Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (19)
- University of Nebraska - Lincoln (14)
- Edith Cowan University (11)
- University of New Haven (10)
- Washington University in St. Louis (10)
-
- Florida International University (2)
- Tennessee State University (2)
- Western University (2)
- Chapman University (1)
- Embry-Riddle Aeronautical University (1)
- Macalester College (1)
- Portland State University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- San Jose State University (1)
- University of New Mexico (1)
- University of Texas at El Paso (1)
- Keyword
-
- Digital forensics (8)
- Approximate matching (4)
- Interpolation (4)
- Mrsh-v2 (4)
- Human action recognition (3)
-
- Sdhash (3)
- Algorithms (2)
- Bag-of-words (2)
- Bloom filter (2)
- Cubic spline (2)
- DNN image representation (2)
- Hashing (2)
- Image search (2)
- Indexing (2)
- MDS array codes (2)
- Network forensics (2)
- Network traffic analysis (2)
- RAID-6 (2)
- Recurrence equation (2)
- Reliability (2)
- SQLite (2)
- Scientific workflow (2)
- Storage system (2)
- Subspace learning (2)
- ACID (1)
- Abstract syntax tree fingerprinting (1)
- Acceleration (1)
- Active management (1)
- Adaptive Resonance Theory operations (1)
- Adaptive decentralized controller (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (19)
- Australian Digital Forensics Conference (11)
- All Computer Science and Engineering Research (10)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- CSE Conference and Workshop Papers (8)
-
- CSE Technical Reports (3)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Computer Science Faculty Research (2)
- Electrical and Computer Engineering Publications (2)
- FIU Electronic Theses and Dissertations (2)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- Computer Science Faculty Publications and Presentations (1)
- Department of Electrical Engineering and Computer Science - Daytona Beach (1)
- Departmental Technical Reports (CS) (1)
- Engineering Faculty Articles and Research (1)
- Faculty Publications (1)
- Independent Study Project (ISP) Collection (1)
- Mathematics, Statistics, and Computer Science Honors Projects (1)
Articles 1 - 30 of 78
Full-Text Articles in Computer Engineering
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun
Research Collection School Of Computing and Information Systems
Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun
Research Collection School Of Computing and Information Systems
Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Security Issues In Data Warehouse, Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed Dr.
Electrical and Computer Engineering Publications
Data Warehouse (DWH) provides storage for huge amounts of historical data from heterogeneous operational sources in the form of multidimensional views, thus supplying sensitive and useful information which help decision-makers to improve the organization’s business processes. A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.
Data Transport System, Rahav Dor
Data Transport System, Rahav Dor
All Computer Science and Engineering Research
To facilitate the WU Smart Home research [21] we built a system that collects data from sensors and uploads the data to the cloud. The system supports data collection from multiple locations (typically apartments) that are independent from each other, endowing the system with two benefit: distributed data collection and alleviating privacy concerns. Each location is managed by a local micro-server (μServer) that is responsible for receiving data packets from sensors and managing their transient storage. Periodically the μServer triggers a data transport process that moves the data to a cloud server where it is stored in a centralized database. …
Is The Smartphone Smart In Kathmandu?, Seth Bird
Is The Smartphone Smart In Kathmandu?, Seth Bird
Independent Study Project (ISP) Collection
This is the extensive study of the smartphone in the developing country of Nepal, specifically the Kathmandu valley. Throughout my research I conducted various interviews with businesses, Tibetan refugees, and Nepali millennials (18yrs-33yrs) with the goal of identifying how the smartphone is used and understood. I chose the Kathmandu valley as my main area of research because the usage of smartphones in rural Nepal is extremely limited, and the valley represents the economic hub where progressive thinking flourishes. As a main objective I sought to understand how, if at all, the smartphone is used differently between Nepal and America. All …
Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin
Exploring User-Provided Connectivity, Mohammad H. Afrasiabi, Roch Guerin
All Computer Science and Engineering Research
