The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

PDF

A study on a feasible no-root approach on Android, Yao CHENG; Yingjiu LI; DENG, Robert H.; Lingyun YING; and Wei HE Journal Article

PDF

A survey on wireless indoor localization from the device perspective, Jiang XIAO, Zimu ZHOU, Youwen YI, and Lionel M. NI Journal Article

Blind late fusion in multimedia event retrieval, Maaike H. T. DE BOER, Klamer SCHUTTE, Hao ZHANG, Yi-Jie LU, Chong-wah NGO, and Wessel KRAAIJ Journal Article

PDF

Content sampling, household informedness, and the consumption of digital information goods, Ai Phuong HOANG and Robert J. KAUFFMAN Journal Article

PDF

Cost sensitive online multiple kernel classification, Doyen SAHOO, Peilin ZHAO, and Steven C. H. HOI Conference Proceeding Article

PDF

Designing and evaluating business process models: An experimental approach, Yuecheng Martin YU, Alexander PELAEZ, and Karl R. LANG Journal Article

PDF

Designing minimal effective normative systems with the help of lightweight formal methods, Jianye HAO, Eunsuk KANG, Jun SUN, and Daniel JACKSON Conference Proceeding Article

PDF

Editorial: Trust management for multimedia big data, Zheng YAN; Jun LIU; DENG, Robert H.; and Francisco HERRERA Editorial

PDF

Efficient Tag Path Authentication Protocol with Less Tag Memory, Hongbing WANG, Yingjiu LI, Zongyang ZHANG, and Yunlei ZHAO Conference Proceeding Article

Escrow free attribute-based signature with self-revealability, Hui CUI; Guilin WANG; DENG, Robert H.; and Baodong QIN Journal Article

PDF

Finding causality and responsibility for probabilistic reverse skyline query non-answers, Yunjun GAO, Qing LIU, Gang CHENG, Linlin ZHOU, and Baihua ZHENG Journal Article

PDF

Grab Taxi: Navigating new frontiers, Mei LIN and Christopher DULA Magazine Article

PDF

Hierarchical visualization of video search results for topic-based browsing, Yu-Gang JIANG, Jiajun WANG, Qiang WANG, Wei LIU, and Chong-wah NGO Journal Article

PDF

How to break an API: Cost negotiation and community values in three software ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, and FERDIAN THUNG Conference Proceeding Article

PDF

Landmark reranking for smart travel guide systems by combining and analyzing diverse media, Junge SHEN, Jialie SHEN, Tao MEI, and Xinbo GAO Journal Article

PDF

Learning sentence embeddings with auxiliary tasks for cross-domain sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article

PDF

m(2)-ABKS: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Fushan WEI, Zhiquan LIU, and Xu An WANG Journal Article

PDF

Message from the chairs, Andrew BEGEL, Fabio CALEFATO, and Christoph TREUDE Conference Proceeding Article

PDF

One-round attribute-based key exchange in the multi-party setting, Yangguang TIAN, Guomin YANG, Yi MU, Kaitai LIANG, and Yong YU Conference Proceeding Article

PDF

On profiling bots in social media, Richard J. OENTARYO, Arinto MURDOPO, Philips K. PRASETYO, and Ee Peng LIM Conference Proceeding Article

PDF

On the security of two identity-based conditional proxy re-encryption schemes, Kai HE, Jian WENG, Robert H. DENG, and Joseph K. LIU Journal Article

PDF

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures, Yujue WANG, Qianhong WU, Bo QIN, Xiaofeng CHEN, Xinyi HUANG, and Jungang LOU Journal Article

PDF

Partitioning uncertain workloads, Freddy CHUA and Bernardo A. HUBERMAN Journal Article

PDF

Privacy-preserving outsourced calculation on floating point numbers, Ximeng LIU, Robert H. DENG, Wenxiu DING, and Rongxing LU Journal Article

PDF

Proteus: Computing disjunctive loop summary via path dependency analysis, Xiaofei XIE, Bihuan CHEN, Yang LIU, Wei LE, and Xiaohong LI Conference Proceeding Article

PDF

Reducing adaptation latency for multi-concept visual perception in outdoor environments, Maggie WIGNESS, John G. ROGERS, Luis Ernesto NAVARRO-SERMENT, Arne SUPPE, and Bruce A. DRAPER Conference Proceeding Article

