Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Research Collection School Of Computing and Information Systems

2013

Discipline
Keyword

Articles 1 - 30 of 338

Full-Text Articles in Physical Sciences and Mathematics

Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu Dec 2013

Designing Optimal Innovation Portfolio, Arcot Desai Narasimhalu

Research Collection School Of Computing and Information Systems

There have been many approaches towards investing in innovation projects. There has been very little discussion about the need to align such investments with the mission, vision, goals, leadership style, value discipline and risk appetite of an organization. This paper reviews existing approaches to innovation related investments and suggests the setting up of a proper innovation portfolio management process along with three dashboards that will help make innovation related investment decisions in an informed manner. The resulting innovation portfolio will be optimal in its alignment with an organizations mission and vision. We expect this method to be used by all …


Fundamental Limits On End-To-End Throughput Of Network Coding In Multi-Rate And Multicast Wireless Networks, Luiz Felipe Viera, Mario Gerla, Archan Misra Dec 2013

Fundamental Limits On End-To-End Throughput Of Network Coding In Multi-Rate And Multicast Wireless Networks, Luiz Felipe Viera, Mario Gerla, Archan Misra

Research Collection School Of Computing and Information Systems

This paper investigates the interaction between network coding and link-layer transmission rate diversity in multi-hop wireless networks. By appropriately mixing data packets at intermediate nodes, network coding allows a single multicast flow to achieve higher throughput to a set of receivers. Broadcast applications can also exploit link-layer rate diversity, whereby individual nodes can transmit at faster rates at the expense of corresponding smaller coverage area. We first demonstrate how combining rate-diversity with network coding can provide a larger capacity for data dissemination of a single multicast flow, and how consideration of rate diversity is critical for maximizing system throughput. Next …


Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat Chua, Richard Jayadi Oentaryo, Ee Peng Lim Dec 2013

Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat Chua, Richard Jayadi Oentaryo, Ee Peng Lim

Research Collection School Of Computing and Information Systems

The problem of recommending items to users is relevant to many applications and the problem has often been solved using methods developed from Collaborative Filtering (CF). Collaborative Filtering model-based methods such as Matrix Factorization have been shown to produce good results for static rating-type data, but have not been applied to time-stamped item adoption data. In this paper, we adopted a Dynamic Matrix Factorization (DMF) technique to derive different temporal factorization models that can predict missing adoptions at different time steps in the users' adoption history. This DMF technique is an extension of the Non-negative Matrix Factorization (NMF) based on …


An Efficient Partial Shape Matching Algorithm For 3d Tooth Recognition, Zhiyuan Zhang, Xin Zhong, Sim Heng Ong, Kelvin W. C. Foong Dec 2013

An Efficient Partial Shape Matching Algorithm For 3d Tooth Recognition, Zhiyuan Zhang, Xin Zhong, Sim Heng Ong, Kelvin W. C. Foong

Research Collection School Of Computing and Information Systems

As a new biometric strategy, tooth recognition has drawn much attention in recent years. However, most existing work focus mainly on 2D dental radiographs which are less informative and vulnerable to noise and pose variance. Although there are already several attempts on 3D tooth recognition, the results are still inaccurate and performance is inefficient. Moreover, existing methods cannot recognize precisely when the post-mortem data contains incomplete teeth. In this work, we propose an efficient and accurate partial shape matching algorithm to recognize 3D teeth for human identification. Given the ante-mortem and post-mortem teeth models which were taken from patients using …


Dynamic Joint Sentiment-Topic Mode, Yulan He, Chenghua Lin, Wei Gao, Kam-Fai Wong Dec 2013

Dynamic Joint Sentiment-Topic Mode, Yulan He, Chenghua Lin, Wei Gao, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Social media data are produced continuously by a large and uncontrolled number of users. The dynamic nature of such data requires the sentiment and topic analysis model to be also dynamically updated, capturing the most recent language use of sentiments and topics in text. We propose a dynamic Joint Sentiment-Topic model (dJST) which allows the detection and tracking of views of current and recurrent interests and shifts in topic and sentiment. Both topic and sentiment dynamics are captured by assuming that the current sentiment-topic-specific word distributions are generated according to the word distributions at previous epochs. We study three different …


Dense Image Correspondence Under Large Appearance Variations, Linlin Liu, Kok-Lim Low, Wen-Yan Lin Dec 2013

Dense Image Correspondence Under Large Appearance Variations, Linlin Liu, Kok-Lim Low, Wen-Yan Lin

