Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (4470)
- Earth Sciences (3274)
- Engineering (3242)
- Life Sciences (3192)
- Environmental Sciences (2196)
-
- Computer Engineering (1982)
- Artificial Intelligence and Robotics (1917)
- Soil Science (1906)
- Plant Sciences (1900)
- Numerical Analysis and Scientific Computing (1604)
- Operations Research, Systems Engineering and Industrial Engineering (1545)
- Chemistry (1544)
- Systems Science (1491)
- Mathematics (1380)
- Physics (1332)
- Social and Behavioral Sciences (954)
- Oceanography and Atmospheric Sciences and Meteorology (739)
- Medicine and Health Sciences (659)
- Statistics and Probability (637)
- Sustainability (599)
- Electrical and Computer Engineering (509)
- Natural Resources and Conservation (508)
- Applied Mathematics (472)
- Geology (441)
- Education (431)
- Natural Resources Management and Policy (428)
- Databases and Information Systems (388)
- Other Environmental Sciences (341)
- Arts and Humanities (331)
- Institution
-
- University of Kentucky (1971)
- China Simulation Federation (1490)
- University of Nebraska - Lincoln (647)
- TÜBİTAK (626)
- Singapore Management University (494)
-
- Old Dominion University (272)
- University of Texas Rio Grande Valley (243)
- City University of New York (CUNY) (241)
- Chulalongkorn University (218)
- China Coal Technology and Engineering Group (CCTEG) (204)
- University of South Florida (203)
- Utah State University (202)
- Portland State University (188)
- University of Texas at El Paso (176)
- Louisiana State University (165)
- Technological University Dublin (159)
- Western University (158)
- Nova Southeastern University (152)
- Missouri University of Science and Technology (150)
- Western Washington University (140)
- University of Nevada, Las Vegas (134)
- William & Mary (127)
- Air Force Institute of Technology (121)
- University of New Mexico (120)
- University of Wollongong (118)
- University of Arkansas, Fayetteville (115)
- Claremont Colleges (113)
- University of Central Florida (113)
- Walden University (107)
- Boise State University (106)
- Keyword
-
- Machine learning (242)
- Climate change (135)
- Deep learning (115)
- Simulation (110)
- Sustainability (98)
-
- Machine Learning (94)
- Grazing (84)
- COVID-19 (76)
- Computer Science (74)
- Mathematics (74)
- Remote sensing (72)
- Cybersecurity (69)
- Artificial intelligence (65)
- Climate (64)
- Physics (62)
- Biodiversity (56)
- Grassland (56)
- Chemistry (55)
- Modeling (50)
- Environment (45)
- Statistics (44)
- Agriculture (42)
- Nitrogen (42)
- Optimization (42)
- Deep Learning (41)
- Classification (40)
- Livestock (39)
- Conservation (38)
- GIS (38)
- Neural networks (38)
- Publication
-
- IGC Proceedings (1993-2023) (1785)
- Journal of System Simulation (1490)
- Theses and Dissertations (494)
- Research Collection School Of Computing and Information Systems (448)
- Turkish Journal of Electrical Engineering and Computer Sciences (230)
-
- Coal Geology & Exploration (204)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (190)
- Faculty Publications (190)
- Electronic Theses and Dissertations (189)
- Turkish Journal of Mathematics (169)
- USF Tampa Graduate Theses and Dissertations (131)
- Turkish Journal of Chemistry (130)
- Dissertations (115)
- Electronic Thesis and Dissertation Repository (114)
- Departmental Technical Reports (CS) (110)
- Articles (107)
- Walden Dissertations and Doctoral Studies (106)
- Australian Institute for Innovative Materials - Papers (104)
- Honors Theses (98)
- School of Natural Resources: Faculty Publications (95)
- Open Educational Resources (91)
- Applications and Applied Mathematics: An International Journal (AAM) (90)
- Electronic Theses and Dissertations, 2020-2023 (88)
- Research outputs 2014 to 2021 (87)
- United States Department of Agriculture Wildlife Services: Staff Publications (85)
- Graduate Theses and Dissertations (83)
- The Synapse: Intercollegiate science magazine (82)
- Journal of Electrochemistry (81)
- Doctoral Dissertations (77)
- Publications and Research (74)
- Publication Type
Articles 1681 - 1710 of 15208
Full-Text Articles in Physical Sciences and Mathematics
Boosting Privately: Federated Extreme Gradient Boosting For Mobile Crowdsensing, Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren
Boosting Privately: Federated Extreme Gradient Boosting For Mobile Crowdsensing, Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert H. Deng, Kui Ren
Research Collection School Of Computing and Information Systems
