Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

2015

Discipline
Keyword

Articles 301 - 330 of 338

Full-Text Articles in Physical Sciences and Mathematics

Simapp: A Framework For Detecting Similar Mobile Applications By Online Kernel Learning, Ning Chen, Steven C. H. Hoi, Shaohua Li, Xiaokui Xiao Feb 2015

Simapp: A Framework For Detecting Similar Mobile Applications By Online Kernel Learning, Ning Chen, Steven C. H. Hoi, Shaohua Li, Xiaokui Xiao

Research Collection School Of Computing and Information Systems

With the popularity of smart phones and mobile devices, the number of mobile applications (a.k.a. "apps") has been growing rapidly. Detecting semantically similar apps from a large pool of apps is a basic and important problem, as it is beneficial for various applications, such as app recommendation, app search, etc. However, there is no systematic and comprehensive work so far that focuses on addressing this problem. In order to fill this gap, in this paper, we explore multi-modal heterogeneous data in app markets (e.g., description text, images, user reviews, etc.), and present "SimApp" -- a novel framework for detecting similar …


Analysis And Improvement On A Biometric-Based Remote User Authentication Scheme Using Smart Cards, Fengtong Wen, Willy Susilo, Guomin Yang Feb 2015

Analysis And Improvement On A Biometric-Based Remote User Authentication Scheme Using Smart Cards, Fengtong Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

In a recent paper (BioMed Research International, 2013/491289), Khan et al. proposed an improved biometrics-based remote user authentication scheme with user anonymity. The scheme is believed to be secure against password guessing attack, user impersonation attack, server masquerading attack, and provide user anonymity, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Khan et al.’s scheme, and demonstrate that their scheme doesn’t provide user anonymity. This also renders that their scheme is insecure against other attacks, such as off-line password guessing attack, user impersonation attacks. Subsequently, we propose a …


Use Of A High-Value Social Audience Index For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond. Chiong Feb 2015

Use Of A High-Value Social Audience Index For Target Audience Identification On Twitter, Siaw Ling Lo, David Cornforth, Raymond. Chiong

Research Collection School Of Computing and Information Systems

With the large and growing user base of social media, it is not an easy feat to identify potential customers for business. This is mainly due to the challenge of extracting commercially viable contents from the vast amount of free-form conversations. In this paper, we analyse the Twitter content of an account owner and its list of followers through various text mining methods and segment the list of followers via an index. We have termed this index as the High-Value Social Audience (HVSA) index. This HVSA index enables a company or organisation to devise their marketing and engagement plan according …


Bridging The Vocabulary Gap Between Health Seekers And Healthcare Knowledge, Liqiang Nie, Yiliang Zhao, Akbari Mohammad, Jialie Shen, Tat-Seng Chua Feb 2015

Bridging The Vocabulary Gap Between Health Seekers And Healthcare Knowledge, Liqiang Nie, Yiliang Zhao, Akbari Mohammad, Jialie Shen, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

The vocabulary gap between health seekers and providers has hindered the cross-system operability and the interuser reusability. To bridge this gap, this paper presents a novel scheme to code the medical records by jointly utilizing local mining and global learning approaches, which are tightly linked and mutually reinforced. Local mining attempts to code the individual medical record by independently extracting the medical concepts from the medical record itself and then mapping them to authenticated terminologies. A corpus-aware terminology vocabulary is naturally constructed as a byproduct, which is used as the terminology space for global learning. Local mining approach, however, may …


On Processing Reverse K-Skyband And Ranked Reverse Skyline Queries, Yunjun Gao, Qing Liu, Baihua Zheng, Mou Li, Gang Chen, Qing Li Feb 2015

On Processing Reverse K-Skyband And Ranked Reverse Skyline Queries, Yunjun Gao, Qing Liu, Baihua Zheng, Mou Li, Gang Chen, Qing Li

Research Collection School Of Computing and Information Systems

In this paper, for the first time, we identify and solve the problem of efficient reverse k-skyband (RkSB) query processing. Given a set P of multi-dimensional points and a query point q, an RkSB query returns all the points in P whose dynamic k-skyband contains q. We formalize RkSB retrieval, and then propose five algorithms for computing the RkSB of an arbitrary query point efficiently. Our methods utilize a conventional data-partitioning index (e.g., R-tree) on the dataset, and employ pre-computation, reuse and pruning techniques to boost the query efficiency. In addition, we extend our solutions to tackle an interesting variant …


