Enabling Generative, Emergent Artificial Culture, 2013 Singapore Management University
Enabling Generative, Emergent Artificial Culture, Jaroslaw Kochanowicz, Ah-Hwee Tan, Daniel Thalmann
Research Collection School Of Computing and Information Systems
Despite the demand for culturally placed agent models, an adequate simulation approach to the relationship between group-cultural and individual-psychological qualities, including culture emergence, is just appearing. It could be argued that we are at the beginning of a domain forming process, a dawn of generative, emergent artificial culture. In this context we discuss current limitations and argue e.g. that too far reaching agent simplicity within Agent Based Modeling limits the emergence of realistic cultural-conventional level and we advocate psychologically rich models of culture forming mechanisms. We propose an approach to cultural phenomena modeling based on the interaction of habitual, affective …
The Chain-Link Fence Model: A Framework For Creating Security Procedures, 2013 Utah State University
The Chain-Link Fence Model: A Framework For Creating Security Procedures, Robert F. Houghton
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Information technology security professionals are facing an ever growing threat to the networks that they defend. The process for creating procedures to help stem this threat is very difficult for security professionals. The Chain-Link Fence Model helps security professionals by guiding them through the process of creating and implementing new security procedures.
On Mobile Detection And Localization Of Skewed Nutrition Facts Tables, 2013 Utah State University
On Mobile Detection And Localization Of Skewed Nutrition Facts Tables, Christopher Blay
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The Computer Science Assistive Technology Laboratory (CSATL) at Utah State University has a long history of research in visually impaired grocery shopping tech. CSATL’s ShopMobile II introduced nutrition facts table (NFT) analysis but only with perfectly aligned and square input images.
A new method which detects and localizes NFTs more quickly and from rotated or non-square images has been released and is slated for integration with ShopMobile II to improve this feature substantially. This is great news for the estimated 3.6 million adults in the United States having visual impairment or blindness and also opens the doors to other applications …
Automated Check-In And Scheduling System For A Web-Based Testing Application, 2013 Utah State University
Automated Check-In And Scheduling System For A Web-Based Testing Application, Ashwin V. Kumar
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
Ideally, a testing center and associated software should be an effective tool for learning assessment. It should serve as a link between faculty members who create tests and their students who are assessed by those tests. Testing centers are generally limited in the number of computer systems available as compared to the number of students taking tests. Automated testing plays an important role in such situations. Automated testing outside the classroom offers students the flexibility of choosing a preferred time for taking tests. A completely automated system also contributes in reducing a portion of the workload by automatically grading some …
Data Near Here: Bringing Relevant Data Closer To Scientists, 2013 Portland State University
Data Near Here: Bringing Relevant Data Closer To Scientists, Veronika M. Megler, David Maier
Computer Science Faculty Publications and Presentations
Large scientific repositories run the risk of losing value as their holdings expand, if it means increased effort for a scientist to locate particular datasets of interest. We discuss the challenges that scientists face in locating relevant data, and present our work in applying Information Retrieval techniques to dataset search, as embodied in the Data Near Here application.
Roulette Wheel Selection Game Player, 2013 Macalester College
Roulette Wheel Selection Game Player, Scott Tong
Mathematics, Statistics, and Computer Science Honors Projects
General Game Playing is a field of artificial intelligence that seeks to create programs capable of playing any game at an expert-level without the need for human aid. There are two major approaches to general game playing: simulation and heuristic. I focused on the move selection component of a common simulation strategy called Monte Carlo Tree Search. Traditionally, the selection step of Monte Carlo Tree Search uses an algorithm called Upper Confidence Bound Applied to Trees or UCT. In place of this algorithm, I investigated the applicability of a random roulette wheel style of selection. I studied the effectiveness of …
The Effects Of Abstraction On Best Nblock First Search, 2013 Utah State University
The Effects Of Abstraction On Best Nblock First Search, Justin R. Redd
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
Search is an important aspect of Artificial Intelligence. Efficiently searching for solutions to large problems is important. One way to scale search large in problems quickly is to divide the work between multiple processors. There are many ways to divide this work using abstractions. This thesis examines the previous way this has been done in the past and introduces other ways to more efficiently divide the work and search in parallel.
