Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 40

Full-Text Articles in Business

Exponential Qubit Reduction In Optimization For Financial Transaction Settlement, Elias X. Huber, Benjamin Y. L. Tan, Paul Robert Griffin, Dimitris G. Angelakis Aug 2024

Exponential Qubit Reduction In Optimization For Financial Transaction Settlement, Elias X. Huber, Benjamin Y. L. Tan, Paul Robert Griffin, Dimitris G. Angelakis

Research Collection School Of Computing and Information Systems

We extend the qubit-efficient encoding presented in (Tan et al. in Quantum 5:454, 2021) and apply it to instances of the financial transaction settlement problem constructed from data provided by a regulated financial exchange. Our methods are directly applicable to any QUBO problem with linear inequality constraints. Our extension of previously proposed methods consists of a simplification in varying the number of qubits used to encode correlations as well as a new class of variational circuits which incorporate symmetries thereby reducing sampling overhead, improving numerical stability and recovering the expression of the cost objective as a Hermitian observable. We also …


Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye Jun 2024

Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye

Research Collection School Of Computing and Information Systems

The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized list of smart contract weaknesses specific to the Ethereum platform. Despite the SWC Registry not being updated with new entries since 2020, the sustained development of smart contract analysis tools for detecting SWC-listed weaknesses highlights their ongoing significance in the field. However, evaluating these tools has proven challenging due to the absence of a large, unbiased, real-world dataset. To address this problem, we aim to build a large-scale SWC weakness dataset from real-world DApp projects. We recruited 22 participants and spent 44 person-months analyzing 1,199 open-source audit reports …


Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh Dec 2023

Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

Class participation can be considered as contribution to discussion, attendance, presentations, unsolicited responses, questions, comments, etc. What counts may vary across individual teachers. The more students participate, the less memorization they do, and the more they engage in higher levels of thinking, including interpretation, analysis, and synthesis. However, only a handful of students in many classrooms participate regularly, a phenomenon dubbed as "consolidation of responsibility". This study provides a literature review of inclass participation, as well as pedagogies and technologies that enhance participation. Pedagogies such as active learning, group learning, project-based learning and flipped classroom. Technologies to automate attendance taking, …


An Idealist’S Approach For Smart Contract Correctness, Duy Tai Nguyen, Hong Long Pham, Jun Sun, Quang Loc Le Nov 2023

An Idealist’S Approach For Smart Contract Correctness, Duy Tai Nguyen, Hong Long Pham, Jun Sun, Quang Loc Le

Research Collection School Of Computing and Information Systems

In this work, we experiment an idealistic approach for smart contract correctness verification and enforcement, based on the assumption that developers are either desired or required to provide a correctness specification due to the importance of smart contracts and the fact that they are immutable after deployment. We design a static verification system with a specification language which supports fully compositional verification (with the help of function specifications, contract invariants, loop invariants and call invariants). Our approach has been implemented in a tool named iContract which automatically proves the correctness of a smart contract statically or checks the unverified part …


Visually Analyzing Company-Wide Software Service Dependencies: An Industrial Case Study, Sebastian Baltes, Brian Pfitzmann, Thomas Kowark, Christoph Treude, Fabian Beck Oct 2023

Visually Analyzing Company-Wide Software Service Dependencies: An Industrial Case Study, Sebastian Baltes, Brian Pfitzmann, Thomas Kowark, Christoph Treude, Fabian Beck

Research Collection School Of Computing and Information Systems

Managing dependencies between software services is a crucial task for any company operating cloud applications. Visualizations can help to understand and maintain these com-plex dependencies. In this paper, we present a force-directed service dependency visualization and filtering tool that has been developed and used within SAP. The tool's use cases include guiding service retirement as well as understanding service deployment landscapes and their relationship to the company's organizational structure. We report how we built and adapted the tool under strict time constraints to address the requirements of our users. We further share insights on how we enabled internal adoption. For …


The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel Aug 2023

The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel

Research Collection School Of Computing and Information Systems

Cryptocurrencies have been all the rage in recent years, with many being drawn to their appeal as speculative investment assets. Its proponents also champion the secure and decentralised nature of the technology it is based on, called the blockchain. Given the secure nature of blockchain technology, the idea of adopting cryptocurrencies as legal tender currency has also been mooted and experimented with – with the most famous example being the Central American nation of El Salvador’s bold move to adopting the cryptocurrency Bitcoin as legal tender in September 2021. In theory, this would provide a solution to the high transaction …