Review Synthesis For Micro-Review Summarization, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas Feb 2015

Review Synthesis For Micro-Review Summarization, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas

Research Collection School Of Computing and Information Systems

Micro-reviews is a new type of user-generated content arising from the prevalence of mobile devices and social media in the past few years. Micro-reviews are bite-size reviews (usually under 200 characters), commonly posted on social media or check-in services, using a mobile device. They capture the immediate reaction of users, and they are rich in information, concise, and to the point. However, the abundance of micro-reviews, and their telegraphic nature make it increasingly difficult to go through them and extract the useful information, especially on a mobile device. In this paper, we address the problem of summarizing the micro-reviews of …


Privacycanary: Privacy-Aware Recommenders With Adaptive Input Obfuscation, Thivya Kandappu, Arik Friedman, Roksan Borelli, Vijay Sivaraman Feb 2015

Privacycanary: Privacy-Aware Recommenders With Adaptive Input Obfuscation, Thivya Kandappu, Arik Friedman, Roksan Borelli, Vijay Sivaraman

Research Collection School Of Computing and Information Systems

Recommender systems are widely used by online retailers to promote products and content that are most likely to be of interest to a specific customer. In such systems, users often implicitly or explicitly rate products they have consumed, and some form of collaborative filtering is used to find other users with similar tastes to whom the products can be recommended. While users can benefit from more targeted and relevant recommendations, they are also exposed to greater risks of privacy loss, which can lead to undesirable financial and social consequences. The use of obfuscation techniques to preserve the privacy of user …


Biometric Authentication On Iphone And Android: Usability, Perceptions, And Influences On Adoption, Rasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, Marios Savvides Feb 2015

Biometric Authentication On Iphone And Android: Usability, Perceptions, And Influences On Adoption, Rasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe, Lorrie Faith Cranor, Marios Savvides

Research Collection School Of Computing and Information Systems

While biometrics have long been promoted as the future of authentication, the recent introduction of Android face unlock and iPhone fingerprint unlock are among the first large-scale deployments of biometrics for consumers. In a 10-participant, within-subjects lab study and a 198-participant online survey, we investigated the usability of these schemes, along with users ’ experiences, attitudes, and adoption decisions. Participants in our lab study found both face unlock and fingerprint unlock easy to use in typical scenarios. The notable exception was that face unlock was completely unusable in a dark room. Most participants preferred fingerprint unlock over face unlock or …


Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei Jan 2015

Travel Recommendation Via Author Topic Model Based Collaborative Filtering, Shuhui Jiang, Xueming Qian, Jialie Shen, Tao Mei

Research Collection School Of Computing and Information Systems

While automatic travel recommendation has attracted a lot of attentions, the existing approaches generally suffer from different kinds of weaknesses. For example, sparsity problem can significantly degrade the performance of traditional collaborative filtering (CF). If a user only visits very few locations, accurate similar user identification becomes very challenging due to lack of sufficient information. Motivated by this concern, we propose an Author Topic Collaborative Filtering (ATCF) method to facilitate comprehensive Points of Interest (POIs) recommendation for social media users. In our approach, the topics about user preference (e.g., cultural, cityscape, or landmark) are extracted from the textual description of …


Semi-Universal Portfolios With Transaction Costs, Dingjiang Huang, Yan Zhu, Bin Li, Shuigeng Zhou, Steven C. H. Hoi Jan 2015

Semi-Universal Portfolios With Transaction Costs, Dingjiang Huang, Yan Zhu, Bin Li, Shuigeng Zhou, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Online portfolio selection (PS) has been extensively studied in artificial intelligence and machine learning communities in recent years. An important practical issue of online PS is transaction cost, which is unavoidable and nontrivial in real financial trading markets. Most existing strategies, such as universal portfolio (UP) based strategies, often rebalance their target portfolio vectors at every investment period, and thus the total transaction cost increases rapidly and the final cumulative wealth degrades severely. To overcome the limitation, in this paper we investigate new investment strategies that rebalances its portfolio only at some selected instants. Specifically, we design a novel on-line …


Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang Jan 2015

Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang

Research Collection School Of Computing and Information Systems

The pervasive usage and reach of social media have attracted a surge of attention in the multimedia research community. Community discovery from social media has therefore become an important yet challenging issue. However, due to the subjective generating process, the explicitly observed communities (e.g., group-user and user-user relationship) are often noisy and incomplete in nature. This paper presents a novel approach to discovering communities from social media, including the group membership and user friend structure, by exploring a low-rank matrix recovery technique. In particular, we take Flickr as one exemplary social media platform. We first model the observed indicator matrix …


Reputationpro: The Efficient Approaches To Contextual Transaction Trust Computation In E-Commerce Environments, Haibin Zhang, Yan Wang, Xiuzhen Zhang, Ee Peng Lim Jan 2015

Reputationpro: The Efficient Approaches To Contextual Transaction Trust Computation In E-Commerce Environments, Haibin Zhang, Yan Wang, Xiuzhen Zhang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In e-commerce environments, the trustworthiness of a seller is utterly important to potential buyers, especially when a seller is not known to them. Most existing trust evaluation models compute a single value to reflect the general trustworthiness of a seller without taking any transaction context information into account. With such a result as the indication of reputation, a buyer may be easily deceived by a malicious seller in a transaction where the notorious value imbalance problem is involved—in other words, a malicious seller accumulates a high-level reputation by selling cheap products and then deceives buyers by inducing them to purchase …


Improving Internet Security Through Mandatory Information Disclosure, Qian Tang, Andrew B. Whinston Jan 2015

Improving Internet Security Through Mandatory Information Disclosure, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

Although disclosure has long been considered as a solution to internalize externalities, mandatory security information disclosure is still in debate. We propose a mandatory disclosure mechanism based on existing data. The information is disclosed as straightforward rankings of organizations for users to understand, interpret, and make comparisons. As a result, the disclosure can influence organizations through reputational effects. We created a public website to disclose information regularly and conducted a quasi-experiment on outgoing spam to test the effectiveness of our mechanism on four matched country groups. For each treated country, we released the ranking list of top 10 most spamming …


Improving Software Quality And Productivity Leveraging Mining Techniques: [Summary Of The Second Workshop On Software Mining, At Ase 2013], Ming Li, Hongyu Zhang, David Lo, Lucia Lucia Jan 2015

Improving Software Quality And Productivity Leveraging Mining Techniques: [Summary Of The Second Workshop On Software Mining, At Ase 2013], Ming Li, Hongyu Zhang, David Lo, Lucia Lucia

Research Collection School Of Computing and Information Systems

The second International Workshop on Software Mining (Soft-mine) was held on the 11th of November 2013. The workshop was held in conjunction with the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE) in Silicon Valley, California, USA. The workshop has facilitated researchers who are interested in mining various types of software-related data and in applying data mining techniques to support software engineering tasks. During the workshop, seven papers on software mining and behavior models, execution trace mining, and bug localization and fixing were presented. One of the papers received the best paper award. Furthermore, there were two invited talk …


Modeling Neuromorphic Persistent Firing Networks, Ning Ning, Guoqi Li, Wei He, Kejie Huang, Li Pan, Kiruthika Ramanathan, Rong Zhao, Luping Shi Jan 2015

Modeling Neuromorphic Persistent Firing Networks, Ning Ning, Guoqi Li, Wei He, Kejie Huang, Li Pan, Kiruthika Ramanathan, Rong Zhao, Luping Shi

Research Collection School Of Computing and Information Systems

Neurons are believed to be the brain computational engines of the brain. A recent discovery in neurophysiology reveals that interneurons can slowly integrate spiking, share the output across a coupled network of axons and respond with persistent firing even in the absence of input to the soma or dendrites, which has not been understood and could be very important for exploring the mechanism of human cognition. The conventional models are incapable of simulating the important newly-discovered phenomenon of persistent firing induced by axonal slow integration. In this paper, we propose a computationally efficient model of neurons through modeling the axon …


Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao Jan 2015

Ciphercard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks On Common Touchscreen Devices, Teddy Seyed, Xing-Dong Yang, Anthony Tang, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Ciao

