Content Posted in 2024
Theoretical foundation for relationship construct in information modeling – Relation element theory, Keng SIAU
Theory and econometrics of financial asset pricing, Kian Guan LIM
Theory and research in strategic management: Swings of a pendulum, Robert E. HOSKISSON, Michael A. HITT, William P. WAN, and Daphne W. YIU
Theory and research in strategic management: Swings of a pendulum, Robert E. HOSKISSON, William P. WAN, Daphne W. YIU, and William A. HITT
Theory-inspired path-regularized differential network architecture search, Pan ZHOU, Caiming XIONG, Richard SOCHER, and Steven C. H. HOI
The overlooked reality of shareholder activism in China: Defying Western expectations, Chun ZHOU, Wei ZHANG, and Dan W. PUCHNIAK
The persuasive design of AI-synthesized voices, Hannah H. CHANG and Anirban. MUKHERJEE
The persuasive effect of AI-synthesized voices, Hannah H. CHANG and Anirban MUKHERJEE
The pipeline project: Pre-publication independent replications of a single laboratory's research pipeline., Martin SCHWEINSBERG, Nikhil MADAN, Michelangelo VIANELLO, S.Amy SOMMER, Jennifer JORDAN, and et. al.
The power of identity cues in text-based customer service: Evidence from Twitter, Yang GAO, Huaxia RUI, and Shujing SUN
The power of renegotiation and monitoring in software outsourcing: Substitutes or complements?, He HUANG, Minhui HU, Robert J. KAUFFMAN, and Hongyan XU
The privacy of Hak-Shing William Tam: Imagining asian families in California’s proposition 8, Justin Kh TSE
The Quincecare Duty in flux: The implications for banks and digital asset platforms, Jason. TEO and Aaron YOONG
The race to regeneration: A new era for business and planet, Simon J.D. SCHILLEBEECKX and Ryan Knowles MERRILL
Therapeutic justice: For practitioners, by practitioners?, Tricia HO and Aaron YOONG
The Rate of Adoption of Good Data Practices in Singapore, Mark HAHNEL
The RCEP and its investment rules: Learning from past Chinese FTAs, Heng WANG
The RCEP and its investment rules: Learning from the malleability of Chinese FTAs, Heng WANG
The relationship between constitutional equality and substantive review, Wei Yao, Kenny CHNG
The relationship between medical equipment management outsourcing and performance, Sheng BIAN
The relative importance of structural constraints and surface semantics in information modeling, Keng SIAU, Yair WAND, and Izak BENBASAT
The research of the non-financial factors in the investment decision, Wenbiao HOU
The role of emergent knowledge structures in collaborative software development, Christoph TREUDE
The role of executive function in cognitive reappraisal: A meta-analytic review, Wei Xing TOH, Jun Sheng KEH, James J. GROSS, and Laura L. CARSTENSEN
The role of humour production and perception in the daily life of couples: An Interest Indicator perspective, Kenneth TAN, Bryan K. C. CHOY, and Norman P. LI
The role of macroprudential policies under carbon pricing, Maria Teresa PUNZI
The science of creating brand associations: A Continuous Trinity Model linking brand associations to learning processes, Christilene Du PLESSIS, Serena D'HOOGE, and Steven SWELDENS
The secret of happiness lies in what you do, not what you buy, Shilpa MADAN
The shifting sands of motivation: Revisiting what drives contributors in open source, Marco GEROSA, Igor WIESE, Bianca TRINKENREICH, Georg LINK, Gregorio ROBLES, Christoph TREUDE, Igor STEINMACHER, and Anita SARMA
The Singapore Convention, Nadja ALEXANDER and Clarissa Xin Yi CHERN
The Singapore Global Restructuring Initiative, Aurelio GURREA-MARTINEZ and SMU Office of Research
The social evaluation of accents and perceived social influence in Singapore: A comparison of American and Singaporean English accents, Matthew H. S. NG and Chi-ying CHENG
The social psychology of overeating, Shilpa MADAN
The social side of software platform ecosystems, Cleidson R. B. DA SOUZA, Fernando FIGUEIRA FILHO, Müller MIRANDA, Renato Pina FERREIRA, Christoph TREUDE, and Leif SINGER
The south, the west, and the meanings of humanitarian intervention in history, Patrick QUINTON-BROWN
The Statistics and Machine Learning with R workshop, Peng LIU
The status of status research: A review of the types, functions, levels and audiences, Matteo PRATO, Gokhan ERTUG, Fabrizio CASTELLUCCI, and Tengjian ZOU
The three-sided market of on-demand delivery, S. BAHRAMI, M. NOURINEJAD, Y. YIN, and Hai WANG
The transatlantic divide: Intermediary liability, free expression, and the limits of trade harmonization, Han-wei LIU
