Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

Discipline
Keyword
Publication Year
File Type

Articles 5941 - 5970 of 6891

Full-Text Articles in Physical Sciences and Mathematics

Timed Automata Patterns, Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun, Wang Yi Jun 2008

Timed Automata Patterns, Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun, Wang Yi

Research Collection School Of Computing and Information Systems

Timed Automata have proven to be useful for specification and verification of real-time systems. System design using Timed Automata relies on explicit manipulation of clock variables. A number of automated analyzers for Timed Automata have been developed. However, Timed Automata lack composable patterns for high-level system design. Specification languages like Timed Communicating Sequential Process (CSP) and Timed Communicating Object-Z (TCOZ) are well suited for presenting compositional models of complex real-time systems. In this work, we define a set of composable Timed Automata patterns based on hierarchical constructs in time-enriched process algebras. The patterns facilitate the hierarchical design of complex systems …


Multi-View Ear Recognition Based On B-Spline Pose Manifold Construction, Zhiyuan Zhang, Heng Liu Jun 2008

Multi-View Ear Recognition Based On B-Spline Pose Manifold Construction, Zhiyuan Zhang, Heng Liu

Research Collection School Of Computing and Information Systems

In this work, multi-view ear recognition problems are examined in detail. A new multi-view ear recognition approach based on B-Spline pose manifold construction in discriminative projection space which is formed by null kernel discriminant analysis (NKDA) feature extraction is presented. Many experiments and comparisons are provided to show the effectiveness of our multi-view ear recognition approach.


Traceable And Retrievable Identity-Based Encryption, Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang Jun 2008

Traceable And Retrievable Identity-Based Encryption, Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang

Research Collection School Of Computing and Information Systems

Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. This concept enables some mechanisms to reduce the trust of a private key generator (PKG) in an IBE system. The aim of this paper is threefold. First, we discuss some subtleties in the first traceable IBE scheme in the Crypto 2007 paper. Second, we present an extension to this work by having the PKG’s master secret key retrieved automatically if more than one user secret key are released. This way, the user can produce a concrete proof of …


Self-Organizing Neural Models Integrating Rules And Reinforcement Learning, Teck-Hou Teng, Zhong-Ming Tan, Ah-Hwee Tan Jun 2008

Self-Organizing Neural Models Integrating Rules And Reinforcement Learning, Teck-Hou Teng, Zhong-Ming Tan, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Traditional approaches to integrating knowledge into neural network are concerned mainly about supervised learning. This paper presents how a family of self-organizing neural models known as fusion architecture for learning, cognition and navigation (FALCON) can incorporate a priori knowledge and perform knowledge refinement and expansion through reinforcement learning. Symbolic rules are formulated based on pre-existing know-how and inserted into FALCON as a priori knowledge. The availability of knowledge enables FALCON to start performing earlier in the initial learning trials. Through a temporal-difference (TD) learning method, the inserted rules can be refined and expanded according to the evaluative feedback signals received …


Semi-Supervised Svm Batch Mode Active Learning For Image Retrieval, Steven Hoi, Rong Jin, Jianke Zhu, Michael R. Lyu Jun 2008

Semi-Supervised Svm Batch Mode Active Learning For Image Retrieval, Steven Hoi, Rong Jin, Jianke Zhu, Michael R. Lyu

Research Collection School Of Computing and Information Systems

Active learning has been shown as a key technique for improving content-based image retrieval (CBIR) performance. Among various methods, support vector machine (SVM) active learning is popular for its application to relevance feedback in CBIR. However, the regular SVM active learning has two main drawbacks when used for relevance feedback. First, SVM often suffers from learning with a small number of labeled examples, which is the case in relevance feedback. Second, SVM active learning usually does not take into account the redundancy among examples, and therefore could select multiple examples in relevance feedback that are similar (or even identical) to …


Electric Elves: What Went Wrong And Why, Milind Tambe, Emma Bowring, Jonathan Pearce, Pradeep Reddy Varakantham, Paul Scerri, David V. Pynadath Jun 2008

