DEPT OF COMPUTER SCIENCE
Researcher
: Bo P |
List of Research Outputs |
Bo P. and Wang W.P., Geodesic-controlled developable surfaces for modeling paper bending, Computer Graphics Forum, (Eurographics 2007). 2007, vol. 26, no. 3. |
Researcher
: Chan B |
List of Research Outputs |
Wang L., Tu C., Wang W.P., Meng X., Chan B. and Yan D., Silhouette smoothing for real-time rendering of mesh surfaces, IEEE Transactions on Visualization and Computer Graphics. USA, IEEE Computer Society, 2008, 14: 640-652. |
Researcher
: Chan HL |
List of Research Outputs |
Chan H.L., Lam T.W. and Liu K.S., Extra Unit-Speed Machines Are Almost as Powerful as Speedy Machines for Flow Time Scheduling, SIAM Journal on Computing. USA, SIAM, 2008, 37:5: 1595-1612. |
Chan H.L., Lam T.W., Sung W.K., Wong P.W.H. and Yiu S.M., Non-overlapping Common Substrings Allowing Mutations , Mathematics in Computer Science. Springer, 2008, 543-555. |
Researcher
: Chan HW |
Project Title: |
Anonymity in Web transactions |
Investigator(s): |
Chan HW |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
01/2006 |
Abstract: |
Privacy issue is always a concern for certain individuals with the proliferation of emails and transactions on the Web. In most of the current communication systems, information such as our identity (IP address) is exposed and kept by another party. Web server log files contain information about the users who visit them and the content they access. The server can record the user's IP address and often the user's Internet domain name, workplace, and/or approximate location, the type of computing platform used. The Web page that referred the user to this site and the server that is going to be visited next are all possibly contained within the request header. Even when the user's IP address changes between browsing sessions (e.g., the IP address is assigned dynamically using DHCP), a Web server can link multiple sessions by the same user by planting a unique cookie in the user' s browser during the first browsing session, and retrieving that cookie in subsequent sessions. Thus, various sites on the Internet collect a great amount of personal information about the individuals who visit them. This information can be used to generate consumer and communication profiles. The same monitoring capabilities are available to the user's ISP or local gateway administrator who can observe all communication in which the user participates. The user's profile made possible by such monitoring capabilities is viewed as a useful tool because a Web server can use such information to personalize its content for its users. However, user's privacy is compromised. In spite of a lack of privacy has always characterized Internet communication, a general acceptance that Internet communication has been logged universally and revealed so much about the personal tastes of its users is to be scrutinized. Web users should have the ability to limit what information is revealed about them and to whom it is revealed. While encrypting communication to and from web servers (e.g., using SSL) can hide the content of the transaction from an Internet service provider, or a local system administrator, they can still learn a lot about the client and server computers, the length of the data being exchanged, and the time and frequency of exchanges. Encryption indeed does little to protect the privacy of the client from the server. A web server can record the Internet addresses at which its clients reside, the servers that referred the clients to it, and the times and frequencies of accesses by its clients. Although some approaches enable users to negotiate the conditions under which they will share potentially private information with a Web server, these negotiations apply only to the server, only for certain kinds of information (for example, not the user's IP address), cannot be enforced, and are not presently widely practised. Other methods are definitely needed as well. Anonymity is a way not to release the identity and personal information of the individual. With the use of a proxy server, some degree of anonymity can be provided. However, it may still be possible to reveal our approximate location by examining the address of proxy server. Advertising company can use the information collected to decide which banner to show according to user location. With the use of cookies, the behavior of a visitor can be tracked when he/she visits another site embedded with web bugs. Therefore, individual privacy on the Internet is endangered and is of utmost concern for some. Since privacy cannot be protected solely by legislation, technologies that can be used to enforce privacy are needed. Anonymity for privacy protection is one possible solution, because if users are anonymous on a network, they need not worry about the loss of their privacy. The aim of the research is to design an efficient scheme for anonymous communication in web transactions. With such scheme, involved party should not be able to have an idea of whom and where the information requester is. |
List of Research Outputs |
Chow K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection, The Second International Conference on Internet Monitoring and Protection, ICIMP 2007. Silicon Valley, USA, IEEE Computer Society Press, 6 pages. |
Li Z., Chong C.F., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme, International Journal of Network Security. Seoul, Korea, 2007, Vol. 5, No. 2: 220-223. |
Researcher
: Chan KP |
List of Research Outputs |
Chan K.P., Chen T.Y. and Towey D.P., Controlling Restricted Random Testing: An Examination of the Exclusion Ratio Parameter, The Nineteenth International Conference on Software Engineering and Knowledge Engineering. Boston, U.S.A., 2007. |
Researcher
: Chan WK |
List of Research Outputs |
Chan W.K., Ho J.C.F., Tse T.H. and Yu Y.T., Piping classification to metamorphic testing: an empirical study towards better effectiveness for the identification of failures in mesh simplification programs, Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), IEEE Computer Society Press, Los Alamitos, CA (acceptance rate: 18%). Los Alamitos, California, IEEE Computer Society Press, 2007, 397−404. |
Lu H., Chan W.K. and Tse T.H., Testing pervasive software in the presence of context inconsistency resolution services, Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), ACM Press, New York, NY (acceptance rate: 15.1%). 2008, 61−70. |
Mei L., Chan W.K. and Tse T.H., Data flow testing of service-oriented workflow applications, Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), ACM Press, New York, NY (acceptance rate: 15.1%). 2008, 371−380. |
Tse T.H., Lau F.C.M., Chan W.K., Liu P.C.K. and Luk C.K.F., Testing of object-oriented industrial software without precise oracles or results, Communications of the ACM (acceptance rate: < 15%). New York, ACM Press, 2007, 50 (8): 78−85. |
Zhang Z., Chan W.K. and Tse T.H., Synthesizing component-based WSN applications via automatic combination of code optimization techniques, Proceedings of the 7th International Conference on Quality Software (QSIC 2007), IEEE Computer Society Press, Los Alamitos, CA. 2007, 181−190. |
Researcher
: Chan WT |
Project Title: |
Algorithm issues on on-request data dissemination: scheduling algorithms and performance guarantee |
Investigator(s): |
Chan WT, Lam TW, Ting HF |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
12/2003 |
Abstract: |
To solve the problem on deciding when to disseminate which page so as to optimize a pre-defined performance measure, such as the response time of a request, by giving online scheduling algorithms with performance guarantee; to introduce a formal performance comparison analysis between two (unicast or multicast) DDS with different resource settings; to study and solve the scheduling problems for some practical considerations. |
List of Research Outputs |
Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., On-line scheduling of parallel jobs on two machines, Journal of Discrete Algorithms . Amsterdam, The Netherlands, Elsevier Science Publishers B. V., 2008, 6(1): 3-10. |
Researcher
: Chen L |
List of Research Outputs |
Chen L., Wang C.L. and Lau F.C.M., Process Reassignment with Reduced Migration Cost in Grid Load Rebalancing, 17th International Heterogeneity in Computing Workshop (HCW 2008) . IEEE, 2008. |
Researcher
: Chen TY |
List of Research Outputs |
Wong W.E., Tse T.H., Glass R.L., Basili V.R. and Chen T.Y., An assessment of systems and software engineering scholars and institutions (2001−2005), Journal of Systems and Software. 2008, 81 (6): 1059−1062. |
Researcher
: Cheng CK |
List of Research Outputs |
Cheng C.K., Managing Spatial Uncertainty in a Database System, the POLYNET IT Security Symposium 2008, Hong Kong Polytechnic University (HKPU). 2008. |
Cheng C.K., Chen J.C., Mokbel M. and Chow C.Y., Probabilistic Verifiers: Evaluating Constrained Probabilistic Nearest-Neighbor Queries over Uncertain Data, IEEE Intl. Conf. on Data Engineering (IEEE ICDE 2008). 2008, 973-982. |
Singh S., Mayfield C., Shah R., Prabhakar S., Hambrusch S., Neville J. and Cheng C.K., Database Support for Probabilistic Attributes and Tuples, IEEE Intl. Conf. on Data Engineering (IEEE ICDE 2008). 2008, 1053-1061. |
Researcher
: Cheng KH |
List of Research Outputs |
Cheng K.H., The Chi-square Test when the Expected Frequencies are Less than 5. Hong Kong, 2008. |
Researcher
: Cheng KSD |
List of Research Outputs |
Cheng K.S.D., Wang W.P., Qin H., Wong K.K.Y., Yang H.P. and Liu Y., Design and Analysis of Optimization Methods for Subdivision Surface Fitting, IEEE Transactions on Visualization and Computer Graphics. 2007, 13(5): 878-890. |
Researcher
: Cheng KY |
List of Research Outputs |
Chow K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection, The Second International Conference on Internet Monitoring and Protection, ICIMP 2007. Silicon Valley, USA, IEEE Computer Society Press, 6 pages. |
Researcher
: Cheung DWL |
Project Title: |
Mining association rules on high performance parallel systems |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Outstanding RGC Projects |
Start Date: |
09/1998 |
Abstract: |
To study and develop algorithms and techniques for mining association rules on high performance parallel systems including the following two system paradigms: share-nothing distributed memory parallel system and share-memory parallel system. |
Project Title: |
Semi-supervised Subspace Clustering for High-Dimensional Data |
Investigator(s): |
Cheung DWL, Ng KP |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The objectives of this project are: 1.Design and analysis of semi-supervised subspace clustering algorithms in different models. 2.Performance studies of the algorithms in both synthetic and real data. 3.Explore the applications of these algorithms in different environments. |
Project Title: |
Service oriented e-transaction platform |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Fund Internship Programme |
Start Date: |
06/2006 |
Abstract: |
To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services. |
Project Title: |
Service oriented e-transaction platform |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Fund Internship Programme |
Start Date: |
06/2006 |
Abstract: |
To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services. |
Project Title: |
Extending web 2.0 to deliver e-commerce services |
Investigator(s): |
Cheung DWL, Lee TYT |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Support Programme |
Start Date: |
09/2006 |
Abstract: |
This proposal aims to extend various Web
2.0 technologies with electronic transaction capabilities and demonstrate the
application of Web 2.0 for e-commerce. The objectives of this project are as
follows: 1. Study the potential of implementing e-commerce services using Web
2.0 and the areas to extend Web 2.0 to support B2B and B |
List of Research Outputs |
Cheung D.W.L., Yee K.C. and Kwok R.P.M., B2B Exchange Technology Training, Thammasat University. Thailand, 2007. |
Cheung D.W.L., Invited Talk, Security in Outsourcing of Data Mining, University of Illinois at Urbana Champaign. 2008. |
Cheung D.W.L., Invited talk, Security and Integrity in Outsourcing of Data Mining, Croucher Advanced Study Institute, Mathematical & Algorithmic Challenges for Modeling & Analyzing Modern Data Sets. 2008. |
Cheung D.W.L., Keynote, Information Interoperability, E-Government Interoperability Framework Forum, Thammasat University, Thailand. 2008. |
Cheung D.W.L., Keynote: Security in Outsourcing of Data Mining , International Forum on Frontier of Data Management (FDM2007), Beijing, China . 2007. |
Cheung D.W.L., Open Source Software License, ebXML Hermes H2O, Active Media Group, Italy. Italy, 2007. |
Cheung D.W.L., Open Source Software License, ebXML Hermes, DBKK Health Insurance, Germany. Germany, 2007. |
Cheung D.W.L., Security in Outsourcing of Data Mining, Queen's University, Canada. 2008. |
Cheung D.W.L., Security in Outsourcing of Data Mining, Tsinghua University, China. 2007. |
Cheung D.W.L., Security in Outsourcing of Data Mining, York University, Canada. 2008. |
Cheung D.W.L. and Kwok R.P.M., Software License, Hermes 2.0, iASPEC. 2007. |
Cheung D.W.L., Yee K.C. and Lee T.Y.T., Webformer: A Rapid Application Development Toolkit for Writing Ajax Web Form Applications, International Conference on Distributed Computing and Internet Technology (ICDCIT 2007). Springer Berlin / Heidelberg, 2007, 4882/2007: 248-253. |
Cheung D.W.L. and Lee T.Y.T., XML Schema Design Methodology Training, Macau University of Science & Technology. Macau, 2007. |
Lee S.D., Yee K.C., Cheung D.W.L. and Yuan W., Descriptive Schema: Semantics-based Query Answering, 3rd Semantic Wiki Workshop (SemWiki 2008). 2008. |
Leung W.S., Lin M.C., Cheung D.W.L. and Yiu S.M., A Clustering-Based Approach for Filtering False Positive MicroRNA Candidates, 4-th International Symposium on Bioinformatics Research and Applications; May 6-9, 2008; Department of Computer Science, Georgia State University; Atlanta, Georgia (Lecture Notes in Bioinformatics (LNBI)). 2008. |
Leung W.S., Yiu S.M., Cheung D.W.L., Lai L., Lin M.C. and Kung H.F., Computational Prediction on Mammalian and Viral MicroRNAs - a Review, International Journal of Integrative Biology. 2007, 1(2): 118-126. |
Lo E., Kao C.M., Ho W.S., Lee S.D., Chui C.K. and Cheung D.W.L., OLAP on Sequence Data, ACM SIGMOD International Conference on Management of Data (SIGMOD 2008). 2008. |
Mamoulis N., Yiu M.L., Cheng K.H. and Cheung D.W.L., Efficient Top-k Aggregation of Ranked Inputs, ACM Transactions on Database Systems . Association of Computing Machinery, 2007, 32(3). |
