Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (58809)
- Computer Sciences (57980)
- Environmental Sciences (52414)
- Engineering (40282)
- Life Sciences (39898)
-
- Physics (36546)
- Chemistry (34598)
- Geology (29722)
- Mathematics (27400)
- Social and Behavioral Sciences (24582)
- Oceanography and Atmospheric Sciences and Meteorology (16436)
- Statistics and Probability (13270)
- Education (12818)
- Computer Engineering (12810)
- Soil Science (12036)
- Medicine and Health Sciences (11826)
- Plant Sciences (11240)
- Natural Resources and Conservation (10273)
- Arts and Humanities (9734)
- Astrophysics and Astronomy (9214)
- Electrical and Computer Engineering (8897)
- Sustainability (8700)
- Natural Resources Management and Policy (8574)
- Artificial Intelligence and Robotics (8521)
- Water Resource Management (8294)
- Applied Mathematics (8001)
- Environmental Health and Protection (6889)
- Science and Mathematics Education (6761)
- Databases and Information Systems (6722)
- Institution
-
- University of Nebraska - Lincoln (24230)
- Western Michigan University (19508)
- Selected Works (16838)
- University of Kentucky (12081)
- TÜBİTAK (10319)
-
- Singapore Management University (7454)
- Utah State University (7343)
- Missouri University of Science and Technology (6057)
- Old Dominion University (5959)
- University of Wollongong (4868)
- William & Mary (4602)
- University of South Florida (3859)
- Wright State University (3840)
- Portland State University (3799)
- University of Nevada, Las Vegas (3640)
- Louisiana State University (3418)
- China Simulation Federation (3382)
- City University of New York (CUNY) (3221)
- Brigham Young University (2906)
- Purdue University (2813)
- Air Force Institute of Technology (2679)
- Claremont Colleges (2641)
- California Polytechnic State University, San Luis Obispo (2568)
- Western Washington University (2456)
- University of Arkansas, Fayetteville (2444)
- University of Texas Rio Grande Valley (2423)
- Department of Primary Industries and Regional Development, Western Australia (2360)
- University of Texas at El Paso (2316)
- Chinese Chemical Society | Xiamen University (2294)
- Chulalongkorn University (2268)
- Keyword
-
- Machine learning (1692)
- Climate change (1681)
- Western Australia (1583)
- Mathematics (1371)
- Chemistry (1158)
-
- Sustainability (1143)
- Physics (1068)
- Water quality (983)
- Deep learning (892)
- Geology (859)
- Groundwater (854)
- Machine Learning (830)
- Simulation (826)
- Research and Technical Reports (797)
- Water (780)
- United States (759)
- Education (756)
- Management (747)
- Nebraska (744)
- Agriculture (718)
- Artificial intelligence (708)
- Climate (702)
- GIS (700)
- Statistics (685)
- Security (681)
- Grains and field crops (674)
- Environment (672)
- Computer Science (667)
- Ecology (658)
- Optimization (658)
- Publication Year
-
- 2024 (8052)
- 2023 (12626)
- 2022 (18322)
- 2021 (27890)
- 2020 (15204)
-
- 2019 (15929)
- 2018 (13646)
- 2017 (12522)
- 2016 (12712)
- 2015 (12617)
- 2014 (12299)
- 2013 (11462)
- 2012 (12196)
- 2011 (10325)
- 2010 (8620)
- 2009 (7616)
- 2008 (7322)
- 2007 (6758)
- 2006 (5872)
- 2005 (5574)
- 2004 (4448)
- 2003 (3877)
- 2002 (3436)
- 2001 (3030)
- 2000 (2920)
- 1999 (2555)
- 1998 (2575)
- 1997 (2472)
- 1996 (2438)
- 1995 (2193)
- Publication
-
- Legacy Scout Tickets from Pure Oil Company (11044)
- Theses and Dissertations (8341)
- IGC Proceedings (1993-2023) (7057)
- Research Collection School Of Computing and Information Systems (6891)
- Thin Sections (5745)
-
- Electronic Theses and Dissertations (4195)
- Faculty Publications (3807)
- Journal of System Simulation (3382)
- Nebraska Tractor Tests (3348)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Masters Theses (2634)
- Turkish Journal of Chemistry (2628)
- Turkish Journal of Mathematics (2494)
- Journal of Electrochemistry (2294)
- Honors Theses (2164)
- Faculty of Informatics - Papers (Archive) (2013)
- Physics Faculty Publications (1942)
- Bulletin of the Mineral Research and Exploration (1893)
- Doctoral Dissertations (1883)
- Dissertations, Theses, and Masters Projects (1876)
- Reports (1835)
- Dissertations (1816)
- Physics Faculty Research & Creative Works (1762)
- Department of Computer Science Technical Reports (1721)
- USF Tampa Graduate Theses and Dissertations (1607)
