Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Series

2016

Discipline
Keyword
Publication
File Type

Articles 1 - 30 of 941

Full-Text Articles in Entire DC Network

Ajit Singh [Malyasia, Asean Secretary-General, Diplomat], Ajit Singh Dec 2016

Ajit Singh [Malyasia, Asean Secretary-General, Diplomat], Ajit Singh

Digital Narratives of Asia

After thirty years as a career diplomat, Malaysia's first ASEAN Secretary-General Ajit Singh, sees his five-year term as the most productive, golden years of his life. He speaks to DNA about the challenges he faced with admitting Myanmar to ASEAN, and the visionary ASEAN leadership. He also expounds on the differences in impacts of work between an ambassador and a bureaucrat.


From Ranganathan To Amazon: Are We There Yet?, Gulcin Cribb Dec 2016

From Ranganathan To Amazon: Are We There Yet?, Gulcin Cribb

Research Collection Library

No abstract provided.


Free Articles And Accounting For The Timing Effect, Nursyeha Yahaya, Chee Hsien Aaron (Zheng Zhixian) Tay Dec 2016

Free Articles And Accounting For The Timing Effect, Nursyeha Yahaya, Chee Hsien Aaron (Zheng Zhixian) Tay

Research Collection Library

Various studies have attempted to assess the amount of free full text available on the web and recent work have suggested that we are close to the 50% mark for freely available articles (Archambault et al. 2013; Bjork et al. 2010; Jamali and Nabavi 2015). It is natural to wonder if this might reduce researchers' reliance on library subscriptions for access. To do so, we need to determine not just what papers researchers are citing to that are free today, but to estimate if the papers they were citing were freely available at the time they were citing it. We …


Shrinkage Estimation Of Regression Models With Multiple Structural Changes, Junhai Qian, Liangjun Su Dec 2016

Shrinkage Estimation Of Regression Models With Multiple Structural Changes, Junhai Qian, Liangjun Su

Research Collection School Of Economics

In this paper, we consider the problem of determining the number of structural changes in multiple linear regression models via group fused Lasso. We show that with probability tending to one, our method can correctly determine the unknown number of breaks, and the estimated break dates are sufficiently close to the true break dates. We obtain estimates of the regression coefficients via post Lasso and establish the asymptotic distributions of the estimates of both break ratios and regression coefficients. We also propose and validate a data-driven method to determine the tuning parameter. Monte Carlo simulations demonstrate that the proposed method …


Weak Convergence To Stochastic Integrals For Econometric Applications, Hanying Liang, Peter C. B. Phillips, Hanchao Wang, Qiying Wang Dec 2016

Weak Convergence To Stochastic Integrals For Econometric Applications, Hanying Liang, Peter C. B. Phillips, Hanchao Wang, Qiying Wang

Research Collection School Of Economics

Limit theory involving stochastic integrals is now widespread in time series econometrics and relies on a few key results on functional weak convergence. In establishing such convergence, the literature commonly uses martingale and semimartingale structures. While these structures have wide relevance, many applications involve a cointegration framework where endogeneity and nonlinearity play major roles and complicate the limit theory. This paper explores weak convergence limit theory to stochastic integral functionals in such settings. We use a novel decomposition of sample covariances of functions of I (1) and I (0) time series that simplifies the asymptotics and our limit results for …


Panel Data Models With Interactive Fixed Effects And Multiple Structural Breaks, Degui Li, Junhui Qian, Liangjun Su Dec 2016

Panel Data Models With Interactive Fixed Effects And Multiple Structural Breaks, Degui Li, Junhui Qian, Liangjun Su

Research Collection School Of Economics

In this article, we consider estimation of common structural breaks in panel data models with unobservable interactive fixed effects. We introduce a penalized principal component (PPC) estimation procedure with an adaptive group fused LASSO to detect the multiple structural breaks in the models. Under some mild conditions, we show that with probability approaching one the proposed method can correctly determine the unknown number of breaks and consistently estimate the common break dates. Furthermore, we estimate the regression coefficients through the post-LASSO method and establish the asymptotic distribution theory for the resulting estimators. The developed methodology and theory are applicable to …


Endogenous Quality Choice, Signaling, And Welfare, Gea M. Lee, Seung Han Yoo Dec 2016

Endogenous Quality Choice, Signaling, And Welfare, Gea M. Lee, Seung Han Yoo

Research Collection School Of Economics

We consider a model in which each worker endogenously selects his own type through aprivate investment decision and selects a public signal in the labor market. Signaling thencontributes to social welfare through its influence on the quality choice. We offer a rationalefor the argument that there are too many high-type workers from a welfare perspective,identifying circumstances under which separating equilibrium generates too many high-typeworkers while having to use the incentive-compatible signal and treat high-type workersdifferently in the market. The inefficiency can then be reduced in pooling equilibrium.