The unintended consequences of international student shortage: Evidence from a policy reform in South Korea, Syngjoo CHOI, Chung-Yoon CHOI, KIM, and Jongkwan LEE
The United States vs. China: The quest for global economic leadership by C. Fred Bergsten, Henry S. GAO
The use of bug bounty programs for software reliability improvement, Tianlu ZHOU, Dan MA, and Nan FENG
The use of deception in dementia-care robots: Should robots tell "white lies" to limit emotional distress?, Samuel R. COX, Grace CHEONG, and Wei Tsang OOI
The uses of history in international society: From the Paris Peace Conference to the present, Margaret MACMILLAN and Patrick QUINTON-BROWN
The value of mobile commerce to customers, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH
The Vietnam war and the regional context, Wen-Qing NGOEI
The warmth of winter: What we feel shapes how we think, Shilpa MADAN
Think your way to happiness? Investigating the role of need for cognition in well-being through a three-level meta-analytic approach, Verity Y. Q. LUA, Wei Ming OOI, SITI A'ISYAH BINTE MOHD NAJIB, Christine Yin Ting TAN, Nadyanna M. MAJEED, Angela K. Y. LEUNG, and Andree HARTANTO
Third Parties, Kwan Ho LAU and Gregory TOLHURST
Third-person perception of science narratives: The case of climate change denial, Michael Field DAHLSTROM and Sonny ROSENTHAL
Those good old days and the power of nostalgia, Shilpa MADAN
Thoughts to target : enhance planning for target-driven conversation, Zhonghua ZHENG, Lizi LIAO, Yang DENG, Ee-peng LIM, Minlie HUANG, and Liqiang NIE
Tianxia and global distributive justice, Sor-hoon TAN
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting, Zhengyu ZHANG, Puwen WEI, and Haiyang XUE
Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud, Yinbin MIAO; Feng LI; Xinghua LI; Zhiquan LIU; Jianting NING; Hongwei LI; Kim-Kwang Raymond CHOO; and DENG, Robert H.
Time to regulate influencers who tell you where to put your money, Patricia LUI
Toblerone pricing at airport duty-free shops, Nirmalya KUMAR and Lipika BHATTACHARYA
Toolkit for the evaluation of crypto tax risks (Outline), Vincent OOI
Topic recommendation for GitHub repositories: How far can extreme multi-label learning go?, Ratnadira WIDYASARI, Zhipeng ZHAO, Thanh Le CONG, Hong Jin KANG, and David LO
To protect or to hide: An investigation on corporate redacted disclosure motives under new FAST act regulation, Yan MA, Qian MAO, and Nan HU
Tort law, Amirthalingam KUMARALINGAM and Gary Kok Yew CHAN
Tort law: A critical overview, Kee Yang LOW
To thine communication partner be true: The effect of presentation consistency on perceived authenticity and liking after making a first impression online, Nicholas TANG, Janell CHU, Kahmun LEONG, and Sonny ROSENTHAL
Toward effective secure code reviews: An empirical study of security-related coding weaknesses, Wachiraphan CHAROENWET, Patanamon THONGTANUNAM, Thuan PHAM, and Christoph TREUDE
Toward human-like summaries generated from heterogeneous software artefacts, Mahfouth ALGHAMDI, Christoph TREUDE, and Markus WAGNER
Toward intention discovery for early malice detection in cryptocurrency, Ling CHENG, Feida ZHU, Yong WANG, Ruicheng LIANG, and Huiwen LIU
Toward personalized answer generation in e-commerce via multi-perspective preference modeling, Yang DENG, Yaliang LI, Wenxuan ZHANG, Bolin DING, and Wai LAM
Towards an effective and interpretable refinement approach for DNN verification, Jiaying LI, Guangdong BAI, Long H. PHAM, and Jun SUN
Towards an integrated framework for artificial intelligence governance, Brenda ESCHENBRENNER, Fiona Fui-hoon NAH, Keng SIAU, Langtao CHEN, and Yuzhou QIAN
Towards a smaller student: Capacity dynamic distillation for efficient image retrieval, Yi XIE, Huaidong ZHANG, Xuemiao XU, Jianqing ZHU, and Shengfeng HE
Towards a theoretical framework of information systems development success, Y. LONG, Keng SIAU, and M. LING
Towards automated safety vetting of smart contracts in decentralized applications, Yue DUAN, Xin ZHAO, Yu PAN, Shucheng LI, Minghao LI, Fengyuan XU, and Mu ZHANG
Towards automated slide augmentation to discover credible and relevant links, Dilan Dinushka SENARATH ARACHCHIGE, Christopher M. POSKITT, Kwan Chin (XU Guangjin) KOH, Heng Ngee MOK, and Hady Wirawan LAUW
Towards benchmarking the coverage of automated testing tools in Android against manual testing, Ferdian THUNG, Ivana Clairine IRSAN, Jiakun LIU, and David LO
