Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

Discipline
Keyword
Publication Year
File Type

Articles 5161 - 5190 of 6891

Full-Text Articles in Physical Sciences and Mathematics

Coordinating Occupant Behavior For Building Energy And Comfort Management Using Multi-Agent Systems, Laura Klein, Jun Young Kwak, Geoffrey Kavulya, Farrokh Jazizadeh, Burcin Becerik-Gerber, Pradeep Varakantham, Milind Tambe Mar 2012

Coordinating Occupant Behavior For Building Energy And Comfort Management Using Multi-Agent Systems, Laura Klein, Jun Young Kwak, Geoffrey Kavulya, Farrokh Jazizadeh, Burcin Becerik-Gerber, Pradeep Varakantham, Milind Tambe

Research Collection School Of Computing and Information Systems

There is growing interest in reducing building energy consumption through increased sensor data and increased computational support for building controls. The goal of reduced building energy is often coupled with the desire for improved occupant comfort. Current building systems are inefficient in their energy usage for maintaining occupant comfort as they operate according to fixed schedules and maximum design occupancy assumptions, and they rely on code defined occupant comfort ranges. This paper presents and implements a multi-agent comfort and energy system (MACES) to model alternative management and control of building systems and occupants. MACES specifically improves upon previous multi-agent systems …


Human: Creating Memorable Fingerprints Of Mobile Users, Gupta Payas, Kiat Wee Tan, Narayanasamy Ramasubbu, David Lo, Debin Gao, Rajesh Krishna Balan Mar 2012

Human: Creating Memorable Fingerprints Of Mobile Users, Gupta Payas, Kiat Wee Tan, Narayanasamy Ramasubbu, David Lo, Debin Gao, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

In this paper, we present a new way of generating behavioral (not biometric) fingerprints from the cellphone usage data. In particular, we explore if the generated behavioral fingerprints are memorable enough to be remembered by end users. We built a system, called HuMan, that generates fingerprints from cellphone data. To test HuMan, we conducted an extensive user study that involved collecting about one month of continuous usage data (including calls, SMSes, application usage patterns etc.) from 44 Symbian and Android smartphone users. We evaluated the memorable fingerprints generated from this rich multi-context data by asking each user to answer various …


Hoare-Style Verification Of Graph Programs, Christopher M. Poskitt, Detlef Plump Mar 2012

Hoare-Style Verification Of Graph Programs, Christopher M. Poskitt, Detlef Plump

Research Collection School Of Computing and Information Systems

GP (for Graph Programs) is an experimental nondeterministic programming language for solving problems on graphs and graph-like structures. The language is based on graph transformation rules, allowing visual programming at a high level of abstraction. In particular, GP frees programmers from dealing with low-level data structures. In this paper, we present a Hoare-style proof system for verifying the partial correctness of (a subset of) graph programs. The pre- and postconditions of the calculus are nested graph conditions with expressions, a formalism for specifying both structural graph properties and properties of labels. We show that our proof system is sound with …


Hierarchical Fuzzy Logic System For Implementing Maintenance Schedules Of Offshore Power Systems, C. S. Chang, Zhaoxia Wang, Fan Yang, W. W. Tan Mar 2012

Hierarchical Fuzzy Logic System For Implementing Maintenance Schedules Of Offshore Power Systems, C. S. Chang, Zhaoxia Wang, Fan Yang, W. W. Tan

Research Collection School Of Computing and Information Systems

Smart grid provides the technology for modernizing electricity delivery systems by using distributed and computer-based remote sensing, control and automation, and two-way communications. Potential benefits of the technology are that the smart grid's central control will now be able to control and operate many remote power plant, optimize the overall asset utilization and operational efficiently. In this paper, we propose an innovative approach for the smart grid to handle uncertainties arising from condition monitoring and maintenance of power plant. The approach uses an adaptive maintenance advisor and a system-maintenance optimizer for designing/implementing optimized condition-based maintenance activities, and collectively handles operational …


Secds: A Secure Epc Discovery Services System In Epcglobal Network, Jie Shi, Darren Sim, Yingjiu Li, Robert H. Deng Feb 2012

