Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Series

2005

Discipline
Keyword
Publication

Articles 1 - 30 of 291

Full-Text Articles in Entire DC Network

Authenticating Query Results In Data Publishing, Di Ma, Robert H. Deng, Hwee Hwa Pang, Jianying Zhou Dec 2005

Authenticating Query Results In Data Publishing, Di Ma, Robert H. Deng, Hwee Hwa Pang, Jianying Zhou

Research Collection School Of Computing and Information Systems

We propose a communication-efficient authentication scheme to authenticate query results disseminated by untrusted data publishing servers. In our scheme, signatures of multiple tuples in the result set are aggregated into one and thus the communication overhead incurred by the signature keeps constant. Next attr-MHTs (tuple based Merkle Hash Tree) are built to further reduce the communication overhead incurred by auxiliary authentication information (AAI). Besides the property of communication-efficiency, our scheme also supports dynamic SET operations (UNION, INTERSECTION) and dynamic JOIN with immunity to reordering attack.


E-Government Capabilities And Crisis Management: Lessons From Combating Sars In Singapore, Shan Ling Pan, Gary Pan, Paul R. Devadoss Dec 2005

E-Government Capabilities And Crisis Management: Lessons From Combating Sars In Singapore, Shan Ling Pan, Gary Pan, Paul R. Devadoss

Research Collection School Of Accountancy

The city-state of Singapore has been highly ranked for its e-government services. Over the past two decades, it has leveraged its IT infrastructure for economic development and transformed its public services. The SARS outbreak in 2004 turned into a national health crisis because it spread rapidly and the medical community had little knowledge of how to treat the new mutation of the corona virus. Yet, several Singaporean government agencies utilized the e-Government infrastructure and related resources to quickly bring the outbreak under control. In particular, the government?s IT infrastructure streamlined communications, information exchange, and data flow, and significantly eased collaboration …


A Framework To Learn Bayesian Network From Changing, Multiple-Source Biomedical Data, Li G., Tze-Yun Leong Dec 2005

A Framework To Learn Bayesian Network From Changing, Multiple-Source Biomedical Data, Li G., Tze-Yun Leong

Research Collection School Of Computing and Information Systems

Structure learning in Bayesian network is a big issue. Many efforts have tried to solve this problem and quite a few algorithms have been proposed. However, when we attempt to apply the existing methods to microarray data, there are three main challenges: 1) there are many variables in the data set, 2) the sample size is small, and 3) microarray data are changing from experiment to experiment and new data are available quickly. To address these three problems, we assume that the major functions of a kind of cells do not change too much in different experiments, and propose a …


Webarc: Website Archival Using A Structured Approach, Ee Peng Lim, Maria Marissa Dec 2005

Webarc: Website Archival Using A Structured Approach, Ee Peng Lim, Maria Marissa

Research Collection School Of Computing and Information Systems

Website archival refers to the task of monitoring and storing snapshots of website(s) for future retrieval and analysis. This task is particularly important for websites that have content changing over time with older information constantly overwritten by newer one. In this paper, we propose WEBARC as a set of software tools to allow users to construct a logical structure for a website to be archived. Classifiers are trained to. determine relevant web pages and their categories, and subsequently used in website downloading. The archival schedule can be specified and executed by a scheduler. A website viewer is also developed to …


Tailored Watermarking Schemes For Authentication Of Electronic Clinical Atlases, Feng Bao, Robert H. Deng, Beng-Chin Ooi, Yanjiang Yang Dec 2005

Tailored Watermarking Schemes For Authentication Of Electronic Clinical Atlases, Feng Bao, Robert H. Deng, Beng-Chin Ooi, Yanjiang Yang

Research Collection School Of Computing and Information Systems

It is accepted that digital watermarking is quite relevant in medical imaging. However, due to the special nature of clinical practice, it is often required that watermarking not introduce irreversible distortions to medical images. The electronic clinical atlas has such a need of "lossless" watermarking. We present two tailored reversible watermarking schemes for the clinical atlas by exploiting its inherent characteristics. We have implemented the schemes and our experimental results look very promising.