Wong W.K., Cheung D.W.L., Hung E. and Liu H., Protecting Privacy in Incremental Maintenance for Distributed Association Rule Mining, The 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining. 2008. |
Wong W.K., Cheung D.W.L., Hung E., Kao C.M. and Mamoulis N., Security in Outsourcing of Association Rule Mining, The 33rd International Conference on Very Large Data Bases. 2007. |
Zhang M., Kao C.M., Cheung D.W.L. and Yip K., Mining Periodic Patterns with Gap Requirement from Sequences, ACM Transaction on Knowledge Discovery from Data. Association of Computing Machinery, 2007, 1. |
Zhang M., Kao C.M., Cheung D.W.L. and Yip C.L., Mining Sequence Patterns in Evolving Databases, In: Hsu, Lee, Temporal and Spatio-Temporal Data Mining. Idea Group Inc., 2007. |
Researcher
: Chin FYL |
Project Title: |
MultiVision Fund |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
MultiVision Intelligent Surveillance ( |
Start Date: |
07/2003 |
Abstract: |
MultiVision Fund. |
Project Title: |
Computationally Haplotyping Pedigree Data |
Investigator(s): |
Chin FYL, Smith DK, Song Y |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2006 |
Abstract: |
Minimum Recombination Haplotyping Problem (MRHP): finding a haplotype solution for a given pedigree that is consistent with given genotype data and derived from fewest recombinations (minimizing SUM). (1) The k-MRHP is an MRHP with the additional constraint that the number of recombinations on each haplotype is at most k where k = 0, 1, 2 (minimizing SUM with MAX=k) (2) An efficient algorithm for the k-MRHP when k=0 (3) Software implementation of the efficient algorithm |
Project Title: |
A new motif representation based on position specific patterns |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2006 |
Abstract: |
1 We want to introduce a good model to represent motifs and describe them in a precise and complete fashion. 2 Based on our new motif representation model, we will redefine the motif discovering problem and design efficient algorithms or heuristics to solve the problem. 3 The goal of the new model is to enable the discovery of a higher percentage of known motifs and some unknown motifs. |
List of Research Outputs |
Chan
W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., On-line scheduling of parallel
jobs on two machines, Journal of Discrete Algorithms . |
Chin
F.Y.L., Zhang
Y. and Zhu H., A 1-local 13/9-competitive Algorithm for Multicoloring
Hexagonal Graphs, The 13th Annual International Computing and
Combinatorics Conference (COCOON 2007). |
Chin
F.Y.L., A Clustering-Based Approach for
Finding Motif Pairs from Protein Interaction Data (Keynote), 2008
International Conference on BioMedical Engineering and Informatics (BMEI
2008). Sanya, |
Chin
F.Y.L., Ting
H.F. and Zhang Y., A Constant-competitive Algorithm for Online OVSF Code
Assignment, The 18th International Symposium on Algorithms and Computation
(ISAAC 2007). |
Chin F.Y.L., Chinese Journal of Advanced Software Research. 2008. |
Chin F.Y.L., Chinese Journal of Advanced Software Research. 2007. |
Chin F.Y.L., Current Bioinformatics. 2008. |
Chin
F.Y.L. and Leung
C.M., DNA Motif Representation with Nucleotide Dependency, In: Dan
Gusfield, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
|
Chin
F.Y.L., Finding Motifs Computationally
(Distinguished Lecture in Theoretical Computer Science) , Institute for
Theoretical Computer Science, |
Chin
F.Y.L., Finding Motifs Computationally, Computational
Biology Seminar, Dept of Computer Science, University of |
Chin
F.Y.L., Finding Motifs Computationally, Department
of Computer Science, |
Chin
F.Y.L., Finding Motifs Computationally, National
Tsing-Hua Univeristy. |
Chin F.Y.L., International Journal of Computer Processing of Oriental Languages. 2007. |
Chin F.Y.L., International Journal of Computer Processing of Oriental Languages. 2008. |
Chin F.Y.L., Journal of Information Processing Letters. 2007. |
Chin F.Y.L., Journal of Information Processing Letters. 2008. |
Chin F.Y.L., Managing Editor, International Journal of Foundations of Computer Science. 2008. |
Chin F.Y.L., Managing Editor, International Journal of Foundations of Computer Science. 2007. |
Chin F.Y.L., Online Frequency Assignment Problem in Cellular Network Communication (Keynote), The 25th Workshop on Combinatorial Mathematics and Computation Theory. Taipei, Taiwan, 2008. |
Chin F.Y.L., Online Frequency Assignment Problem in Cellular Network Communication, Dept. of Information Management of Shih Hsin University . 世新大學, Taipei, Taiwan, 2008. |
Chin F.Y.L., Online Frequency Assignment in Wireless Communication Networks (Distinguished Lecture in Theoretical Computer Science), Institute for Theoretical Computer Science, Tsinghua University. Beijing, China, 2007. |
Chin F.Y.L., Online Frequency Assignment in Wireless Communication Networks (Keynote), The 13th Annual International Computing and Combinatorics Conference (COCOON 2007) . Banff, Alberta, Canada, Springer Berlin / Heidelberg, 2007, 4598/2007: 2. |
Chin F.Y.L., Online Frequency Assignment in Wireless Communication Networks, York University. Canada, 2008. |
Chin F.Y.L., Leung C.M., Siu M.H. and Yiu S.M., Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency, The Sixth Asia-Pacific Bioinformatics Conference (APBC 2008). Kyoto, Japan, 2008, 343-352. |
Chin F.Y.L., Leung C.M. and Sung W.K., The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries, The 7th Workshop on Algorithms in Bioinformatics (WABI 2007). Philadelphia, Pennsylvania, USA, Springer, 2007, LNCS 4645: 372-382. |
He X., Yung N.H.C., Chow K.P., Chin F.Y.L., Chung H.Y., Wong K.K.Y. and Tsang K.S.H., Watershed Segmentation with Boundary Curvature Ratio Based Merging Criterion, 9th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2007, 7-12. |
Leung C.M., Siu M.H., Yiu S.M., Chin F.Y.L. and Sung K.W.K., Finding Linear Motif Pair from Protein Interaction Networks: A Probabilistic Approach, The 6th Annual International Conference on Computational Systems Bioinformatics Conference (CSB 2007). San Diego, California, USA, 2007, 111-120. |
Yuk S.C., Wong K.K.Y., Chung H.Y., Chow K.P., Chin F.Y.L. and Tsang K.S.H., Object-Based Surveillance Video Retrieval System With Real-Time Indexing Methodology, International Conference on Image Analysis and Recognition. Montreal, Canada, 2007, 626-637. |
Researcher
: Choi YK |
List of Research Outputs |
Choi Y.K., Li X.Q., Rong F.G., Wang W.P. and Cameron S., Determining directional contact range of two convex polyhedra,, Proceedings of Geometric Modeling and Processing 2008, Hangzhou, China. 2008. |
Lu L., Choi Y.K., Wang W.P. and Kim M.S., Variational 3D shape segmentation for bounding volume computation, Computer Graphics Forum, (Eurographics 2007). 2007, vol. 26, no. 3. |
Researcher
: Chong CF |
List of Research Outputs |
Chow K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection, The Second International Conference on Internet Monitoring and Protection, ICIMP 2007. Silicon Valley, USA, IEEE Computer Society Press, 6 pages. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Li Z., Chong C.F., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme, International Journal of Network Security. Seoul, Korea, 2007, Vol. 5, No. 2: 220-223. |
Researcher
: Chow KP |
Project Title: |
Advanced semantic video analysis for content-based video retrieval |
Investigator(s): |
Chow KP, Chin FYL, Wong KKY |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Support Programme |
Start Date: |
09/2006 |
Abstract: |
The objective of this proposal is to develop new and enabling semanitc video analysis techniques for video retrieval applications. We believe these new techniques can help to remedy the video retrieval problems found in video surveillance systems and the video search engine. |
List of Research Outputs |
Chow K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection, The Second International Conference on Internet Monitoring and Protection, ICIMP 2007. Silicon Valley, USA, IEEE Computer Society Press, 6 pages. |
He X., Yung N.H.C., Chow K.P., Chin F.Y.L., Chung H.Y., Wong K.K.Y. and Tsang K.S.H., Watershed Segmentation with Boundary Curvature Ratio Based Merging Criterion, 9th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2007, 7-12. |
Jiang L., Hui C.K., Chow K.P., Yiu S.M. and Lai K.Y., Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Kwan Y.K., Chow K.P., Law Y.W. and Lai K.Y., Reasoning About Evidence using Bayesian Networks, In: Indrajit Ray, Sujeet Shenoi, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics. New York, Springer, 2008, 1: 15. |
Law Y.W., Chow K.P., Kwan Y.K. and Lai K.Y., Consistency Issue on Live Systems Forensics, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Li Z., Chong C.F., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme, International Journal of Network Security. Seoul, Korea, 2007, Vol. 5, No. 2: 220-223. |
Yuk S.C., Wong K.K.Y., Chung H.Y., Chow K.P., Chin F.Y.L. and Tsang K.S.H., Object-Based Surveillance Video Retrieval System With Real-Time Indexing Methodology, International Conference on Image Analysis and Recognition. Montreal, Canada, 2007, 626-637. |
Researcher
: Chui CK |
List of Research Outputs |
Chui C.K. and Kao C.M., A Decremental Approach for Mining Frequent Itemsets from Uncertain Data, The 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2008). 2008. |
Chui C.K., Mining Frequent Intemsets and Order Preserving Sub-matrix from Uncertain Data. 2007. |
Lo E., Kao C.M., Ho W.S., Lee S.D., Chui C.K. and Cheung D.W.L., OLAP on Sequence Data, ACM SIGMOD International Conference on Management of Data (SIGMOD 2008). 2008. |
Researcher
: Chung HY |
List of Research Outputs |
He X., Yung N.H.C., Chow K.P., Chin F.Y.L., Chung H.Y., Wong K.K.Y. and Tsang K.S.H., Watershed Segmentation with Boundary Curvature Ratio Based Merging Criterion, 9th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2007, 7-12. |
Yuk S.C., Wong K.K.Y., Chung H.Y., Chow K.P., Chin F.Y.L. and Tsang K.S.H., Object-Based Surveillance Video Retrieval System With Real-Time Indexing Methodology, International Conference on Image Analysis and Recognition. Montreal, Canada, 2007, 626-637. |
Researcher
: Feng X |
Project Title: |
A New Approach for Intelligent Processing Based on Generalized Particle Model |
Investigator(s): |
Feng X, Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
03/2007 |
Abstract: |
Many real-world problems can be solved using artificial intelligence (AI) techniques. The goal of this project is to investigate and develop an intelligent processing approach based on the generalized particle model (GPM). In GPM, entities are modeled as particles in one or more force-fields. We will study the evolution of “swarms”, the particles’ microcosmic actions, and macroscopic swarm intelligence, and present efficient algorithms for applying GPM to communication networks and multi-agent systems (MASs). GPM is an important extension of Elastic Net (EN), but it is fundamentally different from many other popular intelligent approaches including those based on symbolic or fuzzy logic, genetic algorithms, artificial neural network, game theory and ant colony optimization. The features of the GPM-based models and their corresponding algorithms include a powerful processing ability to deal with priorities, personality, autonomy and interaction of different entities in networks or MASs. Furthermore, these models can be applied to the optimization of multiple objectives, including aggregate utility, personal utility, minimal personal utility, etc. The proposed approach also has the advantages of the high parallelism, low computational complexity, and ease for hardware implementation. The major objectives in this project are as follows: 1. To present a new generalized particle model (GPM), which is different in many respects from cellular automaton, generalized cellular automaton, neural network, cellular neural network, particle model in physics, ant colony optimization, reaction and growth model, genetic algorithm, etc. 2. Based on GPM, to propose a new distributed parallel swarm intelligent model and theory, and to explore the essence and rules of swarm intelligence in terms of growth, evolution, phase transformation, etc. Based on the proposed model and theory, to deal with and explain a variety of complicated phenomena that might occur in dynamic environments which are difficult for traditional models and approaches. 3. To extend and develop the spring net approach originally proposed by applicant to a generic parallel and distributed method based on various generalized particle models (of different granularities) for swarm intelligence. 4. To present some parallel and distributed intelligent approaches and algorithms based on GPM. By simulations and experiments, to test that these approaches on their ability to adapt to the real-time dynamic environment that involves various interactions, metabolism, phase transformation, etc. To show that the new approaches can overcome some deficiencies of traditional approaches. |
List of Research Outputs |
Feng X. and Lau F.C.M., A Parallel Evolutionary Approach to Multi-objective Optimization, The IEEE Congress on Evolutionary Computation (CEC 2007). Singapore, 2007. |
Feng X., Lau F.C.M. and Shuai D.X., The Coordination Generalized Particle Model--An Evolutionary Approach to Multi-sensor Fusion , Information Fusion. Elsevier, 2008, 9: 450-464. |
Researcher
: He T |
List of Research Outputs |
Huo Q. and He T., A Minimax Classification Approach to HMM-Based Online Handwritten Chinese Character Recognition Robust Against Affine Distortions, ICDAR-2007. 1: IEEE. |
Researcher
: He X |
List of Research Outputs |
He X. and Yung N.H.C., A corner detector based on global and local curvature properties, Optical Engineering - a journal of SPIE. USA, SPIE, 2008, 47 (5): 12. |
He X., Yung N.H.C., Chow K.P., Chin F.Y.L., Chung H.Y., Wong K.K.Y. and Tsang K.S.H., Watershed Segmentation with Boundary Curvature Ratio Based Merging Criterion, 9th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2007, 7-12. |
Researcher
: Ho CY |
List of Research Outputs |
Ho C.Y., Group-based Checkpoint/Rollback Recovery for Large Scale Message-passing Systems . Hong Kong, 2008. |
Ho C.Y., Wang C.L. and Lau F.C.M., Scalable Group-based Checkpoint/restart For Large-scale Message-passing Systems, Proceedings Of The 2008 Ieee International Parallel & Distributed Processing Symposium (ipdps 2008). IEEE, 2008. |
Researcher
: Ho JCF |
List of Research Outputs |
Chan W.K., Ho J.C.F., Tse T.H. and Yu Y.T., Piping classification to metamorphic testing: an empirical study towards better effectiveness for the identification of failures in mesh simplification programs, Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), IEEE Computer Society Press, Los Alamitos, CA (acceptance rate: 18%). Los Alamitos, California, IEEE Computer Society Press, 2007, 397−404. |
