- Service-Oriented Architecture and Web Services
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Advanced Data Storage Technologies
- Web Data Mining and Analysis
- Complex Network Analysis Techniques
- Cloud Computing and Resource Management
- Recommender Systems and Techniques
- Distributed systems and fault tolerance
- Semantic Web and Ontologies
- Parallel Computing and Optimization Techniques
- Data Management and Algorithms
- Business Process Modeling and Analysis
- Software System Performance and Reliability
- Network Security and Intrusion Detection
- Access Control and Trust
- Advanced Software Engineering Methodologies
- Distributed and Parallel Computing Systems
- Privacy-Preserving Technologies in Data
- Advanced Clustering Algorithms Research
- Complex Systems and Time Series Analysis
- Advanced Database Systems and Queries
- Algorithms and Data Compression
- Data Mining Algorithms and Applications
- Interconnection Networks and Systems
Nanyang Technological University
2021-2024
National University of Singapore
1998-2023
Commonwealth Scientific and Industrial Research Organisation
2013-2022
Data61
2016-2022
Health Sciences and Nutrition
2015-2019
UNSW Sydney
2016-2018
CSIRO Oceans and Atmosphere
2012-2014
Tsinghua University
2004-2013
University of New Brunswick
2011
Chinese Academy of Sciences
2003
NoSQL cloud data stores provide scalability and high availability properties for web applications, but at the same time they sacrifice consistency. However, many applications cannot afford any inconsistency. CloudTPS is a scalable transaction manager which guarantees full ACID multi-item transactions issued by even in presence of server failures network partitions. We implement this approach on top two main families layers: Bigtable SimpleDB. Performance evaluation HBase (an open-source...
Attribute independence has been taken as a major assumption in the limited research that conducted on similarity analysis for categorical data, especially unsupervised learning. However, real-world data sources, attributes are more or less associated with each other terms of certain coupling relationships. Accordingly, recent works attribute dependency aggregation have introduced co-occurrence values to explore coupling, but they only present local picture analyzing similarity. This is...
Wireless Sensor Networks (WSNs) have been widely used as the communication system in Internet of Things (IoT). In addition to services provided by WSNs, many IoT-based applications require reliable data delivery over unstable wireless links. To guarantee delivery, existing works exploit geographic opportunistic routing with multiple candidate forwarders WSNs. However, these approaches suffer from serious Denial Service (DoS) attacks, where a large number invalid are deliberately delivered...
Abstract In recent years, high-throughput experimental techniques have significantly enhanced the accuracy and coverage of protein–protein interaction identification, including human–pathogen interactions (HP-PPIs). Despite this progress, methods are, in general, expensive terms both time labour costs, especially considering that there are enormous amounts potential protein-interacting partners. Developing computational to predict between human bacteria pathogen has thus become critical...
Dynamic resource provisioning aims at maintaining the end-to-end response time of a web application within pre-defined SLA. Although topic has been well studied for monolithic applications, resources applications composed multiple services remains challenge. When SLA is violated, one must decide which service(s) should be reprovisioned optimal effect. We propose to assign an only front-end service. Other are not given any particular objectives. Services autonomously responsible their own...
Collaborative filtering based recommender systems are very successful on dealing with the information overload problem and providing personalized recommendations to users. When more web services published online, this technique can also help recommend select which satisfy users' particular Quality of Service (QoS) requirements preferences. In paper, we propose a novel collaborative service ranking mechanism, in invocation query histories used infer user behavior, similarity is calculated...
Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling. However, recently, researchers have demonstrated that the performance of behavioral biometrics is insufficiently accurate. Furthermore, unique characteristics devices, such as limited storage energy, make it subject constrained capacity data collection processing. In this paper, we propose an implicit architecture based on edge computing, coined Edge...
Since selecting a web service based on Quality of Services (QoS) is essentially Multi-Criteria Decision Making (MCDM) problem, various MCDM models would be suitable for implementing the selection systems. A few approaches have been explored in previous research works. In this paper, we propose to use an enhanced PROMETHEE model QoS-based selection. Many algorithms assume independency between QoS criteria, which not very accurate. Thus, our first enhancement take into account interdependency...
Dynamic Time Warping (DTW) is a widely used distance measurement in time series clustering. DTW invariant to phase perturbations but has quadratic complexity. An effective acceleration method must reduce the utilization ratio during clustering; for example, TADPole uses both upper and lower bounds prune off large of expensive calculations. To further ratio, we find that linear-complexity L1-norm (Manhattan distance) enough when only comprise small perturbations. Therefore, propose novel...
Group behavior interactions, such as multirobot teamwork and group communications in social networks, are widely seen both natural, social, artificial behavior-related applications. Behavior interactions a often associated with varying coupling relationships, for instance, conjunction or disjunction. Such relationships challenge existing representation methods, because they involve multiple behaviors from different actors, constraints on the evolution. In addition, quality of not checked...
In the real-world applications, heterogeneous interdependent attributes that consist of both discrete and numerical variables can be observed ubiquitously. The usual representation these data sets is an information table, assuming independence attributes. However, very often, they are actually on one another, either explicitly or implicitly. Limited research has been conducted in analyzing such attribute interactions, which causes analysis results to more local than global. This paper...
Abstract Entity alignment plays an essential role in the integration of knowledge graphs (KGs) as it seeks to identify entities that refer same real-world objects across different KGs. Recent research has primarily centred on embedding-based approaches. Among these approaches, there is a growing interest graph neural networks (GNNs) due their ability capture complex relationships and incorporate node attributes within Despite presence several surveys this area, they often lack comprehensive...
In copy-move tampering operations, perpetrators often employ techniques, such as blurring, to conceal traces, posing significant challenges the detection of object-level targets with intact structures. Focus on these challenges, this paper proposes an Object-level Copy-Move Forgery Image Detection based Inconsistency Mining (IMNet). To obtain complete targets, we customize prototypes for both source and tampered regions dynamically update them. Additionally, extract inconsistent between...
A key goal of the Semantic Web is to shift social interaction patterns from a producer-centric paradigm consumer-centric one.Treating customers as most valuable assets and making business models work better for them are at core building successful models.It follows that customizing processes constitutes major concern in realm knowledge-pull-based human semantic Web.This paper conceptualizes customization service-based leveraging existing knowledge services processes.We represent this...