Research Collection School Of Computing and Information Systems

We present CipherCard, a physical token that defends against shoulder-surfing attacks on user authentication on capacitive touchscreen devices. When CipherCard is placed over a touchscreen’s pin-pad, it remaps a user’s touch point on the physical token to a different location on the pin-pad. It hence translates a visible user password into a different system password received by a touchscreen, but is hidden from observers as well as the user. CipherCard enhances authentication security through Two-Factor Authentication (TFA), in that both the correct user password and a specific card are needed for successful authentication. We explore the design space of CipherCard, …


Special Section: Economics, Electronic Commerce, And Competitive Strategy, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman Jan 2015

Special Section: Economics, Electronic Commerce, And Competitive Strategy, Eric K. Clemons, Rajiv M. Dewan, Robert John Kauffman

Research Collection School Of Computing and Information Systems

The title of this year;s special section of selected papers, whose initial versionswere presented at the “Economics and Electronic Commerce,” and “Information Technologyand Competitive Strategy” mini-tracks of the 2001 Hawaii International Conferenceon Systems Science (HICSS), reflects the increasing convergence of ideas fromEconomics and Information Systems (IS) research. This convergence has been occurringover the last several years and is related to the developments in e-commerce. ISresearch has been rapidly coming of age, driven by the ever-increasing importance ofinformation technology (IT) in the marketplace, and the need for managers, investors,policy-makers, and the public to understand how to more effectively navigate in ourhighly …


Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Wai Hong Ronald Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin C. Valera, Hwee Xian Tan, Natarajan Gautam Jan 2015

Adaptive Duty Cycling In Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain And Fluid Models, Wai Hong Ronald Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin C. Valera, Hwee Xian Tan, Natarajan Gautam

Research Collection School Of Computing and Information Systems

Abstract:The dynamic and unpredictable nature of energy harvesting sources available for wireless sensor networks, and the time variation in network statistics like packet transmission rates and link qualities, necessitate the use of adaptive duty cycling techniques. Such adaptive control allows sensor nodes to achieve long-run energy neutrality, where energy supply and demand are balanced in a dynamic environment such that the nodes function continuously. In this paper, we develop a new framework enabling an adaptive duty cycling scheme for sensor networks that takes into account the node battery level, ambient energy that can be harvested, and application-level QoS requirements. We …


Solving Uncertain Mdps With Objectives That Are Separable Over Instantiations Of Model Uncertainty, Yossiri Adulyasak, Pradeep Varakantham, Asrar Ahmed, Patrick Jaillet Jan 2015

Solving Uncertain Mdps With Objectives That Are Separable Over Instantiations Of Model Uncertainty, Yossiri Adulyasak, Pradeep Varakantham, Asrar Ahmed, Patrick Jaillet

Research Collection School Of Computing and Information Systems

Markov Decision Problems, MDPs offer an effective mechanism for planning under uncertainty. However, due to unavoidable uncertainty over models, it is difficult to obtain an exact specification of an MDP. We are interested in solving MDPs, where transition and reward functions are not exactly specified. Existing research has primarily focussed on computing infinite horizon stationary policies when optimizing robustness, regret and percentile based objectives. We focus specifically on finite horizon problems with a special emphasis on objectives that are separable over individual instantiations of model uncertainty (i.e., objectives that can be expressed as a sum over instantiations of model uncertainty): …


Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu Jan 2015

Are Features Equally Representative? A Feature-Centric Recommendation, Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu

Research Collection School Of Computing and Information Systems

Typically a user prefers an item (e.g., a movie) because she likes certain features of the item (e.g., director, genre, producer). This observation motivates us to consider a feature-centric recommendation approach to item recommendation: instead of directly predicting the rating on items, we predict the rating on the features of items, and use such ratings to derive the rating on an item. This approach offers several advantages over the traditional item-centric approach: it incorporates more information about why a user chooses an item, it generalizes better due to the denser feature rating data, it explains the prediction of item ratings …


Ambiguous Optimistic Fair Exchange: Definition And Constructions, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo Jan 2015

Ambiguous Optimistic Fair Exchange: Definition And Constructions, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo

Research Collection School Of Computing and Information Systems

Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help of an arbitrator which is called in only when a dispute happens between the two parties. In almost all the previous work on OFE, after obtaining a partial signature from the signer, the verifier can present it to others and show that the signer has indeed committed itself to something corresponding to the partial signature even prior to the completion of the transaction. In some scenarios, this capability given …


Saliency-Guided Color-To-Gray Conversion Using Region-Based Optimization, Hao Du, Shengfeng He, Bin Sheng, Lizhuang Ma, Rynson W.H. Lau Jan 2015

Saliency-Guided Color-To-Gray Conversion Using Region-Based Optimization, Hao Du, Shengfeng He, Bin Sheng, Lizhuang Ma, Rynson W.H. Lau

Research Collection School Of Computing and Information Systems

Image decolorization is a fundamental problem for many real-world applications, including monochrome printing and photograph rendering. In this paper, we propose a new color-to-gray conversion method that is based on a region-based saliency model. First, we construct a parametric color-to-gray mapping function based on global color information as well as local contrast. Second, we propose a region-based saliency model that computes visual contrast among pixel regions. Third, we minimize the salience difference between the original color image and the output grayscale image in order to preserve contrast discrimination. To evaluate the performance of the proposed method in preserving contrast in …


Multidimensional Context Awareness In Mobile Devices, Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu Jan 2015

Multidimensional Context Awareness In Mobile Devices, Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu

Research Collection School Of Computing and Information Systems

With the increase of mobile computation ability and the development of wireless network transmission technology, mobile devices not only are the important tools of personal life (e.g., education and entertainment), but also emerge as indispensable "secretary" of business activities (e.g., email and phone call). However, since mobile devices could work under complex and dynamic local and network conditions, they are vulnerable to local and remote security attacks. In real applications, different kinds of data protection are required by various local contexts. To provide appropriate protection, we propose a multidimensional context (MContext) scheme to comprehensively model and characterize the scene and …


The Knowledge Accumulation And Transfer In Open-Source Software (Oss) Development, Youngsoo Kim, Lingxiao Jiang Jan 2015

The Knowledge Accumulation And Transfer In Open-Source Software (Oss) Development, Youngsoo Kim, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

We examine the learning curves of individual software developers in Open-Source Software (OSS) Development. We collected the dataset of multi-year code change histories from the repositories for 20 open source software projects involving more than 200 developers. We build and estimate regression models to assess individual developers' learning progress (in reducing the likelihood they make a bug). Our estimation results show that developer's coding and indirect bug-fixing experiences do not decrease bug ratios while bug-fixing experience can lead to the decrease of bug ratio of learning progress. We also find that developer's coding and bug-fixing experiences in other projects do …


Multi-User Multiple Input Multiple Output (Mimo) Communication With Distributed Antenna Systems In Wireless Networks, Karthikeyan Sundaresan, Mohammad Khojastepour, Sampath Rangarajan, Jie Xiong Jan 2015

Multi-User Multiple Input Multiple Output (Mimo) Communication With Distributed Antenna Systems In Wireless Networks, Karthikeyan Sundaresan, Mohammad Khojastepour, Sampath Rangarajan, Jie Xiong

Research Collection School Of Computing and Information Systems

A system and a method are provided. The method includes deploying a plurality of antennas of an access point or a base station as a distributed antenna system. The method further includes configuring the distributed antenna system for multi-user wireless transmissions by applying medium access techniques and power-balanced pre-coding at the access point or the base station. The method also includes providing device localization for devices communicating with the distributed antenna system by applying time-difference-of-arrival techniques to antenna pairs from among the plurality of antennas at the access point or the base station.


