Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2009

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 498

Full-Text Articles in Entire DC Network

Scalable Multi-Core Model Checking Fairness Enhanced Systems, Yang Liu, Jun Sun, Jin Song Dong Dec 2009

Scalable Multi-Core Model Checking Fairness Enhanced Systems, Yang Liu, Jun Sun, Jin Song Dong

Research Collection School Of Computing and Information Systems

Rapid development in hardware industry has brought the prevalence of multi-core systems with shared-memory, which enabled the speedup of various tasks by using parallel algorithms. The Linear Temporal Logic (LTL) model checking problem is one of the difficult problems to be parallelized or scaled up to multi-core. In this work, we propose an on-the-fly parallel model checking algorithm based on the Tarjan’s strongly connected components (SCC) detection algorithm. The approach can be applied to general LTL model checking or with different fairness assumptions. Further, it is orthogonal to state space reduction techniques like partial order reduction. We enhance our PAT …


Asian Maths Whizz And Talkative Females: How Stereotypes Can Actually Boost Performance, Knowledge@Smu Dec 2009

Asian Maths Whizz And Talkative Females: How Stereotypes Can Actually Boost Performance, Knowledge@Smu

Knowledge@SMU

Nobody likes to be pigeonholed or reduced to a single stereotype. One reason could be because we believe ourselves to be products of multiple stereotypes: a combination of identities, such as "Asian", "female", "lawyer", "Gen X", "Christian", "Chinese", etc. While these labels connect us to like-individuals, they can also carry all sorts of connotations and expectations – positive, neutral and negative. For example, an Asian might be expected to outperform a non-Asian at mathematics because of stereotypes that Asians are mathematically inclined. Will such undue expectations affect the Asian's performance outcome? Research studies point to a 'Yes'.


When Foreigners Influence Domestic Change: A Case For Transnational Advocacy, Knowledge@Smu Dec 2009

When Foreigners Influence Domestic Change: A Case For Transnational Advocacy, Knowledge@Smu

Knowledge@SMU

Like it or not, socio-environmental issues extend beyond geopolitical boundaries. Southeast Asians might remember the Indonesian haze that had affected the region's air quality, for instance – an issue that was eventually addressed with the help of foreign groups; or the recovery efforts of the 2004 tsunami, which also involved many international entities. According to Yooil Bae, a political science professor at SMU, foreign groups can bring new insights and methods. But while there are benefits to knowledge-sharing and cooperation, the process can be tricky, especially when such advocacy groups clash with the state.


To Groom And Retain Talents, Asian Organisations Look To The West, Knowledge@Smu Dec 2009

To Groom And Retain Talents, Asian Organisations Look To The West, Knowledge@Smu

Knowledge@SMU

Is there a scarcity of talents in Asia? While opportunities are abound for businesses in the region, many organisations struggle to find the "right" people to seize those opportunities. Those that do a good job of grooming and retaining their future leaders will find themselves to be in an advantageous position. But why should organisations invest in nurturing their flock when seats to the corner offices are already "reserved" for an in-group of family members, friends, scholars, social elites, etc? This is especially problematic in Asia, where many large organisations are either family-owned or state-owned.


How Valued-Added Is Your Library Instruction? Research Librarians Work With Faculty To Conduct In-Class Training, Charlotte Gill, Rajendra Munoo, Priyanka Sharma Dec 2009

How Valued-Added Is Your Library Instruction? Research Librarians Work With Faculty To Conduct In-Class Training, Charlotte Gill, Rajendra Munoo, Priyanka Sharma

Research Collection Library

This training ws developed as a helpful follow-up for the future business decision-makers to be introduced to the process of thinking through the legal implications of business services and products, with a view to giving cogent instructions to legal counsel.