Towards explainable harmful meme detection through multimodal debate between Large Language Models, Hongzhan LIN, Ziyang LUO, Wei GAO, Jing MA, Bo WANG, and Ruichao YANG
Towards explainable neural network fairness, Mengdi ZHANG
Towards faster inference of transformers: Strategies for accelerating decoding processes, Cunxiao DU
Towards fine-grained task allocation with bilateral access control for intelligent transportation systems, Tong WU, Xiaochen MA, Chuan ZHANG, Ximeng LIU, Guomin YANG, and Liehuang ZHU
Towards generative aspect-based sentiment analysis, Wenxuan ZHANG, Xin LI, Yang DENG, Lidong BING, and Wai LAM
Towards human-centered proactive conversational agents, Yang DENG, Lizi LIAO, Zhonghua ZHENG, Grace Hui YANG, and Tat-Seng CHUA
Towards LLM-based fact verification on news claims with a hierarchical step-by-step prompting method, Xuan ZHANG and Wei GAO
Towards low-resource rumor detection: Unified contrastive transfer with propagation structure, Hongzhan LIN, Jing MA, Ruichao YANG, Zhiwei YANG, and Mingfei CHENG
Towards robust personalized dialogue generation via order-insensitive representation regularization, Liang CHEN, Hongru WANG, Yang DENG, Wai-Chung KWAN, Zezhong WANG, and Kam-Fai WONG
Towards securing smart contracts systematically, Duy Tai NGUYEN
Towards speedy permission-based debloating for Android apps, Thung Ferdian, Jiakun LIU, Pattarakrit RATTANUKUL, Shahar MAOZ, Eran TOCH, Debin GAO, and David LO
Towards theoretically understanding why SGD generalizes better than ADAM in deep learning, Pan ZHOU, Jiashi FENG, Chao MA, Caiming XIONG, Steven C. H. HOI, and Weinan E
Towards tightly secure deterministic public key encryption, Daode ZHANG, Bao LI, Yamin LIU, Haiyang XUE, Xianhui LU, and Dingding JIA
Towards understanding convergence and generalization of AdamW, Pan ZHOU, Xingyu XIE, Zhouchen LIN, and Shuicheng YAN
Towards understanding the open source interest in gender-related GitHub projects, Rita GARCIA, Christoph TREUDE, and Wendy LA
Towards understanding why Lookahead generalizes better than SGD and beyond, Pan ZHOU, Hanshu YAN, Xiaotong YUAN, Jiashi FENG, and Shuicheng YAN
Towards understanding why mask reconstruction pretraining helps in downstream tasks, Jiachun PAN, Pan ZHOU, and Shuicheng YAN
Towards unified multimodal editing with enhanced knowledge collaboration, Kaihang PAN, Zhaoyu FAN, Juncheng LI, Qifan YU, Hao FEI, Siliang TANG, Richang HONG, Hanwang ZHANG, and Qianru SUN
To whom thou art bound: Bicultural identity integration moderates the influence of conspiracy beliefs on Chinese Americans’ ingroup bias, Edison TAN, Chi-ying CHENG, Angela K. Y. LEUNG, and Sheila X. R. WEE
T-PickSeer: Visual analysis of taxi pick-up point selection behavior, Shuxian GU, Yemo DAI, Zezheng FENG, Yong WANG, and Haipeng ZENG
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds, Quang Hai TRUONG, Dheryta JAISINGHANI, Shubham JAIN, Arunesh SINHA, Jeong Gil KO, and Rajesh Krishna BALAN
Tracy: A business-driven technical debt prioritization framework, Rodrigo REBOUÇAS DE ALMEIDA, Christoph TREUDE, and Uirá KULESZA
Trade policy uncertainty and the patent bubble in China: evidence from machine learning, Xingnan XUE, Peng LIANG, Fujing XUE, Nan HU, and Ling LIU
(Trade) War and Peace: How to impose international trade sanctions, Gustavo DE SOUZA, Naiyuan HU, Haishi LI, and Yuan MEI
Traffic rule formalization for autonomous vehicle, Hanif BHUIYAN, Guido GOVERNATORI, Andry RAKOTONIRAINY, Meng Weng WONG, and Avishkar MAHAJAN
Trajectory set empowered hypergraph transformer for mobile sensor based traffic prediction, Hanyuan ZHANG, Xinyu \ZHANG, Qize JIANG, Liang LI, Baihua ZHENG, and Weiwei SUN
Transfer pricing and crypto assets, Vincent OOI and Ilka RITTER
Transformer-based Multi-Task Learning for crisis actionability extraction, Yuhao ZHANG, Siaw Ling LO, and Phyo Yi WIN MYINT
Transition-informed reinforcement learning for large-scale Stackelberg mean-field games., Pengdeng LI, Runsheng YU, Xinrun WANG, and Bo AN
Transportation-enabled services: Concept, framework, and research opportunities, Niels AGATZ, Soo-Haeng CHO, Hao SUN, and Hai WANG
Transportation, healthcare seeking, and outcomes, Xiao Lin ONG
Treating words as data with error: Uncertainty in text statements of policy positions, Kenneth BENOIT, Michael LAVER, and Slava MIKHAYLOV
Triadic temporal-semantic alignment for weakly-supervised video moment retrieval, Jin LIU, JiaLong XIE, Fengyu ZHOU, and Shengfeng HE
