Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 109 of 109

Full-Text Articles in Physical Sciences and Mathematics

Walverine: A Walrasian Trading Agent, Shih-Fen Cheng, Evan Leung, Kevin M. Lochner, Kevin O'Malley, Daniel M. Reeves, Julian L. Schvartzman, Michael P. Wellman Apr 2005

Walverine: A Walrasian Trading Agent, Shih-Fen Cheng, Evan Leung, Kevin M. Lochner, Kevin O'Malley, Daniel M. Reeves, Julian L. Schvartzman, Michael P. Wellman

Research Collection School Of Computing and Information Systems

TAC-02 was the third in a series of Trading Agent Competition events fostering research in automating trading strategies by showcasing alternate approaches in an open-invitation market game. TAC presents a challenging travel-shopping scenario where agents must satisfy client preferences for complementary and substitutable goods by interacting through a variety of market types. Michigan's entry, Walverine, bases its decisions on a competitive (Walrasian) analysis of the TAC travel economy. Using this Walrasian model, we construct a decision-theoretic formulation of the optimal bidding problem, which Walverine solves in each round of bidding for each good. Walverine's optimal bidding approach, as well as …


Integrating User Feedback Log Into Relevance Feedback By Coupled Svm For Content-Based Image Retrieval, Steven C. H. Hoi, Michael R. Lyu, Rong Jin Apr 2005

Integrating User Feedback Log Into Relevance Feedback By Coupled Svm For Content-Based Image Retrieval, Steven C. H. Hoi, Michael R. Lyu, Rong Jin

Research Collection School Of Computing and Information Systems

Relevance feedback has been shown as an important tool to boost the retrieval performance in content-based image retrieval. In the past decade, various algorithms have been proposed to formulate relevance feedback in contentbased image retrieval. Traditional relevance feedback techniques mainly carry out the learning tasks by focusing lowlevel visual features of image content with little consideration on log information of user feedback. However, from a long-term learning perspective, the user feedback log is one of the most important resources to bridge the semantic gap problem in image retrieval. In this paper we propose a novel technique to integrate the log …


Privacy And Ownership Preserving Of Outsourced Medical Data, Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng Apr 2005

Privacy And Ownership Preserving Of Outsourced Medical Data, Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng

Research Collection School Of Computing and Information Systems

The demand for the secondary use of medical data is increasing steadily to allow for the provision of better quality health care. Two important issues pertaining to this sharing of data have to be addressed: one is the privacy protection for individuals referred to in the data; the other is copyright protection over the data. In this paper, we present a unified framework that seamlessly combines techniques of binning and digital watermarking to attain the dual goals of privacy and copyright protection. Our binning method is built upon an earlier approach of generalization and suppression by allowing a broader concept …


Mastaq: A Middleware Architecture For Sensor Applications With Statistical Quality Constraints, Inseok Hwang, Qi Han, Archan Misra Mar 2005

Mastaq: A Middleware Architecture For Sensor Applications With Statistical Quality Constraints, Inseok Hwang, Qi Han, Archan Misra

Research Collection School Of Computing and Information Systems

We present the design goals and functional components of MASTAQ, a data management middleware for pervasive applications that utilize sensor data. MASTAQ allows applications to specify their quality-of information (QoI) preferences (in terms of statistical metrics over the data) independent of the underlying network topology. It then achieves energy efficiency by adaptively activating and querying only the subset of sensor nodes needed to meet the target QoI bounds. We also present a closed-loop feedback mechanism based on broadcasting of activation probabilities, which allows MASTAQ to activate the appropriate number of sensors without requiring any inter-sensor coordination or knowledge of the …


Fingerprinting Relational Databases: Schemes And Specialities, Yingjiu Li, Vipin Swarup, Sushil Jajodia Mar 2005

Fingerprinting Relational Databases: Schemes And Specialities, Yingjiu Li, Vipin Swarup, Sushil Jajodia

Research Collection School Of Computing and Information Systems

In this paper, we present a technique for fingerprinting relational data by extending Agrawal et al.'s watermarking scheme. The primary new capability provided by our scheme is that, under reasonable assumptions, it can embed and detect arbitrary bit-string marks in relations. This capability, which is not provided by prior techniques, permits our scheme to be used as a fingerprinting scheme. We then present quantitative models of the robustness properties of our scheme. These models demonstrate that fingerprints embedded by our scheme are detectable and robust against a wide variety of attacks including collusion attacks.