Online Detection Of Behavioral Change Using Unobtrusive Eldercare Monitoring System, Thanh Tam La, Alvin Cerdena Valera, Hwee-Pink Tan, Cheryl Li Fang Koh Dec 2016

Online Detection Of Behavioral Change Using Unobtrusive Eldercare Monitoring System, Thanh Tam La, Alvin Cerdena Valera, Hwee-Pink Tan, Cheryl Li Fang Koh

Research Collection School Of Computing and Information Systems

The rapid ageing population is posing challenges to many countries all over the world, particularly in the provision of care to the growing number of elderly who are living alone. Allowing the elderly to age-in-place, i.e., live safely and independently in the comfort of their own homes is a model that can potentially address the resource constraint in health and community care faced by many nations. To make this model a reality and provide appropriate and timely care to the elderly, unobtrusive eldercare monitoring systems (EMS) are being deployed in real homes to continuously monitor the activity of the elderly. …


An Agent-Based Approach To Human Migration Movement, Larry Lin, Kathleen M. Carley, Shih-Fen Cheng Dec 2016

An Agent-Based Approach To Human Migration Movement, Larry Lin, Kathleen M. Carley, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

How are the populations of the world likely to shift? Which countries will be impacted by sea-level rise? This paper uses a country-level agent-based dynamic network model to examine shifts in population given network relations among countries, which influences overall population change. Some of the networks considered include: alliance networks, shared language networks, economic influence networks, and proximity networks. Validation of model is done for migration probabilities between countries, as well as for country populations and distributions. The proposed framework provides a way to explore the interaction between climate change and policy factors at a global scale.


‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap Dec 2016

‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap

Research Collection School Of Computing and Information Systems

This paper reports experiences made at an Asian university in developing a social media platform based on Twitter in the context of a final year capstone project where information systems management students get an opportunity to solve ‘a real-world problem for a real client’. In this case study, the challenge was provided by a faculty member’s request for an interactive social media application which engages less outspoken students in class via a social medium they are familiar with: Twitter. We reconstruct the project’s evolution; describe the main features of the application called ‘TweetBoard’ and share lessons learned in developing a …


Pairwise Relation Classification With Mirror Instances And A Combined Convolutional Neural Network, Jianfei Yu, Jing Jiang Dec 2016

Pairwise Relation Classification With Mirror Instances And A Combined Convolutional Neural Network, Jianfei Yu, Jing Jiang

Research Collection School Of Computing and Information Systems

Relation classification is the task of classifying the semantic relations between entity pairs in text. Observing that existing work has not fully explored using different representations for relation instances, especially in order to better handle the asymmetry of relation types, in this paper, we propose a neural network based method for relation classification that combines the raw sequence and the shortest dependency path representations of relation instances and uses mirror instances to perform pairwise relation classification. We evaluate our proposed models on two widely used datasets: SemEval-2010 Task 8 and ACE-2005. The empirical results show that our combined model together …


From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan Dec 2016

From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan

Research Collection School Of Computing and Information Systems

With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social …


Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan Dec 2016

Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Automatically identifying characters in movies has attracted researchers' interest and led to several significant and interesting applications. However, due to the vast variation in character appearance as well as the weakness and ambiguity of available annotation, it is still a challenging problem. In this paper, we investigate this problem with the supervision of actor-character name correspondence provided by the movie cast. Our proposed framework, namely, Cast2Face, is featured by: 1) we restrict the assigned names within the set of character names in the cast; 2) for each character, by using the corresponding actor and movie name as keywords, we retrieve …


Ciphertext-Policy Attribute-Based Encryption With Partially Hidden Access Structure And Its Application To Privacy-Preserving Electronic Medical Record System In Cloud Environment, Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li Dec 2016

Ciphertext-Policy Attribute-Based Encryption With Partially Hidden Access Structure And Its Application To Privacy-Preserving Electronic Medical Record System In Cloud Environment, Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li