Research Collection School Of Computing and Information Systems

This paper addresses the difficult problem of finding dense correspondence across images with large appearance variations. Our method uses multiple feature samples at each pixel to deal with the appearance variations based on our observation that pre-defined single feature sample provides poor results in nearest neighbor matching. We apply the idea in a flow-based matching framework and utilize the best feature sample for each pixel to determine the flow field. We propose a novel energy function and use dual-layer loopy belief propagation to minimize it where the correspondence, the feature scale and rotation parameters are solved simultaneously. Our method is …


Decision Trees To Model The Impact Of Disruption And Recovery In Supply Chain Networks, Loganathan Ponnanbalam, L. Wenbin, Xiuju Fu, Xiaofeng Yin, Zhaoxia Wang, Rick S. M. Goh Dec 2013

Decision Trees To Model The Impact Of Disruption And Recovery In Supply Chain Networks, Loganathan Ponnanbalam, L. Wenbin, Xiuju Fu, Xiaofeng Yin, Zhaoxia Wang, Rick S. M. Goh

Research Collection School Of Computing and Information Systems

Increase in the frequency of disruptions in the recent times and their impact have increased the attention in supply chain disruption management research. The objective of this paper is to understand as to how a disruption might affect the supply chain network - depending upon the network structure, the node that is disrupted, the disruption in production capacity of the disrupted node and the period of the disruption - via decision trees. To this end, we first developed a 5-tier agent-based supply chain model and then simulated it for various what-if disruptive scenarios for 3 different network structures (80 trials …


A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen Dec 2013

A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen

Research Collection School Of Computing and Information Systems

Identifying potential customers among a huge number of users in microblogging is a fundamental problem for microblog marketing. One challenge in potential customer detection in microblogging is how to generate an accurate characteristic description for users, i.e., user profile generation. Intuitively, the preference of a user’s friends (i.e., the person followed by the user in microblogging) is of great importance to capture the characteristic of the user. Also, a user’s self-defined tags are often concise and accurate carriers for the user’s interests. In this paper, for identifying potential customers in microblogging, we propose a method to generate user profiles via …


Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow Dec 2013

Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow

Research Collection School Of Computing and Information Systems

Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …


Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen Dec 2013

Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen

Research Collection School Of Computing and Information Systems

The Still-to-Video (S2V) face recognition systems typically need to match faces in low-quality videos captured under unconstrained conditions against high quality still face images, which is very challenging because of noise, image blur, low face resolutions, varying head pose, complex lighting, and alignment difficulty. To address the problem, one solution is to select the frames of `best quality' from videos (hereinafter called quality alignment in this paper). Meanwhile, the faces in the selected frames should also be geometrically aligned to the still faces offline well-aligned in the gallery. In this paper, we discover that the interactions among the three tasks-quality …


Query-Document-Dependent Fusion: A Case Study Of Multimodal Music Retrieval, Zhonghua Li, Bingjun Zhang, Yi Yu, Jialie Shen, Ye Wang Dec 2013

Query-Document-Dependent Fusion: A Case Study Of Multimodal Music Retrieval, Zhonghua Li, Bingjun Zhang, Yi Yu, Jialie Shen, Ye Wang

Research Collection School Of Computing and Information Systems

In recent years, multimodal fusion has emerged as a promising technology for effective multimedia retrieval. Developing the optimal fusion strategy for different modality (e.g. content, metadata) has been the subject of intensive research. Given a query, existing methods derive a unified fusion strategy for all documents with the underlying assumption that the relative significance of a modality remains the same across all documents. However, this assumption is often invalid. We thus propose a general multimodal fusion framework, query-document-dependent fusion (QDDF), which derives the optimal fusion strategy for each query-document pair via intelligent content analysis of both queries and documents. By …


Partial Least Squares Regression On Grassmannian Manifold For Emotion Recognition, M. Liu, R. Wang, Zhiwu Huang, S. Shan, X. Chen Dec 2013

Partial Least Squares Regression On Grassmannian Manifold For Emotion Recognition, M. Liu, R. Wang, Zhiwu Huang, S. Shan, X. Chen

Research Collection School Of Computing and Information Systems

In this paper, we propose a method for video-based human emotion recognition. For each video clip, all frames are represented as an image set, which can be modeled as a linear subspace to be embedded in Grassmannian manifold. After feature extraction, Class-specific One-to-Rest Partial Least Squares (PLS) is learned on video and audio data respectively to distinguish each class from the other confusing ones. Finally, an optimal fusion of classifiers learned from both modalities (video and audio) is conducted at decision level. Our method is evaluated on the Emotion Recognition In The Wild Challenge (EmotiW 2013). The experimental results on …


