Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Research Collection School Of Computing and Information Systems

2015

Discipline
Keyword

Articles 301 - 330 of 338

Full-Text Articles in Physical Sciences and Mathematics

Bridging The Vocabulary Gap Between Health Seekers And Healthcare Knowledge, Liqiang Nie, Yiliang Zhao, Akbari Mohammad, Jialie Shen, Tat-Seng Chua Feb 2015

Bridging The Vocabulary Gap Between Health Seekers And Healthcare Knowledge, Liqiang Nie, Yiliang Zhao, Akbari Mohammad, Jialie Shen, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

The vocabulary gap between health seekers and providers has hindered the cross-system operability and the interuser reusability. To bridge this gap, this paper presents a novel scheme to code the medical records by jointly utilizing local mining and global learning approaches, which are tightly linked and mutually reinforced. Local mining attempts to code the individual medical record by independently extracting the medical concepts from the medical record itself and then mapping them to authenticated terminologies. A corpus-aware terminology vocabulary is naturally constructed as a byproduct, which is used as the terminology space for global learning. Local mining approach, however, may …


Will This Be Quick? A Case Study Of Bug Resolution Times Across Industrial Projects, Subhajit Datta, Prasanth Lade Feb 2015

Will This Be Quick? A Case Study Of Bug Resolution Times Across Industrial Projects, Subhajit Datta, Prasanth Lade

Research Collection School Of Computing and Information Systems

Resolution of problem tickets is a source of significant revenue in the worldwide software services industry. Due to the high volume of problem tickets in any large scale customer engagement, automated techniques are necessary to segregate related incoming tickets into groups. Existing techniques focus on this classification problem. In this paper, we present a case study built around the position that predicting the category of resolution times within a class of tickets and also the actual resolution times, is strongly beneficial to ticket resolution. We present an approach based on topic analysis to predict the category of resolution times of …


Simapp: A Framework For Detecting Similar Mobile Applications By Online Kernel Learning, Ning Chen, Steven C. H. Hoi, Shaohua Li, Xiaokui Xiao Feb 2015

Simapp: A Framework For Detecting Similar Mobile Applications By Online Kernel Learning, Ning Chen, Steven C. H. Hoi, Shaohua Li, Xiaokui Xiao

Research Collection School Of Computing and Information Systems

With the popularity of smart phones and mobile devices, the number of mobile applications (a.k.a. "apps") has been growing rapidly. Detecting semantically similar apps from a large pool of apps is a basic and important problem, as it is beneficial for various applications, such as app recommendation, app search, etc. However, there is no systematic and comprehensive work so far that focuses on addressing this problem. In order to fill this gap, in this paper, we explore multi-modal heterogeneous data in app markets (e.g., description text, images, user reviews, etc.), and present "SimApp" -- a novel framework for detecting similar …


On Processing Reverse K-Skyband And Ranked Reverse Skyline Queries, Yunjun Gao, Qing Liu, Baihua Zheng, Mou Li, Gang Chen, Qing Li Feb 2015

On Processing Reverse K-Skyband And Ranked Reverse Skyline Queries, Yunjun Gao, Qing Liu, Baihua Zheng, Mou Li, Gang Chen, Qing Li

Research Collection School Of Computing and Information Systems

In this paper, for the first time, we identify and solve the problem of efficient reverse k-skyband (RkSB) query processing. Given a set P of multi-dimensional points and a query point q, an RkSB query returns all the points in P whose dynamic k-skyband contains q. We formalize RkSB retrieval, and then propose five algorithms for computing the RkSB of an arbitrary query point efficiently. Our methods utilize a conventional data-partitioning index (e.g., R-tree) on the dataset, and employ pre-computation, reuse and pruning techniques to boost the query efficiency. In addition, we extend our solutions to tackle an interesting variant …


Analysis And Improvement On A Biometric-Based Remote User Authentication Scheme Using Smart Cards, Fengtong Wen, Willy Susilo, Guomin Yang Feb 2015