Electric Elves: What Went Wrong And Why, Milind Tambe, Emma Bowring, Jonathan Pearce, Pradeep Reddy Varakantham, Paul Scerri, David V. Pynadath

Research Collection School Of Computing and Information Systems

Software personal assistants continue to be a topic of significant research interest. This article outlines some of the important lessons learned from a successfully-deployed team of personal assistant agents (Electric Elves) in an office environment. In the Electric Elves project, a team of almost a dozen personal assistant agents were continually active for seven months. Each elf (agent) represented one person and assisted in daily activities in an actual office environment. This project led to several important observations about privacy, adjustable autonomy, and social norms in office environments. In addition to outlining some of the key lessons learned we outline …


Information-Theory Based Optimal Location Management Schemes For Integrated Multi-System Wireless Networks, Archan Misra, Abhishek Roy, Sajal K. Das Jun 2008

Information-Theory Based Optimal Location Management Schemes For Integrated Multi-System Wireless Networks, Archan Misra, Abhishek Roy, Sajal K. Das

Research Collection School Of Computing and Information Systems

In a multisystem environment where a mobile node can utilize multiple interfaces and simultaneously connect to multiple providers, new opportunities exist for efficient location management strategies spanning heterogeneous cellular wireless networks. In this paper, an integrated framework is developed for location management in such a multi-system, fourth generation (4 G) wireless networks. This information-theoretic framework allows each individual sub-system to operate fairly independently, and does not require the knowledge of individual sub-network topologies. An efficient location management in such a loosely coupled network is designed by having a mobile node view its movement as a vector-valued sequence, and then transmit …


Seemon: Scalable And Energy-Efficient Context Monitoring Framework For Sensor-Rich Mobile Environments, Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Lee, Youngki Lee, Souneil Park, Taiwoo Park, Junehwa Song Jun 2008

Seemon: Scalable And Energy-Efficient Context Monitoring Framework For Sensor-Rich Mobile Environments, Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Lee, Youngki Lee, Souneil Park, Taiwoo Park, Junehwa Song

Research Collection School Of Computing and Information Systems

Proactively providing services to mobile individuals is essential for emerging ubiquitous applications. The major challenge in providing users with proactive services lies in continuously monitoring their contexts based on numerous sensors. The context monitoring with rich sensors imposes heavy workloads on mobile devices with limited computing and battery power. We present SeeMon, a scalable and energy-efficient context monitoring framework for sensor-rich, resource-limited mobile environments. Running on a personal mobile device, SeeMon effectively performs context monitoring involving numerous sensors and applications. On top of SeeMon, multiple applications on the device can proactively understand users' contexts and react appropriately. This paper proposes …


Localized Minimum-Latency Broadcasting In Multi-Radio Multi-Rate Wireless Mesh Networks, Junaid Qadir, Chun Tung Chou, Archan Misra, Joo Ghee Lim Jun 2008

Localized Minimum-Latency Broadcasting In Multi-Radio Multi-Rate Wireless Mesh Networks, Junaid Qadir, Chun Tung Chou, Archan Misra, Joo Ghee Lim

Research Collection School Of Computing and Information Systems

We address the problem of minimizing the worst-case broadcast delay in ldquomulti-radio multi-channel multi-rate wireless mesh networksrdquo (MR2-MC WMN) in a distributed and localized fashion. Efficient broadcasting in such networks is especially challenging due to the desirability of exploiting the ldquowireless broadcast advantagerdquo (WBA), the interface-diversity, the channel-diversity and the rate-diversity offered by these networks. We propose a framework that calculates a set of forwarding nodes and transmission rate at these forwarding nodes irrespective of the broadcast source. Thereafter, a forwarding tree is constructed taking into consideration the source of broadcast. Our broadcasting algorithms are distributed and utilize locally available …


