Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (6653)
- Databases and Information Systems (2820)
- Software Engineering (1646)
- Artificial Intelligence and Robotics (983)
- Numerical Analysis and Scientific Computing (934)
-
- Information Security (882)
- Engineering (785)
- Social and Behavioral Sciences (736)
- Business (640)
- Graphics and Human Computer Interfaces (598)
- Theory and Algorithms (412)
- Computer Engineering (406)
- Operations Research, Systems Engineering and Industrial Engineering (363)
- Communication (290)
- OS and Networks (267)
- Programming Languages and Compilers (267)
- Social Media (236)
- Public Affairs, Public Policy and Public Administration (194)
- Data Storage Systems (163)
- Medicine and Health Sciences (161)
- Environmental Sciences (156)
- Transportation (156)
- Management Information Systems (148)
- International and Area Studies (147)
- Asian Studies (145)
- Education (132)
- Technology and Innovation (120)
- E-Commerce (115)
- Finance and Financial Management (89)
- Keyword
-
- Machine learning (102)
- Deep learning (100)
- Artificial intelligence (74)
- Singapore (73)
- Social media (66)
-
- Data mining (60)
- Cloud computing (57)
- Optimization (51)
- Reinforcement learning (51)
- Security (50)
- Twitter (49)
- Online learning (48)
- Privacy (47)
- Visualization (44)
- Neural networks (43)
- Access control (41)
- Algorithms (40)
- Deep Learning (40)
- Feature extraction (40)
- Empirical study (39)
- Classification (37)
- Sustainability (37)
- Semantics (36)
- Software engineering (36)
- Task analysis (36)
- Android (34)
- Clustering (34)
- Anomaly detection (32)
- Blockchain (32)
- Authentication (31)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6356)
- Dissertations and Theses Collection (Open Access) (106)
- Research Collection Lee Kong Chian School Of Business (90)
- Research Collection School of Social Sciences (47)
- Perspectives@SMU (38)
-
- Asian Management Insights (34)
- Research Collection College of Integrative Studies (31)
- Research Collection Yong Pung How School Of Law (29)
- Research Collection School Of Economics (22)
- Research Collection School Of Accountancy (21)
- Dissertations and Theses Collection (15)
- MITB Thought Leadership Series (11)
- SMU Press Releases (11)
- Research@SMU: Connecting the Dots (10)
- Research Collection School of Computing and Information Systems (9)
- LARC Research Publications (7)
- Social Space (5)
- Research Collection Library (4)
- SMU Research Data (4)
- Centre for Computational Law (3)
- Sim Kee Boon Institute for Financial Economics (3)
- CMP Research (2)
- Centre for AI & Data Governance (2)
- Research Collection Office of Research (2)
- Library Events (1)
- Oral History Collection (1)
- ROSA Journal Articles and Publications (1)
- Research Collection School of Accountancy (1)
- Research@SMU Infographics (1)
- Publication Type
- File Type
Articles 4321 - 4350 of 6867
Full-Text Articles in Physical Sciences and Mathematics
An Air Index For Spatial Query Processing In Road Networks, Weiwei Sun, Chunan Chen, Baihua Zheng, Chong Chen, Peng Liu
An Air Index For Spatial Query Processing In Road Networks, Weiwei Sun, Chunan Chen, Baihua Zheng, Chong Chen, Peng Liu
Research Collection School Of Computing and Information Systems
Spatial queries such as range query and kNN query in road networks have received a growing number of attention in real life. Considering the large population of the users and the high overhead of network distance computation, it is extremely important to guarantee the efficiency and scalability of query processing. Motivated by the scalable and secure properties of wireless broadcast model, this paper presents an air index called Network Partition Index (NPI) to support efficient spatial query processing in road networks via wireless broadcast. The main idea is to partition the road network into a number of regions and then …
Recommendation Support For Multi-Attribute Databases, Jilian Zhang
Recommendation Support For Multi-Attribute Databases, Jilian Zhang
Dissertations and Theses Collection (Open Access)
This dissertation studies the subject of providing recommendation support for multi-attribute databases. Recommendation is an important and very useful information evaluation mechanism that explores a database of huge volume, and retrieves from it the interesting data items (tuples) for users based on their preferences.