Recently, Google and other 24 institutions proposed a series of open challenges towards federated learning (FL), which include application expansion and homomorphic encryption (HE). The former aims to expand the applicable machine learning models of FL. The latter focuses on who holds the secret key when applying HE to FL. For the naive HE scheme, the server is set to master the secret key. Such a setting causes a serious problem that if the server does not conduct aggregation before decryption, a chance is left for the server to access the user’s update. Inspired by the two challenges, we propose …
An Empirical Study Of Release Note Production And Usage In Practice, Tingting Bi, Xin Xia, David Lo, John Grundy, Thomas Zimmermann
An Empirical Study Of Release Note Production And Usage In Practice, Tingting Bi, Xin Xia, David Lo, John Grundy, Thomas Zimmermann
Research Collection School Of Computing and Information Systems
The release note is one of the most important software artifacts that serves as a bridge for communication among stakeholders. Release notes contain a set of crucial information, such as descriptions of enhancements, improvements, potential issues, development, evolution, testing, and maintenance of projects throughout the whole development lifestyle. A comprehensive understanding of what makes a good release note and how to write one for different stakeholders would be highly beneficial. However, in practice, the release note is often neglected by stakeholders and has not to date been systematically investigated by researchers. In this paper, we conduct a mixed methods study …
Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua
Using Data Analytics To Predict Students Score, Nang Laik Ma, Gim Hong Chua
Research Collection School Of Computing and Information Systems
Education is very important to Singapore, and the government has continued to invest heavily in our education system to become one of the world-class systems today. A strong foundation of Science, Technology, Engineering, and Mathematics (STEM) was what underpinned Singapore's development over the past 50 years. PISA is a triennial international survey that evaluates education systems worldwide by testing the skills and knowledge of 15-year-old students who are nearing the end of compulsory education. In this paper, the authors used the PISA data from 2012 and 2015 and developed machine learning techniques to predictive the students' scores and understand the …
A Secure Flexible And Tampering-Resistant Data Sharing System For Vehicular Social Networks, Jianfei Sun, Hu Xiong, Shufan Zhang, Ximeng Liu, Jiaming Yuan, Robert H. Deng
A Secure Flexible And Tampering-Resistant Data Sharing System For Vehicular Social Networks, Jianfei Sun, Hu Xiong, Shufan Zhang, Ximeng Liu, Jiaming Yuan, Robert H. Deng
Research Collection School Of Computing and Information Systems
Vehicular social networks (VSNs) have emerged as the promising paradigm of vehicular networks that can improve traffic safety, relieve traffic congestion and even provide comprehensive social services by sharing vehicular sensory data. To selectively share the sensory data with other vehicles in the vicinity and reduce the local storage burden of vehicles, the vehicular sensory data are usually outsourced to vehicle cloud server for sharing and searching. However, existing data sharing systems for VSNs can neither provide secure selective one-to-many data sharing and verifiable data retrieval over encrypted data nor ensure that the integrity of retrieved data. In this paper, …
Capitalising Product Associations In A Supermarket Retail Environment, Michelle L. F. Cheong, Yong Qing Chia
Capitalising Product Associations In A Supermarket Retail Environment, Michelle L. F. Cheong, Yong Qing Chia
Research Collection School Of Computing and Information Systems
This paper explores methods to capitalise on retail companies’ transactional databases, to mine meaningful product associations, and to design product placement strategies as a means to drive sales. We implemented three in-store initiatives based on our hypotheses – placing products with high associations together will induce an increase in sales of consequent; introducing an antecedent that is new to store will bring about a similar impact on sales of consequent based on established product association rules uncovered from other stores. Sales tracking over twelve weeks revealed that there were improvements in sales of consequents across all three initiatives performed in-store.
