Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Research Collection School Of Computing and Information Systems

Articles 1 - 30 of 335

Full-Text Articles in Physical Sciences and Mathematics

Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun Dec 2014

Human Action Classification Based On Sequential Bag-Of-Words Model, Hong Liu, Qiaoduo Zhang, Qianru Sun

Research Collection School Of Computing and Information Systems

Recently, approaches utilizing spatial-temporal features have achieved great success in human action classification. However, they typically rely on bag-of-words (BoWs) model, and ignore the spatial and temporal structure information of visual words, bringing ambiguities among similar actions. In this paper, we present a novel approach called sequential BoWs for efficient human action classification. It captures temporal sequential structure by segmenting the entire action into sub-actions. Each sub-action has a tiny movement within a narrow range of action. Then the sequential BoWs are created, in which each sub-action is assigned with a certain weight and salience to highlight the distinguishing sections. …


Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun Dec 2014

Online Learning On Incremental Distance Metric For Person Re-Identification, Yuke Sun, Hong Liu, Qianru Sun

Research Collection School Of Computing and Information Systems

Person re-identification is to match persons appearing across non-overlapping cameras. The matching is challenging due to visual ambiguities and disparities of human bodies. Most previous distance metrics are learned by off-line and supervised approaches. However, they are not practical in real-world applications in which online data comes in without any label. In this paper, a novel online learning approach on incremental distance metric, OL-IDM, is proposed. The approach firstly modifies Self-Organizing Incremental Neural Network (SOINN) using Mahalanobis distance metric to cluster incoming data into neural nodes. Such metric maximizes the likelihood of a true image pair matches with a smaller …


Probabilistic Latent Document Network Embedding, Tuan M. V. Le, Hady W. Lauw Dec 2014

Probabilistic Latent Document Network Embedding, Tuan M. V. Le, Hady W. Lauw

Research Collection School Of Computing and Information Systems

A document network refers to a data type that can be represented as a graph of vertices, where each vertex is associated with a text document. Examples of such a data type include hyperlinked Web pages, academic publications with citations, and user profiles in social networks. Such data have very high-dimensional representations, in terms of text as well as network connectivity. In this paper, we study the problem of embedding, or finding a low-dimensional representation of a document network that "preserves" the data as much as possible. These embedded representations are useful for various applications driven by dimensionality reduction, such …


Detecting Flow Anomalies In Distributed Systems, Freddy Chong-Tat Chua, Ee Peng Lim, Bernardo Huberman Dec 2014

Detecting Flow Anomalies In Distributed Systems, Freddy Chong-Tat Chua, Ee Peng Lim, Bernardo Huberman

Research Collection School Of Computing and Information Systems

Deep within the networks of distributed systems, one often finds anomalies that affect their efficiency and performance. These anomalies are difficult to detect because the distributed systems may not have sufficient sensors to monitor the flow of traffic within the interconnected nodes of the networks. Without early detection and making corrections, these anomalies may aggravate over time and could possibly cause disastrous outcomes in the system in the unforeseeable future. Using only coarse-grained information from the two end points of network flows, we propose a network transmission model and a localization algorithm, to detect the location of anomalies and rank …


Extracting Interest Tags From Twitter User Biographies, Ying Ding, Jing Jiang Dec 2014

Extracting Interest Tags From Twitter User Biographies, Ying Ding, Jing Jiang

Research Collection School Of Computing and Information Systems

Twitter, one of the most popular social media platforms, has been studied from different angles. One of the important sources of information in Twitter is users’ biographies, which are short self-introductions written by users in free form. Biographies often describe users’ background and interests. However, to the best of our knowledge, there has not been much work trying to extract information from Twitter biographies. In this work, we study how to extract information revealing users’ personal interests from Twitter biographies. A sequential labeling model is trained with automatically constructed labeled data. The popular patterns expressing user interests are extracted and …


Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert Dec 2014

Using Consumer Informedness As An Information Strategy, Ting Li, Robert John Kauffman, Eric Van Heck, Peter Vervest, Benedict Dellaert

Research Collection School Of Computing and Information Systems

Consumer informedness describes the degree to which consumers are aware of the specific attributes of products or services offered in the marketplace. Understanding how this level of informedness can amplify consumer behaviour provides firms with the opportunity to develop information-based strategies that can encourage their target segment make purchases.


Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman Dec 2014

Measuring Student Performance And Providing Feedback Using Competency Framework, Joelle Elmaleh, Venky Shankararaman

Research Collection School Of Computing and Information Systems

A number of Computer Science and Information Systems programs have effectively defined learning outcomes, course level competencies, and conducted assessments at the program level to determine areas for continuous improvement. However, many of these programs do not fully leverage the course competencies during the actual delivery and assessment of the course. This paper presents how course competencies can be used to effectively deliver and assess the course content, and give valuable timely feedback to the students. Using a large first year core course of the BSc (Information Systems Management) program (called Object Oriented Application Development course-OOAD) as an example, this …


Detecting Camouflaged Applications On Mobile Application Markets, Mon Kywe Su, Yingjiu Li, Huijie Robert Deng, Jason Hong Dec 2014

Detecting Camouflaged Applications On Mobile Application Markets, Mon Kywe Su, Yingjiu Li, Huijie Robert Deng, Jason Hong

Research Collection School Of Computing and Information Systems

Application plagiarism or application cloning is an emerging threat in mobile application markets. It reduces profits of original developers and sometimes even harms the security and privacy of users. In this paper, we introduce a new concept, called camouflaged applications, where external features of mobile applications, such as icons, screenshots, application names or descriptions, are copied. We then propose a scalable detection framework, which can find these suspiciously similar camouflaged applications. To accomplish this, we apply text-based retrieval methods and content-based image retrieval methods in our framework. Our framework is implemented and tested with 30,625 Android applications from the official …


I’Ve Heard You Have Problems: Cellular Signal Monitoring Through Ue Participatory Sensing, Huiguang Liang, Hyong Kim, Hwee-Pink Tan, Wai-Leong Yeow Dec 2014

I’Ve Heard You Have Problems: Cellular Signal Monitoring Through Ue Participatory Sensing, Huiguang Liang, Hyong Kim, Hwee-Pink Tan, Wai-Leong Yeow

Research Collection School Of Computing and Information Systems

The operating environment of cellular networks can be in a constant state of change. One Singaporean operator expressed difficulty with the coverage assertion (CA) problem of whether regulated minimum coverage is met, especially in urban areas. Currently, the operator manually appraises coverage through laborious and expensive walk/drive-tests. In this paper, we propose Tattle, a distributed, low-cost and comprehensive cellular network measurement collection and processing framework. We exemplify Tattle by leveraging on participating UEs to report on network coverage in real-time. Tattle exploits wireless local-area interfaces to exchange RSCP measurements amongst devices to preserve the co-locality of readings and conserve power. …


Unisense: A Unified And Sustainable Sensing And Transport Architecture For Large Scale And Heterogeneous Sensor Networks, Yunye Jin, Hwee-Pink Tan Dec 2014

Unisense: A Unified And Sustainable Sensing And Transport Architecture For Large Scale And Heterogeneous Sensor Networks, Yunye Jin, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

In this paper, we propose UNISENSE, a unified and sustainable sensing and transport architecture for large scale and heterogeneous sensor networks. The proposed architecture incorporates seven principal components, namely, application profiling, node architecture, intelligent network design, network management, deep sensing, generalized participatory sensing, and security. We describe the design and implementation for each component. We also present the deployment and performance of the UNISENSE architecture in four practical applications.


