Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 3511 - 3540 of 6848

Full-Text Articles in Physical Sciences and Mathematics

On Very Large Scale Test Collection For Landmark Image Search Benchmarking, Zhiyong Cheng, Jialie Shen Jul 2016

On Very Large Scale Test Collection For Landmark Image Search Benchmarking, Zhiyong Cheng, Jialie Shen

Research Collection School Of Computing and Information Systems

High quality test collections have been becoming more and more important for the technological advancement in geo-referenced image retrieval and analytics. In this paper, we present a large scale test collection to support robust performance evaluation of landmark image search and corresponding construction methodology. Using the approach, we develop a very large scale test collection consisting of three key components: (1) 355,141 images of 128 landmarks in five cities across three continents crawled from Flickr; (2) different kinds of textual features for each image, including surrounding text (e.g. tags), contextual data (e.g. geo-location and upload time), and metadata (e.g. uploader …


Outlier Detection In Complex Categorical Data By Modeling The Feature Value Couplings, Guansong Pang, Longbing Cao, Ling Chen Jul 2016

Outlier Detection In Complex Categorical Data By Modeling The Feature Value Couplings, Guansong Pang, Longbing Cao, Ling Chen

Research Collection School Of Computing and Information Systems

This paper introduces a novel unsupervised outlier detection method, namely Coupled Biased Random Walks (CBRW), for identifying outliers in categorical data with diversified frequency distributions and many noisy features. Existing pattern-based outlier detection methods are ineffective in handling such complex scenarios, as they misfit such data. CBRW estimates outlier scores of feature values by modelling feature value level couplings, which carry intrinsic data characteristics, via biased random walks to handle this complex data. The outlier scores of feature values can either measure the outlierness of an object or facilitate the existing methods as a feature weighting and selection indicator. Substantial …


One-Round Strong Oblivious Signature-Based Envelope, Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang Jul 2016

One-Round Strong Oblivious Signature-Based Envelope, Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang

Research Collection School Of Computing and Information Systems

Oblivious Signature-Based Envelope (OSBE) has been widely employed for anonymity-orient and privacy-preserving applications. The conventional OSBE execution relies on a secure communication channel to protect against eavesdroppers. In TCC 2012, Blazy, Pointcheval and Vergnaud proposed a framework of OSBE (BPV-OSBE) without requiring any secure channel by clarifying and enhancing the OSBE security notions. They showed how to generically build an OSBE scheme satisfying the new strong security in the standard model with a common-reference string. Their framework requires 2-round interactions and relies on the smooth projective hash function (SPHF) over special languages, i.e., languages from encryption of signatures. In this …


The Impact Of Nasd Rule 2711 And Nyse Rule 472 On Analyst Behavior: The Strategic Timing Of Recommendations Issued On Weekends, Yi Dong, Nan Hu Jul 2016

The Impact Of Nasd Rule 2711 And Nyse Rule 472 On Analyst Behavior: The Strategic Timing Of Recommendations Issued On Weekends, Yi Dong, Nan Hu

Research Collection School Of Computing and Information Systems

Amendments to NASD Rule 2711 and NYSE Rule 472, enacted in May 2002, mandate that sell-side analysts disclose the distribution of their security recommendations by buy, hold and sell category. This regulation enhances the transparency of analysts' information and mitigates the long-recognized optimistic bias in their recommendations. However, we find that analysts are more likely to issue sell recommendations or downgrade revisions on weekends when investors have limited attention after these rule changes. This pattern is more pronounced for prestigious analysts, who are more likely to influence stock prices. Market reaction tests reveal an incomplete immediate response and a greater …


Real-Time Salient Object Detection With A Minimum Spanning Tree, Wei-Chih Tu, Shengfeng He, Qingxiong Yang, Shao-Yi Chien Jul 2016

Real-Time Salient Object Detection With A Minimum Spanning Tree, Wei-Chih Tu, Shengfeng He, Qingxiong Yang, Shao-Yi Chien

