Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

3261 Full-Text Articles 3825 Authors 796854 Downloads 133 Institutions

All Articles in Databases and Information Systems

Faceted Search

3261 full-text articles. Page 1 of 113.

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling GUO, Dan MA 2018 Singapore Management University

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper 2018 Walden University

Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper

Walden Dissertations and Doctoral Studies

The introduction of federal initiatives and incentives regarding health information technology fostered a movement towards the adoption of electronic health records (EHR). Implementation of EHRs sparked discussions among healthcare providers, patients, and others about the benefits or challenges of the move from the traditional paper method to the electronic version in healthcare settings. A knowledge gap in research involving the usefulness of EHRs and their impact to the delivery of care in other settings exists. The purpose of this qualitative study was to explore public health providers' perceptions of the meaningful use of EHRs in a disaster setting. Study participants ...


Attribute-Based Cloud Storage With Secure Provenance Over Encrypted Data, Hui CUI, Robert H. DENG, Yingjiu LI 2018 Singapore Management University

Attribute-Based Cloud Storage With Secure Provenance Over Encrypted Data, Hui Cui, Robert H. Deng, Yingjiu Li

Research Collection School Of Information Systems

To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a cloud data storage system which protects data privacy from storage servers through encryption, allows fine-grained access control such that data providers can expressively specify who are eligible to access the encrypted data, enables dynamic user management such that the total number of data users is unbounded and user revocation can be carried out conveniently, supports data provider anonymity and traceability such that a data provider’s identity is not disclosed to data users in normal circumstances but can be traced by a trusted authority ...


User-Friendly Deniable Storage For Mobile Devices, Bing CHANG, Yao CHENG, Bo CHEN, Fengwei ZHANG, Wen-Tao ZHU, Yingjiu LI, Zhan. WANG 2018 Singapore Management University

User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, Zhan. Wang

Research Collection School Of Information Systems

Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a ...


Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), Annette M. O'Connor, Guy Tsafnat, Stephen B. Gilbert, Kristina A. Thayer, Mary S. Wolfe 2018 Iowa State University

Moving Toward The Automation Of The Systematic Review Process: A Summary Of Discussions At The Second Meeting Of International Collaboration For The Automation Of Systematic Reviews (Icasr), Annette M. O'Connor, Guy Tsafnat, Stephen B. Gilbert, Kristina A. Thayer, Mary S. Wolfe

Veterinary Diagnostic and Production Animal Medicine Conference Proceedings and Presentations

The second meeting of the International Collaboration for Automation of Systematic Reviews (ICASR) was held 3–4 October 2016 in Philadelphia, Pennsylvania, USA. ICASR is an interdisciplinary group whose aim is to maximize the use of technology for conducting rapid, accurate, and efficient systematic reviews of scientific evidence. Having automated tools for systematic review should enable more transparent and timely review, maximizing the potential for identifying and translating research findings to practical application. The meeting brought together multiple stakeholder groups including users of summarized research, methodologists who explore production processes and systematic review quality, and technologists such as software developers ...


Introduction To The Usu Library Of Solutions To The Einstein Field Equations, Ian M. Anderson, Charles G. Torre 2017 ian.anderson@usu.edu

Introduction To The Usu Library Of Solutions To The Einstein Field Equations, Ian M. Anderson, Charles G. Torre

Tutorials on... in 1 hour or less

This is a Maple worksheet providing an introduction to the USU Library of Solutions to the Einstein Field Equations. The library is part of the DifferentialGeometry software project and is a collection of symbolic data and metadata describing solutions to the Einstein equations.


Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad 2017 University of Nebraska-Lincoln

Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad

Computer Science and Engineering: Theses, Dissertations, and Student Research

In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible ...


Leveraging Auxiliary Tasks For Document-Level Cross-Domain Sentiment Classification, Jianfei YU, Jing JIANG 2017 Singapore Management University

Leveraging Auxiliary Tasks For Document-Level Cross-Domain Sentiment Classification, Jianfei Yu, Jing Jiang

Research Collection School Of Information Systems

In this paper, we study domain adaptationwith a state-of-the-art hierarchicalneural network for document-level sentimentclassification. We first design a newauxiliary task based on sentiment scoresof domain-independent words. We thenpropose two neural network architecturesto respectively induce document embeddingsand sentence embeddings that workwell for different domains. When thesedocument and sentence embeddings areused for sentiment classification, we findthat with both pseudo and external sentimentlexicons, our proposed methods canperform similarly to or better than severalhighly competitive domain adaptationmethods on a benchmark dataset of productreviews.