Trial and error in influential social networks, Xiaohui BEI, Ning CHEN, Liyu DOU, Xiangru HUANG, and Ruixin QIANG
Truly Open Research with Biospecimens: Can Research with Non-identified Biospecimens Be Conducted Without Consent?, Jerry MENIKOFF
Truncated Affinity Maximization: One-class homophily modeling for graph anomaly detection, Hezhe QIAO and Guansong PANG
Trust and robotics: A multi-staged decision-making approach to robots in community, Wenxi ZHANG, Willow WONG, and Mark FINDLAY
Trusting artificial intelligence in healthcare, W. WANG and Keng SIAU
Trust: The feature that vending machines and ATMs share, but SimplyGo lacks, Sun Sun LIM
Trustworthy and synergistic artificial intelligence for software engineering: Vision and roadmaps, David LO
Try it together - AI-powered search tools: Elicit, SciSpace, Connected Papers, Researchrabbit, and Undermind.ai, Aaron TAY, Bella RATMELIA, and Kooi Ching OOI
Try it Together - Qualitative coding with Atlas.ti, Danping DONG and Bryan LEOW
Try it together: Transcribing your audio with Whisper API, Bella RATMELIA
T-SciQ: Teaching multimodal Chain-of-Thought reasoning via large language model signals for science question answering, Lei WANG, Yi HU, Jiabang HE, Xing XU, Ning LIU, Hui LIU, and Heng Tao SHEN
Tutorial: "Advances in federated optimization: Efficiency, resiliency, and privacy", Yuejie CHI and Zhize LI
Twenty years of open source software: From skepticism to mainstream, Gregorio ROBLES, Igor STEINMACHER, Paul ADAMS, and Christoph TREUDE
Two constructions of libertarianism, Chandran KUKATHAS
Two decades of laws and practice around screen scraping in the common law world and its open banking watershed moment, Han-wei LIU
Two responsibilities to protect, Patrick QUINTON-BROWN
Two sides of the same coin: Exploiting the impact of identifiers in neural code comprehension, Shuzheng GAO, Cuiyun GAO, Chaozheng WANG, Jun SUN, David LO, and Yue YU
TypeSqueezer: When static recovery of function signatures for binary executables meets dynamic analysis, Ziyi LIN, Jinku LI, Bowen LI, Haoyu MA, Debin GAO, and Jianfeng MA
UEDashboard: Awareness of unusual events in commit histories, Larissa LEITE, Christoph TREUDE, and Fernando FIGUEIRA FILHO
Uiwang Korea: Operational efficiency at an inland container depot, Joyce M. W. LOW and Byung Kwon LEE
Uncertain search with knowledge transfer, Woonghee Tim HUH, Michael Jong KIM, and Meichun LIN
Uncovering collaborative value creation patterns and establishing corresponding customer roles, Sabine MOELLER, Robert CIUCHITA, Dominik MAHR, Gaby ODEKERKEN-SCHRODER, and Martin FASSNACHT
Uncovering merchants’ willingness to wait in on-demand food delivery markets, Jian LIANG, Ya ZHAO, Hai WANG, Zuopeng XIAO, and Jintao KE
Uncovering the value of blockchain applications in the world of finance, Qiang CHENG
Understanding and constructing AKE via double-key key encapsulation mechanism, Haiyang XUE, Xianhui LU, Bao LI, Bei LIANG, and Jingnan HE
Understanding gender differences in media perceptions of hedonic systems: A comparison of 2D versus 3D media, Fiona Fui-hoon NAH and Brenda ESCHENBRENNER
Understanding generalization and optimization performance of deep CNNs, Pan ZHOU and Jiashi FENG
Understanding information sharing among equity analysts, An-Ping LIN and SMU Office of Research
Understanding intrinsic factors influencing benefit maximization of IS usage, Brenda ESCHENBRENNER and Fiona Fui-hoon NAH
Understanding multi-homing and switching by platform drivers, Xiaotong GUO, Andreas HAUPT, Hai WANG, Rida QADRI, and Jinhua ZHAO
Understanding newcomers' onboarding process in deep learning projects, Junxiao HAN, Jiahao ZHANG, David LO, Xin XIA, Shuigang DENG, and Minghui WU
Understanding on-the-go consumption: Identifying and quantifying its determinants, Sabine BENOIT, Tobias SCHAEFERS, and Raphael HEIDER
Understanding stack overflow code fragments, Christoph TREUDE and Martin P. ROBILLARD
Understanding the role of external pull requests in the NPM ecosystem, Vittunyuta MAEPRASART, Supatsara WATTANAKRIENGKRAI, Raula Gaikovina KULA, Christoph TREUDE, and Kenichi MATSUMOTO
Understanding the role of images on stack overflow, Dong WANG, Tao XIAO, Christoph TREUDE, Raula KULA, Hideaki HATA, and Yasutaka KAMEI
Understanding the values of mobile technology in education: A value-focused thinking approach, H. SHENG, Keng SIAU, and F. NAH
