Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2005

Discipline
Keyword
Publication

Articles 1 - 30 of 287

Full-Text Articles in Entire DC Network

E-Government Capabilities And Crisis Management: Lessons From Combating Sars In Singapore, Shan Ling Pan, Gary Pan, Paul R. Devadoss Dec 2005

E-Government Capabilities And Crisis Management: Lessons From Combating Sars In Singapore, Shan Ling Pan, Gary Pan, Paul R. Devadoss

Research Collection School Of Accountancy

The city-state of Singapore has been highly ranked for its e-government services. Over the past two decades, it has leveraged its IT infrastructure for economic development and transformed its public services. The SARS outbreak in 2004 turned into a national health crisis because it spread rapidly and the medical community had little knowledge of how to treat the new mutation of the corona virus. Yet, several Singaporean government agencies utilized the e-Government infrastructure and related resources to quickly bring the outbreak under control. In particular, the government?s IT infrastructure streamlined communications, information exchange, and data flow, and significantly eased collaboration …


Tailored Watermarking Schemes For Authentication Of Electronic Clinical Atlases, Feng Bao, Robert H. Deng, Beng-Chin Ooi, Yanjiang Yang Dec 2005

Tailored Watermarking Schemes For Authentication Of Electronic Clinical Atlases, Feng Bao, Robert H. Deng, Beng-Chin Ooi, Yanjiang Yang

Research Collection School Of Computing and Information Systems

It is accepted that digital watermarking is quite relevant in medical imaging. However, due to the special nature of clinical practice, it is often required that watermarking not introduce irreversible distortions to medical images. The electronic clinical atlas has such a need of "lossless" watermarking. We present two tailored reversible watermarking schemes for the clinical atlas by exploiting its inherent characteristics. We have implemented the schemes and our experimental results look very promising.


Authenticating Query Results In Data Publishing, Di Ma, Robert H. Deng, Hwee Hwa Pang, Jianying Zhou Dec 2005

Authenticating Query Results In Data Publishing, Di Ma, Robert H. Deng, Hwee Hwa Pang, Jianying Zhou

Research Collection School Of Computing and Information Systems

We propose a communication-efficient authentication scheme to authenticate query results disseminated by untrusted data publishing servers. In our scheme, signatures of multiple tuples in the result set are aggregated into one and thus the communication overhead incurred by the signature keeps constant. Next attr-MHTs (tuple based Merkle Hash Tree) are built to further reduce the communication overhead incurred by auxiliary authentication information (AAI). Besides the property of communication-efficiency, our scheme also supports dynamic SET operations (UNION, INTERSECTION) and dynamic JOIN with immunity to reordering attack.


The Internet And Civil Society: Environmental And Labour Organizations In Hong Kong, Yin-Wah Chu, James T. H. Tang Dec 2005

The Internet And Civil Society: Environmental And Labour Organizations In Hong Kong, Yin-Wah Chu, James T. H. Tang

Research Collection School of Social Sciences

To what extent has the Internet strengthened civil society? In which ways have civil society organizations (CSOs) used the internet to communicate their missions, enhance the discussion of public issues, extend networks and mobilize collective actions? This article seeks to answer these and related questions by reporting on an empirical study in Hong Kong. The study involves an analysis of the web pages launched by 14 environmental groups and 22 labour organizations on the one hand, and in-depth interviews with representatives of five of these organizations on the other. Due to the lack of resources and low level of e-readiness …


A Grapheme To Phoneme Converter For Standard Malay, Haizhou Li, Mahani Aljunied, Boon Seong Teoh Dec 2005

A Grapheme To Phoneme Converter For Standard Malay, Haizhou Li, Mahani Aljunied, Boon Seong Teoh

Research Collection Lee Kong Chian School Of Business

This paper describes the process of creating a grapheme-to-phoneme (G2P) converter for Standard Malay (SM). A fundamental step to building TTS and ASR engines, is to build a good G2P system that can automatically generate accurate phonemic representations for words. Our goal is to generate phonemes that reflect real speech, thereby facilitating more accurate phoneme alignment with actual waveforms (obtained from voice-data collection), keeping human intervention to the minimum. Here we discuss the key areas in SM that require considerable phonemic alterations including letter elisions, consonant insertions, multiple ways of uttering a letter/diagraph – areas that any good G2P system …


