Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2016

Discipline
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 965

Full-Text Articles in Entire DC Network

Ajit Singh [Malyasia, Asean Secretary-General, Diplomat], Ajit Singh Dec 2016

Ajit Singh [Malyasia, Asean Secretary-General, Diplomat], Ajit Singh

Digital Narratives of Asia

After thirty years as a career diplomat, Malaysia's first ASEAN Secretary-General Ajit Singh, sees his five-year term as the most productive, golden years of his life. He speaks to DNA about the challenges he faced with admitting Myanmar to ASEAN, and the visionary ASEAN leadership. He also expounds on the differences in impacts of work between an ambassador and a bureaucrat.


From Ranganathan To Amazon: Are We There Yet?, Gulcin Cribb Dec 2016

From Ranganathan To Amazon: Are We There Yet?, Gulcin Cribb

Research Collection Library

No abstract provided.


Free Articles And Accounting For The Timing Effect, Nursyeha Yahaya, Chee Hsien Aaron (Zheng Zhixian) Tay Dec 2016

Free Articles And Accounting For The Timing Effect, Nursyeha Yahaya, Chee Hsien Aaron (Zheng Zhixian) Tay

Research Collection Library

Various studies have attempted to assess the amount of free full text available on the web and recent work have suggested that we are close to the 50% mark for freely available articles (Archambault et al. 2013; Bjork et al. 2010; Jamali and Nabavi 2015). It is natural to wonder if this might reduce researchers' reliance on library subscriptions for access. To do so, we need to determine not just what papers researchers are citing to that are free today, but to estimate if the papers they were citing were freely available at the time they were citing it. We …


Managing Egress Of Crowd During Infrastructure Disruption, Teck Hou Teng, Shih-Fen Cheng, Trong-Nghia Truong, Hoong Chuin Lau Dec 2016

Managing Egress Of Crowd During Infrastructure Disruption, Teck Hou Teng, Shih-Fen Cheng, Trong-Nghia Truong, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In a large indoor environment such as a sports arena or convention center, smooth egress of crowd after an event can be seriously affected if infrastructure such as elevators and escalators break down. In this paper, we propose a novel crowd simulator known as SIM-DISRUPT for simulating egress scenarios in non-emergency situations. To surface the impact of disrupted infrastructure on the egress of crowd, SIM-DISRUPT includes features that allow users to specify selective disruptions as well as strategies for controlling the distribution and egress choices of crowd. Using SIM-DISRUPT, we investigate effects of crowd distribution, egress choices and infrastructure disruptions …


Orienteering Problem: A Survey Of Recent Variants, Solution Approaches And Applications, Aldy Gunawan, Hoong Chuin Lau, Pieter Vansteenwegen Dec 2016

Orienteering Problem: A Survey Of Recent Variants, Solution Approaches And Applications, Aldy Gunawan, Hoong Chuin Lau, Pieter Vansteenwegen

Research Collection School Of Computing and Information Systems

Duplicate record, see https://ink.library.smu.edu.sg/sis_research/3271. The Orienteering Problem (OP) has received a lot of attention in the past few decades. The OP is a routing problem in which the goal is to determine a subset of nodes to visit, and in which order, so that the total collected score is maximized and a given time budget is not exceeded. A number of typical variants has been studied, such as the Team OP, the (Team) OP with Time Windows and the Time Dependent OP. Recently, a number of new variants of the OP was introduced, such as the Stochastic OP, the …


Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen Dec 2016

Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen

Research Collection School Of Computing and Information Systems

Information diffusion in social networks is often characterized by huge participating communities and viral cascades of high dynamicity. To observe, summarize, and understand the evolution of dynamic diffusion processes in an informative and insightful way is a challenge of high practical value. However, few existing studies aim to summarize networks for interesting dynamic patterns. Dynamic networks raise new challenges not found in static settings, including time sensitivity, online interestingness evaluation, and summary traceability, which render existing techniques inadequate. We propose dynamic network summarization to summarize dynamic networks with millions of nodes by only capturing the few most interesting nodes or …


Validating Social Media Data For Automatic Persona Generation, Jisun An, Haewoon Kwak, Bernard J Jansen Dec 2016

Validating Social Media Data For Automatic Persona Generation, Jisun An, Haewoon Kwak, Bernard J Jansen