- School of Natural Resources: Faculty Publications (1586)
- United States Department of Agriculture Wildlife Services: Staff Publications (1529)
- Australian Institute for Innovative Materials - Papers (1524)
- Electronic Thesis and Dissertation Repository (1476)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1427)
- Publication Type
Articles 31321 - 31350 of 302890
Full-Text Articles in Physical Sciences and Mathematics
A Novel Crimping Technique Approach For High Power White Good Plugs, Ömer Ci̇han Kivanç, Okan Özgönenel, Ömer Bostan, Şahi̇n Güzel, Mert Demi̇rsoy
A Novel Crimping Technique Approach For High Power White Good Plugs, Ömer Ci̇han Kivanç, Okan Özgönenel, Ömer Bostan, Şahi̇n Güzel, Mert Demi̇rsoy
Turkish Journal of Electrical Engineering and Computer Sciences
The crimping process is essential to human health and the durability of devices, especially in domestic appliances. Moreover, terminal crimping is critical to the safe transmission of electricity; incorrect crimping leads to problems including overheating of the plug, power loss, arc, and failure of the mechanical connection. In recent years, analysis has been performed by the finite element method (FEM) to prevent the incorrect design of crimping and to develop higher performance crimping techniques. A novel crimping technique for domestic appliances requiring high powered plugs is proposed in this study. After defining the crimp parameters and the materials that are …
Context Modeling With Evidence Filter For Multiple Choice Question Answering, Sicheng Yu, Hao Zhang, Wei Jing, Jing Jiang
Context Modeling With Evidence Filter For Multiple Choice Question Answering, Sicheng Yu, Hao Zhang, Wei Jing, Jing Jiang
Research Collection School Of Computing and Information Systems
Multiple-Choice Question Answering (MCQA) is one of the challenging tasks in machine reading comprehension. The main challenge in MCQA is to extract "evidence" from the given context that supports the correct answer. In OpenbookQA dataset [1], the requirement of extracting "evidence" is particularly important due to the mutual independence of sentences in the context. Existing work tackles this problem by annotated evidence or distant supervision with rules which overly rely on human efforts. To address the challenge, we propose a simple yet effective approach termed evidence filtering to model the relationships between the encoded contexts with respect to different options …
Topic-Guided Conversational Recommender In Multiple Domains, Lizi Liao, Ryuichi Takanobu, Yunshan Ma, Xun Yang, Minlie Huang, Tat-Seng Chua
Topic-Guided Conversational Recommender In Multiple Domains, Lizi Liao, Ryuichi Takanobu, Yunshan Ma, Xun Yang, Minlie Huang, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Conversational systems have recently attracted significant attention. Both the research community and industry believe that it will exert huge impact on human-computer interaction, and specifically, the IR/RecSys community has begun to explore Conversational Recommendation. In real-life scenarios, such systems are often urgently needed in helping users accomplishing different tasks under various situations. However, existing works still face several shortcomings: (1) Most efforts are largely confined in single task setting. They fall short of hands in handling tasks across domains. (2) Aside from soliciting user preference from dialogue history, a conversational recommender naturally has access to the back-end data structure which …
Structure-Aware Visualization Retrieval, Haotian Li, Yong Wang, Aoyu Wu, Huan Wei, Huamin. Qu
Structure-Aware Visualization Retrieval, Haotian Li, Yong Wang, Aoyu Wu, Huan Wei, Huamin. Qu
Research Collection School Of Computing and Information Systems
With the wide usage of data visualizations, a huge number of Scalable Vector Graphic (SVG)-based visualizations have been created and shared online. Accordingly, there has been an increasing interest in exploring how to retrieve perceptually similar visualizations from a large corpus, since it can benefit various downstream applications such as visualization recommendation. Existing methods mainly focus on the visual appearance of visualizations by regarding them as bitmap images. However, the structural information intrinsically existing in SVG-based visualizations is ignored. Such structural information can delineate the spatial and hierarchical relationship among visual elements, and characterize visualizations thoroughly from a new perspective. …
