Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (171)
- Wright State University (17)
- Old Dominion University (8)
- University of Nebraska at Omaha (6)
- University of Nebraska - Lincoln (5)
-
- Ateneo de Manila University (3)
- Bryant University (3)
- Technological University Dublin (3)
- City University of New York (CUNY) (2)
- Portland State University (2)
- San Jose State University (2)
- University of Kentucky (2)
- Air Force Institute of Technology (1)
- Chapman University (1)
- Children's Mercy Kansas City (1)
- Dordt University (1)
- Edith Cowan University (1)
- Florida International University (1)
- GALILEO, University System of Georgia (1)
- Parkland College (1)
- Southwestern Oklahoma State University (1)
- The University of Maine (1)
- University of New Mexico (1)
- University of Pennsylvania Carey Law School (1)
- University of the Pacific (1)
- Keyword
-
- Personas (5)
- Computer science (4)
- Data mining (4)
- Deep Learning (4)
- Machine Learning (4)
-
- Online learning (4)
- Social media (4)
- Attribute manipulation (3)
- Clustering (3)
- Data models (3)
- Data stream (3)
- Deep learning (3)
- EI tree (3)
- Multimodal fashion retrieval (3)
- Real-world datasets (3)
- Support Vector Machine (3)
- Visualization (3)
- Activity recognition (2)
- Algorithm (2)
- Amazon Mechanical Turk (2)
- Analytical modeling (2)
- Analytical models (2)
- Approximation algorithm (2)
- Artificial intelligence (2)
- Automation (2)
- Big data (2)
- Classification (2)
- Cloud computing (2)
- Competition (2)
- Computational modeling (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (167)
- Kno.e.sis Publications (17)
- Computer Science Faculty Publications (6)
- Information Systems and Quantitative Analysis Faculty Publications (5)
- Conference papers (3)
-
- Department of Information Systems & Computer Science Faculty Publications (3)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Faculty Publications (2)
- MITB Thought Leadership Series (2)
- A with Honors Projects (1)
- All Faculty Scholarship (1)
- Asian Management Insights (1)
- Biology Faculty Publications (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- College of the Pacific Faculty Presentations (1)
- Computer Science and Information Technology Ancillary Materials (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Engineering and Technology Management Student Projects (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Publications, Computer Science (1)
- Faculty Work Comprehensive List (1)
- General University of Maine Publications (1)
- Honors Projects in Information Systems and Analytics (1)
- Honors Theses (1)
- Information Systems and Analytics Department Faculty Conference Proceedings (1)
- Information Systems and Analytics Department Faculty Journal Articles (1)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (1)
- Library Philosophy and Practice (e-journal) (1)
- Manuscripts, Articles, Book Chapters and Other Papers (1)
- Open Educational Resources (1)
Articles 1 - 30 of 237
Full-Text Articles in Physical Sciences and Mathematics
Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht
Open Source Foundations For Spatial Decision Support Systems, Jochen Albrecht
Publications and Research
Spatial Decision Support Systems (SDSS) were a hot topic in the 1990s, when researchers tried to imbue GIS with additional decision support features. Successful practical developments such as HAZUS or CommunityViz have since been built, based on commercial desktop software and without much heed for theory other than what underlies their process models. Others, like UrbanSim, have been completely overhauled twice but without much external scrutiny. Both the practical and the theoretical foundations of decision support systems have developed considerably over the past 20 years. This article presents an overview of these developments and then looks at what corresponding tools …
Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa
Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa
Student Scholar Symposium Abstracts and Posters
An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK …
The Rise Of Real-Time Retail Payments, Zhiling Guo
The Rise Of Real-Time Retail Payments, Zhiling Guo
MITB Thought Leadership Series
TRANSACTING for just about anything using our mobile phones has become commonplace, and so many consumers will be intrigued to discover that after making a purchase it can still take longer for payment to reach a vendor’s bank account than it does for the purchased goods to be delivered.
Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham
Leveraging Artificial Intelligence To Capture The Singapore Rideshare Market, Pradeep Varakantham
MITB Thought Leadership Series
BIKE-SHARING programmes face many of the issues encountered by their counterparts in the carsharing world. But in Singapore, there are a number of factors that have a unique impact on the industry. These include the regulatory structure and the significant fines for those companies who do not abide by these regulations. When this is combined with the competitive nature of the industry in one of the world's most dynamic cities, it becomes clear that first movers who leverage machine learning and prediction will come to dominate the industry
Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel
Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel
Research Collection School Of Computing and Information Systems
As countries turn into Smart Nations, Infocom Technology plays a key role in enhancing their competitiveness through high skilled workforces. Reaching to younger generations and attracting them to computing programs such as Information Systems (IS) and Computer Science (CS) is a key challenge faced by universities. Many high quality students from junior colleges either don’t choose IS programs or choose IS programs as their last option during the application process. A School of Information Systems (SIS) from a large metropolitan university decided to implement an innovative outreach program to attract high quality high school aka Junior College (JC) students. JC …
Utilizing Computational Trust To Identify Rumor Spreaders On Twitter, Bhavtosh Rath, Wei Gao, Jing Ma, Jaideep Srivastava
Utilizing Computational Trust To Identify Rumor Spreaders On Twitter, Bhavtosh Rath, Wei Gao, Jing Ma, Jaideep Srivastava
Research Collection School Of Computing and Information Systems
Ubiquitous use of social media such as microblogging platforms opens unprecedented chances for false information to diffuse online. Facing the challenges in such a so-called “post-fact” era, it is very important for intelligent systems to not only check the veracity of information but also verify the authenticity of the users who spread the information, especially in time-critical situations such as real-world emergencies, where urgent measures have to be taken for stopping the spread of fake information. In this work, we propose a novel machine-learning-based approach for automatic identification of the users who spread rumorous information on Twitter by leveraging computational …
Deep Air Learning: Interpolation, Prediction, And Feature Analysis Of Fine-Grained Air Quality, Zhongang Qi, Tianchun Wang, Guojie Song, Weisong Hu, Xi Li, Zhongfei Mark Zhang
Deep Air Learning: Interpolation, Prediction, And Feature Analysis Of Fine-Grained Air Quality, Zhongang Qi, Tianchun Wang, Guojie Song, Weisong Hu, Xi Li, Zhongfei Mark Zhang
Research Collection School Of Computing and Information Systems
The interpolation, prediction, and feature analysis of fine-gained air quality are three important topics in the area of urban air computing. The solutions to these topics can provide extremely useful information to support air pollution control, and consequently generate great societal and technical impacts. Most of the existing work solves the three problems separately by different models. In this paper, we propose a general and effective approach to solve the three problems in one model called the Deep Air Learning (DAL). The main idea of DAL lies in embedding feature selection and semi-supervised learning in different layers of the deep …
An Essential Applied Statistical Analysis Course Using Rstudio With Project-Based Learning For Data Science, Aldy Gunawan, Michelle L. F. Cheong, Johnson Poh
An Essential Applied Statistical Analysis Course Using Rstudio With Project-Based Learning For Data Science, Aldy Gunawan, Michelle L. F. Cheong, Johnson Poh
Research Collection School Of Computing and Information Systems
This paper presents a newpostgraduate level course, named Applied Statistical Analysis with R. Wepresent the course structure, teaching methodology including the assessmentframework and student feedback. The course covers the basic concepts ofstatistics, the knowledge of applying statistical theory in analyzing real dataand the skill of developing statistical applications with R programminglanguage. The first half of each lesson is dedicated to teaching students thestatistical concepts while the second half focuses on the practical aspects ofimplementing the concepts within the RStudio console. The Project-BasedLearning (PBL) approach is adopted to encourage students to apply the knowledgegained to solve real world problems, answer complex …
Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim
Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
In recent years, the use of digital tools and technologies in educational institutions are continuing to generate large amounts of digital traces of student learning behavior. This study presents a proof-of-concept analytics system that can detect at-risk students along their learning journey. Educators can benefit from the early detection of at-risk students by understanding factors which may lead to failure or drop-out. Further, educators can devise appropriate intervention measures before the students drop out of the course. Our system was built using SAS ® Enterprise Miner (EM) and SAS ® JMP Pro.
