Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,199 Full-Text Articles 71,979 Authors 23,175,806 Downloads 375 Institutions

All Articles in Computer Sciences

Faceted Search

55,199 full-text articles. Page 1242 of 2008.

A Campus-Scale Mobile Crowd-Tasking Platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, Thivya KANDAPPU 2016 Singapore Management University

A Campus-Scale Mobile Crowd-Tasking Platform, Nikita Jaiman, Archan Misra, Randy Tandriansyah Daratan, Thivya Kandappu

Research Collection School Of Computing and Information Systems

By effectively utilizing smartphones to reach out and engage a large population of mobile users, mobile crowdsourcing can become a game-changer for many urban operations, such as last mile logistics and municipal monitoring. To overcome the uncertainties and risks associated with a purely best-effort, opportunistic model of such crowdsourcing, we advocate a more centrally-coordinated approach, that (a) takes into account the predicted movement paths of workers and (b) factors in typical human behavioral responses to various incentives and deadlines. To experimentally tackle these challenges, we design, develop and experiment with a real-world mobile crowd-Tasking platform on an urban campus in …


How Practitioners Perceive The Relevance Of Esem Research, Jeffrey C. CARVER, Oscar DIESTE, Nicholas A. KRAFT, David LO, Thomas ZIMMERMANN 2016 Singapore Management University

How Practitioners Perceive The Relevance Of Esem Research, Jeffrey C. Carver, Oscar Dieste, Nicholas A. Kraft, David Lo, Thomas Zimmermann

Research Collection School Of Computing and Information Systems

Background: The relevance of ESEM research to industry practitioners is key to the long-term health of the conference. Aims: The goal of this work is to understand how ESEM research is perceived within the practitioner community and provide feedback to the ESEM community ensure our research remains relevant. Method: To understand how practitioners perceive ESEM research, we replicated previous work by sending a survey to several hundred industry practitioners at a number of companies around the world. We asked the survey participants to rate the relevance of the research described in 156 ESEM papers published between 2011 and 2015. Results: …


Automated Bug Report Field Reassignment And Refinement Prediction, Xin XIA, David LO, Emad SHIHAB, Xinyu WANG 2016 Singapore Management University

Automated Bug Report Field Reassignment And Refinement Prediction, Xin Xia, David Lo, Emad Shihab, Xinyu Wang

Research Collection School Of Computing and Information Systems

Bug fixing is one of the most important activities in software development and maintenance. Bugs are reported, recorded, and managed in bug tracking systems such as Bugzilla. In general, a bug report contains many fields, such as product, component, severity, priority, fixer, operating system (OS), and platform, which provide important information for the bug triaging and fixing process. Our previous study finds that approximately 80% of bug reports have their fields reassigned and refined at least once, and bugs with reassigned and refined fields take more time to fix than bugs with no reassigned and refined fields. Thus, automatically predicting …


Incentive Mechanism Design For Heterogeneous Crowdsourcing Using All-Pay Contests, Tie LUO, Salil S. KANHERE, Sajal K. DAS, Hwee-Pink TAN 2016 Institute for InfoComm, Singapore

Incentive Mechanism Design For Heterogeneous Crowdsourcing Using All-Pay Contests, Tie Luo, Salil S. Kanhere, Sajal K. Das, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Many crowdsourcing scenarios are heterogeneous in the sense that, not only the workers' types (e.g., abilities, costs) are different, but the beliefs (probabilistic knowledge) about their respective types are also different. In this paper, we design an incentive mechanism for such scenarios using an asymmetric all-pay contest (or auction) model. Our design objective is an optimal mechanism, i.e., one that maximizes the crowdsourcing revenue minus cost. To achieve this, we furnish the contest with a prize tuple which is an array of reward functions for each potential winner (worker). We prove and characterize the unique equilibrium of this contest, and …


Probabilistic Models For Contextual Agreement In Preferences, Loc DO, Hady W. LAUW 2016 Singapore Management University

Probabilistic Models For Contextual Agreement In Preferences, Loc Do, Hady W. Lauw

Research Collection School Of Computing and Information Systems

The long-tail theory for consumer demand implies the need for more accurate personalization technologies to target items to the users who most desire them. A key tenet of personalization is the capacity to model user preferences. Most of the previous work on recommendation and personalization has focused primarily on individual preferences. While some focus on shared preferences between pairs of users, they assume that the same similarity value applies to all items. Here we investigate the notion of "context," hypothesizing that while two users may agree on their preferences on some items, they may also disagree on other items. To …


