A Taxonomy-Based Model For Expertise Extrapolation,
2010
Wright State University - Main Campus
A Taxonomy-Based Model For Expertise Extrapolation, Delroy H. Cameron, Boanerges Aleman-Meza, Ismailcem Budak Arpinar, Sheron L. Decker, Amit P. Sheth
Kno.e.sis Publications
While many ExpertFinder applications succeed in finding experts, their techniques are not always designed to capture the various levels at which expertise can be expressed. Indeed, expertise can be inferred from relationships between topics and subtopics in a taxonomy. The conventional wisdom is that expertise in subtopics is also indicative of expertise in higher level topics as well. The enrichment of Expertise Profiles for finding experts can therefore be facilitated by taking domain hierarchies into account. We present a novel semantics-based model for finding experts, expertise levels and collaboration levels in a peer review context, such as composing a Program …
Ranking Documents Semantically Using Ontological Relationships,
2010
Wright State University - Main Campus
Ranking Documents Semantically Using Ontological Relationships, Boanerges Aleman-Meza, I. Budak Arpinar, Mustafa V. Nural, Amit P. Sheth
Kno.e.sis Publications
Although arguable success of today’s keyword based search engines in certain information retrieval tasks, ranking search results in a meaningful way remains an open problem. In this work, the goal is to use of semantic relationships for ranking documents without relying on the existence of any specific structure in a document or links between documents. Instead, real-world entities are identified and the relevance of documents is determined using relationships that are known to exist between the entities in a populated ontology. We introduce a measure of relevance that is based on traversal and the semantics of relationships that link entities …
Context-Aware Query Recommendations,
2010
Singapore Management University
Context-Aware Query Recommendations, Alexandros Ntoulas, Heasoo Hwang, Lise Getoor, Stelios Paparizos, Hady Wirawan Lauw
Research Collection School Of Computing and Information Systems
Described is a search-related technology in which context information regarding a user's prior search actions is used in making query recommendations for a current user action, such as a query or click. To determine whether each set or subset of context information is relevant to the user action, data obtained from a query log is evaluated. More particularly, a query transition (query-query) graph and a query click (query-URL) graph are extracted from the query log; vectors are computed for the current action and each context/sub-context and evaluated against vectors in the graphs to determine current action-to-context similarity. Also described is …
Investigating Ultrasonic Positioning On Mobile Phones,
2010
Technological University Dublin
Investigating Ultrasonic Positioning On Mobile Phones, Viacheslav Filonenko, Charlie Cullen, James Carswell
Conference papers
In this paper we evaluate the innate ability of mobile phone speakers to produce ultrasound and the possible uses of this ability for accurate indoor positioning. The frequencies in question are a range between 20 and 22 KHz, which is high enough to be inaudible but low enough to be generated by standard sound hardware. A range of tones is generated at different volume settings on several popular modern mobile phones with the aim of finding points of failure. Our results indicate that it is possible to generate the given range of frequencies without significant distortions, provided the signal volume …
P2pdoctagger: Content Management Through Automated P2p Collaborative Tagging,
2010
Nanyang Technological University
P2pdoctagger: Content Management Through Automated P2p Collaborative Tagging, Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search, document organization and (collaborative) document tagging have been proposed to address this, however they are either inappropriate or inefficient. Automated collaborative document tagging approaches mitigate the problems of manual tagging, but they are usually based on centralized settings which are plagued by problems such as scalability, privacy, etc. To resolve these issues, we present P2PDocTagger, an automated and distributed document tagging system based on classification in P2P networks. P2P-DocTagger minimizes the efforts of individual peers and …
Embellishing Text Search Queries To Protect User Privacy,
2010
Singapore Management University
Embellishing Text Search Queries To Protect User Privacy, Hwee Hwa Pang, Xuhua Ding, Xiaokui Xiao
Research Collection School Of Computing and Information Systems
Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable for a search engine to perform document retrieval for users while protecting their intent. In this paper, we identify the privacy risks arising from semantically related search terms within a query, and from recurring highspecificity query terms in a search session. To counter the risks, we propose a solution for a similarity text retrieval system to offer anonymity and plausible deniability for the query terms, and hence the user intent, without degrading the system’s precision-recall …
Shortest Path Computation On Air Indexes,
2010
Singapore Management University
Shortest Path Computation On Air Indexes, Georgios Kellaris, Kyriakos Mouratidis
Research Collection School Of Computing and Information Systems
Shortest path computation is one of the most common queries in location-based services that involve transportation net- works. Motivated by scalability challenges faced in the mo- bile network industry, we propose adopting the wireless broad- cast model for such location-dependent applications. In this model the data are continuously transmitted on the air, while clients listen to the broadcast and process their queries locally. Although spatial problems have been considered in this environment, there exists no study on shortest path queries in road networks. We develop the rst framework to compute shortest paths on the air, and demonstrate the practicality and …
