Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Adaptive systems (2)
- Agent-based model (2)
- Complex adaptive supply network (2)
- Network evolution (2)
- Structural characteristics of supply network (2)
-
- Supply chain (2)
- Authentication (1)
- Batch demands (1)
- Cognitive systems (1)
- Coupling alignments with recognition; still-to-video face recognition (1)
- Cryptanalysis (1)
- Cyclic assignment (1)
- Hierarchical chunking (1)
- Last mile problem (1)
- Queuing (1)
- Roaming (1)
- Security (1)
- Smart card (1)
- Waiting time bounds (1)
- Working memory (1)
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen
Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen
Research Collection School Of Computing and Information Systems
The Still-to-Video (S2V) face recognition systems typically need to match faces in low-quality videos captured under unconstrained conditions against high quality still face images, which is very challenging because of noise, image blur, low face resolutions, varying head pose, complex lighting, and alignment difficulty. To address the problem, one solution is to select the frames of `best quality' from videos (hereinafter called quality alignment in this paper). Meanwhile, the faces in the selected frames should also be geometrically aligned to the still faces offline well-aligned in the gallery. In this paper, we discover that the interactions among the three tasks-quality …
A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fengtong Wen, Willy Susilo, Guomin Yang
A Secure And Effective Anonymous User Authentication Scheme For Roaming Service In Global Mobility Networks, Fengtong Wen, Willy Susilo, Guomin Yang
Research Collection School Of Computing and Information Systems
In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Jiang et al.’s scheme, and show that the scheme is in fact insecure against the stolen-verifier attack and replay attack. Then, we …
Understanding The Genetic Makeup Of Linux Device Drivers, Peter Senna Tschudin, Laurent Reveillere, Lingxiao Jiang, David Lo, Julia Lawall
Understanding The Genetic Makeup Of Linux Device Drivers, Peter Senna Tschudin, Laurent Reveillere, Lingxiao Jiang, David Lo, Julia Lawall
Research Collection School Of Computing and Information Systems
No abstract provided.
An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, L. Ponnambalam, A. Tan, X. Fu, X. F. Yin, Zhaoxia Wang, R. S. Goh
An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, L. Ponnambalam, A. Tan, X. Fu, X. F. Yin, Zhaoxia Wang, R. S. Goh
Research Collection School Of Computing and Information Systems
Supply chain networks of modern era are complex adaptive systems that are dynamic and highly interdependent in nature. Business continuity of these complex systems depend vastly on understanding as to how the supply chain network evolves over time (based on the policies it adapts), and identifying the susceptibility of the evolved networks to external disruptions. The objective of this article is to illustrate as to how an agent-based network analytic perspective can aid this understanding on the network-evolution dynamics, and identification of disruption effects on the evolved networks. To this end, we developed a 4-tier agent based supply chain model …
An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, Loganathan Ponnanbalam, A. Tan, Xiuju Fu, Xiaofeng Yin, Zhaoxia Wang, Rick S. M. Goh
An Agent-Based Network Analytic Perspective On The Evolution Of Complex Adaptive Supply Chain Networks, Loganathan Ponnanbalam, A. Tan, Xiuju Fu, Xiaofeng Yin, Zhaoxia Wang, Rick S. M. Goh
Research Collection School Of Computing and Information Systems
Supply chain networks of modern era are complex adaptive systems that are dynamic and highly interdependent in nature. Business continuity of these complex systems depend vastly on understanding as to how the supply chain network evolves over time (based on the policies it adapts), and identifying the susceptibility of the evolved networks to external disruptions. The objective of this article is to illustrate as to how an agent-based network analytic perspective can aid this understanding on the network-evolution dynamics, and identification of disruption effects on the evolved networks. To this end, we developed a 4-tier agent based supply chain model …
Approximating The Performance Of A "Last Mile" Transportation System, Hai Wang, Amedeo Odoni
Approximating The Performance Of A "Last Mile" Transportation System, Hai Wang, Amedeo Odoni
Research Collection School Of Computing and Information Systems
The Last Mile Problem (LMP) refers to the provision of travel service from thenearest public transportation node to a home or office. We study the supply side of thisproblem in a stochastic setting, with batch demands resulting from the arrival of groupsof passengers at rail stations or bus stops who request last-mile service. Closed-formbounds and approximations are derived for the performance of Last Mile TransportationsSystems as a function of the fundamental design parameters of such systems. An initialset of results is obtained for the case in which a fleet of vehicles of unit capacity providesthe Last Mile service and each …
Behind The Magical Numbers: Hierarchical Chunking And The Human Working Memory Capacity, Guoqi Li, Ning Ning, Kiruthika Ramanathan, Wei He, Li Pan, Luping Shi
Behind The Magical Numbers: Hierarchical Chunking And The Human Working Memory Capacity, Guoqi Li, Ning Ning, Kiruthika Ramanathan, Wei He, Li Pan, Luping Shi
Research Collection School Of Computing and Information Systems
To explore the influence of chunking on the capacity limits of working memory, a model for chunking in sequential working memory is proposed, using hierarchical bidirectional inhibition-connected neural networks with winnerless competition. With the assumption of the existence of an upper bound to the inhibitory weights in neurobiological networks, it is shown that chunking increases the number of memorized items in working memory from the "magical number 7" to 16 items. The optimal number of chunks and the number of the memorized items in each chunk are the "magical number 4".
Network Structure Of Social Coding In Github, Ferdian Thung, David Lo, Lingxiao Jiang
Network Structure Of Social Coding In Github, Ferdian Thung, David Lo, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
No abstract provided.