Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 391 - 408 of 408

Full-Text Articles in Physical Sciences and Mathematics

Deep Code Comment Generation With Hybrid Lexical And Syntactical Information, Xing Hu, Ge Li, Xin Xia, David Lo, Zhi Jin Jan 2019

Deep Code Comment Generation With Hybrid Lexical And Syntactical Information, Xing Hu, Ge Li, Xin Xia, David Lo, Zhi Jin

Research Collection School Of Computing and Information Systems

During software maintenance, developers spend a lot of time understanding the source code. Existing studies show that code comments help developers comprehend programs and reduce additional time spent on reading and navigating source code. Unfortunately, these comments are often mismatched, missing or outdated in software projects. Developers have to infer the functionality from the source code. This paper proposes a new approach named Hybrid-DeepCom to automatically generate code comments for the functional units of Java language, namely, Java methods. The generated comments aim to help developers understand the functionality of Java methods. Hybrid-DeepCom applies Natural Language Processing (NLP) techniques to …


Vireo @ Video Browser Showdown 2019, Phuong Anh Nguyen, Chong-Wah Ngo, Danny Francis, Benoit Huet Jan 2019

Vireo @ Video Browser Showdown 2019, Phuong Anh Nguyen, Chong-Wah Ngo, Danny Francis, Benoit Huet

Research Collection School Of Computing and Information Systems

In this paper, the VIREO team video retrieval tool is described in details. As learned from Video Browser Showdown (VBS) 2018, the visualization of video frames is a critical need to improve the browsing effectiveness. Based on this observation, a hierarchical structure that represents the video frame clusters has been built automatically using k-means and self-organizing-map and used for visualization. Also, the relevance feedback module which relies on real-time supportvector-machine classification becomes unfeasible with the large dataset provided in VBS 2019 and has been replaced by a browsing module with pre-calculated nearest neighbors. The preliminary user study results on IACC.3 …


Analysis Of Bus Ride Comfort Using Smartphone Sensor Data, Hoong-Chor Chin, Xingting Pang, Zhaoxia Wang Jan 2019

Analysis Of Bus Ride Comfort Using Smartphone Sensor Data, Hoong-Chor Chin, Xingting Pang, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

Passenger comfort is an important indicator that is often used to measure the quality of public transport services. It may also be a crucial factor in the passenger’s choice of transport mode. The typical method of assessing passenger comfort is through a passenger interview survey which can be tedious. This study aims to investigate the relationship between bus ride comfort based on ride smoothness and the vehicle’s motion detected by the smartphone sensors. An experiment was carried out on a bus fixed route within the University campus where comfort levels were rated on a 3-point scale and recorded at 5-second …


Template-Based Math Word Problem Solvers With Recursive Neural Networks, Lei Wang, Dongxiang Zhang, Jipeng Zhang, Xing Xu, Lianli Gao, Bing Tian Dai, Heng Tao Shen Jan 2019

Template-Based Math Word Problem Solvers With Recursive Neural Networks, Lei Wang, Dongxiang Zhang, Jipeng Zhang, Xing Xu, Lianli Gao, Bing Tian Dai, Heng Tao Shen

Research Collection School Of Computing and Information Systems

The design of automatic solvers to arithmetic math word problems has attracted considerable attention in recent years and a large number of datasets and methods have been published. Among them, Math23K is the largest data corpus that is very helpful to evaluate the generality and robustness of a proposed solution. The best performer in Math23K is a seq2seq model based on LSTM to generate the math expression. However, the model suffers from performance degradation in large space of target expressions. In this paper, we propose a template-based solution based on recursive neural network for math expression construction. More specifically, we …


Privacy-Preserving Attribute-Based Keyword Search In Shared Multi-Owner Setting, Yibin Miao, Ximeng Liu, Robert H. Deng, Robert H. Deng, Jjguo Li, Hongwei Li, Jianfeng Ma Jan 2019