Duol: A Double Updating Approach For Online Learning, Peilin Zhao, Steven C. H. Hoi, Rong Jin Dec 2009

Duol: A Double Updating Approach For Online Learning, Peilin Zhao, Steven C. H. Hoi, Rong Jin

Research Collection School Of Computing and Information Systems

In most online learning algorithms, the weights assigned to the misclassified examples (or support vectors) remain unchanged during the entire learning process. This is clearly insufficient since when a new misclassified example is added to the pool of support vectors, we generally expect it to affect the weights for the existing support vectors. In this paper, we propose a new online learning method, termed Double Updating Online Learning, or DUOL for short. Instead of only assigning a fixed weight to the misclassified example received in current trial, the proposed online learning algorithm also tries to update the weight for one …


Managing Supply Uncertainty With An Information Market, Zhiling Guo, Fang Fang, Andrew B. Whinston Dec 2009

Managing Supply Uncertainty With An Information Market, Zhiling Guo, Fang Fang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

We propose a market-based information aggregation mechanism to manage the supply side uncertainty in the supply chain. In our analytical model, a simple supply chain consists of a group of retailers who order a homogeneous product from two suppliers. The two suppliers differ in their ability to fulfill orders – one always delivers orders and the other fulfills orders probabilistically. We model the supply chain decisions as a Stackelberg game where the supplier who has uncertain reliability decides a wholesale price before the retailers who independently receive signals about the supplier’s reliability determine their sourcing strategies. We then propose an …


The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim Dec 2009

The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim

CMP Research

Research in Critical Success Factors (CSFs) of Enterprise Systems (ES) projects has identified numerous practitioner governance mechanisms for ensuring project success. However, such research has not developed a theory of why certain critical success factors encourage project success. Our research develops such theory on a case study where even though the levels of several critical success factors were weak, the project nevertheless succeeded. Specifically, the logistics ES project succeeded even though there was (1) only marginal top management support, (2) low key user commitment, and (3) change management, training and other critical aspects of user management and communication were not …


To Trust Or Not To Trust? Predicting Online Trusts Using Trust Antecedent Framework, Viet-An Nguyen, Ee Peng Lim, Jing Jiang, Aixin Sun Dec 2009

To Trust Or Not To Trust? Predicting Online Trusts Using Trust Antecedent Framework, Viet-An Nguyen, Ee Peng Lim, Jing Jiang, Aixin Sun

Research Collection School Of Computing and Information Systems

This paper analyzes the trustor and trustee factors that lead to inter-personal trust using a well studied Trust Antecedent framework in management science. To apply these factors to trust ranking problem in online rating systems, we derive features that correspond to each factor and develop different trust ranking models. The advantage of this approach is that features relevant to trust can be systematically derived so as to achieve good prediction accuracy. Through a series of experiments on real data from Epinions, we show that even a simple model using the derived features yields good accuracy and outperforms MoleTrust, a trust …


Cyber Attacks: Does Physical Boundary Matter?, Qiu-Hong Wang, Seung-Hyun Kim Dec 2009

Cyber Attacks: Does Physical Boundary Matter?, Qiu-Hong Wang, Seung-Hyun Kim

Research Collection School Of Computing and Information Systems

Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. However, after considering economic opportunity, IT infrastructure, international collaboration in enforcement and conventional crimes, we find strong evidence that cyber attacks were indeed spatially autocorrelated as they moved over time. …


Wake Up Or Fall Asleep: Value Implication Of Trusted Computing, Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma Dec 2009

Wake Up Or Fall Asleep: Value Implication Of Trusted Computing, Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma

Research Collection School Of Computing and Information Systems

More than 10 years have passed since trusted computing (TC) technology was introduced to the market; however, there is still no consensus about its value. The increasing importance of user and enterprise security and the security promised by TC, coupled with the increasing tension between the proponents and the opponents of TC, make it timely to investigate the value relevance of TC in terms of both capital market and accounting performance. Based on both price and volume studies, we found that news releases related to the adoption of the TC technology had no information content. All investors, regardless of whether …


Computationally Secure Hierarchical Self-Healing Key Distribution For Heterogeneous Wireless Sensor Networks, Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao Dec 2009

Computationally Secure Hierarchical Self-Healing Key Distribution For Heterogeneous Wireless Sensor Networks, Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao

Research Collection School Of Computing and Information Systems

Self-healing group key distribution is a primitive aimed to achieve robust key distribution in wireless sensor networks (WSNs) over lossy communication channels. However, all the existing self-healing group key distribution schemes in the literature are designed for homogenous WSNs that do not scale. In contract, heterogeneous WSNs have better scalability and performance. We are thus motivated to study self-healing group key distribution for heterogeneous WSNs. In particular, we propose the concept of hierarchical self-healing group key distribution, tailored to the heterogeneous WSN architecture; we further revisit and adapt Dutta et al.’s model to the setting of hierarchical self-healing group …