An Adaptive Gradient Method For Online Auc Maximization, Yi Ding, Peilin Zhao, Steven C. H. Hoi, Yew-Soon Ong Jan 2015

An Adaptive Gradient Method For Online Auc Maximization, Yi Ding, Peilin Zhao, Steven C. H. Hoi, Yew-Soon Ong

Research Collection School Of Computing and Information Systems

Learning for maximizing AUC performance is an important research problem in machine learning. Unlike traditional batch learning methods for maximizing AUC which often suffer from poor scalability, recent years have witnessed some emerging studies that attempt to maximize AUC by single-pass online learning approaches. Despite their encouraging results reported, the existing online AUC maximization algorithms often adopt simple stochastic gradient descent approaches, which fail to exploit the geometry knowledge of the data observed in the online learning process, and thus could suffer from relatively slow convergence. To overcome the limitation of the existing studies, in this paper, we propose a …


A Systematic Study On Explicit-State Non-Zenoness Checking For Timed Automata, Ting Wang, Jun Sun, Xinyu Wang, Yang Liu, Yuanjie Si, Jin Song Dong, Xiaohu Yang, Xiaohong Li Jan 2015

A Systematic Study On Explicit-State Non-Zenoness Checking For Timed Automata, Ting Wang, Jun Sun, Xinyu Wang, Yang Liu, Yuanjie Si, Jin Song Dong, Xiaohu Yang, Xiaohong Li

Research Collection School Of Computing and Information Systems

Zeno runs, where infinitely many actions occur within finite time, may arise in Timed Automata models. Zeno runs are not feasible in reality and must be pruned during system verification. Thus it is necessary to check whether a run is Zeno or not so as to avoid presenting Zeno runs as counterexamples during model checking. Existing approaches on non-Zenoness checking include either introducing an additional clock in the Timed Automata models or additional accepting states in the zone graphs. In addition, there are approaches proposed for alternative timed modeling languages, which could be generalized to Timed Automata. In this work, …


Designing A Portfolio Of Parameter Configurations For Online Algorithm Selection, Aldy Gunawan, Hoong Chuin Lau, Mustafa Misir Jan 2015

Designing A Portfolio Of Parameter Configurations For Online Algorithm Selection, Aldy Gunawan, Hoong Chuin Lau, Mustafa Misir

Research Collection School Of Computing and Information Systems

Algorithm portfolios seek to determine an effective set of algorithms that can be used within an algorithm selection framework to solve problems. A limited number of these portfolio studies focus on generating different versions of a target algorithm using different parameter configurations. In this paper, we employ a Design of Experiments (DOE) approach to determine a promising range of values for each parameter of an algorithm. These ranges are further processed to determine a portfolio of parameter configurations, which would be used within two online Algorithm Selection approaches for solving different instances of a given combinatorial optimization problem effectively. We …


Mechanism Design For Near Real-Time Retail Payment And Settlement Systems, Zhiling Guo, Robert John Kauffman, Mei Lin, Dan Ma Jan 2015

Mechanism Design For Near Real-Time Retail Payment And Settlement Systems, Zhiling Guo, Robert John Kauffman, Mei Lin, Dan Ma

Research Collection School Of Computing and Information Systems

have made extensive use of interbank netting systems, in which payments are accumulated for end-of-day settlement. This approach, known as deferred net settlement (DNS), reduces the liquidity needs of a payment system, but bears inherent operational risks. As large dollar volumes of retail payments accumulate swiftly, real-time gross settlement (RTGS) is an attractive option. It permits immediate settlement of transactions during the day, but it brings up other risks that require consideration. We propose a hybrid payment management system involving elements of both DNS and RTGS. We explore several hybrid system mechanism designs to allow payment prioritization, reduce payment delays, …


Software Puzzle: A Countermeasure To Resource-Inflated Denial-Of-Service Attacks, Yongdong Wu, Zhigang Zhao, Bao Feng, Robert H. Deng Jan 2015

Software Puzzle: A Countermeasure To Resource-Inflated Denial-Of-Service Attacks, Yongdong Wu, Zhigang Zhao, Bao Feng, Robert H. Deng

Research Collection School Of Computing and Information Systems

Denial-of-service (DoS) and distributed DoS (DDoS) are among the major threats to cyber-security, and client puzzle, which demands a client to perform computationally expensive operations before being granted services from a server, is a well-known countermeasure to them. However, an attacker can inflate its capability of DoS/DDoS attacks with fast puzzle-solving software and/or built-in graphics processing unit (GPU) hardware to significantly weaken the effectiveness of client puzzles. In this paper, we study how to prevent DoS/DDoS attackers from inflating their puzzle-solving capabilities. To this end, we introduce a new client puzzle referred to as software puzzle. Unlike the existing client …