Privacy-Preserving Attribute-Based Keyword Search In Shared Multi-Owner Setting, Yibin Miao, Ximeng Liu, Robert H. Deng, Robert H. Deng, Jjguo Li, Hongwei Li, Jianfeng Ma

Research Collection Yong Pung How School Of Law

Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and supports fine-grained access control over encrypted data in the cloud. However, prior CP-ABKS schemes were designed to support unshared multi-owner setting, and cannot be directly applied in the shared multi-owner setting (where each record is accredited by a fixed number of data owners), without incurring high computational and storage costs. In addition, due to privacy concerns on access policies, most existing schemes are vulnerable to off-line keyword-guessing attacks if the keyword space is of polynomial size. Furthermore, it is difficult to identify malicious users who leak the secret keys when more …


Automatic Query Reformulation For Code Search Using Crowdsourced Knowledge, Mohammad M. Rahman, Chanchal K. Roy, David Lo Jan 2019

Automatic Query Reformulation For Code Search Using Crowdsourced Knowledge, Mohammad M. Rahman, Chanchal K. Roy, David Lo

Research Collection School Of Computing and Information Systems

Traditional code search engines (e.g., Krugle) often do not perform well with natural language queries. They mostly apply keyword matching between query and source code. Hence, they need carefully designed queries containing references to relevant APIs for the code search. Unfortunately, preparing an effective search query is not only challenging but also time-consuming for the developers according to existing studies. In this article, we propose a novel query reformulation technique–RACK–that suggests a list of relevant API classes for a natural language query intended for code search. Our technique offers such suggestions by exploiting keyword-API associations from the questions and answers …


Modeling Location-Based Social Network Data With Area Attraction And Neighborhood Competition, Thanh Nam Doan, Ee-Peng Lim Jan 2019

Modeling Location-Based Social Network Data With Area Attraction And Neighborhood Competition, Thanh Nam Doan, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Modeling user check-in behavior helps us gain useful insights about venues as well as the users visiting them. These insights are important in urban planning and recommender system applications. Since check-in behavior is the result of multiple factors, this paper focuses on studying two venue related factors, namely, area attraction and neighborhood competition. The former refers to the ability of a spatial area covering multiple venues to collectively attract check-ins from users, while the latter represents the extent to which a venue can compete with other venues in the same area for check-ins. We first embark on empirical studies to …


A State Aggregation Approach For Stochastic Multiperiod Last-Mile Ride-Sharing Problems, Lucas Agussurja, Shih-Fen Cheng, Hoong Chuin Lau Jan 2019

A State Aggregation Approach For Stochastic Multiperiod Last-Mile Ride-Sharing Problems, Lucas Agussurja, Shih-Fen Cheng, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

The arrangement of last-mile services is playing an increasingly important role in making public transport more accessible. We study the use of ridesharing in satisfying last-mile demands with the assumption that demands are uncertain and come in batches. The most important contribution of our paper is a two-level Markov decision process framework that is capable of generating a vehicle-dispatching policy for the aforementioned service. We introduce state summarization, representative states, and sample-based cost estimation as major approximation techniques in making our approach scalable. We show that our approach converges and solution quality improves as sample size increases. We also apply …


Person Re-Identification Over Encrypted Outsourced Surveillance Videos, Hang Cheng, Huaxiong Wang, Ximeng Liu, Yan Fang, Meiqing Wang, Xiaojun Zhang Jan 2019

Person Re-Identification Over Encrypted Outsourced Surveillance Videos, Hang Cheng, Huaxiong Wang, Ximeng Liu, Yan Fang, Meiqing Wang, Xiaojun Zhang

Research Collection School Of Computing and Information Systems

Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. With the increasing amount of the surveillance videos, high computation and storage costs have posed a great challenge for the resource-constrained users. In recent years, the cloud storage services have made a large volume of video data outsourcing become possible. However, person Re-ID over outsourced surveillance videos could lead to a security threat, i.e., the privacy leakage of the innocent person in these videos. Therefore, we propose an efFicient privAcy-preseRving peRson Re-ID Scheme (FARRIS) over outsourced surveillance videos, which …