Work Dispersion, Process-Based Learning And Offshore Software Development Performance, Narayanasamy Ramasubbu, Sunil Mithas, M. S. Krishnan, Chris Kemerer Jun 2008

Work Dispersion, Process-Based Learning And Offshore Software Development Performance, Narayanasamy Ramasubbu, Sunil Mithas, M. S. Krishnan, Chris Kemerer

Research Collection School Of Computing and Information Systems

In this paper we develop a learning-mediated model of offshore software project productivity and quality to examine whether widely adopted structured software processes are effective in mitigating the negative effects of work dispersion in offshore software development. We explicate how the key process areas of the capability maturity model (CMM) can be utilized as a platform to launch learning routines in offshore software development and thereby explain why some offshore software development process improvement initiatives are more effective than others. We validate our learning-mediated model of offshore software project performance by utilizing data collected from 42 offshore software projects of …


Context Modeling With Evolutionary Fuzzy Cognitive Map In Interactive Storytelling, Yundong Cai, Chunyan Miao, Ah-Hwee Tan, Zhiqi Shen Jun 2008

Context Modeling With Evolutionary Fuzzy Cognitive Map In Interactive Storytelling, Yundong Cai, Chunyan Miao, Ah-Hwee Tan, Zhiqi Shen

Research Collection School Of Computing and Information Systems

To generate a believable and dynamic virtual world is a great challenge in interactive storytelling. In this paper, we propose a model, namely evolutionary fuzzy cognitive map (E-FCM), to model the dynamic causal relationships among different context variables. As an extension to conventional FCM, E-FCM models not only the fuzzy causal relationships among the variables, but also the probabilistic property of causal relationships, and asynchronous activity update of the concepts. With this model, the context variables evolve in a dynamic and uncertain manner with the according evolving time. As a result, the virtual world is presented more realistically and dynamically.


Capacity Constrained Assignment In Spatial Databases, Hou U Leong, Man Lung Yiu, Kyriakos Mouratidis, Nikos Mamoulis Jun 2008

Capacity Constrained Assignment In Spatial Databases, Hou U Leong, Man Lung Yiu, Kyriakos Mouratidis, Nikos Mamoulis

Research Collection School Of Computing and Information Systems

Given a point set P of customers (e.g., WiFi receivers) and a point set Q of service providers (e.g., wireless access points), where each q 2 Q has a capacity q.k, the capacity constrained assignment (CCA) is a matching M Q × P such that (i) each point q 2 Q (p 2 P) appears at most k times (at most nce) in M, (ii) the size of M is maximized (i.e., it comprises min{|P|,P q2Q q.k} pairs), and (iii) the total assignment cost (i.e., the sum of Euclidean distances within all pairs) is minimized. Thus, the CCA problem is …


Probabilistically Reliable On-Demand Multicast In Wireless Mesh Networks, Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha, Archan Misra Jun 2008

Probabilistically Reliable On-Demand Multicast In Wireless Mesh Networks, Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha, Archan Misra

Research Collection School Of Computing and Information Systems

This paper studies probabilistically reliable multicast in wireless mesh networks (WMNs), utilizing MAC layer re-transmission and wireless broadcast advantage to improve both the multicast throughput and the delivery rate. We first present a new multicast routing metric which we call the expected multicast transmissions (EMT). EMT captures the effect of link packet delivery ratio, MAC layer retransmission and wireless broadcast advantage at the same time. The EMT of a MAC layer multicast transmission is the expected number of data transmissions (including retransmissions) required for a packet to reach all the recipients. The EMT of a multicast tree is the sum …


Semi-Supervised Distance Metric Learning For Collaborative Image Retrieval, Steven Hoi, Wei Liu, Shih-Fu Chang Jun 2008

Semi-Supervised Distance Metric Learning For Collaborative Image Retrieval, Steven Hoi, Wei Liu, Shih-Fu Chang

