DEPT OF COMPUTER SCIENCE

Researcher : Bai Z



List of Research Outputs

 

Bai Z. and Huo Q., A Study of Nonlinear Shape Normalization for Online Handwritten Chinese Character Recognition: Dot Density vs. Line Density Equalization, 2006 International Conference on Pattern Recognition. Hong Kong, IAPR, 2006, 2: 921-924.

 

Researcher : Belaramani NM



List of Research Outputs

 

Lau F.C.M., Belaramani N.M., Kwan V.J.W.M., Siu P.L.P., Wing W.K. and Wang C.L., Code-on-Demand and Code Adaptation for Mobile Computing, The Handbook of Mobile Middleware. Auerbach Publications, 2006, 441-463.

 

Researcher : Cao H



List of Research Outputs

 

Cao H., Pattern Discovery From Spatiotemporal Data, 2006.

 

Researcher : Cao HP



List of Research Outputs

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Discovery of Collocation Episodes in Spatiotemporal Data, The 6th IEEE International Conference on Data Mining. 2006.

 

Cao H.P., Mamoulis N., Cheung D.W.L. and Yip K., Discovery of Periodic Patterns in Spatiotemporal Sequences, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2007, 19: 453-467.

 

Researcher : Chan BMY



List of Research Outputs

 

Chan B.M.Y., Chan W.T., Chin F.Y.L., Fung S.P.Y. and Kao M.Y., Linear-Time Haplotype Inference on Pedigrees without Recombinations, The 6th Workshop on Algorithms in Bioinformatics (WABI 2006). Zurich, Switzerland, 2006, 56-67.

 

Researcher : Chan HL



List of Research Outputs

 

Chan H.L., Lam T.W., Sung W.K., Tam S.L. and Wong S.S., A Linear Size Index for Approximate Pattern Matching, The 17th Annual Symposium on Combinatorial Pattern Matching (CPM). Springer, 2006, LNCS 4009: 49-59.

 

Chan H.L., Lam T.W., Sung W.K., Tam S.L. and Wong S.S., Compressed Indexes for Approximate String Matching, In: Yossi Azar, Thomas Erleback, 14th Annual European Symposium on Algorithms (ESA). Springer, 2006, LNCS 4168: 208-219.

 

Chan H.L., Hon W.K., Lam T.W. and Sadakane K., Compressed Indexes for Dynamic Text Collections, ACM Transactions on Algorithms (TALG). 2007, 3:2: Article 21, pages 1-29.

 

Chan H.L., Lam T.W. and Wong P., Efficiency of Data Distribution in BitTorrent-like Systems , The 3rd International Conference on Algorithmic Aspects in Information and Management . 2007, 378-388.

 

Chan H.L., Chan W.T., Lam T.W., Lee L.K., Mak K.S. and Wong P., Energy Efficient Online Deadline Scheduling , The 18th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 2007, 795-804.

 

Chan H.L., New Algorithms for On-line Scheduling, 2007.

 

Chan H.L., Jannson J., Lam T.W. and Yiu S.M., Reconstructing An Ultrametric Galled Phylogenetic Network From A Distance Matrix , Journal of Bioinformatics and Computational Biology. World Scientific, 2006, 4: 4: 807-832.

 

Researcher : Chan HW



Project Title:

Anonymity in Web transactions

Investigator(s):

Chan HW

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

01/2006

 

Abstract:

Privacy issue is always a concern for certain individuals with the proliferation of emails and transactions on the Web. In most of the current communication systems, information such as our identity (IP address) is exposed and kept by another party. Web server log files contain information about the users who visit them and the content they access. The server can record the user's IP address and often the user's Internet domain name, workplace, and/or approximate location, the type of computing platform used. The Web page that referred the user to this site and the server that is going to be visited next are all possibly contained within the request header. Even when the user's IP address changes between browsing sessions (e.g., the IP address is assigned dynamically using DHCP), a Web server can link multiple sessions by the same user by planting a unique cookie in the user' s browser during the first browsing session, and retrieving that cookie in subsequent sessions. Thus, various sites on the Internet collect a great amount of personal information about the individuals who visit them. This information can be used to generate consumer and communication profiles. The same monitoring capabilities are available to the user's ISP or local gateway administrator who can observe all communication in which the user participates. The user's profile made possible by such monitoring capabilities is viewed as a useful tool because a Web server can use such information to personalize its content for its users. However, user's privacy is compromised. In spite of a lack of privacy has always characterized Internet communication, a general acceptance that Internet communication has been logged universally and revealed so much about the personal tastes of its users is to be scrutinized. Web users should have the ability to limit what information is revealed about them and to whom it is revealed. While encrypting communication to and from web servers (e.g., using SSL) can hide the content of the transaction from an Internet service provider, or a local system administrator, they can still learn a lot about the client and server computers, the length of the data being exchanged, and the time and frequency of exchanges. Encryption indeed does little to protect the privacy of the client from the server. A web server can record the Internet addresses at which its clients reside, the servers that referred the clients to it, and the times and frequencies of accesses by its clients. Although some approaches enable users to negotiate the conditions under which they will share potentially private information with a Web server, these negotiations apply only to the server, only for certain kinds of information (for example, not the user's IP address), cannot be enforced, and are not presently widely practised. Other methods are definitely needed as well. Anonymity is a way not to release the identity and personal information of the individual. With the use of a proxy server, some degree of anonymity can be provided. However, it may still be possible to reveal our approximate location by examining the address of proxy server. Advertising company can use the information collected to decide which banner to show according to user location. With the use of cookies, the behavior of a visitor can be tracked when he/she visits another site embedded with web bugs. Therefore, individual privacy on the Internet is endangered and is of utmost concern for some. Since privacy cannot be protected solely by legislation, technologies that can be used to enforce privacy are needed. Anonymity for privacy protection is one possible solution, because if users are anonymous on a network, they need not worry about the loss of their privacy. The aim of the research is to design an efficient scheme for anonymous communication in web transactions. With such scheme, involved party should not be able to have an idea of whom and where the information requester is.

 

List of Research Outputs

 

Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, 2007, 203-212.

 

Researcher : Chan KP



List of Research Outputs

 

Chan K.P., Chen T.Y. and Towey D.P., Forgetting Test Cases, 30th Annual Internation Computer Software and Application Conference (COMPSAC 2006). Chicago, U.S.A., 2006, 1: 485-494.

 

Chan K.P., Chen T.Y. and Towey D.P., Probabilistic Adaptive Random Testing, Six International Conference on Quality Software (QSIC 2006). Beijing, China, 2006, 274-280.

 

Chen Y. and Chan K.P., Using Data Mining Techniques And Rough Set Theory For Language Modeling, ACM Transactions on Asian Language Information Processing. 2007, 6.

 

Researcher : Chan WK



List of Research Outputs

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., Integration testing of context-sensitive middleware-based applications: a metamorphic approach, International Journal of Software Engineering and Knowledge Engineering. Singapore, World Scientific, 2006, 16 (5): 677703.

 

Chan W.K., Cheung S.C., Ho J.C.F. and Tse T.H., Reference models and automatic oracles for the testing of mesh simplification software for graphics rendering, Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), IEEE Computer Society Press, Los Alamitos, California. 2006, 429438.

 

Chan W.K., Chen T.Y., Cheung S.C., Tse T.H. and Zhang Z., Towards the testing of power-aware software applications for wireless sensor networks, Reliable Software Technologies: Ada-Europe 2007, N. Abdennadher and F. Kordon (eds.), Lecture Notes in Computer Science, vol. 4498, Springer, Berlin. 2007, 8499.

 

Hu P., Zhang Z., Chan W.K. and Tse T.H., An empirical comparison between direct and indirect test result checking approaches , Proceedings of the 3rd International Workshop on Software Quality Assurance (SOQUA 2006) (in conjunction with the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT 2006/FSE-14)), ACM Press, New York. 2006, 613.

 

Lu H., Chan W.K. and Tse T.H., Static slicing for pervasive programs, Proceedings of the 6th International Conference on Quality Software (QSIC 2006), IEEE Computer Society Press, Los Alamitos, California. 2006, 185192.

 

Lu H., Chan W.K. and Tse T.H., Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation, Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT 2006/FSE-14), ACM Press, New York. 2006, 242252.

 

Researcher : Chan WT



Project Title:

Algorithm issues on on-request data dissemination: scheduling algorithms and performance guarantee

Investigator(s):

Chan WT, Lam TW, Ting HF

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

12/2003

 

Abstract:

To solve the problem on deciding when to disseminate which page so as to optimize a pre-defined performance measure, such as the response time of a request, by giving online scheduling algorithms with performance guarantee; to introduce a formal performance comparison analysis between two (unicast or multicast) DDS with different resource settings; to study and solve the scheduling problems for some practical considerations.

 

Researcher : Chen L



List of Research Outputs

 

Chen L., Process Migration and Runtime Scheduling for Parallel Tasks in Computational Grids, 2007.

 

Ma T...C..., Chen L., Wang C.L. and Lau F.C.M., G-PASS: An Instance-oriented Security Infrastructure for Grid Travelers, Concurrency and Computation: Practice and Experience. 2006, 18: 1871-1884.

 

Researcher : Chen TY



List of Research Outputs

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., Integration testing of context-sensitive middleware-based applications: a metamorphic approach, International Journal of Software Engineering and Knowledge Engineering. Singapore, World Scientific, 2006, 16 (5): 677703.

 

Chan W.K., Chen T.Y., Cheung S.C., Tse T.H. and Zhang Z., Towards the testing of power-aware software applications for wireless sensor networks, Reliable Software Technologies: Ada-Europe 2007, N. Abdennadher and F. Kordon (eds.), Lecture Notes in Computer Science, vol. 4498, Springer, Berlin. 2007, 8499.

 

Chen T.Y., Huang D.H., Tse T.H. and Zhang Z., An innovative approach to tackling the boundary effect in adaptive random testing, Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS-40), IEEE Computer Society Press, Los Alamitos, California. 2007.

 

Researcher : Chen Y



List of Research Outputs

 

Chen Y. and Chan K.P., Using Data Mining Techniques And Rough Set Theory For Language Modeling, ACM Transactions on Asian Language Information Processing. 2007, 6.

 

Researcher : Chen Z



List of Research Outputs

 

Chen Z., A Split-and-Merge Approach for Quadrilateral-Based Image Segmentation, 2007.

 

Chen Z., Chin F.Y.L. and Chung H.Y., Automated Hierarchical Image Segmentation Based on Merging of Quadrilaterals, The 6th WSEAS International Conference on Signal Processing, Computational Geometry & Artifical Vision (ISCGAV'06). Elounda, Crete, Greece, WSEAS, 2006, 135-140.

 

Chen Z., Chin F.Y.L. and Chung H.Y., Automated Hierarchical Image Segmentation Based on Merging of Quadrilaterals, WSEAS Transactions on Signal Processing. Crete, Greece, 2006, Issue 8, Volume 2: 1063-1068.

 

Researcher : Cheng CK



List of Research Outputs

 

Ngai W.K., Kao C.M., Chui C.K., Cheng C.K., Michael C.L. and Yip Y.L., Efficient Clustering of Uncertain Data, Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, IEEE Computer Society, 2006, 436-445.

 

Researcher : Cheng KH



List of Research Outputs

 

Tsang W.W. and Cheng K.H., The chi-square test when the expected frequencies are less than 5, Proceedings of the COMPSTAT 2006, 17th Symposium of IASC. Rome, Italy, Physica-Verlag, 2006, 1583-1589.

 

Researcher : Cheung DWL



Project Title:

Mining association rules on high performance parallel systems

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Outstanding RGC Projects

Start Date:

09/1998

 

Abstract:

To study and develop algorithms and techniques for mining association rules on high performance parallel systems including the following two system paradigms: share-nothing distributed memory parallel system and share-memory parallel system.

 

Project Title:

A business process and information interoperability platform based on open standards

Investigator(s):

Cheung DWL, Kao CM, Lee TYT, Kwok WCH, Wong DCK, Chau PYK, Yee KC

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Support Programme

Start Date:

11/2003

Completion Date:

07/2006

 

Abstract:

To research and develop a business process and information interoperability platform based on international open standards and best practices available. This platform aims to support business process integration (BPI) within the enterprise and between business partners.

 

Project Title:

Semi-supervised Subspace Clustering for High-Dimensional Data

Investigator(s):

Cheung DWL, Ng KP

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The objectives of this project are: 1.Design and analysis of semi-supervised subspace clustering algorithms in different models. 2.Performance studies of the algorithms in both synthetic and real data. 3.Explore the applications of these algorithms in different environments.

 

Project Title:

Service oriented e-transaction platform

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Fund Internship Programme

Start Date:

06/2006

 

Abstract:

To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services.

 

Project Title:

Service oriented e-transaction platform

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Fund Internship Programme

Start Date:

06/2006

 

Abstract:

To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services.

 

Project Title:

Extending web 2.0 to deliver e-commerce services

Investigator(s):

Cheung DWL, Lee TYT

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Support Programme

Start Date:

09/2006

 

Abstract:

This proposal aims to extend various Web 2.0 technologies with electronic transaction capabilities and demonstrate the application of Web 2.0 for e-commerce. The objectives of this project are as follows: 1. Study the potential of implementing e-commerce services using Web 2.0 and the areas to extend Web 2.0 to support B2B and B2G requirements. 2. Extend existing Web 2.0 technologies, e.g. RSS (Really Simple Syndication) and AJAX (Asynchronous JavaScript And XML), with security and reliability mechanisms. 3. prototype a Web 2.0 e-commerce engine to demonstrate the use of Web 2.0 to conduct electronic transactions in proof-of-concept projects.

 

List of Research Outputs

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Discovery of Collocation Episodes in Spatiotemporal Data, The 6th IEEE International Conference on Data Mining. 2006.

 

Cao H.P., Mamoulis N., Cheung D.W.L. and Yip K., Discovery of Periodic Patterns in Spatiotemporal Sequences, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2007, 19: 453-467.

 

Cheung D.W.L., B2B Technology, Openning Talk, HKSAR Government Office of the Government Chief Information Officer Training Forum. 2007.

 

Cheung D.W.L. and Wong D.C.K., Consultancy Project, Hang Seng Bank Document Management System Design, Toppan Ltd., Hong Kong. Hong Kong, 2007.

 

Cheung D.W.L. and Yee K.C., Consultancy Project, Interbanking Clearing Limited Swift Network (ICLSWN) Message System Design, Hong Kong Monetary Authority. Hong Kong, 2007.

 

Cheung D.W.L., Yee K.C. and Lee T.Y.T., Consultancy, Government Electronic Trading Services, HKSAR Government Office of the Government Chief Information Officer. Hong Kong, 2007.

 

Cheung D.W.L. and Wong D.C.K., Consultancy, Information Design for Content Standardization, Trade Development Council, Hong Kong. Hong Kong, 2006.

 

Cheung D.W.L. and Ng C.Y., Consultancy, Information Modeling for Garment Industry Business Exchange, iGarment Ltd., Hong Kong. Hong Kong, 2006.

 

Cheung D.W.L., Editorial Board Member, Journal of Web Services Research. Idea Group, 2007.

 

Cheung D.W.L. and Ng C.Y., Enterprise Data Architecture Training, Drainage Service Department; HSBC; Diary Farm. Hong Kong, 2007.

 

Cheung D.W.L. and Ng C.Y., Enterprise Data Architecture Training, HKSAR Government Office of the Government Chief Information Officer. Hong Kong, 2007.

 

Cheung D.W.L., Next Generation Government E-Service Delivery , Invited Talk, Conference on Exploring the Use of Modern Information & Communication Technology with the Academia, Government Office of the Government Chief Information Officer. 2006.

 

Cheung D.W.L., Security of Outsourcing Association Rule Mining, Invited Talk, Nanjing University. 2007.

 

Cheung D.W.L., Software License, TranXnet, Apacus, Hong Kong. Hong Kong, 2007.

 

Cheung D.W.L., Software License, ebXML Hermes, Apacus, Hong Kong. Hong Kong, 2007.

 

Cheung L., Yip Y.L., Cheung D.W.L., Kao C.M. and Ng K.P., On Mining Micro-array Data by Order-Preserving Submatrix, International Journal of Bioinformatics Research and Applications (IJBRA). Inder Sciences Publishers, 2007, 3: 42-64.

 

Fung G., Yu J., Wang H., Cheung D.W.L. and Liu H., A Balanced Ensemble Approach to Weighting Classifiers for Text Classification, The 6th IEEE International Conference on Data Mining. 2006.

 

Huang G.Q., Qu T., Cheung D.W.L. and Liang L., Extensible multi-agent system for optimal design of complex systems using analytical target cascading, International Journal of Advanced Manufacturing Technology. 2006.

 

Tang J., Chen Z.X., Fu A.W.C. and Cheung D.W.L., Capabilities of Outlier Detection Schemes in Large Datasets: Framework and Methodologies, Knowledge and Information Systems. Springer, 2007, 11: 45-84.

 

Wang L., Cheung D.W.L. and Yiu S.M., Maintenance of Maximal Frequent Itemsets in Large Databases, ACM Symposium on Applied Computing . 2007.

 

Yip K., Cheung D.W.L. and Ng M., Input Validation for Semi-supervised Clustering, The 6th IEEE International Conference on Data Mining, Workshop, (ICDE Workshop). 2006.

 

Researcher : Cheung L



List of Research Outputs

 

Cheung L., Yip Y.L., Cheung D.W.L., Kao C.M. and Ng K.P., On Mining Micro-array Data by Order-Preserving Submatrix, International Journal of Bioinformatics Research and Applications (IJBRA). Inder Sciences Publishers, 2007, 3: 42-64.

