Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2016

Discipline
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 1120

Full-Text Articles in Entire DC Network

The Potential Collapse Of The Tpp: Implications For Asean, Henry S. Gao Dec 2016

The Potential Collapse Of The Tpp: Implications For Asean, Henry S. Gao

Research Collection Yong Pung How School Of Law

Asia has the most to lose in the event of a collapse of the Trans-Pacific Partnership (TPP) given the importance of trade to growth performance for the region’s economies, and that a third of the TPP members are also part of the Association of Southeast Asian Nations (ASEAN).


Online Detection Of Behavioral Change Using Unobtrusive Eldercare Monitoring System, Thanh Tam La, Alvin Cerdena Valera, Hwee-Pink Tan, Cheryl Li Fang Koh Dec 2016

Online Detection Of Behavioral Change Using Unobtrusive Eldercare Monitoring System, Thanh Tam La, Alvin Cerdena Valera, Hwee-Pink Tan, Cheryl Li Fang Koh

Research Collection School Of Computing and Information Systems

The rapid ageing population is posing challenges to many countries all over the world, particularly in the provision of care to the growing number of elderly who are living alone. Allowing the elderly to age-in-place, i.e., live safely and independently in the comfort of their own homes is a model that can potentially address the resource constraint in health and community care faced by many nations. To make this model a reality and provide appropriate and timely care to the elderly, unobtrusive eldercare monitoring systems (EMS) are being deployed in real homes to continuously monitor the activity of the elderly. …


Advertising, Jose C. Yong, Norman P. Li Dec 2016

Advertising, Jose C. Yong, Norman P. Li

Research Collection School of Social Sciences

Advertisements, which are widely available, can provide insights into the evolved preferences of target audiences and serve as a useful supplement to other methods in evolutionary psychology research. This chapter discusses how advertisers create content that strategically exploits consumers’ values and preferences and how advertising content can provide insights into various aspects of our evolved psychology.


Server-Aided Public Key Encryption With Keyword Search, Rongman Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang Dec 2016

Server-Aided Public Key Encryption With Keyword Search, Rongman Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang

Research Collection School Of Computing and Information Systems

Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is against the data privacy of users. Existing countermeasures for dealing with this security issue mainly suffer from low efficiency and are impractical for real applications. In this paper, we provide a practical and applicable treatment on this security vulnerability by formalizing a new PEKS system named server-aided public key encryption with keyword search (SA-PEKS). In SA-PEKS, to generate the keyword ciphertext/trapdoor, the user needs to …


Violation Of Long-Term Mate Preferences, M. L. W. Long, Norman P. Li Dec 2016

Violation Of Long-Term Mate Preferences, M. L. W. Long, Norman P. Li

Research Collection School of Social Sciences

Violations of short-term mate preferences refer to instances in which a person in a short-term, casual sexual relationship has mate preferences that were in place when the relationship commenced but subsequently are not being met.


The History Problem: The Politics Of War Commemoration In East Asia, Hiro Saito Dec 2016

The History Problem: The Politics Of War Commemoration In East Asia, Hiro Saito

Research Collection School of Social Sciences

Seventy years have passed since the end of the Asia-Pacific War, yet Japan remains embroiled in controversy with its neighbors over the war’s commemoration. Among the many points of contention between Japan, China, and South Korea are interpretations of the Tokyo War Crimes Trial, apologies and compensation for foreign victims of Japanese aggression, prime ministerial visits to the Yasukuni Shrine, and the war’s portrayal in textbooks. Collectively, these controversies have come to be called the “history problem.” But why has the problem become so intractable? Can it ever be resolved, and if so, how? To answer these questions, the author …


Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran Dec 2016

Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran

Research Collection School Of Computing and Information Systems

Effective management of land-side transportation provides the competitive advantage to port terminal operators in improving services and efficient use of limited space in an urban port. We present a hybrid simulation model that combines traffic-flow modeling and discrete-event simulation for land-side port planning and evaluation of traffic conditions for a number of what-if scenarios. We design our model based on a real-world case of a bulk cargo port. The problem is interesting due to complexity of heterogeneous closed-looped internal vehicles and external vehicles traveling in spaces with very limited traffic regulation (no traffic lights, no traffic wardens) and the traffic …