Research Collection School Of Computing and Information Systems

With the development of cloud computing, more and more sensitive data are uploaded to cloud by companies or individuals, which brings forth new challenges for outsourced data security and privacy. Ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control of encrypted data in the cloud; in a CP-ABE scheme, an access structure, also referred to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains a ciphertext can know the access structure associated with the ciphertext. In certain applications, access structures contain very sensitive information and must be protected from everyone except the users whose private key attributes …


Semi-Automated Tool For Providing Effective Feedback On Programming Assignments, Min Yan Beh, Swapna Gottipati, David Lo, Venky Shankararaman Dec 2016

Semi-Automated Tool For Providing Effective Feedback On Programming Assignments, Min Yan Beh, Swapna Gottipati, David Lo, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Human grading of introductory programming assignments is tedious and error-prone, hence researchers have attempted to develop tools that support automatic assessment of programming code. However, most such efforts often focus only on scoring solutions, rather than assessing whether students correctly understand the problems. To aid the students improve programming skills, effective feedback on programming assignments plays an important role. Individual feedback generation is tedious and painstaking process. We present a tool that not only automatically generates the static and dynamic program analysis outcomes, but also clusters similar code submissions to provide scalable and effective feedback to the students. We studied …


2016 – A Tumultuous Year Of The Revolt Against The Elites, Tan K. B. Eugene Dec 2016

2016 – A Tumultuous Year Of The Revolt Against The Elites, Tan K. B. Eugene

Research Collection Yong Pung How School Of Law

In a commentary, SMU Associate Professor of Law Eugene Tan noted that 2016 will probably be remembered as the year of the populist revolt against the elites, against the backdrop of bewildering disruptions and an abiding sense of displacement and control accentuated by technological advancements. He highlighted that the critical challenge is to bring trust back into the core of the relationship between those in power and the masses, adding that governments need to purposively deal with people's resentments, fury and fears.


The Potential Collapse Of The Tpp: Implications For Asean, Henry S. Gao Dec 2016

The Potential Collapse Of The Tpp: Implications For Asean, Henry S. Gao

Research Collection Yong Pung How School Of Law

Asia has the most to lose in the event of a collapse of the Trans-Pacific Partnership (TPP) given the importance of trade to growth performance for the region’s economies, and that a third of the TPP members are also part of the Association of Southeast Asian Nations (ASEAN).


Orienteering Problem: A Survey Of Recent Variants, Solution Approaches And Applications, Aldy Gunawan, Hoong Chuin Lau, Pieter Vansteenwegen Dec 2016

Orienteering Problem: A Survey Of Recent Variants, Solution Approaches And Applications, Aldy Gunawan, Hoong Chuin Lau, Pieter Vansteenwegen

Research Collection School Of Computing and Information Systems

The Orienteering Problem (OP) has received a lot of attention in the past few decades. The OP is a routing problem in which the goal is to determine a subset of nodes to visit, and in which order, so that the total collected score is maximized and a given time budget is not exceeded. A number of typical variants has been studied, such as the Team OP, the (Team) OP with Time Windows and the Time Dependent OP. Recently, a number of new variants of the OP was introduced, such as the Stochastic OP, the Generalized OP, the Arc OP, …


Understanding The Law Of Torts In China: A Political Economy Perspective, Wei Zhang Dec 2016

Understanding The Law Of Torts In China: A Political Economy Perspective, Wei Zhang

Research Collection Yong Pung How School Of Law

In this paper, I tried to connect the text of the Chinese tort law with the institutional context of lawmaking in China from a political economy perspective. Two determinants, political influence and populist pressure, were identified for the tort law legislation in China, and a simple spatial model was presented to demonstrate the mechanism through which these determinants might have affected the text of the law. In particular, my research suggested that, when injurers’ political influence kept constant, the populist pressure on the injurer group tended to push the tort law rules toward the pro-victim end. On the contrary, with …


The Use Of Scenarios In Legal Education To Develop Futures Thinking And Sustainability Competencies, Michelle Mei Ling Lim, Andrew Allan Dec 2016

The Use Of Scenarios In Legal Education To Develop Futures Thinking And Sustainability Competencies, Michelle Mei Ling Lim, Andrew Allan

Research Collection Yong Pung How School Of Law

Achieving sustainability requires a populace equipped to deal with complex, interacting and ever-changing realities as well as uncertain futures. There is however a significant lack of focus on developing sustainability competencies within legal and governance education. Legal education plays a key role in shaping sustainable futures. Long-term sustainability relies on lawyers, judges and policy-makers being able to make optimal decisions in the present when faced with significant uncertainty about the future. This paper discusses how the combination of problem-based learning (PBL) and scenario-based pedagogical approaches can provide an authentic contextualised learning environment to empower law students to deal with the …