Research Collection School Of Computing and Information Systems

Typical content-based image retrieval (CBIR) solutions with regular Euclidean metric usually cannot achieve satisfactory performance due to the semantic gap challenge. Hence, relevance feedback has been adopted as a promising approach to improve the search performance. In this paper, we propose a novel idea of learning with historical relevance feedback log data, and adopt a new paradigm called “Collaborative Image Retrieval” (CIR). To effectively explore the log data, we propose a novel semi-supervised distance metric learning technique, called “Laplacian Regularized Metric Learning” (LRML), for learning robust distance metrics for CIR. Different from previous methods, the proposed LRML method integrates both …


Visual Analytics For Supporting Entity Relationship Discovery On Text Data, Hanbo Dai, Ee Peng Lim, Hady W. Lauw, Hwee Hwa Pang Jun 2008

Visual Analytics For Supporting Entity Relationship Discovery On Text Data, Hanbo Dai, Ee Peng Lim, Hady W. Lauw, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant to a given information seeking task. In this paper, we introduce a visual analytics tool called ER-Explorer to support such an analysis task. ER-Explorer consists of a data model known as TUBE and a set of data manipulation operations specially designed for examining entities and relationships in text. As part of TUBE, a set of interestingness measures is defined to help exploring entities and their relationships. We illustrate the use of ER-Explorer …


Measuring Novelty And Redundancy With Multiple Modalities In Cross-Lingual Broadcast News, Xiao Wu, Alexander G. Hauptmann, Chong-Wah Ngo Jun 2008

Measuring Novelty And Redundancy With Multiple Modalities In Cross-Lingual Broadcast News, Xiao Wu, Alexander G. Hauptmann, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

News videos from different channels, languages are broadcast everyday, which provide abundant information for users. To effectively search, retrieve, browse and track news stories, news story similarity plays a critical role in assessing the novelty and redundancy among news stories. In this paper, we explore different measures of novelty and redundancy detection for cross-lingual news stories. A news story is represented by multimodal features which include a sequence of keyframes in the visual track, and a set of words and named entities extracted from speech transcript in the audio track. Vector space models and language models on individual features (text, …


Utility-Based Adaptation In Mission-Oriented Wireless Sensor Networks, Sharanya Eswaran, Archan Misra, Thomas La Porta Jun 2008

Utility-Based Adaptation In Mission-Oriented Wireless Sensor Networks, Sharanya Eswaran, Archan Misra, Thomas La Porta

Research Collection School Of Computing and Information Systems

This paper extends the distributed network utility maximization (NUM) framework to consider the case of resource sharing by multiple competing missions in a military-centric wireless sensor network (WSN) environment. Prior work on NUM-based optimization has considered unicast flows with sender-based utilities in either wireline or wireless networks. We extend the NUM framework to consider three key new features observed in mission-centric WSN environments: i) the definition of an individual mission's utility as a joint function of data from multiple sensor sources ii) the consumption of each senders (sensor) data by multiple receivers (missions) and iii) the multicast-tree based dissemination of …


Advances And Challenges For Scalable Provenance In Stream Processing Systems, Archan Misra, Marion Blount, Anastasios Kementsietsidis, Daby Sow, Min Wang Jun 2008

Advances And Challenges For Scalable Provenance In Stream Processing Systems, Archan Misra, Marion Blount, Anastasios Kementsietsidis, Daby Sow, Min Wang

Research Collection School Of Computing and Information Systems

While data provenance is a well-studied topic in both database and workflow systems, its support within stream processing systems presents a new set of challenges. Part of the challenge is the high stream event rate and the low processing latency requirements imposed by many streaming applications. For example, emerging streaming applications in healthcare or finance call for data provenance, as illustrated in the Century stream processing infrastructure that we are building for supporting online healthcare analytics. At anytime, given an output data element (e.g., a medical alert) generated by Century, the system must be able to retrieve the input and …


Wikinetviz: Visualizing Friends And Adversaries In Implicit Social Networks, Minh-Tam Le, Hoang-Vu Dang, Ee Peng Lim, Anwitaman Datta Jun 2008