Network services often exhibit positive and negative externalities that affect users' adoption decisions. One such service is "user-provided connectivity" or UPC. The service offers an alternative to traditional infrastructure-based communication services by allowing users to share their "home base" connectivity with other users, thereby increasing their access to connectivity. More users mean more connectivity alternatives, i.e., a positive externality, but also greater odds of having to share one's own connectivity, i.e., a negative externality. The tug of war between positive and negative externalities together with the fact that they often depend not just on how many but also which users …
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
FIU Electronic Theses and Dissertations
Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …
A New Transfer Impedance Based System Equivalent Model For Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, Junhui Zhao
A New Transfer Impedance Based System Equivalent Model For Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, Junhui Zhao
Electrical & Computer Engineering and Computer Science Faculty Publications
This paper presents a new transfer impedance based system equivalent model (TISEM) for voltage stability analysis. The TISEM can be used not only to identify the weakest nodes (buses) and system voltage stability, but also to calculate the amount of real and reactive power transferred from the generator nodes to the vulnerable node causing voltage instability. As a result, a full-scale view of voltage stability of the whole system can be presented in front of system operators. This useful information can help operators take proper actions to avoid voltage collapse. The feasibility and effectiveness of the TISEM are further validated …
Designing A Bayer Filter With Smooth Hue Transition Interpolation Using The Xilinx System Generator, Zhiqiang Li, Peter Revesz
Designing A Bayer Filter With Smooth Hue Transition Interpolation Using The Xilinx System Generator, Zhiqiang Li, Peter Revesz
CSE Conference and Workshop Papers
This paper describes the design of a Bayer filter with smooth hue transition using the System Generator for DSP. We describe and compare experimentally two different designs, one based on a MATLAB implementation and the other based on a modification of the Bayer filter using bilinear interpolation.
A Game-Theoretic Analysis Of The Nuclear Non-Proliferation Treaty, Peter Revesz
A Game-Theoretic Analysis Of The Nuclear Non-Proliferation Treaty, Peter Revesz
CSE Conference and Workshop Papers
Although nuclear non-proliferation is an almost universal human desire, in practice, the negotiated treaties appear unable to prevent the steady growth of the number of states that have nuclear weapons. We propose a computational model for understanding the complex issues behind nuclear arms negotiations, the motivations of various states to enter a nuclear weapons program and the ways to diffuse crisis situations.
Estimating The Flight Path Of Moving Objects Based On Acceleration Data, Peter Revesz
Estimating The Flight Path Of Moving Objects Based On Acceleration Data, Peter Revesz
CSE Conference and Workshop Papers
Inertial navigation is the problem of estimating the flight path of a moving object based on only acceleration measurements. This paper describes and compares two approaches for inertial navigation. Both approaches estimate the flight path of the moving object using cubic spline interpolation, but they find the coefficients of the cubic spline pieces by different methods. The first approach uses a tridiagonal matrix, while the second approach uses recurrence equations. They also require different boundary conditions. While both approaches work in O(n) time where n is the number of given acceleration measurements, the recurrence equation-based method can be easier updated …
Cubic Spline Interpolation By Solving A Recurrence Equation Instead Of A Tridiagonal Matrix, Peter Revesz
Cubic Spline Interpolation By Solving A Recurrence Equation Instead Of A Tridiagonal Matrix, Peter Revesz
CSE Conference and Workshop Papers
The cubic spline interpolation method is proba- bly the most widely-used polynomial interpolation method for functions of one variable. However, the cubic spline method requires solving a tridiagonal matrix-vector equation with an O(n) computational time complexity where n is the number of data measurements. Even an O(n) time complexity may be too much in some time-ciritical applications, such as continuously estimating and updating the flight paths of moving objects. This paper shows that under certain boundary conditions the tridiagonal matrix solving step of the cubic spline method could be entirely eliminated and instead the coefficients of the unknown cubic polynomials …
Click-Through-Based Subspace Learning For Image Search, Yingwei Pan, Ting Yao, Xinmei Tian, Houqiang Li, Chong-Wah Ngo
Click-Through-Based Subspace Learning For Image Search, Yingwei Pan, Ting Yao, Xinmei Tian, Houqiang Li, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