PDF

Scaling BDD-based timed verification with simulation reduction, Truong Khanh NGUYEN, Tian Huat TAN, Jun SUN, Jiaying LI, Yang LIU, Manman CHEN, and Jin Song DONG Conference Proceeding Article

PDF

Service adaptation with probabilistic partial models, Manman CHEN, Tian Huat TAN, Jun SUN, Jingyi WANG, Yang LIU, Jing SUN, and Jin Song DONG Conference Proceeding Article

PDF

Spiteful, one-off, and kind: Predicting customer feedback behavior on Twitter, Agus SULISTYA, Abhishek SHARMA, and David LO Conference Proceeding Article

PDF

Static loop analysis and Its applications, Xiaofei XIE Conference Proceeding Article

PDF

Summarization of egocentric videos: A comprehensive survey, Ana GARCIA DEL MOLINO, Cheston TAN, Joo-Hwee LIM, and Ah-hwee TAN Journal Article

PDF

VIREO @ TRECVID 2016: Multimedia event detection, ad-hoc video search, video-to-text description, Hao ZHANG, Yi-Jie LU, and Chong-wah NGO Conference Proceeding Article

PDF

VIREO@TRECVID 2016: Multimedia event detection, ad-hoc video search, video to text description, Hao ZHANG, Lei PANG, Yi-Jie LU, and Chong-wah NGO Conference Paper

PDF

What permissions should this Android app request?, Lingfeng BAO, David LO, Xin XIA, and Shanping LI Conference Proceeding Article

ORPLocator: Identifying read points of configuration options via static analysis, Zhen DONG, Artur ANDRZEJAK, David LO, and Diego COSTA Conference Proceeding Article

Security and privacy in communication networks: 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, Proceedings, Robert H. DENG, Jian WENG, Kui REN, and Vinod YEGNESWARAN Edited Conference Proceeding

PDF

Achieving economic and environmental sustainabilities in urban consolidation center with bicriteria auction, Stephanus Daniel HANDOKO, Hoong Chuin LAU, and Shih-Fen CHENG Journal Article

PDF

AmaLgam+: Composing rich information sources for accurate bug localization, Shaowei WANG and David LO Journal Article

Link

An ECRA 15th anniversary virtual special issue on ‘Payments, cards and services in the Fintech revolution’, Robert John KAUFFMAN, Dan MA, and Byungjoon YOO Editorial

Link

An ECRA 15th anniversary virtual special issue on ‘Social Networks and Social Commerce’, Robert J. KAUFFMAN, Bin WANG, and Lina ZHOU Editorial

Link

An ECRA 15th anniversary virtual special issue on ‘Technological and Machine Approaches in E-commerce’, Robert J. KAUFFMAN, Chris YANG, and Jie ZHANG Editorial

Link

An ECRA 15th Anniversary Virtual Special Issue on "The Behavioral Dimensions of E-commerce", Robert J. KAUFFMAN, Hsiangchu LAI, and Yinping YANG Editorial

PDF

A novel CSI pre-processing scheme for device-free localization indoors, Ju WANG, Lichao ZHANG, Xuan WANG, Jie XIONG, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article

PDF

ARISE-PIE: A People Information Integration Engine over the Web, Vincent W. ZHENG, Tao HOANG, Penghe CHEN, Yuan FANG, and Xiaoyan YANG Conference Proceeding Article

PDF

Attractiveness versus competition: Towards an unified model for user visitation, Thanh-Nam DOAN and Ee-Peng LIM Conference Proceeding Article

PDF

Attribute-based encryption with granular revocation, Hui CUI; DENG, Robert H.; Xuhua DING; and Yingjiu LI Conference Proceeding Article

PDF

"Automated debugging considered harmful" considered harmful: A user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems, Xin XIA, Lingfeng BAO, David LO, and Shanping LI Conference Proceeding Article

PDF

Behavior analysis in social networks: Challenges, technologies, and trends, Meng WANG, Ee-peng LIM, Lei LI, and Mehmet ORGUN Editorial

PDF

Bilevel model-based discriminative dictionary learning for recognition, Pan ZHOU, Chao ZHANG, and LIN Zhouchen Journal Article

