Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2014

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 973

Full-Text Articles in Entire DC Network

Ko Ko Gyi [Myanmar, Activist], Ko Ko Gyi Dec 2014

Ko Ko Gyi [Myanmar, Activist], Ko Ko Gyi

Digital Narratives of Asia

Myanmar democracy activist Ko Ko Gyi spent a total of 17 years in prison for his political beliefs. First detained for his involvement in student protests in 1989, he was eventually released in 2012, along with 600 others, when the military-led government began implementing reforms. Mr Ko Ko Gyi now champions democracy and human rights issues as General Secretary of the 88 Generation Peace and Open Society. He was also a member of the government's Rakhine Investigation Commission to investigate the sectarian violence in Rakhine state. He speaks to DNA about the darkest days of his time in the infamous …


Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun Dec 2014

Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun

Research Collection School Of Computing and Information Systems

Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …


Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong Dec 2014

Effects Of Training Datasets On Both The Extreme Learning Machine And Support Vector Machine For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond Chiong

Research Collection School Of Computing and Information Systems

The ability to identify or predict a target audience from the increasingly crowded social space will provide a company some competitive advantage over other companies. In this paper, we analyze various training datasets, which include Twitter contents of an account owner and its list of followers, using features generated in different ways for two machine learning approaches - the Extreme Learning Machine (ELM) and Support Vector Machine (SVM). Various configurations of the ELM and SVM have been evaluated. The results indicate that training datasets using features generated from the owner tweets achieve the best performance, relative to other feature sets. …


Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun Dec 2014

Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun

Research Collection School Of Computing and Information Systems

Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …


Mapping The Umbrella Movement: Uncovering Grounded Theologies In Hong Kong, Justin Kh Tse Dec 2014

Mapping The Umbrella Movement: Uncovering Grounded Theologies In Hong Kong, Justin Kh Tse

Research Collection School of Social Sciences

As this Syndicate forum on the Umbrella Movement and theology winds to a close, the physical occupations in Hong Kong seem to be nearing their end stage. With court injunctions, police clearances, statements of support from the People’s Republic of China (PRC) for the Hong Kong government, the attempted voluntary surrender of Occupy Central leaders to the police, and a student hunger strike after over seventy days of street occupations, it might seem late in the game to call for the mapping of “grounded theologies,” “performative practices of placemaking informed by understandings of the transcendent,” woven into the political constitution …


Visionaries, Architects And Pioneers: Conceptualising Smu, Pin Pin Yeo, Patricia Meyer Dec 2014

Visionaries, Architects And Pioneers: Conceptualising Smu, Pin Pin Yeo, Patricia Meyer

Research Collection Library

The Singapore Management University (SMU) Library was tasked with documenting the early history of SMU by the chairman of its board of trustees. An oral history project to interview the pioneers involved in the formation of the university began in 2011. The project team included the Library, the Information Technology department, and a researcher/interviewer who was familiar with SMU. It was a steep learning curve for the team. As they conducted and processed the interviews, they learned about and made decisions on interviewing, recording, transcribing, storage, website design, discoverability, usability, and sustainability. The resulting oral history website presents the interviews …


The Vientiane Report: National Landscape, Current Challenges And Opportunities For Growt, Institute For Societal Leadership, Lai Cheng Lim Dec 2014

The Vientiane Report: National Landscape, Current Challenges And Opportunities For Growt, Institute For Societal Leadership, Lai Cheng Lim

Institute of Societal Leadership Research Collection

Laos is a small, landlocked, mountainous country in Southeast Asia. As a country, it shares borders with Myanmar and the People’s Republic of China to the Northwest, Vietnam to the East, Cambodia to the South and Thailand to the West.


The Dili Report: National Landscape, Current Challenges And Opportunities For Growth, Institute For Societal Leadership, Lai Cheng Lim Dec 2014

The Dili Report: National Landscape, Current Challenges And Opportunities For Growth, Institute For Societal Leadership, Lai Cheng Lim

Institute of Societal Leadership Research Collection

Timor-Leste, Asia’s newest nation, is located in Southeast Asia, on the southernmost edge of the Indonesian archipelago. The country was colonised by the Portuguese for over 450 years, occupied by the Indonesians for 24 years and administered by the United Nations for two and a half years. As a nation, Timor-Leste has had a very traumatic birth.