Pads: Passive Detection Of Moving Targets With Dynamic Speed Using Phy Layer Information, Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, Zimu Zhou Dec 2014

Pads: Passive Detection Of Moving Targets With Dynamic Speed Using Phy Layer Information, Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, Zimu Zhou

Research Collection School Of Computing and Information Systems

Device-free passive detection is an emerging technology to detect whether there exists any moving entities in the area of interests without attaching any device to them. It is an essential primitive for a broad range of applications including intrusion detection for safety precautions, patient monitoring in hospitals, child and elder care at home, etc. Despite of the prevalent signal feature Received Signal Strength (RSS), most robust and reliable solutions resort to finer-grained channel descriptor at physical layer, e.g., the Channel State Information (CSI) in the 802.11n standard. Among a large body of emerging techniques, however, few of them have explored …


Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons Dec 2014

Modeling The Evolution Of Generativity And The Emergence Of Digital Ecosystems, C. Jason Woodard, Eric K. Clemons

Research Collection School Of Computing and Information Systems

Recent literature on sociotechnical systems has employed the concept of generativity to explain the remarkable capacity for digital artifacts to support decentralized innovation and the emergence of rich business ecosystems. In this paper, we propose agent-based computational modeling as a tool for studying the evolution of generativity, and offer a set of building blocks for constructing agent-based models in which generativity evolves. We describe a series of models that we have created using these building blocks, and summarize the results of our computational experiments to date. We find in several different settings that key features of generative systems can themselves …


Cardioguard: A Brassiere-Based Reliable Ecg Monitoring Sensor System For Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki Lee, Hyunjae Baek, Kwangsuk Park Dec 2014

Cardioguard: A Brassiere-Based Reliable Ecg Monitoring Sensor System For Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki Lee, Hyunjae Baek, Kwangsuk Park

Research Collection School Of Computing and Information Systems

We propose CardioGuard, a brassiere-based reliable electrocardiogram (ECG) monitoring sensor system, for supporting daily smartphone healthcare applications. It is designed to satisfy two key requirements for user-unobtrusive daily ECG monitoring: reliability of ECG sensing and usability of the sensor. The system is validated through extensive evaluations. The evaluation results showed that the CardioGuard sensor reliably measure the ECG during 12 representative daily activities including diverse movement levels; 89.53% of QRS peaks were detected on average. The questionnaire-based user study with 15 participants showed that the CardioGuard sensor was comfortable and unobtrusive. Additionally, the signal-to-noise ratio test and the washing durability …


A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu Dec 2014

A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu

Research Collection School Of Computing and Information Systems

Recent research on cloud computing adoption indicates that there has been a lack of deep understanding of its benefits by managers and organizations. This has been an obstacle for adoption. We report on an initial design for a firm-level cloud computing readiness metrics suite. We propose categories and measures to form a set of metrics to measure adoption readiness and assess the required adjustments in strategy and management, technology and operations, and business policies. We reviewed the relevant interdisciplinary literature and interviewed industry professionals to ground our metrics based on theory and practice knowledge. We identified four relevant categories for …


Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan Dec 2014

Mydeal: A Mobile Shopping Assistant Matching User Preferences To Promotions, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan

Research Collection School Of Computing and Information Systems

A common problem in large urban cities is the huge number of retail options available. In response, a number of shopping assistance applications have been created for mobile phones. However, these applications mostly allow users to know where stores are or find promotions on specific items. What is missing is a system that factors in a user's shopping preferences and automatically tells them which stores are of their interest. The key challenge in this system is twofold; 1) building a matching algorithm that can combine user preferences with fairly unstructured deals and store information to generate a final rank ordered …


Android Or Ios For Better Privacy Protection?, Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Huijie Robert Deng Dec 2014

Android Or Ios For Better Privacy Protection?, Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Huijie Robert Deng

Research Collection School Of Computing and Information Systems

With the rapid growth of the mobile market, security of mobile platforms is receiving increasing attention from both research community as well as the public. In this paper, we make the first attempt to establish a baseline for security comparison between the two most popular mobile platforms. We investigate applications that run on both Android and iOS and examine the difference in the usage of their security sensitive APIs (SS-APIs). Our analysis over 2,600 applications shows that iOS applications consistently access more SS-APIs than their counterparts on Android. The additional privileges gained on iOS are often associated with accessing private …