Scheduling Queries To Improve The Freshness Of A Website, Haifeng Liu, Wee-Keong Ng, Ee Peng Lim Mar 2005

Scheduling Queries To Improve The Freshness Of A Website, Haifeng Liu, Wee-Keong Ng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

The World Wide Web is a new advertising medium that corporations use to increase their exposure to consumers. Very large websites whose content is derived from a source database need to maintain a freshness that reflects changes that are made to the base data. This issue is particularly significant for websites that present fast-changing information such as stock-exchange information and product information. In this article, we formally define and study the freshness of a website that is refreshed by a scheduled set of queries that fetch fresh data from the databases. We propose several online-scheduling algorithms and compare the performance …


Evaluation Of Mpeg-4 Ipmp Extension, Hwee Hwa Pang, Yongdong Wu Mar 2005

Evaluation Of Mpeg-4 Ipmp Extension, Hwee Hwa Pang, Yongdong Wu

Research Collection School Of Computing and Information Systems

MPEG-4 IPMPX (intellectual property management and protection extension) is the latest ISO standard which provides a flexible framework for protecting MPEG streams. The message mechanism of IPMPX enables interoperability among IPMPX-compliant devices no matter which protection methods are embedded. This paper highlights several problems in the message syntax of IPMPX: the tool delivery message IPMP_ToolES_AU is vulnerable to network attack, the authentication message IMP_Mutual_Authentication is incapable of defending against forgery attack, and the configuration message IPMP_SelectiveDecrptionInit is ambiguous and redundant. We propose a number of remedies to those problems, which can be incorporated into a corrigenda to improve the present …


Video Text Detection And Segmentation For Optical Character Recognition, Chong-Wah Ngo, Chi-Kwong Chan Mar 2005

Video Text Detection And Segmentation For Optical Character Recognition, Chong-Wah Ngo, Chi-Kwong Chan

Research Collection School Of Computing and Information Systems

In this paper, we present approaches to detecting and segmenting text in videos. The proposed video-text-detection technique is capable of adaptively applying appropriate operators for video frames of different modalities by classifying the background complexities. Effective operators such as the repeated shifting operations are applied for the noise removal of images with high edge density. Meanwhile, a text-enhancement technique is used to highlight the text regions of low-contrast images. A coarse-to-fine projection technique is then employed to extract text lines from video frames. Experimental results indicate that the proposed text-detection approach is superior to the machine-learning-based (such as SVM and …


Video Summarization And Scene Detection By Graph Modeling, Chong-Wah Ngo, Yu-Fei Ma, Hong-Jiang Zhang Feb 2005

Video Summarization And Scene Detection By Graph Modeling, Chong-Wah Ngo, Yu-Fei Ma, Hong-Jiang Zhang

Research Collection School Of Computing and Information Systems

In this paper, we propose a unified approach for video summarization based on the analysis of video structures and video highlights. Two major components in our approach are scene modeling and highlight detection. Scene modeling is achieved by normalized cut algorithm and temporal graph analysis, while highlight detection is accomplished by motion attention modeling. In our proposed approach, a video is represented as a complete undirected graph and the normalized cut algorithm is carried out to globally and optimally partition the graph into video clusters. The resulting clusters form a directed temporal graph and a shortest path algorithm is proposed …


Partnering For Perfection: An Economics Perspective On B2b Electronic Market Strategic Alliances, Qizhi Dai, Robert J. Kauffman Jan 2005