 

Researcher : Chin FYL



Project Title:

MultiVision Fund

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

MultiVision Intelligent Surveillance (Hong Kong) Ltd. - General Award

Start Date:

07/2003

 

Abstract:

MultiVision Fund.

 

Project Title:

Finding motifs for sequences with weak binding sites

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

Completion Date:

08/2006

 

Abstract:

To find motifs by considering those sequences which do not contain any binding sites when there are insufficient no. of sequences with binding sites; to consider a more general and realistic model where each sequence contains more than one binding site; to test our proposed algorithms on both real and simulated data.

 

Project Title:

Robust object segmentation method for video surveillance system

Investigator(s):

Chin FYL, Chung HY

Department:

Computer Science

Source(s) of Funding:

Teaching Company Scheme

Start Date:

09/2004

Completion Date:

08/2006

 

Abstract:

To develop a new and robust object segmentation method specifically for video surveillance systems.

 

Project Title:

Computationally Haplotyping Pedigree Data

Investigator(s):

Chin FYL, Smith DK, Song Y

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2006

 

Abstract:

Minimum Recombination Haplotyping Problem (MRHP): finding a haplotype solution for a given pedigree that is consistent with given genotype data and derived from fewest recombinations (minimizing SUM). (1) The k-MRHP is an MRHP with the additional constraint that the number of recombinations on each haplotype is at most k where k = 0, 1, 2 (minimizing SUM with MAX=k) (2) An efficient algorithm for the k-MRHP when k=0 (3) Software implementation of the efficient algorithm

 

Project Title:

A new motif representation based on position specific patterns

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2006

 

Abstract:

1 We want to introduce a good model to represent motifs and describe them in a precise and complete fashion. 2 Based on our new motif representation model, we will redefine the motif discovering problem and design efficient algorithms or heuristics to solve the problem. 3 The goal of the new model is to enable the discovery of a higher percentage of known motifs and some unknown motifs.

 

List of Research Outputs

 

Chan B.M.Y., Chan W.T., Chin F.Y.L., Fung S.P.Y. and Kao M.Y., Linear-Time Haplotype Inference on Pedigrees without Recombinations, The 6th Workshop on Algorithms in Bioinformatics (WABI 2006). Zurich, Switzerland, 2006, 56-67.

 

Chan J.W.T., Chin F.Y.L., Ye D., Zhang Y. and Zhu H., Greedy Online Frequency Allocation in Cellular Networks, Information Processing Letters. Elsevier B.V., 2007, 102(2-3): 55-61.

 

Chan J.W.T., Chin F.Y.L., Ye D. and Zhang Y., Online Frequency Allocation in Cellular Networks, The 19th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA 2007). San Diego, California, USA, 2007, 241-249.

 

Chan W.T., Chin F.Y.L., Ye D., Zhang Y. and Zhu H., Frequency Allocation Problem for Linear Cellular Networks, The 17th International Symposium on Algorithms and Computation (ISAAC 2006). Kolkata, India, 2006, 61-70.

 

Chen Z., Chin F.Y.L. and Chung H.Y., Automated Hierarchical Image Segmentation Based on Merging of Quadrilaterals, The 6th WSEAS International Conference on Signal Processing, Computational Geometry & Artifical Vision (ISCGAV'06). Elounda, Crete, Greece, WSEAS, 2006, 135-140.

 

Chen Z., Chin F.Y.L. and Chung H.Y., Automated Hierarchical Image Segmentation Based on Merging of Quadrilaterals, WSEAS Transactions on Signal Processing. Crete, Greece, 2006, Issue 8, Volume 2: 1063-1068.

 

Chin F.Y.L., Chinese Journal of Advanced Software Research. 2006.

 

Chin F.Y.L., Current Bioinformatics. 2007.

 

Chin F.Y.L., Discovering Motifs with Transcription Factor Domain Knowledge, The Third Annual RECOMB Satellite Workshop on Regulatory Genomics. National University of Singapore, 2006.

 

Chin F.Y.L., Finding Motifs Computationally, CS Dept of Zhejiang University. Nanjing, China, 2007.

 

Chin F.Y.L., Finding Motifs Computationally, Fudan University. Shanghai, China, 2007.

 

Chin F.Y.L., Finding Motifs Computationally, The 2nd BioDM Workshop on Data Mining for Biomedical Applications (BioDM 2007) (keynote). Nanjing, China, 2007.

 

Chin F.Y.L., HKIE Transactions Review Panel. 2006.

 

Chin F.Y.L., International Journal of Computer Processing of Oriental Languages. 2006.

 

Chin F.Y.L., Journal of Information Processing Letters. 2006.

 

Chin F.Y.L., Managing Editor, International Journal of Foundations of Computer Science. 2006.

 

Chin F.Y.L., Online Frequency Assignment in Wireless Communication Networks, Math Dept of Zhejiang University. Nanjing, China, 2007.

 

Chin F.Y.L., Zhang Y. and Zhu H., Online OVSF Code Assignment with Resource Augmentation, The 3rd International Conference on Algorithmic Aspects in Information and Management (AAIM'07). Portland, Oregon, USA, 2007, 191-200.

 

Chung H.Y., Wong K.K.Y., Chin F.Y.L., Chow K.P. and Yuk S.C., Generalized Motion and Edge Adaptive Interpolation De-interlacing Algorithm, WSEAS Transactions on Computers. 2006, 5(11): 2544-2551.

 

Fung S.P.Y., Wang C.A. and Chin F.Y.L., Approximation Algorithms for Some Optimal 2D and 3D Triangulations, In: Teofilo F. Gonzalez, Handbook on Approximation Algorithms and Metaheuristics. Chapman & Hall, 2006, 50-1:50-16.

 

Leung C.M. and Chin F.Y.L., An efficient motif discovery algorithm with unknown motif length and number of binding sites, International Journal of Data Mining and Bioinformatics (IJDMB). Switzerland, Inderscience Enterprises Limited, 2006, 1(2): 201-215.

 

Leung C.M. and Chin F.Y.L., Discovering DNA Motifs with Nucleotide Dependency, The IEEE 6th Symposium on Bioinformatics and Bioengineering (BIBE 06). Washington DC, USA, 2006, 70-77.

 

Leung C.M. and Chin F.Y.L., Discovering Motifs with Transcription Factor Domain Knowledge, Pacific Symposium on Biocomputing (PSB 2007). Wailea, Maui, Hawaii, USA, 2007, 472-483.

 

Leung C.M. and Chin F.Y.L., Finding motifs from all sequences with and without binding sites, Bioinformatics. Oxford University Press, 2006, 22(18): 2217-2223.

 

Leung C.M. and Chin F.Y.L., Redundancy Elimination in Motif Discovery Algorithms, The Third Annual RECOMB Satellite Workshop on Regulatory Genomics. Singapore, 2006, 28-37.

 

Li K., Shen H., Chin F.Y.L. and Zhang W., Multimedia Object Placement for Transparent Data Replication, In: Laxmi Bhuyan, University of California, Riverside, IEEE Transactions on Parallel and Distributed Systems. IEEE Computer Society, 2007, 18(2): 212-224.

 

Sankoff D., Wang L. and Chin F.Y.L., In: David Sankoff, Lusheng Wang, Francis Chin, Proceedings of the 5th Asia-Pacific Biooinformatics Conference (APBC 2007). London, UK, Imperial College Press, 2007, 5.

 

Wong K.K.Y., Chin F.Y.L., Chung H.Y., Chow K.P. and Yuk S.C., Motion and Edge Adaptive Interpolation De-interlacing Algorithm, 10th WSEAS International Conference on Computers. Athens, Greece, 2006, 1030-1035.

 

Yuk S.C., Wong K.K.Y., Chung H.Y., Chin F.Y.L. and Chow K.P., Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers, 6th IEEE International Conference on Intelligent System Design and Applications. Jinan, Shandong, China, 2006, II: 384-389.

 

Zheng F.F., Fung S.P.Y., Chan W.T., Chin F.Y.L., Poon C.K. and Wong P.W.H., Improved on-line broadcast scheduling with deadlines, The Twelfth Annual International Computing and Combinatorics Conference (COCOON 2006). Taipei, Taiwan, 2006, 320-329.

 

Researcher : Chong CF



List of Research Outputs

 

Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, 2007, 203-212.

 

Researcher : Chow KP



Project Title:

Advanced semantic video analysis for content-based video retrieval

Investigator(s):

Chow KP, Chin FYL, Wong KKY

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Support Programme

Start Date:

09/2006

 

Abstract:

The objective of this proposal is to develop new and enabling semanitc video analysis techniques for video retrieval applications. We believe these new techniques can help to remedy the video retrieval problems found in video surveillance systems and the video search engine.

 

List of Research Outputs

 

Chow K.P., Law Y.W., Kwan Y.K. and Lai K.Y., The Rules of Time on NTFS File System, The Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 07. Los Alamitos, USA, IEEE Computer Society Press, 2007, 71-85.

 

Chung H.Y., Wong K.K.Y., Chin F.Y.L., Chow K.P. and Yuk S.C., Generalized Motion and Edge Adaptive Interpolation De-interlacing Algorithm, WSEAS Transactions on Computers. 2006, 5(11): 2544-2551.

 

Hui C.K., Chow K.P. and Yiu S.M., Tools and Technology for Computer Forensics: Research and Development in Hong Kong , Proceedings of The 3rd Information Security Practice and Experience Conference ( ISPEC 2007 ). Hong Kong, China, Springer Berlin / Heidelberg, 2007, 4464/2007: 11-19.

 

Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, 2007, 203-212.

 

Wong K.K.Y., Chin F.Y.L., Chung H.Y., Chow K.P. and Yuk S.C., Motion and Edge Adaptive Interpolation De-interlacing Algorithm, 10th WSEAS International Conference on Computers. Athens, Greece, 2006, 1030-1035.

 

Yuk S.C., Wong K.K.Y., Chung H.Y., Chin F.Y.L. and Chow K.P., Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers, 6th IEEE International Conference on Intelligent System Design and Applications. Jinan, Shandong, China, 2006, II: 384-389.

 

Researcher : Chui CK



List of Research Outputs

 

Chui C.K., Kao C.M. and Hung Y.W., Mining Frequent Itemsets from Uncertain Data, Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, PAKDD 2007. Nanjing, China, Springer, 4426: 47-58.

 

Chui C.K., Kao C.M. and Hung E., Mining Frequent Itemsets from Uncertain Data, The 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). 2007.

 

Lin B., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007. Hawaii, USA, IEEE, 516-523.

 

Lin H., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, IEEE Symposium on Computational Intelligence and Data Mining (IEEE CIDM 2007). 2007.

 

Ngai W.K., Kao C.M., Chui C.K., Cheng C.K., Michael C.L. and Yip Y.L., Efficient Clustering of Uncertain Data, Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, IEEE Computer Society, 2006, 436-445.

 

Ngai W.K., Kao C.M., Cheng R., Chau M.C.L., Yip Y.L. and Chui C.K., Efficient Clustering of Uncertain Data, The 2006 IEEE International Conference on Data Mining (IEEE ICDM 06). 2006, 436-445.

 

Researcher : Chui CK



List of Research Outputs

 

Chui C.K., Kao C.M. and Hung Y.W., Mining Frequent Itemsets from Uncertain Data, Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, PAKDD 2007. Nanjing, China, Springer, 4426: 47-58.

 

Chui C.K., Kao C.M. and Hung E., Mining Frequent Itemsets from Uncertain Data, The 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). 2007.

 

Lin B., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007. Hawaii, USA, IEEE, 516-523.

 

Lin H., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, IEEE Symposium on Computational Intelligence and Data Mining (IEEE CIDM 2007). 2007.

 

Ngai W.K., Kao C.M., Chui C.K., Cheng C.K., Michael C.L. and Yip Y.L., Efficient Clustering of Uncertain Data, Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, IEEE Computer Society, 2006, 436-445.

 

Ngai W.K., Kao C.M., Cheng R., Chau M.C.L., Yip Y.L. and Chui C.K., Efficient Clustering of Uncertain Data, The 2006 IEEE International Conference on Data Mining (IEEE ICDM 06). 2006, 436-445.

 

Researcher : Chung HY



List of Research Outputs

 

Chen Z., Chin F.Y.L. and Chung H.Y., Automated Hierarchical Image Segmentation Based on Merging of Quadrilaterals, The 6th WSEAS International Conference on Signal Processing, Computational Geometry & Artifical Vision (ISCGAV'06). Elounda, Crete, Greece, WSEAS, 2006, 135-140.

 

Chen Z., Chin F.Y.L. and Chung H.Y., Automated Hierarchical Image Segmentation Based on Merging of Quadrilaterals, WSEAS Transactions on Signal Processing. Crete, Greece, 2006, Issue 8, Volume 2: 1063-1068.

 

Chung H.Y., Wong K.K.Y., Chin F.Y.L., Chow K.P. and Yuk S.C., Generalized Motion and Edge Adaptive Interpolation De-interlacing Algorithm, WSEAS Transactions on Computers. 2006, 5(11): 2544-2551.

 

Wong K.K.Y., Chin F.Y.L., Chung H.Y., Chow K.P. and Yuk S.C., Motion and Edge Adaptive Interpolation De-interlacing Algorithm, 10th WSEAS International Conference on Computers. Athens, Greece, 2006, 1030-1035.

 

Yuk S.C., Wong K.K.Y., Chung H.Y., Chin F.Y.L. and Chow K.P., Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers, 6th IEEE International Conference on Intelligent System Design and Applications. Jinan, Shandong, China, 2006, II: 384-389.

 

Researcher : Dai X



List of Research Outputs

 

Dai X., Spatial Queries Based on Non-Spatial Constraints, 2007.

 

Yiu M.L., Dai X., Mamoulis N. and Vaitis M., Top-k Spatial Preference Queries, IEEE 23nd International Conference on Data Engineering. 2007.

 

Researcher : Deng H



List of Research Outputs

 

Deng H., Robust Minutia-Based Fingerprint Verification, 2006.

 

Researcher : Feng X



Project Title:

A New Approach for Intelligent Processing Based on Generalized Particle Model

Investigator(s):

Feng X, Lau FCM

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

03/2007

 

Abstract:

Many real-world problems can be solved using artificial intelligence (AI) techniques. The goal of this project is to investigate and develop an intelligent processing approach based on the generalized particle model (GPM). In GPM, entities are modeled as particles in one or more force-fields. We will study the evolution of “swarms”, the particles’ microcosmic actions, and macroscopic swarm intelligence, and present efficient algorithms for applying GPM to communication networks and multi-agent systems (MASs). GPM is an important extension of Elastic Net (EN), but it is fundamentally different from many other popular intelligent approaches including those based on symbolic or fuzzy logic, genetic algorithms, artificial neural network, game theory and ant colony optimization. The features of the GPM-based models and their corresponding algorithms include a powerful processing ability to deal with priorities, personality, autonomy and interaction of different entities in networks or MASs. Furthermore, these models can be applied to the optimization of multiple objectives, including aggregate utility, personal utility, minimal personal utility, etc. The proposed approach also has the advantages of the high parallelism, low computational complexity, and ease for hardware implementation. The major objectives in this project are as follows: 1. To present a new generalized particle model (GPM), which is different in many respects from cellular automaton, generalized cellular automaton, neural network, cellular neural network, particle model in physics, ant colony optimization, reaction and growth model, genetic algorithm, etc. 2. Based on GPM, to propose a new distributed parallel swarm intelligent model and theory, and to explore the essence and rules of swarm intelligence in terms of growth, evolution, phase transformation, etc. Based on the proposed model and theory, to deal with and explain a variety of complicated phenomena that might occur in dynamic environments which are difficult for traditional models and approaches. 3. To extend and develop the spring net approach originally proposed by applicant to a generic parallel and distributed method based on various generalized particle models (of different granularities) for swarm intelligence. 4. To present some parallel and distributed intelligent approaches and algorithms based on GPM. By simulations and experiments, to test that these approaches on their ability to adapt to the real-time dynamic environment that involves various interactions, metabolism, phase transformation, etc. To show that the new approaches can overcome some deficiencies of traditional approaches.

 

List of Research Outputs

 

Feng X., Lau F.C.M. and Shuai D.X., A New Generalized Particle Approach to Parallel Bandwidth Allocation , Computer Communications. Elsevier, 2006, 29: 3933-3945.

 

Feng X., Lau F.C.M. and Shuai D.X., A Novel Game Particle-Field Approach to Parallel Cache Resource Allocation of CDN , Chinese Journal of Computers. 2007, 30: 368-379.

 

Researcher : He T



List of Research Outputs

 

He T., Hu Y. and Huo Q., An Approach to Large Margin Design of Prototype-Based Pattern Classifiers, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2007). IEEE, 2007, II: 625-628.

 

Researcher : Ho JCF



List of Research Outputs

 

Chan W.K., Cheung S.C., Ho J.C.F. and Tse T.H., Reference models and automatic oracles for the testing of mesh simplification software for graphics rendering, Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), IEEE Computer Society Press, Los Alamitos, California. 2006, 429438.

 

Researcher : Ho WS



List of Research Outputs

 

Lin B., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007. Hawaii, USA, IEEE, 516-523.

 

Lin H., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, IEEE Symposium on Computational Intelligence and Data Mining (IEEE CIDM 2007). 2007.