Fostering Total Wellness Through Peer Helping: Reflections On The Smu Experiences, Gilbert Tan, Timothy Hsi Dec 2005

Fostering Total Wellness Through Peer Helping: Reflections On The Smu Experiences, Gilbert Tan, Timothy Hsi

Research Collection Lee Kong Chian School Of Business

Peer Helping is widely implemented in Colleges and Universities in the United States and Canada. Despite the popularity of these programs, very little has been researched on peer helping in the Asian context. This paper traces the theoretical foundations of peer helping and the nascent development of a peer helping program in the Singapore Management University and how this program has developed since the beginning of 2004. The initial focus of the program was based on the model of paraprofessional student counselors assisting their fellow peers through difficult moments in their lives. Over time, the program was fine-tuned to embrace …


Examining The Relationship Between Employer Knowledge Dimensions And Organizational Attractiveness: An Application In A Military Context, Filip Lievens, Greet Van Hoye, Bert Schreurs Dec 2005

Examining The Relationship Between Employer Knowledge Dimensions And Organizational Attractiveness: An Application In A Military Context, Filip Lievens, Greet Van Hoye, Bert Schreurs

Research Collection Lee Kong Chian School Of Business

This study uses Cable and Turban's (2001) employer knowledge framework as a conceptual model to formulate hypotheses about a broad range of possible factors affecting the attractiveness of an organization (i.e. armed forces) among potential applicants (576 high-school seniors). Results show that gender, familiarity with military organizations, perceptions of job and organizational attributes (task diversity and social/team activities), and trait inferences (excitement, prestige, and cheerfulness) explained potential applicants' attraction to military organizations. Relative importance analyses showed that trait inferences contributed most to the variance, followed by job and organizational attributes, and employer familiarity. Finally, we found some evidence of interactions …


A Framework To Learn Bayesian Network From Changing, Multiple-Source Biomedical Data, Li G., Tze-Yun Leong Dec 2005

A Framework To Learn Bayesian Network From Changing, Multiple-Source Biomedical Data, Li G., Tze-Yun Leong

Research Collection School Of Computing and Information Systems

Structure learning in Bayesian network is a big issue. Many efforts have tried to solve this problem and quite a few algorithms have been proposed. However, when we attempt to apply the existing methods to microarray data, there are three main challenges: 1) there are many variables in the data set, 2) the sample size is small, and 3) microarray data are changing from experiment to experiment and new data are available quickly. To address these three problems, we assume that the major functions of a kind of cells do not change too much in different experiments, and propose a …


Review Of Unity Of Knowledge And Action: Toward A Nonrepresentational Theory Of Knowledge, Sor-Hoon Tan Dec 2005

Review Of Unity Of Knowledge And Action: Toward A Nonrepresentational Theory Of Knowledge, Sor-Hoon Tan

Research Collection School of Social Sciences

The title of this book is inspired by the Neo-Confucian scholar, Wang Yangming (1472-1529). However, the volume is not devoted solely to Wang Yangming's philosophy about the unity of knowledge and action. Wang is only one of several thinkers brought into this philosophical conversation and does not even receive the most attention (Richard Rorty has that honor). The conver- sation is interesting and occasionally illuminating, although one is not sure at the end whether it is moving toward one particular nonrepresentation theory of knowledge or whether the conversation partners who share an aversion to representational theories might disagree profoundly about …


Webarc: Website Archival Using A Structured Approach, Ee Peng Lim, Maria Marissa Dec 2005

Webarc: Website Archival Using A Structured Approach, Ee Peng Lim, Maria Marissa

Research Collection School Of Computing and Information Systems

Website archival refers to the task of monitoring and storing snapshots of website(s) for future retrieval and analysis. This task is particularly important for websites that have content changing over time with older information constantly overwritten by newer one. In this paper, we propose WEBARC as a set of software tools to allow users to construct a logical structure for a website to be archived. Classifiers are trained to. determine relevant web pages and their categories, and subsequently used in website downloading. The archival schedule can be specified and executed by a scheduler. A website viewer is also developed to …


