Adaptive Cgf For Pilots Training In Air Combat Simulation, 2012 Singapore Management University
Adaptive Cgf For Pilots Training In Air Combat Simulation, Teck-Hou Teng, Ah-Hwee Tan, Wee-Sze Ong, Kien-Lip Lee
Research Collection School Of Computing and Information Systems
Training of combat fighter pilots is often conducted using either human opponents or non-adaptive computer-generated force (CGF) inserted with the doctrine for conducting air combat mission. The novelty and challenges of such non-adaptive doctrine-driven CGF is often lost quickly. Incorporating more complex knowledge manually is known to be tedious and time-consuming. Therefore, a study of using adaptive CGF to learn from the real-time interactions with human pilots to extend the existing doctrine is conducted in this work. The goal of this study is to show how an adaptive CGF can be more effective than a non-adaptive doctrine-driven CGF for simulator-based …
Formal Analysis Of Pervasive Computing Systems, 2012 Singapore Management University
Formal Analysis Of Pervasive Computing Systems, Yan Liu, Xian Zhang, Jin Song Dong, Yang Liu, Jun Sun, Jit Biswas, Mounir Mokhtari
Research Collection School Of Computing and Information Systems
Pervasive computing systems are heterogenous and complex as they usually involve human activities, various sensors and actuators as well as middleware for system controlling. Therefore, analyzing such systems is highly nontrivial. In this work, we propose to use formal methods for analyzing pervasive computing systems. Firstly, a formal modeling framework is proposed to cover the main characteristics of pervasive computing systems (e.g., context-awareness, concurrent communications, layered architectures). Secondly, we identify the safety requirements (e.g., free of deadlocks and conflicts etc.) and propose their specifications as safety and liveness properties. Finally, we demonstrate our ideas using a case study of a …
Detecting Anomalous Twitter Users By Extreme Group Behaviors, 2012 Singapore Management University
Detecting Anomalous Twitter Users By Extreme Group Behaviors, Hanbo Dai, Ee-Peng Lim, Feida Zhu, Hwee Hwa Pang
Research Collection School Of Computing and Information Systems
Twitter has enjoyed tremendous popularity in the recent years. To help categorizing and search tweets, Twitter users assign hashtags to their tweets. Given that hashtag assignment is the primary way to semantically categorizing and search tweets, it is highly susceptible to abuse by spammers and other anomalous users [1]. Popular hashtags such as #Obama and #ladygaga could be hijacked by having them added to unrelated tweets with the intent of misleading many other users or promoting specific agenda to the users. The users performing this act are known as the hashtag hijackers. As the hijackers usually abuse common sets of …
K-Partite Graph Reinforcement And Its Application In Multimedia Information Retrieval, 2012 Huazhong University of Science and Technology
K-Partite Graph Reinforcement And Its Application In Multimedia Information Retrieval, Yue Gao, Meng Wang, Rongrong Ji, Zheng-Jun Zha, Jialie Shen
Research Collection School Of Computing and Information Systems
In many example-based information retrieval tasks, example query actually contains multiple sub-queries. For example, in 3D object retrieval, the query is an object described by multiple views. In content-based video retrieval, the query is a video clip that contains multiple frames. Without prior knowledge, the most intuitive approach is to treat the sub-queries equally without difference. In this paper, we propose a k-partite graph reinforcement approach to fuse these sub-queries based on the to-be-retrieved database. The approach first collects the top retrieved results. These results are regarded as pseudo-relevant samples and then a k-partite graph reinforcement is performed on these …
Enhancing Access Privacy Of Range Retrievals Over B+Trees, 2012 Singapore Management University
Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis
Research Collection School Of Computing and Information Systems
Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B+-tree that has its nodes encrypted, we identify properties that enable the ordering among the leaf nodes to be deduced. These properties allow us to construct adversarial algorithms to recover the B+-tree structure from the I/O traces generated by range queries. Combining …
Identifying Event-Related Bursts Via Social Media Activities, 2012 Singapore Management University
Identifying Event-Related Bursts Via Social Media Activities, Xin Zhao, Baihan Shu, Jing Jiang, Yang Song, Hongfei Yan, Xiaoming Li
Research Collection School Of Computing and Information Systems
Activities on social media increase at a dramatic rate. When an external event happens, there is a surge in the degree of activities related to the event. These activities may be temporally correlated with one another, but they may also capture different aspects of an event and therefore exhibit different bursty patterns. In this paper, we propose to identify event-related bursts via social media activities. We study how to correlate multiple types of activities to derive a global bursty pattern. To model smoothness of one state sequence, we propose a novel function which can capture the state context. The experiments …
Online Kernel Selection: Algorithms And Evaluations, 2012 Michigan State University
