Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Dynamic Queue Management For Hospital Emergency Room Services, Kar Way Tan Dec 2013

Dynamic Queue Management For Hospital Emergency Room Services, Kar Way Tan

Dissertations and Theses Collection (Open Access)

The emergency room (ER) – or emergency department (ED) – is often seen as a place with long waiting times and a lack of doctors to serve the patients. However, it is one of the most important departments in a hospital, and must efficiently serve patients with critical medical needs. In the existing literature, addressing the issue of long waiting times in an ED often takes the form of single-faceted queue-management strategies that are either from a demand perspective or from a supply perspective. From the demand perspective, there is work on queue design such as priority queues, or queue …


Anomaly Detection On Social Data, Hanbo Dai Jun 2013

Anomaly Detection On Social Data, Hanbo Dai

Dissertations and Theses Collection (Open Access)

The advent of online social media including Facebook, Twitter, Flickr and Youtube has drawn massive attention in recent years. These online platforms generate massive data capturing the behavior of multiple types of human actors as they interact with one another and with resources such as pictures, books and videos. Unfortunately, the openness of these platforms often leaves them highly susceptible to abuse by suspicious entities such as spammers. It therefore becomes increasingly important to automatically identify these suspicious entities and eliminate their threats. We call these suspicious entities anomalies in social data, as they often hold different agenda comparing to …


Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, Duc Thien Nguyen Jan 2013

Fair Cost Sharing Auction Mechanisms In Last Mile Ridesharing, Duc Thien Nguyen

Dissertations and Theses Collection (Open Access)

With rapid growth of transportation demands in urban cities, one major challenge is to provide efficient and effective door-to-door service to passengers using the public transportation system. This is commonly known as the Last Mile problem. In this thesis, we consider a dynamic and demand responsive mechanism for Ridesharing on a non-dedicated commercial fleet (such as taxis). This problem is addressed as two sub-problems, the first of which is a special type of vehicle routing problems (VRP). The second sub-problem, which is more challenging, is to allocate the cost (i.e. total fare) fairly among passengers. We propose auction mechanisms where …


The Informavore Shopper: Analysis Of Information Foraging, System Design, And Purchasing Behavior In Online Retail Stores, Jeff Min Teck Hong Jan 2013

The Informavore Shopper: Analysis Of Information Foraging, System Design, And Purchasing Behavior In Online Retail Stores, Jeff Min Teck Hong

Dissertations and Theses Collection (Open Access)

Global online retail sales are on the rise and are predicted to experience a double digit growth annually over the next three years. Given little marginal cost involved in adding new products and brands to their catalogues, online retailers tend to increase product and brand offerings to increase sales by selling products that could not have been sold due to space constraints in physical stores. Frank Urbanowski, Director of MIT Press, attributed the 12% increase in sales of backlist titles directly to increased accessibility to these titles through the Internet. For consumers, the ability to buy products that they would …


Towards Secure And Usable Leakage-Resilient Password Entry, Qiang Yan Jan 2013

Towards Secure And Usable Leakage-Resilient Password Entry, Qiang Yan

Dissertations and Theses Collection (Open Access)

Password leakage is one of the most common security threats for pervasive password based user authentication. The design of a secure and usable password entry against password leakage remains a challenge since twenty year ago when the first academic proposal attempted to address it. This dissertation focuses on investigating the difficulty in designing leakage-resilient password entry (LRPE) schemes and exploring the feasibility of constructing secure and usable LRPE schemes with the assistance of state-of-the-art technology. The first work in this dissertation reveals the infeasibility of designing practical LRPE schemes in the absence of trusted devices by investigating the inherent tradeoff …


Exploiting Human Factors In User Authentication, Payas Gupta Jan 2013

Exploiting Human Factors In User Authentication, Payas Gupta

Dissertations and Theses Collection (Open Access)

Our overarching issue in security is the human factor – and dealing with it is perhaps one of the biggest challenges we face today. Human factor is often described as the weakest part of a security system and users are often described as the weakest link in the security chain. In this thesis, we focus on two problems which are caused by human factors in user authentication and propose respective solutions. a) Secrecy information inference attack – publicly available information can be used to infer some secrecy information about the user. b) Coercion attack – where an attacker forces a …


Impact Of Multimedia In Sina Weibo, Xun Zhao Jan 2013

Impact Of Multimedia In Sina Weibo, Xun Zhao

Dissertations and Theses Collection (Open Access)

Multimedia contents such as images and videos are widely used in social network sites nowadays. Sina Weibo, a Chinese microblogging service, is one of the first microblog platforms to incorporate multimedia content sharing features. This thesis provides statistical analysis on how multimedia contents are produced, consumed, and propagated in Sina Weibo. Based on 230 million tweets and 1.8 million user profiles in Sina Weibo, we study the impact of multimedia contents on the popularity of both users and tweets as well as tweet life span. In addition to consider the multimedia impact on popularity, we also compare the user influence …


Understanding And Rejecting Errant Touches On Multi-Touch Tablets, Ke Shu Jan 2013

Understanding And Rejecting Errant Touches On Multi-Touch Tablets, Ke Shu

Dissertations and Theses Collection (Open Access)

Given the pervasion of multi-touch tablet, pen-based applications have rapidly moved onto this new platform. Users draw both with bare fingers and using capacitive pens as they would do on paper in the past. Unlike paper, these tablets cannot distinguish legitimate finger/pen input from accidental touches by other parts of the user’s hand. In this thesis, we refer it to as errant touch rejection problem since users may unintentionally touch the screen with other parts of their hand. In this thesis, I design, implement and evaluate new approaches, bezel-focus rejection, of preventing errant touches on multi-touch tablets. I began the …


A Study Of The Imitation, Collection And Usability Issues Of Keystroke Biometrics, Chee Meng Tey Jan 2013

A Study Of The Imitation, Collection And Usability Issues Of Keystroke Biometrics, Chee Meng Tey

Dissertations and Theses Collection (Open Access)

The majority of authentication systems used today involves passwords, where a user is required to remember and key in the correct password to login. Keystroke biometrics is an alternative approach whereby users are identified by one or more features such as (a) the timing between keystrokes, (b) how long users hold each key and (c) how hard users press each key. It is being assumed in prior research that the way one user types a password/word is different from the way another user types the same password and this characteristic remains stable over time. Existing literature however left open three …