Improving Patient Length-Of-Stay In Emergency Department Through Dynamic Queue Management, Kar Way Tan, Hoong Chuin Lau, Francis Chun Yue Lee Dec 2013

Improving Patient Length-Of-Stay In Emergency Department Through Dynamic Queue Management, Kar Way Tan, Hoong Chuin Lau, Francis Chun Yue Lee

Research Collection School Of Computing and Information Systems

Addressing issue of crowding in an Emergency Department (ED) typically takes the form of process engineering or single-faceted queue management strategies such as demand restriction, queue prioritization or staffing the ED. This work provides an integrated framework to manage queue dynamically from both demand and supply perspectives. More precisely, we introduce intelligent dynamic patient prioritization strategies to manage the demand concurrently with dynamic resource adjustment policies to manage supply. Our framework allows decision-makers to select both the demand-side and supply-side strategies to suit the needs of their ED. We verify through a simulation that such a framework improves the patients' …


Two Formulas For Success In Social Media: Social Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston Dec 2013

Two Formulas For Success In Social Media: Social Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper examines social learning and network effects that are particularly important for online videos, considering the limited marketing campaigns of user-generated content. Rather than combining both social learning and network effects under the umbrella of social contagion or peer influence, we develop a theoretical model and empirically identify social learning and network effects separately. Using a unique data set from YouTube, we find that both mechanisms have statistically and economically significant effects on video views, and which mechanism dominates depends on the specific video type.


Towards A Hybrid Framework For Detecting Input Manipulation Vulnerabilities, Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar, Bindu Madhavi Padmanabhuni Dec 2013

Towards A Hybrid Framework For Detecting Input Manipulation Vulnerabilities, Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar, Bindu Madhavi Padmanabhuni

Research Collection School Of Computing and Information Systems

Input manipulation vulnerabilities such as SQL Injection, Cross-site scripting, Buffer Overflow vulnerabilities are highly prevalent and pose critical security risks. As a result, many methods have been proposed to apply static analysis, dynamic analysis or a combination of them, to detect such security vulnerabilities. Most of the existing methods classify vulnerabilities into safe and unsafe. They have both false-positive and false-negative cases. In general, security vulnerability can be classified into three cases: (1) provable safe, (2) provable unsafe, (3) unsure. In this paper, we propose a hybrid framework-Detecting Input Manipulation Vulnerabilities (DIMV), to verify the adequacy of security vulnerability defenses …


Exposing And Mitigating Privacy Loss In Crowdsourced Survey Platforms, Thivya Kandappu, Vijay Sivaraman, Arik Friedman, Roksana Borell Dec 2013

Exposing And Mitigating Privacy Loss In Crowdsourced Survey Platforms, Thivya Kandappu, Vijay Sivaraman, Arik Friedman, Roksana Borell

Research Collection School Of Computing and Information Systems

Crowdsourcing platforms such as Amazon Mechanical Turk and Google Consumer Surveys can profile users based on their inputs to online surveys. In this work we first demonstrate how easily user privacy can be compromised by collating information from multiple surveys. We then propose, develop, and evaluate a crowdsourcing survey platform called Loki that allows users to control their privacy loss via atsource obfuscation.


Factors Influencing Research Contributions And Researcher Interactions In Software Engineering: An Empirical Study, Subhajit Datta, A. S. M. Sajeev, Santonu Sarkar, Nishant Kumar Dec 2013

Factors Influencing Research Contributions And Researcher Interactions In Software Engineering: An Empirical Study, Subhajit Datta, A. S. M. Sajeev, Santonu Sarkar, Nishant Kumar

Research Collection School Of Computing and Information Systems

Research into software engineering (SE) education is largely concentrated on teaching and learning issues in coursework programs. This paper, in contrast, provides a meta analysis of research publications in software engineering to help with research education in SE. Studying publication patterns in a discipline will assist research students and supervisors gain a deeper understanding of how successful research has occurred in the discipline. We present results from a large scale empirical study covering over three and a half decades of software engineering research publications. We identify how different factors of publishing relate to the number of papers published as well …


An Integrated Model Of Team Motivation And Worker Skills For A Computer-Based Project Management Simulation, Wee Leong Lee Dec 2013

An Integrated Model Of Team Motivation And Worker Skills For A Computer-Based Project Management Simulation, Wee Leong Lee