 

Researcher : Hon WK



List of Research Outputs

 

Hon W.K., Lam T.W., Sadakane K., Sung W.K. and Yiu S.M., A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays , Algorithmica. 2007, 48:1: 23-36.

 

Researcher : Hu P



List of Research Outputs

 

Hu P., Zhang Z., Chan W.K. and Tse T.H., An empirical comparison between direct and indirect test result checking approaches , Proceedings of the 3rd International Workshop on Software Quality Assurance (SOQUA 2006) (in conjunction with the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT 2006/FSE-14)), ACM Press, New York. 2006, 613.

 

Researcher : Hu Y



List of Research Outputs

 

He T., Hu Y. and Huo Q., An Approach to Large Margin Design of Prototype-Based Pattern Classifiers, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2007). IEEE, 2007, II: 625-628.

 

Hu Y. and Huo Q., An HMM Compensation Approach Using Unscented Transformation For Noisy Speech Recognition (received the Best Student Paper Award), In: Q. Huo, B. Ma, E.-S. Chng, and H.-Z. Li (Eds.), Chinese Spoken Language Processing, The Fifth International Symposium, ISCSLP 2006, Singapore, December 13-16, 2006, Proceedings, LNAI 4274. Springer-Verlag, 2006, 346-357.

 

Researcher : Hua Q



List of Research Outputs

 

Hua Q. and Lau F.C.M., The Scheduling and Energy Complexity of Strong Connectivity in Ultra-Wideband Networks, 9th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2006). 2006, 282-290.

 

Researcher : Hui CK



Project Title:

Study of multi-signer signature scheme and identity authentication

Investigator(s):

Hui CK, Chow KP, Tsang WW

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

12/2003

 

Abstract:

to investigate the security of multi-signer signature schemes, and to design some new schemes with secure and high efficient features.

 

Project Title:

Forward secure crytographic schemes for Ad Hoc Network

Investigator(s):

Hui CK, Chow KP, Yiu SM, Li VOK

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2005

 

Abstract:

To carry out: (1) a forward secure signature scheme to be used in the clients of an ad hoc network. (2) a forward secure threshold signature scheme to be used in the CAs of an ad hoc network.

 

Project Title:

Design of cryptographic schemes for delegation network

Investigator(s):

Hui CK, Yiu SM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2007

 

Abstract:

(1) Delegation is a process where a user (the delegator) grants some of his rights (power), e.g. the signing right, to another user (the delegate), to work on his/her behalf.In a paper-based environment, delegation can be easily achieved. However, in a digital environment, how delegation can be handled properly becomes an issue to be addressed. The key management is also complicated, especially in a general delegation network.In this project, we propose to design a number of efficient and provably secure cryptographic schemes to support different variations of delegation networks. The developed schemes would help to enhance the security of an enterprise information system as delegation would be a common operation in most of the office environment. Also, the knowledge gained will be useful to build up a security model about delegation network. (2) In a paper-based environment, delegation can be easily achieved. However, in a digital environment, how delegation can be handled properly becomes an issue to be addressed. For examples, it is not trivial how a delegate can digitally sign or decrypt a document on behalf of the delegator and also how the receiver of the document verifies the signature and be convinced that the signer has the right (power) from the delegator to sign the document. Obviously, some straight-forward approaches do not work. Using signing as an example, the delegator passes the signing key (e.g. the private key if using an asymmetric cryptographic system) to the delegate, then the delegator has to change the key frequently and it also violates the non-repudiation property of the scheme as it is difficult to prove whether the delegator or the delegate is the person who actually signed the document. The key management is also complicated, especially in a general delegation network. (3)In other words, from the perspective of computer security, a set of specially designed cryptographic primitives that support delegation network is necessary. To tackle this problem, [MU96] proposed the proxy signature to deal with the delegation of signing. In a proxy signature, the original signer creates a key pair (the proxy key pair, denoted as (, K)) using his own signing key. The delegate (called the proxy signer) signs a document using . The verifier has to use K as well as the public key of the original signer to check the validity of the signature. Since the public key of the original signer is involved in the checking, so the delegation relationship is confirmed. After this work, a number of proxy signature schemes were proposed. However, most of these schemes are either too restrictive and cannot be extended easily for delegation networks, or are shown to be insecure.(4) In this project, we propose to design a number of efficient and provably secure cryptographic schemes to support different variations of delegation networks. The developed schemes would help to enhance the security of an enterprise information system as delegation would be a common operation in most of the office environment.

 

List of Research Outputs

 

Dong Y., Sui A., Yiu S.M., Li V.O.K. and Hui C.K., An efficient cluster-based proactive secret share update scheme for mobile ad hoc networks, Proc. IEEE ICC. Glasgow, Scotland, UK, 2007.

 

Dong Y., Li V.O.K., Hui C.K. and Yiu S.M., Dynamic distributed certificate authority services for mobile ad hoc networks, Proc. IEEE Wireless Communications and Networking Conference. Hong Kong, China, 2007.

 

Hui C.K., Yiu S.M. and Lui W.C., Accountability in organizations, Int. J. Information and Computer Security. UK, Inderscience Enterprises Ltd, 2007, Vol. 1, No. 3: 237-255.

 

Hui C.K., Chow K.P. and Yiu S.M., Tools and Technology for Computer Forensics: Research and Development in Hong Kong , Proceedings of The 3rd Information Security Practice and Experience Conference ( ISPEC 2007 ). Hong Kong, China, Springer Berlin / Heidelberg, 2007, 4464/2007: 11-19.

 

Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, 2007, 203-212.

 

Researcher : Hung RYS



List of Research Outputs

 

Hung R.Y.S. and Ting H.F., A Tight Analysis of the Most-Requested-First for On-demand Data Broadcasts, In: D.T. Lee, The Twelfth Annual International Computing and Combinatorics Conference. Taipei, Taiwan, Springer, 2006, 330-339.

 

Researcher : Hung YSR



List of Research Outputs

 

Ting H.F. and Hung Y.S.R., An optimal broadcasting protocol for mobile video-on-demand, In: Barry Jay, Proceedings of the 13th Australasian Theory Symposium. Sydney, Australian Computer Society, 2007, 79-85.

 

Researcher : Huo Q



Project Title:

Towards on-line recognition of continuous Chinese handwriting text on tablet PCs

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

 

Abstract:

To construct a large scale corpus of Chinese handwriting samples naturally written on Tablet PCs; to investigate new techniques for feature extraction, character modeling, contextual processing and integrated search to cope with the on-line recognition problem of continuously handwritten Chinese sentences; to implement a prototype system on the Tablet PC using the most promising solution identified by investigating the effectiveness of integrating the available techniques in different ways.

 

Project Title:

Chinese spoken language processing

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Anhui USTC iFLYTEK Co. Ltd. - General Award

Start Date:

09/2005

 

Abstract:

To research and develop the state-of-the-art Chinese spoken language processing technology.

 

Project Title:

A Detection and Verification Based Approach for On-line Recognition of Handwritten Chinese Words

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The objectives of this project are: (1) to investigate a new "detection and verification based approach" for on-line recognition of handwritten Chinese words; (2) to investigate new techniques for feature extraction and character modeling to improve the character classification accuracy as well as the reliability of character verification; (3) to develop a prototype system on Tablet PC, as a test-bed of new ideas, by using the most promising solution identified through the study in this project. The character vocabulary of our recognizer will include 6763 simplified Chinese characters in GB2312-80 standard, 12 frequently used GBK Chinese characters, 62 alphanumeric characters, 140 punctuation marks and symbols. We are aiming at a writer-independent character recognition accuracy of above 90% for naturally written Chinese words derived from our handwriting corpus.

 

Project Title:

A Study of Similarity Measures For Hidden Markov Models and Their Applications in Speech Recognition

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

03/2006

 

Abstract:

After many years research, Gaussian mixture continuous density hidden Markov model (CDHMM) remains predominant as a speech modeling technique in automatic speech recognition (ASR) area. How to measure the similarity of two given CDHMMs has been an important research topic for several decades. In a pioneering work, Juang and Rabiner proposed to use Kullback-Leibler (KL) divergence as a similarity measure of two HMMs with discrete observation distributions. In order to calculate the KL divergence, a Monte Carlo simulation procedure has to be used. It is not practical to use such a procedure in ASR applications that require a quick response. So, the main objectives of this project are as follows: - To develop efficient approximation methods for calculating the KL divergence of two given CDHMMs; - To study the possibility of using approximate KL divergence for the prediction of word confusabilities in a given vocabulary of an ASR system; - To develop effective and intelligent speaker adaptation strategies guided by an automatic analysis of vocabulary word confusability.

 

List of Research Outputs

 

Bai Z. and Huo Q., A Study of Nonlinear Shape Normalization for Online Handwritten Chinese Character Recognition: Dot Density vs. Line Density Equalization, 2006 International Conference on Pattern Recognition. Hong Kong, IAPR, 2006, 2: 921-924.

 

He T., Hu Y. and Huo Q., An Approach to Large Margin Design of Prototype-Based Pattern Classifiers, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2007). IEEE, 2007, II: 625-628.

 

Hu Y. and Huo Q., An HMM Compensation Approach Using Unscented Transformation For Noisy Speech Recognition (received the Best Student Paper Award), In: Q. Huo, B. Ma, E.-S. Chng, and H.-Z. Li (Eds.), Chinese Spoken Language Processing, The Fifth International Symposium, ISCSLP 2006, Singapore, December 13-16, 2006, Proceedings, LNAI 4274. Springer-Verlag, 2006, 346-357.

 

Huo Q. and Li W., A DTW-Based Dissimilarity Measure For Left-to-Right Hidden Markov Models And Its Application To Word Confusability Analysis, Interspeech 2006 - ICSLP. Pittsburgh, USA, ISCA, 2006, 2338-2341.

 

Huo Q. and Zhu D., A Maximum Likelihood Training Approach to Irrelevant Variability Compensation Based on Piecewise Linear Transformations, Interspeech 2006 - ICSLP. Pittsburgh, USA, ISCA, 2006, 1129-1132.

 

Huo Q., Ma B., Chng E...-.S... and Li H...-.Z..., Chinese Spoken Language Processing, The Fifth International Symposium, ISCSLP 2006, Singapore, December 13-16, 2006, Proceedings (Companion Volume). COLIPS, 2006.

 

Huo Q., Ma B., Chng E...-.S... and Li H...-.Z..., Chinese Spoken Language Processing, The Fifth International Symposium, ISCSLP 2006, Singapore, December 13-16, 2006, Proceedings, LNAI 4274. Springer-Verlag, 2006.

 

Lee C...-.H..., Li H...-.Z..., Lee L...-.S..., Wang R...-.H... and Huo Q., Advances in Chinese Spoken Language Processing. World Scientific Publisher, 2006.

 

Wu J. and Huo Q., A Study of Minimum Classification Error (MCE) Linear Regression for Supervised Adaptation of MCE-Trained Continuous Density Hidden Markov Models, IEEE Trans. on Audio, Speech and Language Processing. IEEE, 2007, 15: 478-488.

 

Wu J. and Huo Q., An Environment Compensated Minimum Classification Error Training Approach Based on Stochastic Vector Mapping, IEEE Transactions on Audio, Speech and Language Processing. IEEE, 2006, 14: 2147-2155.

 

Zhu D., Ma B., Li H. and Huo Q., A Generalized Feature Transformation Approach for Channel Robust Speaker Verification, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2007). IEEE, 2007, IV: 61-64.

 

Zhu D. and Huo Q., A Maximum Likelihood Approach to Unsupervised Online Adaptation of Stochastic Vector Mapping Function For Robust Speech Recognition, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2007). IEEE, 2007, IV: 773-776.

 

Researcher : Kao CM



Project Title:

Association rule mining on continuous stream data

Investigator(s):

Kao CM, Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To derive efficient online time-based sampling algorithms; to derive efficient approximation algorithms for mining association rules from a single data stream; to derive efficiency algorithms for mining inter-stream associations; to perform time-delayed association analysis.

 

Project Title:

Computational issues in mining uncertain data

Investigator(s):

Kao CM, Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2006

 

Abstract:

1 Data Uncertainty Models. One of the key steps in knowledge discovery is data collection. In practice, statistical approximation is used in the data collection process. This may be due to measurement error or data values that are based on subjective judgement. Our first objective is to investigate the various forms of uncertainty that may exist in data, and how these various forms of uncertainty affect the design of data-mining algorithms under different mining models (such as association-rule mining, clustering, and classification). For starters, we consider "value uncertainty" and "existential uncertainty." A database system models the physical world by recording facts (attribute values) of real-life entities (data items or tuples). By value uncertainty, we refer to data that contains a known set of tuples but their attribute values are uncertain. For example, a moving-object database tracks the location of a set of known moving objects. Due to the time lag between the current time and the time an object's location was last recorded, the current location of an object (an attribute value) can only be approximated by a statistical model. Example models include "uniform line uncertainty" (consider the moving object being a car moving on a straight road) and "Gaussian circular uncertainty" (consider the moving object performs a random walk starting from its last recorded location). By existential uncertainty, we refer to data whose tuple membership is uncertain or fuzzy. For example, a patient with a body temperature of 100F may be assessed as having a fever with a confidence of 70%. Here, the physical entity (patient) exists, but its attribute value (fever) is associated with an estimated probability. 2 Mining Association Rules from Uncertain Data. Traditional algorithms for mining association rules apply to market basket type of data. A market basket dataset consists of a number of "transactions" each being a set of "items." For example, a transaction may read "milk, bread, egg" specifying what a particular customer has purchased. Association rule mining aims at finding rules of the form X => Y, where X and Y are non-overlapping non-empty itemsets. The semantics of the rule is that if all the items in X occur in a transaction, then it is very likely that items in Y also occur in the same transaction. In many applications, however, the occurrence of an item/event in a transaction/tuple may not be certain. As we will elaborate further in Section 2, Part II, a transcriptomic microarray dataset, for example, might register probabilistic values. Here, an experiment derives a tuple of the dataset and an entry in the tuple corresponds to whether a particular gene is "over-expressed" in that experiment. As we will explain later, "over-expression" is best associated with a probability to lighten the effect of measurement error. Hence, the dataset can be considered as one whose tuples contain items that are associated with existential probabilities. Our objective here is to re-visit the definition of association rules in the presence of items' existential probabilities. Also, our preliminary study shows that traditional algorithms like Apriori are not efficient when applied to this kind of uncertain datasets. New algorithms that handle data uncertainty efficiently need to be designed. 3 Uncertain Data Clustering. Given a set of data objects, clusterization is about grouping the objects into clusters such that objects belonging to the same cluster are "close" to each other while objects belonging to different clusters are "far" from each other, with respect to some distance metric defined for "closeness." As an example, if landmarks/buildings etc. are considered objects, then clusterization would group them according to their physical proximity. Traditional clustering algorithms assume that data is certain, in terms of both objects' existence and their feature values (e.g., a landmark's co-ordinates). Our third objective is to investigate how clustering should be done if data uncertainty exists. For example, with "value uncertainty", the objects are no longer considered as "points" in the feature space. Instead, they are described by probability density functions according to the uncertainty model assumed. The implication is that traditional distance metrics, such as Euclidean distance, are no longer applicable. Traditional clustering algorithms assign an object to a cluster based on the "distance" the object is from the cluster (using the cluster's centroid as a reference point, for example). With value uncertainty, other more complicated distance metrics, such as "expected Euclidean distance" has to be used. In these cases, the computation of "distance" becomes very computationally expensive, which often requires numerical integration methods. We will derive algorithms that are designed to reduce such expensive computation. 4 Building Classifiers from Uncertain Data. Classification is another very important data-mining model. A number of methods for building classifiers have been proposed in the past, including decision tree classifiers, neural networks, Bayesian classifiers, and emerging-pattern-based classifiers. Our fourth objective is to study how data uncertainty affects the construction of those classifiers. In classification, a set of training data is used to construct a classifier. A training tuple typically consists of some attribute values together with a class label. Building a classifier requires plowing through the training set and figuring out which attribute value combination lead to a strong implication of a particular class label. Again, traditional algorithms assume certain data. We consider both value uncertainty (i.e., attribute values are represented by pdf's) and label uncertainty (i.e., the class label of a training data tuple is associated with a probability. 5 Applying Uncertain Data Mining Algorithms to Real-Life Applications. Our final objective is to evaluate the effectiveness of our mining algorithms when applied to real-life applications. There are two goals: (1) to study whether the quality of the mined results (be they association rules, clusters, or classifiers) are better when data uncertainty is taken into account in the mining process; (2) to study the efficiency of such mining algorithms.

 

List of Research Outputs

 

Cheung L., Yip Y.L., Cheung D.W.L., Kao C.M. and Ng K.P., On Mining Micro-array Data by Order-Preserving Submatrix, International Journal of Bioinformatics Research and Applications (IJBRA). Inder Sciences Publishers, 2007, 3: 42-64.

 

Chui C.K., Kao C.M. and Hung Y.W., Mining Frequent Itemsets from Uncertain Data, Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, PAKDD 2007. Nanjing, China, Springer, 4426: 47-58.

 

Chui C.K., Kao C.M. and Hung E., Mining Frequent Itemsets from Uncertain Data, The 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). 2007.

 

Lin B., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007. Hawaii, USA, IEEE, 516-523.

 

Lin H., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, IEEE Symposium on Computational Intelligence and Data Mining (IEEE CIDM 2007). 2007.

 

Loo K.K. and Kao C.M., Mining Time-Delayed Associations from Discrete Event Datasets, The 12th International Conference on Database Systems for Advanced Applications (DASFAA 2007). 2007.

