linux kernel stable versions serve the needs of users who value stability of the kernel over new features. The quality of such stable versions depends on the initiative of kernel developers and maintainers to propagate bug fixing patches to the stable versions. Thus, it is desirable to consider to what extent this process can be automated. A previous approach relies on words from commit messages and a small set of manually constructed code features. This approach, however, shows only moderate accuracy. In this paper, we investigate whether deep learning can provide a more accurate solution. We propose PatchNet, a hierarchical …


Efficient Online-Friendly Two-Party Ecdsa Signature, Haiyang Xue, Ho Man Au, Xiang Xie, Hon Tsz Yuen, Handong Cui Nov 2021

Efficient Online-Friendly Two-Party Ecdsa Signature, Haiyang Xue, Ho Man Au, Xiang Xie, Hon Tsz Yuen, Handong Cui

Research Collection School Of Computing and Information Systems

Two-party ECDSA signatures have received much attention due to their widespread deployment in cryptocurrencies. Depending on whether or not the message is required, we could divide two-party signing into two different phases, namely, offline and online. Ideally, the online phase should be made as lightweight as possible. At the same time, the cost of the offline phase should remain similar to that of a normal signature generation. However, the existing two-party protocols of ECDSA are not optimal: either their online phase requires decryption of a ciphertext, or their offline phase needs at least two executions of multiplicative-to-additive conversion which dominates …


Expediting The Accuracy-Improving Process Of Svms For Class Imbalance Learning, Bin Cao, Yuqi Liu, Chenyu Hou, Jing Fan, Baihua Zheng, Jianwei Jin Nov 2021

Expediting The Accuracy-Improving Process Of Svms For Class Imbalance Learning, Bin Cao, Yuqi Liu, Chenyu Hou, Jing Fan, Baihua Zheng, Jianwei Jin

Research Collection School Of Computing and Information Systems

To improve the classification performance of support vector machines (SVMs) on imbalanced datasets, cost-sensitive learning methods have been proposed, e.g., DEC (Different Error Costs) and FSVM-CIL (Fuzzy SVM for Class Imbalance Learning). They relocate the hyperplane by adjusting the costs associated with misclassifying samples. However, the error costs are determined either empirically or by performing an exhaustive search in the parameter space. Both strategies can not guarantee effectiveness and efficiency simultaneously. In this paper, we propose ATEC, a solution that can efficiently find a preferable hyperplane by automatically tuning the error cost for between-class samples. ATEC distinguishes itself from all …


On A Multistage Discrete Stochastic Optimization Problem With Stochastic Constraints And Nested Sampling, Thuy Anh Ta, Tien Mai, Fabian Bastin, Pierre L'Ecuyer Nov 2021

On A Multistage Discrete Stochastic Optimization Problem With Stochastic Constraints And Nested Sampling, Thuy Anh Ta, Tien Mai, Fabian Bastin, Pierre L'Ecuyer

Research Collection School Of Computing and Information Systems

We consider a multistage stochastic discrete program in which constraints on any stage might involve expectations that cannot be computed easily and are approximated by simulation. We study a sample average approximation (SAA) approach that uses nested sampling, in which at each stage, a number of scenarios are examined and a number of simulation replications are performed for each scenario to estimate the next-stage constraints. This approach provides an approximate solution to the multistage problem. To establish the consistency of the SAA approach, we first consider a two-stage problem and show that in the second-stage problem, given a scenario, the …


Disambiguating Mentions Of Api Methods In Stack Overflow Via Type Scoping, Kien Luong, Ferdian Thung, David Lo Oct 2021

Disambiguating Mentions Of Api Methods In Stack Overflow Via Type Scoping, Kien Luong, Ferdian Thung, David Lo

Research Collection School Of Computing and Information Systems

Stack Overflow is one of the most popular venues for developers to find answers to their API-related questions. However, API mentions in informal text content of Stack Overflow are often ambiguous and thus it could be difficult to find the APIs and learn their usages. Disambiguating these API mentions is not trivial, as an API mention can match with names of APIs from different libraries or even the same one. In this paper, we propose an approach called DATYS to disambiguate API mentions in informal text content of Stack Overflow using type scoping. With type scoping, we consider API methods …


Holoboard: A Large-Format Immersive Teaching Board Based On Pseudo Holographics, Jiangtao Gong, Teng Han, Siling Guo, Jiannan Li, Siyu Zha, Liuxin Zhang, Feng Tian, Qianying Wang, Yong Rui Oct 2021

Holoboard: A Large-Format Immersive Teaching Board Based On Pseudo Holographics, Jiangtao Gong, Teng Han, Siling Guo, Jiannan Li, Siyu Zha, Liuxin Zhang, Feng Tian, Qianying Wang, Yong Rui

Research Collection School Of Computing and Information Systems

In this paper, we present HoloBoard, an interactive large-format pseduo-holographic display system for lecture based classes. With its unique properties of immersive visual display and transparent screen, we designed and implemented a rich set of novel interaction techniques like immersive presentation, role-play, and lecturing behind the scene that are potentially valuable for lecturing in class. We conducted a controlled experimental study to compare a HoloBoard class with a normal class through measuring students’ learning outcomes and three dimensions of engagement (i.e., behavioral, emotional, and cognitive engagement). We used pre-/post- knowledge tests and multimodal learning analytics to measure students’ learning outcomes …


A Large-Scale Benchmark For Food Image Segmentation, Xiongwei Wu, Xin Fu, Ying Liu, Ee-Peng Lim, Steven C. H. Hoi, Qianru Sun Oct 2021

A Large-Scale Benchmark For Food Image Segmentation, Xiongwei Wu, Xin Fu, Ying Liu, Ee-Peng Lim, Steven C. H. Hoi, Qianru Sun

Research Collection School Of Computing and Information Systems

Food image segmentation is a critical and indispensible task for developing health-related applications such as estimating food calories and nutrients. Existing food image segmentation models are underperforming due to two reasons: (1) there is a lack of high quality food image datasets with fine-grained ingredient labels and pixel-wise location masks—the existing datasets either carry coarse ingredient labels or are small in size; and (2) the complex appearance of food makes it difficult to localize and recognize ingredients in food images, e.g., the ingredients may overlap one another in the same image, and the identical ingredient may appear distinctly in different …


Route Tapestries: Navigating 360° Virtual Tour Videos Using Slit-Scan Visualizations, Jiannan Li, Jiahe Lyu, Maurício Sousa, Ravin Balakrishnan, Anthony Tang, Tovi Grossman Oct 2021

Route Tapestries: Navigating 360° Virtual Tour Videos Using Slit-Scan Visualizations, Jiannan Li, Jiahe Lyu, Maurício Sousa, Ravin Balakrishnan, Anthony Tang, Tovi Grossman

Research Collection School Of Computing and Information Systems

An increasingly popular way of experiencing remote places is by viewing 360° virtual tour videos, which show the surrounding view while traveling through an environment. However, finding particular locations in these videos can be difficult because current interfaces rely on distorted frame previews for navigation. To alleviate this usability issue, we propose Route Tapestries, continuous orthographic-perspective projection of scenes along camera routes. We first introduce an algorithm for automatically constructing Route Tapestries from a 360° video, inspired by the slit-scan photography technique. We then present a desktop video player interface using a Route Tapestry timeline for navigation. An online evaluation …