Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

6,554 Full-Text Articles 8,879 Authors 3,346,977 Downloads 209 Institutions

All Articles in Databases and Information Systems

Faceted Search

6,554 full-text articles. Page 213 of 247.

Adaptive Cgf For Pilots Training In Air Combat Simulation, Teck-Hou TENG, Ah-hwee TAN, Wee-Sze ONG, Kien-Lip LEE 2012 Singapore Management University

Adaptive Cgf For Pilots Training In Air Combat Simulation, Teck-Hou Teng, Ah-Hwee Tan, Wee-Sze Ong, Kien-Lip Lee

Research Collection School Of Computing and Information Systems

Training of combat fighter pilots is often conducted using either human opponents or non-adaptive computer-generated force (CGF) inserted with the doctrine for conducting air combat mission. The novelty and challenges of such non-adaptive doctrine-driven CGF is often lost quickly. Incorporating more complex knowledge manually is known to be tedious and time-consuming. Therefore, a study of using adaptive CGF to learn from the real-time interactions with human pilots to extend the existing doctrine is conducted in this work. The goal of this study is to show how an adaptive CGF can be more effective than a non-adaptive doctrine-driven CGF for simulator-based …


Formal Analysis Of Pervasive Computing Systems, Yan LIU, Xian ZHANG, Jin Song DONG, Yang LIU, Jun SUN, Jit BISWAS, Mounir MOKHTARI 2012 Singapore Management University

Formal Analysis Of Pervasive Computing Systems, Yan Liu, Xian Zhang, Jin Song Dong, Yang Liu, Jun Sun, Jit Biswas, Mounir Mokhtari

Research Collection School Of Computing and Information Systems

Pervasive computing systems are heterogenous and complex as they usually involve human activities, various sensors and actuators as well as middleware for system controlling. Therefore, analyzing such systems is highly nontrivial. In this work, we propose to use formal methods for analyzing pervasive computing systems. Firstly, a formal modeling framework is proposed to cover the main characteristics of pervasive computing systems (e.g., context-awareness, concurrent communications, layered architectures). Secondly, we identify the safety requirements (e.g., free of deadlocks and conflicts etc.) and propose their specifications as safety and liveness properties. Finally, we demonstrate our ideas using a case study of a …


Detecting Anomalous Twitter Users By Extreme Group Behaviors, Hanbo DAI, Ee-peng LIM, Feida ZHU, Hwee Hwa PANG 2012 Singapore Management University

Detecting Anomalous Twitter Users By Extreme Group Behaviors, Hanbo Dai, Ee-Peng Lim, Feida Zhu, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

Twitter has enjoyed tremendous popularity in the recent years. To help categorizing and search tweets, Twitter users assign hashtags to their tweets. Given that hashtag assignment is the primary way to semantically categorizing and search tweets, it is highly susceptible to abuse by spammers and other anomalous users [1]. Popular hashtags such as #Obama and #ladygaga could be hijacked by having them added to unrelated tweets with the intent of misleading many other users or promoting specific agenda to the users. The users performing this act are known as the hashtag hijackers. As the hijackers usually abuse common sets of …


K-Partite Graph Reinforcement And Its Application In Multimedia Information Retrieval, Yue GAO, Meng WANG, Rongrong Ji, Zheng-Jun ZHA, Jialie SHEN 2012 Huazhong University of Science and Technology

K-Partite Graph Reinforcement And Its Application In Multimedia Information Retrieval, Yue Gao, Meng Wang, Rongrong Ji, Zheng-Jun Zha, Jialie Shen

Research Collection School Of Computing and Information Systems

In many example-based information retrieval tasks, example query actually contains multiple sub-queries. For example, in 3D object retrieval, the query is an object described by multiple views. In content-based video retrieval, the query is a video clip that contains multiple frames. Without prior knowledge, the most intuitive approach is to treat the sub-queries equally without difference. In this paper, we propose a k-partite graph reinforcement approach to fuse these sub-queries based on the to-be-retrieved database. The approach first collects the top retrieved results. These results are regarded as pseudo-relevant samples and then a k-partite graph reinforcement is performed on these …


Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa PANG, Jilian ZHANG, Kyriakos MOURATIDIS 2012 Singapore Management University

Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis

Research Collection School Of Computing and Information Systems

Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B+-tree that has its nodes encrypted, we identify properties that enable the ordering among the leaf nodes to be deduced. These properties allow us to construct adversarial algorithms to recover the B+-tree structure from the I/O traces generated by range queries. Combining …


Identifying Event-Related Bursts Via Social Media Activities, Xin ZHAO, Baihan Shu, Jing JIANG, YANG SONG, Hongfei YAN, Xiaoming LI 2012 Singapore Management University

Identifying Event-Related Bursts Via Social Media Activities, Xin Zhao, Baihan Shu, Jing Jiang, Yang Song, Hongfei Yan, Xiaoming Li