Natural Attack For Pre-Trained Models Of Code, Zhou Yang, Jieke Shi, Junda He, David Lo
Natural Attack For Pre-Trained Models Of Code, Zhou Yang, Jieke Shi, Junda He, David Lo
Research Collection School Of Computing and Information Systems
Pre-trained models of code have achieved success in many important software engineering tasks. However, these powerful models are vulnerable to adversarial attacks that slightly perturb model inputs to make a victim model produce wrong outputs. Current works mainly attack models of code with examples that preserve operational program semantics but ignore a fundamental requirement for adversarial example generation: perturbations should be natural to human judges, which we refer to as naturalness requirement. In this paper, we propose ALERT (Naturalness Aware Attack), a black-box attack that adversarially transforms inputs to make victim models produce wrong outputs. Different from prior works, this …
Who Will Support My Project? Interactive Search Of Potential Crowdfunding Investors Through Insearch., Songheng Zhang, Yong Wang, Haotian Li, Wanyu Zhang
Who Will Support My Project? Interactive Search Of Potential Crowdfunding Investors Through Insearch., Songheng Zhang, Yong Wang, Haotian Li, Wanyu Zhang
Research Collection School Of Computing and Information Systems
Crowdfunding provides project founders with a convenient way to reach online investors. However, it is challenging for founders to find the most potential investors and successfully raise money for their projects on crowdfunding platforms. A few machine learning based methods have been proposed to recommend investors’ interest in a specific crowdfunding project, but they fail to provide project founders with explanations in detail for these recommendations, thereby leading to an erosion of trust in predicted investors. To help crowdfunding founders find truly interested investors, we conducted semi-structured interviews with four crowdfunding experts and presentsinSearch, a visual analytic system. inSearch allows …
Rumorlens: Interactive Analysis And Validation Of Suspected Rumors On Social Media, Ran Wang, Kehan Du, Qianhe Chen, Yifei Zhao, Mojie Tang, Hongxi Tao, Shipan Wang, Yiyao Li, Yong Wang
Rumorlens: Interactive Analysis And Validation Of Suspected Rumors On Social Media, Ran Wang, Kehan Du, Qianhe Chen, Yifei Zhao, Mojie Tang, Hongxi Tao, Shipan Wang, Yiyao Li, Yong Wang
Research Collection School Of Computing and Information Systems
With the development of social media, various rumors can be easily spread on the Internet and such rumors can have serious negative effects on society. Thus, it has become a critical task for social media platforms to deal with suspected rumors. However, due to the lack of effective tools, it is often difficult for platform administrators to analyze and validate rumors from a large volume of information on a social media platform efficiently. We have worked closely with social media platform administrators for four months to summarize their requirements of identifying and analyzing rumors, and further proposed an interactive visual …
Ptm4tag: Sharpening Tag Recommendation Of Stack Overflow Posts With Pre-Trained Models, Junda He, Bowen Xu, Zhou Yang, Donggyun Han, Chengran Yang, David Lo
Ptm4tag: Sharpening Tag Recommendation Of Stack Overflow Posts With Pre-Trained Models, Junda He, Bowen Xu, Zhou Yang, Donggyun Han, Chengran Yang, David Lo
Research Collection School Of Computing and Information Systems
Stack Overflow is often viewed as one of the most influential Software Question & Answer (SQA) websites, containing millions of programming-related questions and answers. Tags play a critical role in efficiently structuring the contents in Stack Overflow and are vital to support a range of site operations, e.g., querying relevant contents. Poorly selected tags often introduce extra noise and redundancy, which raises problems like tag synonym and tag explosion. Thus, an automated tag recommendation technique that can accurately recommend high-quality tags is desired to alleviate the problems mentioned above.