Data Mining Approach To The Detection Of Suicide In Social Media: A Case Study Of Singapore, Jane H. K. Seah, Kyong Jin Shim
Data Mining Approach To The Detection Of Suicide In Social Media: A Case Study Of Singapore, Jane H. K. Seah, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
In this research, we focus on the social phenomenon of suicide. Specifically, we perform social sensing on digital traces obtained from Reddit. We analyze the posts and comments in that are related to depression and suicide. We perform natural language processing to better understand different aspects of human life that relate to suicide.
A Simple Proximal Stochastic Gradient Method For Nonsmooth Nonconvex Optimization, Zhize Li, Jian Li
A Simple Proximal Stochastic Gradient Method For Nonsmooth Nonconvex Optimization, Zhize Li, Jian Li
Research Collection School Of Computing and Information Systems
We analyze stochastic gradient algorithms for optimizing nonconvex, nonsmooth finite-sum problems. In particular, the objective function is given by the summation of a differentiable (possibly nonconvex) component, together with a possibly non-differentiable but convex component. We propose a proximal stochastic gradient algorithm based on variance reduction, called ProxSVRG+. Our main contribution lies in the analysis of ProxSVRG+. It recovers several existing convergence results and improves/generalizes them (in terms of the number of stochastic gradient oracle calls and proximal oracle calls). In particular, ProxSVRG+ generalizes the best results given by the SCSG algorithm, recently proposed by [Lei et al., NIPS'17] for …
Active Matting, Xin Yang, Ke Xu, Shaozhe Chen, Shengfeng He, Baocai Yin, Rynson Lau
Active Matting, Xin Yang, Ke Xu, Shaozhe Chen, Shengfeng He, Baocai Yin, Rynson Lau
Research Collection School Of Computing and Information Systems
Image matting is an ill-posed problem. It requires a user input trimap or some strokes to obtain an alpha matte of the foreground object. A fine user input is essential to obtain a good result, which is either time consuming or suitable for experienced users who know where to place the strokes. In this paper, we explore the intrinsic relationship between the user input and the matting algorithm to address the problem of where and when the user should provide the input. Our aim is to discover the most informative sequence of regions for user input in order to produce …
On Learning Psycholinguistics Tools For English-Based Creole Languages Using Social Media Data, Pei-Chi Lo, Ee-Peng Lim
On Learning Psycholinguistics Tools For English-Based Creole Languages Using Social Media Data, Pei-Chi Lo, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
The Linguistic Inquiry and Word Count (LIWC) tool is a psycholinguistics tool that has been widely used in both psychology and sociology research, and the LIWC scores derived from user-generated content are known to be good features for personality prediction [1], [2]. LIWC, however, is language specific as it relies on counting the percentage of predefined dictionary words occurring in the content. For content written in English Creoles which are languages based on English, the original English LIWC may not perform optimally due to its lack of words which are only used in the English Creoles. In this paper, we …
Deep Unsupervised Pixelization, Chu Han, Qiang Wen, Shengfeng He, Qianshu Zhu, Yinjie Tan, Guoqiang Han, Tien-Tsin Wong
Deep Unsupervised Pixelization, Chu Han, Qiang Wen, Shengfeng He, Qianshu Zhu, Yinjie Tan, Guoqiang Han, Tien-Tsin Wong
Research Collection School Of Computing and Information Systems
In this paper, we present a novel unsupervised learning method for pixelization. Due to the difficulty in creating pixel art, preparing the paired training data for supervised learning is impractical. Instead, we propose an unsupervised learning framework to circumvent such difficulty. We leverage the dual nature of the pixelization and depixelization, and model these two tasks in the same network in a bi-directional manner with the input itself as training supervision. These two tasks are modeled as a cascaded network which consists of three stages for different purposes. GridNet transfers the input image into multi-scale grid-structured images with different aliasing …
Towards Mining Comprehensive Android Sandboxes, Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li
Towards Mining Comprehensive Android Sandboxes, Tien-Duy B. Le, Lingfeng Bao, David Lo, Debin Gao, Li Li
Research Collection School Of Computing and Information Systems