Analysis And Improvement On A Biometric-Based Remote User Authentication Scheme Using Smart Cards, Fengtong Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

In a recent paper (BioMed Research International, 2013/491289), Khan et al. proposed an improved biometrics-based remote user authentication scheme with user anonymity. The scheme is believed to be secure against password guessing attack, user impersonation attack, server masquerading attack, and provide user anonymity, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Khan et al.’s scheme, and demonstrate that their scheme doesn’t provide user anonymity. This also renders that their scheme is insecure against other attacks, such as off-line password guessing attack, user impersonation attacks. Subsequently, we propose a …


Privacycanary: Privacy-Aware Recommenders With Adaptive Input Obfuscation, Thivya Kandappu, Arik Friedman, Roksan Borelli, Vijay Sivaraman Feb 2015

Privacycanary: Privacy-Aware Recommenders With Adaptive Input Obfuscation, Thivya Kandappu, Arik Friedman, Roksan Borelli, Vijay Sivaraman

Research Collection School Of Computing and Information Systems

Recommender systems are widely used by online retailers to promote products and content that are most likely to be of interest to a specific customer. In such systems, users often implicitly or explicitly rate products they have consumed, and some form of collaborative filtering is used to find other users with similar tastes to whom the products can be recommended. While users can benefit from more targeted and relevant recommendations, they are also exposed to greater risks of privacy loss, which can lead to undesirable financial and social consequences. The use of obfuscation techniques to preserve the privacy of user …


Use Of A High-Value Social Audience Index For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond. Chiong Feb 2015

Use Of A High-Value Social Audience Index For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond. Chiong

Research Collection School Of Computing and Information Systems

With the large and growing user base of social media, it is not an easy feat to identify potential customers for business. This is mainly due to the challenge of extracting commercially viable contents from the vast amount of free-form conversations. In this paper, we analyse the Twitter content of an account owner and its list of followers through various text mining methods and segment the list of followers via an index. We have termed this index as the High-Value Social Audience (HVSA) index. This HVSA index enables a company or organisation to devise their marketing and engagement plan according …


Review Synthesis For Micro-Review Summarization, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas Feb 2015

Review Synthesis For Micro-Review Summarization, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas

Research Collection School Of Computing and Information Systems

Micro-reviews is a new type of user-generated content arising from the prevalence of mobile devices and social media in the past few years. Micro-reviews are bite-size reviews (usually under 200 characters), commonly posted on social media or check-in services, using a mobile device. They capture the immediate reaction of users, and they are rich in information, concise, and to the point. However, the abundance of micro-reviews, and their telegraphic nature make it increasingly difficult to go through them and extract the useful information, especially on a mobile device. In this paper, we address the problem of summarizing the micro-reviews of …


Low Effort Crowdsourcing: Leveraging Peripheral Attention For Crowd Work, Vaish Rajan, Peter Organisciak, Kotaro Hara, Jeffrey P. Bigham, Haoqi Zhang Jan 2015

Low Effort Crowdsourcing: Leveraging Peripheral Attention For Crowd Work, Vaish Rajan, Peter Organisciak, Kotaro Hara, Jeffrey P. Bigham, Haoqi Zhang

Research Collection School Of Computing and Information Systems

Crowdsourcing systems leverage short bursts of focusedattention from many contributors to achieve a goal. Byrequiring people’s full attention, existing crowdsourcingsystems fail to leverage people’s cognitive surplus in themany settings for which they may be distracted, performingor waiting to perform another task, or barely payingattention. In this paper, we study opportunities for loweffortcrowdsourcing that enable people to contribute toproblem solving in such settings. We discuss the designspace for low-effort crowdsourcing, and through a seriesof prototypes, demonstrate interaction techniques, mechanisms,and emerging principles for enabling low-effortcrowdsourcing.


Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei Jan 2015

Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei

Research Collection School Of Computing and Information Systems

While automatic travel recommendation has attracted a lot of attentions, the existing approaches generally suffer from different kinds of weaknesses. For example, sparsity problem can significantly degrade the performance of traditional collaborative filtering (CF). If a user only visits very few locations, accurate similar user identification becomes very challenging due to lack of sufficient information. Motivated by this concern, we propose an Author Topic Collaborative Filtering (ATCF) method to facilitate comprehensive Points of Interest (POIs) recommendation for social media users. In our approach, the topics about user preference (e.g., cultural, cityscape, or landmark) are extracted from the textual description of …


Algorithm Selection Via Ranking, Jayadi Oentaryo Richard, Handoko Stephanus Daniel, Hoong Chuin Lau Jan 2015

Algorithm Selection Via Ranking, Jayadi Oentaryo Richard, Handoko Stephanus Daniel, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

The abundance of algorithms developed to solve different problems has given rise to an important research question: How do we choose the best algorithm for a given problem? Known as algorithm selection, this issue has been prevailing in many domains, as no single algorithm can perform best on all problem instances. Traditional algorithm selection and portfolio construction methods typically treat the problem as a classification or regression task. In this paper, we present a new approach that provides a more natural treatment of algorithm selection and portfolio construction as a ranking task. Accordingly, we develop a Ranking-Based Algorithm Selection (RAS) …


Semi-Universal Portfolios With Transaction Costs, Dingjiang Huang, Yan Zhu, Bin Li, Shuigeng Zhou, Steven C. H. Hoi Jan 2015

Semi-Universal Portfolios With Transaction Costs, Dingjiang Huang, Yan Zhu, Bin Li, Shuigeng Zhou, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Online portfolio selection (PS) has been extensively studied in artificial intelligence and machine learning communities in recent years. An important practical issue of online PS is transaction cost, which is unavoidable and nontrivial in real financial trading markets. Most existing strategies, such as universal portfolio (UP) based strategies, often rebalance their target portfolio vectors at every investment period, and thus the total transaction cost increases rapidly and the final cumulative wealth degrades severely. To overcome the limitation, in this paper we investigate new investment strategies that rebalances its portfolio only at some selected instants. Specifically, we design a novel on-line …


Automatic, High Accuracy Prediction Of Reopened Bugs, Xin Xia, David Lo, Emad Shihab, Xinyu Wang, Bo Zhou Jan 2015

Automatic, High Accuracy Prediction Of Reopened Bugs, Xin Xia, David Lo, Emad Shihab, Xinyu Wang, Bo Zhou

Research Collection School Of Computing and Information Systems

Bug fixing is one of the most time-consuming and costly activities of the software development life cycle. In general, bugs are reported in a bug tracking system, validated by a triage team, assigned for someone to fix, and finally verified and closed. However, in some cases bugs have to be reopened. Reopened bugs increase software maintenance cost, cause rework for already busy developers and in some cases even delay the future delivery of a software release. Therefore, a few recent studies focused on studying reopened bugs. However, these prior studies did not achieve high performance (in terms of precision and …


Push Or Pull? A Website's Strategic Choice Of Content Delivery Mechanism, Dan Ma Jan 2015

Push Or Pull? A Website's Strategic Choice Of Content Delivery Mechanism, Dan Ma

Research Collection School Of Computing and Information Systems

Really simple syndication (RSS) technology enables an alternative delivery mechanism for online content. Instead of waiting passively for users to pull online content out, websites can push it to potential users through RSS. This is expected to significantly affect user behavior, website profitability, and market equilibrium. This research uses an economic model to study the impact of RSS adoption and examine whether it increases a website’s profit and competitive advantage. The findings are intriguing: they demonstrate that RSS can either increase or decrease website profit. In a competitive context, RSS adoption can actually be a disadvantage; in some cases, it …


Integrated Intelligence For Human-Robot Teams, Jean Oh, Et. Al. Jan 2015

Integrated Intelligence For Human-Robot Teams, Jean Oh, Et. Al.

