Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 59

Full-Text Articles in Computer Engineering

Explore Alternatives Now! - Performance Mgmt In The Multi-Dimensional Digital World, Richard Raymond Smith Nov 2019

Explore Alternatives Now! - Performance Mgmt In The Multi-Dimensional Digital World, Richard Raymond Smith

Research Collection Lee Kong Chian School Of Business

Earlier, business was not quite as dynamic, employment was intended for the long-term, and the idea of pay linked to performance was quite a dependable model. But as we examine the tradition of performance management in light of today's digital business models, there are a number of new questions that emerge.


Maximizing Multifaceted Network Influence, Yuchen Li, Ju Fan, George V. Ovchinnikov, Panagiotis Karras Nov 2019

Maximizing Multifaceted Network Influence, Yuchen Li, Ju Fan, George V. Ovchinnikov, Panagiotis Karras

Research Collection School Of Information Systems

An information dissemination campaign is often multifaceted, involving several facets or pieces of information disseminating from different sources. The question then arises, how should we assign such pieces to eligible sources so as to achieve the best viral dissemination results? Past research has studied the problem of Influence Maximization (IM), which is to select a set of k promoters that maximizes the expected reach of a message over a network. However, in this classical IM problem, each promoter spreads out the same unitary piece of information. In this paper, we propose the Optimal Influential Pieces Assignment (OIPA) problem, which is ...


Lightweight Privacy-Preserving Ensemble Classification For Face Recognition, Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Kui Ren Jan 2019

Lightweight Privacy-Preserving Ensemble Classification For Face Recognition, Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Kui Ren

Research Collection School Of Information Systems

The development of machine learning technology and visual sensors is promoting the wider applications of face recognition into our daily life. However, if the face features in the servers are abused by the adversary, our privacy and wealth can be faced with great threat. Many security experts have pointed out that, by 3-D-printing technology, the adversary can utilize the leaked face feature data to masquerade others and break the E-bank accounts. Therefore, in this paper, we propose a lightweight privacy-preserving adaptive boosting (AdaBoost) classification framework for face recognition (POR) based on the additive secret sharing and edge computing. First, we ...


Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali Jul 2018

Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali

Dissertations and Theses Collection (Open Access)

The rapid increase in online social networking services over the last decade has pre- sented an unprecedented opportunity to observe users’ behaviour both on a societal and individual level. The insight gained from analysing such data can help foster a deeper understanding of social media users and the flow of information, while also offering valuable business applications. User relationships are among the most studied aspects of online behaviour. These relationships are not homogeneous. Past research has shown that people use social networks to both socialize and source in- formation. Hence, different types of links – used to socialize, gain information, or ...


Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan Jul 2018

Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan

Research Collection School Of Information Systems

Digital Banking is an evolution of online banking, where the banks attempt to further enhance customer experience by integrating digital technologies such as mobile technology, social media and analytics. Traditional banks have the highest barriers to entry into the digital banking market due to the presence of legacy core banking systems. These legacy systems while still high performing and reliable, are inflexible to change and are not easily integrated to the modern application systems needed for delivering digital banking services across multiple online banking channels. One solution that is widely adopted in the industry to overcome this obstacle is the ...


Breathing-Based Authentication On Resource-Constrained Iot Devices Using Recurrent Neural Networks, Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee May 2018

Breathing-Based Authentication On Resource-Constrained Iot Devices Using Recurrent Neural Networks, Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee

Research Collection School Of Information Systems

Recurrent neural networks (RNNs) have shown promising resultsin audio and speech-processing applications. The increasingpopularity of Internet of Things (IoT) devices makes a strongcase for implementing RNN-based inferences for applicationssuch as acoustics-based authentication and voice commandsfor smart homes. However, the feasibility and performance ofthese inferences on resource-constrained devices remain largelyunexplored. The authors compare traditional machine-learningmodels with deep-learning RNN models for an end-to-endauthentication system based on breathing acoustics.