Secds: A Secure Epc Discovery Services System In Epcglobal Network, Jie Shi, Darren Sim, Yingjiu Li, Robert H. Deng

Research Collection School Of Computing and Information Systems

In recent years, the Internet of Things (IOT) has drawn considerable attention from the industrial and research communities. Due to the vast amount of data generated through IOT devices and users, there is an urgent need for an effective search engine to help us make sense of this massive amount of data. With this motivation, we begin our initial works on developing a secure and efficient search engine (SecDS) based on EPC Discovery Services (EPCDS) for EPCglobal network, an integral part of IOT. SecDS is designed to provide a bridge between different partners of supply chains to share information while …


Work Item Tagging: Communicating Concerns In Collaborative Software Development, Christoph Treude, Margaret-Anne Storey Feb 2012

Work Item Tagging: Communicating Concerns In Collaborative Software Development, Christoph Treude, Margaret-Anne Storey

Research Collection School Of Computing and Information Systems

In collaborative software development projects, work items are used as a mechanism to coordinate tasks and track shared development work. In this paper, we explore how “tagging,” a lightweight social computing mechanism, is used to communicate matters of concern in the management of development tasks. We present the results from two empirical studies over 36 and 12 months, respectively, on how tagging has been adopted and what role it plays in the development processes of several professional development projects with more than 1,000 developers in total. Our research shows that the tagging mechanism was eagerly adopted by the teams, and …


Manipulation Of Online Reviews: An Analysis Of Ratings, Readability, And Sentiments, Nan Hu, Indranil Bose, Noi Sian Koh, Ling Liu Feb 2012

Manipulation Of Online Reviews: An Analysis Of Ratings, Readability, And Sentiments, Nan Hu, Indranil Bose, Noi Sian Koh, Ling Liu

Research Collection School Of Computing and Information Systems

As consumers become increasingly reliant on online reviews to make purchase decisions, the sales of the product becomes dependent on the word of mouth (WOM) that it generates. As a result, there can be attempts by firms to manipulate online reviews of products to increase their sales. Despite the suspicion on the existence of such manipulation, the amount of such manipulation is unknown, and deciding which reviews to believe in is largely based on the reader's discretion and intuition. Therefore, the success of the manipulation of reviews by firms in generating sales of products is unknown. In this paper, we …


Does Complexity Deter Customer-Focus?, Sendil K. Ethiraj, Narayanasamy Ramasubbu, M. S. Krishnan Feb 2012

Does Complexity Deter Customer-Focus?, Sendil K. Ethiraj, Narayanasamy Ramasubbu, M. S. Krishnan

Research Collection School Of Computing and Information Systems

Economic models suggest that firms use a simple cost-benefit calculation to evaluate customer requests for new product features, but an extensive organizational literature shows the decision to implement innovation is more nuanced. We address this theoretical tension by studying how firms respond to customer requests for incremental product innovations, and how these responses change when the requested innovation is complex. Using large sample empirical analyses combined with detailed qualitative data drawn from interviews, we find considerable variance in the relationship between customer demands, complexity, and investments in incremental innovations. The qualitative study revealed the importance of organization structures, competitive pressures, …


Towards Fine-Grained Radio-Based Indoor Location, Jie Xiong, Kyle Jamieson Feb 2012

Towards Fine-Grained Radio-Based Indoor Location, Jie Xiong, Kyle Jamieson

Research Collection School Of Computing and Information Systems

Location systems are key to a rich experience for mobile users. When they roam outdoors, mobiles can usually count on a clear GPS signal for an accurate location, but indoors, GPS usually fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings for location. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor AP, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. In the near future, the number of antennas at the access point will increase several-fold, to meet …


Mitigating The True Cost Of Advertisement-Supported "Free" Mobile Applications, Azeem J. Khan, Vigneshwaran Subbaraju, Archan Misra, Srinivasan Seshan Feb 2012

Mitigating The True Cost Of Advertisement-Supported "Free" Mobile Applications, Azeem J. Khan, Vigneshwaran Subbaraju, Archan Misra, Srinivasan Seshan