Research Collection School Of Computing and Information Systems

In this paper, I shall propose an integrated model of worker skills and team motivation for a computer-based simulation game that can be used to provide experiential learning to students. They can act as project managers here without being burdened by the costs and risks associated with unsuccessful projects. I shall present an approach of classifying skills into five different types (relevant to IT projects) and apply a five-point competency scale to each skill type. The Pearson Correlation will be applied to the scores of each skill type to generate an efficiency index that will characterize the effectiveness of a …


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fengtong Wen, Willy Susilo, Guomin Yang Dec 2013

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fengtong Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.’s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we …


Hibernating Process: Modeling Mobile Calls At Multiple Scales, Siyuan Liu, Lei Li, Ramayya Krishnan Dec 2013

Hibernating Process: Modeling Mobile Calls At Multiple Scales, Siyuan Liu, Lei Li, Ramayya Krishnan

Research Collection School Of Computing and Information Systems

Do mobile phone calls at larger granularities behave in the same pattern as in smaller ones? How can we forecast the distribution of a whole month's phone calls with only one day's observation? There are many models developed to interpret large scale social graphs. However, all of the existing models focus on graph at one time scale. Many dynamical behaviors were either ignored, or handled at one scale. In particular new users might join or current users quit social networks at any time. In this paper, we propose HiP, a novel model to capture longitudinal behaviors in modeling degree distribution …


A Dynamic Programming Approach To Achieving An Optimal End State Along A Serial Production Line, Shih-Fen Cheng, Blake E. Nicholson, Marina A. Epelman, Daniel J. Reaume, Robert L. Smith Dec 2013

A Dynamic Programming Approach To Achieving An Optimal End State Along A Serial Production Line, Shih-Fen Cheng, Blake E. Nicholson, Marina A. Epelman, Daniel J. Reaume, Robert L. Smith

Research Collection School Of Computing and Information Systems

In modern production systems, it is critical to perform maintenance, calibration, installation, and upgrade tasks during planned downtime. Otherwise, the systems become unreliable and new product introductions are delayed. For reasons of safety, testing, and access, task performance often requires the vicinity of impacted equipment to be left in a specific “end state” when production halts. Therefore, planning the shutdown of a production system to balance production goals against enabling non-production tasks yields a challenging optimization problem. In this paper, we propose a mathematical formulation of this problem and a dynamic programming approach that efficiently finds optimal shutdown policies for …


An Agent-Based Simulation Approach To Experience Management In Theme Parks, Shih-Fen Cheng, Larry Junjie Lin, Jiali Du, Hoong Chuin Lau, Pradeep Reddy Varakantham Dec 2013

An Agent-Based Simulation Approach To Experience Management In Theme Parks, Shih-Fen Cheng, Larry Junjie Lin, Jiali Du, Hoong Chuin Lau, Pradeep Reddy Varakantham

Research Collection School Of Computing and Information Systems

In this paper, we illustrate how massive agent-based simulation can be used to investigate an exciting new application domain of experience management in theme parks, which covers topics like congestion control, incentive design, and revenue management. Since all visitors are heterogeneous and self-interested, we argue that a high-quality agent-based simulation is necessary for studying various problems related to experience management. As in most agent-base simulations, a sound understanding of micro-level behaviors is essential to construct high-quality models. To achieve this, we designed and conducted a first-of-its-kind real-world experiment that helps us understand how typical visitors behave in a theme-park environment. …


The Influence Of Online Word-Of-Mouth On Long Tail Formation, Bin Gu, Qian Tang, Andrew B. Whinston Dec 2013

The Influence Of Online Word-Of-Mouth On Long Tail Formation, Bin Gu, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

The long tail phenomenon has been attributed to both supply side and demand side economies. While the cause on the supply side is well-known, research on the demand side has largely focused on the awareness effect of online information that helps consumers discover new and often niche products. This study expands the demand side factors by showing that online information also influences the long tail phenomenon through the informative effect, which affects consumers' evaluation of product quality. We examine the informative effect in the context of online WOM. Two sets of theories suggest opposite directions for the implication of the …


A Local Social Network Approach For Research Management, Xiaoyan Liu, Zhiling Guo, Zhenjiang Lin, Jian Ma Dec 2013

A Local Social Network Approach For Research Management, Xiaoyan Liu, Zhiling Guo, Zhenjiang Lin, Jian Ma

Research Collection School Of Computing and Information Systems

Traditional methods to evaluate research performance focus on citation count, quality and quantity of research output by individual researchers. These measures overlook the roles an individual plays in research collaboration, which is critical in an institutional research management environment due to the inherent interdependency among research entities. In order to address the organizational research management needs, we propose a research social network approach to better analyze local collaboration networks. For this purpose, we develop a new “collaboration supportiveness” measure to quantify an individual researcher's collaboration ability. Insights derived from this research are very helpful for managers to effectively allocate resources, …