Research Collection School Of Computing and Information Systems

In this paper, we present a real-time salient object detection system based on the minimum spanning tree. Due to the fact that background regions are typically connected to the image boundaries, salient objects can be extracted by computing the distances to the boundaries. However, measuring the image boundary connectivity efficiently is a challenging problem. Existing methods either rely on superpixel representation to reduce the processing units or approximate the distance transform. Instead, we propose an exact and iteration free solution on a minimum spanning tree. The minimum spanning tree representation of an image inherently reveals the object geometry information in …


On Effective Personalized Music Retrieval By Exploring Online User Behaviors, Zhiyong Cheng, Jialie Shen, Steven C. H. Hoi Jul 2016

On Effective Personalized Music Retrieval By Exploring Online User Behaviors, Zhiyong Cheng, Jialie Shen, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

In this paper, we study the problem of personalized text based music retrieval which takes users’ music preferences on songs into account via the analysis of online listening behaviours and social tags. Towards the goal, a novel DualLayer Music Preference Topic Model (DL-MPTM) is proposed to construct latent music interest space and characterize the correlations among (user, song, term). Based on the DL-MPTM, we further develop an effective personalized music retrieval system. To evaluate the system’s performance, extensive experimental studies have been conducted over two test collections to compare the proposed method with the state-of-the-art music retrieval methods. The results …


Ordinal Text Quantification, Giovanni Da San Martino, Wei Gao, Fabrizio Sebastiani Jul 2016

Ordinal Text Quantification, Giovanni Da San Martino, Wei Gao, Fabrizio Sebastiani

Research Collection School Of Computing and Information Systems

In recent years there has been a growing interest in text quantification, a supervised learning task where the goal is to accurately estimate, in an unlabelled set of items, the prevalence (or "relative frequency") of each class c in a predefined set C. Text quantification has several applications, and is a dominant concern in fields such as market research, the social sciences, political science, and epidemiology. In this paper we tackle, for the first time, the problem of ordinal text quantification, defined as the task of performing text quantification when a total order is defined on the set of classes; …


Response To Sbp-Brims Data Challenge: Agent-Based Approach To Human Migration Movement, Lin Junjie, Larry, Kathleen M. Carley Jul 2016

Response To Sbp-Brims Data Challenge: Agent-Based Approach To Human Migration Movement, Lin Junjie, Larry, Kathleen M. Carley

Research Collection School Of Computing and Information Systems

In this work, we attempt to address the social question of international migration, and the resulting shifts in country populations. This is achieved through the development of a country-level agent-based dynamic network model to examine shifts in population given network relations among countries, which inuences overall population change.


Generic Anonymous Identity-Based Broadcast Encryption With Chosen-Ciphertext Security, Kai He, Jian Weng, Man Ho Au, Yijun Mao, Deng, Robert H. Jul 2016

Generic Anonymous Identity-Based Broadcast Encryption With Chosen-Ciphertext Security, Kai He, Jian Weng, Man Ho Au, Yijun Mao, Deng, Robert H.

Research Collection School Of Computing and Information Systems

In a broadcast encryption system, a broadcaster can encrypt a message to a group of authorized receivers S and each authorized receiver can use his/her own private key to correctly decrypt the broadcast ciphertext, while the users outside S cannot. Identity-based broadcast encryption (IBBE) system is a variant of broadcast encryption system where any string representing the user’s identity (e.g., email address) can be used as his/her public key. IBBE has found many applications in real life, such as pay-TV systems, distribution of copyrighted materials, satellite radio communications. When employing an IBBE system, it is very important to protect the …


A Feasible No-Root Approach On Android, Yao Cheng, Yingjiu Li, Robert H. Deng Jul 2016

A Feasible No-Root Approach On Android, Yao Cheng, Yingjiu Li, Robert H. Deng

Research Collection School Of Computing and Information Systems

Root is the administrative privilege on Android, which is however inaccessible on stock Android devices. Due to the desire for privileged functionalities and the reluctance of rooting their devices, Android users seek for no-root approaches, which provide users with part of root privileges without rooting their devices. In this paper, we newly discover a feasible no-root approach based on the ADB loopback. To ensure such no-root approach is not misused proactively, we examine its dark side, including privacy leakage via logs and user input inference. Finally, we discuss the solutions and suggestions from different perspectives.