PDF

Combining word embedding with information retrieval to recommend similar bug reports, Xinli YANG, David LO, Xin XIA, Lingfeng BAO, and Jianling SUN Conference Proceeding Article

PDF

Deep-based ingredient recognition for cooking recipe retrieval, Jingjing CHEN and Chong-wah NGO Conference Proceeding Article

PDF

Determining quality- and energy-aware multiple contexts in pervasive computing environments, Nirmalya ROY, Archan MISRA, Sajal K. DAS, and Christine JULIEN Journal Article

PDF

Dissecting developer policy violating apps: Characterization and detection, Su Mon KYWE, Yingjiu LI, Jason HONG, and Yao CHENG Conference Proceeding Article

PDF

Empirical study on synthesis engines for semantics-based program repair, Le Dinh Xuan BACH, David LO, and Claire Le GOUES Conference Proceeding Article

PDF

Enhancing automated program repair with deductive verification, Xuan-Bach D. LE, Quang Loc LE, David LO, and Claire Le GOUES Conference Proceeding Article

PDF

HYDRA: Massively compositional model for cross-project defect prediction, Xin XIA, David LO, Sinno Jialin PAN, Nachiappan NAGAPPAN, and Xinyu WANG Journal Article

PDF

Inferring links between concerns and methods with multi-abstraction vector space model, Yun ZHANG, David LO, Xin XIA, Tien-Duy B. LE, Giuseppe SCANNIELLO, and Jianling SUN Conference Proceeding Article

PDF

Integrated software fingerprinting via neural-network-based control flow obfuscation, Haoyu MA, Ruiqi LI, Xiaoxu YU, Chunfu JIA, and Debin GAO Journal Article

PDF

LiFS: Low human-effort, device-free localization with fine-grained subcarrier information, Ju WANG, Hongbo JIANG, Jie XIONG, Kyle JAMIESON, Xiaojiang CHEN, Dingyi FANG, and Binbin XIE Conference Proceeding Article

PDF

Online adaptive passive-aggressive methods for non-negative matrix factorization and its applications, Chenghao LIU; HOI, Steven C. H.; Peilin ZHAO; Jianling SUN; and Ee-Peng LIM Conference Proceeding Article

PDF

Plackett-Luce Regression Mixture model for heterogeneous rankings, Maksim TKACHENKO and Hady W. LAUW Conference Proceeding Article

PDF

Recommending code changes for automatic backporting of Linux device drivers, Ferdian THUNG, Xuan Bach D. LE, and David LO Conference Proceeding Article

PDF

Repmatch: Robust feature matching and pose for reconstructing modern cities, Wen-yan LIN, Siying LIU, Minh N. DO, Ping TAN, and Jiangbo LU Conference Proceeding Article

PDF

SATT: Tailoring code metric thresholds for different software architectures, Maurício ANICHE, Christoph TREUDE, Andy ZAIDMAN, Arie VAN DEURSEN, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

Tracking virality and susceptibility in social media, Tuan Anh HOANG and Ee-Peng LIM Conference Proceeding Article

PDF

When machine meets society: Social impacts of information and information economics, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER Editorial

PDF

Who is who in the mailing list? Comparing six disambiguation heuristics to identify multiple addresses of a participant, Igor Scaliante WIESE, José Teodoro DA SILVA, Igor STEINMACHER, Christoph TREUDE, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

xD-track: Leveraging multi-dimensional information for passive wi-fi tracking, Yaxiong XIE, Jie XIONG, Mo LI, and Kyle JAMIESON Conference Proceeding Article

PDF

CrowdService: Serving the individuals through mobile crowdsourcing and service composition, Xin PENG, Jingxiao GU, Tian Huat TAN, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun Zhao ZHAO Conference Proceeding Article

PDF

Get me to my GATE on time: Efficiently solving general-sum bayesian threat screening games, Aaron SCHLENKER, Matthew BROWN, Arunesh SINHA, Milind TAMBE, and Ruta MEHTA Conference Proceeding Article

PDF

A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article

PDF

A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article

PDF

An intelligent system for personalized conference event recommendation and scheduling, Aldy GUNAWAN, Hoong Chuin LAU, Pradeep VARAKANTHAM, and Wenjie WANG Conference Proceeding Article

PDF

A reinforcement learning framework for trajectory prediction under uncertainty and budget constraint, Truc Viet LE, Siyuan LIU, and Hoong Chuin LAU Conference Proceeding Article