Providing Rural Public Services Through Land Commodification: Policy Innovations And Rural-Urban Integration In Chengdu, Qian Forrest Zhang, Jianling Wu Dec 2016

Providing Rural Public Services Through Land Commodification: Policy Innovations And Rural-Urban Integration In Chengdu, Qian Forrest Zhang, Jianling Wu

Research Collection School of Social Sciences

Zhang and Wu offer a detailed account of the innovative local policies in Chengdu, China, where a national land-use policy that has created widespread problems in other trial areas has been turned into a positive, transformative force in rural reconstruction. There are three key innovations in this so-called ‘Chengdu model’: First, leveraging on the most important resource in rural area, land, and through the commodification of land development rights, creating a financial source that can fund rural public services provision; second, transforming traditional rural residential patterns and concentrating the rural population in newly built residential communities; and, finally, using both …


Differential Parental Investment, Jose C. Yong, Norman P. Li Dec 2016

Differential Parental Investment, Jose C. Yong, Norman P. Li

Research Collection School of Social Sciences

Differences in minimum obligatory parental investment contributed by men and women lead the sexes to diverge in their sexual strategies and affective experiences, although under certain conditions, men’s mating preferences converge with women’s. This chapter first describes necessary or obligatory parental investment, examines the origins of sex differences in obligatory parental investment, describes examples of such differences across a range of species, and highlights the consequences of these differences in terms of human sexual strategies, conflicts, and affective experiences.


The Atmospheric Circulation Reconstructions Over The Earth (Acre) Initiative Acre China Workshop: Recovery, Digitization, And Analysis Of Pre-Mid-Twentieth Century Climate Observational Data In East Asia Workshop On 23-24 August, Beijing, China, Fiona Williamson, Guoyu Ren, Rob Allan Dec 2016

The Atmospheric Circulation Reconstructions Over The Earth (Acre) Initiative Acre China Workshop: Recovery, Digitization, And Analysis Of Pre-Mid-Twentieth Century Climate Observational Data In East Asia Workshop On 23-24 August, Beijing, China, Fiona Williamson, Guoyu Ren, Rob Allan

Research Collection School of Social Sciences

This commentary discusses a recent workshop designed to explore the extant historic instrumental record of weather observations for China, East Asia, and the China Seas region; to uncover new sources of observations; and to work on joint initiatives for their recovery and inclusion in open access data sets. The workshop was funded by the UK Newton Fund's Climate Science for Service Partnership China. It was organized by the Atmospheric Circulation Reconstructions over the Earth China, the China Meteorological Administration (CMA), the Beijing Climate Centre, and the China University of Geosciences (Wuhan) and held at CMA offices in Beijing.


Attacking Android Smartphone Systems Without Permissions, Mon Kywe Su, Yingjiu Li, Kunal Petal, Michael Grace Dec 2016

Attacking Android Smartphone Systems Without Permissions, Mon Kywe Su, Yingjiu Li, Kunal Petal, Michael Grace

Research Collection School Of Computing and Information Systems

Android requires third-party applications to request for permissions when they access critical mobile resources, such as users' personal information and system operations. In this paper, we present the attacks that can be launched without permissions. We first perform call graph analysis, component analysis and data-flow analysis on various parts of Android framework to retrieve unprotected APIs. Unprotected APIs provide a way of accessing resources without any permissions. We then exploit selected unprotected APIs and launch a number of attacks on Android phones. We discover that without requesting for any permissions, an attacker can access to device ID, phone service state, …


Social Media And Political Communication In The 2014 Elections To The European Parliament, Paul Nulty, Yannis Theocharis, Sebastian Adrian Popa, Olivier Parnet, Kenneth Benoit Dec 2016

Social Media And Political Communication In The 2014 Elections To The European Parliament, Paul Nulty, Yannis Theocharis, Sebastian Adrian Popa, Olivier Parnet, Kenneth Benoit

Research Collection School of Social Sciences

Social media play an increasingly important part in the communication strategies of political campaigns by reflecting information about the policy preferences and opinions of political actors and their public followers. In addition, the content of the messages provides rich information about the political issues and the framing of those issues during elections, such as whether contested issues concern Europe or rather extend pre-existing national debates. In this study, we survey the European landscape of social media using tweets originating from and referring to political actors during the 2014 European Parliament election campaign. We describe the language and national distribution of …