Research Collection School Of Computing and Information Systems

Using personas during interactive design has considerable potential for product and content development. Unfortunately, personas have typically been a fairly static technique. In this research, we validate an approach for creating personas in real time, based on analysis of actual social media data in an effort to automate the generation of personas. We validate that social media data can be implemented as an approach for automating generating personas in real time using actual YouTube social media data from a global media corporation that produces online digital content. Using the organization's YouTube channel, we collect demographic data, customer interactions, and topical …


2016: A Year Of Looking To The Future, David Chan Dec 2016

2016: A Year Of Looking To The Future, David Chan

Research Collection School of Social Sciences

Six major events caused Singaporeans to ponder over the future and what it will bring. As 2016 comes to a close, it is timely to reflect on the past 12 months, which I would summarise as "a future-focused year" - one filled with events and issues that made people ponder about their own future and that of the country. It is useful to revisit the way we approached the key events and issues. After all, when it comes to thinking about the future, how we think is as important as what we think.


Semi-Automated Tool For Providing Effective Feedback On Programming Assignments, Min Yan Beh, Swapna Gottipati, David Lo, Venky Shankararaman Dec 2016

Semi-Automated Tool For Providing Effective Feedback On Programming Assignments, Min Yan Beh, Swapna Gottipati, David Lo, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Human grading of introductory programming assignments is tedious and error-prone, hence researchers have attempted to develop tools that support automatic assessment of programming code. However, most such efforts often focus only on scoring solutions, rather than assessing whether students correctly understand the problems. To aid the students improve programming skills, effective feedback on programming assignments plays an important role. Individual feedback generation is tedious and painstaking process. We present a tool that not only automatically generates the static and dynamic program analysis outcomes, but also clusters similar code submissions to provide scalable and effective feedback to the students. We studied …


Demystifying And Puncturing The Inflated Delay In Smartphone-Based Wifi Network Measurement, Weichao Li, Daoyuan Wu, Rocky K. C. Chang, Ricky K. P. Mok Dec 2016

Demystifying And Puncturing The Inflated Delay In Smartphone-Based Wifi Network Measurement, Weichao Li, Daoyuan Wu, Rocky K. C. Chang, Ricky K. P. Mok

Research Collection School Of Computing and Information Systems

Using network measurement apps has become a very effective approach to crowdsourcing WiFi network performance data. However, these apps usually measure the user-level performancemetrics instead of the network-level performance which is important for diagnosing performance problems. In this paper we report for the first time that a major source of measurement noises comes from the periodical SDIO (Secure Digital Input Output) bus sleep inside the phone. The additional latency introduced by SDIO and Power Saving Mode can inflate and unstablize network delay measurement significantly. We carefully design and implement a scheme to wake up the phone for delay measurement by …


Differential Parental Investment, Jose C. Yong, Norman P. Li Dec 2016

Differential Parental Investment, Jose C. Yong, Norman P. Li

Research Collection School of Social Sciences

Differences in minimum obligatory parental investment contributed by men and women lead the sexes to diverge in their sexual strategies and affective experiences, although under certain conditions, men’s mating preferences converge with women’s. This chapter first describes necessary or obligatory parental investment, examines the origins of sex differences in obligatory parental investment, describes examples of such differences across a range of species, and highlights the consequences of these differences in terms of human sexual strategies, conflicts, and affective experiences.


Predicting The Performance Of Queues: A Data Analytic Approach, Kum Khiong Yang, Cayirli Tugba, Mei Wan Low Dec 2016

Predicting The Performance Of Queues: A Data Analytic Approach, Kum Khiong Yang, Cayirli Tugba, Mei Wan Low

Research Collection Lee Kong Chian School Of Business

Existing models of multi-server queues with system transience and non-standard assumptions are either too complex or restricted in their assumptions to be used broadly in practice. This paper proposes using data analytics, combining computer simulation to generate the data and an advanced non-linear regression technique called the Alternating Conditional Expectation (ACE) to construct a set of easy-to-use equations to predict the performance of queues with a scheduled start and end time. Our results show that the equations can accurately predict the queue performance as a function of the number of servers, mean arrival load, session length and service time variability. …


Limited Attention, Marital Events And Hedge Funds, Yan Lu, Sugata Ray, Melvyn Teo Dec 2016

Limited Attention, Marital Events And Hedge Funds, Yan Lu, Sugata Ray, Melvyn Teo

Research Collection Lee Kong Chian School Of Business

We explore the impact of limited attention by analyzing the performance of hedge fund managers who are distracted by marital events. We find that marriages and divorces are associated with significantly lower fund alpha, during the six-month period surrounding and the two-year period after the event. Busy managers who manage multiple funds and who are not part of a team are more affected by marital transitions. Inattentive managers place fewer active bets relative to their style peers, load more on index stocks, exhibit higher R-squareds with respect to systematic factors, and are more prone to the disposition effect.


