Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2891)
- Environmental Sciences (2151)
- Engineering (1767)
- Physics (1724)
- Chemistry (1681)
-
- Mathematics (1478)
- Life Sciences (1302)
- Earth Sciences (1260)
- Social and Behavioral Sciences (928)
- Oceanography and Atmospheric Sciences and Meteorology (723)
- Statistics and Probability (717)
- Computer Engineering (672)
- Electrical and Computer Engineering (635)
- Medicine and Health Sciences (611)
- Astrophysics and Astronomy (509)
- Geology (492)
- Sustainability (482)
- Applied Mathematics (475)
- Natural Resources and Conservation (455)
- Education (444)
- Arts and Humanities (385)
- Databases and Information Systems (376)
- Environmental Monitoring (339)
- Natural Resources Management and Policy (284)
- Information Security (281)
- Software Engineering (271)
- Water Resource Management (264)
- Business (262)
- Artificial Intelligence and Robotics (236)
- Institution
-
- TÜBİTAK (694)
- Selected Works (619)
- University of Nebraska - Lincoln (526)
- Singapore Management University (452)
- University of Kentucky (404)
-
- Utah State University (293)
- Old Dominion University (254)
- Chulalongkorn University (236)
- University of South Florida (216)
- Portland State University (214)
- University of Tennessee, Knoxville (206)
- City University of New York (CUNY) (199)
- Missouri University of Science and Technology (188)
- William & Mary (178)
- Embry-Riddle Aeronautical University (167)
- Western University (160)
- Technological University Dublin (158)
- University of Texas at El Paso (158)
- University of Wollongong (155)
- University of Nevada, Las Vegas (148)
- Wayne State University (147)
- Florida Institute of Technology (132)
- Louisiana State University (131)
- University of Texas Rio Grande Valley (130)
- University of Dayton (127)
- Wright State University (125)
- Kennesaw State University (123)
- Nova Southeastern University (122)
- University of South Carolina (119)
- Virginia Commonwealth University (119)
- Keyword
-
- Climate change (94)
- Physics (90)
- Northern bobwhite (81)
- Colinus virginianus (80)
- Machine learning (75)
-
- Sustainability (71)
- Virginia (58)
- GIS (57)
- Environmental science (53)
- Gravitational waves (53)
- Simulation (52)
- Machine Learning (47)
- Mathematics (47)
- Chemistry (45)
- Data (45)
- Galaxies: spiral (45)
- Calculus (44)
- Education (44)
- Galaxies: structure (43)
- Modeling (43)
- Optimization (41)
- Pure sciences (41)
- Galaxies: evolution (40)
- Water quality (38)
- Groundwater (37)
- Agriculture (36)
- Conservation (36)
- Research and Technical Reports (36)
- Department of Computer Science and Engineering (35)
- Climate (34)
- Publication
-
- Theses and Dissertations (423)
- Research Collection School Of Computing and Information Systems (406)
- Turkish Journal of Electrical Engineering and Computer Sciences (389)
- Electronic Theses and Dissertations (296)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (200)
-
- Turkish Journal of Mathematics (140)
- Faculty Publications (137)
- Australian Institute for Innovative Materials - Papers (136)
- USF Tampa Graduate Theses and Dissertations (134)
- Publications (121)
- Doctoral Dissertations (115)
- Honors Theses (115)
- Electronic Thesis and Dissertation Repository (105)
- Publications and Research (105)
- Benne Holwerda (101)
- National Quail Symposium Proceedings (94)
- Articles (90)
- Departmental Technical Reports (CS) (90)
- Physics Faculty Publications (89)
- Aerospace, Physics, and Space Science Faculty Publications (88)
- Physics and Astronomy Faculty Publications (84)
- Graduate Theses and Dissertations (80)
- Journal of Electrochemistry (80)
- Journal of Modern Applied Statistical Methods (80)
- Turkish Journal of Chemistry (80)
- Browse all Theses and Dissertations (79)
- Dissertations (79)
- Walden Dissertations and Doctoral Studies (79)
- Masters Theses (70)
- School of Natural Resources: Faculty Publications (70)
- Publication Type
Articles 1501 - 1530 of 12521
Full-Text Articles in Physical Sciences and Mathematics
Entropy Production In A Fluid-Solid System Far From Thermodynamic Equilibrium, Bong Jae Chung, Blas Ortega, Ashuwin Vaidya
Entropy Production In A Fluid-Solid System Far From Thermodynamic Equilibrium, Bong Jae Chung, Blas Ortega, Ashuwin Vaidya
Department of Mathematics Facuty Scholarship and Creative Works
