Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen Dec 2013

Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen

Research Collection School Of Computing and Information Systems

The Still-to-Video (S2V) face recognition systems typically need to match faces in low-quality videos captured under unconstrained conditions against high quality still face images, which is very challenging because of noise, image blur, low face resolutions, varying head pose, complex lighting, and alignment difficulty. To address the problem, one solution is to select the frames of `best quality' from videos (hereinafter called quality alignment in this paper). Meanwhile, the faces in the selected frames should also be geometrically aligned to the still faces offline well-aligned in the gallery. In this paper, we discover that the interactions among the three tasks-quality …


A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fengtong Wen, Willy Susilo, Guomin Yang Dec 2013

A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fengtong Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.’s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we …


Understanding The Genetic Makeup Of Linux Device Drivers, Peter Senna Tschudin, Laurent Reveillere, Lingxiao Jiang, David Lo, Julia Lawall Nov 2013

Understanding The Genetic Makeup Of Linux Device Drivers, Peter Senna Tschudin, Laurent Reveillere, Lingxiao Jiang, David Lo, Julia Lawall

Research Collection School Of Computing and Information Systems

No abstract provided.


An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, L. Ponnambalam, A. Tan, X. Fu, X. F. Yin, Zhaoxia Wang, R. S. Goh Aug 2013

An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, L. Ponnambalam, A. Tan, X. Fu, X. F. Yin, Zhaoxia Wang, R. S. Goh

Research Collection School Of Computing and Information Systems

Supply chain networks of modern era are complex adaptive systems that are dynamic and highly interdependent in nature. Business continuity of these complex systems depend vastly on understanding as to how the supply chain network evolves over time (based on the policies it adapts), and identifying the susceptibility of the evolved networks to external disruptions. The objective of this article is to illustrate as to how an agent-based network analytic perspective can aid this understanding on the network-evolution dynamics, and identification of disruption effects on the evolved networks. To this end, we developed a 4-tier agent based supply chain model …


An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, Loganathan Ponnanbalam, A. Tan, Xiuju Fu, Xiaofeng Yin, Zhaoxia Wang, Rick S. M. Goh Aug 2013

An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, Loganathan Ponnanbalam, A. Tan, Xiuju Fu, Xiaofeng Yin, Zhaoxia Wang, Rick S. M. Goh

Research Collection School Of Computing and Information Systems

Supply chain networks of modern era are complex adaptive systems that are dynamic and highly interdependent in nature. Business continuity of these complex systems depend vastly on understanding as to how the supply chain network evolves over time (based on the policies it adapts), and identifying the susceptibility of the evolved networks to external disruptions. The objective of this article is to illustrate as to how an agent-based network analytic perspective can aid this understanding on the network-evolution dynamics, and identification of disruption effects on the evolved networks. To this end, we developed a 4-tier agent based supply chain model …


Approximating The Performance Of A "Last Mile" Transportation System, Hai Wang, Amedeo Odoni Jun 2013

Approximating The Performance Of A "Last Mile" Transportation System, Hai Wang, Amedeo Odoni

Research Collection School Of Computing and Information Systems

The Last Mile Problem (LMP) refers to the provision of travel service from thenearest public transportation node to a home or office. We study the supply side of thisproblem in a stochastic setting, with batch demands resulting from the arrival of groupsof passengers at rail stations or bus stops who request last-mile service. Closed-formbounds and approximations are derived for the performance of Last Mile TransportationsSystems as a function of the fundamental design parameters of such systems. An initialset of results is obtained for the case in which a fleet of vehicles of unit capacity providesthe Last Mile service and each …


Behind The Magical Numbers: Hierarchical Chunking And The Human Working Memory Capacity, Guoqi Li, Ning Ning, Kiruthika Ramanathan, Wei He, Li Pan, Luping Shi May 2013

Behind The Magical Numbers: Hierarchical Chunking And The Human Working Memory Capacity, Guoqi Li, Ning Ning, Kiruthika Ramanathan, Wei He, Li Pan, Luping Shi

Research Collection School Of Computing and Information Systems

To explore the influence of chunking on the capacity limits of working memory, a model for chunking in sequential working memory is proposed, using hierarchical bidirectional inhibition-connected neural networks with winnerless competition. With the assumption of the existence of an upper bound to the inhibitory weights in neurobiological networks, it is shown that chunking increases the number of memorized items in working memory from the "magical number 7" to 16 items. The optimal number of chunks and the number of the memorized items in each chunk are the "magical number 4".


Network Structure Of Social Coding In Github, Ferdian Thung, David Lo, Lingxiao Jiang Mar 2013

Network Structure Of Social Coding In Github, Ferdian Thung, David Lo, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

No abstract provided.