Matrix: Adaptive Middleware For Distributed Multiplayer Games, Rajesh Krishna Balan, Maria Ebling, Paul Castro, Archan Misra Dec 2005

Matrix: Adaptive Middleware For Distributed Multiplayer Games, Rajesh Krishna Balan, Maria Ebling, Paul Castro, Archan Misra

Research Collection School Of Computing and Information Systems

Building a distributed middleware infrastructure that provides the low latency required for massively multiplayer games while still maintaining consistency is non-trivial. Previous attempts have used static partitioning or client-based peer-to-peer techniques that do not scale well to a large number of players, perform poorly under dynamic workloads or hotspots, and impose significant programming burdens on game developers. We show that it is possible to build a scalable distributed system, called Matrix, that is easily usable by game developers. We show experimentally that Matrix provides good performance, especially when hotspots occur.


Giving Users The Steering Wheel For Guiding Resource-Adaptive Systems, Joao Sousa, Rajesh Krishna Balan, Vahe Poladian, David Garlan, Mahadev Satyanarayanan Dec 2005

Giving Users The Steering Wheel For Guiding Resource-Adaptive Systems, Joao Sousa, Rajesh Krishna Balan, Vahe Poladian, David Garlan, Mahadev Satyanarayanan

Research Collection School Of Computing and Information Systems

Addressing resource variation plays an increasingly important role in engineering today's software systems. Research in resource-adaptive applications takes an important step towards addressing this problem. However, existing solutions stop short of addressing the fact that different user tasks often have specific goals of quality of service, and that such goals often entail multiple aspects of quality of service. This paper presents a framework for engineering software systems capable of adapting to resource variations in ways that are specific to the quality goals of each user task. For that, users are empowered to specify their task-specific preferences with respect to multiple …


A Generic Object-Oriented Tabu Search Framework, Hoong Chuin Lau, Xiaomin Jia, Wee Chong Wan Dec 2005

A Generic Object-Oriented Tabu Search Framework, Hoong Chuin Lau, Xiaomin Jia, Wee Chong Wan

Research Collection School Of Computing and Information Systems

Presently, most tabu search designers devise their applications without considering the potential of design and code reuse, which consequently prolong the development of subsequent applications. In this paper, we propose a software solution known as Tabu Search Framework (TSF), which is a generic C++ software framework for tabu search implementation. The framework excels in code recycling through the use of a well- designed set of generic abstract classes that clearly define their collaborative roles in the algorithm. Additionally, the framework incorporates a centralized process and control mechanism that enhances the search with intelligence. This results in a generic framework that …


Cultural Crossings Against Ethnocentric Currents: Toward A Confucian Ethics Of Communicative Virtues, Sor-Hoon Tan Dec 2005

Cultural Crossings Against Ethnocentric Currents: Toward A Confucian Ethics Of Communicative Virtues, Sor-Hoon Tan

Research Collection School of Social Sciences

Despite contemporary Confucianism's aspirations to be a world philosophy, there is an ethnocentric strand within the Confucian tradition, most glaringly exemplified in Han Yu's attacks on Buddhism. This paper re-assesses Confucian ethnocentrism in the context of contrary practices that indicate a more pragmatic attitude among Confucians toward cross-cultural interactions. It argues that while the ethnocentric tendency serves as constant reminder of the need for vigilance, and recognition of the difficulties of crossing cultural boundaries, there are nevertheless resources within Confucianism for constructing an ethics of communication that is urgently needed to deal with the moral problems of cultural pluralism. The …


Using Community Service Projects To Teach Leadership And Team-Building: Theoretical Foundations, Students' Reactions And Practical Considerations, Gilbert Tan Dec 2005

Using Community Service Projects To Teach Leadership And Team-Building: Theoretical Foundations, Students' Reactions And Practical Considerations, Gilbert Tan