Research Collection School Of Computing and Information Systems

The dominant, "ad-supported free application" model for consumer-oriented mobile computing is seemingly imperiled by the growing global adoption of metered data pricing plans by mobile operators. In this paper, we explore the opportunities for addressing this emerging conflict by enabling more intelligent ad delivery to such mobile devices. One especially promising path is leveraging the increasing availability of heterogeneous wireless access technologies (e.g., WiFi, femtocells) that offer less restrictive and more energy-efficient transport substrates for such data traffic. To understand the possibilities that exist, we first profile the advertisement traffic characteristics for some of the most popular advertisement-supported consumer applications, …


Arivu: Making Networked Mobile Games Green: A Scalable Power-Aware Middleware, Anand Bhojan, Ananda L. Akhihebbal L., Mun Choon Chan, Rajesh Krishna Balan Feb 2012

Arivu: Making Networked Mobile Games Green: A Scalable Power-Aware Middleware, Anand Bhojan, Ananda L. Akhihebbal L., Mun Choon Chan, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

With the improved processing power, graphic quality and high-speed wireless connection in recent generations of mobile phones, it looks more attractive than ever to introduce networked games on these devices. However, these games consume higher levels of energy. While device features and application resource requirements are rapidly growing, the battery technologies are not growing at the same pace. Therefore, the main concern is the limitation of the battery power of such portable devices to support potentially long-hour of game play. In this paper we present ARIVU, a scalable power aware middleware that dynamically controls the energy consumption of wireless interface …


Summarizing Rushes Videos By Motion, Object, And Event Understanding, Feng Wang, Chong-Wah Ngo Feb 2012

Summarizing Rushes Videos By Motion, Object, And Event Understanding, Feng Wang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Rushes footages are considered as cheap gold mine with the potential for reuse in broadcasting and filmmaking industries. However, mining "gold" from unedited videos such as rushes is challenging as the reusable segments are buried in a large set of redundant information. In this paper, we propose a unified framework for stock footage classification and summarization to support video editors in navigating and organizing rushes videos. Our approach is composed of two steps. First, we employ motion features to filter the undesired camera motion and locate the stock footage. A hierarchical hidden Markov model (HHMM) is proposed to model the …


Extreme Learning Machine Terrain-Based Navigation For Unmanned Aerial Vehicles, Ee May Kan, Meng Hiot Lim, Yew Soon Ong, Ah-Hwee Tan, Swee Ping Yeo Feb 2012

Extreme Learning Machine Terrain-Based Navigation For Unmanned Aerial Vehicles, Ee May Kan, Meng Hiot Lim, Yew Soon Ong, Ah-Hwee Tan, Swee Ping Yeo

Research Collection School Of Computing and Information Systems

Unmanned aerial vehicles (UAVs) rely on global positioning system (GPS) information to ascertain its position for navigation during mission execution. In the absence of GPS information, the capability of a UAV to carry out its intended mission is hindered. In this paper, we learn alternative means for UAVs to derive real-time positional reference information so as to ensure the continuity of the mission. We present extreme learning machine as a mechanism for learning the stored digital elevation information so as to aid UAVs to navigate through terrain without the need for GPS. The proposed algorithm accommodates the need of the …


The Social Network Of Software Engineering Research, Subhajit Datta, Nishant Kumar, Santonu Sarkar Feb 2012

The Social Network Of Software Engineering Research, Subhajit Datta, Nishant Kumar, Santonu Sarkar

Research Collection School Of Computing and Information Systems

The social network perspective has served as a useful framework for studying scientific research collaboration in different disciplines. Although collaboration in computer science research has received some attention, software engineering research collaboration has remained unexplored to a large extent. In this paper, we examine the collaboration networks based on co-authorship information of papers from ten software engineering publication venues over the 1976-2010 time period. We compare time variations of certain parameters of these networks with corresponding parameters of collaboration networks from other disciplines. We also explore whether software engineering collaboration networks manifest symptoms of the small-world phenomenon, conform to the …


Formal Modeling And Validation Of Stateflow Diagrams, Chunqing Chen, Jun Sun, Yang Liu, Jin Song Dong, Manchun Zheng Jan 2012

Formal Modeling And Validation Of Stateflow Diagrams, Chunqing Chen, Jun Sun, Yang Liu, Jin Song Dong, Manchun Zheng

