Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2008

Discipline
Keyword
Publication

Articles 151 - 161 of 161

Full-Text Articles in Physical Sciences and Mathematics

Multi-Echelon Repairable Item Inventory System With Limited Repair Capacity Under Nonstationary Demands, Hoong Chuin Lau, Huawei Song Jan 2008

Multi-Echelon Repairable Item Inventory System With Limited Repair Capacity Under Nonstationary Demands, Hoong Chuin Lau, Huawei Song

Research Collection School Of Computing and Information Systems

Classical multi-echelon repairable item inventory models are based either on steady-state analysis or infinite repair capacity, which may not work well in situations when the demand is nonstationary, or repair capacity is limited. In this paper, we propose an analytical model for evaluating system performance that works well under limited repair capacity and nonstationary demands. Following the METRIC methodology, we then develop an optimisation algorithm to solve the corrective maintenance problem in military logistics. Experimental results show that our approach yields good solutions efficiently. This work has also resulted in a software that has been field-tested by a military organisation.


Benford And Your Taxes, Manoj Thulasidas Jan 2008

Benford And Your Taxes, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

Nothing is certain but death and taxes, they say. On the death front, we are making some inroads with all our medical marvels, at least in postponing it if not actually avoiding it. But when it comes to taxes, we have no defense other than a bit of creativity in our tax returns.


Probabilistic Sales Forecasting For Small And Medium-Size Business Operations, Randall E. Duran Jan 2008

Probabilistic Sales Forecasting For Small And Medium-Size Business Operations, Randall E. Duran

Research Collection School Of Computing and Information Systems

One of the most important aspects of operating a business is the forecasting of sales and allocation of resources to fulfill sales. Sales assessments are usually based on mental models that are not well defined, may be biased, and are difficult to refine and improve over time. Defining sales forecasting models for small- and medium-size business operations is especially difficult when the number of sales events is small but the revenue per sales event is large. This chapter reviews the challenges of sales forecasting in this environment and describes how incomplete and potentially suspect information can be used to produce …


Document Selection For Extracting Entity And Relationship Instances Of Terrorist Events, Zhen Sun, Ee Peng Lim, Kuiyu Chang, Maggy Anastasia Suryanto, Rohan Kumar Gunaratna Jan 2008

Document Selection For Extracting Entity And Relationship Instances Of Terrorist Events, Zhen Sun, Ee Peng Lim, Kuiyu Chang, Maggy Anastasia Suryanto, Rohan Kumar Gunaratna

Research Collection School Of Computing and Information Systems

In this chapter, we study the problem of selecting documents so as to extract terrorist event information from a collection of documents. We represent an event by its entity and relation instances. Very often, these entity and relation instances have to be extracted from multiple documents. We therefore define an information extraction (IE) task as selecting documents and extracting from which entity and relation instances relevant to a user-specified event (aka domain specific event entity and relation extraction). We adopt domain specific IE patterns to extract potentially relevant entity and relation instances from documents, and develop a number of document …


Private Query On Encrypted Data In Multi-User Setting, Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang Jan 2008

Private Query On Encrypted Data In Multi-User Setting, Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang

Research Collection School Of Computing and Information Systems

Searchable encryption schemes allow users to perform keyword based searches on an encrypted database. Almost all existing such schemes only consider the scenario where a single user acts as both the data owner and the querier. However, most databases in practice do not just serve one user; instead, they support search and write operations by multiple users. In this paper, we systematically study searchable encryption in a practical multi-user setting. Our results include a set of security notions for multi-user searchable encryption as well as a construction which is provably secure under the newly introduced security notions.