Simple Or Complex? Together For A More Accurate Just-In-Time Defect Predictor, Xin Zhou, Donggyun Han, David Lo
Simple Or Complex? Together For A More Accurate Just-In-Time Defect Predictor, Xin Zhou, Donggyun Han, David Lo
Research Collection School Of Computing and Information Systems
Just-In-Time (JIT) defect prediction aims to automatically predict whether a commit is defective or not, and has been widely studied in recent years. In general, most studies can be classified into two categories: 1) simple models using traditional machine learning classifiers with hand-crafted features, and 2) complex models using deep learning techniques to automatically extract features. Hand-crafted features used by simple models are based on expert knowledge but may not fully represent the semantic meaning of the commits. On the other hand, deep learning-based features used by complex models represent the semantic meaning of commits but may not reflect useful …
Arseek: Identifying Api Resource Using Code And Discussion On Stack Overflow, Gia Kien Luong, Mohammad Hadi, Thung Ferdian, Fatemeh H. Fard, David Lo
Arseek: Identifying Api Resource Using Code And Discussion On Stack Overflow, Gia Kien Luong, Mohammad Hadi, Thung Ferdian, Fatemeh H. Fard, David Lo
Research Collection School Of Computing and Information Systems
It is not a trivial problem to collect API-relevant examples, usages, and mentions on venues such as Stack Overflow. It requires efforts to correctly recognize whether the discussion refers to the API method that developers/tools are searching for. The content of the Stack Overflow thread, which consists of both text paragraphs describing the involvement of the API method in the discussion and the code snippets containing the API invocation, may refer to the given API method. Leveraging this observation, we develop ARSeek, a context-specific algorithm to capture the semantic and syntactic information of the paragraphs and code snippets in a …
On The Transferability Of Pre-Trained Language Models For Low-Resource Programming Languages, Fuxiang Chen, Fatemeh H. Fard, David Lo, Timofey Bryksin
On The Transferability Of Pre-Trained Language Models For Low-Resource Programming Languages, Fuxiang Chen, Fatemeh H. Fard, David Lo, Timofey Bryksin
Research Collection School Of Computing and Information Systems
A recent study by Ahmed and Devanbu reported that using a corpus of code written in multilingual datasets to fine-tune multilingual Pre-trained Language Models (PLMs) achieves higher performance as opposed to using a corpus of code written in just one programming language. However, no analysis was made with respect to fine-tuning monolingual PLMs. Furthermore, some programming languages are inherently different and code written in one language usually cannot be interchanged with the others, i.e., Ruby and Java code possess very different structure. To better understand how monolingual and multilingual PLMs affect different programming languages, we investigate 1) the performance of …
Exais: Executable Ai Semantics, Richard Schumi, Jun Sun
Exais: Executable Ai Semantics, Richard Schumi, Jun Sun
Research Collection School Of Computing and Information Systems
Neural networks can be regarded as a new programming paradigm, i.e., instead of building ever-more complex programs through (often informal) logical reasoning in the programmers' mind, complex 'AI' systems are built by optimising generic neural network models with big data. In this new paradigm, AI frameworks such as TensorFlow and PyTorch play a key role, which is as essential as the compiler for traditional programs. It is known that the lack of a proper semantics for programming languages (such as C), i.e., a correctness specification for compilers, has contributed to many problematic program behaviours and security issues. While it is …
Designing Visuo-Haptic Illusions With Proxies In Virtual Reality: Exploration Of Grasp, Movement Trajectory And Object Mass, Martin Feick, Kora Persephone Regitz, Anthony Tang, Antonio Kruger
Designing Visuo-Haptic Illusions With Proxies In Virtual Reality: Exploration Of Grasp, Movement Trajectory And Object Mass, Martin Feick, Kora Persephone Regitz, Anthony Tang, Antonio Kruger
Research Collection School Of Computing and Information Systems