Tasker: Behavioral Insights Via Campus-Based Experimental Mobile Crowd-Sourcing, Thivya KANDAPPU, Nikita JAIMAN, Randy Tandriansyah DARATAN, Archan MISRA, Shih-Fen CHENG, Cen CHEN, Hoong Chuin LAU, Deepthi CHANDER, Koustuv DASGUPTA 2016 Singapore Management University

Tasker: Behavioral Insights Via Campus-Based Experimental Mobile Crowd-Sourcing, Thivya Kandappu, Nikita Jaiman, Randy Tandriansyah Daratan, Archan Misra, Shih-Fen Cheng, Cen Chen, Hoong Chuin Lau, Deepthi Chander, Koustuv Dasgupta

Research Collection School Of Computing and Information Systems

While mobile crowd-sourcing has become a game-changer for many urban operations, such as last mile logistics and municipal monitoring, we believe that the design of such crowdsourcing strategies must better accommodate the real-world behavioral preferences and characteristics of users. To provide a real-world testbed to study the impact of novel mobile crowd-sourcing strategies, we have designed, developed and experimented with a real-world mobile crowd-tasking platform on the SMU campus, called TA$Ker. We enhanced the TA$Ker platform to support several new features (e.g., task bundling, differential pricing and cheating analytics) and experimentally investigated these features via a two-month deployment of TA$Ker, …


Indoor Localization Via Multi-Modal Sensing On Smartphones, Han XU, Zheng YANG, Zimu ZHOU, Longfei SHANGGUAN, Ke YI, Yunhao LIU 2016 Singapore Management University

Indoor Localization Via Multi-Modal Sensing On Smartphones, Han Xu, Zheng Yang, Zimu Zhou, Longfei Shangguan, Ke Yi, Yunhao Liu

Research Collection School Of Computing and Information Systems

Indoor localization is of great importance to a wide range ofapplications in shopping malls, office buildings and publicplaces. The maturity of computer vision (CV) techniques andthe ubiquity of smartphone cameras hold promise for offering sub-meter accuracy localization services. However, pureCV-based solutions usually involve hundreds of photos andpre-calibration to construct image database, a labor-intensiveoverhead for practical deployment. We present ClickLoc, anaccurate, easy-to-deploy, sensor-enriched, image-based indoor localization system. With core techniques rooted insemantic information extraction and optimization-based sensor data fusion, ClickLoc is able to bootstrap with few images. Leveraging sensor-enriched photos, ClickLoc also enables user localization with a single photo of the …


Metaflow: A Scalable Metadata Lookup Service For Distributed File Systems In Data Centers, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, Haiyong XIE 2016 Singapore Management University

Metaflow: A Scalable Metadata Lookup Service For Distributed File Systems In Data Centers, Peng Sun, Yonggang Wen, Nguyen Binh Duong Ta, Haiyong Xie

Research Collection School Of Computing and Information Systems

In large-scale distributed file systems, efficient metadata operations are critical since most file operations have to interact with metadata servers first. In existing distributed hash table (DHT) based metadata management systems, the lookup service could be a performance bottleneck due to its significant CPU overhead. Our investigations showed that the lookup service could reduce system throughput by up to 70%, and increase system latency by a factor of up to 8 compared to ideal scenarios. In this paper, we present MetaFlow, a scalable metadata lookup service utilizing software-defined networking (SDN) techniques to distribute lookup workload over network components. MetaFlow tackles …


Ra2: Predicting Simulation Execution Time For Cloud-Based Design Space Explorations, Nguyen Binh Duong TA, Wentong CAI, Zengxiang LI, Suiping ZHOU 2016 Singapore Management University

Ra2: Predicting Simulation Execution Time For Cloud-Based Design Space Explorations, Nguyen Binh Duong Ta, Wentong Cai, Zengxiang Li, Suiping Zhou

Research Collection School Of Computing and Information Systems

Design space exploration refers to the evaluation of implementation alternatives for many engineering and design problems. A popular exploration approach is to run a large number of simulations of the actual system with varying sets of configuration parameters to search for the optimal ones. Due to the potentially huge resource requirements, cloud-based simulation execution strategies should be considered in many cases. In this paper, we look at the issue of running largescale simulation-based design space exploration problems on commercial Infrastructure-as-a-Service clouds, namely Amazon EC2, Microsoft Azure and Google Compute Engine. To efficiently manage cloud resources used for execution, the key …


A Reinforcement Learning Framework For Trajectory Prediction Under Uncertainty And Budget Constraint, Truc Viet LE, Siyuan LIU, Hoong Chuin LAU 2016 Singapore Management University

A Reinforcement Learning Framework For Trajectory Prediction Under Uncertainty And Budget Constraint, Truc Viet Le, Siyuan Liu, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