Jito: A Tool For Just-In-Time Defect Identification And Localization, Fangcheng Qiu, Meng Yan, Xin Xia, Xinyu Wang, Yuanrui Fan, Ahmed E. Hassan, David Lo
Jito: A Tool For Just-In-Time Defect Identification And Localization, Fangcheng Qiu, Meng Yan, Xin Xia, Xinyu Wang, Yuanrui Fan, Ahmed E. Hassan, David Lo
Research Collection School Of Computing and Information Systems
In software development and maintenance, defect localization is necessary for software quality assurance. Current defect localization techniques mainly rely on defect symptoms (e.g., bug reports or program spectrum) when the defect has been exposed. One challenge task is: can we locate buggy program prior to the appearance of the defect symptom. Such kind of localization is conducted at an early stage (e.g., when buggy program elements are being checkedin) which can be an early step of continuous quality control.In this paper, we propose a Just-In-Time defect identification and lOcalization tool, named JITO, which can help developers to locate defective lines …
Cross-Thought For Sentence Encoder Pre-Training, Shuohang Wang, Yuwei Fang, Siqi Sun, Zhe Gan, Yu Cheng, Jingjing Liu, Jing Jiang
Cross-Thought For Sentence Encoder Pre-Training, Shuohang Wang, Yuwei Fang, Siqi Sun, Zhe Gan, Yu Cheng, Jingjing Liu, Jing Jiang
Research Collection School Of Computing and Information Systems
In this paper, we propose Cross-Thought, a novel approach to pre-training sequence encoder, which is instrumental in building reusable sequence embeddings for large-scale NLP tasks such as question answering. Instead of using the original signals of full sentences, we train a Transformer-based sequence encoder over a large set of short sequences, which allows the model to automatically select the most useful information for predicting masked words. Experiments on question answering and textual entailment tasks demonstrate that our pre-trained encoder can outperform state-of-the-art encoders trained with continuous sentence signals as well as traditional masked language modeling baselines. Our proposed approach also …
Effort-Aware Just-In-Time Defect Identification In Practice: A Case Study At Alibaba, Meng Yan, Xin Xia, Yuanrui Fan, David Lo, Ahmed E. Hassan, Xindong Zhang
Effort-Aware Just-In-Time Defect Identification In Practice: A Case Study At Alibaba, Meng Yan, Xin Xia, Yuanrui Fan, David Lo, Ahmed E. Hassan, Xindong Zhang
Research Collection School Of Computing and Information Systems
Effort-aware Just-in-Time (JIT) defect identification aims at identifying defect-introducing changes just-in-time with limited code inspection effort. Such identification has two benefits compared with traditional module-level defect identification, i.e., identifying defects in a more cost-effective and efficient manner. Recently, researchers have proposed various effort-aware JIT defect identification approaches, including supervised (e.g., CBS+, OneWay) and unsupervised approaches (e.g., LT and Code Churn). The comparison of the effectiveness between such supervised and unsupervised approaches has attracted a large amount of research interest. However, the effectiveness of the recently proposed approaches and the comparison among them have never been investigated in an industrial setting.In …
Leveraging Profanity For Insincere Content Detection: A Neural Network Approach, Swapna Gottipati, Annabel Tan, David Jing Shan Chow, Joel Wee Kiat Lim
Leveraging Profanity For Insincere Content Detection: A Neural Network Approach, Swapna Gottipati, Annabel Tan, David Jing Shan Chow, Joel Wee Kiat Lim
Research Collection School Of Computing and Information Systems
Community driven social media sites are rich sources of knowledge and entertainment and at the same vulnerable to the flames or toxic content that can be dangerous to various users of these platforms as well as to the society. Therefore, it is crucial to identify and remove such content to have a better and safe online experience. Manually eliminating flames is tedious and hence many research works focus on machine learning or deep learning models for automated methods. In this paper, we primarily focus on detecting the insincere content using neural network-based learning methods. We also integrated the profanity features …
A Theory Of The Engagement In Open Source Projects Via Summer Of Code Programs, Jefferson Silva, Igor Wiese, Daniel M. German, Christoph Treude, Marco A. Gerosa, Igor Steinmacher
A Theory Of The Engagement In Open Source Projects Via Summer Of Code Programs, Jefferson Silva, Igor Wiese, Daniel M. German, Christoph Treude, Marco A. Gerosa, Igor Steinmacher
Research Collection School Of Computing and Information Systems