Understanding Wikipedia as a resource for opportunistic learning of computing concepts, Martin P. ROBILLARD and Christoph TREUDE
Undominated mechanisms, Tilman BORGERS, Jiangtao LI, and Kexin WANG
Unexpected defaults: The role of information opacity, Aytekin ERTAN, Yun Je LEE, and Regina WITTENBERG-MOERMAN
Unified conversational recommendation policy learning via graph-based reinforcement learning, Yang DENG, Yaliang LI, Fei SUN, Bolin DING, and Wai LAM
Unified modeling language: A complexity analysis, Keng SIAU and Q. CAO
Unified modeling language: The teen years and growing pains, J. ERICKSON and Keng SIAU
Unifying text, tables, and images for multimodal question answering, Haohao LUO, Ying SHEN, and Yang DENG
Unleashing the power of Clippy in real-world Rust projects, Chunmiao LI, Yijun YU, Haitao WU, Luca CARLIG, Shijie NIE, and Lingxiao JIANG
Unlocking markets: A multilingual benchmark to cross-market question answering, Yifei YUAN, Yang DENG, Anders SOGAARD, and Mohammad ALLIANNEJADI
Unmasking the lurking: Malicious behavior detection for IoT malware with multi-label classification, Ruitao FENG, Sen LI, Sen CHEN, Mengmeng GE, Xuewei LI, and Xiaohong LI
Unpacking the behavioral, cognitive, sleep, and stress associations with smartphone checking, Yi Jing CHUA
Unraveling the ‘anomaly’ in time series anomaly detection: A self-supervised tri-domain solution, Yuting SUN, Guansong PANG, Guanhua YE, Tong CHEN, Xia HU, and Hongzhi YIN
Unraveling the dynamics of stable and curious audiences in web systems, Rodrigo ALVES, Antoine LEDENT, Renato ASSUNÇÃO, Pedro VAZ-DE-MELO, and Marius KLOFT
Unsupervised training sequence design: Efficient and generalizable agent training, Wenjun LI and Pradeep VARAKANTHAM
Unsupervised video hashing with multi-granularity contextualization and multi-structure preservation, Yanbin HAO, Jingru DUAN, Hao ZHANG, Bin ZHU, Pengyuan ZHOU, and Xiangnan HE
Untangling influence: The effect of follower-followee comparison on social media engagement, Yi PENG and Liling LU
Unusual events in GitHub repositories, Christoph TREUDE, Larissa LEITE, and Maurício ANICHE
Unveiling code pre-trained models: Investigating syntax and semantics capacities, Wei MA, Shangqing LIU, Mengjie ZHAO, Xiaofei XIE, Wenhang WANG, Qiang HU, Jie ZHANG, and Liu YANG
Unveiling exception handling guidelines adopted by Java developers, Hugo MELO, Roberta COELHO, and Christoph TREUDE
Unveiling memorization in code models, Zhou YANG, Zhipeng ZHAO, Chenyu WANG, Jieke SHI, Dongsun KIM, DongGyun HAN, and David LO
Unveiling the dynamics of crisis events: Sentiment and emotion analysis via multi-task learning with attention mechanism and subject-based intent prediction, Phyo Yi WIN MYINT, Siaw Ling LO, and Yuhao ZHANG
UR2M: Uncertainty and Resource-Aware Event Detection on Microcontrollers, Hong JIA, Young D. KWON, Dong MA, Nhat PHAM, Lorena QENDRO, Tam VU, and Cecilia MASCOLO
Usability of performance dashboards, usefulness of operational and tactical support, and quality of strategic support: A research framework, Bih-Ru LEA and Fiona Fui-hoon NAH
Usability versus collectibility in NFT: The case of Web3 domain names, Ping Fan KE and Yi Meng LAU
Use of a classroom response system to enhance classroom interactivity, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH
Use of artificial intelligence, machine learning, and autonomous technologies in the mining industry, Z. HYDER, Keng SIAU, and Fiona Fui-hoon NAH
Use of cognitive mapping techniques in information systems development, Keng SIAU and X. TAN
User detection of threats with different security measures, Yoav Ben YAAKOV, Joachim MEYER, Xinrun WANG, and Bo AN
User interfaces for visual analysis and monitoring in business intelligence, Lars GRAMMEL, Margaret-Anne STOREY, and Christoph TREUDE
User satisfaction estimation with sequential dialogue act modeling in goal-oriented conversational systems, Yang DENG, Wenxuan ZHANG, Wai LAM, Hong CHENG, and Helen MENG
Users’ reception of product recommendations: Analyses based on eye tracking data, Feiyan JIA, Yani SHI, Choon Ling SIA, Chuan-Hoo TAN, Fiona Fui-hoon NAH, and Keng SIAU
Usertip: Early-stage financing considerations, Kenneth GOH, Jolyn ANG, and CW CHAN
Using AI for the submission process: Tools & trends, Michael UPSHALL
Using contextual information to predict co-changes, Igor Scaliante WIESE, Reginaldo RÉ, Igor STEINMACHER, Rodrigo Takashi KURODA, Gustavo A. OLIVA, Christoph TREUDE, and Marco Aurélio GEROSA