Android is the most widely used mobile operating system with billions of users and devices. The popularity of Android apps have enticed malware writers to target them. Recently, Jamrozik et al. proposed an approach, named Boxmate, to mine sandboxes to protect Android users from malicious behaviors. In a nutshell, Boxmate analyzes the execution of an app, and collects a list of sensitive APIs that are invoked by that app in a monitoring phase. Then, it constructs a sandbox that can restrict accesses to sensitive APIs not called by the app. In such a way, malicious behaviors that are not observed …
Better Inpatient Health Quality At Lower Cost: Should I Participate In The Online Healthcare Community First?, Kai Luo, Qiu-Hong Wang, Hock Hai Teo, Xi Chen
Better Inpatient Health Quality At Lower Cost: Should I Participate In The Online Healthcare Community First?, Kai Luo, Qiu-Hong Wang, Hock Hai Teo, Xi Chen
Research Collection School Of Computing and Information Systems
As policy makers across the globe look to health information technology (HIT) as a meansof improving the efficiency of the healthcare systems, it has sparked significant interestin understanding how HIT might help achieve that. While researchers have examined anddocumented the efficiency-improving effect of various institution HITs (e.g., electronicclinic pathways and telemedicine), the impacts of consumer HITs such as onlinehealthcare communities have been generally overlooked. Utilizing two unique datasetsfrom both an online healthcare community and a general hospital, we study the impactof online healthcare community on offline inpatient care efficiency. Through rigorousanalysis, we find that communications between physicians and patients on …
A Cloud-Based Data Gathering And Processing System For Intelligent Demand Forecasting, Colin K. L. Tay, Kyong Jin Shim
A Cloud-Based Data Gathering And Processing System For Intelligent Demand Forecasting, Colin K. L. Tay, Kyong Jin Shim
Research Collection School Of Computing and Information Systems
Demand forecasting has been a challenging problem especially for products with short life cycles such as electronic goods and fashion items. Additionally, in the presence of limited past or historical data as well as the need for fast turnaround for forecast, producing timely and accurate demand forecast can be extremely challenging. In this study, we describe a cloud-based data gathering and processing system for intelligent demand forecasting.
Attention-Based Lstm-Cnns For Uncertainty Identification On Chinese Social Media Texts, Binyang Li, Kaiming Zhou, Wei Gao, Xu Han Han, Linna Zhou
Attention-Based Lstm-Cnns For Uncertainty Identification On Chinese Social Media Texts, Binyang Li, Kaiming Zhou, Wei Gao, Xu Han Han, Linna Zhou
Research Collection School Of Computing and Information Systems
Uncertainty identification is an important semantic processing task, which is crucial to the quality of information in terms of factuality in many techniques, e.g. topic detection, question answering. Especially in social media, the texts are written informally which are widely used in many applications, so the factuality has become a premier concern. However, existing approaches that still rely on lexical cues suffer greatly from the casual or word-of-mouth peculiarity of social media, in which the cue phrases are often expressed in sub-standard form or even omitted from sentences. To tackle these problems, this paper proposes the attention-based LSTM-CNNs for the …
Cross Euclidean-To-Riemannian Metric Learning With Application To Face Recognition From Video, Zhiwu Huang, R. Wang, S. Shan, Gool L Van
Cross Euclidean-To-Riemannian Metric Learning With Application To Face Recognition From Video, Zhiwu Huang, R. Wang, S. Shan, Gool L Van
Research Collection School Of Computing and Information Systems
Riemannian manifolds have been widely employed for video representations in visual classification tasks including video-based face recognition. The success mainly derives from learning a discriminant Riemannian metric which encodes the non-linear geometry of the underlying Riemannian manifolds. In this paper, we propose a novel metric learning framework to learn a distance metric across a Euclidean space and a Riemannian manifold to fuse average appearance and pattern variation of faces within one video. The proposed metric learning framework can handle three typical tasks of video-based face recognition: Video-to-Still, Still-to-Video and Video-to-Video settings. To accomplish this new framework, by exploiting typical Riemannian …
Using Smart Card Data To Model Commuters’ Responses Upon Unexpected Train Delays, Xiancai Tian, Baihua Zheng