Research Collection School Of Computing and Information Systems

Stateflow is an industrial tool for modeling and simulating control systems in model-based development. In this paper, we present our latest work on automatic verification of Stateflow using model-checking techniques. We propose an approach to systematically translate Stateflow diagrams to a formal modeling language called CSP# by precisely following Stateflow’s execution semantics, which is described by examples. A translator is developed inside the Process Analysis Toolkit (PAT) model checker to automate this process with the support of various Stateflow advanced modeling features. Formal analysis can be conducted on the transformed CSP# with PAT’s simulation and model-checking power. Using our approach, …


Content Contribution In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston Jan 2012

Content Contribution In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Social media allows individuals and businesses to contribute contents for public viewing. However, little is known about the underlying incentives that why content providers derive utilities from such activities. In this study, we build a dynamic structural model to recover the utility function for content providers. Our model distinguishes short-term payoffs based on ad revenue sharing from long-term payoffs driven by content providers' reputation. The model was estimated using a panel data of 914 top 1000 video providers on You Tube from Jun 7th, 2010, to Aug 7th, 2011 since top providers are more likely to be encouraged by these …


Systems And Methods For Transaction Account Offerings, Clinton Allen, Michael Digregorio, Glade Erikson, Deepinder Gulati, Jacob Plammoottil Jacob, Sanjiv Khosla, Seema Chokshi Jan 2012

Systems And Methods For Transaction Account Offerings, Clinton Allen, Michael Digregorio, Glade Erikson, Deepinder Gulati, Jacob Plammoottil Jacob, Sanjiv Khosla, Seema Chokshi

Research Collection School Of Computing and Information Systems

A method for receiving a user input for providing offerings is disclosed. Fields may be populated for creating a database query for matching a selection of offerings to a population of customers. Data may be received from the database, in response to interactively building the query and/or executing the query. Multiple rank ordered results may be produced for comparison, wherein the producing uses preprogrammed analytics, data from the database and user input, and wherein the results include customer lists linked to a distinct offering and a preferred delivery channel of the offering to a customer. A transaction account may be …


Information Extraction From Text, Jing Jiang Jan 2012

Information Extraction From Text, Jing Jiang

Research Collection School Of Computing and Information Systems

Information extraction is the task of finding structured information from unstructured or semi-structured text. It is an important task in text mining and has been extensively studied in various research communities including natural language processing, information retrieval and Web mining. It has a wide range of applications in domains such as biomedical literature mining and business intelligence. Two fundamental tasks of information extraction are named entity recognition and relation extraction. The former refers to finding names of entities such as people, organizations and locations. The latter refers to finding the semantic relations such as FounderOf and HeadquarteredIn between entities. In …


Optimal Decision Making For Online Referral Marketing, Zhiling Guo Jan 2012

Optimal Decision Making For Online Referral Marketing, Zhiling Guo

Research Collection School Of Computing and Information Systems

Widely available web 2.0 technologies not only bring rich and interactive user experiences, but also easily help users advertise products or services on their own blogs and social network webpages. Online referral marketing, for example, is a business practice that rewards customers who successfully refer other customers to a website or upon completion of a sale usually via their own social contacts. The referral rewards come in different forms such as shopping vouchers, redeemable points, discounts, prizes, cash payments, etc. We develop an analytical model to evaluate the business potential of incorporating an online referral marketing program into the firm's …


A Fuzzy Logic Multi-Criteria Decision Framework For Selecting It Service Providers, Amir Karami, Zhiling Guo Jan 2012

A Fuzzy Logic Multi-Criteria Decision Framework For Selecting It Service Providers, Amir Karami, Zhiling Guo

Research Collection School Of Computing and Information Systems

Selecting IT service providers in information systems outsourcing involves both qualitative and quantitative evaluations. This paper proposes an integrated multi-criteria decision-making (MCDM) framework to effectively handle uncertainty and subjectivity in the vendor selection process. The proposed methods apply fuzzy logic approach to integrate qualitative survey data into traditional multi-criteria decision models such as data envelope analysis (DEA), analytical hierarchy process (AHP) methods, and TOPSIS. Based on case studies from Iranian banking industry, we empirically test the proposed framework and show it is superior to existing methods. We demonstrate that the fuzzy logic approach provides a robust analysis for vendor selection …