Giving Users The Steering Wheel For Guiding Resource-Adaptive Systems, Joao Sousa, Rajesh Krishna Balan, Vahe Poladian, David Garlan, Mahadev Satyanarayanan Dec 2005

Giving Users The Steering Wheel For Guiding Resource-Adaptive Systems, Joao Sousa, Rajesh Krishna Balan, Vahe Poladian, David Garlan, Mahadev Satyanarayanan

Research Collection School Of Computing and Information Systems

Addressing resource variation plays an increasingly important role in engineering today's software systems. Research in resource-adaptive applications takes an important step towards addressing this problem. However, existing solutions stop short of addressing the fact that different user tasks often have specific goals of quality of service, and that such goals often entail multiple aspects of quality of service. This paper presents a framework for engineering software systems capable of adapting to resource variations in ways that are specific to the quality goals of each user task. For that, users are empowered to specify their task-specific preferences with respect to multiple …


The Internet And Civil Society: Environmental And Labour Organizations In Hong Kong, Yin-Wah Chu, James T. H. Tang Dec 2005

The Internet And Civil Society: Environmental And Labour Organizations In Hong Kong, Yin-Wah Chu, James T. H. Tang

Research Collection School of Social Sciences

To what extent has the Internet strengthened civil society? In which ways have civil society organizations (CSOs) used the internet to communicate their missions, enhance the discussion of public issues, extend networks and mobilize collective actions? This article seeks to answer these and related questions by reporting on an empirical study in Hong Kong. The study involves an analysis of the web pages launched by 14 environmental groups and 22 labour organizations on the one hand, and in-depth interviews with representatives of five of these organizations on the other. Due to the lack of resources and low level of e-readiness …


Natural Forum And The Elusive Significance Of Jurisdiction Agreements, Tiong Min Yeo Dec 2005

Natural Forum And The Elusive Significance Of Jurisdiction Agreements, Tiong Min Yeo

Research Collection Yong Pung How School Of Law

The Singapore court's power to stay its proceedings by reason of its not being the appropriate forum the proceedings ought not to be continued is underpinned by the common law principle enunciated in The Spiliada that generally a trial should be heard in its natural forum. The Rainbow Joy adds significantly to Singapore law on forum non conveniens on two important points. First, it establishes that it is not necessary to show that the alternative forum abroad is constituted as a court of law. Secondly, the case establishes that whether there is a defense claim on the merits is an …


Review Of Unity Of Knowledge And Action: Toward A Nonrepresentational Theory Of Knowledge, Sor-Hoon Tan Dec 2005

Review Of Unity Of Knowledge And Action: Toward A Nonrepresentational Theory Of Knowledge, Sor-Hoon Tan

Research Collection School of Social Sciences

The title of this book is inspired by the Neo-Confucian scholar, Wang Yangming (1472-1529). However, the volume is not devoted solely to Wang Yangming's philosophy about the unity of knowledge and action. Wang is only one of several thinkers brought into this philosophical conversation and does not even receive the most attention (Richard Rorty has that honor). The conver- sation is interesting and occasionally illuminating, although one is not sure at the end whether it is moving toward one particular nonrepresentation theory of knowledge or whether the conversation partners who share an aversion to representational theories might disagree profoundly about …


Cultural Crossings Against Ethnocentric Currents: Toward A Confucian Ethics Of Communicative Virtues, Sor-Hoon Tan Dec 2005

Cultural Crossings Against Ethnocentric Currents: Toward A Confucian Ethics Of Communicative Virtues, Sor-Hoon Tan

Research Collection School of Social Sciences

Despite contemporary Confucianism's aspirations to be a world philosophy, there is an ethnocentric strand within the Confucian tradition, most glaringly exemplified in Han Yu's attacks on Buddhism. This paper re-assesses Confucian ethnocentrism in the context of contrary practices that indicate a more pragmatic attitude among Confucians toward cross-cultural interactions. It argues that while the ethnocentric tendency serves as constant reminder of the need for vigilance, and recognition of the difficulties of crossing cultural boundaries, there are nevertheless resources within Confucianism for constructing an ethics of communication that is urgently needed to deal with the moral problems of cultural pluralism. The …