Research Collection School Of Computing and Information Systems

With recent advances in robotics technologies and autonomous systems, the idea of human-robot teams is gaining ever-increasing attention. In this context, our research focuses on developing an intelligent robot that can autonomously perform non-trivial, but specific tasks conveyed through natural language. Toward this goal, a consortium of researchers develop and integrate various types of intelligence into mobile robot platforms, including cognitive abilities to reason about high-level missions, perception to classify regions and detect relevant objects in an environment, and linguistic abilities to associate instructions with the robot’s world model and to communicate with human teammates in a natural way. This …


Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang Jan 2015

Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang

Research Collection School Of Computing and Information Systems

The pervasive usage and reach of social media have attracted a surge of attention in the multimedia research community. Community discovery from social media has therefore become an important yet challenging issue. However, due to the subjective generating process, the explicitly observed communities (e.g., group-user and user-user relationship) are often noisy and incomplete in nature. This paper presents a novel approach to discovering communities from social media, including the group membership and user friend structure, by exploring a low-rank matrix recovery technique. In particular, we take Flickr as one exemplary social media platform. We first model the observed indicator matrix …


Reputationpro: The Efficient Approaches To Contextual Transaction Trust Computation In E-Commerce Environments, Haibin Zhang, Yan Wang, Xiuzhen Zhang, Ee Peng Lim Jan 2015

Reputationpro: The Efficient Approaches To Contextual Transaction Trust Computation In E-Commerce Environments, Haibin Zhang, Yan Wang, Xiuzhen Zhang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In e-commerce environments, the trustworthiness of a seller is utterly important to potential buyers, especially when a seller is not known to them. Most existing trust evaluation models compute a single value to reflect the general trustworthiness of a seller without taking any transaction context information into account. With such a result as the indication of reputation, a buyer may be easily deceived by a malicious seller in a transaction where the notorious value imbalance problem is involved—in other words, a malicious seller accumulates a high-level reputation by selling cheap products and then deceives buyers by inducing them to purchase …


Recovering Household Preferences For Digital Entertainment, Jin Li, Zhiling Guo, Robert J. Kauffman Jan 2015

Recovering Household Preferences For Digital Entertainment, Jin Li, Zhiling Guo, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cable TV return path data made possible by current generation set-top boxes present a new opportunity to analyze household viewing behavior and recover household viewing preferences from it. This research develops a model of household viewing preference that supports quantifying a household's valuation for different categories of digital content within the constraints of the programs to which it subscribes. This study uses a data set of more than 1 million observations on households from a digital entertainment firm that offers basic and premium services. Our estimation is via a Bayesian hierarchical model that employs the Gibbs sampler. The results show …


Improving Internet Security Through Mandatory Information Disclosure, Qian Tang, Andrew B. Whinston Jan 2015

Improving Internet Security Through Mandatory Information Disclosure, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Although disclosure has long been considered as a solution to internalize externalities, mandatory security information disclosure is still in debate. We propose a mandatory disclosure mechanism based on existing data. The information is disclosed as straightforward rankings of organizations for users to understand, interpret, and make comparisons. As a result, the disclosure can influence organizations through reputational effects. We created a public website to disclose information regularly and conducted a quasi-experiment on outgoing spam to test the effectiveness of our mechanism on four matched country groups. For each treated country, we released the ranking list of top 10 most spamming …


Risk Based Optimization For Improving Emergency Medical Systems, Sandhya Saisubramanian, Pradeep Varakantham, Hoong Chuin Lau Jan 2015

Risk Based Optimization For Improving Emergency Medical Systems, Sandhya Saisubramanian, Pradeep Varakantham, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

In emergency medical systems, arriving at the incident location a few seconds early can save a human life. Thus, this paper is motivated by the need to reduce the response time – time taken to arrive at the incident location after receiving the emergency call – of Emergency Response Vehicles, ERVs (ex: ambulances, fire rescue vehicles) for as many requests as possible. We expect to achieve this primarily by positioning the "right" number of ERVs at the "right" places and at the "right" times. Given the exponentially large action space (with respect to number of ERVs and their placement) and …


Improving Software Quality And Productivity Leveraging Mining Techniques: [Summary Of The Second Workshop On Software Mining, At Ase 2013], Ming Li, Hongyu Zhang, David Lo, Lucia Lucia Jan 2015