Researcher
: Ho SC |
List of Research Outputs |
Ho S.C., Wang C.L. and Lau F.C.M., Lightweight Process Migration and Memory Prefetching in openMosix, Proceedings of 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008). Miami, USA, IEEE, 2008. |
Ho S.C., Process Roaming. 2007. |
Researcher
: Ho SC |
List of Research Outputs |
Ho S.C., Wang C.L. and Lau F.C.M., Lightweight Process Migration and Memory Prefetching in openMosix, Proceedings of 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008). Miami, USA, IEEE, 2008. |
Ho S.C., Process Roaming. 2007. |
Researcher
: Ho WS |
List of Research Outputs |
Lo E., Kao C.M., Ho W.S., Lee S.D., Chui C.K. and Cheung D.W.L., OLAP on Sequence Data, ACM SIGMOD International Conference on Management of Data (SIGMOD 2008). 2008. |
Researcher
: Hu H |
List of Research Outputs |
Hu H. and Wang C.L., GPS-Based Location Extraction and Presence Management for Mobile Instant Messenger, 2007 IFIP International Conference on Embedded and Ubiquitous Computing (EUC'2007), December 17-20, 2007, Taipei Taiwan.. Berlin, Springer, 2007, 309-320. |
Researcher
: Hu P |
List of Research Outputs |
Hu P., Automated Fault Localization: a Statistical Predicate Analysis Approach, 2007. |
Researcher
: Hui CK |
Project Title: |
Study of multi-signer signature scheme and identity authentication |
Investigator(s): |
Hui CK, Chow KP, Tsang WW |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
12/2003 |
Abstract: |
to investigate the security of multi-signer signature schemes, and to design some new schemes with secure and high efficient features. |
Project Title: |
Forward secure crytographic schemes for Ad Hoc Network |
Investigator(s): |
Hui CK, Chow KP, Yiu SM, Li VOK |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2005 |
Abstract: |
To carry out: (1) a forward secure signature scheme to be used in the clients of an ad hoc network. (2) a forward secure threshold signature scheme to be used in the CAs of an ad hoc network. |
Project Title: |
Design of cryptographic schemes for delegation network |
Investigator(s): |
Hui CK, Yiu SM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2007 |
Abstract: |
(1) Delegation is a process where a user (the delegator) grants some of his rights (power), e.g. the signing right, to another user (the delegate), to work on his/her behalf.In a paper-based environment, delegation can be easily achieved. However, in a digital environment, how delegation can be handled properly becomes an issue to be addressed. The key management is also complicated, especially in a general delegation network.In this project, we propose to design a number of efficient and provably secure cryptographic schemes to support different variations of delegation networks. The developed schemes would help to enhance the security of an enterprise information system as delegation would be a common operation in most of the office environment. Also, the knowledge gained will be useful to build up a security model about delegation network. (2) In a paper-based environment, delegation can be easily achieved. However, in a digital environment, how delegation can be handled properly becomes an issue to be addressed. For examples, it is not trivial how a delegate can digitally sign or decrypt a document on behalf of the delegator and also how the receiver of the document verifies the signature and be convinced that the signer has the right (power) from the delegator to sign the document. Obviously, some straight-forward approaches do not work. Using signing as an example, the delegator passes the signing key (e.g. the private key if using an asymmetric cryptographic system) to the delegate, then the delegator has to change the key frequently and it also violates the non-repudiation property of the scheme as it is difficult to prove whether the delegator or the delegate is the person who actually signed the document. The key management is also complicated, especially in a general delegation network. (3)In other words, from the perspective of computer security, a set of specially designed cryptographic primitives that support delegation network is necessary. To tackle this problem, [MU96] proposed the proxy signature to deal with the delegation of signing. In a proxy signature, the original signer creates a key pair (the proxy key pair, denoted as (, K)) using his own signing key. The delegate (called the proxy signer) signs a document using . The verifier has to use K as well as the public key of the original signer to check the validity of the signature. Since the public key of the original signer is involved in the checking, so the delegation relationship is confirmed. After this work, a number of proxy signature schemes were proposed. However, most of these schemes are either too restrictive and cannot be extended easily for delegation networks, or are shown to be insecure.(4) In this project, we propose to design a number of efficient and provably secure cryptographic schemes to support different variations of delegation networks. The developed schemes would help to enhance the security of an enterprise information system as delegation would be a common operation in most of the office environment. |
List of Research Outputs |
Chow K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection, The Second International Conference on Internet Monitoring and Protection, ICIMP 2007. Silicon Valley, USA, IEEE Computer Society Press, 6 pages. |
Dong Y., Sui A.F., Yiu S.M., Li V.O.K. and Hui C.K., Providing distributed certificate authority service in cluster-based mobile and hoc networks, Computer Communications. 2007, 30: 2442-2452. |
Jiang L., Hui C.K., Chow K.P., Yiu S.M. and Lai K.Y., Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Jiang L., Hui C.K. and Yiu S.M., Improving Disk Sector Integrity Using k-dimension Hashing, IFIP International Federation for Information Processing. Japan, Springer Boston, 2008, 285: 87-98. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Li Z., Chong C.F., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme, International Journal of Network Security. Seoul, Korea, 2007, Vol. 5, No. 2: 220-223. |
Researcher
: Hung RYS |
List of Research Outputs |
Hung R.Y.S. and Ting H.F., Competitive analysis of most-request-first for scheduling broadcasts with start-up delay, In: G. Ausiello, and D. Sannella , Theoretical Computer Science. Amsterdam, The Netherlands., ELSEVIER, 2008, 361(1-3): 200--211. |
Hung R.Y.S., Lai K.F. and Ting H.F., Finding Frequent Items in a Turnstile Data Stream, In: Xiaodong Hu, and Jie Wang, Proceedings of the 14th Annual International Symposium on Theoretical Informatics. Springer, 2008, 498--509. |
Hung R.Y.S. and Ting H.F., Finding Heavy Hitters Over The Sliding Window Of A Weighted Data Stream, In: Eduardo Laber, Proceedings of the 8th Latin America Symposium on Theoretical Informatics. New York, Springer, 2008, 699--710. |
Researcher
: Huo Q |
Project Title: |
Towards on-line recognition of continuous Chinese handwriting text on tablet PCs |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Abstract: |
To construct a large scale corpus of Chinese handwriting samples naturally written on Tablet PCs; to investigate new techniques for feature extraction, character modeling, contextual processing and integrated search to cope with the on-line recognition problem of continuously handwritten Chinese sentences; to implement a prototype system on the Tablet PC using the most promising solution identified by investigating the effectiveness of integrating the available techniques in different ways. |
Project Title: |
Chinese spoken language processing |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Anhui USTC iFLYTEK Co. Ltd. - General Award |
Start Date: |
09/2005 |
Abstract: |
To research and develop the state-of-the-art Chinese spoken language processing technology. |
Project Title: |
A Detection and Verification Based Approach for On-line Recognition of Handwritten Chinese Words |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The objectives of this project are: (1) to investigate a new "detection and verification based approach" for on-line recognition of handwritten Chinese words; (2) to investigate new techniques for feature extraction and character modeling to improve the character classification accuracy as well as the reliability of character verification; (3) to develop a prototype system on Tablet PC, as a test-bed of new ideas, by using the most promising solution identified through the study in this project. The character vocabulary of our recognizer will include 6763 simplified Chinese characters in GB2312-80 standard, 12 frequently used GBK Chinese characters, 62 alphanumeric characters, 140 punctuation marks and symbols. We are aiming at a writer-independent character recognition accuracy of above 90% for naturally written Chinese words derived from our handwriting corpus. |
Project Title: |
A Study of Similarity Measures For Hidden Markov Models and Their Applications in Speech Recognition |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
03/2006 |
Abstract: |
After many years research, Gaussian mixture continuous density hidden Markov model (CDHMM) remains predominant as a speech modeling technique in automatic speech recognition (ASR) area. How to measure the similarity of two given CDHMMs has been an important research topic for several decades. In a pioneering work, Juang and Rabiner proposed to use Kullback-Leibler (KL) divergence as a similarity measure of two HMMs with discrete observation distributions. In order to calculate the KL divergence, a Monte Carlo simulation procedure has to be used. It is not practical to use such a procedure in ASR applications that require a quick response. So, the main objectives of this project are as follows: - To develop efficient approximation methods for calculating the KL divergence of two given CDHMMs; - To study the possibility of using approximate KL divergence for the prediction of word confusabilities in a given vocabulary of an ASR system; - To develop effective and intelligent speaker adaptation strategies guided by an automatic analysis of vocabulary word confusability. |
List of Research Outputs |
Huo Q. and He T., A Minimax Classification Approach to HMM-Based Online Handwritten Chinese Character Recognition Robust Against Affine Distortions, ICDAR-2007. 1: IEEE. |
Researcher
: Ieong SCR |
List of Research Outputs |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Researcher
: Jiang L |
List of Research Outputs |
Jiang L., Hui C.K., Chow K.P., Yiu S.M. and Lai K.Y., Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Jiang L., Hui C.K. and Yiu S.M., Improving Disk Sector Integrity Using k-dimension Hashing, IFIP International Federation for Information Processing. Japan, Springer Boston, 2008, 285: 87-98. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Researcher
: Kao CM |
Project Title: |
Association rule mining on continuous stream data |
Investigator(s): |
Kao CM, Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To derive efficient online time-based sampling algorithms; to derive efficient approximation algorithms for mining association rules from a single data stream; to derive efficiency algorithms for mining inter-stream associations; to perform time-delayed association analysis. |
Project Title: |
Computational issues in mining uncertain data |
Investigator(s): |
Kao CM, Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2006 |
Abstract: |
1 Data Uncertainty Models. One of the key
steps in knowledge discovery is data collection. In practice, statistical
approximation is used in the data collection process. This may be due to
measurement error or data values that are based on subjective judgement. Our
first objective is to investigate the various forms of uncertainty that may
exist in data, and how these various forms of uncertainty affect the design
of data-mining algorithms under different mining models (such as
association-rule mining, clustering, and classification). For starters, we
consider "value uncertainty" and "existential
uncertainty." A database system models the physical world by recording
facts (attribute values) of real-life entities (data items or tuples). By
value uncertainty, we refer to data that contains a known set of tuples but
their attribute values are uncertain. For example, a moving-object database
tracks the location of a set of known moving objects. Due to the time lag
between the current time and the time an object's location was last recorded,
the current location of an object (an attribute value) can only be
approximated by a statistical model. Example models include "uniform
line uncertainty" (consider the moving object being a car moving on a
straight road) and "Gaussian circular uncertainty" (consider the
moving object performs a random walk starting from its last recorded
location). By existential uncertainty, we refer to data whose tuple
membership is uncertain or fuzzy. For example, a patient with a body temperature
of |
List of Research Outputs |
Chau M.C.L., Cheng R. and Kao C.M., Uncertain Data Mining: An Example in Self-Organizing Maps, The 1st Workshop on Data Mining of Uncertain Data (DUNE 2007). 2007. |
Chui C.K. and Kao C.M., A Decremental Approach for Mining Frequent Itemsets from Uncertain Data, The 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2008). 2008. |
Lee S.D., Kao C.M. and Cheng R., Reducing UK-means to K-means, The 1st Workshop on Data Mining of Uncertain Data (DUNE 2007) . 2007. |
Lo E., Kao C.M., Ho W.S., Lee S.D., Chui C.K. and Cheung D.W.L., OLAP on Sequence Data, ACM SIGMOD International Conference on Management of Data (SIGMOD 2008). 2008. |
Wong W.K., Cheung D.W.L., Hung E., Kao C.M. and Mamoulis N., Security in Outsourcing of Association Rule Mining, The 33rd International Conference on Very Large Data Bases. 2007. |
Zhang M., Kao C.M., Cheung D.W.L. and Yip K., Mining Periodic Patterns with Gap Requirement from Sequences, ACM Transaction on Knowledge Discovery from Data. Association of Computing Machinery, 2007, 1. |
Zhang M., Kao C.M., Cheung D.W.L. and Yip C.L., Mining Sequence Patterns in Evolving Databases, In: Hsu, Lee, Temporal and Spatio-Temporal Data Mining. Idea Group Inc., 2007. |
Researcher
: Karras P |
List of Research Outputs |
Karras P., Data Structures and Algorithms for Data Representation in Constrained Environments, 2007. |
Researcher
: Kwan KL |
List of Research Outputs |
Kwan K.L., Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance, 2007. |
Researcher
: Kwan YK |
List of Research Outputs |