Matrix: Adaptive Middleware For Distributed Multiplayer Games, Rajesh Krishna Balan, Maria Ebling, Paul Castro, Archan Misra Dec 2005

Matrix: Adaptive Middleware For Distributed Multiplayer Games, Rajesh Krishna Balan, Maria Ebling, Paul Castro, Archan Misra

Research Collection School Of Computing and Information Systems

Building a distributed middleware infrastructure that provides the low latency required for massively multiplayer games while still maintaining consistency is non-trivial. Previous attempts have used static partitioning or client-based peer-to-peer techniques that do not scale well to a large number of players, perform poorly under dynamic workloads or hotspots, and impose significant programming burdens on game developers. We show that it is possible to build a scalable distributed system, called Matrix, that is easily usable by game developers. We show experimentally that Matrix provides good performance, especially when hotspots occur.


A Block Oriented Fingerprinting Scheme In Relational Database, Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao Dec 2005

A Block Oriented Fingerprinting Scheme In Relational Database, Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao

Research Collection School Of Computing and Information Systems

The need for protecting rights over relational data is of ever increasing concern. There have recently been some pioneering works in this area. In this paper, we propose an effective fingerprinting scheme based on the idea of block method in the area of multimedia fingerprinting. The scheme ensures that certain bit positions of the data contain specific values. The bit positions are determined by the keys known only to the owner of the data and different buyers of the database have different bit positions and different specific values for those bit positions. The detection of the fingerprint can be completed …


Cryptanalysis Of A Forward Secure Blind Signature Scheme With Provable Security, Shuhong Wang, Feng Bao, Robert H. Deng Dec 2005

Cryptanalysis Of A Forward Secure Blind Signature Scheme With Provable Security, Shuhong Wang, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

A forward secure blind signature scheme was proposed by Duc, Cheon and Kim, in ICICS 2003. The security of the scheme was proved to be equivalent to the strong RSA assumption in the random oracle model. In this paper we present an attack to the scheme by forging valid signatures with public keys only. The attack is so efficient that forging a valid signature needs less computation than legally generating a signature, even considering only the user side. Our result implies that the security proof of the scheme must be invalid. Furthermore we point out the fault of the proof …


Consumer Preferences For High-Tech Product Forms: Converged Or Separate? Evolution Of Technology & Reversal Of Preferences, Jin K. Han, Seh-Woong Chung, Seok Sohn Yong Dec 2005

Consumer Preferences For High-Tech Product Forms: Converged Or Separate? Evolution Of Technology & Reversal Of Preferences, Jin K. Han, Seh-Woong Chung, Seok Sohn Yong

Research Collection Lee Kong Chian School Of Business

With the surging popularity and growing availability of convergence products (e.g., camera phones, all-in-one PDAs) in high-tech product categories, consumers now face another dilemma in their purchase consideration: which product form converged, stand-alone, or both? This study sets out to investigate pattern(s) of consumer preferences for product form along the evolution of technology trajectories. In two experiments, we find that, at low levels of technological performance, consumers show an overwhelming preference for the converged product form over the dedicated counterpart; whereas, at a higher technological performance level, the pattern of preferences is reversed. Furthermore, we observe that a preannouncement of …


Using Community Service Projects To Teach Leadership And Team-Building: Theoretical Foundations, Students' Reactions And Practical Considerations, Gilbert Tan Dec 2005

Using Community Service Projects To Teach Leadership And Team-Building: Theoretical Foundations, Students' Reactions And Practical Considerations, Gilbert Tan

Research Collection Lee Kong Chian School Of Business

This paper discusses the theoretical foundations of utilizing Community Service Project (CSP) or service-learning to teach Leadership and Team-Building. It examines the students’ reactions to this innovative method of instruction. This is done through conducting a content analysis of students’ learning journals, in which students reflect on their CSP learning experiences. Two themes emerged from the data: (a) variety of learning experiences, and (b) impact of CSP experience. The data suggested that students derived a variety of learning experiences from the CSP. In addition, there were attitudinal and learning impacts associated with the CSP experiences. The paper also outlines some …