Socially Responsible Firms, Allen Ferrell, Hao Liang, Luc Renneboog Dec 2016

Socially Responsible Firms, Allen Ferrell, Hao Liang, Luc Renneboog

Research Collection Lee Kong Chian School Of Business

In the corporate finance tradition, starting with Berle and Means (1932), corporations should generally be run to maximize shareholder value. The agency view of corporate social responsibility (CSR) considers CSR an agency problem and a waste of corporate resources. Given our identification strategy by means of an instrumental variable approach, we find that well-governed firms that suffer less from agency concerns (less cash abundance, positive pay-for-performance, small control wedge, strong minority protection) engage more in CSR. We also find that a positive relation exists between CSR and value and that CSR attenuates the negative relation between managerial entrenchment and value.


Short Selling Meets Hedge Fund 13f: An Anatomy Of Informed Demand, Yawen Jiao, Massimo Massa, Hong Zhang Dec 2016

Short Selling Meets Hedge Fund 13f: An Anatomy Of Informed Demand, Yawen Jiao, Massimo Massa, Hong Zhang

Research Collection Lee Kong Chian School Of Business

The existing literature treats the short side (i.e., short selling) and the long side of hedge fund trading (i.e., fund holdings) independently. The two sides, however, complement each other: opposite changes in the two are likely to be driven by information, whereas simultaneous increases (decreases) of the two may be motivated by hedging (unwinding) considerations. We use this intuition to identify informed demand and document that it exhibits highly significant predictive power over returns (approximately 10% per year). We also find that informed demand forecasts future firm fundamentals, suggesting that hedge funds play an important role in information discovery. (C) …


Sharing Sequential Values In A Network, Ruben Juarez, Chiu Yu Ko, Jingyi Xue Dec 2016

Sharing Sequential Values In A Network, Ruben Juarez, Chiu Yu Ko, Jingyi Xue

Research Collection School Of Economics

Consider a sequential process where agents have individual values at every possible step. A planner is in charge of selecting steps and distributing the accumulated aggregate values among agents. We model this process by a directed network where each edge is associated with a vector of individual values. This model applies to several new and existing problems, e.g., developing a connected public facility and distributing total values received by surrounding districts; selecting a long-term production plan and sharing final profits among partners of a firm; choosing a machine schedule to serve different tasks and distributing total outputs among task owners. …


Weak Convergence To Stochastic Integrals For Econometric Applications, Hanying Liang, Peter C. B. Phillips, Hanchao Wang, Qiying Wang Dec 2016

Weak Convergence To Stochastic Integrals For Econometric Applications, Hanying Liang, Peter C. B. Phillips, Hanchao Wang, Qiying Wang

Research Collection School Of Economics

Limit theory involving stochastic integrals is now widespread in time series econometrics and relies on a few key results on functional weak convergence. In establishing such convergence, the literature commonly uses martingale and semimartingale structures. While these structures have wide relevance, many applications involve a cointegration framework where endogeneity and nonlinearity play major roles and complicate the limit theory. This paper explores weak convergence limit theory to stochastic integral functionals in such settings. We use a novel decomposition of sample covariances of functions of I (1) and I (0) time series that simplifies the asymptotics and our limit results for …


Panel Data Models With Interactive Fixed Effects And Multiple Structural Breaks, Degui Li, Junhui Qian, Liangjun Su Dec 2016

Panel Data Models With Interactive Fixed Effects And Multiple Structural Breaks, Degui Li, Junhui Qian, Liangjun Su

Research Collection School Of Economics

In this article, we consider estimation of common structural breaks in panel data models with unobservable interactive fixed effects. We introduce a penalized principal component (PPC) estimation procedure with an adaptive group fused LASSO to detect the multiple structural breaks in the models. Under some mild conditions, we show that with probability approaching one the proposed method can correctly determine the unknown number of breaks and consistently estimate the common break dates. Furthermore, we estimate the regression coefficients through the post-LASSO method and establish the asymptotic distribution theory for the resulting estimators. The developed methodology and theory are applicable to …


Predicting The Performance Of Queues: A Data Analytic Approach, Kum Khiong Yang, Cayirli Tugba, Mei Wan Low Dec 2016