Robust Median Reversion Strategy For Online Portfolio Selection, Dingjiang Huang, Junlong Zhou, Bin Li, Hoi, Steven C. H., Shuigeng Zhou Jul 2016

Robust Median Reversion Strategy For Online Portfolio Selection, Dingjiang Huang, Junlong Zhou, Bin Li, Hoi, Steven C. H., Shuigeng Zhou

Research Collection School Of Computing and Information Systems

On-line portfolio selection has been attracting increasing interests from artificial intelligence community in recent decades. Mean reversion, as one most frequent pattern in financial markets, plays an important role in some state-of-the-art strategies. Though successful in certain datasets, existing mean reversion strategies do not fully consider noises and outliers in the data, leading to estimation error and thus non-optimal portfolios, which results in poor performance in practice. To overcome the limitation, we propose to exploit the reversion phenomenon by robust L1-median estimator, and design a novel on-line portfolio selection strategy named "Robust Median Reversion" (RMR), which makes optimal portfolios based …


Sequential Decision Making For Improving Efficiency In Urban Environments, Pradeep Varakantham Jul 2016

Sequential Decision Making For Improving Efficiency In Urban Environments, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Rapid "urbanization" (more than 50% of world's population now resides in cities) coupled with the natural lack of coordination in usage of common resources (ex: bikes, ambulances, taxis, traffic personnel, attractions) has a detrimental effect on a wide variety of response (ex: waiting times, response time for emergency needs) and coverage metrics (ex: predictability of traffic/security patrols) in cities of today. Motivated by the need to improve response and coverage metrics in urban environments, my research group is focussed on building intelligent agent systems that make sequential decisions to continuously match available supply of resources to an uncertain demand for …


An Interference-Free Programming Model For Network Objects, Mischael Schill, Christopher M. Poskitt, Bertrand Meyer Jun 2016

An Interference-Free Programming Model For Network Objects, Mischael Schill, Christopher M. Poskitt, Bertrand Meyer

Research Collection School Of Computing and Information Systems

Network objects are a simple and natural abstraction for distributed object-oriented programming. Languages that support network objects, however, often leave synchronization to the user, along with its associated pitfalls, such as data races and the possibility of failure. In this paper, we present D-Scoop, a distributed programming model that allows for interference-free and transaction-like reasoning on (potentially multiple) network objects, with synchronization handled automatically, and network failures managed by a compensation mechanism. We achieve this by leveraging the runtime semantics of a multi-threaded object-oriented concurrency model, directly generalizing it with a message-based protocol for efficiently coordinating remote objects. We present …


User Behavior Mining In Microblogging, Tuan Anh Hoang Jun 2016

User Behavior Mining In Microblogging, Tuan Anh Hoang

Dissertations and Theses Collection (Open Access)

This dissertation addresses the modeling of factors concerning microblogging users' content and behavior. We focus on two sets of factors. The first set includes behavioral factors of users and content items driving content propagation in microblogging. The second set consists of latent topics and communities of users as the users are engaged in content generation and behavior adoptions. These two sets of factors are extremely important in many applications, e.g., network monitoring and recommender systems. In the first part of this dissertation, we identify user virality, user susceptibility, and content virality as three behavioral factors that affect users' behaviors in …


Seeking Independent Management Of Problem Behavior: A Proof-Of-Concept Study With Children And Their Teachers, Camellia Zakaria, Richard C. Davis, Zachary Walker Jun 2016

Seeking Independent Management Of Problem Behavior: A Proof-Of-Concept Study With Children And Their Teachers, Camellia Zakaria, Richard C. Davis, Zachary Walker

Research Collection School Of Computing and Information Systems

Problem behaviors are particularly common in children with neurodevelopmental disorders like Autism and Down syndrome. These behaviors sometimes discourage social inclusion, inhibit learning development, and cause severe injuries, but caregivers are often unable to attend to their children immediately when the behaviors occur. Recent research shows that problem behavior can be automatically detected with wearable devices, but it is still not clear how to reduce caregivers' burdens and facilitate academic, social, and functional development of children with problem behaviors. We conducted a field study at a school with 21 children who exhibit problem behaviors and found that they needed frequent …