Research Collection School Of Computing and Information Systems

Activities on social media increase at a dramatic rate. When an external event happens, there is a surge in the degree of activities related to the event. These activities may be temporally correlated with one another, but they may also capture different aspects of an event and therefore exhibit different bursty patterns. In this paper, we propose to identify event-related bursts via social media activities. We study how to correlate multiple types of activities to derive a global bursty pattern. To model smoothness of one state sequence, we propose a novel function which can capture the state context. The experiments …


Online Kernel Selection: Algorithms And Evaluations, Tianbao YANG, Mehrdad MAHDAVI, Rong JIN, Jinfeng YI, Steven C. H. HOI 2012 Michigan State University

Online Kernel Selection: Algorithms And Evaluations, Tianbao Yang, Mehrdad Mahdavi, Rong Jin, Jinfeng Yi, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Kernel methods have been successfully applied to many machine learning problems. Nevertheless, since the performance of kernel methods depends heavily on the type of kernels being used, identifying good kernels among a set of given kernels is important to the success of kernel methods. A straightforward approach to address this problem is cross-validation by training a separate classifier for each kernel and choosing the best kernel classifier out of them. Another approach is Multiple Kernel Learning (MKL), which aims to learn a single kernel classifier from an optimal combination of multiple kernels. However, both approaches suffer from a high computational …


Topic Discovery From Tweet Replies, Bingtian DAI, Ee Peng LIM, Philips Kokoh PRASETYO 2012 Singapore Management University

Topic Discovery From Tweet Replies, Bingtian Dai, Ee Peng Lim, Philips Kokoh Prasetyo

Research Collection School Of Computing and Information Systems

Twitter is a popular online social information network service which allows people to read and post messages up to 140 characters, known as “tweets”. In this paper, we focus on the tweets between pairs of individuals, i.e., the tweet replies, and propose a generative model to discover topics among groups of twitter users. Our model has then been evaluated with a tweet dataset to show its effectiveness.


On-Line Portfolio Selection With Moving Average Reversion, Bin LI, Steven C. H. HOI 2012 Nanyang Technological University

On-Line Portfolio Selection With Moving Average Reversion, Bin Li, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

On-line portfolio selection has attracted increasing interests in machine learning and AI communities recently. Empirical evidences show that stock's high and low prices are temporary and stock price relatives are likely to follow the mean reversion phenomenon. While the existing mean reversion strategies are shown to achieve good empirical performance on many real datasets, they often make the single-period mean reversion assumption, which is not always satisfied in some real datasets, leading to poor performance when the assumption does not hold. To overcome the limitation, this article proposes a multiple-period mean reversion, or so-called Moving Average Reversion (MAR), and a …


Exact Soft Confidence-Weighted Learning, Jialei WANG, Steven C. H. HOI 2012 Nanyang Technological University

Exact Soft Confidence-Weighted Learning, Jialei Wang, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

In this paper, we propose a new Soft Confidence-Weighted (SCW) online learning scheme, which enables the conventional confidence-weighted learning method to handle non-separable cases. Unlike the previous confidence-weighted learning algorithms, the proposed soft confidence-weighted learning method enjoys all the four salient properties: (i) large margin training, (ii) confidence weighting, (iii) capability to handle non-separable data, and (iv) adaptive margin. Our experimental results show that the proposed SCW algorithms significantly outperform the original CW algorithm. When comparing with a variety of state-of-the art algorithms (including AROW, NAROW and NHERD), we found that SCW generally achieves better or at least comparable predictive …


Fast Bounded Online Gradient Descent Algorithms For Scalable Kernel-Based Online Learning, Peilin ZHAO, Jialei WANG, Pengcheng WU, Rong JIN, Steven C. H. HOI 2012 Nanyang Technological University

Fast Bounded Online Gradient Descent Algorithms For Scalable Kernel-Based Online Learning, Peilin Zhao, Jialei Wang, Pengcheng Wu, Rong Jin, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Kernel-based online learning has often shown state-of-the-art performance for many online learning tasks. It, however, suffers from a major shortcoming, that is, the unbounded number of support vectors, making it non-scalable and unsuitable for applications with large-scale datasets. In this work, we study the problem of bounded kernel-based online learning that aims to constrain the number of support vectors by a predefined budget. Although several algorithms have been proposed in literature, they are neither computationally efficient due to their intensive budget maintenance strategy nor effective due to the use of simple Perceptron algorithm. To overcome these limitations, we propose a …


Finding Bursty Topics From Microblogs, Qiming DIAO, Jing JIANG, Feida ZHU, Ee Peng LIM 2012 Singapore Management University