Executive Overreach By Minority Governments, Madhav S. Aney, Shubhankar Dam Dec 2014

Executive Overreach By Minority Governments, Madhav S. Aney, Shubhankar Dam

Research Collection School Of Economics

A provision in the Indian constitution allows the executive to make laws in the event oneof the two houses of parliament is not in session. This provision was intended to allow theexecutive to act in case there’s an immediate legislative necessity and the parliament cannotbe convened. Using a bargaining model with asymmetric information we show how partieswithin the parliament may reach an agreement on legislations when the ruling party does notcommand a majority (minority government). The model makes predictions about lawmakingpatterns by the legislature when the parliament is in session, and ordinances by the executivewhen the parliament is not in …


Cross-Listings And Corporate Cash Savings: International Evidence, Yuanto Kusnadi Dec 2014

Cross-Listings And Corporate Cash Savings: International Evidence, Yuanto Kusnadi

Research Collection School Of Accountancy

This paper examines foreign firms that are cross-listed on the U.S. stock exchanges and finds that they exhibit higher cash savings sensitivity to stock price than their non-cross-listed counterparts. This finding is robust even after controlling for alternative regression specifications and samples, country-level institutional infrastructures, different listing types, and the endogeneity of the cross-listing decision. Further cross-sectional tests reveal that the increase in cash savings sensitivity to stock price is more pronounced for cross-listed firms with stock prices that are more informative, which is consistent with the influence of the managerial learning channel. The empirical evidence sheds more light on …


Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman Dec 2014

Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman

Research Collection School Of Computing and Information Systems

A number of Computer Science and Information Systems programs have effectively defined learning outcomes, course level competencies, and conducted assessments at the program level to determine areas for continuous improvement. However, many of these programs do not fully leverage the course competencies during the actual delivery and assessment of the course. This paper presents how course competencies can be used to effectively deliver and assess the course content, and give valuable timely feedback to the students. Using a large first year core course of the BSc (Information Systems Management) program (called Object Oriented Application Development course-OOAD) as an example, this …


Proceedings Report: The 4th Asia Pacific Journal Of Private International Law Colloquium, Man Yip Dec 2014

Proceedings Report: The 4th Asia Pacific Journal Of Private International Law Colloquium, Man Yip

Research Collection Yong Pung How School Of Law

The 4th Asia Pacific Journal of Private International Law Colloquium, a biennial event, was held at the Singapore Management University on 28 November 2014 and convened by Associate Professor Adeline Chong. The one-day proceedings boasted a strong programme and facilitated discussions between private international law specialists from both civilian and common law jurisdictions.


A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu Dec 2014

A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu

Research Collection School Of Computing and Information Systems

Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …


Probabilistic Latent Document Network Embedding, Tuan M. V. Le, Hady W. Lauw Dec 2014

Probabilistic Latent Document Network Embedding, Tuan M. V. Le, Hady W. Lauw

Research Collection School Of Computing and Information Systems

A document network refers to a data type that can be represented as a graph of vertices, where each vertex is associated with a text document. Examples of such a data type include hyperlinked Web pages, academic publications with citations, and user profiles in social networks. Such data have very high-dimensional representations, in terms of text as well as network connectivity. In this paper, we study the problem of embedding, or finding a low-dimensional representation of a document network that "preserves" the data as much as possible. These embedded representations are useful for various applications driven by dimensionality reduction, such …


Detecting Camouflaged Applications On Mobile Application Markets, Mon Kywe Su, Yingjiu Li, Huijie Robert Deng, Jason Hong Dec 2014

Detecting Camouflaged Applications On Mobile Application Markets, Mon Kywe Su, Yingjiu Li, Huijie Robert Deng, Jason Hong