Predicting The Performance Of Queues: A Data Analytic Approach, Kum Khiong Yang, Cayirli Tugba, Mei Wan Low

Research Collection Lee Kong Chian School Of Business

Existing models of multi-server queues with system transience and non-standard assumptions are either too complex or restricted in their assumptions to be used broadly in practice. This paper proposes using data analytics, combining computer simulation to generate the data and an advanced non-linear regression technique called the Alternating Conditional Expectation (ACE) to construct a set of easy-to-use equations to predict the performance of queues with a scheduled start and end time. Our results show that the equations can accurately predict the queue performance as a function of the number of servers, mean arrival load, session length and service time variability. …


Entry Of Copycats Of Luxury Brands, Sarah Yini Gao, Wei Shi Lim, Christopher S. Tang Dec 2016

Entry Of Copycats Of Luxury Brands, Sarah Yini Gao, Wei Shi Lim, Christopher S. Tang

Research Collection Lee Kong Chian School Of Business

We develop a game-theoretic model to examine the entry of copycats and its implications by incorporating two salient features; these features are two product attributes, i.e., physical resemblance and product quality, and two consumer utilities, i.e., consumption utility and status utility. Our equilibrium analysis suggests that copycats with a high physical resemblance but low product quality are more likely to successfully enter the market by defying the deterrence of the incumbent. Furthermore, we show that higher quality can prevent the copycat from successfully entering the market. Finally, we show that the entry of copycats does not always improve consumer surplus …


Appointment Systems Under Service Level Constraints, David Chen, Rowan Wang, Zhenzhen Yan, Saif Benjaafar, Oualid Jouini Dec 2016

Appointment Systems Under Service Level Constraints, David Chen, Rowan Wang, Zhenzhen Yan, Saif Benjaafar, Oualid Jouini

Research Collection Lee Kong Chian School Of Business

We consider a new model of appointment scheduling where customers are given the earliest possible appointment times under the service level constraint that the expected waiting time of each individual customer cannot exceed a given threshold. We apply the theory of majorization to analytically characterize the structure of the optimal appointment schedule. We show that, the optimal inter-appointment times increase with the order of arrivals. That is, the optimal inter-arrival time between two customers later in the arrival process is longer than that between two customers earlier in the arrival process. We study the limiting behavior of our system, and …


The Effect Of Monetary Policy On Bank Wholesale Funding, Hyunsoo Choi, Hyun Soo Choi Dec 2016

The Effect Of Monetary Policy On Bank Wholesale Funding, Hyunsoo Choi, Hyun Soo Choi

Research Collection Lee Kong Chian School Of Business

We study how monetary policy affects the funding composition of the banking sector. When monetary tightening reduces the retail deposit supply due to, for example, a decrease in bank reserves or in money demand, banks try to substitute the deposit outflows with more wholesale funding in order to mitigate the policy impact on their lending. Banks have varying degrees of accessibility to wholesale funding sources because of financial frictions, and those banks that are large or that have a greater reliance on wholesale funding increase their wholesale funding more. As a result, monetary tightening increases both the reliance on and …


Appointment Sequencing: Why The Smallest-Variance-First Rule May Not Be Optimal, Qingxia Kong, Chung-Yee Lee, Chung-Piaw Teo, Zhichao Zheng Dec 2016

Appointment Sequencing: Why The Smallest-Variance-First Rule May Not Be Optimal, Qingxia Kong, Chung-Yee Lee, Chung-Piaw Teo, Zhichao Zheng

Research Collection Lee Kong Chian School Of Business

We study the design of a healthcare appointment system with a single physician and a group of patients whose service durations are stochastic. The challenge is to find the optimal arrival sequence for a group of mixed patients such that the expected total cost of patient waiting time and physician overtime is minimized. While numerous simulation studies report that sequencing patients by increasing order of variance of service duration (Smallest-Variance-First or SVF rule) performs extremely well in many environments, analytical results on optimal sequencing are known only for two patients. In this paper, we shed light on why it is …


Lexicon Knowledge Extraction With Sentiment Polarity Computation, Zhaoxia Wang, Vincent Joo Chuan Tong, Pingcheng Ruan, Fang Li Dec 2016

Lexicon Knowledge Extraction With Sentiment Polarity Computation, Zhaoxia Wang, Vincent Joo Chuan Tong, Pingcheng Ruan, Fang Li