We consider the problem of trajectory prediction, where a trajectory is an ordered sequence of location visits and corresponding timestamps. The problem arises when an agent makes sequential decisions to visit a set of spatial locations of interest. Each location bears a stochastic utility and the agent has a limited budget to spend. Given the agent's observed partial trajectory, our goal is to predict the agent's remaining trajectory. We propose a solution framework to the problem that incorporates both the stochastic utility of each location and the budget constraint. We first cluster the agents into groups of homogeneous behaviors called …


When A Friend Online Is More Than A Friend In Life: Intimate Relationship Prediction In Microblogs, Yunshi LAN, Mengqi ZHANG, Feida ZHU, Jing JIANG, Ee-Peng LIM 2016 Singapore Management University

When A Friend Online Is More Than A Friend In Life: Intimate Relationship Prediction In Microblogs, Yunshi Lan, Mengqi Zhang, Feida Zhu, Jing Jiang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Microblogging services such as Twitter and Sina Weibo have been an important, if not indespensible, platform for people around the world to connect to one another. The rich content and user interactions on these platforms reveal insightful information about each user that are valuable for various real-life applications. In particular, user offline relationships, especially those intimate ones such as family members and couples, offer distinctive value for many business and social settings. In this study, we focus on using Sina Weibo to discover intimate offline relationships among users. The problem is uniquely interesting and challenging due to the difficulty in …


Control Flow Integrity Enforcement With Dynamic Code Optimization, Yan LIN, Xiaoxiao TANG, Debin GAO, Jianming FU 2016 Singapore Management University

Control Flow Integrity Enforcement With Dynamic Code Optimization, Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu

Research Collection School Of Computing and Information Systems

Control Flow Integrity (CFI) is an attractive security property with which most injected and code reuse attacks can be defeated, including advanced attacking techniques like Return-Oriented Programming (ROP). However, comprehensive enforcement of CFI is expensive due to additional supports needed (e.g., compiler support and presence of relocation or debug information) and performance overhead. Recent research has been trying to strike the balance among reasonable approximation of the CFI properties, minimal additional supports needed, and acceptable performance. We investigate existing dynamic code optimization techniques and find that they provide an architecture on which CFI can be enforced effectively and efficiently. In …


Soft Confidence-Weighted Learning, Jialei WANG, Peilin ZHAO, HOI, Steven C. H. 2016 University of Chicago

Soft Confidence-Weighted Learning, Jialei Wang, Peilin Zhao, Hoi, Steven C. H.

Research Collection School Of Computing and Information Systems

Online learning plays an important role in many big datamining problems because of its high efficiency and scalability. In theliterature, many online learning algorithms using gradient information havebeen applied to solve online classification problems. Recently, more effectivesecond-order algorithms have been proposed, where the correlation between thefeatures is utilized to improve the learning efficiency. Among them,Confidence-Weighted (CW) learning algorithms are very effective, which assumethat the classification model is drawn from a Gaussian distribution, whichenables the model to be effectively updated with the second-order informationof the data stream. Despite being studied actively, these CW algorithms cannothandle nonseparable datasets and noisy datasets very …


Detecting Community Pacemakers Of Burst Topic In Twitter, Guozhong DONG, Wu YANG, Feida ZHU, Wei WANG 2016 Harbin Engineering University

Detecting Community Pacemakers Of Burst Topic In Twitter, Guozhong Dong, Wu Yang, Feida Zhu, Wei Wang

Research Collection School Of Computing and Information Systems

Twitter has become one of largest social networks for users to broad-cast burst topics. Influential users usually have a large number of followers and play an important role in the diffusion of burst topic. There have been many studies on how to detect influential users. However, traditional influential users detection approaches have largely ignored influential users in user community. In this paper, we investigate the problem of detecting community pacemakers. Community pacemakers are defined as the influential users that promote early diffusion in the user community of burst topic. To solve this problem, we present DCPBT, a framework that can …


Trustworthy Authentication On Scalable Surveillance Video With Background Model Support, Zhuo WEI, Zheng YAN, Yongdong WU, Robert H. DENG 2016 Huawei's Shield Lab, Singapore

Trustworthy Authentication On Scalable Surveillance Video With Background Model Support, Zhuo Wei, Zheng Yan, Yongdong Wu, Robert H. Deng

Research Collection School Of Computing and Information Systems

H.264/SVC (Scalable Video Coding) codestreams, which consist of a single base layer and multiple enhancement layers, are designed for quality, spatial, and temporal scalabilities. They can be transmitted over networks of different bandwidths and seamlessly accessed by various terminal devices. With a huge amount of video surveillance and various devices becoming an integral part of the security infrastructure, the industry is currently starting to use the SVC standard to process digital video for surveillance applications such that clients with different network bandwidth connections and display capabilities can seamlessly access various SVC surveillance (sub)codestreams. In order to guarantee the trustworthiness and …