Virtualization In Wireless Sensor Networks: Fault Tolerant Embedding For Internet Of Things, Omprakash Kaiwartya, Abdul Hanan Abdullah, Yue Cao, Jaime Lloret, Sushil Kumar, Rajiv Ratn Shah, Mukesh Prasad, Shiv Prakash Apr 2018

Virtualization In Wireless Sensor Networks: Fault Tolerant Embedding For Internet Of Things, Omprakash Kaiwartya, Abdul Hanan Abdullah, Yue Cao, Jaime Lloret, Sushil Kumar, Rajiv Ratn Shah, Mukesh Prasad, Shiv Prakash

Research Collection School Of Information Systems

Recently, virtualization in wireless sensor networks (WSNs) has witnessed significant attention due to the growing service domain for IoT. Related literature on virtualization in WSNs explored resource optimization without considering communication failure in WSNs environments. The failure of a communication link in WSNs impacts many virtual networks running IoT services. In this context, this paper proposes a framework for optimizing fault tolerance in virtualization in WSNs, focusing on heterogeneous networks for service-oriented IoT applications. An optimization problem is formulated considering fault tolerance and communication delay as two conflicting objectives. An adapted non-dominated sorting based genetic algorithm (A-NSGA) is developed to ...


User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yanju Liu, Zhan Wang Jan 2018

User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yanju Liu, Zhan Wang

Research Collection School Of Information Systems

Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a ...


Real-Time Inbound Marketing: A Use Case For Digital Banking, Alan Megargel, Venky Shankararaman, Srinivas K. Reddy Jan 2018

Real-Time Inbound Marketing: A Use Case For Digital Banking, Alan Megargel, Venky Shankararaman, Srinivas K. Reddy

Research Collection School Of Information Systems

Over the years banks have been strategically using digital technologies to help transform various aspects of their business. In recent times, this strategy has evolved into one of digital augmentation of the bank’s processes, products and channels. This allows for reaching out to customers and partners through digital platforms, for example; the addition of mobile apps for customers to access and perform service transactions. Marketing continues to play a major role in supporting the expansion of business and increasing revenue for the bank. Marketing has evolved from mass direct targeting to more personalised, face-to-face and real-time targeting. In the ...


Commentary: Wanted - A New Generation Of Accountants, Poh Sun Seow, Gary Pan, Clarence Goh Dec 2017

Commentary: Wanted - A New Generation Of Accountants, Poh Sun Seow, Gary Pan, Clarence Goh

Research Collection School Of Accountancy

Facing a new wave of automation, young accountants must redefine their role and their value-add to their company, say three Singapore Management University observers.


Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu Dec 2017

Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu

Research Collection School Of Information Systems

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have ...


Intent Recognition In Smart Living Through Deep Recurrent Neural Networks, Xiang Zhang, Lina Yao, Chaoran Huang, Quan Z. Sheng, Xianzhi Wang Nov 2017

Intent Recognition In Smart Living Through Deep Recurrent Neural Networks, Xiang Zhang, Lina Yao, Chaoran Huang, Quan Z. Sheng, Xianzhi Wang

Research Collection School Of Information Systems

Electroencephalography (EEG) signal based intent recognition has recently attracted much attention in both academia and industries, due to helping the elderly or motor-disabled people controlling smart devices to communicate with outer world. However, the utilization of EEG signals is challenged by low accuracy, arduous and time-consuming feature extraction. This paper proposes a 7-layer deep learning model to classify raw EEG signals with the aim of recognizing subjects’ intents, to avoid the time consumed in pre-processing and feature extraction. The hyper-parameters are selected by an Orthogonal Array experiment method for efficiency. Our model is applied to an open EEG dataset provided ...