Research Collection School Of Computing and Information Systems

Sentiment analysis is one of the most popular natural language processing techniques. It aims to identify the sentiment polarity (positive, negative, neutral or mixed) within a given text. The proper lexicon knowledge is very important for the lexicon-based sentiment analysis methods since they hinge on using the polarity of the lexical item to determine a text's sentiment polarity. However, it is quite common that some lexical items appear positive in the text of one domain but appear negative in another. In this paper, we propose an innovative knowledge building algorithm to extract sentiment lexicon knowledge through computing their polarity value …


A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains, Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma Dec 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains, Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma

Research Collection School Of Computing and Information Systems

In this paper, we propose a framework for privacy-preserving outsourced functional computation across large-scale multiple encrypted domains, which we refer to as POFD. With POFD, a user can obtain the output of a function computed over encrypted data from multiple domains while protecting the privacy of the function itself, its input and its output. Specifically, we introduce two notions of POFD, the basic POFD and its enhanced version, in order to tradeoff the levels of privacy protection and performance. We present three protocols, named Multi-domain Secure Multiplication protocol (MSM), Secure Exponent Calculation protocol with private Base (SECB), and Secure Exponent …


‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap Dec 2016

‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap

Research Collection School Of Computing and Information Systems

This paper reports experiences made at an Asian university in developing a social media platform based on Twitter in the context of a final year capstone project where information systems management students get an opportunity to solve ‘a real-world problem for a real client’. In this case study, the challenge was provided by a faculty member’s request for an interactive social media application which engages less outspoken students in class via a social medium they are familiar with: Twitter. We reconstruct the project’s evolution; describe the main features of the application called ‘TweetBoard’ and share lessons learned in developing a …


Pairwise Relation Classification With Mirror Instances And A Combined Convolutional Neural Network, Jianfei Yu, Jing Jiang Dec 2016

Pairwise Relation Classification With Mirror Instances And A Combined Convolutional Neural Network, Jianfei Yu, Jing Jiang

Research Collection School Of Computing and Information Systems

Relation classification is the task of classifying the semantic relations between entity pairs in text. Observing that existing work has not fully explored using different representations for relation instances, especially in order to better handle the asymmetry of relation types, in this paper, we propose a neural network based method for relation classification that combines the raw sequence and the shortest dependency path representations of relation instances and uses mirror instances to perform pairwise relation classification. We evaluate our proposed models on two widely used datasets: SemEval-2010 Task 8 and ACE-2005. The empirical results show that our combined model together …


Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang Dec 2016

Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang

Research Collection School Of Computing and Information Systems

Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results show that …


Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen Dec 2016

Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen

Research Collection School Of Computing and Information Systems

Information diffusion in social networks is often characterized by huge participating communities and viral cascades of high dynamicity. To observe, summarize, and understand the evolution of dynamic diffusion processes in an informative and insightful way is a challenge of high practical value. However, few existing studies aim to summarize networks for interesting dynamic patterns. Dynamic networks raise new challenges not found in static settings, including time sensitivity, online interestingness evaluation, and summary traceability, which render existing techniques inadequate. We propose dynamic network summarization to summarize dynamic networks with millions of nodes by only capturing the few most interesting nodes or …


Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan Dec 2016

Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Automatically identifying characters in movies has attracted researchers' interest and led to several significant and interesting applications. However, due to the vast variation in character appearance as well as the weakness and ambiguity of available annotation, it is still a challenging problem. In this paper, we investigate this problem with the supervision of actor-character name correspondence provided by the movie cast. Our proposed framework, namely, Cast2Face, is featured by: 1) we restrict the assigned names within the set of character names in the cast; 2) for each character, by using the corresponding actor and movie name as keywords, we retrieve …


Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo Dec 2016

Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo

Research Collection School Of Computing and Information Systems

The advent of the Web brought about major changes in the way people search for jobs and companies look for suitable candidates. As more employers and recruitment firms turn to the Web for job candidate search, an increasing number of people turn to the Web for uploading and creating their online resumes. Resumes are often the first source of information about candidates and also the first item of evaluation in candidate selection. Thus, it is imperative that resumes are complete, free of errors and well-organized. We present an automated resume evaluation tool called 'CareerMapper'. Our tool is designed to conduct …