Enhancing Recursive Supervised Learning Using Clustering And Combinatorial Optimization (Rsl-Cc), Kiruthika Ramanathan, Sheng Uei Guan Jan 2008

Enhancing Recursive Supervised Learning Using Clustering And Combinatorial Optimization (Rsl-Cc), Kiruthika Ramanathan, Sheng Uei Guan

Research Collection School Of Computing and Information Systems

The use of a team of weak learners to learn a dataset has been shown better than the use of one single strong learner. In fact, the idea is so successful that boosting, an algorithm combining several weak learners for supervised learning, has been considered to be one of the best off-the-shelf classifiers. However, some problems still remain, including determining the optimal number of weak learners and the overfitting of data. In an earlier work, we developed the RPHP algorithm which solves both these problems by using a combination of genetic algorithm, weak learner and pattern distributor. In this paper, …


Columbia University/Vireo-Cityu/Irit Trecvid2008 High-Level Feature Extraction And Interactive Video Search, Shih-Fu Chang, Junfeng He, Yu-Gang Jiang, Elie El Khoury, Chong-Wah Ngo, Akira Yanagawa, Eric Zavesky Jan 2008

Columbia University/Vireo-Cityu/Irit Trecvid2008 High-Level Feature Extraction And Interactive Video Search, Shih-Fu Chang, Junfeng He, Yu-Gang Jiang, Elie El Khoury, Chong-Wah Ngo, Akira Yanagawa, Eric Zavesky

Research Collection School Of Computing and Information Systems

In this report, we present overview and comparative analysis of our HLF detection system, which achieves the top performance among all type-A submissions in 2008. We also describe preliminary evaluation of our video search system, CuZero, in the interactive search task.


The Oil Drilling Model And Iterative Deepening Genetic Annealing Algorithm For The Traveling Salesman Problem, Hoong Chuin Lau, Fei Xiao Jan 2008

The Oil Drilling Model And Iterative Deepening Genetic Annealing Algorithm For The Traveling Salesman Problem, Hoong Chuin Lau, Fei Xiao

Research Collection School Of Computing and Information Systems

In this work, we liken the solving of combinatorial optimization problems under a prescribed computational budget as hunting for oil in an unexplored ground. Using this generic model, we instantiate an iterative deepening genetic annealing (IDGA) algorithm, which is a variant of memetic algorithms. Computational results on the traveling salesman problem show that IDGA is more effective than standard genetic algorithms or simulated annealing algorithms or a straightforward hybrid of them. Our model is readily applicable to solve other combinatorial optimization problems.


A Growth-Theoretic Empirical Analysis Of Simultaneity In Cross-National E-Commerce Development, Shu-Chun Ho, Robert J. Kauffman, Ting-Peng Liang Jan 2008

A Growth-Theoretic Empirical Analysis Of Simultaneity In Cross-National E-Commerce Development, Shu-Chun Ho, Robert J. Kauffman, Ting-Peng Liang

Research Collection School Of Computing and Information Systems

The emergence of information and communication technologies infrastructure has transformed the global economy. The development of information technology infrastructure is limited to some developed countries though. This research explores the role of information technology infrastructure in B2C e-commerce growth at the country-level from the perspective of growth theory in economics. We propose a hybrid exogenous and endogenous growth model to explain e-commerce growth. We estimate a panel data model that incorporates the direct effects of e-commerce infrastructure and other key explanatory variables. We further specify a simultaneous effects model that permits the analysis of reverse causality in the association between …


Concept Detection: Convergence To Local Features And Opportunities Beyond, Shih-Fu Chang, Junfeng He, Yu-Gang Jiang, Elie El Khoury, Chong-Wah Ngo, Akira Yanagawa, Eric Zavesky Jan 2008

Concept Detection: Convergence To Local Features And Opportunities Beyond, Shih-Fu Chang, Junfeng He, Yu-Gang Jiang, Elie El Khoury, Chong-Wah Ngo, Akira Yanagawa, Eric Zavesky

Research Collection School Of Computing and Information Systems

No abstract provided.


Collective Outsourcing To Market (Com): A Market-Based Framework For Information Supply Chain Outsourcing, Fang Fang, Zhiling Guo, Andrew B. Whinston Jan 2008

Collective Outsourcing To Market (Com): A Market-Based Framework For Information Supply Chain Outsourcing, Fang Fang, Zhiling Guo, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper discusses the importance of and a solution to separating the information flow from the physical product flow in a supply chain. Motivated by the inefficient demand forecast caused by information asymmetry and lack of an incentive among supply chain partners to share valuable information, we propose a radically new framework called collective outsourcing to market (COM) to address many information supply chain design challenges. To validate the COM framework, we consider a supply chain with one manufacturer and multiple downstream retailers. Retailers privately acquire demand forecast information that they do not have incentive to share horizontally with other …