Microblogging Content Propagation Modeling Using Topic-Specific Behavioral Factors, Tuan Anh HOANG, Ee-peng LIM 2016 Singapore Management University

Microblogging Content Propagation Modeling Using Topic-Specific Behavioral Factors, Tuan Anh Hoang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

When a microblogging user adopts some content propagated to her, we can attribute that to three behavioral factors, namely, topic virality, user virality, and user susceptibility. Topic virality measures the degree to which a topic attracts propagations by users. User virality and susceptibility refer to the ability of a user to propagate content to other users, and the propensity of a user adopting content propagated to her, respectively. In this paper, we study the problem of mining these behavioral factors specific to topics from microblogging content propagation data. We first construct a three dimensional tensor for representing the propagation instances. …


Predicting Crashing Releases Of Mobile Applications, Xin XIA, Emad SHIHAB, Yasutaka KAMEI, David LO, Xinyu WANG 2016 Singapore Management University

Predicting Crashing Releases Of Mobile Applications, Xin Xia, Emad Shihab, Yasutaka Kamei, David Lo, Xinyu Wang

Research Collection School Of Computing and Information Systems

Context: The quality of mobile applications has a vital impact on their user's experience, ratings and ultimately overall success. Given the high competition in the mobile application market, i.e., many mobile applications perform the same or similar functionality, users of mobile apps tend to be less tolerant to quality issues. Goal: Therefore, identifying these crashing releases early on so that they can be avoided will help mobile app developers keep their user base and ensure the overall success of their apps. Method: To help mobile developers, we use machine learning techniques to effectively predict mobile app releases that are more …


Is Only One Gps Position Sufficient To Locate You To The Road Network Accurately?, Hao WU, Weiwei SUN, Baihua ZHENG 2016 Singapore Management University

Is Only One Gps Position Sufficient To Locate You To The Road Network Accurately?, Hao Wu, Weiwei Sun, Baihua Zheng

Research Collection School Of Computing and Information Systems

Locating only one GPS position to a road segment accurately is crucial to many location-based services such as mobile taxihailing service, geo-tagging, POI check-in, etc. This problem is challenging because of errors including the GPS errors and the digital map errors (misalignment and the same representation of bidirectional roads) and a lack of context information. To the best of our knowledge, no existing work studies this problem directly and the work to reduce GPS signal errors by considering hardware aspect is the most relevant. Consequently, this work is the first attempt to solve the problem of locating one GPS position …


Human-Centred Design For Silver Assistants, Zhiwei ZHENG, Di WANG, Ailiya BORJIGIN, Chunyan MIAO, Ah-hwee TAN, Cyril LEUNG 2016 Singapore Management University

Human-Centred Design For Silver Assistants, Zhiwei Zheng, Di Wang, Ailiya Borjigin, Chunyan Miao, Ah-Hwee Tan, Cyril Leung

Research Collection School Of Computing and Information Systems

To alleviate the rapidly increasing need of the healthcare workforce to serve the enormous ageing population, leveraging intelligent and autonomous caring agents is one promising way. Working towards the design and development of dedicated personal silver assistants for older adults, we follow the human-centred design approach. Specifically, we identify a number of human factors that affect the user experience of the older adults and develop an agent named Mobile Intelligent Silver Assistant (MISA) by applying these human factors. Integrating multiple reusable services onto one platform, MISA acts as a single point of contact while simultaneously providing easy and convenient access …


Fast Covariant Vlad For Image Search, Wan-Lei ZHAO, Chong-wah NGO, Hanzi WANG 2016 Singapore Management University

Fast Covariant Vlad For Image Search, Wan-Lei Zhao, Chong-Wah Ngo, Hanzi Wang

Research Collection School Of Computing and Information Systems

Vector of locally aggregated descriptor (VLAD) is a popular image encoding approach for its simplicity and better scalability over conventional bag-of-visual-word approach. In order to enhance its distinctiveness and geometric invariance, covariant VLAD (CVLAD) is proposed to pool local features based on their dominant orientations/characteristic scales, which leads to a geometric-aware representation. This representation achieves rotation/scale invariance when being associated with circular matching. However, the circular matching induces several times of computation overhead, which makes CVLAD hardly suitable for large-scale retrieval tasks. In this paper, the issue of computation overhead is alleviated by performing the circular matching in CVLAD's frequency …


Digital Commons powered by bepress