Improving Software Quality And Productivity Leveraging Mining Techniques: [Summary Of The Second Workshop On Software Mining, At Ase 2013], Ming Li, Hongyu Zhang, David Lo, Lucia Lucia

Research Collection School Of Computing and Information Systems

The second International Workshop on Software Mining (Soft-mine) was held on the 11th of November 2013. The workshop was held in conjunction with the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE) in Silicon Valley, California, USA. The workshop has facilitated researchers who are interested in mining various types of software-related data and in applying data mining techniques to support software engineering tasks. During the workshop, seven papers on software mining and behavior models, execution trace mining, and bug localization and fixing were presented. One of the papers received the best paper award. Furthermore, there were two invited talk …


Modeling Neuromorphic Persistent Firing Networks, Ning Ning, Guoqi Li, Wei He, Kejie Huang, Li Pan, Kiruthika Ramanathan, Rong Zhao, Luping Shi Jan 2015

Modeling Neuromorphic Persistent Firing Networks, Ning Ning, Guoqi Li, Wei He, Kejie Huang, Li Pan, Kiruthika Ramanathan, Rong Zhao, Luping Shi

Research Collection School Of Computing and Information Systems

Neurons are believed to be the brain computational engines of the brain. A recent discovery in neurophysiology reveals that interneurons can slowly integrate spiking, share the output across a coupled network of axons and respond with persistent firing even in the absence of input to the soma or dendrites, which has not been understood and could be very important for exploring the mechanism of human cognition. The conventional models are incapable of simulating the important newly-discovered phenomenon of persistent firing induced by axonal slow integration. In this paper, we propose a computationally efficient model of neurons through modeling the axon …


Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao Jan 2015

Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao

Research Collection School Of Computing and Information Systems

We present CipherCard, a physical token that defends against shoulder-surfing attacks on user authentication on capacitive touchscreen devices. When CipherCard is placed over a touchscreen’s pin-pad, it remaps a user’s touch point on the physical token to a different location on the pin-pad. It hence translates a visible user password into a different system password received by a touchscreen, but is hidden from observers as well as the user. CipherCard enhances authentication security through Two-Factor Authentication (TFA), in that both the correct user password and a specific card are needed for successful authentication. We explore the design space of CipherCard, …


Special Section: Economics, Electronic Commerce, And Competitive Strategy, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman Jan 2015

Special Section: Economics, Electronic Commerce, And Competitive Strategy, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman

Research Collection School Of Computing and Information Systems

The title of this year;s special section of selected papers, whose initial versionswere presented at the “Economics and Electronic Commerce,” and “Information Technologyand Competitive Strategy” mini-tracks of the 2001 Hawaii International Conferenceon Systems Science (HICSS), reflects the increasing convergence of ideas fromEconomics and Information Systems (IS) research. This convergence has been occurringover the last several years and is related to the developments in e-commerce. ISresearch has been rapidly coming of age, driven by the ever-increasing importance ofinformation technology (IT) in the marketplace, and the need for managers, investors,policy-makers, and the public to understand how to more effectively navigate in ourhighly …


Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Wai Hong Ronald Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin C. Valera, Hwee Xian Tan, Natarajan Gautam Jan 2015

Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Wai Hong Ronald Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin C. Valera, Hwee Xian Tan, Natarajan Gautam

Research Collection School Of Computing and Information Systems

Abstract:The dynamic and unpredictable nature of energy harvesting sources available for wireless sensor networks, and the time variation in network statistics like packet transmission rates and link qualities, necessitate the use of adaptive duty cycling techniques. Such adaptive control allows sensor nodes to achieve long-run energy neutrality, where energy supply and demand are balanced in a dynamic environment such that the nodes function continuously. In this paper, we develop a new framework enabling an adaptive duty cycling scheme for sensor networks that takes into account the node battery level, ambient energy that can be harvested, and application-level QoS requirements. We …