A Grapheme To Phoneme Converter For Standard Malay, Haizhou Li, Mahani Aljunied, Boon Seong Teoh Dec 2005

A Grapheme To Phoneme Converter For Standard Malay, Haizhou Li, Mahani Aljunied, Boon Seong Teoh

Research Collection Lee Kong Chian School Of Business

This paper describes the process of creating a grapheme-to-phoneme (G2P) converter for Standard Malay (SM). A fundamental step to building TTS and ASR engines, is to build a good G2P system that can automatically generate accurate phonemic representations for words. Our goal is to generate phonemes that reflect real speech, thereby facilitating more accurate phoneme alignment with actual waveforms (obtained from voice-data collection), keeping human intervention to the minimum. Here we discuss the key areas in SM that require considerable phonemic alterations including letter elisions, consonant insertions, multiple ways of uttering a letter/diagraph – areas that any good G2P system …


Sequential Aggregate Signatures Working Over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei Zhu, Feng Bao, Robert H. Deng Dec 2005

Sequential Aggregate Signatures Working Over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei Zhu, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

The contribution of this paper has two folds. In the first fold, we propose a generic construction of sequential aggregate signatures from families of certificated trapdoor one-way permutations. We show that our construction is provably secure in the random oracle model assuming that the underlying homomorphic permutations are trapdoor one-way. Compared to Lysyanskaya et al’s generic construction that is constructed from a trapdoor one-way permutation family working over the same domain [16], our scheme works over independent trapdoor one-way permutation domains. The flexible choice of the underlying permutation domains benefits our scheme to its applications in the real world where …


An Efficient And Robust Computational Framework For Studying Lifetime And Information Capacity In Sensor Networks, Enrique J. Duarte-Melo, Mingyan Liu, Archan Misra Dec 2005

An Efficient And Robust Computational Framework For Studying Lifetime And Information Capacity In Sensor Networks, Enrique J. Duarte-Melo, Mingyan Liu, Archan Misra

Research Collection School Of Computing and Information Systems

In this paper we investigate the expected lifetime and information capacity, defined as the maximum amount of data (bits) transferred before the first sensor node death due to energy depletion, of a data-gathering wireless sensor network. We develop a fluid-flow based computational framework that extends the existing approach, which requires precise knowledge of the layout/deployment of the network, i.e., exact sensor positions. Our method, on the other hand, views a specific network deployment as a particular instance (sample path) from an underlying distribution of sensor node layouts and sensor data rates. To compute the expected information capacity under this distribution-based …


A Generic Object-Oriented Tabu Search Framework, Hoong Chuin Lau, Xiaomin Jia, Wee Chong Wan Dec 2005

A Generic Object-Oriented Tabu Search Framework, Hoong Chuin Lau, Xiaomin Jia, Wee Chong Wan

Research Collection School Of Computing and Information Systems

Presently, most tabu search designers devise their applications without considering the potential of design and code reuse, which consequently prolong the development of subsequent applications. In this paper, we propose a software solution known as Tabu Search Framework (TSF), which is a generic C++ software framework for tabu search implementation. The framework excels in code recycling through the use of a well- designed set of generic abstract classes that clearly define their collaborative roles in the algorithm. Additionally, the framework incorporates a centralized process and control mechanism that enhances the search with intelligence. This results in a generic framework that …


New Efficient Mds Array Codes For Raid Part Ii: Rabin-Like Codes For Tolerating Multiple (>=4) Disk Failures, Gui-Liang Feng, Robert H. Deng, Feng Bao Dec 2005

New Efficient Mds Array Codes For Raid Part Ii: Rabin-Like Codes For Tolerating Multiple (>=4) Disk Failures, Gui-Liang Feng, Robert H. Deng, Feng Bao