ASE '16: Proceedings of the 31st ACM/IEEE International Conference on Automated Software Engineering: Singapore, September 3 -7, 2016, David LO, Sven Apel APEL, and Sarfraz KHURSHID Edited Conference Proceeding

PDF

Automated bug report field reassignment and refinement prediction, Xin XIA, David LO, Emad SHIHAB, and Xinyu WANG Journal Article

PDF

AutoQuery: Automatic Construction of Dependency Queries for Code Search, Shaowei WANG, David LO, and Lingxiao JIANG Journal Article

PDF

Control flow integrity enforcement with dynamic code optimization, Yan LIN, Xiaoxiao TANG, Debin GAO, and Jianming FU Conference Proceeding Article

PDF

Cross-cultural user perceptions of website design and security: Introduction to a commentary and response on Cyr (2013), Robert John KAUFFMAN Editorial

PDF

Detecting community pacemakers of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Conference Proceeding Article

PDF

Developers’ perceptions on object-oriented design and architectural roles, Maurício ANICHE, Marco Aurélio GEROSA, and Christoph TREUDE Conference Proceeding Article

PDF

Dynamic-MUSIC: Accurate device-free indoor localization, Xiang LI, Shengjie LI, Daqing ZHANG, Jie XIONG, Yasha WANG, and Hong MEI Conference Proceeding Article

PDF

Efficient community maintenance for dynamic social networks, Hongchao QIN, Ye YUAN, Feida ZHU, and Guoren WANG Conference Proceeding Article

PDF

Extracting Food Substitutes From Food Diary via Distributional Similarity, Palakorn ACHANANUPARP and Ingmar WEBER Conference Paper

PDF

Fast covariant VLAD for image search, Wan-Lei ZHAO, Chong-wah NGO, and Hanzi WANG Journal Article

PDF

High correlation of Middle East respiratory syndrome spread with Google search and Twitter trends in Korea, Soo-Yong SHIN, Dong-Woo SEO, Jisun AN, Haewoon KWAK, Sung-Han KIM, Jin GWACK, and Min-Woo JO Journal Article

PDF

How practitioners perceive the relevance of ESEM research, Jeffrey C. CARVER, Oscar DIESTE, Nicholas A. KRAFT, David LO, and Thomas ZIMMERMANN Conference Proceeding Article

PDF

Human-centred design for silver assistants, Zhiwei ZHENG, Di WANG, Ailiya BORJIGIN, Chunyan MIAO, Ah-hwee TAN, and Cyril LEUNG Conference Proceeding Article

Hyperlink-aware object retrieval, Wei ZHANG, Chong-wah NGO, and Xiaochun CAO Journal Article

PDF

Improving Carbon Efficiency through Container Size Optimization and Shipment Consolidation, Nang Laik MA, Kar Way TAN, and Edwin Lik Ming CHONG Conference Proceeding Article

PDF

Incentive mechanism design for heterogeneous crowdsourcing using all-pay contests, Tie LUO, Salil S. KANHERE, Sajal K. DAS, and Hwee-Pink TAN Journal Article

PDF

Indoor localization via multi-modal sensing on smartphones, Han XU, Zheng YANG, Zimu ZHOU, Longfei SHANGGUAN, Ke YI, and Yunhao LIU Conference Proceeding Article

PDF

Is Only One GPS Point Position Sufficient to Locate You to The Road Network Accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article

PDF

Is only one GPS position sufficient to locate you to the road network accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article

PDF

Leveraging Competency Framework to Improve Teaching and Learning: A Methodological Approach, Venky SHANKARARAMAN and Joelle ELMALEH Journal Article

PDF

Metaflow: a scalable metadata lookup service for distributed file systems in data centers, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Haiyong XIE Journal Article

PDF

Microblogging content propagation modeling using topic-specific behavioral factors, Tuan Anh HOANG and Ee-peng LIM Journal Article

PDF

Mining revision histories to detect cross-language clones without intermediates, Lingxiao JIANG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article

PDF

Modeling sequential preferences with dynamic user and context factors, Duc Trong LE, Yuan FANG, and Hady W. LAUW Conference Proceeding Article

PDF

On the feasibility of detecting cross-platform code clones via identifier similarity, Xiao CHENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article