High-Dimensional Data Stream Classification Via Sparse Online Learning, Dayong Wang, Pengcheng Wu, Peilin Zhao, Yue Wu, Chunyan Miao, Steven C. H. Hoi Dec 2014

High-Dimensional Data Stream Classification Via Sparse Online Learning, Dayong Wang, Pengcheng Wu, Peilin Zhao, Yue Wu, Chunyan Miao, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

The amount of data in our society has been exploding in the era of big data today. In this paper, we address several open challenges of big data stream classification, including high volume, high velocity, high dimensionality, and high sparsity. Many existing studies in data mining literature solve data stream classification tasks in a batch learning setting, which suffers from poor efficiency and scalability when dealing with big data. To overcome the limitations, this paper investigates an online learning framework for big data stream classification tasks. Unlike some existing online data stream classification techniques that are often based on first-order …


Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau Dec 2014

Second Order-Response Surface Model For The Automated Parameter Tuning Problem, Aldy Gunawan, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Several automated parameter tuning procedures/configurators have been proposed in order to find the best parameter setting for a target algorithm. These configurators can generally be classified into model-free and model-based approaches. We introduce a recent approach which is based on the hybridization of both approaches. It combines the Design of Experiments (DOE) and Response Surface Methodology (RSM) with prevailing model-free techniques. DOE is mainly used for determining the importance of parameters. A First Order-RSM is initially employed to define the promising region for the important parameters. A Second Order-RSM is then built to approximate the center point as well as …


Midas: Empowering 802.11ac With Multiple-Input Distributed Antenna Systems, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson, Mohammad A. Khojastepour, Sampath Rangarajan Dec 2014

Midas: Empowering 802.11ac With Multiple-Input Distributed Antenna Systems, Jie Xiong, Karthikeyan Sundaresan, Kyle Jamieson, Mohammad A. Khojastepour, Sampath Rangarajan

Research Collection School Of Computing and Information Systems

Next generation WLANs (802.11ac) are undergoing a major shift in their communication paradigm with the introduction of multi-user MIMO (MU-MIMO), transitioning from single-user to multi-user communications. We argue that the conventional AP deployment model of co-located antennas as well as their PHY and MAC mechanisms are not designed to realize the complete potential of MUMIMO. We propose to leverage distributed antenna systems (DAS) to empower next generation 802.11ac networks. We highlight the multitude of benefits that DAS brings to MU-MIMO and 802.11ac in general. However, several challenges arise in the process of realizing these benefits in practice, where avoiding client …


An Empirical Study On The Adequacy Of Testing In Open Source Projects, Pavneet Singh Kochhar, Ferdian Thung, David Lo, Julia Lawall Dec 2014

An Empirical Study On The Adequacy Of Testing In Open Source Projects, Pavneet Singh Kochhar, Ferdian Thung, David Lo, Julia Lawall

Research Collection School Of Computing and Information Systems

During software maintenance, testing is crucial to ensure the quality of code as it evolves. With the increasing size and complexity of software, adequate software testing has become increasingly important. Code coverage is an important metric to gauge the effectiveness of test cases and the adequacy of testing. However, what is the coverage level exhibited by large-scale open-source projects? What is the correlation between software metrics and the code coverage of the software?In this study, we investigate the state-of-the-practice of testing by measuring code coverage in open-source software projects. We examine over300 large open-source projects written in Java, coming from …


Sensor-Free Corner Shape Detection By Wireless Networks, Yuxi Wang, Zimu Zhou, Kaishun Wu Dec 2014

Sensor-Free Corner Shape Detection By Wireless Networks, Yuxi Wang, Zimu Zhou, Kaishun Wu

Research Collection School Of Computing and Information Systems

Due to the rapid growth of the smartphone applications and the fast development of the Wireless Local Area Networks (WLANs), numerous indoor location-based techniques have been proposed during the past several decades. Floorplan, which defines the structure and functionality of a specific indoor environment, becomes a hot topic nowadays. Conventional floorplan techniques leverage smartphone sensors combined with WiFi signals to construct the floorplan of a building. However, existing approaches with sensors cannot detect the shape of a corner, and the sensors cost huge amount of energy during the whole floorplan constructing process. In this paper, we propose a sensor-free approach …