Research Collection School Of Computing and Information Systems

A new class of Binary Maximum Distance Separable (MDS) array codes which are based on circular permutation matrices are introduced in this paper. These array codes are used for tolerating multiple (greater than or equal to 4) disk failures in Redundant Arrays of Inexpensive Disks (RAID) architecture. The size of the information part is m \times n, where n is the number of information disks and (m+1) is a prime integer; the size of the parity-check part is m \times r, the minimum distance is r+1, and the number of parity-check disks is r. In practical applications, m can be …


Integration Of Probabilistic Graphic Models For Decision Support, Jiang C., Poh K., Tze-Yun Leong Dec 2005

Integration Of Probabilistic Graphic Models For Decision Support, Jiang C., Poh K., Tze-Yun Leong

Research Collection School Of Computing and Information Systems

It is a frequently encountered problem that new knowledge arrived when making decisions in a dynamic world. Usually, domain experts cannot afford enough time and knowledge to effectively assess and combine both qualitative and quantitative information in these models. Existing approaches can solve only one of two tasks instead of both. We propose a four-step algorithm to integrate multiple probabilistic graphic models, which can effectively update existing models with newly acquired models. In this algorithm, the qualitative part of model integration is performed first, followed by the quantitative combination. We illustrate our method with an example of combining three models. …


Examining The Relationship Between Employer Knowledge Dimensions And Organizational Attractiveness: An Application In A Military Context, Filip Lievens, Greet Van Hoye, Bert Schreurs Dec 2005

Examining The Relationship Between Employer Knowledge Dimensions And Organizational Attractiveness: An Application In A Military Context, Filip Lievens, Greet Van Hoye, Bert Schreurs

Research Collection Lee Kong Chian School Of Business

This study uses Cable and Turban's (2001) employer knowledge framework as a conceptual model to formulate hypotheses about a broad range of possible factors affecting the attractiveness of an organization (i.e. armed forces) among potential applicants (576 high-school seniors). Results show that gender, familiarity with military organizations, perceptions of job and organizational attributes (task diversity and social/team activities), and trait inferences (excitement, prestige, and cheerfulness) explained potential applicants' attraction to military organizations. Relative importance analyses showed that trait inferences contributed most to the variance, followed by job and organizational attributes, and employer familiarity. Finally, we found some evidence of interactions …


Fostering Total Wellness Through Peer Helping: Reflections On The Smu Experiences, Gilbert Tan, Timothy Hsi Dec 2005

Fostering Total Wellness Through Peer Helping: Reflections On The Smu Experiences, Gilbert Tan, Timothy Hsi

Research Collection Lee Kong Chian School Of Business

Peer Helping is widely implemented in Colleges and Universities in the United States and Canada. Despite the popularity of these programs, very little has been researched on peer helping in the Asian context. This paper traces the theoretical foundations of peer helping and the nascent development of a peer helping program in the Singapore Management University and how this program has developed since the beginning of 2004. The initial focus of the program was based on the model of paraprofessional student counselors assisting their fellow peers through difficult moments in their lives. Over time, the program was fine-tuned to embrace …


Retest Effects In Operational Selection Settings: Development And Test Of A Framework, Filip Lievens, Tine Buyse, Paul R. Sackett Dec 2005

Retest Effects In Operational Selection Settings: Development And Test Of A Framework, Filip Lievens, Tine Buyse, Paul R. Sackett

Research Collection Lee Kong Chian School Of Business

This study proposes a framework for examining the effects of retaking tests in operational selection settings. A central feature of this framework is the distinction between within-person and between-person retest effects. This framework is used to develop hypotheses about retest effects for exemplars of 3 types of tests (knowledge tests, cognitive ability tests, and situational judgment tests) and to test these hypotheses in a high stakes selection setting (admission to medical studies in Belgium). Analyses of within-person retest effects showed that mean scores of repeat test takers were one-third of a standard deviation higher for the knowledge test and situational …