Imbalance Challenge Of Enacting Information Privacy Safeguards In Healthcare: A Grounded Theory Approach, Rachida Parks, Heng Xu, Chao-Hsien Chu Jan 2012

Imbalance Challenge Of Enacting Information Privacy Safeguards In Healthcare: A Grounded Theory Approach, Rachida Parks, Heng Xu, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

Healthcare organizations face significant challenges in designing and implementing the appropriate safeguards to mitigate information privacy threats. While many studies examined various technical and behavioral safeguards to protect the confidentiality and privacy of patient information, very little is known about the actual outcomes and implications of the privacy practices in which organizations engage. There is little research theoretically explaining the outcomes of enacting privacy safeguards and subsequent effects on privacy compliance. This paper reports the results of a grounded theory study investigating the intended consequences (positive impacts) and unintended (negative impacts) consequences of enacting privacy safeguards in healthcare organizations. An …


Learning Bregman Distance Functions For Semi-Supervised Clustering, Lei Wu, Chu Hong Hoi, Rong Jin, Jianke Zhu, N. Yu Jan 2012

Learning Bregman Distance Functions For Semi-Supervised Clustering, Lei Wu, Chu Hong Hoi, Rong Jin, Jianke Zhu, N. Yu

Research Collection School Of Computing and Information Systems

Learning distance functions with side information plays a key role in many data mining applications. Conventional distance metric learning approaches often assume that the target distance function is represented in some form of Mahalanobis distance. These approaches usually work well when data are in low dimensionality, but often become computationally expensive or even infeasible when handling high-dimensional data. In this paper, we propose a novel scheme of learning nonlinear distance functions with side information. It aims to learn a Bregman distance function using a nonparametric approach that is similar to Support Vector Machines. We emphasize that the proposed scheme is …


Multi-Party Multi-Period Supply Chain Coordination, Thin Yin Leong, Michelle Lee Fong Cheong Jan 2012

Multi-Party Multi-Period Supply Chain Coordination, Thin Yin Leong, Michelle Lee Fong Cheong

Research Collection School Of Computing and Information Systems

We apply combinatorial auction as a coordination mechanism to smooth demands placed on suppliers' limited production capacities, allowing several manufacturers to share common suppliers effectively. Products are bidders bidding for parts from suppliers, consuming their capacities in different time periods. The fourth party logistic (4PL) provider acts as the auctioneer to coordinate bids and perform price iterations. We leverage on the strong links between the Lagrangian relaxation method and combinatorial auction, where the Lagrange multipliers serve as the supply capacity reserve prices, to balance the demand and supply of capacities. To prevent cyclic behaviour and to increase convergence speed, we …


Mining Diversity On Social Media Networks, Lu Liu, Feida Zhu, Meng Jiang, Jiawei Han, Lifeng Sun, Shiqiang Yang Jan 2012

Mining Diversity On Social Media Networks, Lu Liu, Feida Zhu, Meng Jiang, Jiawei Han, Lifeng Sun, Shiqiang Yang

Research Collection School Of Computing and Information Systems

The fast development of multimedia technology and increasing availability of network bandwidth has given rise to an abundance of network data as a result of all the ever-booming social media and social websites in recent years, e.g., Flickr, Youtube, MySpace, Facebook, etc. Social network analysis has therefore become a critical problem attracting enthusiasm from both academia and industry. However, an important measure that captures a participant’s diversity in the network has been largely neglected in previous studies. Namely, diversity characterizes how diverse a given node connects with its peers. In this paper, we give a comprehensive study of this concept. …


Robust Local Search For Solving Rcpsp/Max With Durational Uncertainty, Na Fu, Hoong Chuin Lau, Pradeep Varakantham, Fei Xiao Jan 2012

Robust Local Search For Solving Rcpsp/Max With Durational Uncertainty, Na Fu, Hoong Chuin Lau, Pradeep Varakantham, Fei Xiao