Integrating A Lighting System With Objective Light Movement, 2013 Clemson University
Integrating A Lighting System With Objective Light Movement, Kiel Pease
All Theses
When applying a light design within computer graphics software, there is no clear-cut way to achieve accurate and noticeable light movement without rigorous work animating the lighting tools by hand. This task can be arduous and involve constant test renders throughout a single frame range. This project strives to explain the production of a short animated feature, by incorporating a video-based lighting system, which is intended to assist with scenes that require objective light movement. The video-based lighting method will strive to minimize (not eliminate) the need to animate by hand light motion from environment lighting. Since lighting design is …
Conceptualizing Financial Loses As A Result Of Advanced Persistent Threats, 2013 Honors College, Pace University
Conceptualizing Financial Loses As A Result Of Advanced Persistent Threats, Christopher Levine
Honors College Theses
Advanced Persistent Threat (APT) attacks are the biggest threat in the computing world. Currently, there is ample information available on how these attacks occur and who supports these attacks. However, there is dearth of information available that adequately describes the potentiality for financial losses. These losses are a direct result of the attacks themselves, however these attacks could only operate with the support of well-funded groups, such as nation states. Therefore, it is important to understand this relationship to conceptualize how these losses occur. In exploring the results of both Operation Aurora and Stuxnet, two famous APT attacks, it is …
Why Individuals Seek Diverse Opinions (Or Why They Don't), 2013 Singapore Management University
Why Individuals Seek Diverse Opinions (Or Why They Don't), Jisun An, Daniele Quercia, Jon Crowcroft
Research Collection School Of Computing and Information Systems
Fact checking has been hard enough to do in traditional settings, but, as news consumption is moving on the Internet and sources multiply, it is almost unmanageable. To solve this problem, researchers have created applications that expose people to diverse opinions and, as a result, expose them to balanced information. The wisdom of this solution is, however, placed in doubt by this paper. Survey responses of 60 individuals in the UK and South Korea and in-depth structured interviews of 10 respondents suggest that exposure to diverse opinions would not always work. That is partly because not all individuals equally value …
Behind The Magical Numbers: Hierarchical Chunking And The Human Working Memory Capacity, 2013 Singapore Management University
Behind The Magical Numbers: Hierarchical Chunking And The Human Working Memory Capacity, Guoqi Li, Ning Ning, Kiruthika Ramanathan, Wei He, Li Pan, Luping Shi
Research Collection School Of Computing and Information Systems
To explore the influence of chunking on the capacity limits of working memory, a model for chunking in sequential working memory is proposed, using hierarchical bidirectional inhibition-connected neural networks with winnerless competition. With the assumption of the existence of an upper bound to the inhibitory weights in neurobiological networks, it is shown that chunking increases the number of memorized items in working memory from the "magical number 7" to 16 items. The optimal number of chunks and the number of the memorized items in each chunk are the "magical number 4".
Leakage Resilient Authenticated Key Exchange Secure In The Auxiliary Input Model, 2013 Singapore Management University
Leakage Resilient Authenticated Key Exchange Secure In The Auxiliary Input Model, Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong
Research Collection School Of Computing and Information Systems
Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resilient AKE in the auxiliary input model. A promising way to construct such a protocol is to use a digital signature scheme that is entropically-unforgeable under chosen message and auxiliary input attacks. However, to date we are not aware of any …
Tower Of Babel: A Crowdsourcing Game Building Sentiment Lexicons For Resource-Scarce Languages, 2013 Singapore Management University
Tower Of Babel: A Crowdsourcing Game Building Sentiment Lexicons For Resource-Scarce Languages, Yoonsung Hong, Haewoon Kwak, Youngmin Baek, Sue. Moon
Research Collection School Of Computing and Information Systems
With the growing amount of textual data produced by online social media today, the demands for sentiment analysis are also rapidly increasing; and, this is true for worldwide. However, non-English languages often lack sentiment lexicons, a core resource in performing sentiment analysis. Our solution, Tower of Babel (ToB), is a language-independent sentiment-lexicon-generating crowdsourcing game. We conducted an experiment with 135 participants to explore the difference between our solution and a conventional manual annotation method. We evaluated ToB in terms of effectiveness, efficiency, and satisfactions. Based on the result of the evaluation, we conclude that sentiment classification via ToB is accurate, …
Disclosing Climate Change Patterns Using An Adaptive Markov Chain Pattern Detection Method, 2013 Singapore Management University
Disclosing Climate Change Patterns Using An Adaptive Markov Chain Pattern Detection Method, Zhaoxia Wang, Gary Lee, Hoong Maeng Chan, Reuben Li, Xiuju Fu, Rick Goh, Pauline A. W. Poh Kim, Martin L. Hibberd, Hoong Chor Chin
Research Collection School Of Computing and Information Systems