 

Ngai W.K., Kao C.M., Chui C.K., Cheng C.K., Michael C.L. and Yip Y.L., Efficient Clustering of Uncertain Data, Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, IEEE Computer Society, 2006, 436-445.

 

Ngai W.K., Kao C.M., Cheng R., Chau M.C.L., Yip Y.L. and Chui C.K., Efficient Clustering of Uncertain Data, The 2006 IEEE International Conference on Data Mining (IEEE ICDM 06). 2006, 436-445.

 

Researcher : Karras P



List of Research Outputs

 

Karras P. and Mamoulis N., The Haar+ Tree: A Refined Synopsis Data Structure, IEEE 23rd International Conference on Data Engineering. 2007.

 

Researcher : Kuo DF



List of Research Outputs

 

Tse T.H., Cai K.Y. and Kuo D.F., Virtual Earth Award, Microsoft Research. 2007.

 

Researcher : Kwan VJWM



List of Research Outputs

 

Lau F.C.M., Belaramani N.M., Kwan V.J.W.M., Siu P.L.P., Wing W.K. and Wang C.L., Code-on-Demand and Code Adaptation for Mobile Computing, The Handbook of Mobile Middleware. Auerbach Publications, 2006, 441-463.

 

Researcher : Kwan YK



List of Research Outputs

 

Chow K.P., Law Y.W., Kwan Y.K. and Lai K.Y., The Rules of Time on NTFS File System, The Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 07. Los Alamitos, USA, IEEE Computer Society Press, 2007, 71-85.

 

Researcher : Lai KY



List of Research Outputs

 

Chow K.P., Law Y.W., Kwan Y.K. and Lai K.Y., The Rules of Time on NTFS File System, The Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 07. Los Alamitos, USA, IEEE Computer Society Press, 2007, 71-85.

 

Lai K.Y., Solving Multiparty Private Matching Problems using Bloom-Filters, 2006.

 

Researcher : Lam TW



Project Title:

Algorithms for uncovering conserved genes on whole genomes

Investigator(s):

Lam TW

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To investigate the complexity of a maximum common subsequence problem that models mutations between genomes; to design and implement better algorithms and software for uncovering conserved genes.

 

Project Title:

Compressed indexes for approximate string matching, with applications to biological sequences

Investigator(s):

Lam TW

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

08/2006

 

Abstract:

1 The objectives of my proposal contains special fonts, and they are included into the section of backgrounds of research as a combined pdf file.

 

List of Research Outputs

 

Chan H.L., Lam T.W., Sung W.K., Tam S.L. and Wong S.S., A Linear Size Index for Approximate Pattern Matching, The 17th Annual Symposium on Combinatorial Pattern Matching (CPM). Springer, 2006, LNCS 4009: 49-59.

 

Chan H.L., Lam T.W., Sung W.K., Tam S.L. and Wong S.S., Compressed Indexes for Approximate String Matching, In: Yossi Azar, Thomas Erleback, 14th Annual European Symposium on Algorithms (ESA). Springer, 2006, LNCS 4168: 208-219.

 

Chan H.L., Hon W.K., Lam T.W. and Sadakane K., Compressed Indexes for Dynamic Text Collections, ACM Transactions on Algorithms (TALG). 2007, 3:2: Article 21, pages 1-29.

 

Chan H.L., Lam T.W. and Wong P., Efficiency of Data Distribution in BitTorrent-like Systems , The 3rd International Conference on Algorithmic Aspects in Information and Management . 2007, 378-388.

 

Chan H.L., Chan W.T., Lam T.W., Lee L.K., Mak K.S. and Wong P., Energy Efficient Online Deadline Scheduling , The 18th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 2007, 795-804.

 

Chan H.L., Jannson J., Lam T.W. and Yiu S.M., Reconstructing An Ultrametric Galled Phylogenetic Network From A Distance Matrix , Journal of Bioinformatics and Computational Biology. World Scientific, 2006, 4: 4: 807-832.

 

Chan W.T., Lam T.W., Liu K.S. and Wong P., New resource augmentation analysis of the total stretch of SRPT and SJF in multiprocessor scheduling, Theoretical Computer Science. Elsevier, 2006, 359:1-3: 430-439.

 

Chan W.T., Lam T.W., Mak K.S. and Wong P., Online Deadline Scheduling with Bounded Energy Efficiency, The 4th International Conference on Theory and Applications of Models of Computation (TAMC). 2007, 416-427.

 

Hon W.K., Lam T.W., Sadakane K., Sung W.K. and Yiu S.M., A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays , Algorithmica. 2007, 48:1: 23-36.

 

Lam T.W., Best Teacher Award 2006, Faculty of Engineering, The University of Hong Kong. 2006.

 

Lam T.W., Field editor (Computational Biology), Encyclopedia of Algorithms. Springer US, 2007.

 

Lam T.W., Online Deadline Scheduling with Energy Concern, The 19th International Symposium of Mathematical Programming (ISMP). 2006.

 

Lam T.W., Teaching Excellence Award 2006, Department of Computer Science, The University of Hong Kong. 2007.

 

Wong K.F., Lam T.W., Yang W. and Yiu S.M., Finding Alternative Splicing Patterns with Strong Support from Expressed Sequences , The 2007 International Conference on Bioinformatics and Computational Biology (BIOCOMP). 2007.

 

Yiu S.M., Wong P., Lam T.W., Mui Y.C., Kung H.F., Lin M.C. and Cheung Y.T., Research Output Prize, Faculty of Engineering, The University of Hong Kong. 2006.

 

Researcher : Lau FCM



Project Title:

The Hong Kong University grid point

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Matching Fund for Hi-Tech Research and Development Program of China (863 Projects)

Start Date:

12/2002

 

Abstract:

To study grid point of The University of Hong Kong.

 

Project Title:

Content adaptation for mobile computing

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

 

Abstract:

To design and implement a content adaptation system with context-awareness and which is sensitive to user's preferences; to design and implement an automatic content augmentation tool for content creation.

 

Project Title:

A holistic approach to structured web document viewing in small devices

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To produce a system design covering the content creation, content adaptation, and content rendering aspects of Web content viewing on a mobile handheld device, whereby any viewing activity will be seen as complete, fast, and easy.

 

Project Title:

HP mobile technology for teaching initiative

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Hewlett-Packard HK SAR Ltd.

Start Date:

10/2004

 

Abstract:

To develop HP mobile technology for teaching initiative.

 

Project Title:

Intelligent Systems for Painting and Calligraphy

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The objectives of this proposed project are: (1)To apply point-based techniques to achieve fast rendering of the brush geometry, and to consider image-based rendering algorithms for high quality rendering of the animated brush. (2) To incorporate the smooth particles hydrodynamics method borrowed from astrophysics in the dynamics simulation of the brush. (3) To apply particle diffusion (from chemistry/physics) to simulate the complex pigment behavior. (4) To devise an intelligent system component for training the brush to adapt to “personal habitual bias” of the user. (5) To extend the present calligraphy generation system with a feedback reinforcement learning component to strengthen the constraint satisfaction process. (6) To explore possible new recognition algorithms for calligraphic writings of which the characters are severely distorted.

 

Project Title:

UGC-Matching Grant Scheme (2nd Phase)-Process Migration and Runtime Scheduling for Parallel Tasks in Computational Grids

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Other Funding Scheme

Start Date:

05/2006

 

Abstract:

To study process migration and runtime scheduling for parallel tasks in computational grids.

 

Project Title:

Memory management strategies to improve garbage collectors

Investigator(s):

Lau FCM, Wang CL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2006

 

Abstract:

1. To devise a low-overhead dynamic object pretenuring mechanism for identifying long-lived objects and allocating them to the mature space directly. 2. To design a nursery sizing policy which can select, against a given total heap size, a best nursery size leading to the best performance of an application. 3. To design an automatic heap sizing policy for controlling the heap growth.

 

List of Research Outputs

 

Feng X., Lau F.C.M. and Shuai D.X., A New Generalized Particle Approach to Parallel Bandwidth Allocation , Computer Communications. Elsevier, 2006, 29: 3933-3945.

 

Feng X., Lau F.C.M. and Shuai D.X., A Novel Game Particle-Field Approach to Parallel Cache Resource Allocation of CDN , Chinese Journal of Computers. 2007, 30: 368-379.

 

Hua Q. and Lau F.C.M., The Scheduling and Energy Complexity of Strong Connectivity in Ultra-Wideband Networks, 9th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2006). 2006, 282-290.

 

Lau F.C.M., Belaramani N.M., Kwan V.J.W.M., Siu P.L.P., Wing W.K. and Wang C.L., Code-on-Demand and Code Adaptation for Mobile Computing, The Handbook of Mobile Middleware. Auerbach Publications, 2006, 441-463.

 

Lau F.C.M., Managing Editor, Journal of Interconnection Networks (JOIN). 2007.

 

Ma T...C..., Chen L., Wang C.L. and Lau F.C.M., G-PASS: An Instance-oriented Security Infrastructure for Grid Travelers, Concurrency and Computation: Practice and Experience. 2006, 18: 1871-1884.

 

Shi Y..., Lau F.C.M., Tse S.S.H., Du Z...H..., Tang R...C... and Li S...L..., Club Theory of The Grid, Concurrency and Computation: Practice and Experience. 2006, 18: 1759-1773.

 

Tsang M.C.M., Wang C.L., Tsang K.C.K. and Lau F.C.M., A Receiver-Coordinated Approach for Throughput Aggregation in High Bandwidth Multicast, INFOCOM 2007. 26th IEEE International Conference on Computer Communications. Anchorage, USA, IEEE, 2007, 2551-2555.

 

Zhou J...P..., Lu J...H... and Lau F.C.M., Location-Based Multicast Routing Protocol for Mobile Ad Hoc Networks, Second International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2006). 2006, 38-46.

 

Researcher : Law YW



List of Research Outputs

 

Chow K.P., Law Y.W., Kwan Y.K. and Lai K.Y., The Rules of Time on NTFS File System, The Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 07. Los Alamitos, USA, IEEE Computer Society Press, 2007, 71-85.

 

Researcher : Lee LK



List of Research Outputs

 

Chan H.L., Chan W.T., Lam T.W., Lee L.K., Mak K.S. and Wong P., Energy Efficient Online Deadline Scheduling , The 18th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 2007, 795-804.

 

Researcher : Lee TYT



List of Research Outputs

 

Cheung D.W.L., Yee K.C. and Lee T.Y.T., Consultancy, Government Electronic Trading Services, HKSAR Government Office of the Government Chief Information Officer. Hong Kong, 2007.

 

Researcher : Leung CM



List of Research Outputs

 

Leung C.M. and Chin F.Y.L., An efficient motif discovery algorithm with unknown motif length and number of binding sites, International Journal of Data Mining and Bioinformatics (IJDMB). Switzerland, Inderscience Enterprises Limited, 2006, 1(2): 201-215.

 

Leung C.M. and Chin F.Y.L., Discovering DNA Motifs with Nucleotide Dependency, The IEEE 6th Symposium on Bioinformatics and Bioengineering (BIBE 06). Washington DC, USA, 2006, 70-77.

 

Leung C.M. and Chin F.Y.L., Discovering Motifs with Transcription Factor Domain Knowledge, Pacific Symposium on Biocomputing (PSB 2007). Wailea, Maui, Hawaii, USA, 2007, 472-483.

 

Leung C.M. and Chin F.Y.L., Finding motifs from all sequences with and without binding sites, Bioinformatics. Oxford University Press, 2006, 22(18): 2217-2223.

 

Leung C.M., Motif Discovery for DNA Sequences, 2007.

 

Leung C.M. and Chin F.Y.L., Redundancy Elimination in Motif Discovery Algorithms, The Third Annual RECOMB Satellite Workshop on Regulatory Genomics. Singapore, 2006, 28-37.

 

Researcher : Leung WS



List of Research Outputs

 

Leung W.S., Shen Z., Yiu S.M., Kung H.F. and Lin M.C., The Anti-Angiogenic Signaling Network of rAAV-HGFK1, The Fifth Asia-Pacific Bioinformatics Conference, APBC2007; 14-17 Jan, 2007; Hong Kong.. 2007, apbc104.

 

Liu C. and Leung W.S., A Database of Traditional Chinese Medicine and Their Hypothetic Molecular Targets in the Druggable Genome., Postgraduate Symposium on traditional Chinese medicine.. 2006.

 

Researcher : Li W



List of Research Outputs

 

Huo Q. and Li W., A DTW-Based Dissimilarity Measure For Left-to-Right Hidden Markov Models And Its Application To Word Confusability Analysis, Interspeech 2006 - ICSLP. Pittsburgh, USA, ISCA, 2006, 2338-2341.

 

Researcher : Lin H



List of Research Outputs

 

Lin H., Ho W.S., Kao C.M. and Chui C.K., Adaptive Frequency Counting over Bursty Data Streams, IEEE Symposium on Computational Intelligence and Data Mining (IEEE CIDM 2007). 2007.

 

Researcher : Liu KS



List of Research Outputs

 

Chan W.T., Lam T.W., Liu K.S. and Wong P., New resource augmentation analysis of the total stretch of SRPT and SJF in multiprocessor scheduling, Theoretical Computer Science. Elsevier, 2006, 359:1-3: 430-439.

 

Researcher : Liu Y



List of Research Outputs

 

Yan D., Liu Y. and Wang W.P., Quadric Surface Extraction by Variational Shape Approximation, In: Myung-Soo Kim, Kenji Shimada, Geometric Modeling and Processing - GMP 2006: 4th International Conference. Pittsburgh, PA, USA, Springer, 2006, 73-86.

 

Researcher : Loo KK



List of Research Outputs

 

Loo K.K. and Kao C.M., Mining Time-Delayed Associations from Discrete Event Datasets, The 12th International Conference on Database Systems for Advanced Applications (DASFAA 2007). 2007.

 

Researcher : Lu H



List of Research Outputs

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., Integration testing of context-sensitive middleware-based applications: a metamorphic approach, International Journal of Software Engineering and Knowledge Engineering. Singapore, World Scientific, 2006, 16 (5): 677703.

 

Lu H., Chan W.K. and Tse T.H., Static slicing for pervasive programs, Proceedings of the 6th International Conference on Quality Software (QSIC 2006), IEEE Computer Society Press, Los Alamitos, California. 2006, 185192.

 

Lu H., Chan W.K. and Tse T.H., Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation, Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT 2006/FSE-14), ACM Press, New York. 2006, 242252.

 

Researcher : Lui WC



List of Research Outputs

 

Hui C.K., Yiu S.M. and Lui W.C., Accountability in organizations, Int. J. Information and Computer Security. UK, Inderscience Enterprises Ltd, 2007, Vol. 1, No. 3: 237-255.

 

Researcher : Mak KS



List of Research Outputs

 

Chan H.L., Chan W.T., Lam T.W., Lee L.K., Mak K.S. and Wong P., Energy Efficient Online Deadline Scheduling , The 18th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 2007, 795-804.

 

Chan W.T., Lam T.W., Mak K.S. and Wong P., Online Deadline Scheduling with Bounded Energy Efficiency, The 4th International Conference on Theory and Applications of Models of Computation (TAMC). 2007, 416-427.

 

Researcher : Mamoulis N



Project Title:

Periodicity of movement in spatiotemporal databases

Investigator(s):

Mamoulis N

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2005

Completion Date:

12/2006

 

Abstract:

To develop the effective data mining algorithms that can discover periodic object movement patterns; to develop the indexes that cluster object movements based on the discovered periodic patterns; to study the discovery of patterns which are weighted according to how recently their instances appear.

 

Project Title:

Continuous Constraint Query Evaluation for Spatio-temporal Data Sequences

Investigator(s):

Mamoulis N, Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The main objectives of this project are: (1) The development of effective techniques that manage and index incoming events in memory. These techniques will take adantage of the special nature of the queries to minimize the required memory. (2) The development of appropriate algorithms for evaluation of CCQ. The algorithms should consider the online, dynamic nature of the queries. Each time a new event arrives, we need to validate whether it forms a query result with past events. (3) The development of approximate management and query evaluation solutions for problem settings, when the required memory is smaller than the available. For such cases, we should consider data structures like spatiotemporal histograms, which could allow query evaluation with some uncertainty. (4) The integration of the developed system with a spatiotemporal pattern mining module that will automatically define the CCQs.