Solving Uncertain Mdps With Objectives That Are Separable Over Instantiations Of Model Uncertainty, Yossiri Adulyasak, Pradeep Varakantham, Asrar Ahmed, Patrick Jaillet Jan 2015

Solving Uncertain Mdps With Objectives That Are Separable Over Instantiations Of Model Uncertainty, Yossiri Adulyasak, Pradeep Varakantham, Asrar Ahmed, Patrick Jaillet

Research Collection School Of Computing and Information Systems

Markov Decision Problems, MDPs offer an effective mechanism for planning under uncertainty. However, due to unavoidable uncertainty over models, it is difficult to obtain an exact specification of an MDP. We are interested in solving MDPs, where transition and reward functions are not exactly specified. Existing research has primarily focussed on computing infinite horizon stationary policies when optimizing robustness, regret and percentile based objectives. We focus specifically on finite horizon problems with a special emphasis on objectives that are separable over individual instantiations of model uncertainty (i.e., objectives that can be expressed as a sum over instantiations of model uncertainty): …


Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu Jan 2015

Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu

Research Collection School Of Computing and Information Systems

Typically a user prefers an item (e.g., a movie) because she likes certain features of the item (e.g., director, genre, producer). This observation motivates us to consider a feature-centric recommendation approach to item recommendation: instead of directly predicting the rating on items, we predict the rating on the features of items, and use such ratings to derive the rating on an item. This approach offers several advantages over the traditional item-centric approach: it incorporates more information about why a user chooses an item, it generalizes better due to the denser feature rating data, it explains the prediction of item ratings …


Ambiguous Optimistic Fair Exchange: Definition And Constructions, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo Jan 2015

Ambiguous Optimistic Fair Exchange: Definition And Constructions, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo

Research Collection School Of Computing and Information Systems

Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help of an arbitrator which is called in only when a dispute happens between the two parties. In almost all the previous work on OFE, after obtaining a partial signature from the signer, the verifier can present it to others and show that the signer has indeed committed itself to something corresponding to the partial signature even prior to the completion of the transaction. In some scenarios, this capability given …


Toward Mobile Robots Reasoning Like Humans, Jean Oh, Arne Suppe, Felix Duvallet, Abdeslam Boularias, Luis Navarro-Serment, Martial Hebert, Anthony Stentz, Jerry Vinokurov, Oscar Romero, Christian Lebiere, Robert Dean Jan 2015

Toward Mobile Robots Reasoning Like Humans, Jean Oh, Arne Suppe, Felix Duvallet, Abdeslam Boularias, Luis Navarro-Serment, Martial Hebert, Anthony Stentz, Jerry Vinokurov, Oscar Romero, Christian Lebiere, Robert Dean

Research Collection School Of Computing and Information Systems

Robots are increasingly becoming key players in human-robot teams. To become effective teammates, robots must possess profound understanding of an environment, be able to reason about the desired commands and goals within a specific context, and be able to communicate with human teammates in a clear and natural way. To address these challenges, we have developed an intelligence architecture that combines cognitive components to carry out high-level cognitive tasks, semantic perception to label regions in the world, and a natural language component to reason about the command and its relationship to the objects in the world. This paper describes recent …


Saliency-Guided Color-To-Gray Conversion Using Region-Based Optimization, Hao Du, Shengfeng He, Bin Sheng, Lizhuang Ma, Rynson W.H. Lau Jan 2015

Saliency-Guided Color-To-Gray Conversion Using Region-Based Optimization, Hao Du, Shengfeng He, Bin Sheng, Lizhuang Ma, Rynson W.H. Lau

Research Collection School Of Computing and Information Systems

Image decolorization is a fundamental problem for many real-world applications, including monochrome printing and photograph rendering. In this paper, we propose a new color-to-gray conversion method that is based on a region-based saliency model. First, we construct a parametric color-to-gray mapping function based on global color information as well as local contrast. Second, we propose a region-based saliency model that computes visual contrast among pixel regions. Third, we minimize the salience difference between the original color image and the output grayscale image in order to preserve contrast discrimination. To evaluate the performance of the proposed method in preserving contrast in …