Visuo-haptic illusions are a method to expand proxy-based interactions in VR by introducing unnoticeable discrepancies between the virtual and real world. Yet how different design variables affect the illusions with proxies is still unclear. To unpack a subset of variables, we conducted two user studies with 48 participants to explore the impact of (1) different grasping types and movement trajectories, and (2) different grasping types and object masses on the discrepancy which may be introduced. Our Bayes analysis suggests that grasping types and object masses (≤ 500 g) did not noticeably affect the discrepancy, but for movement trajectory, results were …
Watch Your Flavors: Augmenting People's Flavor Perceptions And Associated Emotions Based On Videos Watched While Eating, Meetha Nesam James, Nimesha Ranasinghe, Anthony Tang, Lora Oehlberg
Watch Your Flavors: Augmenting People's Flavor Perceptions And Associated Emotions Based On Videos Watched While Eating, Meetha Nesam James, Nimesha Ranasinghe, Anthony Tang, Lora Oehlberg
Research Collection School Of Computing and Information Systems
People engage in different activities while eating alone, such as watching television or scrolling through social media on their phones. However, the impacts of these visual contents on human cognitive processes, particularly related to flavor perception and its attributes, are still not thoroughly explored. This paper presents a user study to evaluate the influence of six different types of video content (including nature, cooking, and a new food video genre known as mukbang) on people’s flavor perceptions in terms of taste sensations, liking, and emotions while eating plain white rice. Our findings revealed that the participants’ flavor perceptions are augmented …
Probabilistic Path Prioritization For Hybrid Fuzzing, Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan
Probabilistic Path Prioritization For Hybrid Fuzzing, Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan
Research Collection School Of Computing and Information Systems
Hybrid fuzzing that combines fuzzing and concolic execution has become an advanced technique for software vulnerability detection. Based on the observation that fuzzing and concolic execution are complementary in nature, state-of-the-art hybrid fuzzing systems deploy “optimal concolic testing” and “demand launch” strategies. Although these ideas sound intriguing, we point out several fundamental limitations in them, due to unrealistic or oversimplified assumptions. Further, we propose a novel “discriminative dispatch” strategy and design a probabilistic hybrid fuzzing system to better utilize the capability of concolic execution. Specifically, we design a Monte Carlo-based probabilistic path prioritization model to quantify each path’s difficulty, and …
Active Warden Attack: On The (In)Effectiveness Of Android App Repackage-Proofing, Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia
Active Warden Attack: On The (In)Effectiveness Of Android App Repackage-Proofing, Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia
Research Collection School Of Computing and Information Systems
App repackaging has raised serious concerns to the Android ecosystem with the repackage-proofing technology attracting attention in the Android research community. In this paper, we first show that existing repackage-proofing schemes rely on a flawed security assumption, and then propose a new class of active warden attack that intercepts and falsifies the metrics used by repackage-proofing for detecting the integrity violations during repackaging. We develop a proof-of-concept toolkit to demonstrate that all the existing repackage-proofing schemes can be bypassed by our attack toolkit. On the positive side, our analysis further identifies a new integrity metric in the Android ART runtime …
Undiscounted Recursive Path Choice Models: Convergence Properties And Algorithms, Tien Mai, Emma Frejinger
Undiscounted Recursive Path Choice Models: Convergence Properties And Algorithms, Tien Mai, Emma Frejinger
Research Collection School Of Computing and Information Systems