Research Collection School Of Computing and Information Systems

Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features of mobile applications, such as icons, screenshots, application names or descriptions, are copied. We then propose a scalable detection framework, which can find these suspiciously similar camouflaged applications. To accomplish this, we apply text-based retrieval methods and content-based image retrieval methods in our framework. Our framework is implemented and tested with 30,625 Android applications from the official …


A Rare Case Of Conspiracy By Lawful Means, Pey Woan Lee Dec 2014

A Rare Case Of Conspiracy By Lawful Means, Pey Woan Lee

Research Collection Yong Pung How School Of Law

Conspiracy by lawful means is a well-known anomaly in the law of torts. The anomaly lies in the fact that the tort imposes liability on two or more persons acting in concert to pursue a course of conduct that is otherwise lawful when committed by a sole actor. Of course, it is a critical element of the tort that the conspirators must have acted with the predominant intention to cause harm to the victim, but it is well settled that malicious intent is not, by itself, a sufficient basis for founding liability. It would thus seem that it is the …


Detecting Flow Anomalies In Distributed Systems, Freddy Chong-Tat Chua, Ee Peng Lim, Bernardo Huberman Dec 2014

Detecting Flow Anomalies In Distributed Systems, Freddy Chong-Tat Chua, Ee Peng Lim, Bernardo Huberman

Research Collection School Of Computing and Information Systems

Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and could possibly cause disastrous outcomes in the system in the unforeseeable future. Using only coarse-grained information from the two end points of network flows, we propose a network transmission model and a localization algorithm, to detect the location of anomalies and rank …


High-Dimensional Data Stream Classification Via Sparse Online Learning, Dayong Wang, Pengcheng Wu, Peilin Zhao, Yue Wu, Chunyan Miao, Steven C. H. Hoi Dec 2014

High-Dimensional Data Stream Classification Via Sparse Online Learning, Dayong Wang, Pengcheng Wu, Peilin Zhao, Yue Wu, Chunyan Miao, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

The amount of data in our society has been exploding in the era of big data today. In this paper, we address several open challenges of big data stream classification, including high volume, high velocity, high dimensionality, and high sparsity. Many existing studies in data mining literature solve data stream classification tasks in a batch learning setting, which suffers from poor efficiency and scalability when dealing with big data. To overcome the limitations, this paper investigates an online learning framework for big data stream classification tasks. Unlike some existing online data stream classification techniques that are often based on first-order …


Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau Dec 2014

Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Several automated parameter tuning procedures/configurators have been proposed in order to find the best parameter setting for a target algorithm. These configurators can generally be classified into model-free and model-based approaches. We introduce a recent approach which is based on the hybridization of both approaches. It combines the Design of Experiments (DOE) and Response Surface Methodology (RSM) with prevailing model-free techniques. DOE is mainly used for determining the importance of parameters. A First Order-RSM is initially employed to define the promising region for the important parameters. A Second Order-RSM is then built to approximate the center point as well as …


Midas: Empowering 802.11ac With Multiple-Input Distributed Antenna Systems, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson, Mohammad A. Khojastepour, Sampath Rangarajan Dec 2014

Midas: Empowering 802.11ac With Multiple-Input Distributed Antenna Systems, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson, Mohammad A. Khojastepour, Sampath Rangarajan

Research Collection School Of Computing and Information Systems

Next generation WLANs (802.11ac) are undergoing a major shift in their communication paradigm with the introduction of multi-user MIMO (MU-MIMO), transitioning from single-user to multi-user communications. We argue that the conventional AP deployment model of co-located antennas as well as their PHY and MAC mechanisms are not designed to realize the complete potential of MUMIMO. We propose to leverage distributed antenna systems (DAS) to empower next generation 802.11ac networks. We highlight the multitude of benefits that DAS brings to MU-MIMO and 802.11ac in general. However, several challenges arise in the process of realizing these benefits in practice, where avoiding client …


Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert Dec 2014

Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert

Research Collection School Of Computing and Information Systems

Consumer informedness describes the degree to which consumers are aware of the specific attributes of products or services offered in the marketplace. Understanding how this level of informedness can amplify consumer behaviour provides firms with the opportunity to develop information-based strategies that can encourage their target segment make purchases.