Opportunity Cost Neglect, Shane Frederick, Nathan Novemsky, Jing (Jane) Wang, Ravi Dhar, Stephen Nowlis Dec 2009

Opportunity Cost Neglect, Shane Frederick, Nathan Novemsky, Jing (Jane) Wang, Ravi Dhar, Stephen Nowlis

Research Collection Lee Kong Chian School Of Business

To properly consider the opportunity costs of a purchase, consumers must actively generate the alternatives that it would displace. The current research suggests that consumers often fail to do so. Even under conditions promoting cognitive effort, various cues to consider opportunity costs reduce purchase rates and increase the choice share of more affordable options. Sensitivity to such cues varies with chronic dispositional differences in spending attitudes. We discuss the implications of these results for the marketing strategies of economy and premium brands.


On The Accuracy And Stability Of A Variety Of Differential Quadrature Formulations For The Vibration Analysis Of Beams, C. H. W. Ng, Yibao Zhao, Y. Xiang, G. W. Wei Dec 2009

On The Accuracy And Stability Of A Variety Of Differential Quadrature Formulations For The Vibration Analysis Of Beams, C. H. W. Ng, Yibao Zhao, Y. Xiang, G. W. Wei

Research Collection Lee Kong Chian School Of Business

The occurrence of spurious complex eigenvalues is a serious stability problem in many differential quadrature methods (DQMs). This paper studies the accuracy and stability of a variety of different differential quadrature formulations. Special emphasis is given to two local DQMs. One utilizes both fictitious grids and banded matrices, called local adaptive differential quadrature method (LaDQM). The other has banded matrices without using fictitious grids to facilitate boundary conditions, called finite difference differential quadrature methods (FDDQMs). These local DQMs include the classic DQMs as special cases given by extending their banded matrices to full matrices. LaDQMs and FDDQMs are implemented on …


Empirical Likelihood In Missing Data Problems, Jing Qin, Biao Zhang, Denis H. Y. Leung Dec 2009

Empirical Likelihood In Missing Data Problems, Jing Qin, Biao Zhang, Denis H. Y. Leung

Research Collection School Of Economics

Missing data is a ubiquitous problem in medical and social sciences. It is well known that inferences based only on the complete data may not only lose efficiency, but may also lead to biased results if the data is not missing completely at random (MCAR). The inverse-probability weighting method proposed by Horvitz and Thompson (1952) is a popular alternative when the data is not MCAR. The Horvitz–Thompson method, however, is sensitive to the inverse weights and may suffer from loss of efficiency. In this paper, we propose a unified empirical likelihood approach to missing data problems and explore the use …


Denial-Of-Service Attacks On Host-Based Generic Unpackers, Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia Dec 2009

Denial-Of-Service Attacks On Host-Based Generic Unpackers, Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia

Research Collection School Of Computing and Information Systems

With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without specific knowledge of the packing techniques used. In this paper, we present an automatic packer with which packed malware forges spurious unpacking behaviors that lead to a denial-of-service attack on host-based generic unpackers. We present the design, implementation, and evaluation of the proposed packer and malware produced using the proposed packer, and show the success of denial-of-service attacks on host-based generic unpackers.


A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li Dec 2009

A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li

Research Collection School Of Computing and Information Systems

An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency …


A New Approach For Anonymous Password Authentication, Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao Dec 2009

A New Approach For Anonymous Password Authentication, Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao

Research Collection School Of Computing and Information Systems

Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anonymous password authentication represents a promising privacy-preserving authentication primitive. However, anonymous password authentication in the standard setting has several inherent weaknesses, making its practicality questionable. In this paper, we propose a new and efficient approach for anonymous password authentication. Our approach assumes a different setting where users do not register their passwords to the server; rather, they use passwords to protect their authentication credentials. We present a concrete scheme, and get over a number of challenges in securing password-protected credentials …


Learning Bregman Distance Functions And Its Application For Semi-Supervised Clustering, Lei Wu, Rong Jin, Steven C. H. Hoi, Jianke Zhu, Nenghai Yu Dec 2009

Learning Bregman Distance Functions And Its Application For Semi-Supervised Clustering, Lei Wu, Rong Jin, Steven C. H. Hoi, Jianke Zhu, Nenghai Yu