Kwan Y.K., Chow K.P., Law Y.W. and Lai K.Y., Reasoning About Evidence using Bayesian Networks, In: Indrajit Ray, Sujeet Shenoi, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics. New York, Springer, 2008, 1: 15. |
Law Y.W., Chow K.P., Kwan Y.K. and Lai K.Y., Consistency Issue on Live Systems Forensics, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Researcher
: Kwok RPM |
List of Research Outputs |
Cheung D.W.L., Yee K.C. and Kwok R.P.M., B2B Exchange Technology Training, Thammasat University. Thailand, 2007. |
Cheung D.W.L. and Kwok R.P.M., Software License, Hermes 2.0, iASPEC. 2007. |
Researcher
: Lai KY |
List of Research Outputs |
Chow K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection, The Second International Conference on Internet Monitoring and Protection, ICIMP 2007. Silicon Valley, USA, IEEE Computer Society Press, 6 pages. |
Jiang L., Hui C.K., Chow K.P., Yiu S.M. and Lai K.Y., Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Kwan Y.K., Chow K.P., Law Y.W. and Lai K.Y., Reasoning About Evidence using Bayesian Networks, In: Indrajit Ray, Sujeet Shenoi, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics. New York, Springer, 2008, 1: 15. |
Law Y.W., Chow K.P., Kwan Y.K. and Lai K.Y., Consistency Issue on Live Systems Forensics, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Researcher
: Lam TW |
Project Title: |
Algorithms for uncovering conserved genes on whole genomes |
Investigator(s): |
Lam TW |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To investigate the complexity of a maximum common subsequence problem that models mutations between genomes; to design and implement better algorithms and software for uncovering conserved genes. |
Project Title: |
Compressed indexes for approximate string matching, with applications to biological sequences |
Investigator(s): |
Lam TW |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
08/2006 |
Abstract: |
1 The objectives of my proposal contains special fonts, and they are included into the section of backgrounds of research as a combined pdf file. |
List of Research Outputs |
Chan H.L., Lam T.W. and Liu K.S., Extra Unit-Speed Machines Are Almost as Powerful as Speedy Machines for Flow Time Scheduling, SIAM Journal on Computing. USA, SIAM, 2008, 37:5: 1595-1612. |
Chan H.L., Lam T.W., Sung W.K., Wong P.W.H. and Yiu S.M., Non-overlapping Common Substrings Allowing Mutations , Mathematics in Computer Science. Springer, 2008, 543-555. |
Hon W.K., Lam T.W., Shah R., Tam S.L. and Vitter J., Cache-Oblivious Index for Approximate String Matching, The 18th Annual Symposium on Combinatorial Pattern Matching (CPM). 2007. |
Hon W.K., Lam T.W., Shah R.A.H.U.L., Tam S.L. and Vitter J.S., Compressed Index for Dictionary Matching, IEEE Data Compression Conference. IEEE Computer Society, 2008, 23-32. |
Lam T.W., Sung W.K., Tam S.L., Wong C.K. and Yiu S.M., An Experimental Study of Compressed Indexing and Local Alignments of DNA, First International Conference on Combinatorial Optimization and Applications. Springer, 2007, 242-254. |
Lam T.W., Lee L.K., Wong P.W.H. and To I.K.K., Competitive Non-migratory Scheduling For Flow Time And Energy, The 20th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA). ACM, 2008, 256-264. |
Lam T.W., Sung W.K., Tam S.L., Wong C.K. and Yiu S.M., Compressed indexing and local alignment of DNA, Bioinformatics. Oxford University Press, 2008, 24 (6): 791-797. |
Lam T.W., Lee L.K., To I.K.K. and Wong P.W.H., Energy Efficient Deadline Scheduling in Two Processor Systems, The 18th International Symposium on Algorithms and Computation. Springer, 2007, 476-487. |
Lam T.W., Energy Efficient online scheduling, Foundations of Computational Mathematics. 2008. |
Lam T.W., Energy efficient online scheduling, New Challenges on Scheduling Theory. 2008. |
Lam T.W., Sung W.K., Tam S.L. and Yiu S.M., Space Efficient Indexes for String Matching with Don't Cares, The 18th International Symposium on Algorithms and Computation . Springer, 2007, 846-857. |
Wong K.F., Chiu Y.S., Lam T.W. and Yiu S.M., A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots, The 5th Asia-Pacific Bioinformatics Conference . World Scientific, 2008, 89-100. |
Researcher
: Lau FCM |
Project Title: |
The Hong Kong University grid point |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Matching Fund for Hi-Tech Research and Development Program of China (863 Projects) |
Start Date: |
12/2002 |
Abstract: |
To study grid point of The University of Hong Kong. |
Project Title: |
Content adaptation for mobile computing |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Abstract: |
To design and implement a content adaptation system with context-awareness and which is sensitive to user's preferences; to design and implement an automatic content augmentation tool for content creation. |
Project Title: |
A holistic approach to structured web document viewing in small devices |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To produce a system design covering the content creation, content adaptation, and content rendering aspects of Web content viewing on a mobile handheld device, whereby any viewing activity will be seen as complete, fast, and easy. |
Project Title: |
HP mobile technology for teaching initiative |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Hewlett-Packard HK SAR Ltd. |
Start Date: |
10/2004 |
Abstract: |
To develop HP mobile technology for teaching initiative. |
Project Title: |
Intelligent Systems for Painting and Calligraphy |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The objectives of this proposed project are: (1)To apply point-based techniques to achieve fast rendering of the brush geometry, and to consider image-based rendering algorithms for high quality rendering of the animated brush. (2) To incorporate the smooth particles hydrodynamics method borrowed from astrophysics in the dynamics simulation of the brush. (3) To apply particle diffusion (from chemistry/physics) to simulate the complex pigment behavior. (4) To devise an intelligent system component for training the brush to adapt to “personal habitual bias” of the user. (5) To extend the present calligraphy generation system with a feedback reinforcement learning component to strengthen the constraint satisfaction process. (6) To explore possible new recognition algorithms for calligraphic writings of which the characters are severely distorted. |
Project Title: |
UGC-Matching Grant Scheme (2nd Phase)-Process Migration and Runtime Scheduling for Parallel Tasks in Computational Grids |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Other Funding Scheme |
Start Date: |
05/2006 |
Abstract: |
To study process migration and runtime scheduling for parallel tasks in computational grids. |
Project Title: |
Memory management strategies to improve garbage collectors |
Investigator(s): |
Lau FCM, Wang CL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2006 |
Abstract: |
1. To devise a low-overhead dynamic object pretenuring mechanism for identifying long-lived objects and allocating them to the mature space directly. 2. To design a nursery sizing policy which can select, against a given total heap size, a best nursery size leading to the best performance of an application. 3. To design an automatic heap sizing policy for controlling the heap growth. |
List of Research Outputs |
Chen L., Wang C.L. and Lau F.C.M., Process Reassignment with Reduced Migration Cost in Grid Load Rebalancing, 17th International Heterogeneity in Computing Workshop (HCW 2008) . IEEE, 2008. |
Feng X. and Lau F.C.M., A Parallel Evolutionary Approach to Multi-objective Optimization, The IEEE Congress on Evolutionary Computation (CEC 2007). Singapore, 2007. |
Feng X., Lau F.C.M. and Shuai D.X., The Coordination Generalized Particle Model--An Evolutionary Approach to Multi-sensor Fusion , Information Fusion. Elsevier, 2008, 9: 450-464. |
Ho C.Y., Wang C.L. and Lau F.C.M., Scalable Group-based Checkpoint/restart For Large-scale Message-passing Systems, Proceedings Of The 2008 Ieee International Parallel & Distributed Processing Symposium (ipdps 2008). IEEE, 2008. |
Ho S.C., Wang C.L. and Lau F.C.M., Lightweight Process Migration and Memory Prefetching in openMosix, Proceedings of 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008). Miami, USA, IEEE, 2008. |
Tsang C.K.K., Wang C.L. and Lau F.C.M., Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks (Best Paper Award), The 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2008). IEEE, 2008, 45 - 52. |
Tsang C.K.K., Wang C.L. and Lau F.C.M., Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks, The 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN). IEEE Computer Society Press, 2008. |
Tse T.H., Lau F.C.M., Chan W.K., Liu P.C.K. and Luk C.K.F., Testing of object-oriented industrial software without precise oracles or results, Communications of the ACM (acceptance rate: < 15%). New York, ACM Press, 2007, 50 (8): 78−85. |
Wang R., Lau F.C.M. and Zhao Y.C., Hamiltonicity of Regular Graphs and Blocks of Consecutive Ones in Symmetric Matrices, Discrete Applied Mathematics. 2007, 155: 2312-2320. |
Wang R., Lau F.C.M. and Liu Y.Y., On The Hardness Of Minimizing Space For All-shortest-path Interval Routing Schemes, Theoretical Computer Science. 2007, 389: 250-264. |
Wang R. and Lau F.C.M., Optimal gossiping in square 2D meshes, Theoretical Computer Science. 2007, 384: 263-286. |
Xu S.H., Tan H., Jiao X., Lau F.C.M. and Pan Y., A Generic Pigment Model for Digital Painting, Computer Graphics Forum. 2007, 26. |
Xu S.H., Tan H., Jiao X., Lau F.C.M. and Pan Y., A Generic Pigment Model for Digital Painting, Eurographics 2007. |
Xu S.H., Jiang H., Lau F.C.M. and Pan Y., An Intelligent System for Chinese Calligraphy, 22nd Conference on Artificial Intelligence (AAAI-07). 2007. |
Yu C.H., Lau F.C.M. and Wang C.L., Recycling Memory Blocks for Improving Execution of Java Programs, ACM Transactions on Architecture and Code Optimization. ACM, 2008, 4. |
Researcher
: Law YW |
List of Research Outputs |
Kwan
Y.K., Chow K.P., Law Y.W. and Lai K.Y., Reasoning About Evidence
using Bayesian Networks, In: Indrajit Ray, Sujeet Shenoi, Fourth Annual
IFIP WG 11.9 International Conference on Digital Forensics. |
Law Y.W., Chow K.P., Kwan Y.K. and Lai K.Y., Consistency Issue on Live Systems Forensics, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Researcher
: Lee LK |
List of Research Outputs |
Lam T.W., Lee L.K., Wong P.W.H. and To I.K.K., Competitive Non-migratory Scheduling For Flow Time And Energy, The 20th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA). ACM, 2008, 256-264. |
Lam T.W., Lee L.K., To I.K.K. and Wong P.W.H., Energy Efficient Deadline Scheduling in Two Processor Systems, The 18th International Symposium on Algorithms and Computation. Springer, 2007, 476-487. |
Researcher
: Lee SD |
List of Research Outputs |
Lee S.D., Yee K.C., Cheung D.W.L. and Yuan W., Descriptive Schema: Semantics-based Query Answering, 3rd Semantic Wiki Workshop (SemWiki 2008). 2008. |
Lee S.D., Kao C.M. and Cheng R., Reducing UK-means to K-means, The 1st Workshop on Data Mining of Uncertain Data (DUNE 2007) . 2007. |
Lo E., Kao C.M., Ho W.S., Lee S.D., Chui C.K. and Cheung D.W.L., OLAP on Sequence Data, ACM SIGMOD International Conference on Management of Data (SIGMOD 2008). 2008. |
Researcher
: Lee TYT |
List of Research Outputs |
Cheung
D.W.L., Yee K.C. and Lee T.Y.T., Webformer: A Rapid
Application Development Toolkit for Writing |
Cheung
D.W.L. and Lee T.Y.T., XML
Schema Design Methodology Training, Macau |
Researcher
: Leung CM |
List of Research Outputs |
Chin
F.Y.L. and Leung C.M., DNA
Motif Representation with Nucleotide Dependency, In: Dan Gusfield, IEEE/ACM
Transactions on Computational Biology and Bioinformatics. |
Chin
F.Y.L., Leung C.M., Siu M.H. and Yiu S.M., Optimal Algorithm for Finding
DNA Motifs with Nucleotide Adjacent Dependency, The Sixth Asia-Pacific
Bioinformatics Conference (APBC 2008). |
Chin
F.Y.L., Leung C.M. and
Sung W.K., The Point Placement Problem on a Line - Improved Bounds for
Pairwise Distance Queries, The 7th Workshop on Algorithms in
Bioinformatics (WABI 2007). |
Leung
C.M., Siu
M.H., Yiu S.M., Chin F.Y.L. and Sung K.W.K., Finding
Linear Motif Pair from Protein Interaction Networks: A Probabilistic
Approach, The 6th Annual International Conference on Computational Systems
Bioinformatics Conference (CSB 2007). |
Researcher
: Leung WS |
List of Research Outputs |
Leung W.S., Lin M.C., Cheung D.W.L. and Yiu S.M., A Clustering-Based Approach for Filtering False Positive MicroRNA Candidates, 4-th International Symposium on Bioinformatics Research and Applications; May 6-9, 2008; Department of Computer Science, Georgia State University; Atlanta, Georgia (Lecture Notes in Bioinformatics (LNBI)). 2008. |
Leung W.S., Shen Z., Yiu S.M., Kung H.F. and Lin M.C., Characterization of HGFK1 Signaling Networks in Microvessel Endothelial and Hepatoma Cell Lines, International Conference on Bioinformatics 2007; 27-30 August 2007; Hong Kong. 2007. |
Leung W.S., Yiu S.M., Cheung D.W.L., Lai L., Lin M.C. and Kung H.F., Computational Prediction on Mammalian and Viral MicroRNAs - a Review, International Journal of Integrative Biology. 2007, 1(2): 118-126. |
Shen Z., Leung W.S., Yiu S.M., Kung H.F. and Lin M.C., The Molecular Mechanisms of the Dual Anti-angiogenic and Anti-tumor Effects of rAAV-HGFK1, 11th Annual Meeting of the American Society of Gene Therapy May 28-June 1, 2008; Boston, Massachusetts, USA.. 2008. |
Researcher
: Li S |
List of Research Outputs |
Li S., Combining
Silhouettes and Shading Cues for Model Reconstruction. |
Researcher
: Li W |
List of Research Outputs |
Li W., A
Study of an Active Approach to Speaker and Task Adaptation based on Automatic
Analysis of Vocabulary Confusability. |
Researcher
: Liang C |
List of Research Outputs |
Liang C., 3D Model Reconstruction from Silhouettes. 2008. |
Liang C. and Wong K.K.Y., Exact
Visual |
Liang C. and Wong K.K.Y., Robust Recovery of Shapes with Unknown Topology from the Dual Space, IEEE Transactions on Pattern Analysis and Machine Intelligence . IEEE Computer Society, 2007, 29(12): 2205-2216. |
List of Research Outputs |
Chan
H.L., Lam T.W. and Liu K.S., Extra Unit-Speed
Machines Are Almost as Powerful as Speedy Machines for Flow Time Scheduling, SIAM
Journal on Computing. |
Researcher
: Liu Y |
List of Research Outputs |
Chen F.L., Wang W.P. and Liu Y., Computing singular points of plane rational curves, Journal of Symbolic Computation. 2008, 43, no. 2: 92-117. |
Cheng K.S.D., Wang W.P., Qin H., Wong K.K.Y., Yang H.P. and Liu Y., Design and Analysis of Optimization Methods for Subdivision Surface Fitting, IEEE Transactions on Visualization and Computer Graphics. 2007, 13(5): 878-890. |
Liu Y.