Abstract.: The terminal orientation of a rigid body in a moving fluid is an example of a dissipative system, out of thermodynamic equilibrium and therefore a perfect testing ground for the validity of the maximum entropy production principle (MaxEP). Thus far, dynamical equations alone have been employed in studying the equilibrium states in fluid-solid interactions, but these are far too complex and become analytically intractable when inertial effects come into play. At that stage, our only recourse is to rely on numerical techniques which can be computationally expensive. In our past work, we have shown that the MaxEP is a …
On The Temporal Effects Of Mobile Blockers In Urban Millimeter-Wave Cellular Scenarios, Margarita Gapeyenko, Mikhail Gerasimenko, Andrey Samuylov, Dmitri Moltchanov, Sarabjot Singh, Mustafa Riza Akdeniz, Ehsan Aryafar, Nageen Himayat, Sergey Andreev, Yevgeni Koucheryavy
On The Temporal Effects Of Mobile Blockers In Urban Millimeter-Wave Cellular Scenarios, Margarita Gapeyenko, Mikhail Gerasimenko, Andrey Samuylov, Dmitri Moltchanov, Sarabjot Singh, Mustafa Riza Akdeniz, Ehsan Aryafar, Nageen Himayat, Sergey Andreev, Yevgeni Koucheryavy
Computer Science Faculty Publications and Presentations
Millimeter-wave (mmWave) propagation is known to be severely affected by the blockage of the line-of-sight (LoS) path. In contrast to microwave systems, at shorter mmWave wavelengths such blockage can be caused by human bodies, where their mobility within environment makes wireless channel alternate between the blocked and non-blocked LoS states. Following the recent 3GPP requirements on modeling the dynamic blockage as well as the temporal consistency of the channel at mmWave frequencies, in this paper a new model for predicting the state of a user in the presence of mobile blockers for representative 3GPP scenarios is developed: urban micro cell …
Detecting Semantic Uncertainty By Learning Hedge Cues In Sentences Using An Hmm, Xiujun Li, Wei Gao, Jude Shavlik
Detecting Semantic Uncertainty By Learning Hedge Cues In Sentences Using An Hmm, Xiujun Li, Wei Gao, Jude Shavlik
Research Collection School Of Computing and Information Systems
Detecting speculative assertions is essential to distinguish semantically uncertain information from the factual ones in text. This is critical to the trustworthiness of many intelligent systems that are based on information retrieval and natural language processing techniques, such as question answering or information extraction. We empirically explore three fundamental issues of uncertainty detection: (1) the predictive ability of different learning methods on this task; (2) whether using unlabeled data can lead to a more accurate model; and (3) whether closed-domain training or crossdomain training is better. For these purposes, we adopt two statistical learning approaches to this problem: the commonly …
Classification-Based Parameter Synthesis For Parametric Timed Automata, Jiaying Li, Jun Sun, Bo Gao, Étienne Andre
Classification-Based Parameter Synthesis For Parametric Timed Automata, Jiaying Li, Jun Sun, Bo Gao, Étienne Andre
Research Collection School Of Computing and Information Systems
Parametric timed automata are designed to model timed systems with unknown parameters, often representing design uncertainties of external environments. In order to design a robust system, it is crucial to synthesize constraints on the parameters, which guarantee the system behaves according to certain properties. Existing approaches suffer from scalability issues. In this work, we propose to enhance existing approaches through classification-based learning. We sample multiple concrete values for parameters and model check the corresponding non-parametric models. Based on the checking results, we form conjectures on the constraint through classification techniques, which can be subsequently confirmed by existing model checkers for …
Apibot: Question Answering Bot For Api Documentation, Yuan Tian, Ferdian Thung, Abhishek Sharma, David Lo
Apibot: Question Answering Bot For Api Documentation, Yuan Tian, Ferdian Thung, Abhishek Sharma, David Lo
Research Collection School Of Computing and Information Systems
As the carrier of Application Programming Interfaces (APIs) knowledge, API documentation plays a crucial role in how developers learn and use an API. It is also a valuable information resource for answering API-related questions, especially when developers cannot find reliable answers to their questions online/offline. However, finding answers to API-related questions from API documentation might not be easy because one may have to manually go through multiple pages before reaching the relevant page, and then read and understand the information inside the relevant page to figure out the answers. To deal with this challenge, we develop APIBot, a bot that …
Tweet Geolocation: Leveraging Location, User And Peer Signals, Wen-Haw Chong, Ee Peng Lim