Using Smart Card Data To Model Commuters’ Responses Upon Unexpected Train Delays, Xiancai Tian, Baihua Zheng
Research Collection School Of Computing and Information Systems
The mass rapid transit (MRT) network is playing an increasingly important role in Singapore's transit network, thanks to its advantages of higher capacity and faster speed. Unfortunately, due to aging infrastructure, increasing demand, and other reasons like adverse weather condition, commuters in Singapore recently have been facing increasing unexpected train delays (UTDs), which has become a source of frustration for both commuters and operators. Most, if not all, existing works on delay management do not consider commuters' behavior. We dedicate this paper to the study of commuters' behavior during UTDs. We adopt a data-driven approach to analyzing the six-month' real …
Integrating Node Embeddings And Biological Annotations For Genes To Predict Disease-Gene Associations, Sezin Kircali Ata, Le Ou-Yang, Yuan Fang, Chee-Keong Kwoh, Min Wu, Xiao-Li Li
Integrating Node Embeddings And Biological Annotations For Genes To Predict Disease-Gene Associations, Sezin Kircali Ata, Le Ou-Yang, Yuan Fang, Chee-Keong Kwoh, Min Wu, Xiao-Li Li
Research Collection School Of Computing and Information Systems
Background: Predicting disease causative genes (or simply, disease genes) has played critical roles in understandingthe genetic basis of human diseases and further providing disease treatment guidelines. While various computationalmethods have been proposed for disease gene prediction, with the recent increasing availability of biologicalinformation for genes, it is highly motivated to leverage these valuable data sources and extract useful information foraccurately predicting disease genes. Results: We present an integrative framework called N2VKO to predict disease genes. Firstly, we learn the nodeembeddings from protein-protein interaction (PPI) network for genes by adapting the well-known representationlearning method node2vec. Secondly, we combine the learned node …
An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang
An Economic Analysis Of Incentivized Positive Reviews, Jianqing Chen, Zhiling Guo, Jian Huang
Research Collection School Of Computing and Information Systems
It becomes increasingly popular that some large online retailers such as Amazon open their platforms to allow third-party retail competitors to sell on their own platforms. We develop an analytical model to examine this retailer marketplace model and its business impact. We assume that a leading retailer has both valuation advantage that may come from its reputation and information advantage that may come from its brand awareness. We find that the availability of relatively low-cost advertising through social media or search engine can effectively reduce the leading retailer's information advantage, and thus be an important driving force for its strategic …
Personalized Microblog Sentiment Classification Via Adversarial Cross-Lingual Learning, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang
Personalized Microblog Sentiment Classification Via Adversarial Cross-Lingual Learning, Weichao Wang, Shi Feng, Wei Gao, Daling Wang, Yifei Zhang
Research Collection School Of Computing and Information Systems
Sentiment expression in microblog posts can be affected by user’s personal character, opinion bias, political stance and so on. Most of existing personalized microblog sentiment classification methods suffer from the insufficiency of discriminative tweets for personalization learning. We observed that microblog users have consistent individuality and opinion bias in different languages. Based on this observation, in this paper we propose a novel user-attention-based Convolutional Neural Network (CNN) model with adversarial cross-lingual learning framework. The user attention mechanism is leveraged in CNN model to capture user’s language-specific individuality from the posts. Then the attention-based CNN model is incorporated into a novel …
Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al
Cross-Border Interbank Payments And Settlements: Emerging Opportunities For Digital Transformation, Yi Meng Lau, Et Al
Research Collection School Of Computing and Information Systems
The report “Cross-Border Interbank Payments and Settlements” is a cross-jurisdictional industry collaboration between Canada, Singapore and the United Kingdom to examine the existing challenges and frictions that arise when undertaking crossborder payments. This report explores proposals for new and more efficient models for processing cross-border transactions.