Secure Server-Aided Top-K Monitoring, Yujue WANG, Hwee Hwa PANG, Yanjiang YANG, Xuhua DING 2017 Guilin University of Electronic Technology

Secure Server-Aided Top-K Monitoring, Yujue Wang, Hwee Hwa Pang, Yanjiang Yang, Xuhua Ding

Research Collection School Of Information Systems

In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to third-party servers, which gives rise to the need to protect the integrity and privacy of the documents and user queries. In this paper, we propose a server-aided data stream monitoring scheme (DSM) to address the aforementioned integrity and privacy challenges, so that the users are able to ...


Using Data Analytics For Discovering Library Resource Insights – Case From Singapore Management University, Ning LU, Rui SONG, Dina HENG, Swapna GOTTIPATI, Chee Hsien Aaron (ZHENG Zhixian) TAY, Aaron TAY 2017 Singapore Management University

Using Data Analytics For Discovering Library Resource Insights – Case From Singapore Management University, Ning Lu, Rui Song, Dina Heng, Swapna Gottipati, Chee Hsien Aaron (Zheng Zhixian) Tay, Aaron Tay

Research Collection School Of Information Systems

Library resources are critical in supporting teaching, research and learning processes. Several universities have employed online platforms and infrastructure for enabling the online services to students, faculty and staff. To provide efficient services by understanding and predicting user needs libraries are looking into the area of data analytics. Library analytics in Singapore Management University is the project committed to provide an interface for data-intensive project collaboration, while supporting one of the library’s key pillars on its commitment to collaborate on initiatives with SMU Communities and external groups. In this paper, we study the transaction logs for user behavior analysis ...


Using Teaching Cases For Achieving Bloom’S High-Order Cognitive Levels: An Application In Technically-Oriented Information Systems Course, Kar Way TAN 2017 Singapore Management University

Using Teaching Cases For Achieving Bloom’S High-Order Cognitive Levels: An Application In Technically-Oriented Information Systems Course, Kar Way Tan

Research Collection School Of Information Systems

Case-teaching has been an attractive pedagogy method for bringing in real-world examples into the classroom. However, it is challenging to introduce cases to address high-order cognitive skills such as analyzing and creating new IT solutions in technically-oriented computing course. In this research, we present our experience in introducing three types of case studies -- Story-Telling case, Design-and-Problem-Solving case, and Create-Design-Implement case to a course in an undergraduate Information Systems programme. For each case study, we plan and map the learning objectives to address various cognitive levels in the revised Bloom’s Taxonomy. Using surveys conducted over two academic years, we show ...


The Graph Database: Jack Of All Trades Or Just Not Sql?, George F. Hurlburt, Maria R. Lee, George K. Thiruvathukal 2017 STEMCorp

The Graph Database: Jack Of All Trades Or Just Not Sql?, George F. Hurlburt, Maria R. Lee, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

This special issue of IT Professional focuses on the graph database. The graph database, a relatively new phenomenon, is well suited to the burgeoning information era in which we are increasingly becoming immersed. Here, the guest editors briefly explain how a graph database works, its relation to the relational database management system (RDBMS), and its quantitative and qualitative pros and cons, including how graph databases can be harnessed in a hybrid environment. They also survey the excellent articles submitted for this special issue.


Nbpmf: Novel Network-Based Inference Methods For Peptide Mass Fingerprinting, Zhewei Liang 2017 The University of Western Ontario

Nbpmf: Novel Network-Based Inference Methods For Peptide Mass Fingerprinting, Zhewei Liang

Electronic Thesis and Dissertation Repository

Proteins are large, complex molecules that perform a vast array of functions in every living cell. A proteome is a set of proteins produced in an organism, and proteomics is the large-scale study of proteomes. Several high-throughput technologies have been developed in proteomics, where the most commonly applied are mass spectrometry (MS) based approaches. MS is an analytical technique for determining the composition of a sample. Recently it has become a primary tool for protein identification, quantification, and post translational modification (PTM) characterization in proteomics research. There are usually two different ways to identify proteins: top-down and bottom-up. Top-down approaches ...