Ranking-Based Approaches For Localizing Faults, Lucia Lucia
Ranking-Based Approaches For Localizing Faults, Lucia Lucia
Dissertations and Theses Collection (Open Access)
A fault is the root cause of program failures where a program behaves differently from the intended behavior. Finding or localizing faults is often laborious (especially so for complex programs), yet it is an important task in the software lifecycle. An automated technique that can accurately and quickly identify the faulty code is greatly needed to alleviate the costs of software debugging. Many fault localization techniques assume that faults are localizable, i.e., each fault manifests only in a single or a few lines of code that are close to one another. To verify this assumption, we study how faults spread …
Air Indexing For On-Demand Xml Data Broadcast, Weiwei Sun, Rongrui Qin, Jinjin Wu, Baihua Zheng
Air Indexing For On-Demand Xml Data Broadcast, Weiwei Sun, Rongrui Qin, Jinjin Wu, Baihua Zheng
Research Collection School Of Computing and Information Systems
XML data broadcast is an efficient way to disseminate semi-structured information in wireless mobile environments. In this paper, we propose a novel two-tier index structure to facilitate the access of XML document in an on-demand broadcast system. It provides the clients with an overall image of all the XML documents available at the server side and hence enables the clients to locate complete result sets accordingly. A pruning strategy is developed to cut down the index size and a two-tier structure is proposed to further remove any redundant information. In addition, two index distribution strategies, namely naive distribution and partial …
Evolving An Information Systems Capstone Course To Align With The Fast Changing Singapore Marketplace, Chris Boesch, Benjamin Kok Siew Gan
Evolving An Information Systems Capstone Course To Align With The Fast Changing Singapore Marketplace, Chris Boesch, Benjamin Kok Siew Gan
Research Collection School Of Computing and Information Systems
Every year, around fifty-five undergraduate teams of four to six students are required to complete a capstone course for the School of Information Systems at Singapore Management University. Each team spends approximately five months working with an industry sponsor using the latest tools and techniques. Students actively learn by implementing the system to solve a real world problem. In addition to delivering value to the local sponsor, our students learn specialized skills currently needed in the marketplace, which might not yet be incorporated into electives and core courses. In this paper, we discuss the tradeoffs of providing students and project …
Cross-Language Bug Localization, Xin Xia, David Lo, Xingen Wang, Chenyi Zhang, Xinyu Wang
Cross-Language Bug Localization, Xin Xia, David Lo, Xingen Wang, Chenyi Zhang, Xinyu Wang
Research Collection School Of Computing and Information Systems
Bug localization refers to the process of identifying source code files that contain defects from textual descriptions in bug reports. Existing bug localization techniques work on the assumption that bug reports, and identifiers and comments in source code files, are written in the same language (i.e., English). However, software users from non-English speaking countries (e.g., China) often use their native languages (e.g., Chinese) to write bug reports. For this setting, existing studies on bug localization would not work as the terms that appear in the bug reports do not appear in the source code. We refer to this problem as …
Revisiting Risk-Sensitive Mdps: New Algorithms And Results, Ping Hou, William Yeoh, Pradeep Reddy Varakantham
Revisiting Risk-Sensitive Mdps: New Algorithms And Results, Ping Hou, William Yeoh, Pradeep Reddy Varakantham
Research Collection School Of Computing and Information Systems
While Markov Decision Processes (MDPs) have been shown to be effective models for planning under uncertainty, theobjective to minimize the expected cumulative cost is inappropriate for high-stake planning problems. As such, Yu, Lin, and Yan (1998) introduced the Risk-Sensitive MDP (RSMDP) model, where the objective is to find a policy that maximizes the probability that the cumulative cost is within some user-defined cost threshold. In this paper, we revisit this problem and introduce new algorithms that are based on classical techniques, such as depth-first search and dynamic programming, and a recently introduced technique called Topological Value Iteration (TVI). We demonstrate …
Online Community Transition Detection, Biying Tan, Feida Zhu, Qiang Qu, Siyuan Liu
Online Community Transition Detection, Biying Tan, Feida Zhu, Qiang Qu, Siyuan Liu
Research Collection School Of Computing and Information Systems
Mining user behavior patterns in social networks is of great importance in user behavior analysis, targeted marketing, churn prediction and other applications. However, less effort has been made to study the evolution of user behavior in social communities. In particular, users join and leave communities over time. How to automatically detect the online community transitions of individual users is a research problem of immense practical value yet with great technical challenges. In this paper, we propose an algorithm based on the Minimum Description Length (MDL) principle to trace the evolution of community transition of individual users, adaptive to the noisy …