I’Ve Heard You Have Problems: Cellular Signal Monitoring Through Ue Participatory Sensing, Huiguang Liang, Hyong Kim, Hwee-Pink Tan, Wai-Leong Yeow Dec 2014

I’Ve Heard You Have Problems: Cellular Signal Monitoring Through Ue Participatory Sensing, Huiguang Liang, Hyong Kim, Hwee-Pink Tan, Wai-Leong Yeow

Research Collection School Of Computing and Information Systems

The operating environment of cellular networks can be in a constant state of change. One Singaporean operator expressed difficulty with the coverage assertion (CA) problem of whether regulated minimum coverage is met, especially in urban areas. Currently, the operator manually appraises coverage through laborious and expensive walk/drive-tests. In this paper, we propose Tattle, a distributed, low-cost and comprehensive cellular network measurement collection and processing framework. We exemplify Tattle by leveraging on participating UEs to report on network coverage in real-time. Tattle exploits wireless local-area interfaces to exchange RSCP measurements amongst devices to preserve the co-locality of readings and conserve power. …


Unisense: A Unified And Sustainable Sensing And Transport Architecture For Large Scale And Heterogeneous Sensor Networks, Yunye Jin, Hwee-Pink Tan Dec 2014

Unisense: A Unified And Sustainable Sensing And Transport Architecture For Large Scale And Heterogeneous Sensor Networks, Yunye Jin, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In this paper, we propose UNISENSE, a unified and sustainable sensing and transport architecture for large scale and heterogeneous sensor networks. The proposed architecture incorporates seven principal components, namely, application profiling, node architecture, intelligent network design, network management, deep sensing, generalized participatory sensing, and security. We describe the design and implementation for each component. We also present the deployment and performance of the UNISENSE architecture in four practical applications.


Rbc Properties Pte Ltd V Defu Furniture Pte Ltd [2014] Sgca 62: Restatement Of Law Relating To Misrepresentation In Singapore, Yihan Goh Dec 2014

Rbc Properties Pte Ltd V Defu Furniture Pte Ltd [2014] Sgca 62: Restatement Of Law Relating To Misrepresentation In Singapore, Yihan Goh

Research Collection Yong Pung How School Of Law

The recent Court of Appeal decision of RBC Properties Pte Ltd v Defu Furniture Pte Ltd [2014] SGCA 62 (“RBC Properties”) contains an invaluable restatement of the law relating to misrepresentation in Singapore. This entry aims only to summarise that restatement of law. The interested reader may find the facts of the case succinctly discussed by the Court of Appeal in its judgment here and also in this blog entry on the High Court decision.


R1 International Pte Ltd V Lonstroff Ag [2014] Sgca 56: Lessons In Contractual Formation, Yihan Goh Dec 2014

R1 International Pte Ltd V Lonstroff Ag [2014] Sgca 56: Lessons In Contractual Formation, Yihan Goh

Research Collection Yong Pung How School Of Law

The rules relating to contractual formation are easy to state but difficult to apply in the varied circumstances of practice. It is therefore helpful that the recent Court of Appeal decision of R1 International Pte Ltd v Lonstroff AG [2014] SGCA 56 (“R1 International”) provides much guidance in this area of the law.

R1 International concerned whether a set of terms to arbitrate in Singapore, found in a detailed contract note sent by the appellant to the respondent shortly after their deal (“the deal”) was concluded, was incorporated as part of the contract between the parties. The answer …


Negotiating Deals From A Position Of Powerlessness, Michael Schaerer, Roderick I. Swaab Dec 2014

Negotiating Deals From A Position Of Powerlessness, Michael Schaerer, Roderick I. Swaab

Research Collection Lee Kong Chian School Of Business

When you are negotiating a deal it pays to have viable alternatives to fall back on – or at least that’s what most people think. New research suggests that being powerless can be liberating and help you achieve better deals.