Accounting Conservatism And Managerial Incentives, Young Koan Kwon Nov 2005

Accounting Conservatism And Managerial Incentives, Young Koan Kwon

Research Collection School Of Accountancy

There are two sources of agency costs under moral hazard: (1) distortions in incentive contracts and (2) implementation of suboptimal decisions. In the accounting literature, the relation between conservative accounting and agency costs of type (1) has received considerable attention (cf. Watts 2002). However, little appears to be known about the effects of accounting conservatism on agency costs of type (2) or trade-offs between agency costs of types (1) and (2). The purpose of this study is to examine this void. In a principal-agent setting in which the principal motivates the agent to expend effort using accounting earnings, this study …


China's Changing Economic Structures And Its Implications For Regional Patterns Of Trade Production And Integration, Kim Song Tan, Hoe Ee Khor Nov 2005

China's Changing Economic Structures And Its Implications For Regional Patterns Of Trade Production And Integration, Kim Song Tan, Hoe Ee Khor

Research Collection School Of Economics

There is tremendous momentum for economic and financial integration in East Asia today. Partly inspired by the formation of the European Union and partly as a response to the 1997/98 Asia financial crisis, many East Asian countries are showing greater commitment to regional economic cooperation. A number of bilateral free trade agreements (FTAs) have either been concluded or are being negotiated.1 At a less formal level, the ASEAN+3 grouping has brought the whole region together in regular consultations over trade, investment, as well as monetary and exchange rate policy matters.


Multiracialism Engineered: The Limits Of Electoral And Spatial Integration In Singapore, Eugene K. B. Tan Nov 2005

Multiracialism Engineered: The Limits Of Electoral And Spatial Integration In Singapore, Eugene K. B. Tan

Research Collection Yong Pung How School Of Law

This paper examines Singapore's innovations in electoral and spatial integration. In examining the Group Representation Constituency and the Ethnic Integration Policy, a critique is made of the official discourse that multiracialism is internalized and entrenched in Singapore's political psyche and electoral process. While the electoral and spatial integration policies are driven by the objective of enhancing multiracialism, their actual workings do not adequately advance the development of norms and values that would be truly supportive of the need for a multiracial legislature and an abiding commitment to multiracialism. The layering of the electoral system with other political objectives, such as …


Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik Nov 2005

Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik

Research Collection Yong Pung How School Of Law

There is a need for Singapore bloggers to be aware of legal issues arising from their online diaries, particularly in the light of the recent cases involving seditious remarks made online by bloggers that resulted in jail terms and fines; and earlier in the year, a dispute arose over allegedly defamatory speeches made by a blogger about A*STAR’s Chairman, Philip Yeo, which was resolved amicably, but not without an apology. The threats of legal repercussions in the form of civil lawsuits and criminal charges serve as reminders of the potential legal problems that can arise from blogging, and indeed from …


Globalisation And Urban Crime: Mean Streets Or Lost Suburbs, Mark Findlay Nov 2005

Globalisation And Urban Crime: Mean Streets Or Lost Suburbs, Mark Findlay

Research Collection Yong Pung How School Of Law

This parer introduces notions of contemporary globalisation and the manner in which crime and glotalisation interrelate. In particular, the importance of analysing crime and control at both local and global levels is emphasised. Issues of crime and space are addressed in the context of urbanisation. The tendencies of the city to marginalise, and the consequential criminal outcomes from this environment of modernisation (and the modem city) are discussed. Urban planning has had a crucial part to play in humanising and at the same time distinguishing the global push towards urbanisation, and crime prevention is now a recognised feature of globalised …


Anonymous Dos-Resistant Access Control Protocol Using Passwords For Wireless Networks, Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda Nov 2005

Anonymous Dos-Resistant Access Control Protocol Using Passwords For Wireless Networks, Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda

Research Collection School Of Computing and Information Systems

Wireless networks have gained overwhelming popularity over their wired counterpart due to their great flexibility and convenience, but access control of wireless networks has been a serious problem because of the open medium. Passwords remain the most popular way for access control as well as authentication and key exchange. But existing password-based access control protocols are not satisfactory in that they do not provide DoS-resistance or anonymity. In this paper we analyze the weaknesses of an access control protocol using passwords for wireless networks in IEEE LCN 2001, and propose a different access control protocol using passwords for wireless networks. …