Metroeye: Smart Tracking Your Metro Rips Underground, Weixi Gu, Ming Jin, Zimu Zhou, Costas J. Spanos, Lin Zhang Dec 2016

Metroeye: Smart Tracking Your Metro Rips Underground, Weixi Gu, Ming Jin, Zimu Zhou, Costas J. Spanos, Lin Zhang

Research Collection School Of Computing and Information Systems

Metro has become the first choice of traveling for tourists and citizens in metropolis due to its efficiency and convenience. Yet passengers have to rely on metro broadcasts to know their locations because popular localization services (e.g. GPS and wireless localization technologies) are often inaccessible underground. To this end, we propose MetroEye, an intelligent smartphone-based tracking system for metro passengers underground. MetroEye leverages low-power sensors embedded in modern smartphones to record ambient contextual features, and infers the state of passengers (Stop, Running, and Interchange) during an entire metro trip using a Conditional Random Field (CRF) model. MetroEye further provides arrival …


Increase In Takeover Protection And Firm Knowledge Accumulation Strategy, Heli Wang, Shan Zhao, Jinyu He Dec 2016

Increase In Takeover Protection And Firm Knowledge Accumulation Strategy, Heli Wang, Shan Zhao, Jinyu He

Research Collection Lee Kong Chian School Of Business

Research summary: We argue that the extent to which a firm faces takeover threats affects its knowledge structure. In particular, takeover threats may lead to managers' reluctance to adopt a strategy toward firm-specific knowledge accumulation because implementing this strategy requires them to acquire specialized skills, which are at risk under takeover threats. Conversely, takeover protection leads to an increase in firm-specific knowledge. Further, the relationship between takeover protection and firm-specific knowledge is positively moderated by managerial ownership, which helps align managerial interests with those of shareholders. But the relationship is negatively moderated by managerial tenure, as long-tenured managers have already …


Limited Attention, Marital Events And Hedge Funds, Yan Lu, Sugata Ray, Melvyn Teo Dec 2016

Limited Attention, Marital Events And Hedge Funds, Yan Lu, Sugata Ray, Melvyn Teo

Research Collection Lee Kong Chian School Of Business

We explore the impact of limited attention by analyzing the performance of hedge fund managers who are distracted by marital events. We find that marriages and divorces are associated with significantly lower fund alpha, during the six-month period surrounding and the two-year period after the event. Busy managers who manage multiple funds and who are not part of a team are more affected by marital transitions. Inattentive managers place fewer active bets relative to their style peers, load more on index stocks, exhibit higher R-squareds with respect to systematic factors, and are more prone to the disposition effect.


Appointment Systems Under Service Level Constraints, David Chen, Rowan Wang, Zhenzhen Yan, Saif Benjaafar, Oualid Jouini Dec 2016

Appointment Systems Under Service Level Constraints, David Chen, Rowan Wang, Zhenzhen Yan, Saif Benjaafar, Oualid Jouini

Research Collection Lee Kong Chian School Of Business

We consider a new model of appointment scheduling where customers are given the earliest possible appointment times under the service level constraint that the expected waiting time of each individual customer cannot exceed a given threshold. We apply the theory of majorization to analytically characterize the structure of the optimal appointment schedule. We show that, the optimal inter-appointment times increase with the order of arrivals. That is, the optimal inter-arrival time between two customers later in the arrival process is longer than that between two customers earlier in the arrival process. We study the limiting behavior of our system, and …


All In The Family: Economies Of Scale In Retail And Institutional Investment Management, Darwin Choi, Xi Li, Tong Yao, Zhe Zhang Dec 2016

All In The Family: Economies Of Scale In Retail And Institutional Investment Management, Darwin Choi, Xi Li, Tong Yao, Zhe Zhang

Research Collection Lee Kong Chian School Of Business

This paper examines the (dis)economies of scale related to the joint management of retail mutual funds and institutional funds (i.e., investment portfolios catering to institutional clients). Similar to well-known observations for mutual funds, the performance of institutional funds is negatively related to fund size but positively related to fund family size, suggesting diseconomies of scale at individual fund level and economies of scale at fund family level. More importantly, there is spillover of the family size effect -- the performance of mutual funds (institutional funds) is positively related to the total institutional assets (mutual fund assets) managed by the same …