Research Collection School Of Computing and Information Systems

Scheduling problems in manufacturing, logistics and project management have frequently been modeled using the framework of Resource Constrained Project Scheduling Problems with minimum and maximum time lags (RCPSP/max). Due to the importance of these problems, providing scalable solution schedules for RCPSP/max problems is a topic of extensive research. However, all existing methods for solving RCPSP/max assume that durations of activities are known with certainty, an assumption that does not hold in real world scheduling problems where unexpected external events such as manpower availability, weather changes, etc. lead to delays or advances in completion of activities. Thus, in this paper, our …


Structural Analysis In Multi-Relational Social Networks, Bingtian Dai, Freddy Chua, Ee Peng Lim Jan 2012

Structural Analysis In Multi-Relational Social Networks, Bingtian Dai, Freddy Chua, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Modern social networks often consist of multiple relations among individuals. Understanding the structure of such multi-relational network is essential. In sociology, one way of structural analysis is to identify different positions and roles using blockmodels. In this paper, we generalize stochastic blockmodels to Generalized Stochastic Blockmodels (GSBM) for performing positional and role analysis on multi-relational networks. Our GSBM generalizes many different kinds of Multivariate Probability Distribution Function (MVPDF) to model different kinds of multirelational networks. In particular, we propose to use multivariate Poisson distribution for multi-relational social networks.


Consumer-Driven Innovation Management, Arcot Desai Narasimhalu, Shekhar Mitra Jan 2012

Consumer-Driven Innovation Management, Arcot Desai Narasimhalu, Shekhar Mitra

Research Collection School Of Computing and Information Systems

The evolution of human society leads to increased affluence and prosperity of certain populations, sometimes at the expense of well-established markets. Market leaders in products and services tend to be so focused on their current customer base that they are caught off guard with the changes in markets created by the evolution. These changes often go unnoticed until it is too late. The change in customer base often requires the repositioning of products and services through innovations, which address new and emerging markets. Some of these changes could potentially result in tectonic market shifts that force innovation managers to involve …


Modeling And Compressing 3-D Facial Expressions Using Geometry Videos, Jiazhi Xia, Dao T. P. Quynh, Ying He, Xiaoming Chen, Steven C. H. Hoi Jan 2012

Modeling And Compressing 3-D Facial Expressions Using Geometry Videos, Jiazhi Xia, Dao T. P. Quynh, Ying He, Xiaoming Chen, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

In this paper, we present a novel geometry video (GV) framework to model and compress 3-D facial expressions. GV bridges the gap of 3-D motion data and 2-D video, and provides a natural way to apply the well-studied video processing techniques to motion data processing. Our framework includes a set of algorithms to construct GVs, such as hole filling, geodesic-based face segmentation, expression-invariant parameterization (EIP), and GV compression. Our EIP algorithm can guarantee the exact correspondence of the salient features (eyes, mouth, and nose) in different frames, which leads to GVs with better spatial and temporal coherence than that of …


Preface: Trends In Natural And Machine Intelligence, Jonathan H. Chan, Ah-Hwee Tan Jan 2012

Preface: Trends In Natural And Machine Intelligence, Jonathan H. Chan, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Trends in natural and machine intelligence are increasingly reflecting a convergence in these two well-established fields of study. The Third International Neural Network Society Winter Conference (INNS-WC 2012) was held in Bangkok, Thailand, on October 3-5, 2012. INNS-WC2012, with an aim to bring together scientists, practitioners, and students worldwide, to discuss the past, present, and future challenges and trends in the area of natural and machine intelligence. This event has been a bi-annual conference of the International Neural Network Society (INNS) to provide a forum for international researchers to exchange latest ideas and advances on neural networks and related discipline.


Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau Jan 2012

Robust Distributed Scheduling Via Time Period Aggregation, Shih-Fen Cheng, John Tajan, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In this paper, we evaluate whether the robustness of a market mechanism that allocates complementary resources could be improved through the aggregation of time periods in which resources are consumed. In particular, we study a multi-round combinatorial auction that is built on a general equilibrium framework. We adopt the general equilibrium framework and the particular combinatorial auction design from the literature, and we investigate the benefits and the limitation of time-period aggregation when demand-side uncertainties are introduced. By using simulation experiments on a real-life resource allocation problem from a container port, we show that, under stochastic conditions, the performance variation …