Research Collection School Of Computing and Information Systems

Learning distance functions with side information plays a key role in many machine learning and data mining applications. Conventional approaches often assume a Mahalanobis distance function. These approaches are limited in two aspects: (i) they are computationally expensive (even infeasible) for high dimensional data because the size of the metric is in the square of dimensionality; (ii) they assume a fixed metric for the entire input space and therefore are unable to handle heterogeneous data. In this paper, we propose a novel scheme that learns nonlinear Bregman distance functions from side information using a nonparametric approach that is similar to …


The Hard Embodiment Of Culture, Dov Cohen, Angela K. Y. Leung Dec 2009

The Hard Embodiment Of Culture, Dov Cohen, Angela K. Y. Leung

Research Collection School of Social Sciences

The way humans move and comport their bodies is one way they (literally) carry their culture. In pre-wired embodiments, body comportment triggers basic, evolutionarily prepared affective and cognitive reactions that subsequently prime more complex representations. Culture suffuses this process, because (1) cultural artifacts, affordances, and practices make certain body comportments more likely, (2) cultural practices, rituals, schemas, and rules promote the learning of an otherwise underspecified connection between a given body comportment and a particular basic reaction, and (3) cultural meaning systems elaborate basic affective and cognitive reactions into more complex representations. These points are illustrated with three experiments that …


Culture, Psyche, And Body Make Each Other Up, Dov Cohen, Angela K. Y. Leung, Hans Ijzerman Dec 2009

Culture, Psyche, And Body Make Each Other Up, Dov Cohen, Angela K. Y. Leung, Hans Ijzerman

Research Collection School of Social Sciences

The commentaries make important points, including ones about the purposeful uses of embodiment effects. Research examining such effects needs to look at how such effects play themselves out in people's everyday lives. Research might usefully integrate work on embodiment with work on attribution and work in other disciplines concerned with body–psyche connections (e.g., research on somaticizing versus “psychologizing” illnesses and hypercognizing versus hypocognizing emotions). Such work may help us understand the way positive and negative feedback loops operate as culture, psyche, and body make each other up.


The Palimpsest Of Exile [Book Review], Kirpal Singh Dec 2009

The Palimpsest Of Exile [Book Review], Kirpal Singh

Research Collection School of Social Sciences

Book review of Dipika Mukherjee, The Palimpsest of Exile. Alberta: Rubicon Press, 2009. 34 pp. ISBN 978-0-9809278-9-4.


Adaptive Type-2 Fuzzy Maintenance Advisor For Offshore Power Systems, Zhaoxia Wang, C. S. Chang, Fan Yang, W. W. Tan Dec 2009

Adaptive Type-2 Fuzzy Maintenance Advisor For Offshore Power Systems, Zhaoxia Wang, C. S. Chang, Fan Yang, W. W. Tan

Research Collection School Of Computing and Information Systems

Proper maintenance strategies are very desirable for minimizing the operational and maintenance costs of power systems without sacrificing reliability. Condition-based maintenance has largely replaced time-based maintenance because of the former's potential economic benefits. As offshore substations are often remotely located, they experience more adverse environments, higher failures, and therefore need more powerful analytical tools than their onshore counterpart. As reliability information collected during operation of an offshore substation can rarely avoid uncertainties, it is essential to obtain consistent estimates of reliability measures under changing environmental and operating conditions. Some attempts with type-1 fuzzy logic were made with limited success in …


An Organizational Impression Management Perspective On The Formation Of Corporate Reputations, Scott Highhouse, Margaret E. Brooks, Gary J. Gregarus Dec 2009

An Organizational Impression Management Perspective On The Formation Of Corporate Reputations, Scott Highhouse, Margaret E. Brooks, Gary J. Gregarus

Research Collection Lee Kong Chian School Of Business

Researchers have only recently turned their attention to the study of corporate reputation.As is characteristic of many early areas of management inquiry, the field is decidedly multidisciplinary and disconnected. This article selectively reviews reputation research conducted mainly during the past decade. A framework is proposed that views reputation from the perspective of organizational impression management. Corporations are viewed as social actors, intent on enhancing their respectability and impressiveness in the eyes of constituents.