 

Project Title:

Evaluation of advanced spatial queries in sensor networks

Investigator(s):

Mamoulis N

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2007

 

Abstract:

(1) We aim at providing methods that continuously evaluate advanced spatial queries in a sensor network locally, avoiding as much as possible unnecessary transmission of information to (potentially remote) centralized servers (i.e., information collectors). We are especially interested in queries that combine information from neighbor nodes, instead of monitoring simple aggregate results in a spatial region. An interesting class of such queries is spatial-pattern queries (a.k.a. structural spatial queries [PMD98]), which are generalizations of spatial joins. An example of a query in this class is “a high-temperature reading (>50 degrees) close to and surrounded by at least four low-humidity readings (

<40%)”. A local group of sensors whose readings satisfy this query could indicate an area that requires special attention (e.g., high chances of fire if a green area). The objectives of this project can be summarized as follows: (2) • The formal definition of spatial pattern queries for which results are combinations of sensors (i.e., locations) and interesting readings thereof. We aim to formally define such queries and language extensions for expressing them. In addition, we will investigate variants and extensions of the basic class of pattern queries. We will deal with instantaneous and continuous versions of the queries (with expiration times). We will also consider queries with temporal predicates between sensor readings (e.g., “report cases where a high temperature is sensed at most 5 seconds after a low-humidity reading, nearby”).(3) The development of routing mechanisms and communication protocols for registering spatial pattern queries at sensors. Sensors should be aware of the queries that may involve them and responsible for their evaluation (in their local neighborhood). Once a query is registered in the network, the affected sensors should be notified by appropriate routing mechanisms. In addition, we will develop mechanisms for communicating query results, computed locally, to a remote receiver (which may well be the query issuer). Moreover, we will deal with multiple query optimization, i.e., how to compute results of multiple sub-queries simultaneously and then extend them. Another related issue is how to encode/index queries at the sensor nodes in order to effectively determine whether a sensed value is relevant to a query and which one. (4) • The development of computationally efficient and power-aware query evaluation mechanisms. First, we should avoid continuous acquisition of sensor readings that would flood the network and affect negatively the power-life of sensors, which generate or forward them. Instead, we will develop effective mechanisms for localized computation of query results. Leader sensor nodes will be chosen and will be responsible for the evaluation and transmission of query results, aiming at minimization of (i) communication between sensors (i.e., messages and their sizes) and (ii) processing information at sensors.(5) The development of algorithms for approximate query evaluation in redundant networks. Sensor networks may be redundant; more nodes than necessary may densely be placed in a field in order to increase the accuracy for the sensed environmental readings and prevent total network failure when some nodes fail. We plan to apply query evaluation only at a small sample of the network enough to provide us with query results that may not be complete, but accurate enough based on guarantees derived by the sampling methodology. For this case, we will adapt previous mechanisms or develop new (based on the nature of queries) for node clustering, dynamic leader selection, and leader shutdown handling.(6) A successful outcome of this project will be of significant importance, since it may find application in several surveillance applications, including (1) emergency planning and disaster discovery, e.g., alerting fire departments for abnormal readings of sensor combinations; (2) real-time monitoring and analysis of movement patterns, indicated by thermal/motion sensors; (3) environmental monitoring, e.g., predicting wheather phenomena based on known combinations of sensor readings.>

 

List of Research Outputs

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Discovery of Collocation Episodes in Spatiotemporal Data, The 6th IEEE International Conference on Data Mining. 2006.

 

Cao H.P., Mamoulis N., Cheung D.W.L. and Yip K., Discovery of Periodic Patterns in Spatiotemporal Sequences, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2007, 19: 453-467.

 

Karras P. and Mamoulis N., The Haar+ Tree: A Refined Synopsis Data Structure, IEEE 23rd International Conference on Data Engineering. 2007.

 

Mouratidis K., Yiu M.L., Papadias D. and Mamoulis N., Continuous Nearest Neighbor Monitoring in Road Networks, Proceedings of the 32nd Very Large Data Bases Conference (VLDB), Seoul, Korea, September 2006.. 2006.

 

Tao Y., Yiu M.L. and Mamoulis N., Reverse Nearest Neighbor Search in Metric Spaces, IEEE Transactions on Knowledge and Data Engineering (TKDE). 2006, 18(9): 1239-1252.

 

Yiu M.L. and Mamoulis N., Reverse Nearest Neighbors Search in Ad Hoc Subspaces, IEEE Transactions on Knowledge and Data Engineering. IEEE Computer Society, 2007, 19(3): 412-426.

 

Yiu M.L., Dai X., Mamoulis N. and Vaitis M., Top-k Spatial Preference Queries, IEEE 23nd International Conference on Data Engineering. 2007.

 

Researcher : Mui YC



List of Research Outputs

 

Yiu S.M., Wong P., Lam T.W., Mui Y.C., Kung H.F., Lin M.C. and Cheung Y.T., Research Output Prize, Faculty of Engineering, The University of Hong Kong. 2006.

 

Researcher : Ng CY



List of Research Outputs

 

Cheung D.W.L. and Ng C.Y., Consultancy, Information Modeling for Garment Industry Business Exchange, iGarment Ltd., Hong Kong. Hong Kong, 2006.

 

Cheung D.W.L. and Ng C.Y., Enterprise Data Architecture Training, Drainage Service Department; HSBC; Diary Farm. Hong Kong, 2007.

 

Cheung D.W.L. and Ng C.Y., Enterprise Data Architecture Training, HKSAR Government Office of the Government Chief Information Officer. Hong Kong, 2007.

 

Researcher : Ngai WK



List of Research Outputs

 

Ngai W.K., Kao C.M., Chui C.K., Cheng C.K., Michael C.L. and Yip Y.L., Efficient Clustering of Uncertain Data, Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, IEEE Computer Society, 2006, 436-445.

 

Ngai W.K., Kao C.M., Cheng R., Chau M.C.L., Yip Y.L. and Chui C.K., Efficient Clustering of Uncertain Data, The 2006 IEEE International Conference on Data Mining (IEEE ICDM 06). 2006, 436-445.

 

Researcher : Peng Z



List of Research Outputs

 

Ting H.F., Peng Z. and Leung H.F., An efficient algorithm for online square detection, In: G. Ausiello, Theoretical Computer Science. Amsterdam, Elsevier, 2006, 363:1: 69-75.

 

Ting H.F. and Peng Z., An optimal algorithm for maximum constrained agreement subtree for binary trees, In: A. Tarlecki, Information processing letters. Amsterdam, Elsevier, 2006, 100:4: 137-144.

 

Researcher : Pun KH



Project Title:

Community Legal Information Project

Investigator(s):

Pun KH

Department:

Computer Science

Source(s) of Funding:

Department of Justice, HKSAR Government - General Award

Start Date:

04/2004

 

Abstract:

To study community legal information.

 

List of Research Outputs

 

Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, 2007, 203-212.

 

Researcher : Siu PLP



List of Research Outputs

 

Lau F.C.M., Belaramani N.M., Kwan V.J.W.M., Siu P.L.P., Wing W.K. and Wang C.L., Code-on-Demand and Code Adaptation for Mobile Computing, The Handbook of Mobile Middleware. Auerbach Publications, 2006, 441-463.

 

Researcher : Su Q



List of Research Outputs

 

Su Q., Fung S.K. and Wong K.K.Y., Clustering Based 3D Level Set Method for Volumetric Cardiac Segmentation, Conference on Biomedical Engineering. Hong Kong, 2006, 85-88.

 

Researcher : Sui A



List of Research Outputs

 

Dong Y., Sui A., Yiu S.M., Li V.O.K. and Hui C.K., An efficient cluster-based proactive secret share update scheme for mobile ad hoc networks, Proc. IEEE ICC. Glasgow, Scotland, UK, 2007.

 

Researcher : Tam SL



List of Research Outputs

 

Chan H.L., Lam T.W., Sung W.K., Tam S.L. and Wong S.S., A Linear Size Index for Approximate Pattern Matching, The 17th Annual Symposium on Combinatorial Pattern Matching (CPM). Springer, 2006, LNCS 4009: 49-59.

 

Chan H.L., Lam T.W., Sung W.K., Tam S.L. and Wong S.S., Compressed Indexes for Approximate String Matching, In: Yossi Azar, Thomas Erleback, 14th Annual European Symposium on Algorithms (ESA). Springer, 2006, LNCS 4168: 208-219.

 

Researcher : Ting HF



Project Title:

Algorithmic issues on designing media-on-demand systems

Investigator(s):

Ting HF, Lam TW

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

08/2002

 

Abstract:

With the use of relative-competitive analysis for online systems, the project attempts to provide a theoretical foundation for comparing different media-on-demand (MOD) systems and thus helps to decide scientifically the right configurations. It is anticipated that results of the analysis can be used to design schedulers with performance guarantee and implement computational tools for building cost-effective MOD systems.

 

Project Title:

Design and analysis of algorithms for constrained structure comparisons

Investigator(s):

Ting HF

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

08/2006

 

Abstract:

1 (The motivation and background for the objectives are given in the next sections.) We design efficient algorithms for the Constrained Maximum agreement subtree (CMAST) problem and the Constrained Forest Edit-Distance (CFED) problem, which find important applications in bioinformatics, especially in comparative and evolutionary genomics. 2 We implement our algorithms and develop a Web-based tool that allows other biologists use our algorithms to solve their problems. 3 We gain, from our study, insights into the underlying intricacy of a new class of problems, namely the constrained combinatorial optimization problems, and develop general algorithmic techniques for them. 4 We explore a new problem solving methodolgy, namely knwoledge-based problem solving, and study how domain knowledge help us solve difficult problems.

 

List of Research Outputs

 

Hung R.Y.S. and Ting H.F., A Tight Analysis of the Most-Requested-First for On-demand Data Broadcasts, In: D.T. Lee, The Twelfth Annual International Computing and Combinatorics Conference. Taipei, Taiwan, Springer, 2006, 330-339.

 

Ting H.F., Peng Z. and Leung H.F., An efficient algorithm for online square detection, In: G. Ausiello, Theoretical Computer Science. Amsterdam, Elsevier, 2006, 363:1: 69-75.

 

Ting H.F. and Peng Z., An optimal algorithm for maximum constrained agreement subtree for binary trees, In: A. Tarlecki, Information processing letters. Amsterdam, Elsevier, 2006, 100:4: 137-144.

 

Ting H.F. and Hung Y.S.R., An optimal broadcasting protocol for mobile video-on-demand, In: Barry Jay, Proceedings of the 13th Australasian Theory Symposium. Sydney, Australian Computer Society, 2007, 79-85.

 

Researcher : Towey DP



List of Research Outputs

 

Chan K.P., Chen T.Y. and Towey D.P., Forgetting Test Cases, 30th Annual Internation Computer Software and Application Conference (COMPSAC 2006). Chicago, U.S.A., 2006, 1: 485-494.

 

Chan K.P., Chen T.Y. and Towey D.P., Probabilistic Adaptive Random Testing, Six International Conference on Quality Software (QSIC 2006). Beijing, China, 2006, 274-280.

 

Researcher : Tsang KCK



List of Research Outputs

 

Tsang M.C.M., Wang C.L., Tsang K.C.K. and Lau F.C.M., A Receiver-Coordinated Approach for Throughput Aggregation in High Bandwidth Multicast, INFOCOM 2007. 26th IEEE International Conference on Computer Communications. Anchorage, USA, IEEE, 2007, 2551-2555.

 

Researcher : Tsang MCM



List of Research Outputs

 

Tsang M.C.M., Wang C.L., Tsang K.C.K. and Lau F.C.M., A Receiver-Coordinated Approach for Throughput Aggregation in High Bandwidth Multicast, INFOCOM 2007. 26th IEEE International Conference on Computer Communications. Anchorage, USA, IEEE, 2007, 2551-2555.

 

Researcher : Tsang WW



Project Title:

Tests for uniformity

Investigator(s):

Tsang WW, Chow KP, Hui CK, Chan HW, Chong CF, Pun KH

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2005

 

Abstract:

To develop accurate and easy-to-compute C programs for the cumulative distribution functions of the KS statistic and the Anderson-Darling statistic; to conduct a fair and thorough comparison on the power of various tests for uniformity; to develop new tests for uniformity.

 

Project Title:

Evaluating the CDF of the Kolmogorov Statistic for unknown parameter case

Investigator(s):

Tsang WW, Chong CF

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

09/2005

 

Abstract:

A goodness-of-fit test checks whether a set of samples follows a hypothetical distribution. The most common test for checking discrete samples is the chi-square test. The counterpart for real samples is the Kolmogorov-Smirnov (KS) test [3,5]. Consider an ordered set of samples, x1x2xn, and the hypothetical distribution, F(x), where all parameters of F(x) are known. The empirical distribution function (EDF) is defined as / | 0, x < x1, Fn(x) = < k/n , xk x < xk+1, k = 1,2,,n-1, | 1, xn x. \The Kolmogorov statistic, Dn, measures the maximum absolute distance between F(x) and Fn(x). The test result is conventionally determined by looking up tables of the critical values of Dn obtained from simulation [6]. In 2003, we developed a program that evaluates the cumulative distribution function (CDF) of Dn with 13-digit accuracy for 2 n 16000 [4]. The test result can thus be determined from the CDF of Dn. However, the KS test is still not quit readily applicable because the parameters of F(x) are often unspecified in real world applications. For example, in the testing of exponentiality, usually we have no idea on the mean of the exponential distribution. Therefore, we need to first estimate the mean from the samples. Then we check whether the samples follow the exponential distribution of this mean. The Dn so computed is noticeably smaller than that of the case where the mean is known beforehand. Durbin is the first scholar who advocates the study of the difference between the two cases [1,2]. Stephens has worked out a couple approximation formulas for the CDFs of two unknown parameter cases [7]. However, these formulas deviate from the true values by as much as 2%. Such extent of errors is not cmmensurate with the modern computing capability. The objective of this project is to develop accurate computer programs that evaluate the CDFs of Dn for the tests of normality and exponentiality, the two most common goodness-of-fit tests in unknown parameter case.Reference[1] J. Durbin, Distribution theory for tests based on the sample distribution function, Regional Conference Series in Applied Mathematics (9), SIAM, Philadelphia, 1973.[2] J. Durbin, Kolmogorov-smirnov tests when parameters are estimated, with applications to tests of exponentiality and tests on spacings, Biometrika, 62(1): 5-22, 1975.[3] A. Kolmogorov, Sulla determinazione empirical ei una legge di distributione, Giornale Dell' Istituto Italiano Degli Attuari, 4:83-91, 1933.[4] G. Marsaglia, W. W. Tsang and J. Wang, Evaluating Kolmogorov's distribution, Journal of Statistical Software, 8(18): 1-4, 2003.[5] N. V. Smirnov, On the deviation of the empirical distribution function, Recreational Mathematics (Mat. Sbornik), 6:3-26, 1939.[6] M. A. Stephens, EDF statistics for goodness of fit and some comparisons, Journal of the American Statistical Association, 69 (347): 730-737, 1974.[7] M. A. Stephens, Asymptotic results for goodness-of-fit statistics with unknown parameters, Annuals of Statistics, 4:357-369, 1976.

 

Project Title:

Evaluating the CDFs of the Anderson-Darling Statistics for normality and exponentiality testing

Investigator(s):

Tsang WW

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

12/2006

 

Abstract:

A goodness-of-fit test checks whether a set of samples follows a hypothetical distribution. The most common test for checking discrete samples is the Pearson’s chi-square test. The most common one for checking real samples is the Kolmogorov-Smirnov (KS) test [6,8]. The Anderson-Darling (AD) test is another test for checking real samples [1,2]. Consider an ordered set of samples, x1x2xn, and the hypothetical distribution, F(x), whose parameters are completely specified. The empirical distribution function (EDF) is denoted as Fn(x). Fn(x) equals 0 when x < x1, equals k/n when xk x xk+1 for k = 1,2,...,n-1, and equals 1 when xn x. The KS statistic, Dn, measures the maximum absolute distance between F(x) and Fn(x). The AD statistic, An, measures the weighted sum of the squares of the differences between F(x) and Fn(x). The AD test is a special case of the Cramer-von Mises approach. It is more powerful than the KS test [9]. Both Dn and An are distribution-free. The cumulative distribution function (CDF) of An is difficult to evaluate. T. W. Anderson and D. A. Darling have given an integration formula for the limiting CDF [1]. In 1954, they computed critical values of three significant levels of the limiting CDF using numerical integration [2]. P. A. W. Lewis tabulated the CDF of An for n = 1 to 8 and n = ∞ in 1961 [11]. He only evaluated the first two terms of a series expansion of the CDF. In 1974, Stevens gave tables of critical values for the limiting CDF [9]. In 1988, C. D. Sinclair and B. D. Spurr gave two approximation formulas for the limiting CDF [7]. In 2000, D. E. A. Giles derived a saddlepoint approximation for the limiting CDF [5]. His formula has accuracy similar to the Sinclair’s in the right tail of the distribution but superior in the left tail. The accuracy of the formulas or critical values mentioned above is at best 4 to 5 digits. In real life applications, the parameters of a hypothetical distribution are often not known. For example, in the testing of normality, usually we first estimate the mean and variance from the samples. Then we check whether the samples follow the normal distribution with such mean and variance. A test statistic, Dn or An, so computed is noticeably smaller than that of the case where the mean and variance are known beforehand. J. Durbin is the first scholar who advocates the study of the difference between the known (completely specified) and unknown parameter cases [3,4]. The statistics in the latter are not distribution free, i.e., the distribution of Dn or An depends on F(x). Durbin has derived a formula for the limiting CDF of An for exponentiality testing. However, his approach is computationally unstable in the crucial right tail region. M. A. Stephens has tabulated a table of critical values of An for normality and exponentiality testing from simulation results [10]. These values have about 2-digit accuracy in general but deviate from the true ones by as much as 2% in some cases. The objective of this project is to develop computer programs that evaluate the CDFs of the AD statistics in two most common applications 1. To develop a computer program that evaluates the CDF of the AD statistic for normality testing when the mean and variance are estimated from the samples being tested. No such program is currently available. A few critical values of the CDF found in literature deviate from the true values by as much as 2%. We aim at achieving an accuracy of 3 digits. 2. To develop a computer program that evaluates the CDF of the AD statistic for exponentiality testing when the mean is estimated from the samples being tested. No such program is currently available. A few critical values found in literature deviate from the true values by as much as 2%. We aim at achieving an accuracy of 3 digits. References [1] T. W. Anderson and D. A. Darling, Asymptotic theory of certain ‘goodness-of-fit’ criteria based on stochastic processes, Ann. Math. Stat., 23 193-212, 1952. [2] T. W. Anderson and D. A. Darling, A test of goodness of fit, J. Amer. Stat., Assn., 49 765-769, 1954. [3] J. Durbin, Distribution theory for tests based on the sample distribution function, Regional Conference Series in Applied Mathematics (9), SIAM, Philadelphia, 1973. [4] J. Durbin, Kolmogorov-smirnov tests when parameters are estimated, with applications to tests of exponentiality and tests on spacings, Biometrika, 62(1): 5-22, 1975. [5] D. E. A. Giles, A saddlepoint approximation to the distribution function of the Anderson-Darling test statistic, Communications in Statistics: Simulation and Computation, Volume 30, Issue 4, 2001. [6] A. Kolmogorov, Sulla determinazione empirical ei una legge di distributione, Giornale Dell’ Istituto Italiano Degli Attuari, 4:83-91, 1933. [7] Sinclair and B. D. Spurr, Approximations to the Distribution Function of the Anderson-Darling Test Statistic, Journal of the American Statistical Association, Vol. 83, No. 404, December, 1988. [8] N. V. Smirnov, On the deviation of the empirical distribution function, Recreational Mathematics (Mat. Sbornik), 6:3-26, 1939. [9] M. A. Stephens, EDF statistics for goodness of fit and some comparisons, Journal of the American Statistical Association, 69 (347): 730-737, 1974. [10] M. A. Stephens, Asymptotic results for goodness-of-fit statistics with unknown parameters, Annuals of Statistics, 4:357-369, 1976. [11] P. A. W. Lewis, Distribution of the Anderson-Darling statistic, Ann. Math. Stat., 32, 1118-1124, 1961.