Summer of code programs connect students to open source software (OSS) projects, typically during the summer break from school. Analyzing consolidated summer of code programs can reveal how college students, who these programs usually target, can be motivated to participate in OSS, and what onboarding strategies OSS communities adopt to receive these students. In this paper, we study the well-established Google Summer of Code (GSoC) and devise an integrated engagement theory grounded in multiple data sources to explain motivation and onboarding in this context. Our analysis shows that OSS communities employ several strategies for planning and executing student participation, socially …
Answerfact: Fact Checking In Product Question Answering, Wenxuan Zhang, Yang Deng, Jing Ma, Wai Lam
Answerfact: Fact Checking In Product Question Answering, Wenxuan Zhang, Yang Deng, Jing Ma, Wai Lam
Research Collection School Of Computing and Information Systems
Product-related question answering platforms nowadays are widely employed in many E-commerce sites, providing a convenient way for potential customers to address their concerns during online shopping. However, the misinformation in the answers on those platforms poses unprecedented challenges for users to obtain reliable and truthful product information, which may even cause a commercial loss in E-commerce business. To tackle this issue, we investigate to predict the veracity of answers in this paper and introduce AnswerFact, a large scale fact checking dataset from product question answering forums. Each answer is accompanied by its veracity label and associated evidence sentences, providing a …
An Integrated Assessment Of The Global Virtual Water Trade Network Of Energy, Rebecca A. M. Peer, Christopher M. Chini
An Integrated Assessment Of The Global Virtual Water Trade Network Of Energy, Rebecca A. M. Peer, Christopher M. Chini
Faculty Publications
The global trade of energy allows for the distribution of the world's collective energy resources and, therefore, an increase in energy access. However, this network of trade also generates a network of virtually traded resources that have been used to produce energy commodities. An integrated database of energy trade water footprints is necessary to capture interrelated energy and water concerns of a globalized economy,and is also motivated by current climate and population trends. Here, we quantify and present the virtual water embedded in energy trade across the globe from 2012 to 2018, building on previous water footprinting and energy virtual …
Stochastic Delay Differential Equations With Applications In Ecology And Epidemics, Hebatallah Jamil Alsakaji
Stochastic Delay Differential Equations With Applications In Ecology And Epidemics, Hebatallah Jamil Alsakaji
Dissertations
Mathematical modeling with delay differential equations (DDEs) is widely used for analysis and predictions in various areas of life sciences, such as population dynamics, epidemiology, immunology, physiology, and neural networks. The memory or time-delays, in these models, are related to the duration of certain hidden processes like the stages of the life cycle, the time between infection of a cell and the production of new viruses, the duration of the infectious period, the immune period, and so on. In ordinary differential equations (ODEs), the unknown state and its derivatives are evaluated at the same time instant. In DDEs, however, the …
Efficient Filters For Geometric Intersection Computations Using Gpu, Yiming Liu, Satish Puri
Efficient Filters For Geometric Intersection Computations Using Gpu, Yiming Liu, Satish Puri
Computer Science Faculty Research and Publications
Geometric intersection algorithms are fundamental in spatial analysis in Geographic Information System (GIS). Applying high performance computing to perform geometric intersection on huge amount of spatial data to get real-time results is necessary. Given two input geometries (polygon or polyline) of a candidate pair, we introduce a new two-step geospatial filter that first creates sketches of the geometries and uses it to detect workload and then refines the sketches by the common areas of sketches to decrease the overall computations in the refine phase. We call this filter PolySketch-based CMBR (PSCMBR) filter. We show the application of this filter in …
Groundwater Withdrawal Prediction Using Integrated Multitemporal Remote Sensing Data Sets And Machine Learning, S. Majumdar, Ryan G. Smith, J. J. Butler, V. Lakshmi
Groundwater Withdrawal Prediction Using Integrated Multitemporal Remote Sensing Data Sets And Machine Learning, S. Majumdar, Ryan G. Smith, J. J. Butler, V. Lakshmi
Geosciences and Geological and Petroleum Engineering Faculty Research & Creative Works