Demo: Drumming Application Using Commodity Wearable Devices, Bharat Dwivedi, Archan Misra, Youngki Lee Jun 2016

Demo: Drumming Application Using Commodity Wearable Devices, Bharat Dwivedi, Archan Misra, Youngki Lee

Research Collection School Of Computing and Information Systems

We aim to develop a drumming application in which individual can play drums using multiple wearable and mobile devices. Our vision is to tap out different rythms in the air using smart watches as a virtual drum stick and smart phone would act as a drum kit. Same user interface can be visualized in smart glasses. Here, our prime target is to use multiple commodity wearable devices (non-commodity i.e. Myo arm band) and smart phones for recognizing new (or same type of here) types of multi limb gestural context and building an adaptive application interface and allow such gesture recognition …


Livelabs: Building In-Situ Mobile Sensing And Behavioural Experimentation Testbeds, Kasthuri Jayarajah, Rajesh Krishna Balan, Meera Radhakrishnan, Archan Misra, Youngki Lee Jun 2016

Livelabs: Building In-Situ Mobile Sensing And Behavioural Experimentation Testbeds, Kasthuri Jayarajah, Rajesh Krishna Balan, Meera Radhakrishnan, Archan Misra, Youngki Lee

Research Collection School Of Computing and Information Systems

In this paper, we present LiveLabs, a first-of-its-kind testbed that isdeployed across a university campus, convention centre, and resortisland and collects real-time attributes such as location, group contextetc., from hundreds of opt-in participants. These venues, data,and participants are then made available for running rich humancentricbehavioural experiments that could test new mobile sensinginfrastructure, applications, analytics, or more social-sciencetype hypotheses that influence and then observe actual user behaviour.We share case studies of how researchers from aroundthe world have and are using LiveLabs, and our experiences andlessons learned from building, maintaining, and expanding LiveLabsover the last three years.


Designing And Comparing Multiple Portfolios Of Parameter Configurations For Online Algorithm Selection, Aldy Gunawan, Hoong Chuin Lau, Mustafa Misir Jun 2016

Designing And Comparing Multiple Portfolios Of Parameter Configurations For Online Algorithm Selection, Aldy Gunawan, Hoong Chuin Lau, Mustafa Misir

Research Collection School Of Computing and Information Systems

Algorithm portfolios seek to determine an effective set of algorithms that can be used within an algorithm selection framework to solve problems. A limited number of these portfolio studies focus on generating different versions of a target algorithm using different parameter configurations. In this paper, we employ a Design of Experiments (DOE) approach to determine a promising range of values for each parameter of an algorithm. These ranges are further processed to determine a portfolio of parameter configurations, which would be used within two online Algorithm Selection approaches for solving different instances of a given combinatorial optimization problem effectively. We …


Strategic Planning For Setting Up Base Stations In Emergency Medical Systems, Supriyo Ghosh, Pradeep Varakantham Jun 2016

Strategic Planning For Setting Up Base Stations In Emergency Medical Systems, Supriyo Ghosh, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Emergency Medical Systems (EMSs) are an important component of public health-care services. Improving infrastructure for EMS and specifically the construction of base stations at the ”right” locations to reduce response times is the main focus of this paper. This is a computationally challenging task because of the: (a) exponentially large action space arising from having to consider combinations of potential base locations, which themselves can be significant; and (b) direct impact on the performance of the ambulance allocation problem, where we decide allocation of ambulances to bases. We present an incremental greedy approach to discover the placement of bases that …


The Frustrations And Benefits Of Mobile Device Usage In The Home When Co-Present With Family Members, Erick Oduor, Carman Neustaedter, William Odom, Anthony Tang, Niala Moallem, Melanie Tory, Pourang Irani Jun 2016

The Frustrations And Benefits Of Mobile Device Usage In The Home When Co-Present With Family Members, Erick Oduor, Carman Neustaedter, William Odom, Anthony Tang, Niala Moallem, Melanie Tory, Pourang Irani