 

List of Research Outputs

 

Tsang W.W. and Cheng K.H., The chi-square test when the expected frequencies are less than 5, Proceedings of the COMPSTAT 2006, 17th Symposium of IASC. Rome, Italy, Physica-Verlag, 2006, 1583-1589.

 

Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, 2007, 203-212.

 

Researcher : Tse SSH



List of Research Outputs

 

Shi Y, Lau F.C.M., Tse S.S.H., Du Z.H., Tang R.C. and Li S.L., Club Theory of The Grid, Concurrency and Computation: Practice and Experience. 2006, 18: 1759-1773.

 

Researcher : Tse TH



Project Title:

Towards an integrated method for program testing, proving debugging

Investigator(s):

Tse TH

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To provide an integrated method for testing, proving and debugging; to reduce the cost of software quality assurance by improving on individual techniques for testing, proving and debugging; to improve on the quality and relaibility of the software thus produced; to provide software engineers with effective testing, proving and debugging tools.

 

Project Title:

27th Annual international computer software and applications conference

Investigator(s):

Tse TH

Department:

Computer Science

Source(s) of Funding:

Croucher Foundation - Conference / Seminars

Start Date:

09/2004

 

Abstract:

27th Annual international computer software and applications conference

 

Project Title:

TIRAMISU: testing conText-sensItive, concurRent And MIddleware-baSed Ubiquitous software

Investigator(s):

Tse TH

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

02/2006

 

Abstract:

Ubiquitous computing means computing anywhere and at any time. Context-sensitive ubiquitous software dynamically adapts its operations according to the changing environment. One of the strategic directions of Hong Kong is to become a world-class base for supply chain management. Ubiquitous middleware-based sensor network systems are envisaged to be an essential enabling technology. Nevertheless, many researchers have emphasized the difficulties in assuring the quality of such software, because context-sensitive applications operate in a highly volatile and unpredictable environment. We were the first research group to embark on their testing techniques. We propose a major project to comprehensively address both the integration and unit testing of these systems. Context detections and function activations are the duties of the middleware. In unit testing, test oracles may not be immediately available for a component under test. We propose the application of metamorphic testing to solve the problem, focusing on isotropic context properties. They can reveal failures not identifiable by conventional testing methods. In integration testing, we propose a model in Communicating Sequential Processes to generate test cases that conform to the components in a ubiquitous environment. We make use of a notion of anti-extension, which can help to alleviate the state-explosion problem in test case generation. This project has important theoretical and practical implications. It will solve the major difficulties in testing complex context-sensitive middleware-based ubiquitous software. It will also illustrate the usefulness of formal approaches to software testing in practical situations.

 

Project Title:

An extensible fault-based predicate testing toolset for wireless sensor network software applications

Investigator(s):

Tse TH, Chan WK

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Support Programme

Start Date:

09/2006

 

Abstract:

The primary objective is to design and implement a predicate testing toolset for the development of wireless sensor network (WSN) applications running on TinyOS using nesC as the implementation language. TinyOS is the de facto state-of-the-art operating system for WSN applications. nesC is the de facto development language for TinyOS. Other objective include: (i) to formulate product-one architecture for the testing of embedded software; (ii) to enhance experience in the area of embedded software engineering; (ii) to improve on the quality of WSN applications; (iv) to improve on the quality of WSN applications; (v) to test and enrich the capability of the fault class hieracrhy and gain further insights on predicate testing; and (vi) to provide the industry with a user-friendly toolset for the development of WSN applications.

 

Project Title:

TIRAMISU: testing context-sensitive, concurrent and middleware-based ubiquitous software

Investigator(s):

Tse TH

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2006

 

Abstract:

1 The objectives of the project are as follows: (a) To provide integration testing techniques for context-sensitive concurrent middleware-based ubiquitous systems, (b) To provide unit testing techniques for context-sensitive concurrent middleware-based ubiquitous systems, (c) To provide software engineers with effective testing procedures and tools for context-sensitive software, and (d) To improve on the quality and reliability of ubiquitous software. 2 The proposed project has important theoretical and practical implications: (i) State explosion is an open problem in software testing and verification. It becomes significantly worse in context-sensitive and concurrent ubiquitous software. This project will address the problem using an enhanced form of extension particularly suitable for conformance testing. (ii) Results of context-sensitive ubiquitous applications may be hidden behind a hardware-software architecture so that they cannot easily be observed or recorded. This project will address the problem of testing context-sensitive software without precise oracles. (iii) Formal methods such as model checking and static analysis are gaining acceptance by practicing software engineers in recent years. This project will help accelerate this trend by demonstrating the usefulness of the CSP model for software engineering and software testing. (iv) The project will provide practical procedures and tools for software engineers to enhance the efficacy of software quality assurance, thus improving the cost-effectiveness of software development. (v) The usefulness of the testing techniques will be evaluated by experimental studies based on simulated and empirical data. (vi) The results of the project are important to the quality assurance of context-sensitive ubiquitous applications in Hong Kong as a logistics centre for Pearl River Delta.

 

List of Research Outputs

 

Cai K.Y., Ohnishi A. and Tse T.H., Guest editors' introduction, Special Issue on Quality Software, International Journal of Software Engineering and Knowledge Engineering. Singapore, World Scientific, 2006, 16 (5): 653654.

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., Integration testing of context-sensitive middleware-based applications: a metamorphic approach, International Journal of Software Engineering and Knowledge Engineering. Singapore, World Scientific, 2006, 16 (5): 677703.

 

Chan W.K., Cheung S.C., Ho J.C.F. and Tse T.H., Reference models and automatic oracles for the testing of mesh simplification software for graphics rendering, Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), IEEE Computer Society Press, Los Alamitos, California. 2006, 429438.

 

Chan W.K., Chen T.Y., Cheung S.C., Tse T.H. and Zhang Z., Towards the testing of power-aware software applications for wireless sensor networks, Reliable Software Technologies: Ada-Europe 2007, N. Abdennadher and F. Kordon (eds.), Lecture Notes in Computer Science, vol. 4498, Springer, Berlin. 2007, 8499.

 

Chen T.Y., Huang D.H., Tse T.H. and Zhang Z., An innovative approach to tackling the boundary effect in adaptive random testing, Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS-40), IEEE Computer Society Press, Los Alamitos, California. 2007.

 

Hu P., Zhang Z., Chan W.K. and Tse T.H., An empirical comparison between direct and indirect test result checking approaches , Proceedings of the 3rd International Workshop on Software Quality Assurance (SOQUA 2006) (in conjunction with the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT 2006/FSE-14)), ACM Press, New York. 2006, 613.

 

Lu H., Chan W.K. and Tse T.H., Static slicing for pervasive programs, Proceedings of the 6th International Conference on Quality Software (QSIC 2006), IEEE Computer Society Press, Los Alamitos, California. 2006, 185192.

 

Lu H., Chan W.K. and Tse T.H., Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation, Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT 2006/FSE-14), ACM Press, New York. 2006, 242252.

 

Tse T.H., Cover Design, Proceedings of the 6th International Conference on Quality Software (QSIC 2006), IEEE Computer Society Press, Los Alamitos, California. 2006.

 

Tse T.H., Editor, Journal of Systems and Software. Elsevier, Amsterdam, 2007.

 

Tse T.H., Editor, Software Testing, Verification and Reliability. Wiley, New York, 2007.

 

Tse T.H., Foundation Editor, Journal for Universal Computer Science. Springer, Berlin, 2007.

 

Tse T.H., Logo, Poster, Banner and Backdrop Designs, Hong Kong Abilympics. 2007.

 

Tse T.H., Cai K.Y. and Kuo D.F., Virtual Earth Award, Microsoft Research. 2007.

 

Researcher : Wang CL



Project Title:

The HKU Grid Computing Research Center

Investigator(s):

Wang CL, Lau FCM

Department:

Computer Science

Source(s) of Funding:

The University of Hong Kong Foundation Seed Grant

Start Date:

07/2003

 

Abstract:

To share resources and knowledge under the theme of grid computing; to collaborate on a joint effort to develop the Hong Kong grid which will then contribute to the China National Grid and the Asia-Pacific Grid.

 

Project Title:

A component-based software architecture for context-aware pervasive computing

Investigator(s):

Wang CL, Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To carry out: (1) proactive and context-aware adaptation: to realize the functionality adaptation. The proposed adaptation mechanism should be able to proactively discover contextual information and make applications constantly adapt to the changing environment. (2) mobility Support: to explore the possibilities of using the facet model to achieve better mobility in the pervasive world. In particular, the proposed system will support user mobility, which allows nomadic users to continue their job while switching from device to device. (3) software Extensibility: to build a real-life pervasive application using facets, to demonstrate that the functionalities and the scale of the application could be very extensibe and no longer be restricted by the resource-constrained devices.

 

Project Title:

Session continuity for mobile computing

Investigator(s):

Wang CL

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

11/2004

 

Abstract:

To construct the missing session layer support on top of the TCP, which masks network changes caused by terminal mobility from the applications, thereby maintaining virtually uninterrupted dialogs between endpoints; to design a name service which supports flexible mappings between logical entities and their network addresses, and to tackle the inherent performance issues.

 

Project Title:

Enhanced Distributed JVM for Large-scale Scientific Applications

Investigator(s):

Wang CL

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

04/2006

 

Abstract:

Many large-scale scientific and commercial data-mining applications are written in Java. These applications are in great need of a huge virtual memory to keep the created Java objects in memory for computation. In this research, we will introduce a cluster middleware, a Distributed JVM (DJVM) that can group the memory in all computing nodes (PCs or servers) to support parallel execution of large-scale memory-demanding Java applications. The DJVM will be built at the virtual machine level and it can make a cluster appear as a single, multi-processor machine to Java applications. Existing JVM or DJVM prototypes don't provide solutions for the problem of supporting huge virtula memory. A sinlge machine JVM can support up to 2GB memory space, which is insufficient for running an application with large data set. Previous approaches in DJVM have limitation in the JVM heap management in supporting an address space larger than 2GB in a 32-bit platform. The difficulties come from two aspects. (1) The JVM specification defines the size of the object refence as a word in a physical machine. On 32-bit machines, it is therefore 32-bit. Extending the address space will need to revise the JVM specification substantially. (2) All previous DJVMs are based on some open-source JVM implementations, which tends to follow the orginal specification. For new implementation, new and careful design in JVM heap and JIT compilers is needed in the DJVM kernel for manipulating of Java references, which is a non-trivious task. It needs to involve complex transformations of new reference type on the 32-bit platforms.To make the existing applications able to be transparently migrated to the new platform, we also need to make sure the Java libraries and latest APIs used by the Java applications can be executed on DJVM. To incorporate different Java libraries in a DJVM is a challenge because a JVM is often shipped with its own class libraries. Simply setting class search path or copying class libraries in the DJVM directories will not work. There are many compatibility problems to solve for a JVM to use another JVM's libraries. A DJVM needs to find a portable and flexible method to solve the transplant of Java libraries for the applications to use.

 

Project Title:

An advanced distributed java virtual machine on commodity clusters for high-performance memory-intensive computing

Investigator(s):

Wang CL, Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2006

 

Abstract:

(1) n a distributed Java Virtual Machine (DJVM), threads in a Java program are mapped to different computing nodes for execution and a shared global heap created from the memory of all the participating nodes allows data sharing among physically distributed threads. The state-of-the-art DJVMs can perform thread-to-processor remapping via thread migration to achieve load balancing. Multithreaded programming on a DJVM has the potential to become a preferred approach to high-performance computing. The hurdle, however, lies in the situation where many scientific problems in real life today have huge memory consumptions which are beyond what existing DJVM systems can offer. To our best knowledge, none of the existing DJVMs developed for commodity 32-bit PC clusters can offer cluster-wide sharable memory space exceeding 4 gigabytes (the size limit of virtual memory that a single 32-bit machine can address) no matter how many cluster nodes are used. (2) In this research, we propose to elevate DJVM technologies to a new level so that the new DJVM could support any memory-intensive scientific computing application using commodity 32-bit PC clusters. In the new DJVM, we will build a huge global object space (HGOS), a shared global heap that spans all the cluster nodes and can be larger than 4GB for storing a huge number of objects or very big objects. When large-size objects are in the HGOS, locality of reference becomes an important issue. We consider thread migration a good mechanism to achieve better locality, which can avoid unnecessary data migration. Nevertheless, distributed Java thread execution on a DJVM with thread migration will exhibit different behaviors over time that are not easily captured. The workload of a thread will change after migration because the object access cost will change with the change of execution location. The cache coherence overhead depends on the actual thread location and the sharing status that are only known at execution time. All these will make the workload of the system very unpredictable as compared with those using traditional message-passing solutions. The benefit of thread migration is therefore difficult to be estimated, and such simple heuristics as considering only the workloads of cluster nodes (based on the assumption that workload remains unchanged after migration) will not work. In this research, we propose to build a new DJVM having the following distinctive features. (A) Huge global object space support: To support a huge Java heap with size that can scale with the cluster size, and we will support cluster-wide 64-bit object reference for identifying and locating objects in a 32-bit commodity cluster. New addressing scheme will be developed for accessing segmented objects that are distributed among cluster nodes. (B) Fast wide address translation: As the hardware only supports a 32-bit addressing space, we need a fast software solution to translate the wide references to 32-bit references. An extended pointer swizzling method using a page faulting mechanism will be studied for achieving fast wide address translation and to avoid unnecessary object checking overheads.(C) HGOS-aware cache coherence protocol. As we support large objects that could be allocated across cluster nodes, new cache coherence protocol catered for the HGOS will be developed. Efficient whole object and segmented object caching mechanisms in line with the Java memory model will be explored for efficient object accesses in a cluster environment. (D) HGOS-directed workload model. We will investigate and propose a thread-centric load model to capture the migration benefits under the HGOS. The load model should reflect the explicit communication cost in accessing remote objects and the implicit cost embodied in the cache coherence protocol. A runtime profiling method using JIT-compilation techniques will be used to analyze thread stack contexts for approximating the workload of a thread and its migration benefits.(E) New thread migration policies: Migration policies will be devised based on the proposed workload model for choosing threads for migration to achieve maximum profits. We allow thread migration to take place when (1) thread migration can reduce the object access cost; (2) the workload among the cluster nodes is imbalanced, or (3) new nodes are added to participate in the computation.The proposed solutions make it possible to realize high-performance memory-intensive computations using commodity PC clusters based on the Java multithreading programming paradigm. The implementations of the new DJVM will follow the Java language specification without introducing new APIs or language modifications, which allows any existing Java program that runs on a single-node JVM to run on a cluster without any modification. Therefore, ordinary programmers do not need to learn new complicated parallel languages or runtime systems, such as MPI or software distributed shared memory (DSM). The latter approaches tend to impose a steep learning curve because they use explicit messaging passing or programmer-directed data partitioning to achieve efficient parallel execution.

 

List of Research Outputs

 

Lau F.C.M., Belaramani N.M., Kwan V.J.W.M., Siu P.L.P., Wing W.K. and Wang C.L., Code-on-Demand and Code Adaptation for Mobile Computing, The Handbook of Mobile Middleware. Auerbach Publications, 2006, 441-463.

 

Ma T...C..., Chen L., Wang C.L. and Lau F.C.M., G-PASS: An Instance-oriented Security Infrastructure for Grid Travelers, Concurrency and Computation: Practice and Experience. 2006, 18: 1871-1884.

 

Tsang M.C.M., Wang C.L., Tsang K.C.K. and Lau F.C.M., A Receiver-Coordinated Approach for Throughput Aggregation in High Bandwidth Multicast, INFOCOM 2007. 26th IEEE International Conference on Computer Communications. Anchorage, USA, IEEE, 2007, 2551-2555.

 

Researcher : Wang R



List of Research Outputs

 

Wang R., Gossiping in Meshes in All-Port Mode and with Short Packets, 2006.

 

Researcher : Wang WP



Project Title:

Collision detection of moving ellipses and ellipsoids

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

10/2002

 

Abstract:

To study the collision detection problem between moving ellipses in 2D plane and ellipsoids in 3D space. Specially, based on the PI's recent study on the algebraic properties of the arrangement of two ellipsoids.