Effective monitoring of groundwater withdrawals is necessary to help mitigate the negative impacts of aquifer depletion. In this study, we develop a holistic approach that combines water balance components with a machine learning model to estimate groundwater withdrawals. We use both multitemporal satellite and modeled data from sensors that measure different components of the water balance and land use at varying spatial and temporal resolutions. These remote sensing products include evapotranspiration, precipitation, and land cover. Due to the inherent complexity of integrating these data sets and subsequently relating them to groundwater withdrawals using physical models, we apply random forests -- …
The Cycle Structure Of Unicritical Polynomials, Andrew Bridy, Derek Garton
The Cycle Structure Of Unicritical Polynomials, Andrew Bridy, Derek Garton
Mathematics and Statistics Faculty Publications and Presentations
A polynomial with integer coefficients yields a family of dynamical systems indexed by primes as follows: for any prime p" role="presentation" style="box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; font-variant: inherit; font-stretch: inherit; line-height: normal; font-family: inherit; vertical-align: baseline; display: inline; word-spacing: normal; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; max-height: none; min-width: 0px; min-height: 0px; position: relative;">pp, reduce its coefficients mod p" role="presentation" style="box-sizing: border-box; margin: 0px; padding: 0px; border: 0px; font-variant: inherit; font-stretch: inherit; line-height: normal; font-family: inherit; vertical-align: baseline; display: inline; word-spacing: normal; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; …
Significance Statements Communicate Our Science More Widely, Rezaul Mahmood
Significance Statements Communicate Our Science More Widely, Rezaul Mahmood
School of Natural Resources: Faculty Publications
The American Meteorological Society (AMS) mission statement specifically calls for advancing ‘‘the atmospheric and related sciences . . . for the benefit of society.’’ To further the goal of communicating the importance of the science in our journals more widely, AMS is encouraging the inclusion in submitted papers of a ‘‘significance statement,’’ written in plain language and aimed at an educated layperson without formal training or education in the atmospheric and related sciences. As of 6 November 2020, Earth Interactions authors now have the option to include a significance statement with their submitted papers. A significance statement is an explanation …
Data Availability Principles And Practice, Rezaul Mahmood, Joseph A. Santanello, Xiaoyang Zhang
Data Availability Principles And Practice, Rezaul Mahmood, Joseph A. Santanello, Xiaoyang Zhang
School of Natural Resources: Faculty Publications
Science requires evidence. Making data available lets other scientists confirm results, uncover errors, or find new insights. Moreover, gathering data can be expensive and time consuming. Since the same data can be used for a range of purposes, making data available can be an efficient use of limited research resources. Doing so can also improve traceability and, thus, accountability, when it comes to research findings. These reasons and more lie behind recent efforts to promote data availability. The American Meteorological Society (AMS) recently updated its data policy guidelines (https://www.ametsoc.org/ index.cfm/ams/publications/ethical-guidelines-and-ams-policies/data-policy-and-guidelines/) to require, among other things, that papers in its journals …
Using Current-Voltage Characteristics To Probe The Transport Mechanism In Carbon Nanotube Networks, Alejandro Jimenez
Using Current-Voltage Characteristics To Probe The Transport Mechanism In Carbon Nanotube Networks, Alejandro Jimenez
Physics
Carbon nanotube (CNT) random networks have shown great promise in electronic applications. For example, they have been used as the active layer in thin film transistor biosensors and as electrodes in supercapacitors (Hu, 2010). Although CNT networks applications are numerous, some of the key details of their electrical behavior are not fully understood. In particular, it is known that the junctions between tubes in CNT networks play a key role in determining the sensing properties of the network (Thanihaichelvana, et al., 2018), however, the mechanism by which metallic-semiconducting (m-s) tube junctions affect the electrical sensing properties of the network is …
Under-Ice Phytoplankton Blooms: Shedding Light On The "Invisible" Part Of Arctic Primary Production, Mathieu Ardyna, C. J. Mundy, Nicolas Mayot, Lisa C. Matthes, Laurent Oziel, Christopher Horvat, Eva Leu, Philipp Assmy, Victoria Hill, Patricia A. Matrai, Matthew Gale, Igor A. Melnikov, Kevin R. Arrigo