Finding Bursty Topics From Microblogs, Qiming Diao, Jing Jiang, Feida Zhu, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Although bursty event detection from text streams has been studied before, previous work may not be suitable for microblogs because compared with other text streams such as news articles and scientific publications, microblog posts are particularly diverse and noisy. To find topics that have bursty patterns on microblogs, we propose a topic model that simultaneousy captures two observations: (1) posts published around the same time are more likely to have the same topic, and (2) …


Information-Theoretic Multi-View Domain Adaptation, Pei YANG, Wei GAO, Qi TAN, Kam-Fai WONG 2012 Singapore Management University

Information-Theoretic Multi-View Domain Adaptation, Pei Yang, Wei Gao, Qi Tan, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

We use multiple views for cross-domain document classification. The main idea is to strengthen the views’ consistency for target data with source training data by identifying the correlations of domain-specific features from different domains. We present an Information-theoretic Multi-view Adaptation Model (IMAM) based on a multi-way clustering scheme, where word and link clusters can draw together seemingly unrelated domain-specific features from both sides and iteratively boost the consistency between document clusterings based on word and link views. Experiments show that IMAM significantly outperforms state-of-the-art baselines.


Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Thomas Rindflesch, Amit P. Sheth 2012 Wright State University - Main Campus

Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Thomas Rindflesch, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.


W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, Cory Andrew Henson 2012 Wright State University - Main Campus

W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, Cory Andrew Henson

Kno.e.sis Publications

Plenary Talk discussing the W3C Semantic Sensor Network, including the ontology, applications, and future directions.


Mobile Spatial Interaction In The Future Internet Of Things, James Carswell, Junjun Yin 2012 Technological University Dublin

Mobile Spatial Interaction In The Future Internet Of Things, James Carswell, Junjun Yin

Conference papers

Research and development of mobile information systems in the Future Internet of Things is about delivering technologies built around management and access to real-time heterogeneous datasets. Analyzing these enormous volumes of disparate data on mobile devices requires context-aware smart applications and services. 3DQ (Three Dimensional Query) is our novel mobile spatial interaction (MSI) prototype for data mining and analysis on today’s location and orientation aware “smartphones” within such 3D sensor web environments. Our application tailors a military style threat dome query calculation using MSI with “hidden query removal” functionality to reduce information overload and heighten situation awareness on these commercial …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham 2012 University of Texas at Dallas

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Geometric Programming Subject To System Of Fuzzy Relation Inequalities, Elyas Shivanian, Mahdi Keshtkar, Esmaile Khorram 2012 Imam Khomeini International University

Geometric Programming Subject To System Of Fuzzy Relation Inequalities, Elyas Shivanian, Mahdi Keshtkar, Esmaile Khorram

Applications and Applied Mathematics: An International Journal (AAM)

In this paper, an optimization model with geometric objective function is presented. Geometric programming is widely used; many objective functions in optimization problems can be analyzed by geometric programming. We often encounter these in resource allocation and structure optimization and technology management, etc. On the other hand, fuzzy relation equalities and inequalities are also used in many areas. We here present a geometric programming model with a monomial objective function subject to the fuzzy relation inequality constraints with maxproduct composition. Simplification operations have been given to accelerate the resolution of the problem by removing the components having no effect on …


Numerical Solution Of Interval And Fuzzy System Of Linear Equations, Suparna Das, S. Chakraverty 2012 National Institute of Technology

Numerical Solution Of Interval And Fuzzy System Of Linear Equations, Suparna Das, S. Chakraverty

Applications and Applied Mathematics: An International Journal (AAM)

A system of linear equations, in general is solved in open literature for crisp unknowns, but in actual case the parameters (coefficients) of the system of linear equations contain uncertainty and are less crisp. The uncertainties may be considered in term of interval or fuzzy number. In this paper, a detail of study of linear simultaneous equations with interval and fuzzy parameter (triangular and trapezoidal) has been performed. New methods have been proposed for solving such systems. First, the methods have been tested for known problems viz. a circuit analysis solved in the literature and the results are found to …


Prediction Of Topic Volume On Twitter, Yiye Ruan, Hemant Purohit, David Fuhry, Srinivasan Parthasarathy, Amit P. Sheth 2012 Wright State University - Main Campus

Prediction Of Topic Volume On Twitter, Yiye Ruan, Hemant Purohit, David Fuhry, Srinivasan Parthasarathy, Amit P. Sheth

Kno.e.sis Publications

We discuss an approach for predicting microscopic (individual) and macroscopic (collective) user behavioral patterns with respect to specific trending topics on Twitter. Going beyond previous efforts that have analyzed driving factors in whether and when a user will publish topic-relevant tweets, here we seek to predict the strength of content generation which allows more accurate understanding of Twitter users' behavior and more effective utilization of the online social network for diffusing information. Unlike traditional approaches, we consider multiple dimensions into one regression-based prediction framework covering network structure, user interaction, content characteristics and past activity. Experimental results on three large Twitter …


Digital Commons powered by bepress