Preface To The Special Issue On Program Comprehension, David Lo, Alexander Serebrenik Jan 2019

Preface To The Special Issue On Program Comprehension, David Lo, Alexander Serebrenik

Research Collection School Of Computing and Information Systems

We are delighted to present a selection of the best papers presented at the 25th IEEE International Conference on Program Comprehension (ICPC 2017) that took place in Buenos Aires, Argentina. The program committee has received 83 submissions originating from 97 abstracts and co-authored by researchers from 26 countries from Africa, Asia, Europe, North and South America and Oceania. This is more than double of the 39 submissions received back in 2000. To select the papers for the special issue the PC chairs have selected the top five papers with the highest ratings from the reviewers. Each of these papers receives …


Semi-Supervised Deep Embedded Clustering, Yazhou Ren, Kangrong Hu, Xinyi Dai, Lili Pan, Steven C. H. Hoi, Zenglin Xu Jan 2019

Semi-Supervised Deep Embedded Clustering, Yazhou Ren, Kangrong Hu, Xinyi Dai, Lili Pan, Steven C. H. Hoi, Zenglin Xu

Research Collection School Of Computing and Information Systems

Clustering is an important topic in machine learning and data mining. Recently, deep clustering, which learns feature representations for clustering tasks using deep neural networks, has attracted increasing attention for various clustering applications. Deep embedded clustering (DEC) is one of the state-of-theart deep clustering methods. However, DEC does not make use of prior knowledge to guide the learning process. In this paper, we propose a new scheme of semi-supervised deep embedded clustering (SDEC) to overcome this limitation. Concretely, SDEC learns feature representations that favor the clustering tasks and performs clustering assignments simultaneously. In contrast to DEC, SDEC incorporates pairwise constraints …


Automatic Query Reformulation For Code Search Using Crowdsourced Knowledge, Mohammad M. Rahman, Chanchal K. Roy, David Lo Jan 2019

Automatic Query Reformulation For Code Search Using Crowdsourced Knowledge, Mohammad M. Rahman, Chanchal K. Roy, David Lo

Research Collection School Of Computing and Information Systems

Traditional code search engines (e.g., Krugle) often do not perform well with natural language queries. They mostly apply keyword matching between query and source code. Hence, they need carefully designed queries containing references to relevant APIs for the code search. Unfortunately, preparing an effective search query is not only challenging but also time-consuming for the developers according to existing studies. In this article, we propose a novel query reformulation technique–RACK–that suggests a list of relevant API classes for a natural language query intended for code search. Our technique offers such suggestions by exploiting keyword-API associations from the questions and answers …


Quantifying Activity Levels Of Community-Dwelling Seniors Through Beacon Monitoring, Jin Qiang Goh, Hwee-Pink Tan, Hwee Xian Tan Jan 2019

Quantifying Activity Levels Of Community-Dwelling Seniors Through Beacon Monitoring, Jin Qiang Goh, Hwee-Pink Tan, Hwee Xian Tan

Research Collection School Of Computing and Information Systems

The ageing population is rapidly increasing, both in Singapore and worldwide. Due to the shortage of healthcare professionals and institutionalized care, there is a pertinent need for seniors to age-in-place-safely and in the familiarity of their neighborhoods. In addition, changing family structures and rising divorce rates, coupled with the desire for more personal space and independence, have resulted in a significant proportion of seniors who live alone at home. In this paper, we describe a scalable and low-cost monitoring system that can help to identify community-dwelling seniors who are at risk of social isolation and/or frailty. This is achieved by …


Global Inference For Aspect And Opinion Terms Co-Extraction Based On Multi-Task Neural Networks, Jianfei Yu, Jing Jiang, Rui Xia Jan 2019