Dialogic Cosmopolitanism And Global Justice, Eduard Christiaan Jordaan Dec 2009

Dialogic Cosmopolitanism And Global Justice, Eduard Christiaan Jordaan

Research Collection School of Social Sciences

Although the term “cosmopolitan-communitarian debate” never really caught on, a national-global fault line remains prominent in debates about global justice. “Dialogic cosmopolitanism” holds the promise of bridging this alleged fault line by accepting many of the communitarian criticisms against cosmopolitanism and following what can be described as a communitarian path to cosmopolitanism. This article identifies and describes four key elements that distinguish dialogic cosmopolitanism: a respect for difference; a commitment to genuine dialogue; an open, hesitant and self-problematising attitude on the part of the moral subject; and an undertaking to expand the boundaries of moral concern to the point of …


Spirituality At Work In A Changing World: Managerial And Research Implications, Eugene Geh, Gilbert Tan Dec 2009

Spirituality At Work In A Changing World: Managerial And Research Implications, Eugene Geh, Gilbert Tan

Research Collection Lee Kong Chian School Of Business

This paper identifies the seminal works of key theorists in the field of spirituality and traces the development of the key ideas of spirituality at the workplace in relation to their relevance in today's organizational context. We examine how having a healthy orientation towards spirituality at work can lead to desirable individual and organizational outcomes. Particular emphasis is placed on understanding the rapidly changing workplace and its future directions by first uncovering the rationale behind the evolution of management thought since the introduction of Taylor's scientific management and then, by examining the various stages of economic development and as well …


Who Governs Energy? The Challenges Facing Global Energy Governance, Ann Florini, Benjamin K. Sovacool Dec 2009

Who Governs Energy? The Challenges Facing Global Energy Governance, Ann Florini, Benjamin K. Sovacool

Research Collection School of Social Sciences

This article conceptualizes the energy problems facing society from a global governance perspective. It argues that a notion of "global energy governance," taken to mean international collective action efforts undertaken to manage and distribute energy resources and provide energy services, offers a meaningful and useful framework for assessing energy-related challenges. The article begins by exploring the concepts of governance, global governance, and global energy governance. It then examines some of the existing institutions in place to establish and carry out rules and norms governing global energy problems and describes the range of institutional design options available to policymakers. It briefly …


Dialogic Cosmopolitanism And Global Justice, Eduard Jordaan Dec 2009

Dialogic Cosmopolitanism And Global Justice, Eduard Jordaan

Research Collection School of Social Sciences

Although the term “cosmopolitan-communitarian debate” never really caught on, a national-global fault line remains prominent in debates about global justice. “Dialogic cosmopolitanism” holds the promise of bridging this alleged fault line by accepting many of the communitarian criticisms against cosmopolitanism and following what can be described as a communitarian path to cosmopolitanism. This article identifies and describes four key elements that distinguish dialogic cosmopolitanism: a respect for difference; a commitment to genuine dialogue; an open, hesitant and self-problematising attitude on the part of the moral subject; and an undertaking to expand the boundaries of moral concern to the point of …


On The Untraceability Of Anonymous Rfid Authentication Protocol With Constant Key-Lookup, Bing Liang, Yingjiu Li, Tieyan Li, Robert H. Deng Dec 2009

On The Untraceability Of Anonymous Rfid Authentication Protocol With Constant Key-Lookup, Bing Liang, Yingjiu Li, Tieyan Li, Robert H. Deng

Research Collection School Of Computing and Information Systems

In ASIACCS'08, Burmester, Medeiros and Motta proposed an anonymous RFID authentication protocol (BMM protocol [2]) that preserves the security and privacy properties, and achieves better scalability compared with other contemporary approaches. We analyze BMM protocol and find that some of security properties (especial untraceability) are not fulfilled as originally claimed. We consider a subtle attack, in which an adversary can manipulate the messages transmitted between a tag and a reader for several continuous protocol runs, and can successfully trace the tag after these interactions. Our attack works under a weak adversary model, in which an adversary can eavesdrop, intercept and …


Insights Into Malware Detection And Prevention On Mobile Phones, Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng Dec 2009

Insights Into Malware Detection And Prevention On Mobile Phones, Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng

Research Collection School Of Computing and Information Systems

The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding the negative impact of the functionality limitations of mobile phones to keep the performance cost within the limitations of mobile phones. Being different, this paper investigates the positive impact of these limitations on suppressing the development of mobile malware. We study the state-of-the-art mobile malware, as well as the progress …