Paths Of Influence For Innovations In Financial Is And Technology Ecosystems, Jun Liu, Robert John Kauffman, Dan Ma
Paths Of Influence For Innovations In Financial Is And Technology Ecosystems, Jun Liu, Robert John Kauffman, Dan Ma
Research Collection School Of Computing and Information Systems
Predicting technological innovations in financial information systems (IS) and technology ecosystems has been challenging for technology forecasters and industry analysts due to their underlying complexity. Technology-based financial innovations over the past four decades, such as programmed trading in the 1980s, risk-adjusted return on capital-based financial risk management systems in the 1990s, high-frequency trading and Internet banking in 2000s, and now mobile payments in the 2010s, have all led to transformations in the financial services industry. What basis can be identified to predict such new innovations? And what areas of financial services will they affect? This study applies the technology ecosystem …
Fully Secure Key-Policy Attribute-Based Encryption With Constant-Size Ciphertexts And Fast Decryption, Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng
Fully Secure Key-Policy Attribute-Based Encryption With Constant-Size Ciphertexts And Fast Decryption, Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng
Research Collection School Of Computing and Information Systems
Attribute-based encryption (ABE), introduced by Sahai and Waters, is a promising cryptographic primitive, which has been widely applied to implement fine-grained access control system for encrypted data. In its key-policy flavor, attribute sets are used to annotate ciphertexts and secret keys are associated with access structures that specify which ciphertexts a user is entitled to decrypt. In most existing key-policy attribute-based encryption (KP-ABE) constructions, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption cost is proportional to the number of attributes used during decryption. In this paper, we present a new …
Scc-Based Improved Reachability Analysis For Markov Decision Processes, Lin Gui, Jun Sun, Songzheng Song, Yang Liu, Jin Song Dong
Scc-Based Improved Reachability Analysis For Markov Decision Processes, Lin Gui, Jun Sun, Songzheng Song, Yang Liu, Jin Song Dong
Research Collection School Of Computing and Information Systems
Markov decision processes (MDPs) are extensively used to model systems with both probabilistic and nondeterministic behavior. The problem of calculating the probability of reaching certain system states (hereafter reachability analysis) is central to the MDP-based system analysis. It is known that existing approaches on reachability analysis for MDPs are often inefficient when a given MDP contains a large number of states and loops, especially with the existence of multiple probability distributions. In this work, we propose a method to eliminate strongly connected components (SCCs) in an MDP using a divide-and-conquer algorithm, and actively remove redundant probability distributions in the MDP …
Practical Analysis Framework For Software-Based Attestation Scheme, Li Li, Hong Hu, Jun Sun, Yang Liu, Dong Jin Song
Practical Analysis Framework For Software-Based Attestation Scheme, Li Li, Hong Hu, Jun Sun, Yang Liu, Dong Jin Song
Research Collection School Of Computing and Information Systems
An increasing number of ”smart” embedded devices are employed in our living environment nowadays. Unlike traditional computer systems, these devices are often physically accessible to the attackers. It is therefore almost impossible to guarantee that they are un-compromised, i.e., that indeed the devices are executing the intended software. In such a context, software-based attestation is deemed as a promising solution to validate their software integrity. It guarantees that the software running on the embedded devices are un-compromised without any hardware support. However, designing software-based attestation protocols are shown to be error-prone. In this work, we develop a framework for design …
Tauth: Verifying Timed Security Protocols, Li Li, Jun Sun, Yang Liu, Jin Song Dong
Tauth: Verifying Timed Security Protocols, Li Li, Jun Sun, Yang Liu, Jin Song Dong
Research Collection School Of Computing and Information Systems
Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification with an unbounded number of sessions. The partial soundness and completeness of our verification algorithms are formally defined and proved. We implement our method into a tool called TAuth and the experiment results show that our approach is efficient and effective in both finding …
A Hybrid Model Of Connectors In Cyber-Physical Systems, Xiaohong Chen, Jun Sun, Meng Sun Sun
A Hybrid Model Of Connectors In Cyber-Physical Systems, Xiaohong Chen, Jun Sun, Meng Sun Sun
Research Collection School Of Computing and Information Systems