Global Inference For Aspect And Opinion Terms Co-Extraction Based On Multi-Task Neural Networks, Jianfei Yu, Jing Jiang, Rui Xia

Research Collection School Of Computing and Information Systems

Extracting aspect terms and opinion terms are two fundamental tasks in opinion mining. The recent success of deep learning has inspired various neural network architectures, which have been shown to achieve highly competitive performance in these two tasks. However, most existing methods fail to explicitly consider the syntactic relations among aspect terms and opinion terms, which may lead to the inconsistencies between the model predictions and the syntactic constraints. To this end, we first apply a multi-task learning framework to implicitly capture the relations between the two tasks, and then propose a global inference method by explicitly modelling several syntactic …


A First Look At Unfollowing Behavior On Github, Jing Jiang, David Lo, Yun Yang, Jianfeng Li, Li Zhang Jan 2019

A First Look At Unfollowing Behavior On Github, Jing Jiang, David Lo, Yun Yang, Jianfeng Li, Li Zhang

Research Collection School Of Computing and Information Systems

Many open source software projects rely on contributors to fix bugs and contribute new features. On GitHub, developers often broadcast their activities to followers, which may entice followers to be project contributors. It is important to understand unfollowing behavior, maintain current followers, and attract some followers to become contributors in OSS projects.Our objective in this paper is to provide a comprehensive analysis of unfollowing behavior on GitHub. To the best of our knowledge, we present a first look at unfollowing behavior on GitHub. We collect a dataset containing 701,364 developers and their 4,602,440 following relationships in March 2016. We also …


Large Scale Online Multiple Kernel Regression With Application To Time-Series Prediction, Doyen Sahoo, Steven C. H. Hoi, Bin Lin Jan 2019

Large Scale Online Multiple Kernel Regression With Application To Time-Series Prediction, Doyen Sahoo, Steven C. H. Hoi, Bin Lin

Research Collection School Of Computing and Information Systems

Kernel-based regression represents an important family of learning techniques for solving challenging regression tasks with non-linear patterns. Despite being studied extensively, most of the existing work suffers from two major drawbacks as follows: (i) they are often designed for solving regression tasks in a batch learning setting, making them not only computationally inefficient and but also poorly scalable in real-world applications where data arrives sequentially; and (ii) they usually assume that a fixed kernel function is given prior to the learning task, which could result in poor performance if the chosen kernel is inappropriate. To overcome these drawbacks, this work …


Driving And Effective Data-Ready Culture: How Companies Can Take On A Datadriven Approach To 11 Business, Johnson Poh Jan 2019

Driving And Effective Data-Ready Culture: How Companies Can Take On A Datadriven Approach To 11 Business, Johnson Poh

MITB Thought Leadership Series

TECHNOLOGY has turned the tables in favour of consumers, enabling them to find goods and services faster and access more choices. Companies now compete more intensely to capture consumers’ mindshare and scour for ways to keep their products relevant. But every coin has two sides. While technology has empowered consumers with choice, it has also offered companies a plethora of data to understand consumers better. This puts the odds in favour of companies that can leverage on data to gain consumer insights and meet their business objectives.


When Human Cognitive Modeling Meets Pins: User-Independent Inter-Keystroke Timing Attacks, Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li Jan 2019

When Human Cognitive Modeling Meets Pins: User-Independent Inter-Keystroke Timing Attacks, Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li

Research Collection School Of Computing and Information Systems

This paper proposes the first user-independent inter-keystroke timing attacks on PINs. Our attack method is based on an inter-keystroke timing dictionary built from a human cognitive model whose parameters can be determined by a small amount of training data on any users (not necessarily the target victims). Our attacks can thus be potentially launched on a large scale in real-world settings. We investigate inter-keystroke timing attacks in different online attack settings and evaluate their performance on PINs at different strength levels. Our experimental results show that the proposed attack performs significantly better than random guessing attacks. We further demonstrate that …