Tweet Geolocation: Leveraging Location, User And Peer Signals, Wen-Haw Chong, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Which venue is a tweet posted from? We referred this as fine-grained geolocation. To solve this problem effectively, we develop novel techniques to exploit each posting user's content history. This is motivated by our finding that most users do not share their visitation history, but have ample content history from tweet posts. We formulate fine-grained geolocation as a ranking problem whereby given a test tweet, we rank candidate venues. We propose several models that leverage on three types of signals from locations, users and peers. Firstly, the location signals are words that are indicative of venues. We propose a location-indicative …
Second-Order Online Active Learning And Its Applications, Shuji Hao, Jing Lu, Peilin Zhao, Chi Zhang, Steven C. H. Hoi, Chunyan Miao
Second-Order Online Active Learning And Its Applications, Shuji Hao, Jing Lu, Peilin Zhao, Chi Zhang, Steven C. H. Hoi, Chunyan Miao
Research Collection School Of Computing and Information Systems
The goal of online active learning is to learn predictive models from a sequence of unlabeled data given limited label querybudget. Unlike conventional online learning tasks, online active learning is considerably more challenging because of two reasons.Firstly, it is difficult to design an effective query strategy to decide when is appropriate to query the label of an incoming instance givenlimited query budget. Secondly, it is also challenging to decide how to update the predictive models effectively whenever the true labelof an instance is queried. Most existing approaches for online active learning are often based on a family of first-order online …
Deglacial Tropical Atlantic Subsurface Warming Links Ocean Circulation Variability To The West African Monsoon, Matthew W. Schmidt, Ping Chang, Andrew O. Parker, Link Ji, Feng He
Deglacial Tropical Atlantic Subsurface Warming Links Ocean Circulation Variability To The West African Monsoon, Matthew W. Schmidt, Ping Chang, Andrew O. Parker, Link Ji, Feng He
OES Faculty Publications
Multiple lines of evidence show that cold stadials in the North Atlantic were accompanied by both reductions in Atlantic Meridional Overturning Circulation (AMOC) and collapses of the West African Monsoon (WAM). Although records of terrestrial change identify abrupt WAM variability across the deglaciation, few studies show how ocean temperatures evolved across the deglaciation. To identify the mechanism linking AMOC to the WAM, we generated a new record of subsurface temperature variability over the last 21 kyr based on Mg/Ca ratios in a sub-thermocline dwelling planktonic foraminifera in an Eastern Equatorial Atlantic (EEA) sediment core from the Niger Delta. Our subsurface …
Regional Sea Level Variability And Trends, 1960-2007: A Comparison Of Sea Level Reconstructions And Ocean Syntheses, M. Carson, A. Köhl, D. Stammer, B. Meyssignac, J. Church, J. Schröter, M. Wenzel, B. Hamlington
Regional Sea Level Variability And Trends, 1960-2007: A Comparison Of Sea Level Reconstructions And Ocean Syntheses, M. Carson, A. Köhl, D. Stammer, B. Meyssignac, J. Church, J. Schröter, M. Wenzel, B. Hamlington
OES Faculty Publications
Several existing statistical and dynamical reconstructions of past regional sea level variability and trends are compared with each other and with tide gauges over the 48 year period 1960-2007, partially predating the satellite altimetry era. Evaluated statistical reconstructions were built from tide-gauge data (TGR), and dynamical reconstructions from ocean data assimilation (ODA) approaches. Although most of the TGRs yield global-mean time series of sea level with trends deviating within ± 0.1 mm yr-1, the spatial anomalies of the trends deviate substantially between the reconstructions over the period predating altimetry. In contrast, TGRs match observed regional trend patterns fairly …
Graph Structures In Bipolar Neutrosophic Environment, Florentin Smarandache, Muhammad Akram, Muzzamal Sitara
Graph Structures In Bipolar Neutrosophic Environment, Florentin Smarandache, Muhammad Akram, Muzzamal Sitara
Branch Mathematics and Statistics Faculty and Staff Publications
A bipolar single-valued neutrosophic (BSVN) graph structure is a generalization of a bipolar fuzzy graph. In this research paper, we present certain concepts of BSVN graph structures. We describe some operations on BSVN graph structures and elaborate on these with examples. Moreover, we investigate some related properties of these operations.