Compositional coordination models and languages play an important role in cyber-physical systems (CPSs). In this paper, we introduce a formal model for describing hybrid behaviors of connectors in CPSs. We extend the constraint automata model, which is used as the semantic model for the exogenous channel-based coordination language Reo, to capture the dynamic behavior of connectors in CPSs where the discrete and continuous dynamics co-exist and interact with each other. In addition to the formalism, we also provide a theoretical compositional approach for constructing the product automata for a Reo circuit, which is typically obtained by composing several primitive connectors …
Gpu Accelerated Counterexample Generation In Ltl Model Checking, Zhimin Wu, Yang Liu, Yun Liang, Jun Sun
Gpu Accelerated Counterexample Generation In Ltl Model Checking, Zhimin Wu, Yang Liu, Yun Liang, Jun Sun
Research Collection School Of Computing and Information Systems
Strongly Connected Component (SCC) based searching is one of the most popular LTL model checking algorithms. When the SCCs are huge, the counterexample generation process can be time-consuming, especially when dealing with fairness assumptions. In this work, we propose a GPU accelerated counterexample generation algorithm, which improves the performance by parallelizing the Breadth First Search (BFS) used in the counterexample generation. BFS work is irregular, which means it is hard to allocate resources and may suffer from imbalanced load. We make use of the features of latest CUDA Compute Architecture-NVIDIA Kepler GK110 to achieve the dynamic parallelism and memory hierarchy …
Learning Directional Co-Occurrence For Human Action Classification, Hong Liu, Mengyuan Liu, Qianru Sun
Learning Directional Co-Occurrence For Human Action Classification, Hong Liu, Mengyuan Liu, Qianru Sun
Research Collection School Of Computing and Information Systems
Spatio-temporal interest point (STIP) based methods have shown promising results for human action classification. However, state-of-art works typically utilize bag-of-visual words (BoVW), which focuses on the statistical distribution of features but ignores their inherent structural relationships. To solve this problem, a descriptor, namely directional pair-wise feature (DPF), is proposed to encode the mutual direction information between pairwise words, aiming at adding more spatial discriminant to BoVW. Firstly, STIP features are extracted and classified into a set of labeled words. Then in each frame, the DPF is constructed for every pair of words with different labels, according to their assigned directional …
Lifi: Line-Of-Sight Identification With Wifi, Zimu Zhou, Zheng Yang, Chenshu Wu, Wei Sun, Yunhao Liu
Lifi: Line-Of-Sight Identification With Wifi, Zimu Zhou, Zheng Yang, Chenshu Wu, Wei Sun, Yunhao Liu
Research Collection School Of Computing and Information Systems
Wireless LANs, especially WiFi, have been pervasively deployed and have fostered myriad wireless communication services and ubiquitous computing applications. A primary concern in designing each scenario-tailored application is to combat harsh indoor propagation environments, particularly Non-LineOf-Sight (NLOS) propagation. The ability to distinguish LineOf-Sight (LOS) path from NLOS paths acts as a key enabler for adaptive communication, cognitive radios, robust localization, etc. Enabling such capability on commodity WiFi infrastructure, however, is prohibitive due to the coarse multipath resolution with mere MAC layer RSSI. In this work, we dive into the PHY layer and strive to eliminate irrelevant noise and NLOS paths …
The Case For Open Source Software, Singapore Management University
The Case For Open Source Software, Singapore Management University
Perspectives@SMU
You use it more often than you are aware, and you can even use it to get a job
Supporting Non-Verbal Visual Communication In Online Group Art Therapy, Brennan Jones, Kate Collie, Sara Prins Hankinson, Anthony Tang
Supporting Non-Verbal Visual Communication In Online Group Art Therapy, Brennan Jones, Kate Collie, Sara Prins Hankinson, Anthony Tang
Research Collection School Of Computing and Information Systems
Art therapy provides therapeutic benefit to people suffering from chronic pain, and recent work has explored supporting art therapy through online tools such as chat forums and discussion boards. These tools give people the benefit of engaging in art therapy without the burden of having to leave one’s home (when transportation may be a challenge), and allowing people to reveal their identities through dialogue and activity rather than through one’s appearance. However, these tools also do not provide much opportunity for collaboration and shared art making. Because group members are not aware of each other’s actions and non-verbal cues in …
Detecting Anomaly Collections Using Extreme Feature Ranks, Hanbo Dai, Feida Zhu, Ee Peng Lim, Hwee Hwa Pang
Detecting Anomaly Collections Using Extreme Feature Ranks, Hanbo Dai, Feida Zhu, Ee Peng Lim, Hwee Hwa Pang
Research Collection School Of Computing and Information Systems
Detecting anomaly collections is an important task with many applications, including spam and fraud detection. In an anomaly collection, entities often operate in collusion and hold different agendas to normal entities. As a result, they usually manifest collective extreme traits, i.e., members of an anomaly collection are consistently clustered toward the top or bottom ranks on certain features. We therefore propose to detect these anomaly collections by extreme feature ranks. We introduce a novel anomaly definition called Extreme Rank Anomalous Collection or ERAC. We propose a new measure of anomalousness capturing collective extreme traits based on a statistical model. As …
