The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

PDF

SATT: Tailoring code metric thresholds for different software architectures, Maurício ANICHE, Christoph TREUDE, Andy ZAIDMAN, Arie VAN DEURSEN, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

Technology-mediated synchronous virtual education: An empirical study, Xiaofeng CHEN and Keng SIAU Journal Article

PDF

Tracking virality and susceptibility in social media, Tuan Anh HOANG and Ee-Peng LIM Conference Proceeding Article

PDF

When machine meets society: Social impacts of information and information economics, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER Editorial

PDF

Who is who in the mailing list? Comparing six disambiguation heuristics to identify multiple addresses of a participant, Igor Scaliante WIESE, José Teodoro DA SILVA, Igor STEINMACHER, Christoph TREUDE, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

xD-track: Leveraging multi-dimensional information for passive wi-fi tracking, Yaxiong XIE, Jie XIONG, Mo LI, and Kyle JAMIESON Conference Proceeding Article

PDF

CrowdService: Serving the individuals through mobile crowdsourcing and service composition, Xin PENG, Jingxiao GU, Tian Huat TAN, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun Zhao ZHAO Conference Proceeding Article

PDF

Get me to my GATE on time: Efficiently solving general-sum bayesian threat screening games, Aaron SCHLENKER, Matthew BROWN, Arunesh SINHA, Milind TAMBE, and Ruta MEHTA Conference Proceeding Article

PDF

A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article

PDF

A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article

PDF

An intelligent system for personalized conference event recommendation and scheduling, Aldy GUNAWAN, Hoong Chuin LAU, Pradeep VARAKANTHAM, and Wenjie WANG Conference Proceeding Article

PDF

A reinforcement learning framework for trajectory prediction under uncertainty and budget constraint, Truc Viet LE, Siyuan LIU, and Hoong Chuin LAU Conference Proceeding Article

ASE '16: Proceedings of the 31st ACM/IEEE International Conference on Automated Software Engineering: Singapore, September 3 -7, 2016, David LO, Sven Apel APEL, and Sarfraz KHURSHID Edited Conference Proceeding

PDF

Automated bug report field reassignment and refinement prediction, Xin XIA, David LO, Emad SHIHAB, and Xinyu WANG Journal Article

PDF

AutoQuery: Automatic Construction of Dependency Queries for Code Search, Shaowei WANG, David LO, and Lingxiao JIANG Journal Article

PDF

Control flow integrity enforcement with dynamic code optimization, Yan LIN, Xiaoxiao TANG, Debin GAO, and Jianming FU Conference Proceeding Article

PDF

Cross-cultural user perceptions of website design and security: Introduction to a commentary and response on Cyr (2013), Robert John KAUFFMAN Editorial

PDF

Detecting community pacemakers of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Conference Proceeding Article

PDF

Developers’ perceptions on object-oriented design and architectural roles, Maurício ANICHE, Marco Aurélio GEROSA, and Christoph TREUDE Conference Proceeding Article

PDF

Dynamic-MUSIC: Accurate device-free indoor localization, Xiang LI, Shengjie LI, Daqing ZHANG, Jie XIONG, Yasha WANG, and Hong MEI Conference Proceeding Article

PDF

Efficient community maintenance for dynamic social networks, Hongchao QIN, Ye YUAN, Feida ZHU, and Guoren WANG Conference Proceeding Article

PDF

Extracting Food Substitutes From Food Diary via Distributional Similarity, Palakorn ACHANANUPARP and Ingmar WEBER Conference Paper

PDF

Fast covariant VLAD for image search, Wan-Lei ZHAO, Chong-wah NGO, and Hanzi WANG Journal Article

PDF

High correlation of Middle East respiratory syndrome spread with Google search and Twitter trends in Korea, Soo-Yong SHIN, Dong-Woo SEO, Jisun AN, Haewoon KWAK, Sung-Han KIM, Jin GWACK, and Min-Woo JO Journal Article

PDF

How practitioners perceive the relevance of ESEM research, Jeffrey C. CARVER, Oscar DIESTE, Nicholas A. KRAFT, David LO, and Thomas ZIMMERMANN Conference Proceeding Article

PDF

Human-centred design for silver assistants, Zhiwei ZHENG, Di WANG, Ailiya BORJIGIN, Chunyan MIAO, Ah-hwee TAN, and Cyril LEUNG Conference Proceeding Article

Hyperlink-aware object retrieval, Wei ZHANG, Chong-wah NGO, and Xiaochun CAO Journal Article

PDF

Improving Carbon Efficiency through Container Size Optimization and Shipment Consolidation, Nang Laik MA, Kar Way TAN, and Edwin Lik Ming CHONG Conference Proceeding Article

PDF

Incentive mechanism design for heterogeneous crowdsourcing using all-pay contests, Tie LUO, Salil S. KANHERE, Sajal K. DAS, and Hwee-Pink TAN Journal Article

PDF

Indoor localization via multi-modal sensing on smartphones, Han XU, Zheng YANG, Zimu ZHOU, Longfei SHANGGUAN, Ke YI, and Yunhao LIU Conference Proceeding Article

PDF

Is Only One GPS Point Position Sufficient to Locate You to The Road Network Accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article