Research Collection School Of Computing and Information Systems

Mobile devices have begun to raise questions around the potential for overuse when in the presence of family or friends. As such, we conducted a diary and interview study to understand how people use mobile devices in the presence of others at home, and how this shapes their behavior and household dynamics. Results show that family members become frustrated when others do non-urgent activities on their phones in the presence of others. Yet people often guess at what others are doing because of the personal nature of mobile devices. In some cases, people developed strategies to provide a greater sense …


Qcri At Semeval-2016 Task 4: Probabilistic Methods For Binary And Ordinal Quantification, Giovanni Da San Martino, Wei Gao, Fabrizio Sebastiani Jun 2016

Qcri At Semeval-2016 Task 4: Probabilistic Methods For Binary And Ordinal Quantification, Giovanni Da San Martino, Wei Gao, Fabrizio Sebastiani

Research Collection School Of Computing and Information Systems

. (2016). n. In , pages 58—63, San Diego, California, USA. Association for Computational Linguistics. (1st place in sub-task E of Sentiment Analysis in Twitter)


Poster: Sonicnect: Accurate Hands-Free Gesture Input System With Smart Acoustic Sensing, Maotian Chang, Ping Li, Panlong Yang, Jie Xiong, Chang Tian Jun 2016

Poster: Sonicnect: Accurate Hands-Free Gesture Input System With Smart Acoustic Sensing, Maotian Chang, Ping Li, Panlong Yang, Jie Xiong, Chang Tian

Research Collection School Of Computing and Information Systems

This work presents Sonicnect, an acoustic sensing system with smartphone that enables accurate hands-free gesture input. Sonicnect leverages the embedded microphone in the smartphone to capture the subtle audio signals generated with fingers touching on the table. It supports 9 commonly used gestures (click, flip, scroll and zoom, etc) with above 92% recognition accuracy, and the minimum gesture movement could be 2cm. Distinguishable features are then extracted by exploiting spatio-temporal and frequency properties of the subtle audio signals. We conduct extensive real environment experiments to evaluate its performance. The results validate the effectiveness and robustness of Sonicnect.


Dual Formulations For Optimizing Dec-Pomdp Controllers, Akshat Kumar, Hala Mostafa, Shlomo Zilberstein Jun 2016

Dual Formulations For Optimizing Dec-Pomdp Controllers, Akshat Kumar, Hala Mostafa, Shlomo Zilberstein

Research Collection School Of Computing and Information Systems

Decentralized POMDP is an expressive model for multi-agent planning. Finite-state controllers (FSCs)---often used to represent policies for infinite-horizon problems---offer a compact, simple-to-execute policy representation. We exploit novel connections between optimizing decentralized FSCs and the dual linear program for MDPs. Consequently, we describe a dual mixed integer linear program (MIP) for optimizing deterministic FSCs. We exploit the Dec-POMDP structure to devise a compact MIP and formulate constraints that result in policies executable in partially-observable decentralized settings. We show analytically that the dual formulation can also be exploited within the expectation maximization (EM) framework to optimize stochastic FSCs. The resulting EM algorithm …


Learning Natural Language Inference With Lstm, Shuohang Wang, Jing Jiang Jun 2016

Learning Natural Language Inference With Lstm, Shuohang Wang, Jing Jiang

Research Collection School Of Computing and Information Systems

Natural language inference (NLI) is a fundamentally important task in natural language processing that has many applications. The recently released Stanford Natural Language Inference (SNLI) corpus has made it possible to develop and evaluate learning-centered methods such as deep neural networks for natural language inference (NLI). In this paper, we propose a special long short-term memory (LSTM) architecture for NLI. Our model builds on top of a recently proposed neural attention model for NLI but is based on a significantly different idea. Instead of deriving sentence embeddings for the premise and the hypothesis to be used for classification, our solution …


Efficient Multi-Class Selective Sampling On Graphs, Peng Yang, Peilin Zhao, Zhen Hai, Wei Liu, Hoi, Steven C. H., Xiao-Li Li Jun 2016

Efficient Multi-Class Selective Sampling On Graphs, Peng Yang, Peilin Zhao, Zhen Hai, Wei Liu, Hoi, Steven C. H., Xiao-Li Li