Wikinetviz: Visualizing Friends And Adversaries In Implicit Social Networks, Minh-Tam Le, Hoang-Vu Dang, Ee Peng Lim, Anwitaman Datta

Research Collection School Of Computing and Information Systems

When multiple users with diverse backgrounds and beliefs edit Wikipedia together, disputes often arise due to disagreements among the users. In this paper, we introduce a novel visualization tool known as WikiNetViz to visualize and analyze disputes among users in a dispute-induced social network. WikiNetViz is designed to quantify the degree of dispute between a pair of users using the article history. Each user (and article) is also assigned a controversy score by our proposed controversy rank model so as to measure the degree of controversy of a user (and an article) by the amount of disputes between the user …


A Multimodal And Multilevel Ranking Scheme For Large-Scale Video Retrieval, Steven C. H. Hoi, Michael R. Lyu Jun 2008

A Multimodal And Multilevel Ranking Scheme For Large-Scale Video Retrieval, Steven C. H. Hoi, Michael R. Lyu

Research Collection School Of Computing and Information Systems

A critical issue of large-scale multimedia retrieval is how to develop an effective framework for ranking the search results. This problem is particularly challenging for content-based video retrieval due to some issues such as short text queries, insufficient sample learning, fusion of multimodal contents, and large-scale learning with huge media data. In this paper, we propose a novel multimodal and multilevel (MMML) ranking framework to attack the challenging ranking problem of content-based video retrieval. We represent the video retrieval task by graphs and suggest a graph based semi-supervised ranking (SSR) scheme, which can learn with small samples effectively and integrate …


An Office Survival Guide, M. Thulasidas Jun 2008

An Office Survival Guide, M. Thulasidas

Research Collection School Of Computing and Information Systems

In the unforgiving, dog-eat-dog corporate jungle, when you find yourself in a new corporate setting, you need to be sure of the welcome. More importantly, you need to prove yourself worthy of it.


Predicting Trusts Among Users Of Online Communities: An Epinions Case Study, Haifeng Liu, Ee Peng Lim, Hady W. Lauw, Minh-Tam Le, Aixin Sun, Jaideep Srivastava, Young Ae Kim Jun 2008

Predicting Trusts Among Users Of Online Communities: An Epinions Case Study, Haifeng Liu, Ee Peng Lim, Hady W. Lauw, Minh-Tam Le, Aixin Sun, Jaideep Srivastava, Young Ae Kim

Research Collection School Of Computing and Information Systems

Trust between a pair of users is an important piece of information for users in an online community (such as electronic commerce websites and product review websites) where users may rely on trust information to make decisions. In this paper, we address the problem of predicting whether a user trusts another user. Most prior work infers unknown trust ratings from known trust ratings. The effectiveness of this approach depends on the connectivity of the known web of trust and can be quite poor when the connectivity is very sparse which is often the case in an online community. In this …


Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard May 2008

Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard

Research Collection School Of Computing and Information Systems

Digital systems give rise to complex layered architectures in which products at one layer serve as platforms for applications and services in adjacent layers. Platform owners face a difficult balancing act. On one hand, they need to make their platforms attractive to potential complementors by mitigating the threat of architectural lock-in. On the other hand, platform owners must be careful not to give away too much too soon, or risk being unable to recoup their own investments. This paper presents an agent-based model that explores this tension at both the firm and industry levels. Computational experiments show that boundedly rational …


Architectural Control Points, C. Jason Woodard May 2008

Architectural Control Points, C. Jason Woodard

Research Collection School Of Computing and Information Systems

System designers and technology strategists have long recognized the concept of an architectural control point as a way to identify parts of a system that have particular strategic importance. Despite the vast body of work on system architecture in the engineering design literature, however, few authors have attempted to define architectural control points or study them systematically. Moreover, some industry participants have questioned whether architectural control is still a valuable or achievable goal in an era of increasingly open standards. This paper offers tentative definitions of architectural control, architectural control points, and architectural strategy. In a longer version of the …