Using data visualisation to find F&B opportunities during a pandemic, Marcus ANG and Yongchang CHEN
Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU
Using pre-trained models for vision-language understanding tasks, Rui CAO
Using social development lenses to understand e-government development, Keng SIAU and Y. LONG
Using team rewards and individual assessment to incentivize collaboration in team projects, Prasart JONGJAROENKAMOL
Using the TypeScript compiler to fix erroneous Node.js snippets, Brittany REID, Christoph TREUDE, and Markus WAGNER
Using virtual simulations of future extreme weather events to communicate climate change risk, Terry Van GEVELT, Brian G. MCADOO, Jie YANG, Linlin LI, Fiona WILLIAMSON, Alex SCOLLAY, Aileen LAM, Kwan Nok CHAN, and Adam D. SWITZER
Using wireless technology to facilitate learning: A grounded theory approach, Hong SHENG, Fiona Fui-hoon NAH, and Keng SIAU
Us or them: How COVID-19 vaccine priority influences perceptions of local-migrant worker relations, Tengjiao HUANG, Haochen ZHOU, Liz JONES, and Chin Wen CONG
Vaccine hesitancy and secondary risks, Christopher L. CUMMINGS and Sonny ROSENTHAL
VAID: Indexing view designs in visual analytics system, Lu YING, Aoyu WU, Haotian LI, Zikun DENG, Ji LAN, Jiang WU, Yong WANG, Huamin QU, Dazhen DENG, and Yingcai WU
Validating estimates of latent traits from textual data using human judgment as a benchmark, Will LOWE and Kenneth BENOIT
Value capture and affordable housing: Insights from Singapore, Sock Yong PHANG
Values of artificial intelligence in marketing, Yingrui XI and Keng SIAU
Vehicle routing problem with parcel locker and public transportation: Goods delivery using mass-rapid-transit system, Pham K.M. NGUYEN, Vincent F. YU, and Aldy GUNAWAN
Veil piercing in Singapore: A proposed approach, Ivan Wu Hwan TANG
VEM 2 L: An easy but effective framework for fusing text and structure knowledge on sparse knowledge graph completion, Tao HE, Ming LIU, Yixin CAO, Meng QU, Zihao ZHENG, and Bing QIN
VENUS: A geometrical representation for quantum state visualization, Shaolun RUAN, Ribo YUAN, Qiang GUAN, Yanna LIN, Ying MAO, Weiwen JIANG, Zhepeng WANG, Wei XU, and Yong WANG
Vibefam: Raising the bar(bell) in the Singapore fitness industry, Niloofar ABOLFATHI and Simone SANTAMARIA
VibMilk: Non-intrusive milk spoilage detection via smartphone vibration, Yuezhong WU, Wei SONG, Yanxiang WANG, Dong MA, Weitao XU, Mahbub HASSAN, and Wen HU
Videogames and their material representations: Prototyping interactive experiences for social and cognitive purposes, Feichin Ted TSCHANG (or F. Ted TSCHANG), Beatrice D’IPPOLITO, and Mathieu-Claude CHABOUD
Video graph transformer for video question answering, Junbin XIAO, Pan ZHOU, Tat-Seng CHUA, and Shuicheng YAN
VIOLET: Visual Analytics for Explainable Quantum Neural Networks, Shaolun RUAN, Zhiding LIANG, Qiang GUAN, Paul Robert GRIFFIN, Xiaolin WEN, Yanna LIN, and Yong WANG
Virtual world affordances: Enhancing brand value, S. PARK, Fiona Fui-hoon NAH, D. DEWESTER, B. ESCHENBRENNER, and S. JEON
Visilience: An interactive visualization framework for resilience analysis using control-flow graph, Hailong JIANG, Shaolun RUAN, Bo FANG, Yong WANG, and Qiang GUAN
Vision paper: Advancing of AI explainability for the use of ChatGPT in government agencies: Proposal of a 4-step framework, Hui Shan LEE; SHANKARARAMAN, Venky; and Eng Lieh OUH
Vision Paper: Advancing of AI explainability for the use of ChatGPT in government agencies: Proposal of a 4-step framework, Hui Shan LEE; SHANKARARAMAN, Venky; and Eng Lieh OUH
Visualizing the invisible: Occluded vehicle segmentation and recovery, Xiaosheng YAN, Feigege WANG, Wenxi LIU, Yuanlong YU, Shengfeng HE, and Jia PAN
Visual knowledge query language as a front-end to relational systems, Keng SIAU, Kok Phuang TAN, and Hock Chuan CHAN
Visually analyzing company-wide software service dependencies: An industrial case study, Sebastian BALTES, Brian PFITZMANN, Thomas KOWARK, Christoph TREUDE, and Fabian BECK
Visual tracking via locality sensitive histograms, Shengfeng HE, Qingxiong YANG, Rynson W.H. LAU, Jian WANG, and Ming-Hsuan YANG
VITAL: A Singapore public agency transforming from within for revitalization, efficiency, and future-readiness, Siu Loon HOE and Thomas LIM
Voters and seats: The Hungarian electoral law and the 1994 parliamentary elections, Kenneth BENOIT
Voter strategies with restricted choice menus, Kenneth BENOIT, Daniela GIANNETTI, and Michael LAVER