The Pharmacogene Variation (Pharmvar) Consortium: Incorporation Of The Human Cytochrome P450 (Cyp) Allele Nomenclature Database, Andrea Gaedigk, Magnus Ingelman-Sundberg, Neil A. Miller, J Steven Leeder, Michelle Whirl-Carrillo, Teri E. Klein 2017 Children's Mercy Kansas City

The Pharmacogene Variation (Pharmvar) Consortium: Incorporation Of The Human Cytochrome P450 (Cyp) Allele Nomenclature Database, Andrea Gaedigk, Magnus Ingelman-Sundberg, Neil A. Miller, J Steven Leeder, Michelle Whirl-Carrillo, Teri E. Klein

Manuscripts, Articles, Book Chapters and Other Papers

The Human Cytochrome P450 (CYP) Allele Nomenclature Database, a critical resource to the pharmacogenetics and genomics communities, will be transitioning to the Pharmacogene Variation (PharmVar) Consortium. In this report we provide a summary of the current database, provide an overview of the PharmVar consortium and highlight the PharmVar database which will serve as the new home for pharmacogene nomenclature.


A Study On The Practical Use Of Operations Research And Vessels Big Data In Benefit Of Efficient Ports Utilization In Panama, Gabriel Fuentes Lezcano 2017 World Maritime University

A Study On The Practical Use Of Operations Research And Vessels Big Data In Benefit Of Efficient Ports Utilization In Panama, Gabriel Fuentes Lezcano

World Maritime University Dissertations

No abstract provided.


Uncovering User-Triggered Privacy Leaks In Mobile Applications And Their Utility In Privacy Protection, Joo Keng Joseph CHAN 2017 Singapore Management University

Uncovering User-Triggered Privacy Leaks In Mobile Applications And Their Utility In Privacy Protection, Joo Keng Joseph Chan

Dissertations and Theses Collection

Mobile applications are increasingly popular, and help mobile users in many aspects of their lifestyle. Applications have access to a wealth of information about the user through powerful developer APIs. It is known that most applications, even popular and highly regarded ones, utilize and leak privacy data to the network. It is also common for applications to over-access privacy data that does not fit the functionality profile of the application. Although there are available privacy detection tools, they might not provide sufficient context to help users better understand the privacy behaviours of their applications. In this dissertation, I present the ...


Semvis: Semantic Visualization For Interactive Topical Analysis, LE VAN MINH TUAN, Hady Wirawan LAUW 2017 Singapore Management University

Semvis: Semantic Visualization For Interactive Topical Analysis, Le Van Minh Tuan, Hady Wirawan Lauw

Research Collection School Of Information Systems

Exploratory analysis of a text corpus is an important task that can be aided by informative visualization. One spatially-oriented form of document visualization is a scatterplot, whereby every document is associated with a coordinate, and relationships among documents can be perceived through their spatial distances. Semantic visualization further infuses the visualization space with latent semantics, by incorporating a topic model that has a representation in the visualization space, allowing users to also perceive relationships between documents and topics spatially. We illustrate how a semantic visualization system called SemVis could be used to navigate a text corpus interactively and topically via ...


Indexable Bayesian Personalized Ranking For Efficient Top-K Recommendation, LE DUY DUNG, Hady Wirawan LAUW 2017 Singapore Management University

Indexable Bayesian Personalized Ranking For Efficient Top-K Recommendation, Le Duy Dung, Hady Wirawan Lauw

Research Collection School Of Information Systems

Top-k recommendation seeks to deliver a personalized recommendation list of k items to a user. The dual objectives are (1) accuracy in identifying the items a user is likely to prefer, and (2) efficiency in constructing the recommendation list in real time. One direction towards retrieval efficiency is to formulate retrieval as approximate k nearest neighbor (kNN) search aided by indexing schemes, such as locality-sensitive hashing, spatial trees, and inverted index. These schemes, applied on the output representations of recommendation algorithms, speed up the retrieval process by automatically discarding a large number of potentially irrelevant items when given a user ...


A Fast Trajectory Outlier Detection Approach Via Driving Behavior Modeling, Hao WU, Weiwei SUN, Baihua ZHENG 2017 Singapore Management University

A Fast Trajectory Outlier Detection Approach Via Driving Behavior Modeling, Hao Wu, Weiwei Sun, Baihua Zheng

Research Collection School Of Information Systems

Trajectory outlier detection is a fundamental building block for many location-based service (LBS) applications, with a large application base. We dedicate this paper on detecting the outliers from vehicle trajectories efficiently and effectively. In addition, we want our solution to be able to issue an alarm early when an outlier trajectory is only partially observed (i.e., the trajectory has not yet reached the destination). Most existing works study the problem on general Euclidean trajectories and require accesses to the historical trajectory database or computations on the distance metric that are very expensive. Furthermore, few of existing works consider some ...


Digital Commons powered by bepress