An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim Nov 2017

An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim

Research Collection School Of Information Systems

Social media platforms are one of the fastest ways to disseminate information but they have also been used as a means to spread rumors. If left unchecked, rumors have serious consequences. Counter-rumors, messages used to refute rumors, are an important means of rumor curtailment. The objective of this paper is to examine the types of rumor and counter-rumor messages generated in Twitter in response to the falsely reported death of a politician, Lee Kuan Yew, who was Singapore’s first Prime Minister. Our content analysis of 4321Twitter tweets about Lee’s death revealed six categories of rumor messages, four categories ...


Toward Accurate Network Delay Measurement On Android Phones, Weichao Li, Daoyuan Wu, Rocky K. C. Chang, Ricky K. P. Mok Aug 2017

Toward Accurate Network Delay Measurement On Android Phones, Weichao Li, Daoyuan Wu, Rocky K. C. Chang, Ricky K. P. Mok

Research Collection School Of Information Systems

Measuring and understanding the performance of mobile networks is becoming very important for end users and operators. Despite the availability of many measurement apps, their measurement accuracy has not received sufficient scrutiny. In this paper, we appraise the accuracy of smartphone-based network performance measurement using the Android platform and the network round-trip time (RTT) as the metric. We show that two of the most popular measurement apps-Ookla Speedtest and MobiPerf-have their RTT measurements inflated. We build three test apps that cover three common measurement methods and evaluate them in a testbed. We overcome the main challenge of obtaining a complete ...


Special Section: Technological Innovations For Communication And Collaboration In Social Spaces, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber Aug 2017

Special Section: Technological Innovations For Communication And Collaboration In Social Spaces, Eric K. Clemons, Rajiv M. Dewan, Robert J. Kauffman, Thomas A. Weber

Research Collection School Of Information Systems

Research on social communication and collaboration is of high importance today in Information Systems, especially for interdisciplinary inquiry that emphasizes topics related to strategy, information, technology, economics, and society. The articles that are showcased in this special section of the Journal of Management Information Systems address issues that arise in a number of important contemporary contexts.


How Technology Is Reshaping Financial Services: Essays On Consumer Behavior In Card, Channel And Cryptocurrency Services, Dan Geng Jul 2017

How Technology Is Reshaping Financial Services: Essays On Consumer Behavior In Card, Channel And Cryptocurrency Services, Dan Geng

Dissertations and Theses Collection

The financial services sector has seen dramatic technological innovations in the last several years associated with the “fintech revolution.” Major changes have taken place in channel management, credit card rewards marketing, cryptocurren-cy, and wealth management, and have influenced consumers’ banking behavior in different ways. As a consequence, there has been a growing demand for banks to rethink their business models and operations to adapt to changing consumer be-havior and counter the competitive pressure from other banks and non-bank play-ers. In this dissertation, I study consumer behavior related to different aspects of financial innovation by addressing research questions that are motivated ...


Perception And Reality: Measuring Digital Skills In Singapore, Swapna Gottipati Jul 2017

Perception And Reality: Measuring Digital Skills In Singapore, Swapna Gottipati

Research Collection School Of Information Systems

ICDL Asia carried out a digital literacy study in Singapore, looking at an essential skill for everyday life. The goal of the study was to discover the digital skills gaps among young people in Singapore. Singapore is considered to be a digitally advanced country where young people have access to the latest technology and gadgets. At the same time, it is imperative for young people to possess relevant digital skills for a future-ready and healthy economy. The studies consisted of two key parts: self-assessment and practical assessment of digital skills. Our findings show that, though the digital native fallacy exists ...


Recommending Personalized Schedules In Urban Environments, Cen Chen Jun 2017

Recommending Personalized Schedules In Urban Environments, Cen Chen

Dissertations and Theses Collection

In this thesis, we are broadly interested in solving real world problems that involve decision support for coordinating agent movements in dynamic urban environments, where people are agents exhibiting different human behavior patterns and preferences. The rapid development of mobile technologies makes it easier to capture agent behavioral and preference information. Such rich agent specific information, coupled with the explosive growth of computational power, opens many opportunities that we could potentially leverage, to better guide/influence the agents in urban environments. The purpose of this thesis is to investigate how we can effectively and efficiently guide and coordinate the agents ...