Research Collection Lee Kong Chian School Of Business

This paper discusses the theoretical foundations of utilizing Community Service Project (CSP) or service-learning to teach Leadership and Team-Building. It examines the students’ reactions to this innovative method of instruction. This is done through conducting a content analysis of students’ learning journals, in which students reflect on their CSP learning experiences. Two themes emerged from the data: (a) variety of learning experiences, and (b) impact of CSP experience. The data suggested that students derived a variety of learning experiences from the CSP. In addition, there were attitudinal and learning impacts associated with the CSP experiences. The paper also outlines some …


Consumer Preferences For High-Tech Product Forms: Converged Or Separate? Evolution Of Technology & Reversal Of Preferences, Jin K. Han, Seh-Woong Chung, Seok Sohn Yong Dec 2005

Consumer Preferences For High-Tech Product Forms: Converged Or Separate? Evolution Of Technology & Reversal Of Preferences, Jin K. Han, Seh-Woong Chung, Seok Sohn Yong

Research Collection Lee Kong Chian School Of Business

With the surging popularity and growing availability of convergence products (e.g., camera phones, all-in-one PDAs) in high-tech product categories, consumers now face another dilemma in their purchase consideration: which product form converged, stand-alone, or both? This study sets out to investigate pattern(s) of consumer preferences for product form along the evolution of technology trajectories. In two experiments, we find that, at low levels of technological performance, consumers show an overwhelming preference for the converged product form over the dedicated counterpart; whereas, at a higher technological performance level, the pattern of preferences is reversed. Furthermore, we observe that a preannouncement of …


A Block Oriented Fingerprinting Scheme In Relational Database, Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao Dec 2005

A Block Oriented Fingerprinting Scheme In Relational Database, Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao

Research Collection School Of Computing and Information Systems

The need for protecting rights over relational data is of ever increasing concern. There have recently been some pioneering works in this area. In this paper, we propose an effective fingerprinting scheme based on the idea of block method in the area of multimedia fingerprinting. The scheme ensures that certain bit positions of the data contain specific values. The bit positions are determined by the keys known only to the owner of the data and different buyers of the database have different bit positions and different specific values for those bit positions. The detection of the fingerprint can be completed …


Cryptanalysis Of A Forward Secure Blind Signature Scheme With Provable Security, Shuhong Wang, Feng Bao, Robert H. Deng Dec 2005

Cryptanalysis Of A Forward Secure Blind Signature Scheme With Provable Security, Shuhong Wang, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

A forward secure blind signature scheme was proposed by Duc, Cheon and Kim, in ICICS 2003. The security of the scheme was proved to be equivalent to the strong RSA assumption in the random oracle model. In this paper we present an attack to the scheme by forging valid signatures with public keys only. The attack is so efficient that forging a valid signature needs less computation than legally generating a signature, even considering only the user side. Our result implies that the security proof of the scheme must be invalid. Furthermore we point out the fault of the proof …


Sequential Aggregate Signatures Working Over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei Zhu, Feng Bao, Robert H. Deng Dec 2005

Sequential Aggregate Signatures Working Over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei Zhu, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

The contribution of this paper has two folds. In the first fold, we propose a generic construction of sequential aggregate signatures from families of certificated trapdoor one-way permutations. We show that our construction is provably secure in the random oracle model assuming that the underlying homomorphic permutations are trapdoor one-way. Compared to Lysyanskaya et al’s generic construction that is constructed from a trapdoor one-way permutation family working over the same domain [16], our scheme works over independent trapdoor one-way permutation domains. The flexible choice of the underlying permutation domains benefits our scheme to its applications in the real world where …


An Efficient And Robust Computational Framework For Studying Lifetime And Information Capacity In Sensor Networks, Enrique J. Duarte-Melo, Mingyan Liu, Archan Misra Dec 2005

An Efficient And Robust Computational Framework For Studying Lifetime And Information Capacity In Sensor Networks, Enrique J. Duarte-Melo, Mingyan Liu, Archan Misra