Technique For Authenticating H.264/Svc And Its Performance Evaluation Over Wireless Mobile Networks, Yifan Zhao, Swee Won Lo, Robert H. Deng, Xuhua Ding
Technique For Authenticating H.264/Svc And Its Performance Evaluation Over Wireless Mobile Networks, Yifan Zhao, Swee Won Lo, Robert H. Deng, Xuhua Ding
Research Collection School Of Computing and Information Systems
In this paper, a bit stream-based authentication scheme for H.264/Scalable Video Coding (SVC) is proposed. The proposed scheme seamlessly integrates cryptographic algorithms and Erasure Correction Codes (ECCs) to SVC video streams such that the authenti- cated streams are format compliant with the SVC specifications and preserve the three- dimensional scalability (i.e., spatial, quality and temporal) of the original streams. We implement our scheme on a smart phone and study its performance over a realistic bursty packet-lossy wireless mobile network. Our analysis and experimental results show that the scheme achieves very high verification rates with lower communication overhead and much smaller …
Decentralized Multi-Agent Reinforcement Learning In Average-Reward Dynamic Dcops, Duc Thien Nguyen, William Yeoh, Hoong Chuin Lau, Shlomo Zilberstein
Decentralized Multi-Agent Reinforcement Learning In Average-Reward Dynamic Dcops, Duc Thien Nguyen, William Yeoh, Hoong Chuin Lau, Shlomo Zilberstein
Research Collection School Of Computing and Information Systems
Researchers have introduced the Dynamic Distributed Constraint Optimization Problem (Dynamic DCOP) formulation to model dynamically changing multi-agent coordination problems, where a dynamic DCOP is a sequence of (static canonical) DCOPs, each partially different from the DCOP preceding it. Existing work typically assumes that the problem in each time step is decoupled from the problems in other time steps, which might not hold in some applications. Therefore, in this paper, we make the following contributions: (i) We introduce a new model, called Markovian Dynamic DCOPs (MD-DCOPs), where the DCOP in the next time step is a function of the value assignments …
Physio@Home: Design Explorations To Support Movement Guidance, Richard Tang, Hesam Alizadeh, Anthony Tang, Scott Bateman, Joaquim A.P. Jorge
Physio@Home: Design Explorations To Support Movement Guidance, Richard Tang, Hesam Alizadeh, Anthony Tang, Scott Bateman, Joaquim A.P. Jorge
Research Collection School Of Computing and Information Systems
Patients typically undergo physiotherapy with the help of a physiotherapist who teaches, guides, and corrects the patients as they perform exercises. It would be nice if people could repeat these exercises at home, potentially improving their recovery rate. However, without guidance and/or corrective feedback from a physiotherapist, the patient will not know whether they are doing their exercises correctly. To address this problem, we implemented a prototype that guides patients through pre-recorded exercise movements using visual guides overlaid atop a mirror-view of the patient on a wall-mounted display. We conducted informal evaluations and pilot studies to assess our prototype and …
Exploring Video Streaming In Public Settings: Shared Geocaching Over Distance Using Mobile Video Chat, Jason Procyk, Carman Neustaedter, Carolyn Pang, Anthony Tang, Tejinder K. Judge
Exploring Video Streaming In Public Settings: Shared Geocaching Over Distance Using Mobile Video Chat, Jason Procyk, Carman Neustaedter, Carolyn Pang, Anthony Tang, Tejinder K. Judge
Research Collection School Of Computing and Information Systems
Our research explores the use of mobile video chat in public spaces by people participating in parallel experiences, where both a local and remote person are doing the same activity together at the same time. We prototyped a wearable video chat experience and had pairs of friends and family members participate in 'shared geocaching' over distance. Our results show that video streaming works best for navigation tasks but is more challenging to use for fine-grained searching tasks. Video streaming also creates a very intimate experience with a remote partner, but this can lead to distraction from the 'real world' and …
On Coordinating Pervasive Persuasive Agents, Budhitama Subagdja, Ah-Hwee Tan
On Coordinating Pervasive Persuasive Agents, Budhitama Subagdja, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
There is a growing interest in applying multiagent systems for smart-home environment supporting self-caring elderly. In this paper we investigate situations and conditions for coordination for such kind of system. We specify a high level architecture of it based on the notions of beliefs, desires, and intentions for both individual and group behavior of the agents including the human occupant's. The framework enables flexible coordinations among loosely-coupled heterogeneous agents that converse with the user. This work is conducted towards producing a coordination framework for agents and people in such a kind of smart-home environment as mentioned.