Discovering Your Selling Points: Personalized Social Influential Tags Exploration, Yuchen Li, Kian-Lee Tan, Ju Fan, Dongxiang Zhang May 2017

Discovering Your Selling Points: Personalized Social Influential Tags Exploration, Yuchen Li, Kian-Lee Tan, Ju Fan, Dongxiang Zhang

Research Collection School Of Information Systems

Social influence has attracted significant attention owing to the prevalence of social networks (SNs). In this paper, we study a new social influence problem, called personalized social influential tags exploration (PITEX), to help any user in the SN explore how she influences the network. Given a target user, it finds a size-k tag set that maximizes this user’s social influence. We prove the problem is NP-hard to be approximated within any constant ratio. To solve it, we introduce a sampling-based framework, which has an approximation ratio of 1−ǫ 1+ǫ with high probabilistic guarantee. To speedup the computation ...


Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang Dec 2016

Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang

Research Collection School Of Information Systems

Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results ...


From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan Dec 2016

From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan

Research Collection School Of Information Systems

With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social ...


Practitioners' Expectations On Automated Fault Localization, Pavneet Singh Kochhar, Xin Xia, David Lo, Shanping Li Jul 2016

Practitioners' Expectations On Automated Fault Localization, Pavneet Singh Kochhar, Xin Xia, David Lo, Shanping Li

Research Collection School Of Information Systems

Software engineering practitioners often spend significant amount of time and effort to debug. To help practitioners perform this crucial task, hundreds of papers have proposed various fault localization techniques. Fault localization helps practitioners to find the location of a defect given its symptoms (e.g., program failures). These localization techniques have pinpointed the locations of bugs of various systems of diverse sizes, with varying degrees of success, and for various usage scenarios. Unfortunately, it is unclear whether practitioners appreciate this line of research. To fill this gap, we performed an empirical study by surveying 386 practitioners from more than 30 ...


Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan Jul 2016

Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan

Research Collection School Of Information Systems

Smart systems are today increasingly developed with the number of wireless sensor devices that drastically increases. They are implemented within several contexts through our environment. Thus, sensed data transported in ubiquitous systems are important and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed to wireless sensor networks (WSN). However, one stage that is often neglected before their deployment, is the conformance testing process, a crucial and challenging step. Active testing techniques commonly used in wired networks are not suitable to WSN and passive approaches are needed. While some works ...


Poster: Improving Communication And Communicability With Smarter Use Of Text-Based Messages On Mobile And Wearable Devices, Kenny T. W. Choo Jun 2016

Poster: Improving Communication And Communicability With Smarter Use Of Text-Based Messages On Mobile And Wearable Devices, Kenny T. W. Choo

Research Collection School Of Information Systems

While smartphones have undoubtedly afforded many modern conveniences such as emails, instant messaging or web search, the notifications from smartphones conversely impact our lives through a deluge of information, or stress arising from expectations that we should turn our immediate attention to them (e.g., work emails). In my latest research, we find that the glanceability of smartwatches may provide an opportunity to reduce the perceived disruption from mobile notifications. Text is a common medium for communication in smart devices, the application of natural language processing on text, together with the physical affordances of smartwatches, present exciting opportunities for research ...


Demo: Ta$Ker: Campus-Scale Mobile Crowd-Tasking Platform, Nikita Jaiman, Thivya Kandappu, Randy Tandriansyah, Archan Misra Jun 2016

Demo: Ta$Ker: Campus-Scale Mobile Crowd-Tasking Platform, Nikita Jaiman, Thivya Kandappu, Randy Tandriansyah, Archan Misra

Research Collection School Of Information Systems

We design and develop TA$Ker, a real-world mobile crowd- sourcing platform to empirically study the worker responses to various task recommendation and selection strategies.