and Wang W.P., A revisit to least
squares orthogonal distance |
Pottmann H., Liu Y., Wallner J., Bobenko A. and Wang W.P., Geometry of multi-layer freeform structures for architecture, ACM Transactions on Graphics, (SIGGRAPH 2007). 2007, vol. 26, no. 2. |
Wang W.P., Juttler B., Zheng D. and Liu Y., Computation of rotation minimizing frames, ACM Transactions on Graphics. 2008, 27, Issue 1. |
Researcher
: Lu H |
List of Research Outputs |
Lu H., Chan W.K. and Tse T.H., Testing pervasive software in the presence of context inconsistency resolution services, Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), ACM Press, New York, NY (acceptance rate: 15.1%). 2008, 61−70. |
Researcher
: Lu L |
List of Research Outputs |
Lu L., Choi Y.K., Wang W.P. and Kim M.S., Variational 3D shape segmentation for bounding volume computation, Computer Graphics Forum, (Eurographics 2007). 2007, vol. 26, no. 3. |
List of Research Outputs |
Mak K.S., Energy Efficient Online Deadline Scheduling. 2008. |
Researcher
: Mamoulis N |
Project Title: |
Continuous Constraint Query Evaluation for Spatio-temporal Data Sequences |
Investigator(s): |
Mamoulis N, Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The main objectives of this project are: (1) The development of effective techniques that manage and index incoming events in memory. These techniques will take adantage of the special nature of the queries to minimize the required memory. (2) The development of appropriate algorithms for evaluation of CCQ. The algorithms should consider the online, dynamic nature of the queries. Each time a new event arrives, we need to validate whether it forms a query result with past events. (3) The development of approximate management and query evaluation solutions for problem settings, when the required memory is smaller than the available. For such cases, we should consider data structures like spatiotemporal histograms, which could allow query evaluation with some uncertainty. (4) The integration of the developed system with a spatiotemporal pattern mining module that will automatically define the CCQs. |
Project Title: |
Evaluation of advanced spatial queries in sensor networks |
Investigator(s): |
Mamoulis N |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2007 |
Abstract: |
(1) We aim at providing methods that continuously evaluate advanced spatial queries in a sensor network locally, avoiding as much as possible unnecessary transmission of information to (potentially remote) centralized servers (i.e., information collectors). We are especially interested in queries that combine information from neighbor nodes, instead of monitoring simple aggregate results in a spatial region. An interesting class of such queries is spatial-pattern queries (a.k.a. structural spatial queries [PMD98]), which are generalizations of spatial joins. An example of a query in this class is “a high-temperature reading (>50 degrees) close to and surrounded by at least four low-humidity readings ( |
List of Research Outputs |
Hadjieleftheriou M., Mamoulis N. and Tao Y., Continuous Constraint Query Evaluation for Spatiotemporal Streams, 10th International Symposium on Spatial and Temporal Databases (SSTD). 2007. |
Mamoulis N., Yiu M.L., Cheng K.H. and Cheung D.W.L., Efficient Top-k Aggregation of Ranked Inputs, ACM Transactions on Database Systems . Association of Computing Machinery, 2007, 32(3). |
U
L.H., Mamoulis N. and Yiu M.L., Continuous Monitoring of
Exclusive Closest Pairs, Proceedings of the 10th International Symposium
on Spatial and Temporal Databases (SSTD) . |
Wong W.K., Cheung D.W.L., Hung E., Kao C.M. and Mamoulis N., Security in Outsourcing of Association Rule Mining, The 33rd International Conference on Very Large Data Bases. 2007. |
Yiu M.L., Mamoulis N. and Bakiras S., Retrieval of Spatial Join Pattern Instances from Sensor Networks, 19th International Conference on Scientific and Statistical Database Management (SSDBM). 2007. |
Yiu M.L., Tao Y. and Mamoulis N., The Bdual-Tree: Indexing Moving Objects by Space-Filling Curves in the Dual Space, the VLDB Journal. Springer, 2008, 17(3): 379-400. |
Researcher
: Man LY |
List of Research Outputs |
Chow
K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT
Monitoring System for Piracy Detection, The Second International
Conference on Internet Monitoring and Protection, ICIMP 2007. |
Researcher
: Mei L |
List of Research Outputs |
Mei L., Chan W.K. and Tse T.H., Data flow testing of service-oriented workflow applications, Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), ACM Press, New York, NY (acceptance rate: 15.1%). 2008, 371−380. |
Researcher
: Peng Z |
List of Research Outputs |
Peng
Z., Ting
H.F. and Berry V., From Constrained To Unconstrained Maximum Agreement
Subtree In Linear Time, In: M.Y. Kao, Algorithmica. |
Ting H.F. and Peng Z., Guided forest edited distance: Better structure comparisons by using domain knowledge, In: Bin Ma, Kaizhong Zhang, Proceedings of the 18th Annual Symposium on Combinatorial Pattern Matching. Springer, 2007, 195-204. |
Researcher
: Peng Z |
List of Research Outputs |
Peng
Z., Ting
H.F. and Berry V., From Constrained To Unconstrained Maximum Agreement
Subtree In Linear Time, In: M.Y. Kao, Algorithmica. |
Ting H.F. and Peng Z., Guided forest edited distance: Better structure comparisons by using domain knowledge, In: Bin Ma, Kaizhong Zhang, Proceedings of the 18th Annual Symposium on Combinatorial Pattern Matching. Springer, 2007, 195-204. |
Researcher
: Pun KH |
Project Title: |
Community Legal Information Project |
Investigator(s): |
Pun KH |
Department: |
Computer Science |
Source(s) of Funding: |
Department of Justice, HKSAR Government - General Award |
Start Date: |
04/2004 |
Abstract: |
To study community legal information. |
List of Research Outputs |
Chow
K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT
Monitoring System for Piracy Detection, The Second International
Conference on Internet Monitoring and Protection, ICIMP 2007. |
Li Z., Chong
C.F., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., An Attack on Libert et
al.’s ID-Based Undeniable Signature Scheme, International Journal of
Network Security. |
Researcher
: Siu MH |
List of Research Outputs |
Chin
F.Y.L., Leung C.M., Siu M.H. and Yiu S.M., Optimal Algorithm for Finding
DNA Motifs with Nucleotide Adjacent Dependency, The Sixth Asia-Pacific
Bioinformatics Conference (APBC 2008). |
Leung
C.M., Siu M.H., Yiu S.M., Chin F.Y.L. and Sung K.W.K., Finding
Linear Motif Pair from Protein Interaction Networks: A Probabilistic
Approach, The 6th Annual International Conference on Computational Systems
Bioinformatics Conference (CSB 2007). |
Researcher
: Su Q |
List of Research Outputs |
Su Q., Wong K.K.Y. and Fung S.K., A Semi-Automatic
Clustering-Based Level Set Method for Segmentation of Endocardium from MSCT
Images, 29th Annual International Conference of the IEEE Engineering in
Medicine and Biology Society. |
Researcher
: Tam SL |
List of Research Outputs |
Hon W.K., Lam T.W., Shah R., Tam S.L. and Vitter J., Cache-Oblivious Index for Approximate String Matching, The 18th Annual Symposium on Combinatorial Pattern Matching (CPM). 2007. |
Hon W.K., Lam T.W., Shah R.A.H.U.L., Tam S.L. and Vitter J.S., Compressed Index for Dictionary Matching, IEEE Data Compression Conference. IEEE Computer Society, 2008, 23-32. |
Lam T.W., Sung W.K., Tam S.L., Wong C.K. and Yiu S.M., An Experimental Study of Compressed Indexing and Local Alignments of DNA, First International Conference on Combinatorial Optimization and Applications. Springer, 2007, 242-254. |
Lam
T.W., Sung W.K., Tam S.L.,
Wong C.K. and Yiu S.M., Compressed indexing and local
alignment of DNA, Bioinformatics. |
Lam T.W., Sung W.K., Tam S.L. and Yiu S.M., Space Efficient Indexes for String Matching with Don't Cares, The 18th International Symposium on Algorithms and Computation . Springer, 2007, 846-857. |
Researcher
: Tan H |
List of Research Outputs |
Xu S.H., Tan H., Jiao X., Lau F.C.M. and Pan Y., A Generic Pigment Model for Digital Painting, Computer Graphics Forum. 2007, 26. |
Xu S.H., Tan H., Jiao X., Lau F.C.M. and Pan Y., A Generic Pigment Model for Digital Painting, Eurographics 2007. |
Researcher
: Ting HF |
Project Title: |
Algorithmic issues on designing media-on-demand systems |
Investigator(s): |
Ting HF, Lam TW |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
08/2002 |
Abstract: |
With the use of relative-competitive analysis for online systems, the project attempts to provide a theoretical foundation for comparing different media-on-demand (MOD) systems and thus helps to decide scientifically the right configurations. It is anticipated that results of the analysis can be used to design schedulers with performance guarantee and implement computational tools for building cost-effective MOD systems. |
Project Title: |
Design and analysis of algorithms for constrained structure comparisons |
Investigator(s): |
Ting HF |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
08/2006 |
Abstract: |
1 (The motivation and background for the objectives are given in the next sections.) We design efficient algorithms for the Constrained Maximum agreement subtree (CMAST) problem and the Constrained Forest Edit-Distance (CFED) problem, which find important applications in bioinformatics, especially in comparative and evolutionary genomics. 2 We implement our algorithms and develop a Web-based tool that allows other biologists use our algorithms to solve their problems. 3 We gain, from our study, insights into the underlying intricacy of a new class of problems, namely the constrained combinatorial optimization problems, and develop general algorithmic techniques for them. 4 We explore a new problem solving methodolgy, namely knwoledge-based problem solving, and study how domain knowledge help us solve difficult problems. |
List of Research Outputs |
Chin
F.Y.L., Ting H.F. and
Zhang Y., A Constant-competitive Algorithm for Online OVSF Code Assignment, The
18th International Symposium on Algorithms and Computation (ISAAC 2007). |
Hung
R.Y.S. and Ting H.F.,
Competitive analysis of most-request-first for scheduling broadcasts with
start-up delay, In: G. Ausiello, and D. Sannella , Theoretical Computer
Science. |
Hung R.Y.S., Lai K.F. and Ting H.F., Finding Frequent Items in a Turnstile Data Stream, In: Xiaodong Hu, and Jie Wang, Proceedings of the 14th Annual International Symposium on Theoretical Informatics. Springer, 2008, 498--509. |
Hung
R.Y.S. and Ting H.F.,
Finding Heavy Hitters Over The Sliding Window Of A Weighted Data Stream, In:
Eduardo Laber, Proceedings of the 8th |
Peng
Z., Ting H.F. and Berry
V., From Constrained To Unconstrained Maximum Agreement Subtree In Linear
Time, In: M.Y. Kao, Algorithmica. |
Ting
H.F., A Near Optimal Scheduler For On-demand
Data Broadcasts, In: G. Ausiello and D. Sannella , Theoretical Computer
Science. |
Ting H.F. and Peng Z., Guided forest edited distance: Better structure comparisons by using domain knowledge, In: Bin Ma, Kaizhong Zhang, Proceedings of the 18th Annual Symposium on Combinatorial Pattern Matching. Springer, 2007, 195-204. |
Researcher
: Towey DP |
List of Research Outputs |
Chan
K.P., Chen T.Y. and Towey
D.P., Controlling Restricted Random Testing: An Examination of the
Exclusion Ratio Parameter, The Nineteenth International Conference on
Software Engineering and Knowledge Engineering. |
Researcher
: Tsang CKK |
List of Research Outputs |
Tsang C.K.K., Wang C.L. and Lau F.C.M., Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks (Best Paper Award), The 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2008). IEEE, 2008, 45 - 52. |
Tsang C.K.K., Wang C.L. and Lau F.C.M., Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks, The 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN). IEEE Computer Society Press, 2008. |
Researcher
: Tsang WW |
Project Title: |
Tests for uniformity |
Investigator(s): |
Tsang WW, Chow KP, Hui CK, Chan HW, Chong CF, Pun KH |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2005 |
Abstract: |
To develop accurate and easy-to-compute C programs for the cumulative distribution functions of the KS statistic and the Anderson-Darling statistic; to conduct a fair and thorough comparison on the power of various tests for uniformity; to develop new tests for uniformity. |
Project Title: |
Evaluating the CDF of the Kolmogorov Statistic for unknown parameter case |
Investigator(s): |
Tsang WW, Chong CF |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
09/2005 |
Abstract: |
A goodness-of-fit test checks whether a set of samples follows a hypothetical distribution. The most common test for checking discrete samples is the chi-square test. The counterpart for real samples is the Kolmogorov-Smirnov (KS) test [3,5]. Consider an ordered set of samples, x1≤x2≤…≤xn, and the hypothetical distribution, F(x), where all parameters of F(x) are known. The empirical distribution function (EDF) is defined as / | 0, x < x1, Fn(x) = < k/n , xk ≤ x < xk+1, k = 1,2,…,n-1, | 1, xn ≤ x. \The Kolmogorov statistic, Dn, measures the maximum absolute distance between F(x) and Fn(x). The test result is conventionally determined by looking up tables of the critical values of Dn obtained from simulation [6]. In 2003, we developed a program that evaluates the cumulative distribution function (CDF) of Dn with 13-digit accuracy for 2 ≤ n ≤ 16000 [4]. The test result can thus be determined from the CDF of Dn. However, the KS test is still not quit readily applicable because the parameters of F(x) are often unspecified in real world applications. For example, in the testing of exponentiality, usually we have no idea on the mean of the exponential distribution. Therefore, we need to first estimate the mean from the samples. Then we check whether the samples follow the exponential distribution of this mean. The Dn so computed is noticeably smaller than that of the case where the mean is known beforehand. Durbin is the first scholar who advocates the study of the difference between the two cases [1,2]. Stephens has worked out a couple approximation formulas for the CDFs of two unknown parameter cases [7]. However, these formulas deviate from the true values by as much as 2%. Such extent of errors is not cmmensurate with the modern computing capability. The objective of this project is to develop accurate computer programs that evaluate the CDFs of Dn for the tests of normality and exponentiality, the two most common goodness-of-fit tests in unknown parameter case.Reference[1] J. Durbin, Distribution theory for tests based on the sample distribution function, Regional Conference Series in Applied Mathematics (9), SIAM, Philadelphia, 1973.[2] J. Durbin, Kolmogorov-smirnov tests when parameters are estimated, with applications to tests of exponentiality and tests on spacings, Biometrika, 62(1): 5-22, 1975.[3] A. Kolmogorov, Sulla determinazione empirical ei una legge di distributione, Giornale Dell' Istituto Italiano Degli Attuari, 4:83-91, 1933.[4] G. Marsaglia, W. W. Tsang and J. Wang, Evaluating Kolmogorov's distribution, Journal of Statistical Software, 8(18): 1-4, 2003.[5] N. V. Smirnov, On the deviation of the empirical distribution function, Recreational Mathematics (Mat. Sbornik), 6:3-26, 1939.[6] M. A. Stephens, EDF statistics for goodness of fit and some comparisons, Journal of the American Statistical Association, 69 (347): 730-737, 1974.[7] M. A. Stephens, Asymptotic results for goodness-of-fit statistics with unknown parameters, Annuals of Statistics, 4:357-369, 1976. |
Project Title: |
Evaluating the CDFs of the Anderson-Darling Statistics for normality and exponentiality testing |
Investigator(s): |
Tsang WW |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
12/2006 |
Abstract: |
A goodness-of-fit test checks whether a
set of samples follows a hypothetical distribution. The most common test for
checking discrete samples is the Pearson’s chi-square test. The most common
one for checking real samples is the Kolmogorov-Smirnov (KS) test [6,8]. The
Anderson-Darling (AD) test is another test for checking real samples [1,2].
Consider an ordered set of samples, x1≤x2≤…≤xn, and the hypothetical distribution, F(x), whose parameters are
completely specified. The empirical distribution function (EDF) is denoted as
Fn(x). Fn(x) equals 0 when x < x1, equals k/n when xk ≤ x ≤ xk+1 for k = 1,2,.,n-1, and equals 1
when xn ≤ x. The KS statistic, Dn, measures the
maximum absolute distance between F(x) and Fn(x). The AD statistic, An,
measures the weighted sum of the squares of the differences between F(x) and
Fn(x). The AD test is a special case of the Cramer-von Mises approach. It is
more powerful than the KS test [9]. Both Dn and An are distribution-free. The
cumulative distribution function (CDF) of An is difficult to evaluate. T. W.
Anderson and D. A. Darling have given an integration formula for the limiting
CDF [1]. In 1954, they computed critical values of three significant levels
of the limiting CDF using numerical integration [2]. P. A. W. Lewis tabulated
the CDF of An for n = 1 to 8 and n = ∞ in 1961 [11]. He only evaluated the
first two terms of a series expansion of the CDF. In 1974, Stevens gave
tables of critical values for the limiting CDF [9]. In 1988, C. D. Sinclair
and B. D. Spurr gave two approximation formulas for the limiting CDF [7]. In
2000, D. E. A. Giles derived a saddlepoint approximation for the limiting CDF
[5]. His formula has accuracy similar to the Sinclair’s in the right tail of
the distribution but superior in the left tail. The accuracy of the formulas
or critical values mentioned above is at best 4 to 5 digits. In real life
applications, the parameters of a hypothetical distribution are often not
known. For example, in the testing of normality, usually we first estimate
the mean and variance from the samples. Then we check whether the samples
follow the normal distribution with such mean and variance. A test statistic,
Dn or An, so computed is noticeably smaller than that of the case where the
mean and variance are known beforehand. J. Durbin is the first scholar who
advocates the study of the difference between the known (completely
specified) and unknown parameter cases [3,4]. The statistics in the latter
are not distribution free, i.e., the distribution of Dn or An depends on
F(x). Durbin has derived a formula for the limiting CDF of An for
exponentiality testing. However, his approach is computationally unstable in
the crucial right tail region. M. A. Stephens has tabulated a table of
critical values of An for normality and exponentiality testing from
simulation results [10]. These values have about 2-digit accuracy in general
but deviate from the true ones by as much as 2% in some cases. The objective
of this project is to develop computer programs that evaluate the CDFs of the
AD statistics in two most common applications 1. To develop a computer
program that evaluates the CDF of the AD statistic for normality testing when
the mean and variance are estimated from the samples being tested. No such
program is currently available. A few critical values of the CDF found in
literature deviate from the true values by as much as 2%. We aim at achieving
an accuracy of 3 digits. 2. To develop a computer program that evaluates the
CDF of the AD statistic for exponentiality testing when the mean is estimated
from the samples being tested. No such program is currently available. A few
critical values found in literature deviate from the true values by as much
as 2%. We aim at achieving an accuracy of 3 digits. References [1] T. W. Anderson
and D. A. Darling, Asymptotic theory of certain ‘goodness-of-fit’ criteria
based on stochastic processes, Ann. Math. Stat., 23 193-212, 1952. [2] T. W.