 

Project Title:

New methods for collision detection of ellipsoids

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

 

Abstract:

To develop methods of collision detection of moving ellipsoids in the following three different cases: i) motions expressible as rational functions of time; ii) motions expressible by analytical functions of time; continuous motions, which include the important class of continuous but "non-smooth' motions due to interactive user control or constant interaction with surrounding objects in a VR or computer game application.

 

Project Title:

A new collision detection scheme fo human character animation

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

11/2004

Completion Date:

10/2006

 

Abstract:

Based on our previous results, to consider other quadric surfaces both in the static case as well as in continuous motion.

 

Project Title:

Efficient Collision Detection for Composite Quadric Models

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

04/2006

Completion Date:

12/2006

 

Abstract:

[Purpose] We shall investigate the collision detection problem for composite quadric models (CQMS), which are 3D objects bounded by planar and quadric surfaces. CQMs include objects as simple as ellipsoids and those more complex ones defined as the CSG (Constructive Solid Geometry) objects with quadric primitives. Figure 1 shows objects of this type in a context of collision detection for robot operation. Collision detection is of paramount importance to many fields involving object interaction and simulation, e.g., computer animation, computational physics, virtual reality, robotics and CAD/CAM. The efficiency and accuracy of the collision detection methods are critical to most applications. Quadric surfaces are widely used in practice. Ellipsoids and truncated/capped cylinders or cones are often used as bounding volumes of complex geometry in graphics and robotics. The rising interests in modeling human characters in computer game/animation and organic forms in bio-science make ellipsoids a serious contender for shape representation. Furthermore, most mechanical parts can accurately be modeled with simple quadrics, such as spheres, cones, and cylinders. Through composite representation or CSG composition, an even wider class of complex objects is modeled by quadric surfaces. [Key Issues] Most research in the literature has so far mainly concentrated on collision detection of piecewise linear objects (e.g., polyhedrons). These methods usually sample the motion time interval and then perform interference test for static objects along the motion path at sampled instants. When applied to collision detection of moving quadric surfaces, there are problems with these methods: 1) piecewise linear approximation introduces geometric error and entails large storage space; 2) discrete time sampling may miss collision between time samples for small or fast moving objects due to inadequate sampling, or results in inefficiency when overly dense sampling is used. [Previous work 1] Collision detection of quadric surfaces: Quadric surfaces, or quadrics, are the simplest curved surfaces of degree two. A straightforward way to detect whether or not two quadrics collide is to determine their intersection: two quadrics are separate if and only if their intersection is empty in real space. Intersection of quadric surfaces has been extensively studied [4, 5, 10, 9]. Related to collision detection of quadrics, distance computation for quadric surfaces is studied in [3]. However, the collision detection problem of quadrics by itself does not necessitate the computation of intersection or distance of two quadrics. Therefore, the procedures in the above work are usually too involved for time critical collision detection. Moreover, it is difficult to extend these methods to continuous collision detection (CCD) of quadrics. [Previous work 2] Continuous collision detection of moving objects: The common feature of continuous collision detection (CCD) methods is that no discrete time sampling is needed, thus inaccuracy due to missing collision between time samples is avoided. Recently, Redon et al. propose CCD methods of Oriented Bounding Boxes (OBB) [6], and Line Swept Sphere (LSS) primitives [7]. However, so far there has been no effective solution in the literature to CCD of quadric surfaces or the like, except for the recent work by the PI and his collaborators dealing with the CCD of moving elliptic disks in 2D plane and the CCD of moving ellipsoids in 3D space, which are a special case of general quadrics. [Related work by PI] The PI and his collaborators pioneered the algebraic approach to collision detection of conics and quadric surfaces, starting from their 2001 paper [11] on an algebraic condition on the separation of two ellipsoids. Our results have led to an algebraic method for exact collision detection of two ellipsoids based on time sampling [8] and another algorithm for continuous collision detection (CCD) of moving ellipsoids based on the analysis of a bivariate function [1]. We have also conducted further study on algebraic methods for fast and exact CCD of moving elliptic disks in 2D plane by processing a univariate function [2]. Basically, using our algebraic approach, we can handle the input ellipsoids or ellipses directly without geometric approximation, and we can set up and solve collision detection equations exactly without the need to sample the motion time. Compared with the conventional methods, the benefit of this algebraic approach is the significant improvement in spatial and temporal accuracy in collision detection. In this project we expect to extend this approach to deal with general quadrics and, more importantly, composite objects bounded by piecewise quadric or planar surface patches. Clearly, CCD for composite quadric models is a much more challenging problem than that for ellipsoids. We will have to consider collision between different types of boundary elements, such a boundary curve versus a boundary curve. The difficulty and intricacy of this problem will fully be discussed in the next part on Research Methodology. [Objectives] We shall study an algebraic framework for continuous collision detection (CCD) of composite quadric models (CQM) which are objects bounded by quadric or planar surface patches. We will use algebraic conditions to characterize and compute the times of collision and contact points in an accurate and efficient manner. Our framework is a significant extension to the previous work pioneered by the PI on an algebraic approach to the exact collision detection for ellipses and ellipsoids. The main challenges in this extension are: 1) A much larger number of quadric surfaces and more complex contact configurations of them need to be studied; 2) Unlike ellipsoids which are defined by a single equation, CQMs are defined by multiple quadratic inequalities, i.e., they are real semi-algebraic varieties. Hence, the existing algebraic approach to CCD of ellipsoids cannot be applied straightforwardly to CCD of CQMs. We will devise a systematic framework for continuous collision detection of CQMs. Specifically, our objectives are: ** establish algebraic conditions to characterize contact configurations of quadric surfaces in 3D; ** based on these algebraic conditions, devise efficient algorithms for CCD of composite quadric models.

 

Project Title:

Continuous collision detection for composite quadric models in computer graphics

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

07/2006

 

Abstract:

Establish algebraic conditions to characterize contact configurations of commonly used quadrics, such as ellipsoids, cones and cylinders, in 3D. Based on the above results, develop efficient algorithms for continuous collision detection of composite quadric models in the case where the intersection curves are conics.

 

Project Title:

New technology for real time and accurate collision detection in computer games and simulation

Investigator(s):

Wang WP, Choi YK, Liu Y, Lu L, Zheng D

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Support Programme

Start Date:

09/2006

 

Abstract:

In this project we aim to develop this collision detection technology from basic research results into an easy-to-use software tool kit that emcompasses an array of functions for collision detection of ellipsoids in various application scenarios in computer games and 3D interactive virtual environments. For compatibility with using boxes as bounding volumes, collision detection between boxes and ellipsoids will also be implemented. We will develop a prototype to demonstrate the utility and advantage of new collision detection technology. Our software tool kit will be cross-platofrm and open source in order to maximize its benefit to the computer game community in Hong Kong.

 

Project Title:

Conmputation of Bounding Ellipsoids

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

01/2007

 

Abstract:

Bounding volumes of complex 3D shapes are widely used for computation simulation in computer graphic, robotic, biomedical engineering, and CAD/CAM. We propose a novel, efficient optimization method for computing the ellipsoid bounding volumes of 3D objects. The bounding ellipsoids provide a highly compact representation of 3D shapes, which originally are often represented in the verbose format of point samples, mesh surfaces or planar faces. Thus our resarch will be useful to applications in geometric reasoning and processing, collision detection, compression and transmission of geometric data. The objectives of the projects are:1) We shall investigate the novel use of elliptic metric for 3D shape decomposition in the ellipsoid boundingproblem. Preliminary tests have shown advantages of the elliptic metric over the conventional Euclidean metric. 2) A robust and efficient optimization algorithm will be developed for solving the ellipsoid bounding problem, capable of automatic volume-driven component splitting and merging. Information about features or skeletons, when available, will be exploited for good initialization and stable convergence.

 

Project Title:

Computational algebraic geometry for industrial applications

Investigator(s):

Wang WP, Choi YK

Department:

Computer Science

Source(s) of Funding:

France/Hong Kong Joint Research Scheme - Travel Grants

Start Date:

01/2007

 

Abstract:

1. Shape segmentation and representation using quadrics 2. Shape processing using quadrics 3. Collision detection for objects defined by quadric surfaces 4. Software for algebraic modeling

 

List of Research Outputs

 

Yan D., Liu Y. and Wang W.P., Quadric Surface Extraction by Variational Shape Approximation, In: Myung-Soo Kim, Kenji Shimada, Geometric Modeling and Processing - GMP 2006: 4th International Conference. Pittsburgh, PA, USA, Springer, 2006, 73-86.

 

Researcher : Wang Z



List of Research Outputs

 

Wang Z., Static Type Analysis of XQuery Expressions Using Rewriting Calculus, 2007.

 

Researcher : Wing WK



List of Research Outputs

 

Lau F.C.M., Belaramani N.M., Kwan V.J.W.M., Siu P.L.P., Wing W.K. and Wang C.L., Code-on-Demand and Code Adaptation for Mobile Computing, The Handbook of Mobile Middleware. Auerbach Publications, 2006, 441-463.

 

Researcher : Wong DCK



List of Research Outputs

 

Cheung D.W.L. and Wong D.C.K., Consultancy Project, Hang Seng Bank Document Management System Design, Toppan Ltd., Hong Kong. Hong Kong, 2007.

 

Cheung D.W.L. and Wong D.C.K., Consultancy, Information Design for Content Standardization, Trade Development Council, Hong Kong. Hong Kong, 2006.

 

Researcher : Wong KF



List of Research Outputs

 

Wong K.F., Lam T.W., Yang W. and Yiu S.M., Finding Alternative Splicing Patterns with Strong Support from Expressed Sequences , The 2007 International Conference on Bioinformatics and Computational Biology (BIOCOMP). 2007.

 

Researcher : Wong KKY



Project Title:

3D shape recovery of complex objects using a dual-space approach

Investigator(s):

Wong KKY

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2006

 

Abstract:

The main objective of this project is to develop a novel method for reconstructing complex 3D objects with unknown topology using their silhouettes extracted from the image sequences. The proposed method exploits the duality principle governing surface points and their corresponding tangent planes, and enables direct estimation of points on the contour generators.

 

Project Title:

Robust recovery of differential information and object shape from silhouettes of unordered viewpoints

Investigator(s):

Wong KKY

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2007

 

Abstract:

The main objective of this project is to provide a robust computer vision based method for acquiring photorealistic 3D models of real world objects. Traditionally, high quality models are obtained through 3D laser scanners which are often expensive and not portable. The use of computer vision techniques provides a much cheaper alternative, and requires no more than a commercial grade imaging device. This is a vast advantage over laser scanners because no active sensor is required by these techniques, and there are fewer physical restrictions placed upon the object to be acquired. In this project, the silhouettes of the object are exploited to recover the differential properities of the object surface. Silhouettes are the profiles of the objects in the images, and they offer rich information about the shape of the objects. Compared with point features used in traditional photogrammetry algorithms, silhouettes can often be reliably extracted and provide relatively complete shape description about the observed objects. However, silhouettes in multiple views generally do not come with correspondent features, and hence the depth of the points on the silhouettes cannot be directly estimated using traditional stereovision techniques. Existing methods for reconstruction from silhouettes can be classified into two categories, namely volumetric approaches and differential approaches. While the volumetric approaches are more robust to objects with complicated shapes than existing differential approaches, they produce much less accurate surface points than differential approaches. Both the volumetric and differential approaches, however, can only reconstruct the visual hull of the object, and cannot reproduce concavities on the object surface. This project aims at bringing several important improvements over the existing differential approaches proposed by others and by the applicant: I) it can handle a more general configuration consisting of discrete viewpoints (cameras) with arbitrary spatial order, while existing differential approaches generally require the camera to travel a continuous path; II) it can extract a relatively complete and topologically correct surface like the volumetric approaches, while retain the accuracy of the differential approaches; III) it allows the integration of textural or shading information for further refinement of the reconstructed models and introduces concavities on the surface which cannot be inferred from silhouettes alone. To address the first issue, a novel distance measure between cameras is proposed. For each camera, we can dynamically discover the nearby cameras that allow differential structure on the surface to be estimated accurately. The second issue is addressed by introducing a novel generic surface extraction algorithm robust to a variety of topology of the observed object. The algorithm is motivated by the literature of medical image processing, particularly, surface extraction from cross-sections. The solution to the last issue is made possible by the nature of the methods we used to address the first two issues. By directly recovering the differential properties on the surface, we can easily locate the flat areas on the surface, which are de facto the candidate regions for concavities. The surface extraction algorithm we adopted conveniently allows us to insert vertices in the regions of interests, and refinement can then be done more efficiently. The proposed approach does not depend on the spatial order of the viewpoints of the input images, and can robustly reconstruct a complete complex object surface with high accuracy, and with the possibility of further refinement for introducing concavities to the model.

 

List of Research Outputs

 

Chung H.Y., Wong K.K.Y., Chin F.Y.L., Chow K.P. and Yuk S.C., Generalized Motion and Edge Adaptive Interpolation De-interlacing Algorithm, WSEAS Transactions on Computers. 2006, 5(11): 2544-2551.

 

Su Q., Fung S.K. and Wong K.K.Y., Clustering Based 3D Level Set Method for Volumetric Cardiac Segmentation, Conference on Biomedical Engineering. Hong Kong, 2006, 85-88.

 

Wong K.K.Y., Chin F.Y.L., Chung H.Y., Chow K.P. and Yuk S.C., Motion and Edge Adaptive Interpolation De-interlacing Algorithm, 10th WSEAS International Conference on Computers. Athens, Greece, 2006, 1030-1035.

 

Wong S.F., Wong K.K.Y. and Cipolla R., Robust Appearance-Based Tracking Using a Sparse Bayesian Classifier, 18th IAPR International Conference on Pattern Recognition. Hong Kong, 2006, 3: 47-50.

 

Yuk S.C., Wong K.K.Y., Chung H.Y., Chin F.Y.L. and Chow K.P., Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers, 6th IEEE International Conference on Intelligent System Design and Applications. Jinan, Shandong, China, 2006, II: 384-389.

 

Zhang G., Zhang H. and Wong K.K.Y., 1D Camera Geometry and Its Application to Circular Motion Estimation, British Machine Vision Conference. Edinburgh, UK, 2006, I: 67-76.

 

Zhang H., Wong K.K.Y. and Zhang G., Camera Calibration From Images of Spheres, IEEE Transactions on Pattern Analysis and Machine Intelligence . IEEE Computer Society, 2007, 29(3): 499-503.

 

Zhang H. and Wong K.K.Y., Camera Calibration from a Translation + Planar Motion, 8th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2006, 195-200.

 

Researcher : Wong KY



List of Research Outputs

 

Wong K.Y., Yip C.L. and Li P.W., A novel algorithm for automatic tropical cyclone eye fix using Doppler radar data, Meteorological Applications . Wiley InterScience, 2007, 14: 49-59.

 

Wong K.Y. and Yip C.L., Comparison of squall line positioning methods using radar data, Proceedings of the 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES-2006). 2006, 4253: 269-276.

 

Wong K.Y., Hung Hing Ying Scholarships (2006-2007). 2007.

 

Wong K.Y. and Yip C.L., Identifying weather systems from numerical weather prediction data, Proceedings of the 18th International Conference on Pattern Recognition (ICPR-2006). 2006, 4: 841-844.

 

Yip C.L., Wong K.Y. and Li P.W., Data complexity in tropical cyclone positioning and classification, In: Mitra BASU Tin Kam HO, Data Complexity in Pattern Recognition. Springer Verlag, 2006.

 

Yip C.L. and Wong K.Y., Identifying centers of circulating and spiraling flow patterns, Proceedings of the 18th International Conference on Pattern Recognition (ICPR-2006). 2006, 1: 769-772.

 

Researcher : Wong KY



List of Research Outputs

 

Wong K.Y., Yip C.L. and Li P.W., A novel algorithm for automatic tropical cyclone eye fix using Doppler radar data, Meteorological Applications . Wiley InterScience, 2007, 14: 49-59.

 

Wong K.Y. and Yip C.L., Comparison of squall line positioning methods using radar data, Proceedings of the 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES-2006). 2006, 4253: 269-276.

 

Wong K.Y., Hung Hing Ying Scholarships (2006-2007). 2007.

 

Wong K.Y. and Yip C.L., Identifying weather systems from numerical weather prediction data, Proceedings of the 18th International Conference on Pattern Recognition (ICPR-2006). 2006, 4: 841-844.

 

Yip C.L., Wong K.Y. and Li P.W., Data complexity in tropical cyclone positioning and classification, In: Mitra BASU Tin Kam HO, Data Complexity in Pattern Recognition. Springer Verlag, 2006.

 

Yip C.L. and Wong K.Y., Identifying centers of circulating and spiraling flow patterns, Proceedings of the 18th International Conference on Pattern Recognition (ICPR-2006). 2006, 1: 769-772.

 

Researcher : Wong SF



List of Research Outputs

 

Wong S.F., Wong K.K.Y. and Cipolla R., Robust Appearance-Based Tracking Using a Sparse Bayesian Classifier, 18th IAPR International Conference on Pattern Recognition. Hong Kong, 2006, 3: 47-50.

 

Researcher : Wu J



List of Research Outputs

 

Wu J. and Huo Q., A Study of Minimum Classification Error (MCE) Linear Regression for Supervised Adaptation of MCE-Trained Continuous Density Hidden Markov Models, IEEE Trans. on Audio, Speech and Language Processing. IEEE, 2007, 15: 478-488.