Research Collection School Of Computing and Information Systems

A graph-based multi-class classification problem is typically converted into a collection of binary classification tasks via the one-vs.-all strategy, and then tackled by applying proper binary classification algorithms. Unlike the one-vs.-all strategy, we suggest a unified framework which operates directly on the multi-class problem without reducing it to a collection of binary tasks. Moreover, this framework makes active learning practically feasible for multi-class problems, while the one-vs.-all strategy cannot. Specifically, we employ a novel randomized query technique to prioritize the informative instances. This query technique based on the hybrid criterion of "margin" and "uncertainty" can achieve a comparable mistake bound …


Condensing Class Diagrams With Minimal Manual Labeling Cost, Xinli Yang, David Lo, Xin Xia, Jianling Sun Jun 2016

Condensing Class Diagrams With Minimal Manual Labeling Cost, Xinli Yang, David Lo, Xin Xia, Jianling Sun

Research Collection School Of Computing and Information Systems

Traditionally, to better understand the design of a project, developers can reconstruct a class diagram from source code using a reverse engineering technique. However, the raw diagram is often perplexing because there are too many classes in it. Condensing the reverse engineered class diagram into a compact class diagram which contains only the important classes would enhance the understandability of the corresponding project. A number of recent works have proposed several supervised machine learning solutions that can be used for condensing reverse engineered class diagrams given a set of classes that are manually labeled as important or not. However, a …


Mobipot: Understanding Mobile Telephony Threats With Honeycards, Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad Jun 2016

Mobipot: Understanding Mobile Telephony Threats With Honeycards, Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad

Research Collection School Of Computing and Information Systems

Over the past decade, the number of mobile phones has increased dramatically, overtaking the world population in October 2014. In developing countries like India and China, mobile subscribers outnumber traditional landline users and account for over 90% of the active population. At the same time, convergence of telephony with the Internet with technologies like VoIP makes it possible to reach a large number of telephone users at a low or no cost via voice calls or SMS (short message service) messages. As a consequence, cybercriminals are abusing the telephony channel to launch attacks, e.g., scams that offer fraudulent services and …


Poster: Improving Communication And Communicability With Smarter Use Of Text-Based Messages On Mobile And Wearable Devices, Kenny T. W. Choo Jun 2016

Poster: Improving Communication And Communicability With Smarter Use Of Text-Based Messages On Mobile And Wearable Devices, Kenny T. W. Choo

Research Collection School Of Computing and Information Systems

While smartphones have undoubtedly afforded many modern conveniences such as emails, instant messaging or web search, the notifications from smartphones conversely impact our lives through a deluge of information, or stress arising from expectations that we should turn our immediate attention to them (e.g., work emails). In my latest research, we find that the glanceability of smartwatches may provide an opportunity to reduce the perceived disruption from mobile notifications. Text is a common medium for communication in smart devices, the application of natural language processing on text, together with the physical affordances of smartwatches, present exciting opportunities for research to …


Poster: Air Quality Friendly Route Recommendation System, Savina Singla, Divya Bansal, Archan Misra Jun 2016

Poster: Air Quality Friendly Route Recommendation System, Savina Singla, Divya Bansal, Archan Misra

Research Collection School Of Computing and Information Systems

To model the overall personal inhalation of hazardous gases through the air (both indoor and outdoor) by an individual, provide air quality friendly route recommendations, thus raising the overall quality of urban movement and living healthy life.


Demo: Smartwatch Based Shopping Gesture Recognition, Meeralakshmi Radhakrishnan, Sharanya Eswaran, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Krishna Balan Jun 2016

Demo: Smartwatch Based Shopping Gesture Recognition, Meeralakshmi Radhakrishnan, Sharanya Eswaran, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

In the current retail segment, the retail store owners are keen to understand the browsing behavior and purchase pattern of the shoppers inside the physical stores. Profiling the behavior of the shopper is key to success for any marketing strategies that can optimize or personalize shopping-related services in real-time. We envision that exploiting the knowledge of real-time behavior of shopper’s in-store activities enables novel applications such as: (a) targeted advertising or recommendations: based on longer term shopper profiles, (b) proactive retail help to assist the shoppers who are confused in choosing between two items, (c) smart reminders that can remind …