The Effect Of Monetary Policy On Bank Wholesale Funding, Hyunsoo Choi, Hyun Soo Choi Dec 2016

The Effect Of Monetary Policy On Bank Wholesale Funding, Hyunsoo Choi, Hyun Soo Choi

Research Collection Lee Kong Chian School Of Business

We study how monetary policy affects the funding composition of the banking sector. When monetary tightening reduces the retail deposit supply due to, for example, a decrease in bank reserves or in money demand, banks try to substitute the deposit outflows with more wholesale funding in order to mitigate the policy impact on their lending. Banks have varying degrees of accessibility to wholesale funding sources because of financial frictions, and those banks that are large or that have a greater reliance on wholesale funding increase their wholesale funding more. As a result, monetary tightening increases both the reliance on and …


Endogenous Quality Choice, Signaling, And Welfare, Gea M. Lee, Seung Han Yoo Dec 2016

Endogenous Quality Choice, Signaling, And Welfare, Gea M. Lee, Seung Han Yoo

Research Collection School Of Economics

We consider a model in which each worker endogenously selects his own type through aprivate investment decision and selects a public signal in the labor market. Signaling thencontributes to social welfare through its influence on the quality choice. We offer a rationalefor the argument that there are too many high-type workers from a welfare perspective,identifying circumstances under which separating equilibrium generates too many high-typeworkers while having to use the incentive-compatible signal and treat high-type workersdifferently in the market. The inefficiency can then be reduced in pooling equilibrium.


Using A Mobile Gaming App To Enhance Accounting Education, Poh Sun Seow, Suay Peng Wong Dec 2016

Using A Mobile Gaming App To Enhance Accounting Education, Poh Sun Seow, Suay Peng Wong

Research Collection School Of Accountancy

This paper describes the first mobile-gaming app for learning accounting, Accounting Challenge (ACE). As at June 30th 2016, ACE was downloaded 21,800 times, spanning 90 countries and has won three international teaching awards. The app was motivated by the aim to empower students to learn accounting in a fun way, outside the classroom. ACE combines mobile learning and game-based learning to generate interest and motivation for the digital-native students and is freely available in iPhone/iPad and Android version. Based on a voluntary students’ survey, majority rated ACE favorably, indicating that they were satisfied with the app. ACE was presented at …


Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan Dec 2016

Cast2face: Assigning Character Names Onto Faces In Movie With Actor-Character Correspondence, Guangyu Gao, Mengdi Xu, Jialie Shen, Huangdong Ma, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Automatically identifying characters in movies has attracted researchers' interest and led to several significant and interesting applications. However, due to the vast variation in character appearance as well as the weakness and ambiguity of available annotation, it is still a challenging problem. In this paper, we investigate this problem with the supervision of actor-character name correspondence provided by the movie cast. Our proposed framework, namely, Cast2Face, is featured by: 1) we restrict the assigned names within the set of character names in the cast; 2) for each character, by using the corresponding actor and movie name as keywords, we retrieve …


The Atmospheric Circulation Reconstructions Over The Earth (Acre) Initiative Acre China Workshop: Recovery, Digitization, And Analysis Of Pre-Mid-Twentieth Century Climate Observational Data In East Asia Workshop On 23-24 August, Beijing, China, Fiona Williamson, Guoyu Ren, Rob Allan Dec 2016

The Atmospheric Circulation Reconstructions Over The Earth (Acre) Initiative Acre China Workshop: Recovery, Digitization, And Analysis Of Pre-Mid-Twentieth Century Climate Observational Data In East Asia Workshop On 23-24 August, Beijing, China, Fiona Williamson, Guoyu Ren, Rob Allan

Research Collection School of Social Sciences

This commentary discusses a recent workshop designed to explore the extant historic instrumental record of weather observations for China, East Asia, and the China Seas region; to uncover new sources of observations; and to work on joint initiatives for their recovery and inclusion in open access data sets. The workshop was funded by the UK Newton Fund's Climate Science for Service Partnership China. It was organized by the Atmospheric Circulation Reconstructions over the Earth China, the China Meteorological Administration (CMA), the Beijing Climate Centre, and the China University of Geosciences (Wuhan) and held at CMA offices in Beijing.