One of the fundamental problems in image search is to rank image documents according to a given textual query. We address two limitations of the existing image search engines in this paper. First, there is no straightforward way of comparing textual keywords with visual image content. Image search engines therefore highly depend on the surrounding texts, which are often noisy or too few to accurately describe the image content. Second, ranking functions are trained on query-image pairs labeled by human labelers, making the annotation intellectually expensive and thus cannot be scaled up. We demonstrate that the above two fundamental challenges …
Organizing Video Search Results To Adapted Semantic Hierarchies For Topic-Based Browsing, Jiajun Wang, Yu-Gang Jiang, Qiang Wang, Kuiyuan Yang, Chong-Wah Ngo
Organizing Video Search Results To Adapted Semantic Hierarchies For Topic-Based Browsing, Jiajun Wang, Yu-Gang Jiang, Qiang Wang, Kuiyuan Yang, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
Organizing video search results into semantically structured hierarchies can greatly improve the efficiency of browsing complex query topics. Traditional hierarchical clustering techniques are inadequate since they lack the ability to generate semantically interpretable structures. In this paper, we introduce an approach to organize video search results to an adapted semantic hierarchy. As many hot search topics such as celebrities and famous cities have Wikipedia pages where hierarchical topic structures are available, we start from the Wikipedia hierarchies and adjust the structures according to the characteristics of the returned videos from a search engine. Ordinary clustering based on textual information of …
Vireo @ Trecvid 2014: Instance Search And Semantic Indexing, Wei Zhang, Hao Zhang, Ting Yao, Yijie Lu, Jingjing Chen, Chong-Wah Ngo
Vireo @ Trecvid 2014: Instance Search And Semantic Indexing, Wei Zhang, Hao Zhang, Ting Yao, Yijie Lu, Jingjing Chen, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
This paper summarizes the following two tasks participated by VIREO group: instance search and semantic indexing. We will present our approaches and analyze the results obtained in TRECVID 2014 benchmark evaluation
Cama: Efficient Modeling Of The Capture Effect For Low Power Wireless Networks, Behnam Dezfouli, Marjan Radi, Kamin Whitehouse, Shukor Abd Razak, Hwee-Pink Tan
Cama: Efficient Modeling Of The Capture Effect For Low Power Wireless Networks, Behnam Dezfouli, Marjan Radi, Kamin Whitehouse, Shukor Abd Razak, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Network simulation is an essential tool for the design and evaluation of wireless network protocols, and realistic channel modeling is essential for meaningful analysis. Recently, several network protocols have demonstrated substantial network performance improvements by exploiting the capture effect, but existing models of the capture effect are still not adequate for protocol simulation and analysis. Physical-level models that calculate the signal-to-interference-plus-noise ratio (SINR) for every incoming bit are too slow to be used for large-scale or long-term networking experiments, and link-level models such as those currently used by the NS2 simulator do not accurately predict protocol performance. In this article, …
Action Classification By Exploring Directional Co-Occurrence Of Weighted Stips, Mengyuan Liu, Hong Liu, Qianru Sun
Action Classification By Exploring Directional Co-Occurrence Of Weighted Stips, Mengyuan Liu, Hong Liu, Qianru Sun
Research Collection School Of Computing and Information Systems
Human action recognition is challenging mainly due to intro-variety, inter-ambiguity and clutter backgrounds in real videos. Bag-of-visual words model utilizes spatio-temporal interest points(STIPs), and represents action by the distribution of points which ignores visual context among points. To add more contextual information, we propose a method by encoding spatio-temporal distribution of weighted pairwise points. First, STIPs are extracted from an action sequence and clustered into visual words. Then, each word is weighted in both temporal and spatial domains to capture the relationships with other words. Finally, the directional relationships between co-occurrence pairwise words are used to encode visual contexts. We …
A Catalog Of While Loop Specification Patterns, Aditi Barua, Yoonsik Cheon
A Catalog Of While Loop Specification Patterns, Aditi Barua, Yoonsik Cheon
Departmental Technical Reports (CS)
This document provides a catalog of while loop patterns along with their skeletal specifications. The specifications are written in a functional form known as intended functions. The catalog can be used to derive specifications of while loops by first matching the loops to the cataloged patterns and then instantiating the skeletal specifications of the matched patterns. Once their specifications are formulated and written, the correctness of while loops can be proved rigorously or formally using the functional program verification technique in which a program is viewed as a mathematical function from one program state to another.