This paper proposes an adaptive Markov chain pattern detection (AMCPD) method for disclosing the climate change patterns of Singapore through meteorological data mining. Meteorological variables, including daily mean temperature, mean dew point temperature, mean visibility, mean wind speed, maximum sustained wind speed, maximum temperature and minimum temperature are simultaneously considered for identifying climate change patterns in this study. The results depict various weather patterns from 1962 to 2011 in Singapore, based on the records of the Changi Meteorological Station. Different scenarios with varied cluster thresholds are employed for testing the sensitivity of the proposed method. The robustness of the proposed …
Dynamic Synthesis Of Local Time Requirement For Service Composition, 2013 Singapore Management University
Dynamic Synthesis Of Local Time Requirement For Service Composition, Tian Huat Tan, Étienne André, Jun Sun, Yang Liu, Jin Song Dong, Manman Chen
Research Collection School Of Computing and Information Systems
Service composition makes use of existing servicebased applications as components to achieve a business goal. In time critical business environments, the response time of a service is crucial, which is also reflected as a clause in service level agreements (SLAs) between service providers and service users. To allow the composite service to fulfill the response time requirement as promised, it is important to find a feasible set of component services, such that their response time could collectively allow the satisfaction of the response time of the composite service. In this work, we propose a fully automated approach to synthesize the …
Impact Of Multimedia In Sina Weibo: Popularity And Life Span, 2013 Singapore Management University
Impact Of Multimedia In Sina Weibo: Popularity And Life Span, Xun Zhao, Feida Zhu, Weining Qian, Aoying Zhou
Research Collection School Of Computing and Information Systems
Multimedia contents such as images and videos are widely used in social network sites nowadays. Sina Weibo, a Chinese microblogging service, is one of the first microblog platforms to incorporate multimedia content sharing features. This work provides statistical analysis on how multimedia contents are produced, consumed, and propagated in Sina Weibo. Based on 230 million tweets and 1.8 million user profiles in Sina Weibo, we study the impact of multimedia contents on the popularity of both users and tweets as well as tweet life span. Our preliminary study shows that multimedia tweets dominant pure text ones in Sina Weibo. Multimedia …
Personal Informatics In Chronic Illness Management, 2013 Singapore Management University
Personal Informatics In Chronic Illness Management, Haley Macleod, Anthony Tang, Sheelagh Carpendale
Research Collection School Of Computing and Information Systems
Many people with chronic illness suffer from debilitating symptoms or episodes that inhibit normal day-to-day function. Pervasive tools offer the possibility to help manage these conditions, particularly by helping people understand their conditions. But, it is unclear how to design these tools, as prior designs have focused on effortful tracking and many see those tools as a burden to use. We report here on an interview study with 12 individuals with chronic illnesses who collect personal data. We learn that these people are motivated through self-discovery and curiosity. We explore how these concepts may support the design of tools that …
Vehicle Localization Along A Previously Driven Route Using An Image Database, 2013 Singapore Management University
Vehicle Localization Along A Previously Driven Route Using An Image Database, Hideyuki Kume, Arne Suppe, Arne Suppe
Research Collection School Of Computing and Information Systems
In most autonomous driving applications, such as parking and commuting, a vehicle follows a previously taken route, or almost the same route. In this paper, we propose a method to localize a vehicle along a previously driven route using images. The proposed method consists of two stages: offline creation of a database, and online localization. In the offline stage, a database is created from images that are captured when the vehicle drives a route for the first time. The database consists of images, 3D positions of feature points estimated by structure-from-motion, and a topological graph. In the online stage, the …
R-Energy For Evaluating Robustness Of Dynamic Networks, 2013 Singapore Management University
R-Energy For Evaluating Robustness Of Dynamic Networks, Ming Gao, Ee Peng Lim, David Lo
Research Collection School Of Computing and Information Systems
The robustness of a network is determined by how well its vertices are connected to one another so as to keep the network strong and sustainable. As the network evolves its robustness changes and may reveal events as well as periodic trend patterns that affect the interactions among users in the network. In this paper, we develop R-energy as a new measure of network robustness based on the spectral analysis of normalized Laplacian matrix. R-energy can cope with disconnected networks, and is efficient to compute with a time complexity of O (jV j + jEj) where V and E are …
Tesla: An Energy-Saving Agent That Leverages Schedule Flexibility, 2013 University of Southern California
Tesla: An Energy-Saving Agent That Leverages Schedule Flexibility, Jun Young Kwak, Pradeep Varakantham, Rajiv Maheswaran, Burcin Becerik-Gerber, Milind Tambe
Research Collection School Of Computing and Information Systems
This innovative application paper presents TESLA, an agent-based application for optimizing the energy use in commercial buildings. TESLA’s key insight is that adding flexibility to event/meeting schedules can lead to significant energy savings. TESLA provides three key contributions: (i) three online scheduling algorithms that consider flexibility of people’s preferences for energyefficient scheduling of incrementally/dynamically arriving meetings and events; (ii) an algorithm to effectively identify key meetings that lead to significant energy savings by adjusting their flexibility; and (iii) surveys of real users that indicate that TESLA’s assumptions exist in practice. TESLA was evaluated on data of over 110,000 meetings held …