 

Wu J. and Huo Q., An Environment Compensated Minimum Classification Error Training Approach Based on Stochastic Vector Mapping, IEEE Transactions on Audio, Speech and Language Processing. IEEE, 2006, 14: 2147-2155.

 

Researcher : Wu Y



List of Research Outputs

 

Wu Y., An Empirical Study of the Use of Conceptual Models for Mutation Testing of Database Application Programs, 2007.

 

Researcher : Yan D



List of Research Outputs

 

Yan D., Liu Y. and Wang W.P., Quadric Surface Extraction by Variational Shape Approximation, In: Myung-Soo Kim, Kenji Shimada, Geometric Modeling and Processing - GMP 2006: 4th International Conference. Pittsburgh, PA, USA, Springer, 2006, 73-86.

 

Researcher : Yau CKJ



List of Research Outputs

 

Yau C.K.J., A Secure e-Course Copyright Protection Infrastructure, 2006.

 

Researcher : Yau SS



List of Research Outputs

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., Integration testing of context-sensitive middleware-based applications: a metamorphic approach, International Journal of Software Engineering and Knowledge Engineering. Singapore, World Scientific, 2006, 16 (5): 677703.

 

Researcher : Ye D



List of Research Outputs

 

Chan J.W.T., Chin F.Y.L., Ye D., Zhang Y. and Zhu H., Greedy Online Frequency Allocation in Cellular Networks, Information Processing Letters. Elsevier B.V., 2007, 102(2-3): 55-61.

 

Chan W.T., Chin F.Y.L., Ye D., Zhang Y. and Zhu H., Frequency Allocation Problem for Linear Cellular Networks, The 17th International Symposium on Algorithms and Computation (ISAAC 2006). Kolkata, India, 2006, 61-70.

 

Researcher : Yee KC



List of Research Outputs

 

Cheung D.W.L. and Yee K.C., Consultancy Project, Interbanking Clearing Limited Swift Network (ICLSWN) Message System Design, Hong Kong Monetary Authority. Hong Kong, 2007.

 

Cheung D.W.L., Yee K.C. and Lee T.Y.T., Consultancy, Government Electronic Trading Services, HKSAR Government Office of the Government Chief Information Officer. Hong Kong, 2007.

 

Researcher : Yip CL



List of Research Outputs

 

Wong K.Y., Yip C.L. and Li P.W., A novel algorithm for automatic tropical cyclone eye fix using Doppler radar data, Meteorological Applications . Wiley InterScience, 2007, 14: 49-59.

 

Wong K.Y. and Yip C.L., Comparison of squall line positioning methods using radar data, Proceedings of the 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES-2006). 2006, 4253: 269-276.

 

Wong K.Y. and Yip C.L., Identifying weather systems from numerical weather prediction data, Proceedings of the 18th International Conference on Pattern Recognition (ICPR-2006). 2006, 4: 841-844.

 

Yip C.L., Wong K.Y. and Li P.W., Data complexity in tropical cyclone positioning and classification, In: Mitra BASU Tin Kam HO, Data Complexity in Pattern Recognition. Springer Verlag, 2006.

 

Yip C.L. and Wong K.Y., Identifying centers of circulating and spiraling flow patterns, Proceedings of the 18th International Conference on Pattern Recognition (ICPR-2006). 2006, 1: 769-772.

 

Researcher : Yip YL



List of Research Outputs

 

Cheung L., Yip Y.L., Cheung D.W.L., Kao C.M. and Ng K.P., On Mining Micro-array Data by Order-Preserving Submatrix, International Journal of Bioinformatics Research and Applications (IJBRA). Inder Sciences Publishers, 2007, 3: 42-64.

 

Ngai W.K., Kao C.M., Chui C.K., Cheng C.K., Michael C.L. and Yip Y.L., Efficient Clustering of Uncertain Data, Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, IEEE Computer Society, 2006, 436-445.

 

Ngai W.K., Kao C.M., Cheng R., Chau M.C.L., Yip Y.L. and Chui C.K., Efficient Clustering of Uncertain Data, The 2006 IEEE International Conference on Data Mining (IEEE ICDM 06). 2006, 436-445.

 

Researcher : Yiu ML



List of Research Outputs

 

Mouratidis K., Yiu M.L., Papadias D. and Mamoulis N., Continuous Nearest Neighbor Monitoring in Road Networks, Proceedings of the 32nd Very Large Data Bases Conference (VLDB), Seoul, Korea, September 2006.. 2006.

 

Tao Y., Yiu M.L. and Mamoulis N., Reverse Nearest Neighbor Search in Metric Spaces, IEEE Transactions on Knowledge and Data Engineering (TKDE). 2006, 18(9): 1239-1252.

 

Yiu M.L. and Mamoulis N., Reverse Nearest Neighbors Search in Ad Hoc Subspaces, IEEE Transactions on Knowledge and Data Engineering. IEEE Computer Society, 2007, 19(3): 412-426.

 

Yiu M.L., Dai X., Mamoulis N. and Vaitis M., Top-k Spatial Preference Queries, IEEE 23nd International Conference on Data Engineering. 2007.

 

Researcher : Yiu ML



List of Research Outputs

 

Mouratidis K., Yiu M.L., Papadias D. and Mamoulis N., Continuous Nearest Neighbor Monitoring in Road Networks, Proceedings of the 32nd Very Large Data Bases Conference (VLDB), Seoul, Korea, September 2006.. 2006.

 

Tao Y., Yiu M.L. and Mamoulis N., Reverse Nearest Neighbor Search in Metric Spaces, IEEE Transactions on Knowledge and Data Engineering (TKDE). 2006, 18(9): 1239-1252.

 

Yiu M.L. and Mamoulis N., Reverse Nearest Neighbors Search in Ad Hoc Subspaces, IEEE Transactions on Knowledge and Data Engineering. IEEE Computer Society, 2007, 19(3): 412-426.

 

Yiu M.L., Dai X., Mamoulis N. and Vaitis M., Top-k Spatial Preference Queries, IEEE 23nd International Conference on Data Engineering. 2007.

 

Researcher : Yiu SM



Project Title:

RNA Secondary Structure Prediction with Pseudoknots in Unaligned Sequences

Investigator(s):

Yiu SM, Chin FYL

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

09/2006

 

Abstract:

Ribonucleic acids (RNAs) are molecules that are responsible for regulating many genetic and metabolic activities in cells. RNA is single-stranded and can be considered as a sequence of nucleotides (also known as bases). There are four basic nucleotides, namely, Adenine (A), Cytosine (C), Guanine (G), and Uracil (U). An RNA folds into a 3-dimensional structure by forming pairs of bases using hydrogen bonds and the set of base pairs formed is referred as the secondary structure of the RNA. Each base can at most form a pair with another base. In particular, A-U and C-G form stable pairs and are known as the Watson-Crick base pairs. Other pairings (e.g. A-C) are less stable and seldom exist in RNA molecules, so are usually ignored. The 3-dimensional structure is related to the function of the RNA. Thus, knowing the pairing of the bases can help to predict the 3-dimensional structure as well as the function of the RNA. In this project, we focus on the problem of predicting RNA secondary structure. Given an RNA sequence, there are many different possible secondary structures. To compute the most probable structure, a commonly used measurement is based on the concept of minimzing the total free energy of the substructures (e.g. loops, stacking pairs) formed by the pairings. From a computatioal point of view, the challenge of the RNA secondary structure prediction problem arises from some special structures called "pseudoknots" (see more details in Section VII). Many existing prediction algorithms do not consider pseudoknots, however, pseudoknots are already known to exist in some RNAs. The dynamic programming algorithm [LZP99, ZS84] for computing the optimal secondary structure without pseudoknots based on the free energy minimization model runs in O(n^3) time where n is the length of the RNA sequence. On the other hand, based on some special energy functions, Lyngso and Pederson [LP00] have proven that determining the optimal secondary structure possibly with pseudoknots is NP-hard. When restricting the problem to some special types of pseudoknots, there exist polynomial time algorithms (e.g. [A00, RE99, UHK+99]. However, the time complexity is still high and thus may not be very practical. On the other hand, from some recent studies [e.g. MT02], it was found that to predict the secondary structure of a given RNA sequence, it is more accurate if we also make use of some other RNA sequences which are known to have similar functions as the given RNA sequecne. Roughly speaking, we are given a set of unaligned RNA sequences, the problem is to predict the common secondary structure of these sequences while aligning them at the same time. The intuition behind is that functionally similar RNA sequences usually have similar secondary structures. The alignment of the sequences can guide to locate the important substructures of the secondary structure. Thus, there is a higher chance to get a correct structure. Mathews and Turner [MT02] provided an O(n^6) time algorithm for two sequences without considering pseudoknots and it was shown to be NP-hard for multiple sequences [DB04]. Other works along this direction include [S85, AKS+06, BTZ06, GHS97]. Most of these works do not consider pseudoknots or are heuristics-based.The objective of the project is to study of the problem of predicting the common secondary structure with pseudoknots of a given set of unaligned RNA sequences from both the theoertical and the practical aspects. In particular, we aim at deriving efficient solutions (exact algorithms, approximation algorithms, and/or heuristics-based algorithms) for the following problems. P1) Given two unaligned RNA sequences, the problem is to predict their common secondary structure with "simple pseudoknots (see Section VII for definitions)" based on different optimization criteria (e.g. minimizing the total free energy of the structure, maximizing the number of base pairs).P2) Extend the problem in 1) to other common types of pseudoknots.P3) Extend the problem in 1) and 2) to consider more than two sequences.

 

List of Research Outputs

 

Chan H.L., Jannson J., Lam T.W. and Yiu S.M., Reconstructing An Ultrametric Galled Phylogenetic Network From A Distance Matrix , Journal of Bioinformatics and Computational Biology. World Scientific, 2006, 4: 4: 807-832.

 

Dong Y., Sui A., Yiu S.M., Li V.O.K. and Hui C.K., An efficient cluster-based proactive secret share update scheme for mobile ad hoc networks, Proc. IEEE ICC. Glasgow, Scotland, UK, 2007.

 

Dong Y., Li V.O.K., Hui C.K. and Yiu S.M., Dynamic distributed certificate authority services for mobile ad hoc networks, Proc. IEEE Wireless Communications and Networking Conference. Hong Kong, China, 2007.

 

Hon W.K., Lam T.W., Sadakane K., Sung W.K. and Yiu S.M., A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays , Algorithmica. 2007, 48:1: 23-36.

 

Hui C.K., Yiu S.M. and Lui W.C., Accountability in organizations, Int. J. Information and Computer Security. UK, Inderscience Enterprises Ltd, 2007, Vol. 1, No. 3: 237-255.

 

Hui C.K., Chow K.P. and Yiu S.M., Tools and Technology for Computer Forensics: Research and Development in Hong Kong , Proceedings of The 3rd Information Security Practice and Experience Conference ( ISPEC 2007 ). Hong Kong, China, Springer Berlin / Heidelberg, 2007, 4464/2007: 11-19.

 

Leung W.S., Shen Z., Yiu S.M., Kung H.F. and Lin M.C., The Anti-Angiogenic Signaling Network of rAAV-HGFK1, The Fifth Asia-Pacific Bioinformatics Conference, APBC2007; 14-17 Jan, 2007; Hong Kong.. 2007, apbc104.

 

Li H.Y., Lum C.T., Sun R.W.Y., Ng S.M., Smith D.K., Yiu S.M., Che C.M. and Lin M.C., Genome-Wide Study Reveals the Signaling Pathways Modulated by Gold-1a Treatment in Hepatocellular Carcinoma, The Fifth Asia-Pacific Bioinformatics Conference, APBC2007; 14-17 Jan, 2007; Hong Kong.. 2007, apbc084.

 

Wang L., Cheung D.W.L. and Yiu S.M., Maintenance of Maximal Frequent Itemsets in Large Databases, ACM Symposium on Applied Computing . 2007.

 

Wang M., Li L., Yiu S.M., Hui C.K., Chong C.F., Chow K.P., Tsang W.W., Chan H.W. and Pun K.H., A Hybrid Approach for Authenticating MPEG-2 Streaming Data, Proceedings of Multimedia Content Analysis and Mining International Workshop (MCAM 2007). Weihai, China, Springer-Verlag Berlin Heidelberg, 2007, 203-212.

 

Wong K.F., Lam T.W., Yang W. and Yiu S.M., Finding Alternative Splicing Patterns with Strong Support from Expressed Sequences , The 2007 International Conference on Bioinformatics and Computational Biology (BIOCOMP). 2007.

 

Yiu S.M., Wong P., Lam T.W., Mui Y.C., Kung H.F., Lin M.C. and Cheung Y.T., Research Output Prize, Faculty of Engineering, The University of Hong Kong. 2006.

 

Researcher : Yu CH



List of Research Outputs

 

Yu C.H., Memory Management Strategies to Improve the Space-Time Performance of Java Programs, 2006.

 

Researcher : Yuk SC



List of Research Outputs

 

Chung H.Y., Wong K.K.Y., Chin F.Y.L., Chow K.P. and Yuk S.C., Generalized Motion and Edge Adaptive Interpolation De-interlacing Algorithm, WSEAS Transactions on Computers. 2006, 5(11): 2544-2551.

 

Wong K.K.Y., Chin F.Y.L., Chung H.Y., Chow K.P. and Yuk S.C., Motion and Edge Adaptive Interpolation De-interlacing Algorithm, 10th WSEAS International Conference on Computers. Athens, Greece, 2006, 1030-1035.

 

Yuk S.C., Wong K.K.Y., Chung H.Y., Chin F.Y.L. and Chow K.P., Real-time Multiple Head Shape Detection and Tracking System with Decentralized Trackers, 6th IEEE International Conference on Intelligent System Design and Applications. Jinan, Shandong, China, 2006, II: 384-389.

 

Researcher : Zhang G



List of Research Outputs

 

Zhang G., Zhang H. and Wong K.K.Y., 1D Camera Geometry and Its Application to Circular Motion Estimation, British Machine Vision Conference. Edinburgh, UK, 2006, I: 67-76.

 

Zhang G., Camera Network Calibration, 2006.

 

Zhang H., Wong K.K.Y. and Zhang G., Camera Calibration From Images of Spheres, IEEE Transactions on Pattern Analysis and Machine Intelligence . IEEE Computer Society, 2007, 29(3): 499-503.

 

Researcher : Zhang H



List of Research Outputs

 

Zhang G., Zhang H. and Wong K.K.Y., 1D Camera Geometry and Its Application to Circular Motion Estimation, British Machine Vision Conference. Edinburgh, UK, 2006, I: 67-76.

 

Zhang H., Wong K.K.Y. and Zhang G., Camera Calibration From Images of Spheres, IEEE Transactions on Pattern Analysis and Machine Intelligence . IEEE Computer Society, 2007, 29(3): 499-503.

 

Zhang H., Camera Calibration from Silhouttes, 2006.

 

Zhang H. and Wong K.K.Y., Camera Calibration from a Translation + Planar Motion, 8th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2006, 195-200.

 

Researcher : Zhang Y



List of Research Outputs

 

Chan J.W.T., Chin F.Y.L., Ye D., Zhang Y. and Zhu H., Greedy Online Frequency Allocation in Cellular Networks, Information Processing Letters. Elsevier B.V., 2007, 102(2-3): 55-61.

 

Chan J.W.T., Chin F.Y.L., Ye D. and Zhang Y., Online Frequency Allocation in Cellular Networks, The 19th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA 2007). San Diego, California, USA, 2007, 241-249.

 

Chan W.T., Chin F.Y.L., Ye D., Zhang Y. and Zhu H., Frequency Allocation Problem for Linear Cellular Networks, The 17th International Symposium on Algorithms and Computation (ISAAC 2006). Kolkata, India, 2006, 61-70.

 

Chin F.Y.L., Zhang Y. and Zhu H., Online OVSF Code Assignment with Resource Augmentation, The 3rd International Conference on Algorithmic Aspects in Information and Management (AAIM'07). Portland, Oregon, USA, 2007, 191-200.

 

Researcher : Zhang Z



List of Research Outputs

 

Chan W.K., Chen T.Y., Cheung S.C., Tse T.H. and Zhang Z., Towards the testing of power-aware software applications for wireless sensor networks, Reliable Software Technologies: Ada-Europe 2007, N. Abdennadher and F. Kordon (eds.), Lecture Notes in Computer Science, vol. 4498, Springer, Berlin. 2007, 8499.

 

Chen T.Y., Huang D.H., Tse T.H. and Zhang Z., An innovative approach to tackling the boundary effect in adaptive random testing, Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS-40), IEEE Computer Society Press, Los Alamitos, California. 2007.

 

Hu P., Zhang Z., Chan W.K. and Tse T.H., An empirical comparison between direct and indirect test result checking approaches , Proceedings of the 3rd International Workshop on Software Quality Assurance (SOQUA 2006) (in conjunction with the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (SIGSOFT 2006/FSE-14)), ACM Press, New York. 2006, 613.

 

Researcher : Zhu D



List of Research Outputs

 

Huo Q. and Zhu D., A Maximum Likelihood Training Approach to Irrelevant Variability Compensation Based on Piecewise Linear Transformations, Interspeech 2006 - ICSLP. Pittsburgh, USA, ISCA, 2006, 1129-1132.

 

Zhu D. and Huo Q., A Maximum Likelihood Approach to Unsupervised Online Adaptation of Stochastic Vector Mapping Function For Robust Speech Recognition, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-2007). IEEE, 2007, IV: 773-776.



-- End of Listing --