Under-Ice Phytoplankton Blooms: Shedding Light On The "Invisible" Part Of Arctic Primary Production, Mathieu Ardyna, C. J. Mundy, Nicolas Mayot, Lisa C. Matthes, Laurent Oziel, Christopher Horvat, Eva Leu, Philipp Assmy, Victoria Hill, Patricia A. Matrai, Matthew Gale, Igor A. Melnikov, Kevin R. Arrigo
OES Faculty Publications
The growth of phytoplankton at high latitudes was generally thought to begin in open waters of the marginal ice zone once the highly reflective sea ice retreats in spring, solar elevation increases, and surface waters become stratified by the addition of sea-ice melt water. In fact, virtually all recent large-scale estimates of primary production in the Arctic Ocean (AO) assume that phytoplankton production in the water column under sea ice is negligible. However, over the past two decades, an emerging literature showing significant under-ice phytoplankton production on a pan-Arctic scale has challenged our paradigms of Arctic phytoplankton ecology and phenology. …
Marine Wild-Capture Fisheries After Nuclear War, Kim J. N. Scherrer, Cheryl S. Harrison, Ryan F. Heneghan, Eric Galbraith, Charles G. Bardeen, Joshua Coupe, Jonas Jägermeyr, Nicole S. Lovenduski, August Luna, Alan Robock, Jessica Stevens, Samantha Stevenson, Owen B. Toon, Lili Xia
Marine Wild-Capture Fisheries After Nuclear War, Kim J. N. Scherrer, Cheryl S. Harrison, Ryan F. Heneghan, Eric Galbraith, Charles G. Bardeen, Joshua Coupe, Jonas Jägermeyr, Nicole S. Lovenduski, August Luna, Alan Robock, Jessica Stevens, Samantha Stevenson, Owen B. Toon, Lili Xia
School of Earth, Environmental, and Marine Sciences Faculty Publications and Presentations
Nuclear war, beyond its devastating direct impacts, is expected to cause global climatic perturbations through injections of soot into the upper atmosphere. Reduced temperature and sunlight could drive unprecedented reductions in agricultural production, endangering global food security. However, the effects of nuclear war on marine wild-capture fisheries, which significantly contribute to the global animal protein and micronutrient supply, remain unexplored. We simulate the climatic effects of six war scenarios on fish biomass and catch globally, using a state-of-the-art Earth system model and global process-based fisheries model. We also simulate how either rapidly increased fish demand (driven by food shortages) or …
Coupled Hierarchical Transformer For Stance-Aware Rumor Verification In Social Media Conversations, Jianfei Yu, Jing Jiang, Ling Min Serena Khoo, Hai Leong Chieu, Rui Xia
Coupled Hierarchical Transformer For Stance-Aware Rumor Verification In Social Media Conversations, Jianfei Yu, Jing Jiang, Ling Min Serena Khoo, Hai Leong Chieu, Rui Xia
Research Collection School Of Computing and Information Systems
The prevalent use of social media enables rapid spread of rumors on a massive scale, which leads to the emerging need of automatic rumor verification (RV). A number of previous studies focus on leveraging stance classification to enhance RV with multi-task learning (MTL) methods. However, most of these methods failed to employ pre-trained contextualized embeddings such as BERT, and did not exploit inter-task dependencies by using predicted stance labels to improve the RV task. Therefore, in this paper, to extend BERT to obtain thread representations, we first propose a Hierarchical Transformer1 , which divides each long thread into shorter subthreads, …
Bugsinpy: A Database Of Existing Bugs In Python Programs To Enable Controlled Testing And Debugging Studies, Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo, Eng Lieh Ouh
Bugsinpy: A Database Of Existing Bugs In Python Programs To Enable Controlled Testing And Debugging Studies, Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo, Eng Lieh Ouh
Research Collection School Of Computing and Information Systems
The 2019 edition of Stack Overflow developer survey highlights that, for the first time, Python outperformed Java in terms of popularity. The gap between Python and Java further widened in the 2020 edition of the survey. Unfortunately, despite the rapid increase in Python's popularity, there are not many testing and debugging tools that are designed for Python. This is in stark contrast with the abundance of testing and debugging tools for Java. Thus, there is a need to push research on tools that can help Python developers.One factor that contributed to the rapid growth of Java testing and debugging tools …
Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi
Reducing Estimation Bias Via Triplet-Average Deep Deterministic Policy Gradient, Dongming Wu, Xingping Dong, Jianbing Shen, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