Substitutes Or Complements? A Configurational Examination Of Corporate Governance Mechanisms, Vilmos Misangyi, Abhijith G. Acharya Dec 2014

Substitutes Or Complements? A Configurational Examination Of Corporate Governance Mechanisms, Vilmos Misangyi, Abhijith G. Acharya

Research Collection Lee Kong Chian School Of Business

We conduct an exploratory qualitative comparative case analysis of the S&P 1500 firms with the aim of elaborating theory on how corporate governance mechanisms work together effectively. To do so, we integrate extant theory and research to specify the bundle of mechanisms that operate to mitigate the agency problem among publicly traded corporations and review what previous research has said about how these mechanisms combine. We then use the fuzzy-set approach to qualitative comparitive analysis (QCA) to explore the combinations of governance mechanisms that exist among the S&P 1500 firms that achieve high (and not-high) profitability. Our findings suggest that …


A Network Bidder Behavior Model In Online Auctions: A Case Of Fine Art Auctions, Mayukh Dass, Srinivas K. Reddy, Dawn Iacobucci Dec 2014

A Network Bidder Behavior Model In Online Auctions: A Case Of Fine Art Auctions, Mayukh Dass, Srinivas K. Reddy, Dawn Iacobucci

Research Collection Lee Kong Chian School Of Business

The marketing literature provides a solid understanding of auctions regarding final sales prices and many aspects of the processes that unfold to result in those outcomes. This research complements those perspectives by first presenting a new bidder behavior model that shows the role of emergent network ties among bidders on the auction outcome. Dyadic ties are identified as the bid and counter-bid patterns of interactions between bidders that unfold throughout the duration of an auction. These structures are modeled using network analyses, which enables: (1) a richer understanding of detailed auction processes, both within auctions and across auctions of multiple …


Enhancing Training Motivation In The Public Sector In South Korea: The Value Of A Contingency Approach, Yong Hyun Kim, Ong, Madeline, Jang Hoon Chung Dec 2014

Enhancing Training Motivation In The Public Sector In South Korea: The Value Of A Contingency Approach, Yong Hyun Kim, Ong, Madeline, Jang Hoon Chung

Research Collection Lee Kong Chian School Of Business

Public sector organisations which invest in trainingprogrammes care about their employees’ successful application of learntknowledge and skills in the workplace. The present study finds that leadersupport positively influences public sector employees’ training motivation,specifically the motivation to transfer learnt knowledge and skills to theirjobs. However, this positive relationship is moderated by employees’ priorknowledge of training content. When employees have high levels of priorknowledge of training content, leader support is not a significant influence ontheir motivation to transfer learnt knowledge and skills to their jobs. Thesefindings are derived from a survey of 335 South Korean government officials whorecently participated in a training …


On The Limitations Of Using Situational Judgement Tests To Measure Interpersonal Skills: The Moderating Influence Of Employee Anger, Jerel E. Slaughter, Michael S. Christian, Nathan P. Podsakoff, Evan F. Sinar, Filip Lievens Dec 2014

On The Limitations Of Using Situational Judgement Tests To Measure Interpersonal Skills: The Moderating Influence Of Employee Anger, Jerel E. Slaughter, Michael S. Christian, Nathan P. Podsakoff, Evan F. Sinar, Filip Lievens

Research Collection Lee Kong Chian School Of Business

Many authors have suggested that situational judgment tests (SJTs) are useful tools for assessing applicants because SJT items can be written to assess a number of job-related knowledges, skills, abilities and other characteristics (KSAOs). However, SJTs may not be appropriate for measuring certain KSAOs for some applicants. We posit that using SJTs to measure interpersonal skills may lead to invalid inferences about applicants with higher levels of angry hostility (AH), and thus, AH should moderate the relation between interpersonally oriented SJTs and job performance. Three studies, using samples of healthcare workers (n = 225), police officers (n = 54), and …