Orchestrating Service Innovation Using Design Moves: The Dynamics Of Fit Between Service And Enterprise It Architectures, Narayan Ramasubbu, Charles Jason Woodard, Sunil Mithas Dec 2014

Orchestrating Service Innovation Using Design Moves: The Dynamics Of Fit Between Service And Enterprise It Architectures, Narayan Ramasubbu, Charles Jason Woodard, Sunil Mithas

Research Collection School Of Computing and Information Systems

Service science perspectives highlight the central role of information technology (IT) in transforming the design and delivery of services. To discern the mechanisms through which IT impacts service innovation, we explore the dynamics of the relationship between enterprise IT and service architectures, and how these dynamics influence the performance of service innovation projects. We conducted six case studies to investigate how firms orchestrated service innovation, focusing on the design of the service architecture and its relationship to enterprise systems. We synthesize the case findings to develop a set of propositions on the antecedents and consequences of fit (or misfit) between …


Platform Pricing With Endogenous Network Effects, Mei Lin, Ruhai Wu, Wen Zhou Dec 2014

Platform Pricing With Endogenous Network Effects, Mei Lin, Ruhai Wu, Wen Zhou

Research Collection School Of Computing and Information Systems

This paper examines a monopoly platform’s two-sided pricing strategy through modeling the trades between the participating sellers and buyers. In this approach, the network effects emerge endogenously through the equilibrium trading strategies of the two sides. We show that platform pricing depends crucially on the characteristics associated with market liquidity, including both sides’ entry costs, the buyers’ preferences, and the distribution of the sellers’ quality. The platform may subsidize sellers if the market is sufficiently liquid, whereas buyer subsidy can be optimal given an illiquid market. We also illustrate the impact of the sellers’ quality heterogeneity on the platform’s optimal …


Towards Intelligent Caring Agents For Aging-In-Place: Issues And Challenges, Di Wang, Budhitama Subagdja, Yilin Kang, Ah-Hwee Tan Dec 2014

Towards Intelligent Caring Agents For Aging-In-Place: Issues And Challenges, Di Wang, Budhitama Subagdja, Yilin Kang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

The aging of the world’s population presents vast societal and individual challenges. The relatively shrinking workforce to support the growing population of the elderly leads to a rapidly increasing amount of technological innovations in the field of elderly care. In this paper, we present an integrated framework consisting of various intelligent agents with their own expertise and responsibilities working in a holistic manner to assist, care, and accompany the elderly around the clock in the home environment. To support the independence of the elderly for Aging-In-Place (AIP), the intelligent agents must well understand the elderly, be fully aware of the …


Anomaly Detection Through Enhanced Sentiment Analysis On Social Media Data, Zhaoxia Wang, Victor Joo, Chuan Tong, Xin Xin, Hoong Chor Chin Dec 2014

Anomaly Detection Through Enhanced Sentiment Analysis On Social Media Data, Zhaoxia Wang, Victor Joo, Chuan Tong, Xin Xin, Hoong Chor Chin

Research Collection School Of Computing and Information Systems

Anomaly detection in sentiment analysis refers to detecting abnormal opinions, sentiment patterns or special temporal aspects of such patterns in a collection of data. The anomalies detected may be due to sudden sentiment changes hidden in large amounts of text. If these anomalies are undetected or poorly managed, the consequences may be severe, e.g. A business whose customers reveal negative sentiments and will no longer support the establishment. Social media platforms, such as Twitter, provide a vast source of information, which includes user feedback, opinion and information on most issues. Many organizations also leverage social media platforms to publish information …


From Cells To Streets: Estimating Mobile Paths With Cellular-Side Data, Qatar Computing Research Institute, University Of Birmingham, Seattle University Of Washington, Haewoon Kwak Dec 2014