The overestimation caused by function approximation is a well-known property in Q-learning algorithms, especially in single-critic models, which leads to poor performance in practical tasks. However, the opposite property, underestimation, which often occurs in Q-learning methods with double critics, has been largely left untouched. In this article, we investigate the underestimation phenomenon in the recent twin delay deep deterministic actor-critic algorithm and theoretically demonstrate its existence. We also observe that this underestimation bias does indeed hurt performance in various experiments. Considering the opposite properties of single-critic and double-critic methods, we propose a novel triplet-average deep deterministic policy gradient algorithm that …
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun
Research Collection School Of Computing and Information Systems
Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, …
A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm
A Framework For Identifying Host-Based Artifacts In Dark Web Investigations, Arica Kulm
Masters Theses & Doctoral Dissertations
The dark web is the hidden part of the internet that is not indexed by search engines and is only accessible with a specific browser like The Onion Router (Tor). Tor was originally developed as a means of secure communications and is still used worldwide for individuals seeking privacy or those wanting to circumvent restrictive regimes. The dark web has become synonymous with nefarious and illicit content which manifests itself in underground marketplaces containing illegal goods such as drugs, stolen credit cards, stolen user credentials, child pornography, and more (Kohen, 2017). Dark web marketplaces contribute both to illegal drug usage …
Iowa Waste Reduction Center Newsletter, November 2020, University Of Northern Iowa. Iowa Waste Reduction Center.
Iowa Waste Reduction Center Newsletter, November 2020, University Of Northern Iowa. Iowa Waste Reduction Center.
Iowa Waste Reduction Center Newsletter
Inside this Issue:
--- IWRC End of 2020 Director Address
--- IWRC Providing Compressed Air Assessment and Lighting Analysis
--- Iowa DNR creates EASY Air Equipment Deactivation Form
--- Industry News
Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra
Erica: Enabling Real-Time Mistake Detection And Corrective Feedback For Free-Weights Exercises, Meeralakshmi Radhakrishnan, Darshana Rathnayake, Koon Han Ong, Inseok Hwang, Archan Misra
Research Collection School Of Computing and Information Systems
We present ERICA, a digital personal trainer for users performing free weights exercises, with two key differentiators: (a) First, unlike prior approaches that either require multiple on-body wearables or specialized infrastructural sensing, ERICA uses a single in-ear "earable" device (piggybacking on a form factor routinely used by millions of gym-goers) and a simple inertial sensor mounted on each weight equipment; (b) Second, unlike prior work that focuses primarily on quantifying a workout, ERICA additionally identifies a variety of fine-grained exercising mistakes and delivers real-time, in-situ corrective instructions. To achieve this, we (a) design a robust approach for user-equipment association that …
Quotient-Transitivity And Cyclic Subgroup-Transitivity, Brendan Goldsmith, Ketao Gong
Quotient-Transitivity And Cyclic Subgroup-Transitivity, Brendan Goldsmith, Ketao Gong
Articles
We introduce two new notions of transitivity for Abelian 𝑝-groups based on isomorphism of quotients rather than the classical use of equality of height sequences associated with Abelian 𝑝-group theory. Unlike the classical theory where “most” groups are transitive, these new notions lead to much smaller classes, but even these classes are sufficiently large to be interesting.
Multi-Hop Inference For Question-Driven Summarization, Yang Deng, Wenxuan Zhang, Wai Lam
Multi-Hop Inference For Question-Driven Summarization, Yang Deng, Wenxuan Zhang, Wai Lam
Research Collection School Of Computing and Information Systems
Question-driven summarization has been recently studied as an effective approach to summarizing the source document to produce concise but informative answers for non-factoid questions. In this work, we propose a novel question-driven abstractive summarization method, Multi-hop Selective Generator (MSG), to incorporate multi-hop reasoning into question-driven summarization and, meanwhile, provide justifications for the generated summaries. Specifically, we jointly model the relevance to the question and the interrelation among different sentences via a human-like multi-hop inference module, which captures important sentences for justifying the summarized answer. A gated selective pointer generator network with a multi-view coverage mechanism is designed to integrate diverse …