Poster: Air Quality Friendly Route Recommendation System, Savina Singla, Divya Bansal, Archan Misra Jun 2016

Poster: Air Quality Friendly Route Recommendation System, Savina Singla, Divya Bansal, Archan Misra

Research Collection School Of Information Systems

To model the overall personal inhalation of hazardous gases through the air (both indoor and outdoor) by an individual, provide air quality friendly route recommendations, thus raising the overall quality of urban movement and living healthy life.


Improving The Sensitivity Of Unobtrusive Inactivity Detection In Sensor-Enabled Homes For The Elderly, Alvin C. Valera, Hwee-Pink Tan, Liming Bai Mar 2016

Improving The Sensitivity Of Unobtrusive Inactivity Detection In Sensor-Enabled Homes For The Elderly, Alvin C. Valera, Hwee-Pink Tan, Liming Bai

Research Collection School Of Information Systems

Unobtrusive in-home monitoring systems are gaining acceptability and are being deployed to enable relatives and caregivers to remotely monitor and provide timely care to their elderly loved ones or senior clients, respectively, who are living independently. Such systems can provide information about nonmovement or inactivity of the elderly resident. As prolonged inactivity could mean potential danger, several algorithms have been proposed to automatically detect unusually long durations of inactivity. Such schemes, however, suffer from low sensitivity due to their high detection latency. In this paper, we propose Dwell Time-enhanced Dynamic Threshold (DTDT), a scheme for computing adaptive alert thresholds that ...


Ambient And Smartphone Sensor Assisted Adl Recognition In Multi-Inhabitant Smart Environments, Nirmalya Roy, Archan Misra, Diane Cook Feb 2016

Ambient And Smartphone Sensor Assisted Adl Recognition In Multi-Inhabitant Smart Environments, Nirmalya Roy, Archan Misra, Diane Cook

Research Collection School Of Information Systems

Activity recognition in smart environments is an evolving research problem due to the advancement and proliferation of sensing, monitoring and actuation technologies to make it possible for large scale and real deployment. While activities in smart home are interleaved, complex and volatile; the number of inhabitants in the environment is also dynamic. A key challenge in designing robust smart home activity recognition approaches is to exploit the users’ spatiotemporal behavior and location, focus on the availability of multitude of devices capable of providing different dimensions of information and fulfill the underpinning needs for scaling the system beyond a single user ...


Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Ronald Wai Hong Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin Cerdena Valera, Hwee Xian Tan Dec 2015

Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Ronald Wai Hong Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin Cerdena Valera, Hwee Xian Tan

Research Collection School Of Information Systems

The dynamic and unpredictable nature of energy harvesting sources available for wireless sensor networks, and the time variation in network statistics like packet transmission rates and link qualities, necessitate the use of adaptive duty cycling techniques. Such adaptive control allows sensor nodes to achieve long-run energy neutrality, where energy supply and demand are balanced in a dynamic environment such that the nodes function continuously. In this paper, we develop a new framework enabling an adaptive duty cycling scheme for sensor networks that takes into account the node battery level, ambient energy that can be harvested, and application-level QoS requirements. We ...


Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi Sep 2015

Sandra Helps You Learn: The More You Walk, The More Battery Your Phone Drains, Chulhong Min, Chungkuk Yoo, Inseok Hwang, Seungwoo Kang, Youngki Lee, Seungchul Lee, Pillsoon Park, Changhun Lee, Seungpyo Choi Choi

Research Collection School Of Information Systems

Emerging continuous sensing apps introduce new major factors governing phones’ overall battery consumption behaviors: (1) added nontrivial persistent battery drain, and more importantly (2) different battery drain rate depending on the user’s different mobility condition. In this paper, we address the new battery impacting factors significant enough to outdate users’ existing battery model in real life. We explore an initial approach to help users understand the cause and effect between their physical activity and phones’ battery life. To this end, we present Sandra, a novel mobility-aware smartphone battery information advisor, and study its potential to help users redevelop their ...