Anderson and D. A. Darling, A test of goodness of fit, J. Amer. Stat., Assn.,
49 765-769, 1954. [3] J. Durbin, Distribution theory for tests based on the
sample distribution function, Regional Conference Series in Applied
Mathematics (9), |
List of Research Outputs |
Chow
K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT
Monitoring System for Piracy Detection, The Second International
Conference on Internet Monitoring and Protection, ICIMP 2007. |
Li Z., Chong
C.F., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., An Attack on Libert et al.’s
ID-Based Undeniable Signature Scheme, International Journal of Network
Security. |
Researcher
: Tse TH |
Project Title: |
Towards an integrated method for program verification, testing and debugging |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Incentive Award for RGC CERG Fundable But Not Funded Projects |
Start Date: |
07/2003 |
Abstract: |
N/A |
Project Title: |
Towards an integrated method for program testing, proving debugging |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To provide an integrated method for testing, proving and debugging; to reduce the cost of software quality assurance by improving on individual techniques for testing, proving and debugging; to improve on the quality and relaibility of the software thus produced; to provide software engineers with effective testing, proving and debugging tools. |
Project Title: |
27th Annual international computer software and applications conference |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Croucher Foundation - Conference / Seminars |
Start Date: |
09/2004 |
Abstract: |
27th Annual international computer software and applications conference |
Project Title: |
TIRAMISU: testing conText-sensItive, concurRent And MIddleware-baSed Ubiquitous software |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
02/2006 |
Abstract: |
Ubiquitous computing means computing
anywhere and at any time. Context-sensitive ubiquitous software dynamically
adapts its operations according to the changing environment. One of the
strategic directions of |
Project Title: |
TIRAMISU: testing context-sensitive, concurrent and middleware-based ubiquitous software |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2006 |
Abstract: |
1 The objectives of the project are as
follows: (a) To provide integration testing techniques for context-sensitive
concurrent middleware-based ubiquitous systems, (b) To provide unit testing
techniques for context-sensitive concurrent middleware-based ubiquitous
systems, (c) To provide software engineers with effective testing procedures
and tools for context-sensitive software, and (d) To improve on the quality and
reliability of ubiquitous software. 2 The proposed project has important
theoretical and practical implications: (i) State explosion is an open
problem in software testing and verification. It becomes significantly worse
in context-sensitive and concurrent ubiquitous software. This project will
address the problem using an enhanced form of extension particularly suitable
for conformance testing. (ii) Results of context-sensitive ubiquitous
applications may be hidden behind a hardware-software architecture so that
they cannot easily be observed or recorded. This project will address the
problem of testing context-sensitive software without precise oracles. (iii)
Formal methods such as model checking and static analysis are gaining
acceptance by practicing software engineers in recent years. This project
will help accelerate this trend by demonstrating the usefulness of the CSP
model for software engineering and software testing. (iv) The project will
provide practical procedures and tools for software engineers to enhance the
efficacy of software quality assurance, thus improving the cost-effectiveness
of software development. (v) The usefulness of the testing techniques will be
evaluated by experimental studies based on simulated and empirical data. (vi)
The results of the project are important to the quality assurance of
context-sensitive ubiquitous applications in |
Project Title: |
An extensible fault-based predicate testing toolset for wireless sensor network software applications |
Investigator(s): |
Tse TH, Chan WK |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Support Programme |
Start Date: |
09/2006 |
Abstract: |
The primary objective is to design and implement a predicate testing toolset for the development of wireless sensor network (WSN) applications running on TinyOS using nesC as the implementation language. TinyOS is the de facto state-of-the-art operating system for WSN applications. nesC is the de facto development language for TinyOS. Other objective include: (i) to formulate product-one architecture for the testing of embedded software; (ii) to enhance experience in the area of embedded software engineering; (ii) to improve on the quality of WSN applications; (iv) to improve on the quality of WSN applications; (v) to test and enrich the capability of the fault class hieracrhy and gain further insights on predicate testing; and (vi) to provide the industry with a user-friendly toolset for the development of WSN applications. |
List of Research Outputs |
Chan W.K., Ho J.C.F., Tse T.H. and Yu Y.T., Piping classification to metamorphic testing: an empirical study towards better effectiveness for the identification of failures in mesh simplification programs, Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), IEEE Computer Society Press, Los Alamitos, CA (acceptance rate: 18%). Los Alamitos, California, IEEE Computer Society Press, 2007, 397−404. |
Chen H.Y., Li C. and Tse T.H., Transformation of UML interaction diagrams into contract specifications for object-oriented testing, Proceedings of the 2007 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2007), IEEE Computer Society Press, Los Alamitos, CA. 2007, 1298−1303. |
Feng X., Parnas D.L. and Tse T.H., Tabular expression-based testing strategies: a comparison, Proceedings of the Testing: Academic and Industrial Conference: Practice And Research Techniques (TAIC PART 2007), IEEE Computer Society Press, Los Alamitos, CA. IEEE Computer Society Press, Los Alamitos, California, 2007, 134. |
Lu H., Chan W.K. and Tse T.H., Testing pervasive software in the presence of context inconsistency resolution services, Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), ACM Press, New York, NY (acceptance rate: 15.1%). 2008, 61−70. |
Mathur A.P., Wong W.E. and Tse T.H., Guest Editor, Special Issue for the Seventh International Conference on Quality Software , Journal of Systems and Software. Elsevier, Amsterdam, 2008, 81. |
Mei H. and Tse T.H., Guest editors' introduction, Special Issue on Quality Software, International Journal of Software Engineering and Knowledge Engineering. 2007, 17 (6): 687−688. |
Mei L., Chan W.K. and Tse T.H., Data flow testing of service-oriented workflow applications, Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), ACM Press, New York, NY (acceptance rate: 15.1%). 2008, 371−380. |
Tse T.H., "Come, come, my lords; These oracles are hardly attain'd, And hardly understood": confessions of a software tester, Pro Vice Chancellor (Research) Visiting Professor Lecture, Swinburne University of Technology, Melbourne, Australia. 2007. |
Tse T.H., Cover Design, Proceedings of the 7th International Conference on Quality Software (QSIC 2007), IEEE Computer Society Press, Los Alamitos, CA. 2007. |
Tse T.H. and Wong W.E., Editorial, Special Issue on Model-Based Software Testing, Journal of Systems and Software. Amsterdam, The Netherlands, Elsevier, 2008, 81 (2): 159−160. |
Tse T.H., Foundation Editor, Journal for Universal Computer Science. Springer, Berlin, 2008. |
Tse T.H. and Wong W.E., Guest Editor, Special Issue on Model-Based Software Testing, Journal of Systems and Software. Amsterdam, The Netherlands, Elsevier, Amsterdam, 2008, 81 (2). |
Tse T.H., Guest Editor, Special Issue on Quality Software, International Journal of Software Engineering and Knowledge Engineering. World Scientific, Singapore, 2008, 11 (2). |
Tse T.H., Long Service Award, The University of Hong Kong. 2008. |
Tse T.H., Member of Editorial Board, Journal of Systems and Software. Elsevier, Amsterdam, 2008. |
Tse T.H., Member of Editorial Board, Software Testing, Verification and Reliability. Wiley, New York, NY, 2008. |
Tse T.H., Lau F.C.M., Chan W.K., Liu P.C.K. and Luk C.K.F., Testing of object-oriented industrial software without precise oracles or results, Communications of the ACM (acceptance rate: < 15%). New York, ACM Press, 2007, 50 (8): 78−85. |
Tse T.H., Testing of real-life object-oriented software: challenges and solutions, Information and Communication Technologies Research Seminar, Swinburne University of Technology, Melbourne, Australia. 2007. |
Tse T.H., Tie and Scarf Design, Hong Kong Joint Council for People with Disabilities. 2007. |
Tse T.H., Visiting Professor, Swinburne University of Technology, Australia. 2007. |
Wong W.E., Tse T.H., Glass R.L., Basili V.R. and Chen T.Y., An assessment of systems and software engineering scholars and institutions (2001−2005), Journal of Systems and Software. 2008, 81 (6): 1059−1062. |
Zhang Z., Chan W.K. and Tse T.H., Synthesizing component-based WSN applications via automatic combination of code optimization techniques, Proceedings of the 7th International Conference on Quality Software (QSIC 2007), IEEE Computer Society Press, Los Alamitos, CA. 2007, 181−190. |
Researcher
: U LH |
List of Research Outputs |
U L.H., Mamoulis N. and Yiu M.L., Continuous Monitoring of Exclusive Closest Pairs, Proceedings of the 10th International Symposium on Spatial and Temporal Databases (SSTD) . Boston, MA, US, Springer, 2007, 4605: 1-19. |
Researcher
: Wang CL |
Project Title: |
The HKU Grid Computing Research Center |
Investigator(s): |
Wang CL, Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
The University of Hong Kong Foundation Seed Grant |
Start Date: |
07/2003 |
Abstract: |
To share resources and knowledge under the theme of grid computing; to collaborate on a joint effort to develop the Hong Kong grid which will then contribute to the China National Grid and the Asia-Pacific Grid. |
Project Title: |
A component-based software architecture for context-aware pervasive computing |
Investigator(s): |
Wang CL, Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To carry out: (1) proactive and context-aware adaptation: to realize the functionality adaptation. The proposed adaptation mechanism should be able to proactively discover contextual information and make applications constantly adapt to the changing environment. (2) mobility Support: to explore the possibilities of using the facet model to achieve better mobility in the pervasive world. In particular, the proposed system will support user mobility, which allows nomadic users to continue their job while switching from device to device. (3) software Extensibility: to build a real-life pervasive application using facets, to demonstrate that the functionalities and the scale of the application could be very extensibe and no longer be restricted by the resource-constrained devices. |
Project Title: |
Session continuity for mobile computing |
Investigator(s): |
Wang CL |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
11/2004 |
Abstract: |
To construct the missing session layer support on top of the TCP, which masks network changes caused by terminal mobility from the applications, thereby maintaining virtually uninterrupted dialogs between endpoints; to design a name service which supports flexible mappings between logical entities and their network addresses, and to tackle the inherent performance issues. |
Project Title: |
Enhanced Distributed JVM for Large-scale Scientific Applications |
Investigator(s): |
Wang CL |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
04/2006 |
Abstract: |
Many large-scale scientific and commercial data-mining applications are written in Java. These applications are in great need of a huge virtual memory to keep the created Java objects in memory for computation. In this research, we will introduce a cluster middleware, a Distributed JVM (DJVM) that can group the memory in all computing nodes (PCs or servers) to support parallel execution of large-scale memory-demanding Java applications. The DJVM will be built at the virtual machine level and it can make a cluster appear as a single, multi-processor machine to Java applications. Existing JVM or DJVM prototypes don't provide solutions for the problem of supporting huge virtula memory. A sinlge machine JVM can support up to 2GB memory space, which is insufficient for running an application with large data set. Previous approaches in DJVM have limitation in the JVM heap management in supporting an address space larger than 2GB in a 32-bit platform. The difficulties come from two aspects. (1) The JVM specification defines the size of the object refence as a word in a physical machine. On 32-bit machines, it is therefore 32-bit. Extending the address space will need to revise the JVM specification substantially. (2) All previous DJVMs are based on some open-source JVM implementations, which tends to follow the orginal specification. For new implementation, new and careful design in JVM heap and JIT compilers is needed in the DJVM kernel for manipulating of Java references, which is a non-trivious task. It needs to involve complex transformations of new reference type on the 32-bit platforms.To make the existing applications able to be transparently migrated to the new platform, we also need to make sure the Java libraries and latest APIs used by the Java applications can be executed on DJVM. To incorporate different Java libraries in a DJVM is a challenge because a JVM is often shipped with its own class libraries. Simply setting class search path or copying class libraries in the DJVM directories will not work. There are many compatibility problems to solve for a JVM to use another JVM's libraries. A DJVM needs to find a portable and flexible method to solve the transplant of Java libraries for the applications to use. |
Project Title: |
An advanced distributed java virtual machine on commodity clusters for high-performance memory-intensive computing |
Investigator(s): |
Wang CL, Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2006 |
Abstract: |