Traffic flow predictions are central to a wealth of problems in transportation. Path choice models can be used for this purpose, and in state-of-the-art models—so-called recursive path choice (RPC) models—the choice of a path is formulated as a sequential arc choice process using undiscounted Markov decision process (MDP) with an absorbing state. The MDP has a utility maximization objective with unknown parameters that are estimated based on data. The estimation and prediction using RPC models require repeatedly solving value functions that are solutions to the Bellman equation. Although there are several examples of successful applications of RPC models in the …
Unified Route Planning For Shared Mobility: An Insertion-Based Framework, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Ke. Xu
Unified Route Planning For Shared Mobility: An Insertion-Based Framework, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Ke. Xu
Research Collection School Of Computing and Information Systems
There has been a dramatic growth of shared mobility applications such as ride-sharing, food delivery, and crowdsourced parcel delivery. Shared mobility refers to transportation services that are shared among users, where a central issue is route planning. Given a set of workers and requests, route planning finds for each worker a route, i.e., a sequence of locations to pick up and drop off passengers/parcels that arrive from time to time, with different optimization objectives. Previous studies lack practicability due to their conflicted objectives and inefficiency in inserting a new request into a route, a basic operation called insertion. In addition, …
Guided Attention Multimodal Multitask Financial Forecasting With Inter-Company Relationships And Global And Local News, Meng Kiat Gary Ang, Ee-Peng Lim
Guided Attention Multimodal Multitask Financial Forecasting With Inter-Company Relationships And Global And Local News, Meng Kiat Gary Ang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Most works on financial forecasting use information directly associated with individual companies (e.g., stock prices, news on the company) to predict stock returns for trading. We refer to such company-specific information as local information. Stock returns may also be influenced by global information (e.g., news on the economy in general), and inter-company relationships. Capturing such diverse information is challenging due to the low signal-to-noise ratios, different time-scales, sparsity and distributions of global and local information from different modalities. In this paper, we propose a model that captures both global and local multimodal information for investment and risk management-related forecasting tasks. …
Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv
Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv
Research Collection School Of Computing and Information Systems
Message-Locked Encryption (MLE) is a useful tool to enable deduplication over encrypted data in cloud storage. It can significantly improve the cloud service quality by eliminating redundancy to save storage resources, and hence user cost, and also providing defense against different types of attacks, such as duplicate faking attack and brute-force attack. A typical MLE scheme only focuses on deduplication. On the other hand, supporting search operations on stored content is another essential requirement for cloud storage. In this article, we present a message-locked searchable encryption (MLSE) scheme in a dual-server setting, which achieves simultaneously the desirable features of supporting …
Uipdroid: Unrooted Dynamic Monitor Of Android App Uis For Fine-Grained Permission Control, Mulin Duan, Lingxiao Jiang, Lwin Khin Shar, Debin Gao
Uipdroid: Unrooted Dynamic Monitor Of Android App Uis For Fine-Grained Permission Control, Mulin Duan, Lingxiao Jiang, Lwin Khin Shar, Debin Gao
Research Collection School Of Computing and Information Systems
Proper permission controls in Android systems are important for protecting users' private data when running applications installed on the devices. Currently Android systems require apps to obtain authorization from users at the first time when they try to access users' sensitive data, but every permission is only managed at the application level, allowing apps to (mis)use permissions granted by users at the beginning for different purposes subsequently without informing users. Based on privacy-by-design principles, this paper develops a new permission manager, named UIPDroid, that (1) enforces the users' basic right-to-know through user interfaces whenever an app uses permissions, and (2) …