Beyond "Protected" And "Private": An Empirical Security Analysis Of Custom Function Modifiers In Smart Contracts, Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, Lingxiao Jiang Jul 2023

Beyond "Protected" And "Private": An Empirical Security Analysis Of Custom Function Modifiers In Smart Contracts, Yuzhou Fang, Daoyuan Wu, Xiao Yi, Shuai Wang, Yufan Chen, Mengjie Chen, Yang Liu, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

A smart contract is a piece of application-layer code running on blockchain ledgers and it provides programmatic logic via transaction-based execution of pre-defined functions. Smart contract functions are by default invokable by any party. To safeguard them, the mainstream smart contract language, i.e., Solidity of the popular Ethereum blockchain, proposed a unique language-level keyword called “modifier,” which allows developers to define custom function access control policies beyond the traditional “protected” and “private” modifiers in classic programming languages.In this paper, we aim to conduct a large-scale security analysis of the modifiers used in real-world Ethereum smart contracts. To achieve this, we …


Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu Apr 2023

Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu

Research Collection School Of Computing and Information Systems

Ethereum has become a popular blockchain with smart contracts for investors nowadays. Due to the decentralization and anonymity of Ethereum, Ponzi schemes have been easily deployed and caused significant losses to investors. However, there are still no explainable and effective methods to help investors easily identify Ponzi schemes and validate whether a smart contract is actually a Ponzi scheme. To fill the research gap, we propose PonziLens, a novel visualization approach to help investors achieve early identification of Ponzi schemes by investigating the operation codes of smart contracts. Specifically, we conduct symbolic execution of opcode and extract the control flow …


Investigating Accessibility Challenges And Opportunities For Users With Low Vision Disabilities In Customer-To-Customer (C2c) Marketplaces, Bektur Ryskeldiev, Kotaro Hara, Mariko Kobayashi, Koki Kusano Oct 2022

Investigating Accessibility Challenges And Opportunities For Users With Low Vision Disabilities In Customer-To-Customer (C2c) Marketplaces, Bektur Ryskeldiev, Kotaro Hara, Mariko Kobayashi, Koki Kusano

Research Collection School Of Computing and Information Systems

Inaccessible e-commerce websites and mobile applications exclude people with visual impairments (PVI) from online shopping. Customer-to-customer (C2C) marketplaces, a form of e-commerce where trading happens not between businesses and customers but between customers, could pose a unique set of challenges in the interactions that the platform brings about. Through online questionnaire and remote interviews, we investigate problems experienced by people with low vision disabilities in common C2C scenarios. Our study with low vision participants (N = 12) reveal both previously known general accessibility issues (e.g., web and mobile interface accessibility) and C2C specific accessibility issues (e.g., inability to confirm item …


Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan Mar 2022

Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan

Research Collection School Of Computing and Information Systems

Digital payment has become one of the most popular payment methods all around the world, especially in countries that witnessed the rapid development of internet. As a traditional financial institution, commercial banks have been impacted by newly developed payment technology since third payment platforms have attracted customers to use the digital payment for daily consumption, transferring, and even investment. This paper focuses on analyzing whether and how the commercial banks in China have been affected by digital payment by using empirical methods. Systematic Generalized Method of Moments (SYS-GMM) is used to test the relationship between the productivity of commercial banks …


Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen Jan 2022

Defining Smart Contract Defects On Ethereum, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen

Research Collection School Of Computing and Information Systems

Smart contracts are programs running on a blockchain. They are immutable to change, and hence can not be patched for bugs once deployed. Thus it is critical to ensure they are bug-free and well-designed before deployment. A Contract defect is an error, flaw or fault in a smart contract that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The detection of contract defects is a method to avoid potential bugs and improve the design of existing code. Since smart contracts contain numerous distinctive features, such as the gas system. decentralized, it is important …


Smart Contract Development: Challenges And Opportunities, Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, Baowen Xu Oct 2021