Double Learning Or Double Blinding: An Investigation Of Vendor Private Information Acquisition And Consumer Learning Via Online Reviews, Nan Hu, Kevin E. Dow, Alain Yee Loong Chong, Ling Liu
Double Learning Or Double Blinding: An Investigation Of Vendor Private Information Acquisition And Consumer Learning Via Online Reviews, Nan Hu, Kevin E. Dow, Alain Yee Loong Chong, Ling Liu
Research Collection School Of Computing and Information Systems
In this paper, building upon information acquisition theory and using portfolio methods and system equations, we made an empirical investigation into how online vendors and consumers are learning from each other, and how online reviews, prices, and sales interact among each other. First, this study shows that vendors acquire information from both private and public channels to learn the quality of their products to make price adjustment. Second, for the more popular products and newly released products, vendors are more motivated to acquire private information that is more precise than the average precision to adjust their price. Third, we document …
Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng
Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-Keyword Search Over Encrypted Cloud Data, Zhiguo Wan, Robert H. Deng
Research Collection School Of Computing and Information Systems
Although cloud computing offers elastic computation and storage resources, it poses challenges on verifiability of computations and data privacy. In this work we investigate verifiability for privacy-preserving multi-keyword search over outsourced documents. As the cloud server may return incorrect results due to system faults or incentive to reduce computation cost, it is critical to offer verifiability of search results and privacy protection for outsourced data at the same time. To fulfill these requirements, we design aVerifiablePrivacy-preserving keywordSearch scheme, called VPSearch, by integrating an adapted homomorphic MAC technique with a privacy-preserving multi-keyword search scheme. The proposed scheme enables the client to …
Latent Dirichlet Allocation For Textual Student Feedback Analysis, Swapna Gottipati, Venky Shankararaman, Jeff Lin
Latent Dirichlet Allocation For Textual Student Feedback Analysis, Swapna Gottipati, Venky Shankararaman, Jeff Lin
Research Collection School Of Computing and Information Systems
Education institutions collect feedback from students upon course completion and analyse it to improve curriculum design, delivery methodology and students' learning experience. A large part of feedback comes in the form textual comments, which pose a challenge in quantifying and deriving insights. In this paper, we present a novel approach of the Latent Dirichlet Allocation (LDA) model to address this difficulty in handling textual student feedback. The analysis of quantitative part of student feedback provides generalratings and helps to identify aspects of the teaching that are successful and those that can improve. The reasons for the failure or success, however, …
Heterogeneous Embedding Propagation For Large-Scale E-Commerce User Alignment, Vincent W. Zheng, Mo Sha, Yuchen Li, Hongxia Yang, Yuan Fang, Zhenjie Zhang, Kian-Lee Tan, Kevin Chen-Chuan Chang
Heterogeneous Embedding Propagation For Large-Scale E-Commerce User Alignment, Vincent W. Zheng, Mo Sha, Yuchen Li, Hongxia Yang, Yuan Fang, Zhenjie Zhang, Kian-Lee Tan, Kevin Chen-Chuan Chang
Research Collection School Of Computing and Information Systems
We study the important problem of user alignment in e-commerce: to predict whether two online user identities that access an e-commerce site from different devices belong to one real-world person. As input, we have a set of user activity logs from Taobao and some labeled user identity linkages. User activity logs can be modeled using a heterogeneous interaction graph (HIG), and subsequently the user alignment task can be formulated as a semi-supervised HIG embedding problem. HIG embedding is challenging for two reasons: its heterogeneous nature and the presence of edge features. To address the challenges, we propose a novel Heterogeneous …
Linky: Visualizing User Identity Linkage Results For Multiple Online Social Networks (Demo), Roy Ka-Wei Lee, Ming Shan Hee, Philips Kokoh Prasetyo, Ee-Peng Lim
Linky: Visualizing User Identity Linkage Results For Multiple Online Social Networks (Demo), Roy Ka-Wei Lee, Ming Shan Hee, Philips Kokoh Prasetyo, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
User identity linkage across online social networks is an emerging research topic that has attracted attention in recent years. Many user identity linkage methods have been proposed so far and most of them utilize user profile, content and network information to determine if two social media accounts belong to the same person. In most cases, user identity linkage methods are evaluated by performing some prediction tasks with the results presented using some overall accuracy measures. However, the methods are rarely compared at the individual user level where a predicted matched (or linked) pair of user identities from different online social …
Is There Space For Violence?: A Data-Driven Approach To The Exploration Of Spatial-Temporal Dimensions Of Conflict, Tin Seong Kam, Vincent Zhi
Is There Space For Violence?: A Data-Driven Approach To The Exploration Of Spatial-Temporal Dimensions Of Conflict, Tin Seong Kam, Vincent Zhi
Research Collection School Of Computing and Information Systems
With recent increases in incidences of political violence globally, the world has now become more uncertain and less predictable. Of particular concern is the case of violence against civilians, who are often caught in the crossfire between armed state or non-state actors. Classical methods of studying political violence and international relations need to be updated. Adopting the use of data analytic tools and techniques of studying big data would enable academics and policy makers to make sense of a rapidly changing world.