A Tale Of Three Bishops: Ideologies Of Chineseness And Global Cities In Vancouver's Anglican Realignment, Justin Kh Tse Dec 2016

A Tale Of Three Bishops: Ideologies Of Chineseness And Global Cities In Vancouver's Anglican Realignment, Justin Kh Tse

Research Collection School of Social Sciences

Most accounts of the 2002 departure of some conservative Anglican parishes from Vancouver’s Diocese of New Westminster (DoNW) over same-sex blessings seemed to fit the narrative of a battle over sexuality in the global realignment of the Anglican Communion. However, attention to the consecration of two new Chinese Anglican bishops—Silas Ng Tak-yin and Stephen Leung Wing-hong, both from Hong Kong—reveals that their split from the DoNW’s Bishop Michael Ingham had more to do with an ideology of cultural pluralization deploying “Asian values.” I, therefore, argue that the schism in Vancouver was a division over the three bishops’ imaginations of global …


Violation Of Long-Term Mate Preferences, M. L. W. Long, Norman P. Li Dec 2016

Violation Of Long-Term Mate Preferences, M. L. W. Long, Norman P. Li

Research Collection School of Social Sciences

Violations of short-term mate preferences refer to instances in which a person in a short-term, casual sexual relationship has mate preferences that were in place when the relationship commenced but subsequently are not being met.


Providing Rural Public Services Through Land Commodification: Policy Innovations And Rural-Urban Integration In Chengdu, Qian Forrest Zhang, Jianling Wu Dec 2016

Providing Rural Public Services Through Land Commodification: Policy Innovations And Rural-Urban Integration In Chengdu, Qian Forrest Zhang, Jianling Wu

Research Collection School of Social Sciences

Zhang and Wu offer a detailed account of the innovative local policies in Chengdu, China, where a national land-use policy that has created widespread problems in other trial areas has been turned into a positive, transformative force in rural reconstruction. There are three key innovations in this so-called ‘Chengdu model’: First, leveraging on the most important resource in rural area, land, and through the commodification of land development rights, creating a financial source that can fund rural public services provision; second, transforming traditional rural residential patterns and concentrating the rural population in newly built residential communities; and, finally, using both …


Violation Of Short-Term Mate Preferences, Jose C. Yong, Norman P. Li Dec 2016

Violation Of Short-Term Mate Preferences, Jose C. Yong, Norman P. Li

Research Collection School of Social Sciences

Violations of short-term mate preferences refer to instances in which a person in a short-term, casual sexual relationship has mate preferences that were in place when the relationship commenced but subsequently are not being met.


Cross Cultural Regularities In The Cognitive Architecture Of Pride, Daniel Sznycer, Laith Al-Shawaf, Yoella Bereby-Meyer, Oliver Scott Curry, Delphine De Smet, Elsa Ermer, Sangin Kim, Sunhwa Kim, Norman P. Li, Maria Florencia Lopez Seal, Jennifer Mcclung, Jiaqing O, Yohsuke Ohtsubo, Tadeg Quillien, Max Schaub, Aaron Sell, Florian Van Leeuwen, Leda Cosmide, John Tooby Dec 2016

Cross Cultural Regularities In The Cognitive Architecture Of Pride, Daniel Sznycer, Laith Al-Shawaf, Yoella Bereby-Meyer, Oliver Scott Curry, Delphine De Smet, Elsa Ermer, Sangin Kim, Sunhwa Kim, Norman P. Li, Maria Florencia Lopez Seal, Jennifer Mcclung, Jiaqing O, Yohsuke Ohtsubo, Tadeg Quillien, Max Schaub, Aaron Sell, Florian Van Leeuwen, Leda Cosmide, John Tooby

Research Collection School of Social Sciences

Pride occurs in every known culture, appears early in development, is reliably triggered by achievements and formidability, and causes a characteristic display that is recognized everywhere. Here, we evaluatethe theory that pride evolved to guide decisions relevant to pursuing actions that enhance valuation and respect for a person in the minds of others. By hypothesis, pride is a neurocomputational program tailored by selection to orchestrate cognition and behavior in the service of: (i) motivating the costeffective pursuit of courses of action that would increase others’ valuations and respect of the individual, (ii) motivating the advertisement of acts or characteristics whose …


The History Problem: The Politics Of War Commemoration In East Asia, Hiro Saito Dec 2016