Cross Cultural Regularities In The Cognitive Architecture Of Pride, Daniel Sznycer, Laith Al-Shawaf, Yoella Bereby-Meyer, Oliver Scott Curry, Delphine De Smet, Elsa Ermer, Sangin Kim, Sunhwa Kim, Norman P. Li, Maria Florencia Lopez Seal, Jennifer Mcclung, Jiaqing O, Yohsuke Ohtsubo, Tadeg Quillien, Max Schaub, Aaron Sell, Florian Van Leeuwen, Leda Cosmide, John Tooby Dec 2016

Cross Cultural Regularities In The Cognitive Architecture Of Pride, Daniel Sznycer, Laith Al-Shawaf, Yoella Bereby-Meyer, Oliver Scott Curry, Delphine De Smet, Elsa Ermer, Sangin Kim, Sunhwa Kim, Norman P. Li, Maria Florencia Lopez Seal, Jennifer Mcclung, Jiaqing O, Yohsuke Ohtsubo, Tadeg Quillien, Max Schaub, Aaron Sell, Florian Van Leeuwen, Leda Cosmide, John Tooby

Research Collection School of Social Sciences

Pride occurs in every known culture, appears early in development, is reliably triggered by achievements and formidability, and causes a characteristic display that is recognized everywhere. Here, we evaluatethe theory that pride evolved to guide decisions relevant to pursuing actions that enhance valuation and respect for a person in the minds of others. By hypothesis, pride is a neurocomputational program tailored by selection to orchestrate cognition and behavior in the service of: (i) motivating the costeffective pursuit of courses of action that would increase others’ valuations and respect of the individual, (ii) motivating the advertisement of acts or characteristics whose …


Validating Social Media Data For Automatic Persona Generation, Jisun An, Haewoon Kwak, Bernard J Jansen Dec 2016

Validating Social Media Data For Automatic Persona Generation, Jisun An, Haewoon Kwak, Bernard J Jansen

Research Collection School Of Computing and Information Systems

Using personas during interactive design has considerable potential for product and content development. Unfortunately, personas have typically been a fairly static technique. In this research, we validate an approach for creating personas in real time, based on analysis of actual social media data in an effort to automate the generation of personas. We validate that social media data can be implemented as an approach for automating generating personas in real time using actual YouTube social media data from a global media corporation that produces online digital content. Using the organization's YouTube channel, we collect demographic data, customer interactions, and topical …


Managing Egress Of Crowd During Infrastructure Disruption, Teck Hou Teng, Shih-Fen Cheng, Trong-Nghia Truong, Hoong Chuin Lau Dec 2016

Managing Egress Of Crowd During Infrastructure Disruption, Teck Hou Teng, Shih-Fen Cheng, Trong-Nghia Truong, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In a large indoor environment such as a sports arena or convention center, smooth egress of crowd after an event can be seriously affected if infrastructure such as elevators and escalators break down. In this paper, we propose a novel crowd simulator known as SIM-DISRUPT for simulating egress scenarios in non-emergency situations. To surface the impact of disrupted infrastructure on the egress of crowd, SIM-DISRUPT includes features that allow users to specify selective disruptions as well as strategies for controlling the distribution and egress choices of crowd. Using SIM-DISRUPT, we investigate effects of crowd distribution, egress choices and infrastructure disruptions …


A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains, Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma Dec 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains, Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma

Research Collection School Of Computing and Information Systems

In this paper, we propose a framework for privacy-preserving outsourced functional computation across large-scale multiple encrypted domains, which we refer to as POFD. With POFD, a user can obtain the output of a function computed over encrypted data from multiple domains while protecting the privacy of the function itself, its input and its output. Specifically, we introduce two notions of POFD, the basic POFD and its enhanced version, in order to tradeoff the levels of privacy protection and performance. We present three protocols, named Multi-domain Secure Multiplication protocol (MSM), Secure Exponent Calculation protocol with private Base (SECB), and Secure Exponent …


Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran Dec 2016

Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran

Research Collection School Of Computing and Information Systems

Effective management of land-side transportation provides the competitive advantage to port terminal operators in improving services and efficient use of limited space in an urban port. We present a hybrid simulation model that combines traffic-flow modeling and discrete-event simulation for land-side port planning and evaluation of traffic conditions for a number of what-if scenarios. We design our model based on a real-world case of a bulk cargo port. The problem is interesting due to complexity of heterogeneous closed-looped internal vehicles and external vehicles traveling in spaces with very limited traffic regulation (no traffic lights, no traffic wardens) and the traffic …