Feasibility Studies In Indoor Localization Through Intelligent Conversation, Sheshadri Smitha, Linus Cheng, Kotaro Hara
Feasibility Studies In Indoor Localization Through Intelligent Conversation, Sheshadri Smitha, Linus Cheng, Kotaro Hara
Research Collection School Of Computing and Information Systems
We propose a model to achieve human localization in indoor environments through intelligent conversation between users and an agent. We investigated the feasibility of conversational localization by conducting two studies. First, we conducted a Wizard-of-Oz study with N = 7 participants and studied the feasibility of localizing users through conversation. We identified challenges posed by users’ language and behavior. Second, we collected N = 800 user descriptions of virtual indoor locations from N = 80 Amazon Mechanical Turk participants to analyze user language. We explored the effects of conversational agent behavior and observed that people describe indoor locations differently based …
Transboundary Air Pollution And Cross-Border Cooperation: Insights From Marine Vessel Emissions Regulations In Hong Kong And Shenzhen, Seung Kyum Kim, Terry Van Gevelt, Paul Joosse, Mia M. Bennett
Transboundary Air Pollution And Cross-Border Cooperation: Insights From Marine Vessel Emissions Regulations In Hong Kong And Shenzhen, Seung Kyum Kim, Terry Van Gevelt, Paul Joosse, Mia M. Bennett
Research Collection College of Integrative Studies
Many coastal cities regulate shipping emissions within their jurisdictions. However, the transboundary nature of air pollution makes such efforts largely ineffective unless they are accompanied by reciprocal, legally-binding regulatory agreements with neighbouring cities. Due to various technical, economic, and institutional barriers, it has thus far been difficult to isolate the effects of legally-binding cross-border cooperation on vessel emissions at the city-level. We exploit the unique administrative characteristics of Hong Kong and its relationship with neighbouring cities in China's Pearl River Delta to isolate the effect of legally-binding cross-border cooperation. Using a regression discontinuity design, we find that Hong Kong's unilateral …
Do Pre-Trained Models Benefit Knowledge Graph Completion? A Reliable Evaluation And A Reasonable Approach, Xin Lv, Yankai Lin, Yixin Cao, Lei Hou, Juanzi Li, Zhiyuan Liu, Peng Li, Jie Zhou
Do Pre-Trained Models Benefit Knowledge Graph Completion? A Reliable Evaluation And A Reasonable Approach, Xin Lv, Yankai Lin, Yixin Cao, Lei Hou, Juanzi Li, Zhiyuan Liu, Peng Li, Jie Zhou
Research Collection School Of Computing and Information Systems
In recent years, pre-trained language models (PLMs) have been shown to capture factual knowledge from massive texts, which encourages the proposal of PLM-based knowledge graph completion (KGC) models. However, these models are still quite behind the SOTA KGC models in terms of performance. In this work, we find two main reasons for the weak performance: (1) Inaccurate evaluation setting. The evaluation setting under the closed-world assumption (CWA) may underestimate the PLM-based KGC models since they introduce more external knowledge; (2) Inappropriate utilization of PLMs. Most PLM-based KGC models simply splice the labels of entities and relations as inputs, leading to …
Translate-Train Embracing Translationese Artifacts, Sicheng Yu, Qianru Sun, Hao Zhang, Jing Jiang
Translate-Train Embracing Translationese Artifacts, Sicheng Yu, Qianru Sun, Hao Zhang, Jing Jiang
Research Collection School Of Computing and Information Systems
Translate-train is a general training approach to multilingual tasks. The key idea is to use the translator of the target language to generate training data to mitigate the gap between the source and target languages. However, its performance is often hampered by the artifacts in the translated texts (translationese). We discover that such artifacts have common patterns in different languages and can be modeled by deep learning, and subsequently propose an approach to conduct translate-train using Translationese Embracing the effect of Artifacts (TEA). TEA learns to mitigate such effect on the training data of a source language (whose original and …