Language Inclusion Checking Of Timed Automata With Non-Zenoness, Xinyu Wang, Jun Sun, Ting Wang, Shengchao Qin
Language Inclusion Checking Of Timed Automata With Non-Zenoness, Xinyu Wang, Jun Sun, Ting Wang, Shengchao Qin
Research Collection School Of Computing and Information Systems
Given a timed automaton P modeling an implementation and a timed automaton S as a specification, the problem of language inclusion checking is to decide whether the language of P is a subset of that of S. It is known to be undecidable. The problem gets more complicated if non-Zenoness is taken into consideration. A run is Zeno if it permits infinitely many actions within finite time. Otherwise it is non-Zeno. Zeno runs might present in both P and S. It is necessary to check whether a run is Zeno or not so as to avoid presenting Zeno runs as …
Characterization Of Laser-Generated Aluminum Plasma Using Ion Time-Of-Flight And Optical Emission Spectroscopy, Md. Haider A. Shaim, Hani E. Elsayed-Ali
Characterization Of Laser-Generated Aluminum Plasma Using Ion Time-Of-Flight And Optical Emission Spectroscopy, Md. Haider A. Shaim, Hani E. Elsayed-Ali
Electrical & Computer Engineering Faculty Publications
Laser plasma generated by ablation of an Al target in vacuum is characterized by ion time-of-flight combined with optical emission spectroscopy. A Q-switched Nd:YAG laser (wavelength λ = 1064 nm, pulse width τ ∼ 7 ns, and fluence F ≤ 38 J/cm2) is used to ablate the Al target. Ion yield and energy distribution of each charge state are measured. Ions are accelerated according to their charge state by the double-layer potential developed at the plasma-vacuum interface. The ion energy distribution follows a shifted Coulomb-Boltzmann distribution. Optical emission spectroscopy of the Al plasma gives significantly lower plasma temperature …
40Ar/39Ar Ages, Compositions, And Likely Source Of The Eocene Fallout Tuffs In The Duchesne River Formation, Northeastern Utah, Michael Seth Jensen
40Ar/39Ar Ages, Compositions, And Likely Source Of The Eocene Fallout Tuffs In The Duchesne River Formation, Northeastern Utah, Michael Seth Jensen
Theses and Dissertations
Thin fallout tuffs in the Duchesne River Formation in the Uinta Basin, Utah are evidence that volcanism was active in northern Nevada and Utah in the late Eocene. The Uinta Basin is a sedimentary basin that formed during the Laramide orogeny. Ponded lakes of various salinity filled and emptied and during the late Eocene the northern rim was dominated by a wetland/floodplain depositional setting. Most of the tuffs have rhyolitic mineral assemblages including quartz, biotite, sanidine, and allanite. Rhyolitic glass shards were also found in one of the ash beds. Biotite compositions have Fe/(Fe+Mg) ratios typical of calc-alkaline igneous rocks …
40ar/39ar Ages, Compositions, And Likely Source Of The Eocene Fallout Tuffs In The Duchesne River Formation, Northeastern Utah, Michael Seth Jensen
40ar/39ar Ages, Compositions, And Likely Source Of The Eocene Fallout Tuffs In The Duchesne River Formation, Northeastern Utah, Michael Seth Jensen
Theses and Dissertations
Thin fallout tuffs in the Duchesne River Formation in the Uinta Basin, Utah are evidence that volcanism was active in northern Nevada and Utah in the late Eocene. The Uinta Basin is a sedimentary basin that formed during the Laramide orogeny. Ponded lakes of various salinity filled and emptied and during the late Eocene the northern rim was dominated by a wetland/floodplain depositional setting. Most of the tuffs have rhyolitic mineral assemblages including quartz, biotite, sanidine, and allanite. Rhyolitic glass shards were also found in one of the ash beds. Biotite compositions have Fe/(Fe+Mg) ratios typical of calc-alkaline igneous rocks …
Spice: Secure Proximity-Based Infrastructure For Close Encounters, Aarathi Prasad, Xiaohui Liang, David Kotz
Spice: Secure Proximity-Based Infrastructure For Close Encounters, Aarathi Prasad, Xiaohui Liang, David Kotz
Dartmouth Scholarship
We present a crowdsourcing system that extends the capabilities of location-based applications and allows users to connect and exchange information with users in spatial and temporal proximity. We define this incident of spatio-temporal proximity as a \em close encounter. Typically, location-based application users store their information on a server, and trust the server to provide access only to authorized users, not misuse the data or disclose their location history. Our system, called SPICE, addresses these privacy issues by leveraging Wi-Fi access points to connect users and encrypt their information before it is exchanged, so only users in close encounters have …