Vulnerability to climatic and environmental disaster and change in the Indian Ocean World, Philip GOODING, Fiona WILLIAMSON, and Julie BABIN
W4-Groups: Modeling the who, what, when and where of group behavior via mobility sensing, Akansha ATREY, Camellia ZAKARIA, Rajesh Krishna BALAN, and Prashant SHENOY
Wait for it: Identifying 'on-hold' self-admitted technical debt, Rungroj MAIPRADIT, Christoph TREUDE, Hideaki HATA, and Kenichi MATSUMOTO
Wait, wasn't that code here before? Detecting outdated software documentation, Wen Siang TAN, Markus WAGNER, and Christoph TREUDE
Wakening past concepts without past data: Class-incremental learning from online placebos, Yaoyao LIU, Yingying LI, Bernt SCHIELE, and Qianru SUN
Warm weather leads to safe choices, Shilpa MADAN
WatME: Towards lossless watermarking through lexical redundancy, Liang CHEN, Yatao BIAN, Yang DENG, Deng CAI, Shuaiyi LI, Peilin ZHAO, and Kam-Fai WONG
Wav-BERT: Cooperative acoustic and linguistic representation learning for low-resource speech recognition, Guolin ZHENG, Yubei XIAO, Ke GONG, Pan ZHOU, Xiaodan LIANG, and Liang LIN
Weakly-supervised semantic segmentation, Zhaozheng CHEN
Wearables for in-situ monitoring of cognitive states: Challenges and opportunities, Meeralakshmi RADHAKRISHNAN, Thivya KANDAPPU, Manoj GULATI, and Archan MISRA
Wearing masks implies refuting Trump?: Towards target-specific user stance prediction across events in COVID-19 and US Election 2020, Hong ZHANG, Haewoon KWAK, Wei GAO, and Jisun AN
Web2SE: First workshop on web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN
Weight misperceptions and health management via information nudges, Lanjie WANG, Xuan ZHANG, KIM, and Kanghyock KOH
Weight perception and weight management via information nudges, Lanjie WANG, Xuan ZHANG, KIM, and KOH Kanghyock
Welcome address, Shameem Nilofar
Welcome and opening remarks, Shameem Nilofar MAIDEEN
Welcome message from the DysDoc3 2018 chairs, Martin P. ROBILLARD, Andrian MARCUS, Christoph TREUDE, and Michele LANZA
Welcome remarks, Shameem NILOFAR
Welcome to sales management: Addition by subtraction?, Philip Charles ZERRILLO, Francis D. KIM, and Dibyendu BOSE
We mind your well-being: Preventing depression in uncertain social networks by sequential interventions, Aye Phye Phye AUNG, Xinrun WANG, Bo AN, and Xiaoli LI
What does the digital revolution mean for legal education?, Emma ZIERCKE, Dirk HARTUNG, and Klaus-Stefan HOHENSTATT
What do users ask in open-source AI repositories? An empirical study of GitHub issues, Zhou YANG, Chenyu WANG, Jieke SHI, Thong HOANG, Pavneet Singh KOCHHAR, Qinghua LU, Zhenchang XING, and David LO
What drives employers’ favorability ratings on employer review platforms? The role of symbolic, personal, and emotional content, Christoph E. HÖLLIG, Andranik TUMASJAN, and Filip LIEVENS
What drives subjective well-being in Singapore’s youth?, Kong Weng HO and SMU Office of Research
What is beyond measurement for social cohesion?, Qian Hui Tricia TOK, Orlando WOODS, and Lily KONG
What is the vocabulary of flaky tests?, Gustavo PINTO, Breno MIRANDA, Supun DISSANAYAKE, Marcelo D'AMORIM, Christoph TREUDE, and Antonia BERTOLINO
What is Well-being?, William TOV and SMU Office of Research
What makes administrative and hierarchical procedures more burdensome? Effects of degree of procedures, outcome favorability, and Confucian values on red tape perception, M. Jae MOON, Jungsook KIM, Sehee JUNG, and Beomgeun CHO
What makes employees feel empowered to speak up?, Shilpa MADAN, Kevin NANAKDEWA, Krishna SAVANI, and Hazel Rose MARKUS
What's behind tight deadlines? Business causes of technical debt, Rodrigo REBOUÇAS DE ALMEIDA, Christoph TREUDE, and Uirá KULESZA
When bias contributes to variance: True limit theory in functional coefficient cointegrating regression, Peter C. B. PHILLIPS and Ying WANG
When doing more requires knowing more: Explaining the intention to seek procedural information about recycling, Sonny ROSENTHAL and Yan Wah LEUNG
When evolutionary computation meets privacy, Bowen ZHAO, Wei-Neng CHEN, Xiaoguo LI, Ximeng LIU, Qingqi PEI, and Jun ZHANG
When I know your taste: Retail customers’ environmental preferences and firm pollution, Mengjie YANG
When market forces backfire: Mandatory ESG disclosure and corporate innovation, Andi ZHANG
When players affect target values: Modeling and solving dynamic partially observable security games, Xinrun WANG, Milind TAMBE, Branislav BOSANKY, and Bo AN