(1) n a distributed Java Virtual Machine (DJVM), threads in a Java program are mapped to different computing nodes for execution and a shared global heap created from the memory of all the participating nodes allows data sharing among physically distributed threads. The state-of-the-art DJVMs can perform thread-to-processor remapping via thread migration to achieve load balancing. Multithreaded programming on a DJVM has the potential to become a preferred approach to high-performance computing. The hurdle, however, lies in the situation where many scientific problems in real life today have huge memory consumptions which are beyond what existing DJVM systems can offer. To our best knowledge, none of the existing DJVMs developed for commodity 32-bit PC clusters can offer cluster-wide sharable memory space exceeding 4 gigabytes (the size limit of virtual memory that a single 32-bit machine can address) no matter how many cluster nodes are used. (2) In this research, we propose to elevate DJVM technologies to a new level so that the new DJVM could support any memory-intensive scientific computing application using commodity 32-bit PC clusters. In the new DJVM, we will build a huge global object space (HGOS), a shared global heap that spans all the cluster nodes and can be larger than 4GB for storing a huge number of objects or very big objects. When large-size objects are in the HGOS, locality of reference becomes an important issue. We consider thread migration a good mechanism to achieve better locality, which can avoid unnecessary data migration. Nevertheless, distributed Java thread execution on a DJVM with thread migration will exhibit different behaviors over time that are not easily captured. The workload of a thread will change after migration because the object access cost will change with the change of execution location. The cache coherence overhead depends on the actual thread location and the sharing status that are only known at execution time. All these will make the workload of the system very unpredictable as compared with those using traditional message-passing solutions. The benefit of thread migration is therefore difficult to be estimated, and such simple heuristics as considering only the workloads of cluster nodes (based on the assumption that workload remains unchanged after migration) will not work. In this research, we propose to build a new DJVM having the following distinctive features. (A) Huge global object space support: To support a huge Java heap with size that can scale with the cluster size, and we will support cluster-wide 64-bit object reference for identifying and locating objects in a 32-bit commodity cluster. New addressing scheme will be developed for accessing segmented objects that are distributed among cluster nodes. (B) Fast wide address translation: As the hardware only supports a 32-bit addressing space, we need a fast software solution to translate the wide references to 32-bit references. An extended pointer swizzling method using a page faulting mechanism will be studied for achieving fast wide address translation and to avoid unnecessary object checking overheads.(C) HGOS-aware cache coherence protocol. As we support large objects that could be allocated across cluster nodes, new cache coherence protocol catered for the HGOS will be developed. Efficient whole object and segmented object caching mechanisms in line with the Java memory model will be explored for efficient object accesses in a cluster environment. (D) HGOS-directed workload model. We will investigate and propose a thread-centric load model to capture the migration benefits under the HGOS. The load model should reflect the explicit communication cost in accessing remote objects and the implicit cost embodied in the cache coherence protocol. A runtime profiling method using JIT-compilation techniques will be used to analyze thread stack contexts for approximating the workload of a thread and its migration benefits.(E) New thread migration policies: Migration policies will be devised based on the proposed workload model for choosing threads for migration to achieve maximum profits. We allow thread migration to take place when (1) thread migration can reduce the object access cost; (2) the workload among the cluster nodes is imbalanced, or (3) new nodes are added to participate in the computation.The proposed solutions make it possible to realize high-performance memory-intensive computations using commodity PC clusters based on the Java multithreading programming paradigm. The implementations of the new DJVM will follow the Java language specification without introducing new APIs or language modifications, which allows any existing Java program that runs on a single-node JVM to run on a cluster without any modification. Therefore, ordinary programmers do not need to learn new complicated parallel languages or runtime systems, such as MPI or software distributed shared memory (DSM). The latter approaches tend to impose a steep learning curve because they use explicit messaging passing or programmer-directed data partitioning to achieve efficient parallel execution. |
List of Research Outputs |
Chen L., Wang C.L. and Lau F.C.M., Process Reassignment with Reduced Migration Cost in Grid Load Rebalancing, 17th International Heterogeneity in Computing Workshop (HCW 2008) . IEEE, 2008. |
Ho C.Y., Wang C.L. and Lau F.C.M., Scalable Group-based Checkpoint/restart For Large-scale Message-passing Systems, Proceedings Of The 2008 Ieee International Parallel & Distributed Processing Symposium (ipdps 2008). IEEE, 2008. |
Ho S.C., Wang C.L. and Lau F.C.M., Lightweight Process Migration and Memory Prefetching in openMosix, Proceedings of 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS 2008). Miami, USA, IEEE, 2008. |
Hu H. and Wang C.L., GPS-Based Location Extraction and Presence Management for Mobile Instant Messenger, 2007 IFIP International Conference on Embedded and Ubiquitous Computing (EUC'2007), December 17-20, 2007, Taipei Taiwan.. Berlin, Springer, 2007, 309-320. |
Tang F.L., Guo M.Y., Li M.L., Wang C.L. and Dong M., Secure Routing for Wireless Mesh Sensor Networks in Pervasive Environment, International Journal on Intelligent Control and Systems . World Scientific Publishing, 2007, 12: 293-306. |
Tsang C.K.K., Wang C.L. and Lau F.C.M., Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks (Best Paper Award), The 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN 2008). IEEE, 2008, 45 - 52. |
Tsang C.K.K., Wang C.L. and Lau F.C.M., Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks, The 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN). IEEE Computer Society Press, 2008. |
Wang C.L., Computation Migration Techniques for Grid Computing (Invited Talk), The 4th Workshop on Grid Technologies and Applications (WoGTA’07). 2007. |
Yu C.H., Lau F.C.M. and Wang C.L., Recycling Memory Blocks for Improving Execution of Java Programs, ACM Transactions on Architecture and Code Optimization. ACM, 2008, 4. |
Researcher
: Wang R |
List of Research Outputs |
Wang R., Lau F.C.M. and Zhao Y.C., Hamiltonicity of Regular Graphs and Blocks of Consecutive Ones in Symmetric Matrices, Discrete Applied Mathematics. 2007, 155: 2312-2320. |
Wang R., Lau F.C.M. and Liu Y.Y., On The Hardness Of Minimizing Space For All-shortest-path Interval Routing Schemes, Theoretical Computer Science. 2007, 389: 250-264. |
Wang R. and Lau F.C.M., Optimal gossiping in square 2D meshes, Theoretical Computer Science. 2007, 384: 263-286. |
Researcher
: Wang WP |
Project Title: |
Collision detection of moving ellipses and ellipsoids |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
10/2002 |
Abstract: |
To study the collision detection problem between moving ellipses in 2D plane and ellipsoids in 3D space. Specially, based on the PI's recent study on the algebraic properties of the arrangement of two ellipsoids. |
Project Title: |
New methods for collision detection of ellipsoids |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Abstract: |
To develop methods of collision detection of moving ellipsoids in the following three different cases: i) motions expressible as rational functions of time; ii) motions expressible by analytical functions of time; continuous motions, which include the important class of continuous but "non-smooth' motions due to interactive user control or constant interaction with surrounding objects in a VR or computer game application. |
Project Title: |
Continuous collision detection for composite quadric models in computer graphics |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
07/2006 |
Abstract: |
Establish algebraic conditions to characterize contact configurations of commonly used quadrics, such as ellipsoids, cones and cylinders, in 3D. Based on the above results, develop efficient algorithms for continuous collision detection of composite quadric models in the case where the intersection curves are conics. |
Project Title: |
New technology for real time and accurate collision detection in computer games and simulation |
Investigator(s): |
Wang WP, Choi YK, Liu Y, Lu L, Zheng D |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Support Programme |
Start Date: |
09/2006 |
Abstract: |
In this project we aim to develop this collision detection technology from basic research results into an easy-to-use software tool kit that emcompasses an array of functions for collision detection of ellipsoids in various application scenarios in computer games and 3D interactive virtual environments. For compatibility with using boxes as bounding volumes, collision detection between boxes and ellipsoids will also be implemented. We will develop a prototype to demonstrate the utility and advantage of new collision detection technology. Our software tool kit will be cross-platofrm and open source in order to maximize its benefit to the computer game community in Hong Kong. |
Project Title: |
Computational algebraic geometry for industrial applications |
Investigator(s): |
Wang WP, Choi YK |
Department: |
Computer Science |
Source(s) of Funding: |
France/Hong Kong Joint Research Scheme - Travel Grants |
Start Date: |
01/2007 |
Abstract: |
1. Shape segmentation and representation using quadrics 2. Shape processing using quadrics 3. Collision detection for objects defined by quadric surfaces 4. Software for algebraic modeling |
Project Title: |
Conmputation of Bounding Ellipsoids |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
01/2007 |
Abstract: |
Bounding volumes of complex 3D shapes are widely used for computation simulation in computer graphic, robotic, biomedical engineering, and CAD/CAM. We propose a novel, efficient optimization method for computing the ellipsoid bounding volumes of 3D objects. The bounding ellipsoids provide a highly compact representation of 3D shapes, which originally are often represented in the verbose format of point samples, mesh surfaces or planar faces. Thus our resarch will be useful to applications in geometric reasoning and processing, collision detection, compression and transmission of geometric data. The objectives of the projects are:1) We shall investigate the novel use of elliptic metric for 3D shape decomposition in the ellipsoid boundingproblem. Preliminary tests have shown advantages of the elliptic metric over the conventional Euclidean metric. 2) A robust and efficient optimization algorithm will be developed for solving the ellipsoid bounding problem, capable of automatic volume-driven component splitting and merging. Information about features or skeletons, when available, will be exploited for good initialization and stable convergence. |
List of Research Outputs |
Bo P. and Wang W.P., Geodesic-controlled developable surfaces for modeling paper bending, Computer Graphics Forum, (Eurographics 2007). 2007, vol. 26, no. 3. |
Chang J.W., Wang W.P. and Kim M.S., E |
Chen F.L., Wang W.P. and Liu Y., Computing singular points of plane rational curves, Journal of Symbolic Computation. 2008, 43, no. 2: 92-117. |
Cheng K.S.D., Wang W.P., Qin H., Wong K.K.Y., Yang H.P. and Liu Y., Design and Analysis of Optimization Methods for Subdivision Surface Fitting, IEEE Transactions on Visualization and Computer Graphics. 2007, 13(5): 878-890. |
Choi Y.K., Li X.Q., Rong F.G., Wang W.P. and Cameron S., Determining directional contact range of two convex polyhedra,, Proceedings of Geometric Modeling and Processing 2008, Hangzhou, China. 2008. |
Kobbelt L. and Wang W.P., (special issue eds), Computer-aided Design, (for the best papers presented at SPM’06), to appear., In: L. Kobbelt and W.P. Wang, Computer-aided Design. 2007. |
Liu
Y. and Wang W.P., A
revisit to least squares orthogonal distance |
Lu L., Choi Y.K., Wang W.P. and Kim M.S., Variational 3D shape segmentation for bounding volume computation, Computer Graphics Forum, (Eurographics 2007). 2007, vol. 26, no. 3. |
Pottmann H., Liu Y., Wallner J., Bobenko A. and Wang W.P., Geometry of multi-layer freeform structures for architecture, ACM Transactions on Graphics, (SIGGRAPH 2007). 2007, vol. 26, no. 2. |
Wang L., Tu C.H., Wang W.P. and Meng X.X., Silhouette smoothing for real-time rendering of mesh surfaces, IEEE Transactions on Visualization and Computer Graphics. 2008, 14, no. 3: 640-652. |
Wang L., Tu C., Wang W.P., Meng X., Chan B. and Yan D., Silhouette smoothing for real-time rendering of mesh surfaces, IEEE Transactions on Visualization and Computer Graphics. USA, IEEE Computer Society, 2008, 14: 640-652. |
Wang W.P., Juttler B., Zheng D. and Liu Y., Computation of rotation minimizing frames, ACM Transactions on Graphics. 2008, 27, Issue 1. |
Wang W.P., Geometric modeling of mesh surfaces with planar faces., The First Computer Mathematic Conference, November 12-15, 2007, Nanchang, China.. 2007. |
Wang W.P., Geometry and computation of planar hexagonal meshes., COMPASS Workshop (Workshop on Computational Methods for Algebraic Spline Surfaces, September, 2007. Strobl, Austria.. 2007. |
Wang W.P., Invited talk at SMI 2008, SMI 2008 (Internal Conference on Shape Moldelling and Applications), June 4-6, 2008, New York, USA.. 2008. |
Wang W.P., Invited talk at SRATC 2008, SRATC 2008 (International Seminar on Symbolic Real Algebra and Trustworthy Computing), April 3-5, 2008, Shanghai.. 2008. |
Wang W.P., Invited to give talk, Dagstuhl Workshop on CAGD, May 2008, Germany.. 2008. |
Wang W.P., Invited to talk at Special Session on Approximation Theory at the FoCM (Foundations of Computational Mathematics) Conference 2008, June, 2008, Hong Kong.. 2008. |
Wang W.P., Meshes with planar faces for shape design in architecture., Chinese Conference on Geometric Design and Computing 2007, July, 2007, Lanzhou, China.. 2007. |
Researcher
: Wong CK |
List of Research Outputs |
Lam T.W., Sung W.K., Tam S.L., Wong C.K. and Yiu S.M., An Experimental Study of Compressed Indexing and Local Alignments of DNA, First International Conference on Combinatorial Optimization and Applications. Springer, 2007, 242-254. |
Lam T.W., Sung W.K., Tam S.L., Wong C.K. and Yiu S.M., Compressed indexing and local alignment of DNA, Bioinformatics. Oxford University Press, 2008, 24 (6): 791-797. |
Researcher
: Wong KF |
List of Research Outputs |
Wong K.F., Chiu Y.S., Lam T.W. and Yiu S.M., A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots, The 5th Asia-Pacific Bioinformatics Conference . World Scientific, 2008, 89-100. |
Researcher
: Wong KKY |
Project Title: |
3D shape recovery of complex objects using a dual-space approach |
Investigator(s): |
Wong KKY |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2006 |
Abstract: |
The main objective of this project is to develop a novel method for reconstructing complex 3D objects with unknown topology using their silhouettes extracted from the image sequences. The proposed method exploits the duality principle governing surface points and their corresponding tangent planes, and enables direct estimation of points on the contour generators. |
Project Title: |
Robust recovery of differential information and object shape from silhouettes of unordered viewpoints |
Investigator(s): |
Wong KKY |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2007 |
Abstract: |
The main objective of this project is to provide a robust computer vision based method for acquiring photorealistic 3D models of real world objects. Traditionally, high quality models are obtained through 3D laser scanners which are often expensive and not portable. The use of computer vision techniques provides a much cheaper alternative, and requires no more than a commercial grade imaging device. This is a vast advantage over laser scanners because no active sensor is required by these techniques, and there are fewer physical restrictions placed upon the object to be acquired. In this project, the silhouettes of the object are exploited to recover the differential properities of the object surface. Silhouettes are the profiles of the objects in the images, and they offer rich information about the shape of the objects. Compared with point features used in traditional photogrammetry algorithms, silhouettes can often be reliably extracted and provide relatively complete shape description about the observed objects. However, silhouettes in multiple views generally do not come with correspondent features, and hence the depth of the points on the silhouettes cannot be directly estimated using traditional stereovision techniques. Existing methods for reconstruction from silhouettes can be classified into two categories, namely volumetric approaches and differential approaches. While the volumetric approaches are more robust to objects with complicated shapes than existing differential approaches, they produce much less accurate surface points than differential approaches. Both the volumetric and differential approaches, however, can only reconstruct the visual hull of the object, and cannot reproduce concavities on the object surface. This project aims at bringing several important improvements over the existing differential approaches proposed by others and by the applicant: I) it can handle a more general configuration consisting of discrete viewpoints (cameras) with arbitrary spatial order, while existing differential approaches generally require the camera to travel a continuous path; II) it can extract a relatively complete and topologically correct surface like the volumetric approaches, while retain the accuracy of the differential approaches; III) it allows the integration of textural or shading information for further refinement of the reconstructed models and introduces concavities on the surface which cannot be inferred from silhouettes alone. To address the first issue, a novel distance measure between cameras is proposed. For each camera, we can dynamically discover the nearby cameras that allow differential structure on the surface to be estimated accurately. The second issue is addressed by introducing a novel generic surface extraction algorithm robust to a variety of topology of the observed object. The algorithm is motivated by the literature of medical image processing, particularly, surface extraction from cross-sections. The solution to the last issue is made possible by the nature of the methods we used to address the first two issues. By directly recovering the differential properties on the surface, we can easily locate the flat areas on the surface, which are de facto the candidate regions for concavities. The surface extraction algorithm we adopted conveniently allows us to insert vertices in the regions of interests, and refinement can then be done more efficiently. The proposed approach does not depend on the spatial order of the viewpoints of the input images, and can robustly reconstruct a complete complex object surface with high accuracy, and with the possibility of further refinement for introducing concavities to the model. |