Yang Mills Theories, Paul Bracken
Yang Mills Theories, Paul Bracken
School of Mathematical and Statistical Sciences Faculty Publications and Presentations
Yang-Mills gauge theories have become an important way in which to describe matter at a fundamental level. This book explores some of the aspects of their structure, quantization applications and formalism in detail. The subject matter is approached from a number of different points of view. The path integral technique is used to study and quantize the theory. Some solvable low dimensional models are introduced as well.
Alternative Mission Concepts For The Exploration Of Outer Planets Using Small Satellite Swarms, Andrew Gene Blocher
Alternative Mission Concepts For The Exploration Of Outer Planets Using Small Satellite Swarms, Andrew Gene Blocher
Master's Theses
Interplanetary space exploration has thus far consisted of single, expensive spacecraft missions. Mission costs are particularly high on missions to the outer planets and while invaluable, finite budgets limit our ability to perform extensive and frequent investigations of the planets. Planetary systems such as Jupiter and Saturn provide extremely complex exploration environments with numerous targets of interest. Exploring these targets in addition to the main planet requires multiple fly-bys and long mission timelines. In LEO, CubeSats have changed the exploration paradigm, offering a fast and low cost alternative to traditional space vehicles. This new mission development philosophy has the potential …
Dendritic Plasmonics For Mid-Infrared Spectroscopy, Francois Lagugne-Labarthet, Gregory Q. Wallace, Hayden C. Foy, Scott M. Rosendahl
Dendritic Plasmonics For Mid-Infrared Spectroscopy, Francois Lagugne-Labarthet, Gregory Q. Wallace, Hayden C. Foy, Scott M. Rosendahl
Chemistry Publications
Metallic nanostructures that exhibit tailored optical resonances spanning from the near to mid-infrared spectral range are of particular interest for spectroscopic and optical measurements in these spectral domains that can benefit from localized surface-enhancement effects. Plasmon resonances shifted in the near or mid-infrared range could be used to further enhance the excitation and/or the emission of an optical process. Surface-enhanced infrared absorption (SEIRA) is one of such processes and can particularly benefit from plasmon-enhanced local fields yielding an increase in sensitivity towards the detection of an analyte. Herein, we have fabricated a series of gold dendritic nanostructures, prepared by electron-beam …
"Not Yet The End Of The World": Political Cultures Of Opposition And Creation In The Global Youth Climate Justice Movement, John Foran, Summer Gray, Corrie Grosse
"Not Yet The End Of The World": Political Cultures Of Opposition And Creation In The Global Youth Climate Justice Movement, John Foran, Summer Gray, Corrie Grosse
Environmental Studies Faculty Publications
Based on participant observation and in-depth interviews with two dozen young climate justice activists at the U.N. climate summit COP19 in Warsaw, Poland, in November 2013, this research uses the concepts of “political cultures of opposition and of creation” to analyze the political orientations, discourse, and actions of global climate justice activists attempting to impact the negotiation of a universal climate treaty. Capturing relationships among experience, emotions, ideology, idioms, and organization, the concepts of political cultures of opposition and of creation shed light on the ability of these actors to fashion social movements of their own making. Through an analysis …
On The Finite W-Algebra For The Lie Superalgebra Q(N) In The Non-Regular Case, Elena Poletaeva, Vera Serganova
On The Finite W-Algebra For The Lie Superalgebra Q(N) In The Non-Regular Case, Elena Poletaeva, Vera Serganova
School of Mathematical and Statistical Sciences Faculty Publications and Presentations
In this paper, we study the finite W-algebra for the queer Lie superalgebra Q(N) associated with the non-regular even nilpotent coadjoint orbits in the case when N = nl, and the corresponding nilpotent element has Jordan blocks each of size l. We prove that this finite W-algebra is isomorphic to a quotient of the super-Yangian of Q(n).