Diract: Agent-Based Interactive Storytelling,
2010
Singapore Management University
Diract: Agent-Based Interactive Storytelling, Yundong Cai, Zhiqi Shen, Chunyan Miao, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
A lot of researches haven been done on the interactive storytelling authoring , e.g. by a director agent, or by interactions among a number of character agents. However, it is still difficult to construct the interactive storytelling for novice users, due to a need of various agents development and complex communication among the agents. We propose an agent-based interactive storytelling architecture, namely DIRACT (short of “Direct and Act”). It is composed of numerous atomic DIRACT agents, which are goal oriented and use an unified communication protocol. By removing the difference between the director and character, each DIRACT agent can either …
3dq: Threat Dome Visibility Querying On Mobile Devices,
2010
Technological University Dublin
3dq: Threat Dome Visibility Querying On Mobile Devices, James Carswell, Keith Gardiner, Junjun Yin
Articles
3DQ (Three Dimensional Query) is our mobile spatial interaction (MSI) prototype for location and orientation aware mobile devices (i.e. today's sensor enabled smartphones). The prototype tailors a military style threat dome query calculation using MSI with hidden query removal functionality for reducing “information overload” on these off-the-shelf devices. The effect gives a more accurate and expected query result for Location-Based Services (LBS) applications by returning information on only those objects visible within a user’s 3D field-of-view. Our standardised XML based request/response design enables any mobile device, regardless of operating system and/or programming language, to access the 3DQ web-service interfaces.
Virtualisation: A Case Study In Database Administration Laboratory Work,
2010
Bond University
Virtualisation: A Case Study In Database Administration Laboratory Work, Greg Cranitch, Michael J. Rees
Greg Cranitch
This paper discusses the issues involved in using virtual machines to teach database administration concepts and the associated issues in a university student environment. Previous work on using virtual machines in system/network administration university labs is reviewed as well as the use of virtual machines in a database development environment. A virtual machine project for a Virtual Information Technology Teaching Laboratory (VITTL) using central servers offering a potential solution is described. This solution provides a secure environment with each student isolated from others with their own virtual machines.
Penetration Testing And Vulnerability Assessments: A Professional Approach,
2010
University of Glamorgan
Penetration Testing And Vulnerability Assessments: A Professional Approach, Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt, Andrew J C Blyth
International Cyber Resilience conference
Attacks against computer systems and the data contained within these systems are becoming increasingly frequent and evermore sophisticated. So-called “zero-day” exploits can be purchased on black markets and Advanced Persistent Threats (APTs) can lead to exfiltration of data over extended periods. Organisations wishing to ensure security of their systems may look towards adopting appropriate measures to protect themselves against potential security breaches. One such measure is to hire the services of penetration testers (or “pen-tester”) to find vulnerabilities present in the organisation’s network, and provide recommendations as to how best to mitigate such risks. This paper discusses the definition and …
Expert System For Online Diagnosis Of Red-Eye Diseases,
2010
Gomal University, Dera Ismail Khan
Expert System For Online Diagnosis Of Red-Eye Diseases, Dr. Muhammad Zubair Asghar, Muhammad Junaid Asghar
Dr. Muhammad Zubair Asghar
This paper describes Expert System (ES) for online diagnosis and prescription of red-eye diseases. The types of eye diseases that can be diagnosed with this system are called Red-eye diseases i.e. disease in which red-eye is the common symptom. It is rule based web-supported expert system, assisting ophthalmologists, medical students doing specialization in ophthalmology, researchers as well as eye patients having computer know-how. System was designed and programmed with Java Technology. The expert rules were developed on the symptoms of each type of Red-eye disease, and they were presented using tree-graph and inferred using forward-chaining with depth-first search method. User …
A Comparative Study Of Threshold-Based Feature Selection Techniques,
2010
Western Kentucky University
A Comparative Study Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Jason Van Hulse
Dr. Huanjing Wang
Abstract Given high-dimensional software measurement data, researchers and practitioners often use feature (metric) selection techniques to improve the performance of software quality classification models. This paper presents our newly proposed threshold-based feature selection techniques, comparing the performance of these techniques by building classification models using five commonly used classifiers. In order to evaluate the effectiveness of different feature selection techniques, the models are evaluated using eight different performance metrics separately since a given performance metric usually captures only one aspect of the classification performance. All experiments are conducted on three Eclipse data sets with different levels of class imbalance. The …
A Comparative Study Of Filter-Based Feature Ranking Techniques,