Declarative-Procedural Memory Interaction In Learning Agents, Wenwen Wang, Ah-Hwee Tan, Loo-Nin Teow, Tan Yuan-Sin
Declarative-Procedural Memory Interaction In Learning Agents, Wenwen Wang, Ah-Hwee Tan, Loo-Nin Teow, Tan Yuan-Sin
Research Collection School Of Computing and Information Systems
It has been well recognized that human makes use of both declarative memory and procedural memory for decision making and problem solving. In this paper, we propose a computational model with the overall architecture and individual processes for realizing the interaction between the declarative and procedural memory based on self-organizing neural networks. We formalize two major types of memory interactions and show how each of them can be embedded into autonomous reinforcement learning agents. Our experiments based on the Toad and Frog puzzle and a strategic game known as Starcraft Broodwar have shown that the cooperative interaction between declarative knowledge …
Medical Imaging Specialists And 3d: A Domain Perspective On Mobile 3d Interactions, Teddy Seyed, Frank Maurer, Francisco Marinho Rodrigues, Anthony Tang
Medical Imaging Specialists And 3d: A Domain Perspective On Mobile 3d Interactions, Teddy Seyed, Frank Maurer, Francisco Marinho Rodrigues, Anthony Tang
Research Collection School Of Computing and Information Systems
3D volumetric medical images, such as MRIs, are commonly explored and interacted with by medical imaging experts using systems that require keyboard and mouse-based techniques. These techniques have presented challenges for medical imaging specialists: 3D spatial navigation is difficult, in addition to the detailed selection and analysis of 3D medical images being difficult due to depth perception and occlusion issues. In this work, we explore a potential solution to these challenges by using tangible interaction techniques with a mobile device to simplify 3D interactions for medical imaging specialists. We discuss preliminary observations from our design sessions with medical imaging specialists …
A Quantitative Analysis Of Decision Process In Social Groups Using Human Trajectories, Truc Viet Le, Siyuan Liu, Hoong Chuin Lau, Ramayya Krishnan
A Quantitative Analysis Of Decision Process In Social Groups Using Human Trajectories, Truc Viet Le, Siyuan Liu, Hoong Chuin Lau, Ramayya Krishnan
Research Collection School Of Computing and Information Systems
A group's collective action is an outcome of the group's decision-making process, which may be reached by either averaging of the individual preferences or following the choices of certain members in the group. Our problem here is to decide which decision process the group has adopted given the data of the collective actions. We propose a generic statistical framework to infer the group's decision process from the spatio-temporal data of group trajectories, where each "trajectory" is a sequence of group actions. This is achieved by systematically comparing each agent type's influence on the group actions based on an array of …
Didn’T You See My Message?: Predicting Attentiveness To Mobile Instant Messages, Martin Pielot, Rodrigo De Oliveira, Haewoon Kwak, Nuria. Oliver
Didn’T You See My Message?: Predicting Attentiveness To Mobile Instant Messages, Martin Pielot, Rodrigo De Oliveira, Haewoon Kwak, Nuria. Oliver
Research Collection School Of Computing and Information Systems
Mobile instant messaging (e.g., via SMS or WhatsApp) often goes along with an expectation of high attentiveness, i.e., that the receiver will notice and read the message within a few minutes. Hence, existing instant messaging services for mobile phones share indicators of availability, such as the last time the user has been online. However, in this paper we not only provide evidence that these cues create social pressure, but that they are also weak predictors of attentiveness. As remedy, we propose to share a machine-computed prediction of whether the user will view a message within the next few minutes or …
Simple Effective Named Entity Recognition For Microblogs: Arabic As An Example, Kareem Darwish, Wei Gao
Simple Effective Named Entity Recognition For Microblogs: Arabic As An Example, Kareem Darwish, Wei Gao
Research Collection School Of Computing and Information Systems
No abstract provided.