Partnering For Perfection: An Economics Perspective On B2b Electronic Market Strategic Alliances, Qizhi Dai, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

New technological innovations have made it possible for new intermediaries to create value in business processes that involve the procurement of manufacturing and services supplies. Associated with these innovations is the emergence of business-to-business (B2B) electronic markets. These act as digital intermediaries that aim to reduce the transaction costs and mitigate the risks inherent in procurement. They improve buyers’ capabilities to search for attractive prices and also serve to increase the liquidity of sellers’ products. In this chapter, the authors explore the evolution of B2B e-market firms in terms of the strategies they employ to “perfect” their value propositions and …


The Effects Of Shilling On Final Bid Prices In Online Auctions, Robert J. Kauffman, Charles A. Wood Jan 2005

The Effects Of Shilling On Final Bid Prices In Online Auctions, Robert J. Kauffman, Charles A. Wood

Research Collection School Of Computing and Information Systems

An increasing number of reports of online auction fraud are of growing concern to auction operators and participants. In this research, we discuss reserve price shilling, where a bidder shills in order to avoid paying auction house fees, rather than to drive up the price of the final bid. We examine the effect that premium bids have upon the final selling price, since they are linked with reserve price shill bids. We use 10,260 eBay auctions during April 2001, and identify 919 auctions involving 322 sellers and 1583 bidders involved in concurrent auctions for the exact same item. We find …


A Multi-Agent Approach For Solving Optimization Problems Involving Expensive Resources, Hoong Chuin Lau, H. Wang Jan 2005

A Multi-Agent Approach For Solving Optimization Problems Involving Expensive Resources, Hoong Chuin Lau, H. Wang

Research Collection School Of Computing and Information Systems

In this paper, we propose a multi-agent approach for solving a class of optimization problems involving expensive resources, where monolithic local search schemes perform miserably. More specifically, we study the class of bin-packing problems. Under our proposed Fine-Grained Agent System scheme, rational agents work both collaboratively and selfishly based on local search and mimic physics-motivated systems. We apply our approach to a generalization of bin-packing - the Inventory Routing Problem with Time Windows - which is an important logistics problem, and demonstrate the efficiency and effectiveness of our approach.


Robust Temporal Constraint Networks, Hoong Chuin Lau, Thomas Ou, Melvyn Sim Jan 2005

Robust Temporal Constraint Networks, Hoong Chuin Lau, Thomas Ou, Melvyn Sim

Research Collection School Of Computing and Information Systems

In this paper, we propose the Robust Temporal Constraint Network (RTCN) model for simple temporal constraint networks where activity durations are bounded by random variables. The problem is to determine whether such temporal network can be executed with failure probability less than a given 0 ≤ E ≤ 1 for each possible instantiation of the random variables, and if so. how one might find a feasible schedule with each given instantiation. The advantage of our model is that one can vary the value of ∊ to control the level of conservativeness of the solution. We present a computationally tractable and …


Exploring Bit-Difference For Approximate Knn Search In High-Dimensional Databases, Bin Cui, Heng Tao Shen, Jialie Shen, Kian-Lee Tan Jan 2005

Exploring Bit-Difference For Approximate Knn Search In High-Dimensional Databases, Bin Cui, Heng Tao Shen, Jialie Shen, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

In this paper, we develop a novel index structure to support effcient approximate k-nearest neighbor (KNN) query in high-dimensional databases. In high-dimensional spaces, the computational cost of the distance (e.g., Euclidean distance) between two points contributes a dominant portion of the overall query response time for memory processing. To reduce the distance computation, we first propose a structure (BID) using BIt-Difference to answer approximate KNN query. The BID employs one bit to represent each feature vector of point and the number of bit-difference is used to prune the further points. To facilitate real dataset which is typically skewed, we enhance …