Capsense: Capacitor-Based Activity Sensing For Kinetic Energy Harvesting Powered Wearable Devices, Guohao Lan, Dong Ma, Weitao Xu, Mahbub Hassan, Wen Hu
Capsense: Capacitor-Based Activity Sensing For Kinetic Energy Harvesting Powered Wearable Devices, Guohao Lan, Dong Ma, Weitao Xu, Mahbub Hassan, Wen Hu
Research Collection School Of Computing and Information Systems
We propose a new activity sensing method, CapSense, which detects activities of daily living (ADL) by sampling the voltage of the kinetic energy harvesting (KEH) capacitor at an ultra low sampling rate. Unlike conventional sensors that generate only instantaneous motion information of the subject, KEH capacitors accumulate and store human generated energy over time. Given that humans produce kinetic energy at distinct rates for different ADL, the KEH capacitor can be sampled only once in a while to observe the energy generation rate and identify the current activity. Thus, with CapSense, it is possible to avoid collecting time series motion …
Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping, Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li
Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping, Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li
Research Collection School Of Computing and Information Systems
Many popular modern processors include an important hardware security feature in the form of a DRTM (Dynamic Root of Trust for Measurement) that helps bootstrap trust and resists software attacks. However, despite substantial body of prior research on trust establishment, security of DRTM was treated without involvement of the human user, who represents a vital missing link. The basic challenge is: how can a human user determine whether an expected DRTM is currently active on her device? In this paper, we define the notion of “presence attestation”, which is based on mandatory, though minimal, user participation. We present three concrete …
Collaborative Topic Regression With Denoising Autoencoder For Content And Community Co-Representation, Trong T. Nguyen, Hady W. Lauw
Collaborative Topic Regression With Denoising Autoencoder For Content And Community Co-Representation, Trong T. Nguyen, Hady W. Lauw
Research Collection School Of Computing and Information Systems
Personalized recommendation of items frequently faces scenarios where we have sparse observations on users' adoption of items. In the literature, there are two promising directions. One is to connect sparse items through similarity in content. The other is to connect sparse users through similarity in social relations. We seek to integrate both types of information, in addition to the adoption information, within a single integrated model. Our proposed method models item content via a topic model, and user communities via an autoencoder model, while bridging a user's community-based preference to her topic-based preference. Experiments on public real-life data showcase the …
On Locating Malicious Code In Piggybacked Android Apps, Li Li, Daoyuan Li, Tegawende F. Bissyande, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon
On Locating Malicious Code In Piggybacked Android Apps, Li Li, Daoyuan Li, Tegawende F. Bissyande, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon
Research Collection School Of Computing and Information Systems
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth of piggybacked apps, we are able to automatically …
Answerbot: Automated Generation Of Answer Summary To Developers’ Technical Questions, Bowen Xu, Zhenchang Xing, Xin Xia, David Lo
Answerbot: Automated Generation Of Answer Summary To Developers’ Technical Questions, Bowen Xu, Zhenchang Xing, Xin Xia, David Lo
Research Collection School Of Computing and Information Systems
The prevalence of questions and answers on domain-specific Q&A sites like Stack Overflow constitutes a core knowledge asset for software engineering domain. Although search engines can return a list of questions relevant to a user query of some technical question, the abundance of relevant posts and the sheer amount of information in them makes it difficult for developers to digest them and find the most needed answers to their questions. In this work, we aim to help developers who want to quickly capture the key points of several answer posts relevant to a technical question before they read the details …
Sourcevote: Fusing Multi-Valued Data Via Inter-Source Agreements, Xiu Susie Fang, Quan Z. Sheng, Xianzhi Wang, Mahmoud Barhamgi, Lina Yao, Anne H.H. Ngu
Sourcevote: Fusing Multi-Valued Data Via Inter-Source Agreements, Xiu Susie Fang, Quan Z. Sheng, Xianzhi Wang, Mahmoud Barhamgi, Lina Yao, Anne H.H. Ngu