List of Research Outputs |
Cheng K.S.D., Wang W.P., Qin H., Wong K.K.Y., Yang H.P. and Liu Y., Design and Analysis of Optimization Methods for Subdivision Surface Fitting, IEEE Transactions on Visualization and Computer Graphics. 2007, 13(5): 878-890. |
He X., Yung N.H.C., Chow K.P., Chin F.Y.L., Chung H.Y., Wong K.K.Y. and Tsang K.S.H., Watershed Segmentation with Boundary Curvature Ratio Based Merging Criterion, 9th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2007, 7-12. |
Liang C. and Wong K.K.Y., Exact Visual Hull from Marching Cubes, International Conference on Computer Vision Theory and Applications. Funchal, Madeira, Portugal, 2008, 2: 597-604. |
Liang C. and Wong K.K.Y., Robust Recovery of Shapes with Unknown Topology from the Dual Space, IEEE Transactions on Pattern Analysis and Machine Intelligence . IEEE Computer Society, 2007, 29(12): 2205-2216. |
Su Q., Wong K.K.Y. and Fung S.K., A Semi-Automatic Clustering-Based Level Set Method for Segmentation of Endocardium from MSCT Images, 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Lyon, France, 2007, 6023-6026. |
Yuk S.C., Wong K.K.Y., Chung H.Y., Chow K.P., Chin F.Y.L. and Tsang K.S.H., Object-Based Surveillance Video Retrieval System With Real-Time Indexing Methodology, International Conference on Image Analysis and Recognition. Montreal, Canada, 2007, 626-637. |
Researcher
: Wong KY |
List of Research Outputs |
Wong K.Y. and Yip C.L., A Fast and Noise-tolerant Method for Positioning Centers of Spiraling and Circulating Vector Fields, Proceedings of the 8th Asian Conference on Computer Vision (ACCV-2007). 2007. |
Wong K.Y., Yip C.L. and Li P.W., Automatic tropical cyclone eye fix using genetic algorithm, Expert Systems With Applications. Elsevier, 2008, 34: 643-656. |
Wong K.Y., Positioning patterns from multidimensional data and its applications in meteorology. 2008. |
Researcher
: Wong WK |
List of Research Outputs |
Wong W.K., Cheung D.W.L., Hung E. and Liu H., Protecting Privacy in Incremental Maintenance for Distributed Association Rule Mining, The 12th Pacific-Asia Conference on Knowledge Discovery and Data Mining. 2008. |
Wong W.K., Security in Associate Rule Mining. Hong Kong, 2008. |
Wong W.K., Cheung D.W.L., Hung E., Kao C.M. and Mamoulis N., Security in Outsourcing of Association Rule Mining, The 33rd International Conference on Very Large Data Bases. 2007. |
Researcher
: Yan D |
List of Research Outputs |
Wang L., Tu C., Wang W.P., Meng X., Chan B. and Yan D., Silhouette smoothing for real-time rendering of mesh surfaces, IEEE Transactions on Visualization and Computer Graphics. USA, IEEE Computer Society, 2008, 14: 640-652. |
Researcher
: Yan L |
List of Research Outputs |
Yan L., On The Traffic Flow Control System. 2007. |
Yan L., On Traffic Network Flow Monitoring System . 2007. |
Researcher
: Ye D |
List of Research Outputs |
Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., On-line scheduling of parallel jobs on two machines, Journal of Discrete Algorithms . Amsterdam, The Netherlands, Elsevier Science Publishers B. V., 2008, 6(1): 3-10. |
Researcher
: Yee KC |
List of Research Outputs |
Cheung D.W.L., Yee K.C. and Kwok R.P.M., B2B Exchange Technology Training, Thammasat University. Thailand, 2007. |
Cheung D.W.L., Yee K.C. and Lee T.Y.T., Webformer: A Rapid Application Development Toolkit for Writing Ajax Web Form Applications, International Conference on Distributed Computing and Internet Technology (ICDCIT 2007). Springer Berlin / Heidelberg, 2007, 4882/2007: 248-253. |
Lee S.D., Yee K.C., Cheung D.W.L. and Yuan W., Descriptive Schema: Semantics-based Query Answering, 3rd Semantic Wiki Workshop (SemWiki 2008). 2008. |
Researcher
: Yip CL |
List of Research Outputs |
Wong K.Y. and Yip C.L., A Fast and Noise-tolerant Method for Positioning Centers of Spiraling and Circulating Vector Fields, Proceedings of the 8th Asian Conference on Computer Vision (ACCV-2007). 2007. |
Wong K.Y., Yip C.L. and Li P.W., Automatic tropical cyclone eye fix using genetic algorithm, Expert Systems With Applications. Elsevier, 2008, 34: 643-656. |
Zhang M., Kao C.M., Cheung D.W.L. and Yip C.L., Mining Sequence Patterns in Evolving Databases, In: Hsu, Lee, Temporal and Spatio-Temporal Data Mining. Idea Group Inc., 2007. |
Researcher
: Yiu ML |
List of Research Outputs |
U L.H., Mamoulis N. and Yiu M.L., Continuous Monitoring of Exclusive Closest Pairs, Proceedings of the 10th International Symposium on Spatial and Temporal Databases (SSTD) . Boston, MA, US, Springer, 2007, 4605: 1-19. |
Yiu M.L., Tao Y. and Mamoulis N., The Bdual-Tree: Indexing Moving Objects by Space-Filling Curves in the Dual Space, the VLDB Journal. Springer, 2008, 17(3): 379-400. |
Researcher
: Yiu ML |
List of Research Outputs |
U L.H., Mamoulis N. and Yiu M.L., Continuous Monitoring of Exclusive Closest Pairs, Proceedings of the 10th International Symposium on Spatial and Temporal Databases (SSTD) . Boston, MA, US, Springer, 2007, 4605: 1-19. |
Yiu M.L., Tao Y. and Mamoulis N., The Bdual-Tree: Indexing Moving Objects by Space-Filling Curves in the Dual Space, the VLDB Journal. Springer, 2008, 17(3): 379-400. |
Researcher
: Yiu SM |
Project Title: |
RNA Secondary Structure Prediction with Pseudoknots in Unaligned Sequences |
Investigator(s): |
Yiu SM, Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
09/2006 |
Abstract: |
Ribonucleic acids (RNAs) are molecules that are responsible for regulating many genetic and metabolic activities in cells. RNA is single-stranded and can be considered as a sequence of nucleotides (also known as bases). There are four basic nucleotides, namely, Adenine (A), Cytosine (C), Guanine (G), and Uracil (U). An RNA folds into a 3-dimensional structure by forming pairs of bases using hydrogen bonds and the set of base pairs formed is referred as the secondary structure of the RNA. Each base can at most form a pair with another base. In particular, A-U and C-G form stable pairs and are known as the Watson-Crick base pairs. Other pairings (e.g. A-C) are less stable and seldom exist in RNA molecules, so are usually ignored. The 3-dimensional structure is related to the function of the RNA. Thus, knowing the pairing of the bases can help to predict the 3-dimensional structure as well as the function of the RNA. In this project, we focus on the problem of predicting RNA secondary structure. Given an RNA sequence, there are many different possible secondary structures. To compute the most probable structure, a commonly used measurement is based on the concept of minimzing the total free energy of the substructures (e.g. loops, stacking pairs) formed by the pairings. From a computatioal point of view, the challenge of the RNA secondary structure prediction problem arises from some special structures called "pseudoknots" (see more details in Section VII). Many existing prediction algorithms do not consider pseudoknots, however, pseudoknots are already known to exist in some RNAs. The dynamic programming algorithm [LZP99, ZS84] for computing the optimal secondary structure without pseudoknots based on the free energy minimization model runs in O(n^3) time where n is the length of the RNA sequence. On the other hand, based on some special energy functions, Lyngso and Pederson [LP00] have proven that determining the optimal secondary structure possibly with pseudoknots is NP-hard. When restricting the problem to some special types of pseudoknots, there exist polynomial time algorithms (e.g. [A00, RE99, UHK+99]. However, the time complexity is still high and thus may not be very practical. On the other hand, from some recent studies [e.g. MT02], it was found that to predict the secondary structure of a given RNA sequence, it is more accurate if we also make use of some other RNA sequences which are known to have similar functions as the given RNA sequecne. Roughly speaking, we are given a set of unaligned RNA sequences, the problem is to predict the common secondary structure of these sequences while aligning them at the same time. The intuition behind is that functionally similar RNA sequences usually have similar secondary structures. The alignment of the sequences can guide to locate the important substructures of the secondary structure. Thus, there is a higher chance to get a correct structure. Mathews and Turner [MT02] provided an O(n^6) time algorithm for two sequences without considering pseudoknots and it was shown to be NP-hard for multiple sequences [DB04]. Other works along this direction include [S85, AKS+06, BTZ06, GHS97]. Most of these works do not consider pseudoknots or are heuristics-based.The objective of the project is to study of the problem of predicting the common secondary structure with pseudoknots of a given set of unaligned RNA sequences from both the theoertical and the practical aspects. In particular, we aim at deriving efficient solutions (exact algorithms, approximation algorithms, and/or heuristics-based algorithms) for the following problems. P1) Given two unaligned RNA sequences, the problem is to predict their common secondary structure with "simple pseudoknots (see Section VII for definitions)" based on different optimization criteria (e.g. minimizing the total free energy of the structure, maximizing the number of base pairs).P2) Extend the problem in 1) to other common types of pseudoknots.P3) Extend the problem in 1) and 2) to consider more than two sequences. |
List of Research Outputs |
Chan H.L., Lam T.W., Sung W.K., Wong P.W.H. and Yiu S.M., Non-overlapping Common Substrings Allowing Mutations , Mathematics in Computer Science. Springer, 2008, 543-555. |
Chin F.Y.L., Leung C.M., Siu M.H. and Yiu S.M., Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency, The Sixth Asia-Pacific Bioinformatics Conference (APBC 2008). Kyoto, Japan, 2008, 343-352. |
Chow K.P., Cheng K.Y., Man L.Y., Lai K.Y., Hui C.K., Chong C.F., Pun K.H., Tsang W.W., Chan H.W. and Yiu S.M., BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection, The Second International Conference on Internet Monitoring and Protection, ICIMP 2007. Silicon Valley, USA, IEEE Computer Society Press, 6 pages. |
Jiang L., Hui C.K., Chow K.P., Yiu S.M. and Lai K.Y., Improving Disk Sector Integrity Using 3-dimension Hashing Scheme, The 2007 International Workshop on Forensics for Future Generation Communication Environments. IEEE Computer Society, 2007, 2: 5. |
Jiang L., Hui C.K. and Yiu S.M., Improving Disk Sector Integrity Using k-dimension Hashing, IFIP International Federation for Information Processing. Japan, Springer Boston, 2008, 285: 87-98. |
Lam T.W., Sung W.K., Tam S.L., Wong C.K. and Yiu S.M., An Experimental Study of Compressed Indexing and Local Alignments of DNA, First International Conference on Combinatorial Optimization and Applications. Springer, 2007, 242-254. |
Lam T.W., Sung W.K., Tam S.L., Wong C.K. and Yiu S.M., Compressed indexing and local alignment of DNA, Bioinformatics. Oxford University Press, 2008, 24 (6): 791-797. |
Lam T.W., Sung W.K., Tam S.L. and Yiu S.M., Space Efficient Indexes for String Matching with Don't Cares, The 18th International Symposium on Algorithms and Computation . Springer, 2007, 846-857. |
Law Y.W., Lai K.Y., Jiang L., Ieong S.C.R., Kwan Y.K., Chow K.P., Hui C.K., Yiu S.M. and Chong C.F., Protecting Digital Legal Professional Privilege (LPP) Data, The third International Workshop on Systematic Approaches to Digital Forensic Engineering. Los Alamitos, IEEE Computer Society, 2008, 1: 11. |
Leung C.M., Siu M.H., Yiu S.M., Chin F.Y.L. and Sung K.W.K., Finding Linear Motif Pair from Protein Interaction Networks: A Probabilistic Approach, The 6th Annual International Conference on Computational Systems Bioinformatics Conference (CSB 2007). San Diego, California, USA, 2007, 111-120. |
Leung W.S., Lin M.C., Cheung D.W.L. and Yiu S.M., A Clustering-Based Approach for Filtering False Positive MicroRNA Candidates, 4-th International Symposium on Bioinformatics Research and Applications; May 6-9, 2008; Department of Computer Science, Georgia State University; Atlanta, Georgia (Lecture Notes in Bioinformatics (LNBI)). 2008. |
Leung W.S., Shen Z., Yiu S.M., Kung H.F. and Lin M.C., Characterization of HGFK1 Signaling Networks in Microvessel Endothelial and Hepatoma Cell Lines, International Conference on Bioinformatics 2007; 27-30 August 2007; Hong Kong. 2007. |
Leung W.S., Yiu S.M., Cheung D.W.L., Lai L., Lin M.C. and Kung H.F., Computational Prediction on Mammalian and Viral MicroRNAs - a Review, International Journal of Integrative Biology. 2007, 1(2): 118-126. |
Li Z., Chong C.F., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme, International Journal of Network Security. Seoul, Korea, 2007, Vol. 5, No. 2: 220-223. |
Shen Z., Leung W.S., Yiu S.M., Kung H.F. and Lin M.C., The Molecular Mechanisms of the Dual Anti-angiogenic and Anti-tumor Effects of rAAV-HGFK1, 11th Annual Meeting of the American Society of Gene Therapy May 28-June 1, 2008; Boston, Massachusetts, USA.. 2008. |
Wong K.F., Chiu Y.S., Lam T.W. and Yiu S.M., A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots, The 5th Asia-Pacific Bioinformatics Conference . World Scientific, 2008, 89-100. |
Researcher
: Yu CH |
List of Research Outputs |
Yu C.H., Lau F.C.M. and Wang C.L., Recycling Memory Blocks for Improving Execution of Java Programs, ACM Transactions on Architecture and Code Optimization. ACM, 2008, 4. |
Researcher
: Yuan W |
List of Research Outputs |
Lee S.D., Yee K.C., Cheung D.W.L. and Yuan W., Descriptive Schema: Semantics-based Query Answering, 3rd Semantic Wiki Workshop (SemWiki 2008). 2008. |
Researcher
: Yuk SC |
List of Research Outputs |
Yuk S.C., A Probabilistic Framework for Real-Time Head Shape Detection and Tracking. Hong Kong, 2008. |
Yuk S.C., Wong K.K.Y., Chung H.Y., Chow K.P., Chin F.Y.L. and Tsang K.S.H., Object-Based Surveillance Video Retrieval System With Real-Time Indexing Methodology, International Conference on Image Analysis and Recognition. Montreal, Canada, 2007, 626-637. |
Researcher
: Zhang H |
List of Research Outputs |
Zhang H., Temporal subtraction of chest radiograph using graph cuts and free-form deformations. 2008. |
Researcher
: Zhang Y |
List of Research Outputs |
Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., On-line scheduling of parallel jobs on two machines, Journal of Discrete Algorithms . Amsterdam, The Netherlands, Elsevier Science Publishers B. V., 2008, 6(1): 3-10. |
Chin F.Y.L., Zhang Y. and Zhu H., A 1-local 13/9-competitive Algorithm for Multicoloring Hexagonal Graphs, The 13th Annual International Computing and Combinatorics Conference (COCOON 2007). Banff, Alberta, Canada, 2007, 526-536. |
Researcher
: Zhang Z |
List of Research Outputs |
Zhang Z., Chan W.K. and Tse T.H., Synthesizing component-based WSN applications via automatic combination of code optimization techniques, Proceedings of the 7th International Conference on Quality Software (QSIC 2007), IEEE Computer Society Press, Los Alamitos, CA. 2007, 181−190. |
Researcher
: Zheng D |
List of Research Outputs |
Wang W.P., Juttler B., Zheng D. and Liu Y., Computation of rotation minimizing frames, ACM Transactions on Graphics. 2008, 27, Issue 1. |
-- End of Listing --