Research Collection School Of Computing and Information Systems

In this paper we investigate the expected lifetime and information capacity, defined as the maximum amount of data (bits) transferred before the first sensor node death due to energy depletion, of a data-gathering wireless sensor network. We develop a fluid-flow based computational framework that extends the existing approach, which requires precise knowledge of the layout/deployment of the network, i.e., exact sensor positions. Our method, on the other hand, views a specific network deployment as a particular instance (sample path) from an underlying distribution of sensor node layouts and sensor data rates. To compute the expected information capacity under this distribution-based …


Natural Forum And The Elusive Significance Of Jurisdiction Agreements, Tiong Min Yeo Dec 2005

Natural Forum And The Elusive Significance Of Jurisdiction Agreements, Tiong Min Yeo

Research Collection Yong Pung How School Of Law

The Singapore court's power to stay its proceedings by reason of its not being the appropriate forum the proceedings ought not to be continued is underpinned by the common law principle enunciated in The Spiliada that generally a trial should be heard in its natural forum. The Rainbow Joy adds significantly to Singapore law on forum non conveniens on two important points. First, it establishes that it is not necessary to show that the alternative forum abroad is constituted as a court of law. Secondly, the case establishes that whether there is a defense claim on the merits is an …


New Efficient Mds Array Codes For Raid Part Ii: Rabin-Like Codes For Tolerating Multiple (>=4) Disk Failures, Gui-Liang Feng, Robert H. Deng, Feng Bao Dec 2005

New Efficient Mds Array Codes For Raid Part Ii: Rabin-Like Codes For Tolerating Multiple (>=4) Disk Failures, Gui-Liang Feng, Robert H. Deng, Feng Bao

Research Collection School Of Computing and Information Systems

A new class of Binary Maximum Distance Separable (MDS) array codes which are based on circular permutation matrices are introduced in this paper. These array codes are used for tolerating multiple (greater than or equal to 4) disk failures in Redundant Arrays of Inexpensive Disks (RAID) architecture. The size of the information part is m \times n, where n is the number of information disks and (m+1) is a prime integer; the size of the parity-check part is m \times r, the minimum distance is r+1, and the number of parity-check disks is r. In practical applications, m can be …


Integration Of Probabilistic Graphic Models For Decision Support, Jiang C., Poh K., Tze-Yun Leong Dec 2005

Integration Of Probabilistic Graphic Models For Decision Support, Jiang C., Poh K., Tze-Yun Leong

Research Collection School Of Computing and Information Systems

It is a frequently encountered problem that new knowledge arrived when making decisions in a dynamic world. Usually, domain experts cannot afford enough time and knowledge to effectively assess and combine both qualitative and quantitative information in these models. Existing approaches can solve only one of two tasks instead of both. We propose a four-step algorithm to integrate multiple probabilistic graphic models, which can effectively update existing models with newly acquired models. In this algorithm, the qualitative part of model integration is performed first, followed by the quantitative combination. We illustrate our method with an example of combining three models. …


Retest Effects In Operational Selection Settings: Development And Test Of A Framework, Filip Lievens, Tine Buyse, Paul R. Sackett Dec 2005

Retest Effects In Operational Selection Settings: Development And Test Of A Framework, Filip Lievens, Tine Buyse, Paul R. Sackett

Research Collection Lee Kong Chian School Of Business

This study proposes a framework for examining the effects of retaking tests in operational selection settings. A central feature of this framework is the distinction between within-person and between-person retest effects. This framework is used to develop hypotheses about retest effects for exemplars of 3 types of tests (knowledge tests, cognitive ability tests, and situational judgment tests) and to test these hypotheses in a high stakes selection setting (admission to medical studies in Belgium). Analyses of within-person retest effects showed that mean scores of repeat test takers were one-third of a standard deviation higher for the knowledge test and situational …


Anonymous Dos-Resistant Access Control Protocol Using Passwords For Wireless Networks, Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda Nov 2005

Anonymous Dos-Resistant Access Control Protocol Using Passwords For Wireless Networks, Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda

Research Collection School Of Computing and Information Systems

Wireless networks have gained overwhelming popularity over their wired counterpart due to their great flexibility and convenience, but access control of wireless networks has been a serious problem because of the open medium. Passwords remain the most popular way for access control as well as authentication and key exchange. But existing password-based access control protocols are not satisfactory in that they do not provide DoS-resistance or anonymity. In this paper we analyze the weaknesses of an access control protocol using passwords for wireless networks in IEEE LCN 2001, and propose a different access control protocol using passwords for wireless networks. …


A Spatial Analysis Of The Xiii Italian Legislature, Massimiliano Landi, Riccardo Pelizzo Nov 2005

A Spatial Analysis Of The Xiii Italian Legislature, Massimiliano Landi, Riccardo Pelizzo

Research Collection School of Social Sciences

We present a spatial map of the Italian House of Deputies during the XIII Legislature obtained by applying the Poole and Rosenthal methodology to roll call data. We estimate coordinates for almost all the 650 Deputies that were on the House’s floor at the time, and we aggregate them according to parties. We find that voting patters generate basically a two dimensional political space. The first dimension represents loyalty to either the ruling coalition or the opposing one. The second dimension is represented by the European Union. These findings are consistent with the exceptional case of the party Northern League, …


Accounting Conservatism And Managerial Incentives, Young Koan Kwon Nov 2005

Accounting Conservatism And Managerial Incentives, Young Koan Kwon

Research Collection School Of Accountancy

There are two sources of agency costs under moral hazard: (1) distortions in incentive contracts and (2) implementation of suboptimal decisions. In the accounting literature, the relation between conservative accounting and agency costs of type (1) has received considerable attention (cf. Watts 2002). However, little appears to be known about the effects of accounting conservatism on agency costs of type (2) or trade-offs between agency costs of types (1) and (2). The purpose of this study is to examine this void. In a principal-agent setting in which the principal motivates the agent to expend effort using accounting earnings, this study …


Globalisation And Urban Crime: Mean Streets Or Lost Suburbs, Mark Findlay Nov 2005

Globalisation And Urban Crime: Mean Streets Or Lost Suburbs, Mark Findlay

Research Collection Yong Pung How School Of Law

This parer introduces notions of contemporary globalisation and the manner in which crime and glotalisation interrelate. In particular, the importance of analysing crime and control at both local and global levels is emphasised. Issues of crime and space are addressed in the context of urbanisation. The tendencies of the city to marginalise, and the consequential criminal outcomes from this environment of modernisation (and the modem city) are discussed. Urban planning has had a crucial part to play in humanising and at the same time distinguishing the global push towards urbanisation, and crime prevention is now a recognised feature of globalised …


A Threshold-Based Algorithm For Continuous Monitoring Of K Nearest Neighbors, Kyriakos Mouratidis, Dimitris Papadias, Spiridon Bakiras, Yufei Tao Nov 2005

A Threshold-Based Algorithm For Continuous Monitoring Of K Nearest Neighbors, Kyriakos Mouratidis, Dimitris Papadias, Spiridon Bakiras, Yufei Tao

Research Collection School Of Computing and Information Systems

Assume a set of moving objects and a central server that monitors their positions over time, while processing continuous nearest neighbor queries from geographically distributed clients. In order to always report up-to-date results, the server could constantly obtain the most recent position of all objects. However, this naïve solution requires the transmission of a large number of rapid data streams corresponding to location updates. Intuitively, current information is necessary only for objects that may influence some query result (i.e., they may be included in the nearest neighbor set of some client). Motivated by this observation, we present a threshold-based algorithm …


Selective Object Stabilization For Home Video Consumers, Zailiang Pan, Chong-Wah Ngo Nov 2005

Selective Object Stabilization For Home Video Consumers, Zailiang Pan, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

This paper describes a unified approach for video stabilization. The essential goal is to stabilize image sequences that consist of moving foreground objects, which appear frequently in today's home videos captured by hand-held consumer cameras. Our proposed techniques mainly, rely on the analysis of;motion content. Three major components area initialization, segmentation and stabilization. In motion initialization, we propose a novel algorithm to efficiently search for the best possible frame in a sequence to start segmentation. Our segmentation algorithm is based on Expectation-Maximization (EM) framework which provides the mechanism for simultaneous estimation of motion models and their layers of support. Based …