Online Kernel Selection: Algorithms And Evaluations, Tianbao Yang, Mehrdad Mahdavi, Rong Jin, Jinfeng Yi, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Kernel methods have been successfully applied to many machine learning problems. Nevertheless, since the performance of kernel methods depends heavily on the type of kernels being used, identifying good kernels among a set of given kernels is important to the success of kernel methods. A straightforward approach to address this problem is cross-validation by training a separate classifier for each kernel and choosing the best kernel classifier out of them. Another approach is Multiple Kernel Learning (MKL), which aims to learn a single kernel classifier from an optimal combination of multiple kernels. However, both approaches suffer from a high computational …
Topic Discovery From Tweet Replies, 2012 Singapore Management University
Topic Discovery From Tweet Replies, Bingtian Dai, Ee Peng Lim, Philips Kokoh Prasetyo
Research Collection School Of Computing and Information Systems
Twitter is a popular online social information network service which allows people to read and post messages up to 140 characters, known as “tweets”. In this paper, we focus on the tweets between pairs of individuals, i.e., the tweet replies, and propose a generative model to discover topics among groups of twitter users. Our model has then been evaluated with a tweet dataset to show its effectiveness.
On-Line Portfolio Selection With Moving Average Reversion, 2012 Nanyang Technological University
On-Line Portfolio Selection With Moving Average Reversion, Bin Li, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
On-line portfolio selection has attracted increasing interests in machine learning and AI communities recently. Empirical evidences show that stock's high and low prices are temporary and stock price relatives are likely to follow the mean reversion phenomenon. While the existing mean reversion strategies are shown to achieve good empirical performance on many real datasets, they often make the single-period mean reversion assumption, which is not always satisfied in some real datasets, leading to poor performance when the assumption does not hold. To overcome the limitation, this article proposes a multiple-period mean reversion, or so-called Moving Average Reversion (MAR), and a …
Exact Soft Confidence-Weighted Learning, 2012 Nanyang Technological University
Exact Soft Confidence-Weighted Learning, Jialei Wang, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
In this paper, we propose a new Soft Confidence-Weighted (SCW) online learning scheme, which enables the conventional confidence-weighted learning method to handle non-separable cases. Unlike the previous confidence-weighted learning algorithms, the proposed soft confidence-weighted learning method enjoys all the four salient properties: (i) large margin training, (ii) confidence weighting, (iii) capability to handle non-separable data, and (iv) adaptive margin. Our experimental results show that the proposed SCW algorithms significantly outperform the original CW algorithm. When comparing with a variety of state-of-the art algorithms (including AROW, NAROW and NHERD), we found that SCW generally achieves better or at least comparable predictive …
Fast Bounded Online Gradient Descent Algorithms For Scalable Kernel-Based Online Learning, 2012 Nanyang Technological University
Fast Bounded Online Gradient Descent Algorithms For Scalable Kernel-Based Online Learning, Peilin Zhao, Jialei Wang, Pengcheng Wu, Rong Jin, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Kernel-based online learning has often shown state-of-the-art performance for many online learning tasks. It, however, suffers from a major shortcoming, that is, the unbounded number of support vectors, making it non-scalable and unsuitable for applications with large-scale datasets. In this work, we study the problem of bounded kernel-based online learning that aims to constrain the number of support vectors by a predefined budget. Although several algorithms have been proposed in literature, they are neither computationally efficient due to their intensive budget maintenance strategy nor effective due to the use of simple Perceptron algorithm. To overcome these limitations, we propose a …
Finding Bursty Topics From Microblogs, 2012 Singapore Management University
Finding Bursty Topics From Microblogs, Qiming Diao, Jing Jiang, Feida Zhu, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Although bursty event detection from text streams has been studied before, previous work may not be suitable for microblogs because compared with other text streams such as news articles and scientific publications, microblog posts are particularly diverse and noisy. To find topics that have bursty patterns on microblogs, we propose a topic model that simultaneousy captures two observations: (1) posts published around the same time are more likely to have the same topic, and (2) …
Information-Theoretic Multi-View Domain Adaptation, 2012 Singapore Management University
Information-Theoretic Multi-View Domain Adaptation, Pei Yang, Wei Gao, Qi Tan, Kam-Fai Wong
Research Collection School Of Computing and Information Systems
We use multiple views for cross-domain document classification. The main idea is to strengthen the views’ consistency for target data with source training data by identifying the correlations of domain-specific features from different domains. We present an Information-theoretic Multi-view Adaptation Model (IMAM) based on a multi-way clustering scheme, where word and link clusters can draw together seemingly unrelated domain-specific features from both sides and iteratively boost the consistency between document clusterings based on word and link views. Experiments show that IMAM significantly outperforms state-of-the-art baselines.
Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, 2012 Wright State University - Main Campus
Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Thomas Rindflesch, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, 2012 Wright State University - Main Campus
W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, Cory Andrew Henson
Kno.e.sis Publications
Plenary Talk discussing the W3C Semantic Sensor Network, including the ontology, applications, and future directions.
Mobile Spatial Interaction In The Future Internet Of Things, 2012 Technological University Dublin
Mobile Spatial Interaction In The Future Internet Of Things, James Carswell, Junjun Yin
Conference papers
Research and development of mobile information systems in the Future Internet of Things is about delivering technologies built around management and access to real-time heterogeneous datasets. Analyzing these enormous volumes of disparate data on mobile devices requires context-aware smart applications and services. 3DQ (Three Dimensional Query) is our novel mobile spatial interaction (MSI) prototype for data mining and analysis on today’s location and orientation aware “smartphones” within such 3D sensor web environments. Our application tailors a military style threat dome query calculation using MSI with “hidden query removal” functionality to reduce information overload and heighten situation awareness on these commercial …
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, 2012 University of Texas at Dallas
Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …
Geometric Programming Subject To System Of Fuzzy Relation Inequalities, 2012 Imam Khomeini International University
Geometric Programming Subject To System Of Fuzzy Relation Inequalities, Elyas Shivanian, Mahdi Keshtkar, Esmaile Khorram
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, an optimization model with geometric objective function is presented. Geometric programming is widely used; many objective functions in optimization problems can be analyzed by geometric programming. We often encounter these in resource allocation and structure optimization and technology management, etc. On the other hand, fuzzy relation equalities and inequalities are also used in many areas. We here present a geometric programming model with a monomial objective function subject to the fuzzy relation inequality constraints with maxproduct composition. Simplification operations have been given to accelerate the resolution of the problem by removing the components having no effect on …
Numerical Solution Of Interval And Fuzzy System Of Linear Equations, 2012 National Institute of Technology
Numerical Solution Of Interval And Fuzzy System Of Linear Equations, Suparna Das, S. Chakraverty
Applications and Applied Mathematics: An International Journal (AAM)
A system of linear equations, in general is solved in open literature for crisp unknowns, but in actual case the parameters (coefficients) of the system of linear equations contain uncertainty and are less crisp. The uncertainties may be considered in term of interval or fuzzy number. In this paper, a detail of study of linear simultaneous equations with interval and fuzzy parameter (triangular and trapezoidal) has been performed. New methods have been proposed for solving such systems. First, the methods have been tested for known problems viz. a circuit analysis solved in the literature and the results are found to …
Prediction Of Topic Volume On Twitter, 2012 Wright State University - Main Campus
Prediction Of Topic Volume On Twitter, Yiye Ruan, Hemant Purohit, David Fuhry, Srinivasan Parthasarathy, Amit P. Sheth
Kno.e.sis Publications
We discuss an approach for predicting microscopic (individual) and macroscopic (collective) user behavioral patterns with respect to specific trending topics on Twitter. Going beyond previous efforts that have analyzed driving factors in whether and when a user will publish topic-relevant tweets, here we seek to predict the strength of content generation which allows more accurate understanding of Twitter users' behavior and more effective utilization of the online social network for diffusing information. Unlike traditional approaches, we consider multiple dimensions into one regression-based prediction framework covering network structure, user interaction, content characteristics and past activity. Experimental results on three large Twitter …