Smart Contract Development: Challenges And Opportunities, Weiqin Zou, David Lo, Pavneet Singh Kochhar, Xuan-Bach D. Le, Xin Xia, Yang Feng, Zhenyu Chen, Baowen Xu

Research Collection School Of Computing and Information Systems

Smart contract, a term which was originally coined to refer to the automation of legal contracts in general, has recently seen much interest due to the advent of blockchain technology. Recently, the term is popularly used to refer to low-level code scripts running on a blockchain platform. Our study focuses exclusively on this subset of smart contracts. Such smart contracts have increasingly been gaining ground, finding numerous important applications (e.g., crowdfunding) in the real world. Despite the increasing popularity, smart contract development still remains somewhat a mystery to many developers largely due to its special design and applications. Are there …


Maintenance-Related Concerns For Post-Deployed Ethereum Smart Contract Development: Issues, Techniques, And Future Challenges, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiaohu Yang Aug 2021

Maintenance-Related Concerns For Post-Deployed Ethereum Smart Contract Development: Issues, Techniques, And Future Challenges, Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiaohu Yang

Research Collection School Of Computing and Information Systems

Software development is a very broad activity that captures the entire life cycle of a software, which includes designing, programming, maintenance and so on. In this study, we focus on the maintenance-related concerns of the post-deployment of smart contracts. Smart contracts are self-executed programs that run on a blockchain. They cannot be modified once deployed and hence they bring unique maintenance challenges compared to conventional software. According to the definition of ISO/IEC 14764, there are four kinds of software maintenance, i.e., corrective, adaptive, perfective, and preventive maintenance. This study aims to answer (i) What kinds of issues will smart contract …


Revman: Revenue-Aware Multi-Task Online Insurance Recommendation, Yu Li, Yi Zhang, Lu Gan, Gengwei Hong, Zimu Zhou, Qiang Li Feb 2021

Revman: Revenue-Aware Multi-Task Online Insurance Recommendation, Yu Li, Yi Zhang, Lu Gan, Gengwei Hong, Zimu Zhou, Qiang Li

Research Collection School Of Computing and Information Systems

Online insurance is a new type of e-commerce with exponential growth. An effective recommendation model that maximizes the total revenue of insurance products listed in multiple customized sales scenarios is crucial for the success of online insurance business. Prior recommendation models are ineffective because they fail to characterize the complex relatedness of insurance products in multiple sales scenarios and maximize the overall conversion rate rather than the total revenue. Even worse, it is impractical to collect training data online for total revenue maximization due to the business logic of online insurance. We propose RevMan, a Revenue-aware Multi-task Network for online …


Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun Nov 2020

Coinwatch: A Clone-Based Approach For Detecting Vulnerabilities In Cryptocurrencies, Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun

Research Collection School Of Computing and Information Systems

Cryptocurrencies have become very popular in recent years. Thousands of new cryptocurrencies have emerged, proposing new and novel techniques that improve on Bitcoin's core innovation of the blockchain data structure and consensus mechanism. However, cryptocurrencies are a major target for cyber-attacks, as they can be sold on exchanges anonymously and most cryptocurrencies have their codebases publicly available. One particular issue is the prevalence of code clones in cryptocurrencies, which may amplify security threats. If a vulnerability is found in one cryptocurrency, it might be propagated into other cloned cryptocurrencies. In this work, we propose a systematic remedy to this problem, …


Semantic Understanding Of Smart Contracts: Executable Operational Semantics Of Solidity, Jiao Jiao, Shuanglong Kan, Shang Wei Lin, David Sanan, Yang Liu, Jun Sun May 2020

Semantic Understanding Of Smart Contracts: Executable Operational Semantics Of Solidity, Jiao Jiao, Shuanglong Kan, Shang Wei Lin, David Sanan, Yang Liu, Jun Sun

Research Collection School Of Computing and Information Systems

Bitcoin has been a popular research topic recently. Ethereum (ETH), a second generation of cryptocurrency, extends Bitcoin's design by offering a Turing-complete programming language called Solidity to develop smart contracts. Smart contracts allow creditable execution of contracts on EVM (Ethereum Virtual Machine) without third parties. Developing correct and secure smart contracts is challenging due to the decentralized computation nature of the blockchain. Buggy smart contracts may lead to huge financial loss. Furthermore, smart contracts are very hard, if not impossible, to patch once they are deployed. Thus, there is a recent surge of interest in analyzing and verifying smart contracts. …


Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan Megargel, Venky Shankararaman, David K. Walker Jan 2020

Migrating From Monoliths To Cloud-Based Microservices: A Banking Industry Example, Alan Megargel, Venky Shankararaman, David K. Walker

Research Collection School Of Computing and Information Systems

As more organizations are placing cloud computing at the heart of their digital transformation strategy, it is important that they adopt appropriate architectures and development methodologies to leverage the full benefits of the cloud. A mere “lift and move” approach, where traditional monolith applications are moved to the cloud will not support the demands of digital services. While, monolithic applications may be easier to develop and control, they are inflexible to change and lack the scalability needed for cloud environments. Microservices architecture, which adopts some of the concepts and principles from service-oriented architecture, provides a number of benefits when developing …


Smrtfridge: Iot-Based, User Interaction-Driven Food Item & Quantity Sensing, Amit Sharma, Archan Misra, Vengateswaran Subramaniam, Youngki Lee Nov 2019

Smrtfridge: Iot-Based, User Interaction-Driven Food Item & Quantity Sensing, Amit Sharma, Archan Misra, Vengateswaran Subramaniam, Youngki Lee

Research Collection School Of Computing and Information Systems

We present SmrtFridge, a consumer-grade smart fridge prototype that demonstrates two key capabilities: (a) identify the individual food items that users place in or remove from a fridge, and (b) estimate the residual quantity of food items inside a refrigerated container (opaque or transparent). Notably, both of these inferences are performed unobtrusively, without requiring any explicit user action or tagging of food objects. To achieve these capabilities, SmrtFridge uses a novel interaction-driven, multi-modal sensing pipeline, where Infrared (IR) and RGB video sensing, triggered whenever a user interacts naturally with the fridge, is used to extract a foreground visual image of …


Exploratory Analysis Of Individuals' Mobility Patterns And Experienced Conflicts In Workgroup, Nur Camellia Binte Zakaria, Kenneth T. Goh, Youngki Lee, Rajesh Krishna Balan Jun 2019

Exploratory Analysis Of Individuals' Mobility Patterns And Experienced Conflicts In Workgroup, Nur Camellia Binte Zakaria, Kenneth T. Goh, Youngki Lee, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

Much research argues the importance of supporting social interactions in teams and communities. The field of mobile sensing alone offers significant advances in recording and understanding human and group behaviours. However, little is known about behavioural changes as a consequence of in-group phenomena. One prominent example is intra-group conflict, which naturally arises between diverse groups of people. We demonstrate the feasibility of our approach to extract mobility patterns of individual's group behaviours sensed from a WiFi indoor localisation system and explore how these patterns relate to their team processes. 62 students enrolled in a project-intensive module, Software Engineering, were tracked …


I4s: Capturing Shopper’S In-Store Interactions, Sougata Sen, Archan Misra, Vigneshwaran Subbaraju, Karan Grover, Meeralakshmi Radhakrishnan, Rajesh K. Balan, Youngki Lee Oct 2018

I4s: Capturing Shopper’S In-Store Interactions, Sougata Sen, Archan Misra, Vigneshwaran Subbaraju, Karan Grover, Meeralakshmi Radhakrishnan, Rajesh K. Balan, Youngki Lee

Research Collection School Of Computing and Information Systems

In this paper, we present I4S, a system that identifies item interactions of customers in a retail store through sensor data fusion from smartwatches, smartphones and distributed BLE beacons. To identify these interactions, I4S builds a gesture-triggered pipeline that (a) detects the occurrence of “item picks”, and (b) performs fine-grained localization of such pickup gestures. By analyzing data collected from 31 shoppers visiting a mid-sized stationary store, we show that we can identify person-independent picking gestures with a precision of over 88%, and identify the rack from where the pick occurred with 91%+ precision (for popular racks).