Ontology-Assisted Mining Of Rdf Documents, Tao Jiang, Ah-Hwee Tan Jan 2005

Ontology-Assisted Mining Of Rdf Documents, Tao Jiang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Resource description framework (RDF) is becoming a popular encoding language for describing and interchanging metadata of web resources. In this paper, we propose an Apriori-based algorithm for mining association rules (AR) from RDF documents. We treat relations (RDF statements) as items in traditional AR mining to mine associations among relations. The algorithm further makes use of a domain ontology to provide generalization of relations. To obtain compact rule sets, we present a generalized pruning method for removing uninteresting rules. We illustrate a potential usage of AR mining on RDF documents for detecting patterns of terrorist activities. Experiments conducted based on …


Security Of An Ill-Posed Operator Based Scheme For Image Authentication, Yongdong Wu, Robert H. Deng Jan 2005

Security Of An Ill-Posed Operator Based Scheme For Image Authentication, Yongdong Wu, Robert H. Deng

Research Collection School Of Computing and Information Systems

This letter analyzes the security of an image authentication scheme which exploits the instability of an ill-posed operator. Since the ill-posed operator produces only a limited number of authentic images regardless of the number of watermarks, an attacker can impersonate an image owner to generate authentic images at a high probability. Our experiments demonstrate that our attack is both practical and effective.


Linear Correlation Discovery In Databases: A Data Mining Approach, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim Jan 2005

Linear Correlation Discovery In Databases: A Data Mining Approach, Cecil Chua, Roger Hsiang-Li Chiang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Very little research in knowledge discovery has studied how to incorporate statistical methods to automate linear correlation discovery (LCD). We present an automatic LCD methodology that adopts statistical measurement functions to discover correlations from databases’ attributes. Our methodology automatically pairs attribute groups having potential linear correlations, measures the linear correlation of each pair of attribute groups, and confirms the discovered correlation. The methodology is evaluated in two sets of experiments. The results demonstrate the methodology’s ability to facilitate linear correlation discovery for databases with a large amount of data.


Applying Scenario-Based Design And Claim Analysis To The Design Of A Digital Library Of Geography Examination Resources, Yin-Leng Theng, Dion Hoe-Lian Goh, Ee Peng Lim, Zehua Liu, Ming Yin, Natalie Lee-San Pang, Patricia Bao-Bao Wong Jan 2005

Applying Scenario-Based Design And Claim Analysis To The Design Of A Digital Library Of Geography Examination Resources, Yin-Leng Theng, Dion Hoe-Lian Goh, Ee Peng Lim, Zehua Liu, Ming Yin, Natalie Lee-San Pang, Patricia Bao-Bao Wong

Research Collection School Of Computing and Information Systems

This paper describes the application of Carroll’s scenario-based design and claims analysis as a means of refinement to the initial design of a digital library of geographical resources (GeogDL) to prepare Singapore students to take a national examination in geography. GeogDL is built on top of G-Portal, a digital library providing services over geospatial and georeferenced Web content. Beyond improving the initial design of GeogDL, a main contribution of the paper is making explicit the use of Carroll’s strong theory-based but undercapitalized scenario-based design and claims analysis that inspired recommendations for the refinement of GeogDL. The paper concludes with an …


Technology Competition And Optimal Investment Timing: A Real Options Perspective, Robert J. Kauffman, X. Li Jan 2005

Technology Competition And Optimal Investment Timing: A Real Options Perspective, Robert J. Kauffman, X. Li

Research Collection School Of Computing and Information Systems

Companies often choose to defer irreversible investments to maintain valuable managerial flexibility in an uncertain world. For some technology-intensive projects, technology uncertainty plays a dominant role in affecting investment timing. This article analyzes the investment timing strategy for a firm that is deciding about whether to adopt one or the other of two incompatible and competing technologies.We develop a continuous-time stochastic model that aids in the determination of optimal timing for managerial adoption within the framework of real options theory. The model captures the elements of the decision-making process in such a way so as to provide managerial guidance in …