Modeling Preferences With Availability Constraints, Bingtian Dai, Hady W. Lauw Dec 2013

Modeling Preferences With Availability Constraints, Bingtian Dai, Hady W. Lauw

Research Collection School Of Computing and Information Systems

User preferences are commonly learned from historical data whereby users express preferences for items, e.g., through consumption of products or services. Most work assumes that a user is not constrained in their selection of items. This assumption does not take into account the availability constraint, whereby users could only access some items, but not others. For example, in subscription-based systems, we can observe only those historical preferences on subscribed (available) items. However, the objective is to predict preferences on unsubscribed (unavailable) items, which do not appear in the historical observations due to their (lack of) availability. To model preferences in …


Topicsketch: Real-Time Bursty Topic Detection From Twitter, Wei Xie, Feida Zhu, Jing Jiang, Ee Peng Lim, Ke Wang Dec 2013

Topicsketch: Real-Time Bursty Topic Detection From Twitter, Wei Xie, Feida Zhu, Jing Jiang, Ee Peng Lim, Ke Wang

Research Collection School Of Computing and Information Systems

Twitter has become one of the largest platforms for users around the world to share anything happening around them with friends and beyond. A bursty topic in Twitter is one that triggers a surge of relevant tweets within a short time, which often reflects important events of mass interest. How to leverage Twitter for early detection of bursty topics has therefore become an important research problem with immense practical value. Despite the wealth of research work on topic modeling and analysis in Twitter, it remains a huge challenge to detect bursty topics in real-time. As existing methods can hardly scale …


Defending Against Heap Overflow By Using Randomization In Nested Virtual Clusters, Chee Meng Tey, Debin Gao Nov 2013

Defending Against Heap Overflow By Using Randomization In Nested Virtual Clusters, Chee Meng Tey, Debin Gao

Research Collection School Of Computing and Information Systems

Heap based buffer overflows are a dangerous class of vulnerability. One countermeasure is randomizing the location of heap memory blocks. Existing techniques segregate the address space into clusters, each of which is used exclusively for one block size. This approach requires a large amount of address space reservation, and results in lower location randomization for larger blocks.


Adaptive Regret Minimization In Bounded-Memory Games, Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha Nov 2013

Adaptive Regret Minimization In Bounded-Memory Games, Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha

Research Collection School Of Computing and Information Systems

Organizations that collect and use large volumes of personal information often use security audits to protect data subjects from inappropriate uses of this information by authorized insiders. In face of unknown incentives of employees, a reasonable audit strategy for the organization is one that minimizes its regret. While regret minimization has been extensively studied in repeated games, the standard notion of regret for repeated games cannot capture the complexity of the interaction between the organization (defender) and an adversary, which arises from dependence of rewards and actions on history. To account for this generality, we introduce a richer class of …


Budgeted Personalized Incentive Approaches For Smoothing Congestion In Resource Networks, Pradeep Varakantham, Na Fu, William Yeoh, Shih-Fen Cheng, Hoong Chuin Lau Nov 2013

Budgeted Personalized Incentive Approaches For Smoothing Congestion In Resource Networks, Pradeep Varakantham, Na Fu, William Yeoh, Shih-Fen Cheng, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Congestion occurs when there is competition for resources by sel sh agents. In this paper, we are concerned with smoothing out congestion in a network of resources by using personalized well-timed in- centives that are subject to budget constraints. To that end, we provide: (i) a mathematical formulation that computes equilibrium for the re- source sharing congestion game with incentives and budget constraints; (ii) an integrated approach that scales to larger problems by exploiting the factored network structure and approximating the attained equilib- rium; (iii) an iterative best response algorithm for solving the uncon- strained version (no budget) of the …


Using Micro-Reviews To Select An Efficient Set Of Reviews, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas Nov 2013

Using Micro-Reviews To Select An Efficient Set Of Reviews, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas

Research Collection School Of Computing and Information Systems

Online reviews are an invaluable resource for web users trying to make decisions regarding products or services. However, the abundance of review content, as well as the unstructured, lengthy, and verbose nature of reviews make it hard for users to locate the appropriate reviews, and distill the useful information. With the recent growth of social networking and micro-blogging services, we observe the emergence of a new type of online review content, consisting of bite-sized, 140 character-long reviews often posted reactively on the spot via mobile devices. These micro-reviews are short, concise, and focused, nicely complementing the lengthy, elaborate, and verbose …