Scalable Detection Of Semantic Clones, Mark Gabel, Lingxiao Jiang, Zhendong Su May 2008

Scalable Detection Of Semantic Clones, Mark Gabel, Lingxiao Jiang, Zhendong Su

Research Collection School Of Computing and Information Systems

Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant code, locate bugs, or gain insight into program design. Existing scalable approaches to clone detection are limited to finding program fragments that are similar only in their contiguous syntax. Other, semantics-based approaches are more resilient to differences in syntax, such as reordered statements, related statements interleaved with other unrelated statements, or the use of semantically equivalent control structures. However, none of these techniques have scaled to real world code bases. These approaches capture semantic …


A Verification System For Timed Interval Calculus, Chunqing Chen, Jin Song Dong, Jun Sun May 2008

A Verification System For Timed Interval Calculus, Chunqing Chen, Jin Song Dong, Jun Sun

Research Collection School Of Computing and Information Systems

Timed Interval Calculus (TIC) is a highly expressive set-based notation for specifying and reasoning about embedded real-time systems. However, it lacks mechanical proving support, as its verification usually involves infinite time intervals and continuous dynamics. In this paper, we develop a system based on a generic theorem prover, Prototype Verification System (PVS), to assist formal verification of TIC at a high grade of automation. TIC semantics has been constructed by the PVS typed higher-order logic. Based on the encoding, we have checked all TIC reasoning rules and discovered subtle flaws. A translator has been implemented in Java to automatically transform …


Stress Test, M. Thulasidas May 2008

Stress Test, M. Thulasidas

Research Collection School Of Computing and Information Systems

Ultimately, the risk factors that create stress in professional life do not generate any reward


A Dynamic Trust Management Scheme To Mitigate Malware Proliferation In P2p Networks, Xuhua Ding, Wei Yu, Ying Pan May 2008

A Dynamic Trust Management Scheme To Mitigate Malware Proliferation In P2p Networks, Xuhua Ding, Wei Yu, Ying Pan

Research Collection School Of Computing and Information Systems

The surge of peer-to-peer (P2P) networks consisting of thousands of of hosts makes them a breeding ground for malware proliferation. Although some existing studies have shown that malware proliferation can pose significant threats to P2P networks, defending against such an attack is largely an open problem. This paper aims to develop the countermeasure that can effectively mitigate the malware proliferation while preserving P2P networks' performance. To this end, we propose a dynamic trust management scheme based upon localized trust evaluation and alert propagation which prevents innocent peers from downloading files from infected peers. Our analysis and experimental results show that …


Verifying Completeness Of Relational Query Answers From Online Servers, Hwee Hwa Pang, Kian-Lee Tan May 2008

Verifying Completeness Of Relational Query Answers From Online Servers, Hwee Hwa Pang, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online servers over extended periods of time. A breached server that is not detected in time may return incorrect query answers to users. In this article, we introduce authentication schemes for users to verify that their query answers from an online server are complete (i.e., no qualifying tuples are omitted) and authentic (i.e., all the result values are legitimate). We introduce a scheme that supports range selection, projection as well as primary key-foreign key join queries on relational databases. We also …


A Scalable Approach To Multi-Style Architectural Modeling And Verification, Stephen Wong, Jing Sun, Ian Warren, Jun Sun Apr 2008

A Scalable Approach To Multi-Style Architectural Modeling And Verification, Stephen Wong, Jing Sun, Ian Warren, Jun Sun

Research Collection School Of Computing and Information Systems

Software Architecture represents the high level description of a system in terms of components, external properties and communication. Despite its importance in the software engineering process, the lack of formal description and verification support limits the value of developing architectural models. Automated formal engineering methods can provide an effective means to precisely describe and rigorously verify intended structures and behaviors of software systems. In this paper, we present an approach to support the design and verification of software architectural models using the Alloy analyzer. Based on our earlier work, we propose a fundamental library for specifying system structures in terms …