Name-Face Association In Web Videos: A Large-Scale Dataset, Baselines, And Open Issues, Zhi-Neng Chen, Chong-Wah Ngo, Wei Zhang, Juan Cao, Yu-Gang Jiang
Name-Face Association In Web Videos: A Large-Scale Dataset, Baselines, And Open Issues, Zhi-Neng Chen, Chong-Wah Ngo, Wei Zhang, Juan Cao, Yu-Gang Jiang
Research Collection School Of Computing and Information Systems
Associating faces appearing in Web videos with names presented in the surrounding context is an important task in many applications. However, the problem is not well investigated particularly under large-scale realistic scenario, mainly due to the scarcity of dataset constructed in such circumstance. In this paper, we introduce a Web video dataset of celebrities, named WebV-Cele, for name-face association. The dataset consists of 75 073 Internet videos of over 4 000 hours, covering 2 427 celebrities and 649 001 faces. This is, to our knowledge, the most comprehensive dataset for this problem. We describe the details of dataset construction, discuss …
A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee
A Comparative Study Of Underwater Robot Path Planning Algorithms For Adaptive Sampling In A Network Of Sensors, Sreeja Banerjee
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Monitoring lakes, rivers, and oceans is critical to improving our understanding of complex large-scale ecosystems. We introduce a method of underwater monitoring using semi-mobile underwater sensor networks and mobile underwater robots in this thesis. The underwater robots can move freely in all dimension while the sensor nodes are anchored to the bottom of the water column and can move only up and down along the depth of the water column. We develop three different algorithms to optimize the path of the underwater robot and the positions of the sensors to improve the overall quality of sensing of an area of …
Preliminary Forensic Analysis Of The Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues
Preliminary Forensic Analysis Of The Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues
Electrical & Computer Engineering and Computer Science Faculty Publications
Video game consoles can no longer be viewed as just gaming consoles but rather as full multimedia machines, capable of desktop computer-like performance. The past has shown that game consoles have been used in criminal activities such as extortion, identity theft, and child pornography, but with their ever-increasing capabilities, the likelihood of the expansion of criminal activities conducted on or over the consoles increases. This research aimed to take the initial step of understanding the Xbox One, the most powerful Microsoft console to date. We report the outcome of conducting a forensic examination of the Xbox One, and we provide …
Testing The Forensic Soundness Of Forensic Examination Environments On Bootable Media, Ahmed F.A.L. Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim Baggili
Testing The Forensic Soundness Of Forensic Examination Environments On Bootable Media, Ahmed F.A.L. Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
In this work we experimentally examine the forensic soundness of the use of forensic bootable CD/DVDs as forensic examination environments. Several Linux distributions with bootable CD/DVDs which are marketed as forensic examination environments are used to perform a forensic analysis of a captured computer system. Before and after the bootable CD/DVD examination, the computer system's hard disk is removed and a forensic image acquired by a second system using a hardware write blocker. The images acquired before and after the bootable CD/DVD examination are hashed and the hash values compared. Where the hash values are inconsistent, a differential analysis is …
Ultimate Codes: Near-Optimal Mds Array Codes For Raid-6, Zhijie Huang, Hong Jiang, Chong Wang, Ke Zhou, Yuhong Zhao
Ultimate Codes: Near-Optimal Mds Array Codes For Raid-6, Zhijie Huang, Hong Jiang, Chong Wang, Ke Zhou, Yuhong Zhao
CSE Technical Reports
As modern storage systems have grown in size and complexity, RAID-6 is poised to replace RAID-5 as the dominant form of RAID architectures due to its ability to protect against double disk failures. Many excellent erasure codes specially designed for RAID-6 have emerged in recent years. However, all of them have limitations. In this paper, we present a class of near perfect erasure codes for RAID-6, called the Ultimate codes. These codes encode, update and decode either optimally or nearly optimally, regardless of what the code length is. This implies that utilizing these codes we can build highly efficient and …
S-Code: Lowest Density Mds Array Codes For Raid-6, Zhijie Huang, Hong Jiang, Ke Zhou, Yuhong Zhao, Chong Wang
S-Code: Lowest Density Mds Array Codes For Raid-6, Zhijie Huang, Hong Jiang, Ke Zhou, Yuhong Zhao, Chong Wang
CSE Technical Reports
RAID, a storage architecture designed to exploit I/O parallelism and provide data reliability, has been deployed widely in computing systems as a storage building block. In large scale storage systems, in particular, RAID-6 is gradually replacing RAID-5 as the dominant form of disk arrays due to its capability of tolerating concurrent failures of any two disks. MDS (maximum distance separable) array codes are the most popular erasure codes that can be used for implementing RAID-6, since they enable optimal storage efficiency and efficient encoding and decoding algorithms. In this paper, we propose a new class of MDS array codes called …
Querie: Collaborative Database Exploration, Magdalini Eirinaki, Suju Abraham, Neoklis Polyzotis, Naushin Shaikh
Querie: Collaborative Database Exploration, Magdalini Eirinaki, Suju Abraham, Neoklis Polyzotis, Naushin Shaikh
Faculty Publications
No abstract provided.
Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu
Influences Of Influential Users: An Empirical Study Of Music Social Network, Jing Ren, Zhiyong Cheng, Jialie Shen, Feida Zhu
Research Collection School Of Computing and Information Systems
Influential user can play a crucial role in online social networks. This paper documents an empirical study aiming at exploring the effects of influential users in the context of music social network. To achieve this goal, music diffusion graph is developed to model how information propagates over network. We also propose a heuristic method to measure users' influences. Using the real data from Last. fm, our empirical test demonstrates key effects of influential users and reveals limitations of existing influence identification/characterization schemes.
Click-Through-Based Cross-View Learning For Image Search, Yingwei Pan, Ting Yao, Tao Mei, Houqiang Li, Chong-Wah Ngo, Yong Rui
Click-Through-Based Cross-View Learning For Image Search, Yingwei Pan, Ting Yao, Tao Mei, Houqiang Li, Chong-Wah Ngo, Yong Rui
Research Collection School Of Computing and Information Systems
One of the fundamental problems in image search is to rank image documents according to a given textual query. Existing search engines highly depend on surrounding texts for ranking images, or leverage the query-image pairs annotated by human labelers to train a series of ranking functions. However, there are two major limitations: 1) the surrounding texts are often noisy or too few to accurately describe the image content, and 2) the human annotations are resourcefully expensive and thus cannot be scaled up. We demonstrate in this paper that the above two fundamental challenges can be mitigated by jointly exploring the …
Creating Autonomous Adaptive Agents In A Real-Time First-Person Shooter Computer Game, Di Wang, Ah-Hwee Tan
Creating Autonomous Adaptive Agents In A Real-Time First-Person Shooter Computer Game, Di Wang, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Games are good test-beds to evaluate AI methodologies. In recent years, there has been a vast amount of research dealing with real-time computer games other than the traditional board games or card games. This paper illustrates how we create agents by employing FALCON, a self-organizing neural network that performs reinforcement learning, to play a well-known first-person shooter computer game called Unreal Tournament. Rewards used for learning are either obtained from the game environment or estimated using the temporal difference learning scheme. In this way, the agents are able to acquire proper strategies and discover the effectiveness of different weapons without …
Power Management In The Cluster System, Leping Wang
Power Management In The Cluster System, Leping Wang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
With growing cost of electricity, the power management of server clusters has become an important problem. However, most previous researchers have only addressed the challenge in traditional homogeneous environments. Considering the increasing popularity of heterogeneous and virtualized systems, this thesis develops a series of efficient algorithms respectively for power management of heterogeneous soft real-time clusters and a virtualized cluster system. It is built on simple but effective mathematical models. When deployed to a new platform, the software incurs low configuration cost because no extensive performance measurements and profiling are required. Built upon optimization, queuing theory and control theory techniques, our …
Migrating To Ipv6 - The Role Of Basic Coordination, Mehdi Nikkhah, Roch Guerin
Migrating To Ipv6 - The Role Of Basic Coordination, Mehdi Nikkhah, Roch Guerin
All Computer Science and Engineering Research
The need for a larger Internet address space was acknowledged early on, and a solution (IPv6) standardized years ago. Its adoption has, however, been anything but easy and still faces significant challenges. The situation begs the questions of "why has it been so difficult?" and "what could have been (or still be) done to facilitate this migration?" There has been significant recent interest in those questions, and the paper builds on a line of work based on technology adoption models to explore them. The results confirm the impact of several known factors, but also provide new insight. In particular, they …