2010
Western Kentucky University
A Comparative Study Of Filter-Based Feature Ranking Techniques, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao
Dr. Huanjing Wang
One factor that affects the success of machine learning is the presence of irrelevant or redundant information in the training data set. Filter-based feature ranking techniques (rankers) rank the features according to their relevance to the target attribute and we choose the most relevant features to build classification models subsequently. In order to evaluate the effectiveness of different feature ranking techniques, a commonly used method is to assess the classification performance of models built with the respective selected feature subsets in terms of a given performance metric (e.g., classification accuracy or misclassification rate). Since a given performance metric usually can …
Cross-Market Model Adaptation With Pairwise Preference Data For Web Search Ranking,
2010
Wright State University - Main Campus
Cross-Market Model Adaptation With Pairwise Preference Data For Web Search Ranking, Jing Bai, Fernando Diaz, Yi Chang, Zhaohui Zheng, Keke Chen
Kno.e.sis Publications
Machine-learned ranking techniques automatically learn a complex document ranking function given training data. These techniques have demonstrated the effectiveness and flexibility required of a commercial web search. However, manually labeled training data (with multiple absolute grades) has become the bottleneck for training a quality ranking function, particularly for a new domain. In this paper, we explore the adaptation of machine-learned ranking models across a set of geographically diverse markets with the market-specific pairwise preference data, which can be easily obtained from clickthrough logs. We propose a novel adaptation algorithm, Pairwise-Trada, which is able to adapt ranking models that are trained …
Pattern Space Maintenance For Data Updates And Interactive Mining,
2010
Wright State University - Main Campus
Pattern Space Maintenance For Data Updates And Interactive Mining, Mengling Feng, Guozhu Dong, Jinyan Li, Yap-Peng Tan, Limsoon Wong
Kno.e.sis Publications
This article addresses the incremental and decremental maintenance of the frequent pattern space. We conduct an in-depth investigation on how the frequent pattern space evolves under both incremental and decremental updates. Based on the evolution analysis, a new data structure, Generator-Enumeration Tree (GE-tree), is developed to facilitate the maintenance of the frequent pattern space. With the concept of GE-tree, we propose two novel algorithms, Pattern Space Maintainer+ (PSM+) and Pattern Space Maintainer− (PSM−), for the incremental and decremental maintenance of frequent patterns. Experimental results demonstrate that the proposed algorithms, on average, outperform the representative state-of-the-art …
Cloud Storage And Online Bin Packing,
2010
University of Nevada, Las Vegas
Cloud Storage And Online Bin Packing, Swathi Venigella
UNLV Theses, Dissertations, Professional Papers, and Capstones
Cloud storage is the service provided by some corporations (such as Mozy and Carbonite) to store and backup computer files. We study the problem of allocating memory of servers in a data center based on online requests for storage. Over-the-net data backup has become increasingly easy and cheap due to cloud storage. Given an online sequence of storage requests and a cost associated with serving the request by allocating space on a certain server one seeks to select the minimum number of servers as to minimize total cost. We use two different algorithms and propose a third algorithm; we show …
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis,
2010
University of Dayton
Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn
MIS/OM/DS Faculty Publications
Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …
A Design Science Based Evaluation Framework For Patterns,
2010
University of Nebraska at Omaha
A Design Science Based Evaluation Framework For Patterns, Stacie Clarke Petter, Deepak Khazanchi, John D. Murphy
Information Systems and Quantitative Analysis Faculty Publications
Patterns were originally developed in the field of architecture as a mechanism for communicating good solutions to recurring classes of problems. Since then, many researchers and practitioners have created patterns to describe effective solutions to problems associated with disparate areas such as virtual project management, human-computer interaction, software development and engineering, and design science research. We believe that the development of patterns is a design science activity in which an artifact (i.e., a pattern) is created to communicate about and improve upon the current state-of-practice. Design science research has two critical components, creation and evaluation of an artifact. While many …
Investigating Capabilities Associated With Ict Access And Use In Latino Micro-Enterprises,
2010
University of Nebraska at Omaha
Investigating Capabilities Associated With Ict Access And Use In Latino Micro-Enterprises, Travis Good, Luis Flores Morales, Sajda Qureshi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
While the process by which Information Technology enables growth in medium and large enterprises has been wellresearched, the corresponding processes in micro-enterprises are poorly understood. In fact, such micro-enterprises lie at the heart of many economies. This insight is important as information technology enables businesses to connect with each other through knowledge networking to carry out their basic business operations. There is thus a need to build our understanding of how micro-enterprises access and use technology in order to be able to assess the benefits they derive from ICT adoption. Following an analysis of two case studies of Latino micro-enterprises …