When social status gets in the way of mating: The incompatibility between social status and reproductive goals in modern contexts, Jose C. YONG, Amy J. Y. LIM, and Norman P. LI
Where does Google find API documentation?, Christoph TREUDE and Maurício ANICHE
Where is my spot? Few-shot image generation via latent subspace optimization, Chenxi ZHENG, Bangzhen LIU, Huaidong ZHANG, Xuemiao XU, and Shengfeng HE
Whether in the classroom or the marketplace, there’s no perfect formula for innovation and entrepreneurship, Havovi JOSHI
Which businesses enroll in innovation training? Evidence from a field experiment, Pascale CRAMA, Reddi KOTHA, Cintia Kulzer SACILOTTO, and Vish KRISHNAN
Which idea to pursue? Gender differences in novelty avoidance during creative work, Mengzi JIN and Roy Y. J. CHUA
Who is who in the mailing list? Comparing six disambiguation heuristics to identify multiple addresses of a participant, Igor Scaliante WIESE, José Teodoro DA SILVA, Igor STEINMACHER, Christoph TREUDE, and Marco Aurélio GEROSA
Whom do we learn from? The impact of global networks and political regime types on e-government development, Beomgeun CHO and Karl R. RETHEMEYER
Whose traditions? Which practices?, Sor-hoon TAN
Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity, Xinrun WANG, Bo AN, and Hau CHAN
Who watched pre/post-lecture tutorial videos? Does flipped learning help beginners in economics?, Bei HONG
Why are Americans so divided on refugee policy?, Shilpa MADAN, Shankha BASU, Aneeta RATTAN, and Krishna SAVANI
Why citizens engage in co-production: A theoretical framework and experimental evidence, Seulki LEE and Chongmin NA
Why your organisation needs a language management strategy, John FISET and Devasheesh P. BHAVE
Wild bootstrap inference for instrumental variables regressions with weak and few clusters, Wenjie WANG and Yichong ZHANG
Wild hogs in the water: Contested infrastructural ecologies of reservoir storage in texas, Sayd RANDLE
Win: Weight-decay-integrated nesterov acceleration for adaptive gradient algorithms, Pan ZHOU, Xingyu XIE, and Shuicheng YAN
Win: Weight-decay-integrated Nesterov acceleration for faster network training, Pan ZHOU, Xingyu XIE, Zhouchen LIN, Kim-Chuan TOH, and Shuicheng YAN
Within-development density and housing prices in Singapore, Eric FESSELMEYER, Haoming LIU, and Louisa POCO
Witt: Querying technology terms based on automated classification, Mathieu NASSIF, Christoph TREUDE, and Martin P. ROBILLARD
Working with environmental economists, Annika Marie RIEGER and Joerg RIEGER
Working with the IPCC: A Singapore boy’s view of climate change, Winston T. L. CHOW
WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment, Christoph TREUDE, Patrick GORMAN, Lars GRAMMEL, and Margaret-Anne STOREY
Work item tagging: Communicating concerns in collaborative software development, Christoph TREUDE and Margaret-Anne STOREY
Workshop report from Web2SE 2011: 2nd International Workshop on Web 2.0 for Software Engineering, Christoph TREUDE, Margaret-Anne STOREY, Arie VAN DEURSEN, Andrew BEGEL, and Sue BLACK
Workshop report from Web2SE: First workshop on Web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN
World politics 100 years after the Paris Peace Conference (special issue of International Affairs, 95(1)), Margaret MACMILLAN, Anand MENON, and Patrick QUINTON-BROWN
Would order-by-order auctions be competitive?, Thomas ERNST, Chester SPATT, and Jian SUN
Writing to learn: Can reflection journals be used to promote self-reflection and learning?, Duan Ning, Magdeleine LEW and Henk G. SCHMIDT
Writing with AI: Insights and experiences from researchers, Karryl Kim Sagun TRAJANO, Rick Chi Wai LEE, Su Li HENG, and Marc ASTBURY
WSDMS: Debunk fake news via weakly supervised detection of misinforming sentences with contextualized social wisdom, Ruichao YANG, Wei GAO, Jing MA, Hongzhan LIN, and Zhiwei YANG
XaaS: Everything-as-a-service: The lean and agile approach to business growth, Shantanu BHATTACHARYA and Lipika BHATTACHARYA
Xcert Software, Inc., Keng SIAU
Xcert Software, Inc., Keng SIAU
xFuzz: Machine learning guided cross-contract fuzzing, Yinxing XUE, Jiaming YE, Wei ZHANG, Jun SUN, Lei MA, Haijun WANG, and Jianjun ZHAO
Young women in cities: Urbanization and gender-biased migration, Yumi KOH, Li JING, Yifan WU, Junjian YI, and Hanzhe ZHANG
Zooming into a new age of court proceedings: Perspectives from the court, counsel and witnesses, Aaron YOONG