From Cells To Streets: Estimating Mobile Paths With Cellular-Side Data, Qatar Computing Research Institute, University Of Birmingham, Seattle University Of Washington, Haewoon Kwak

Research Collection School Of Computing and Information Systems

Through their normal operation, cellular networks are a repository of continuous location information from their subscribed devices. Such information, however, comes at a coarse granularity both in terms of space, as well as time. For otherwise inactive devices, location information can be obtained at the granularity of the associated cellular sector, and at infrequent points in time, that are sensitive to the structure of the network itself, and the level of mobility of the device. In this paper, we are asking the question of whether such sparse information can help to identify the paths followed by mobile connected devices throughout …


Automated Runtime Recovery For Qos-Based Service Composition, Tian Huat Tan, Manman Chen, Étienne André, Jun Sun, Yang Liu, Jin Song Dong Nov 2014

Automated Runtime Recovery For Qos-Based Service Composition, Tian Huat Tan, Manman Chen, Étienne André, Jun Sun, Yang Liu, Jin Song Dong

Research Collection School Of Computing and Information Systems

Service composition uses existing service-based applications as components to achieve a business goal. The composite service operates in a highly dynamic environment; hence, it can fail at any time due to the failure of component services. Service composition languages such as BPEL provide a compensation mechanism to rollback the error. But such a compensation mechanism has several issues. For instance, it cannot guarantee the functional properties of the composite service after compensation. In this work, we propose an automated approach based on a genetic algorithm to calculate the recovery plan that could guarantee the satisfaction of functional properties of the …


Player Acceptance Of Human Computation Games: An Aesthetic Perspective, Xiaohui Wang, Dion Hoe Lian Goh, Ee Peng Lim, Adrian Wei Liang Vu Nov 2014

Player Acceptance Of Human Computation Games: An Aesthetic Perspective, Xiaohui Wang, Dion Hoe Lian Goh, Ee Peng Lim, Adrian Wei Liang Vu

Research Collection School Of Computing and Information Systems

Human computation games (HCGs) are applications that use games to harness human intelligence to perform computations that cannot be effectively done by software systems alone. Despite their increasing popularity, insufficient research has been conducted to examine the predictors of player acceptance for HCGs. In particular, prior work underlined the important role of game enjoyment in predicting acceptance of entertainment technology without specifying its driving factors. This study views game enjoyment through a taxonomy of aesthetic experiences and examines the effect of aesthetic experience, usability and information quality on player acceptance of HCGs. Results showed that aesthetic experience and usability were …


On Joint Modeling Of Topical Communities And Personal Interest In Microblogs, Tuan-Anh Hoang, Ee Peng Lim Nov 2014

On Joint Modeling Of Topical Communities And Personal Interest In Microblogs, Tuan-Anh Hoang, Ee Peng Lim

Research Collection School Of Computing and Information Systems

In this paper, we propose the Topical Communities and Personal Interest (TCPI) model for simultaneously modeling topics, topical communities, and users’ topical interests in microblogging data. TCPI considers different topical communities while differentiating users’ personal topical interests from those of topical communities, and learning the dependence of each user on the affiliated communities to generate content. This makes TCPI different from existing models that either do not consider the existence of multiple topical communities, or do not differentiate between personal and community’s topical interests. Our experiments on two Twitter datasets show that TCPI can effectively mine the representative topics for …


Online Passive Aggressive Active Learning And Its Applications, Jing Lu, Peilin Zhao, Steven C. H. Hoi Nov 2014

Online Passive Aggressive Active Learning And Its Applications, Jing Lu, Peilin Zhao, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

We investigate online active learning techniques for classification tasks in data stream mining applications. Unlike traditional learning approaches (either batch or online learning) that often require to request the class label of each incoming instance, online active learning queries only a subset of informative incoming instances to update the classification model, which aims to maximize classification performance using minimal human labeling effort during the entire online stream data mining task. In this paper, we present a new family of algorithms for online active learning called Passive-Aggressive Active (PAA) learning algorithms by adapting the popular Passive-Aggressive algorithms in an online active …