Towards Easy Comparison Of Local Businesses Using Online Reviews, Yong Wang, Hammad Haleem, Conglei Shi, Yanhong Wu, Xun Zhao, Siwei Fu, Huamin Qu Jun 2018

Towards Easy Comparison Of Local Businesses Using Online Reviews, Yong Wang, Hammad Haleem, Conglei Shi, Yanhong Wu, Xun Zhao, Siwei Fu, Huamin Qu

Research Collection School Of Computing and Information Systems

With the rapid development of e-commerce, there is an increasing number of online review websites, such as Yelp, to help customers make better purchase decisions. Viewing online reviews, including the rating score and text comments by other customers, and conducting a comparison between different businesses are the key to making an optimal decision. However, due to the massive amount of online reviews, the potential difference of user rating standards, and the significant variance of review time, length, details and quality, it is difficult for customers to achieve a quick and comprehensive comparison. In this paper, we present E-Comp, a carefully-designed …


Technologies For Ageing-In-Place: The Singapore Context, Nadee Goonawardene, Pius Lee, Hwee Xian Tan, Alvin C. Valera, Hwee-Pink Tan Feb 2018

Technologies For Ageing-In-Place: The Singapore Context, Nadee Goonawardene, Pius Lee, Hwee Xian Tan, Alvin C. Valera, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

The number of elderly citizens aged 65 and above in Singapore, is expected to double from 440,000in 2015, to 900,000 by 2030. Along with this “Silver Tsunami” is the upward trend of the numberof elderly who are living alone — which is estimated to increase from 35,000 in 2012 to 83,000 by2030. These exclude elderly who are alone at home when their family members are working.Elderly who are staying alone are at higher risk of social isolation and tend to have poorer accessto healthcare. In addition, the general elderly population is typically more susceptible to deteriorating health conditions, which can …


Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang Jan 2018

Real-World Large-Scale Iot Systems For Community Eldercare: A Comparative Study On System Dependability, Hwee-Pink Tan, Austin Zhang

Research Collection School Of Computing and Information Systems

The paradigm of aging-in-place — where the elderly live and age in their own homes, independently and safely, with care provided by the community — is compelling, especially in societies that face both shortages in institutionalized eldercare resources, and rapidly-aging populations. Internet-of-Things (IoT) technologies, particularly in-home monitoring solutions, are commercially available, and can be a fundamental enabler of smart community eldercare, if they are dependable. In this paper, we present our findings on system performance of solutions from two vendors, which we have deployed at scale for technology-enabled community care. In particular, we highlight the importance of quantifying actual system …


Who Will Leave The Company?: A Large-Scale Industry Study Of Developer Turnover By Mining Monthly Work Report, Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li May 2017

Who Will Leave The Company?: A Large-Scale Industry Study Of Developer Turnover By Mining Monthly Work Report, Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

Software developer turnover has become a big challenge for information technology (IT) companies. The departure of key software developers might cause big loss to an IT company since they also depart with important business knowledge and critical technical skills. Understanding developer turnover is very important for IT companies to retain talented developers and reduce the loss due to developers' departure. Previous studies mainly perform qualitative observations or simple statistical analysis of developers' activity data to understand developer turnover. In this paper, we investigate whether we can predict the turnover of software developers in non-open source companies by automatically analyzing monthly …


Follow-My-Lead: Intuitive Indoor Path Creation And Navigation Using See-Through Interactive Videos, Quentin Roy, Simon T. Perrault, Shengdong Zhao, Richard Davis, Anuroop Pattena Vaniyar, Velko Vechev, Youngki Lee, Archan Misra May 2017

Follow-My-Lead: Intuitive Indoor Path Creation And Navigation Using See-Through Interactive Videos, Quentin Roy, Simon T. Perrault, Shengdong Zhao, Richard Davis, Anuroop Pattena Vaniyar, Velko Vechev, Youngki Lee, Archan Misra

Research Collection School Of Computing and Information Systems

We present Follow-My-Lead, an alternative indoor navigation technique that uses visual information recorded on an actual navigation path as a navigational guide. Its design revealed a trade-off between the fidelity of information provided to users and their effort to acquire it. Our first experiment revealed that scrolling through a continuous image stream of the navigation path is highly informative, but it becomes tedious with constant use. Discrete image checkpoints require less effort, but can be confusing. A balance may be struck by adding fast video transitions between image checkpoints, but precise control is required to handle difficult situations. Authoring still …


Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo Dec 2016

Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo

Research Collection School Of Computing and Information Systems

The advent of the Web brought about major changes in the way people search for jobs and companies look for suitable candidates. As more employers and recruitment firms turn to the Web for job candidate search, an increasing number of people turn to the Web for uploading and creating their online resumes. Resumes are often the first source of information about candidates and also the first item of evaluation in candidate selection. Thus, it is imperative that resumes are complete, free of errors and well-organized. We present an automated resume evaluation tool called 'CareerMapper'. Our tool is designed to conduct …


Demo: Smartwatch Based Shopping Gesture Recognition, Meeralakshmi Radhakrishnan, Sharanya Eswaran, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Krishna Balan Jun 2016

Demo: Smartwatch Based Shopping Gesture Recognition, Meeralakshmi Radhakrishnan, Sharanya Eswaran, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

In the current retail segment, the retail store owners are keen to understand the browsing behavior and purchase pattern of the shoppers inside the physical stores. Profiling the behavior of the shopper is key to success for any marketing strategies that can optimize or personalize shopping-related services in real-time. We envision that exploiting the knowledge of real-time behavior of shopper’s in-store activities enables novel applications such as: (a) targeted advertising or recommendations: based on longer term shopper profiles, (b) proactive retail help to assist the shoppers who are confused in choosing between two items, (c) smart reminders that can remind …


Fusing Wifi And Video Sensing For Accurate Group Detection In Indoor Spaces, Kasthuri Jayarajah, Zaman Lantra, Archan Misra Jun 2016

Fusing Wifi And Video Sensing For Accurate Group Detection In Indoor Spaces, Kasthuri Jayarajah, Zaman Lantra, Archan Misra

Research Collection School Of Computing and Information Systems

Understanding one's group context in indoor spaces is useful for many reasons - e.g., at a shopping mall, knowing a customer's group context can help in offering context-specific incentives, or estimating taxi demand for customers exiting the mall. Group detection and monitoring using WiFi-based indoor location traces fails when users are invisible (either because they don't carry smartphones, or because their WiFi is turned OFF) or when location tracking is inaccurate. In this paper, we propose a multi-modal group detection system that fuses two independent modes: video and WiFi, for detecting groups with low latency and high accuracy. We present …


Iris: Tapping Wearable Sensing To Capture In-Store Retail Insights On Shoppers, Meera Radhakrishnan, Sharanya Eswaran, Archan Misra, Deepthi Chander, Koustuv Dasgupta Mar 2016

Iris: Tapping Wearable Sensing To Capture In-Store Retail Insights On Shoppers, Meera Radhakrishnan, Sharanya Eswaran, Archan Misra, Deepthi Chander, Koustuv Dasgupta

Research Collection School Of Computing and Information Systems

We investigate the possibility of using a combination of a smartphone and a smartwatch, carried by a shopper, to get insights into the shopper’s behavior inside a retail store. The proposed IRIS framework uses standard locomotive and gestural micro-activities as building blocks to define novel composite features that help classify different facets of a shopper’s interaction/experience with individual items, as well as attributes of the overall shopping episode or the store. Besides defining such novel features, IRIS builds a novel segmentation algorithm, which partitions the duration of an entire shopping episode into atomic item-level interactions, by using a combination of …


Maximizing Lifetime In Clustered Wsns With Energy Harvesting Relay: Profiling And Modeling, Pengfei Zhang, Hwee-Pink Tan, Gaoxi Xiao, Yi Yu Apr 2015

Maximizing Lifetime In Clustered Wsns With Energy Harvesting Relay: Profiling And Modeling, Pengfei Zhang, Hwee-Pink Tan, Gaoxi Xiao, Yi Yu

Research Collection School Of Computing and Information Systems

Inspired by clustering and energy harvesting techniques, we study multiple-cluster wireless sensor networks with energy harvesting (EH) sensors serving as relay for cluster heads. In this paper, we derive the model for realistic energy harvesting rate. Then we propose distributed matching algorithm for EHs to serve as relay for CHs. The proposed algorithm could find optimal/near-optimal CH-EH matching in short time and still achieve good performance. We evaluate the performance of our method through theoretical analysis as well as simulation.