The History Problem: The Politics Of War Commemoration In East Asia, Hiro Saito

Research Collection School of Social Sciences

Seventy years have passed since the end of the Asia-Pacific War, yet Japan remains embroiled in controversy with its neighbors over the war’s commemoration. Among the many points of contention between Japan, China, and South Korea are interpretations of the Tokyo War Crimes Trial, apologies and compensation for foreign victims of Japanese aggression, prime ministerial visits to the Yasukuni Shrine, and the war’s portrayal in textbooks. Collectively, these controversies have come to be called the “history problem.” But why has the problem become so intractable? Can it ever be resolved, and if so, how? To answer these questions, the author …


The Effect Of Monetary Policy On Bank Wholesale Funding, Hyunsoo Choi, Hyun Soo Choi Dec 2016

The Effect Of Monetary Policy On Bank Wholesale Funding, Hyunsoo Choi, Hyun Soo Choi

Research Collection Lee Kong Chian School Of Business

We study how monetary policy affects the funding composition of the banking sector. When monetary tightening reduces the retail deposit supply due to, for example, a decrease in bank reserves or in money demand, banks try to substitute the deposit outflows with more wholesale funding in order to mitigate the policy impact on their lending. Banks have varying degrees of accessibility to wholesale funding sources because of financial frictions, and those banks that are large or that have a greater reliance on wholesale funding increase their wholesale funding more. As a result, monetary tightening increases both the reliance on and …


Answering Why-Not And Why Questions On Reverse Top-K Queries, Qing Liu, Yunjun Gao, Gang Chen, Baihua Zheng, Linlin Zhou Dec 2016

Answering Why-Not And Why Questions On Reverse Top-K Queries, Qing Liu, Yunjun Gao, Gang Chen, Baihua Zheng, Linlin Zhou

Research Collection School Of Computing and Information Systems

Why-not and why questions can be posed by database users to seek clarifications on unexpected query results. Specifically, why-not questions aim to explain why certain expected tuples are absent from the query results, while why questions try to clarify why certain unexpected tuples are present in the query results. This paper systematically explores the why-not and why questions on reverse top-k queries, owing to its importance in multi-criteria decision making. We first formalize why-not questions on reverse top-k queries, which try to include the missing objects in the reverse top-k query results, and then, we propose a unified framework called …


D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang Dec 2016

D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Computing and Information Systems

Device-free localization, which does not require any device attached to the target is playing a critical role in many applications such as intrusion detection, elderly monitoring, etc. This paper introduces D-Watch, a device-free system built on top of low cost commodity-off-the-shelf (COTS) RFID hardware. Unlike previous works which consider multipaths detrimental, D-Watch leverages the "bad" multipaths to provide a decimeter level localization accuracy without offline training. D-Watch harnesses the angle-of-arrival (AoA) information from the RFID tags' backscatter signals. The key intuition is that whenever a target blocks a signal's propagation path, the signal power experiences a drop which can be …


Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang Dec 2016

Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang

Research Collection School Of Computing and Information Systems

Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results show that …


Zero++: Harnessing The Power Of Zero Appearances To Detect Anomalies In Large-Scale Data Sets, Guansong Pang, Kai Ming Ting, David Albrecht, Huidong Jin Dec 2016

Zero++: Harnessing The Power Of Zero Appearances To Detect Anomalies In Large-Scale Data Sets, Guansong Pang, Kai Ming Ting, David Albrecht, Huidong Jin

Research Collection School Of Computing and Information Systems

This paper introduces a new unsupervised anomaly detector called ZERO++ which employs the number of zero appearances in subspaces to detect anomalies in categorical data. It is unique in that it works in regions of subspaces that are not occupied by data; whereas existing methods work in regions occupied by data. ZERO++ examines only a small number of low dimensional subspaces to successfully identify anomalies. Unlike existing frequencybased algorithms, ZERO++ does not involve subspace pattern searching. We show that ZERO++ is better than or comparable with the state-of-the-art anomaly detection methods over a wide range of real-world categorical and numeric …


Server-Aided Public Key Encryption With Keyword Search, Rongman Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang Dec 2016

Server-Aided Public Key Encryption With Keyword Search, Rongman Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang

Research Collection School Of Computing and Information Systems

Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is against the data privacy of users. Existing countermeasures for dealing with this security issue mainly suffer from low efficiency and are impractical for real applications. In this paper, we provide a practical and applicable treatment on this security vulnerability by formalizing a new PEKS system named server-aided public key encryption with keyword search (SA-PEKS). In SA-PEKS, to generate the keyword ciphertext/trapdoor, the user needs to …