Foundations Of Plasmas For Medical Applications, T. Von Woedtke, Mounir Laroussi, M. Gherardi
Foundations Of Plasmas For Medical Applications, T. Von Woedtke, Mounir Laroussi, M. Gherardi
Electrical & Computer Engineering Faculty Publications
Plasma medicine refers to the application of nonequilibrium plasmas at approximately body temperature, for therapeutic purposes. Nonequilibrium plasmas are weakly ionized gases which contain charged and neutral species and electric fields, and emit radiation, particularly in the visible and ultraviolet range. Medically-relevant cold atmospheric pressure plasma (CAP) sources and devices are usually dielectric barrier discharges and nonequilibrium atmospheric pressure plasma jets. Plasma diagnostic methods and modelling approaches are used to characterize the densities and fluxes of active plasma species and their interaction with surrounding matter. In addition to the direct application of plasma onto living tissue, the treatment of liquids …
Graphcode2vec: Generic Code Embedding Via Lexical And Program Dependence Analyses, Wei Ma, Mengjie Zhao, Ezekiel Soremekun, Qiang Hu, Jie M. Zhang, Mike Papadakis, Maxime Cordy, Xiaofei Xie, Yves Le Traon
Graphcode2vec: Generic Code Embedding Via Lexical And Program Dependence Analyses, Wei Ma, Mengjie Zhao, Ezekiel Soremekun, Qiang Hu, Jie M. Zhang, Mike Papadakis, Maxime Cordy, Xiaofei Xie, Yves Le Traon
Research Collection School Of Computing and Information Systems
Code embedding is a keystone in the application of machine learning on several Software Engineering (SE) tasks. To effectively support a plethora of SE tasks, the embedding needs to capture program syntax and semantics in a way that is generic. To this end, we propose the first self-supervised pre-training approach (called Graphcode2vec) which produces task-agnostic embedding of lexical and program dependence features. Graphcode2vec achieves this via a synergistic combination of code analysis and Graph Neural Networks. Graphcode2vec is generic, it allows pre-training, and it is applicable to several SE downstream tasks. We evaluate the effectiveness of Graphcode2vec on four (4) …
Optimal In‐Place Suffix Sorting, Zhize Li, Jian Li, Hongwei Huo
Optimal In‐Place Suffix Sorting, Zhize Li, Jian Li, Hongwei Huo
Research Collection School Of Computing and Information Systems
The suffix array is a fundamental data structure for many applications that involve string searching and data compression. Designing time/space-efficient suffix array construction algorithms has attracted significant attention and considerable advances have been made for the past 20 years. We obtain the \emph{first} in-place suffix array construction algorithms that are optimal both in time and space for (read-only) integer alphabets. Concretely, we make the following contributions: 1. For integer alphabets, we obtain the first suffix sorting algorithm which takes linear time and uses only $O(1)$ workspace (the workspace is the total space needed beyond the input string and the output …
The Bracelet: An American Sign Language (Asl) Interpreting Wearable Device, Samuel Aba, Ahmadre Darrisaw, Pei Lin, Thomas Leonard
The Bracelet: An American Sign Language (Asl) Interpreting Wearable Device, Samuel Aba, Ahmadre Darrisaw, Pei Lin, Thomas Leonard
Chancellor’s Honors Program Projects
No abstract provided.
Sparse Model Selection Using Information Complexity, Yaojin Sun
Sparse Model Selection Using Information Complexity, Yaojin Sun
Doctoral Dissertations
This dissertation studies and uses the application of information complexity to statistical model selection through three different projects. Specifically, we design statistical models that incorporate sparsity features to make the models more explanatory and computationally efficient.
In the first project, we propose a Sparse Bridge Regression model for variable selection when the number of variables is much greater than the number of observations if model misspecification occurs. The model is demonstrated to have excellent explanatory power in high-dimensional data analysis through numerical simulations and real-world data analysis.
The second project proposes a novel hybrid modeling method that utilizes a mixture …