Research Collection School Of Computing and Information Systems
Data fusion is a fundamental research problem of identifying true values of data items of interest from conflicting multi-sourced data. Although considerable research efforts have been conducted on this topic, existing approaches generally assume every data item has exactly one true value, which fails to reflect the real world where data items with multiple true values widely exist. In this paper, we propose a novel approach,SourceVote, to estimate value veracity for multi-valued data items. SourceVote models the endorsement relations among sources by quantifying their two-sided inter-source agreements. In particular, two graphs are constructed to model inter-source relations. Then two aspects …
Modeling Check-In Behavior With Geographical Neighborhood Influence Of Venues, Thanh Nam Doan, Ee Peng Lim
Modeling Check-In Behavior With Geographical Neighborhood Influence Of Venues, Thanh Nam Doan, Ee Peng Lim
Research Collection School Of Computing and Information Systems
With many users adopting location-based social networks (LBSNs) to share their daily activities, LBSNs become a gold mine for researchers to study human check-in behavior. Modeling such behavior can benefit many useful applications such as urban planning and location-aware recommender systems. Unlike previous studies [4,6,12,17] that focus on the effect of distance on users checking in venues, we consider two venue-specific effects of geographical neighborhood influence, namely, spatial homophily and neighborhood competition. The former refers to the fact that venues share more common features with their spatial neighbors, while the latter captures the rivalry of a venue and its nearby …
Large Scale Kernel Methods For Online Auc Maximization, Yi Ding, Chenghao Liu, Peilin Zhao, Steven C. H. Hoi
Large Scale Kernel Methods For Online Auc Maximization, Yi Ding, Chenghao Liu, Peilin Zhao, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Learning to optimize AUC performance for classifying label imbalanced data in online scenarios has been extensively studied in recent years. Most of the existing work has attempted to address the problem directly in the original feature space, which may not suitable for non-linearly separable datasets. To solve this issue, some kernel-based learning methods are proposed for non-linearly separable datasets. However, such kernel approaches have been shown to be inefficient and failed to scale well on large scale datasets in practice. Taking this cue, in this work, we explore the use of scalable kernel-based learning techniques as surrogates to existing approaches: …
Highly Efficient Mining Of Overlapping Clusters In Signed Weighted Networks, Tuan-Anh Hoang, Ee-Peng Lim
Highly Efficient Mining Of Overlapping Clusters In Signed Weighted Networks, Tuan-Anh Hoang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
In many practical contexts, networks are weighted as their links are assigned numerical weights representing relationship strengths or intensities of inter-node interaction. Moreover, the links' weight can be positive or negative, depending on the relationship or interaction between the connected nodes. The existing methods for network clustering however are not ideal for handling very large signed weighted networks. In this paper, we present a novel method called LPOCSIN (short for "Linear Programming based Overlapping Clustering on Signed Weighted Networks") for efficient mining of overlapping clusters in signed weighted networks. Different from existing methods that rely on computationally expensive cluster cohesiveness …
A Verification Framework For Stateful Security Protocols, Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu, Jin Song Dong
A Verification Framework For Stateful Security Protocols, Li Li, Naipeng Dong, Jun Pang, Jun Sun, Guangdong Bai, Yang Liu, Jin Song Dong
Research Collection School Of Computing and Information Systems
A long-standing research problem is how to efficiently verify security protocols with tamper-resistant global states, especially when the global states evolve unboundedly. We propose a protocol specification framework, which facilitates explicit modeling of states and state transformations. On the basis of that, we develop an algorithm for verifying security properties of protocols with unbounded state-evolving, by tracking state transformation and checking the validity of the state-evolving traces. We prove the correctness of the verification algorithm, implement both of the specification framework and the algorithm, and evaluate our implementation using a number of stateful security protocols. The experimental results show that …