PDF

Is only one GPS position sufficient to locate you to the road network accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article

PDF

Leveraging Competency Framework to Improve Teaching and Learning: A Methodological Approach, Venky SHANKARARAMAN and Joelle ELMALEH Journal Article

PDF

Metaflow: a scalable metadata lookup service for distributed file systems in data centers, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Haiyong XIE Journal Article

PDF

Microblogging content propagation modeling using topic-specific behavioral factors, Tuan Anh HOANG and Ee-peng LIM Journal Article

PDF

Mining revision histories to detect cross-language clones without intermediates, Lingxiao JIANG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article

PDF

Modeling sequential preferences with dynamic user and context factors, Duc Trong LE, Yuan FANG, and Hady W. LAUW Conference Proceeding Article

PDF

On the feasibility of detecting cross-platform code clones via identifier similarity, Xiao CHENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article

PDF

PADA: Power-aware development assistant for mobile sensing applications, Chulhong MIN, Seungchul LEE, Changhun LEE, Youngki LEE, Seungwoo KANG, Seungpyo CHOI, Wonjung KIM, and Junehwa SONG Conference Proceeding Article

PDF

Predicting crashing releases of mobile applications, Xin XIA, Emad SHIHAB, Yasutaka KAMEI, David LO, and Xinyu WANG Conference Proceeding Article

PDF

Probabilistic models for contextual agreement in preferences, Loc DO and Hady W. LAUW Journal Article

PDF

Provably secure robust optimistic fair exchange of distributed signatures, Yujue WANG, Qianhong WU, Duncan S. WONG, Bo QIN, Jian MAO, and Yong DING Journal Article

PDF

Ra2: Predicting simulation execution time for cloud-based design space explorations, Nguyen Binh Duong TA, Wentong CAI, Zengxiang LI, and Suiping ZHOU Conference Proceeding Article

PDF

Representation learning for homophilic preferences, Trong T. NGUYEN and Hady W. LAUW Conference Proceeding Article

PDF

Server-aided revocable attribute-based encryption, Hui CUI; DENG, Robert H.; Yingjiu LI; and Baodong QIN Conference Proceeding Article

PDF

Soft confidence-weighted learning, Jialei WANG; Peilin ZHAO; and HOI, Steven C. H. Journal Article

PDF

TASKer: Behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, Nikita JAIMAN, Randy Tandriansyah DARATAN, Archan MISRA, Shih-Fen CHENG, Cen CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article

PDF

TASKer: behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, JAIMAN, TANDRIANSYAH, Archan MISRA, Shih-Fen CHENG, CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article

PDF

Towards autonomous behavior learning of non-player characters in games, Shu FENG and Ah-hwee TAN Journal Article

PDF

Trustworthy authentication on scalable surveillance video with background model support, Zhuo WEI, Zheng YAN, Yongdong WU, and Robert H. DENG Journal Article

PDF

What security questions do developers ask? A large-scale study of stack overflow posts, Xinli YANG, David LO, Xin XIA, Zhi-Yuan WAN, and Jian-Ling SUN Journal Article

PDF

When a friend online is more than a friend in life: Intimate relationship prediction in microblogs, Yunshi LAN, Mengqi ZHANG, Feida ZHU, Jing JIANG, and Ee-Peng LIM Conference Proceeding Article

Collaborative opportunities: IMIA working groups and personalized medicine & digital health literacy, Tze-Yun LEONG Conference Paper

Towards automatic persona generation using social media, Jisun AN, Hoyoun CHO, Haewoon KWAK, Mohammed Ziyaad HASSEN, and Bernard J JANSEN Conference Proceeding Article

PDF

Topic extraction from microblog posts using conversation structures, Jing LI, Ming LIAO, Wei GAO, Yulan HE, and Kam-Fai WONG Conference Proceeding Article

PDF

A fast algorithm for personalized travel planning recommendation, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article

PDF

A multilingual semi-supervised approach in deriving Singlish sentic patterns for polarity detection, Siaw Ling LO, Erik CAMBRIA, Raymond CHIONG, and David CORNFORTH Journal Article

PDF

API recommendation system for software development, FERDIAN THUNG Conference Proceeding Article

Code comment quality analysis and improvement recommendation: An automated approach, Xiaobing SUN, Qiang GENG, David LO, Yucong DUAN, Xiangyue LIU, and LI Bin Journal Article

PDF

CoMon+: A Cooperative Context Monitoring System for Multi-Device Personal Sensing Environments, Youngki LEE, Seungwoo KANG, Chulhong MIN, Younghyun JU, Inseok HWANG, and Junehwa SONG Journal Article

PDF

Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice, Weizhi MENG, Xiapu LUO, Wenjuan LI, and Yan LI Conference Proceeding Article

PDF

Detecting communities using coordination games: A short paper, Radhika ARAVA and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Enhancing local search with adaptive operator ordering and its application to the time dependent orienteering problem, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article

PDF

Extending the network: The influence of offline friendship on Twitter network, Young Soo KIM, Kyungsub Stephen CHOI, and FELICIA NATALI Conference Proceeding Article

PDF

Fine-grained appliance usage and energy monitoring through mobile and power-line sensing, Nirmalya ROY, Nilavra PATHAK, and Archan MISRA Journal Article

PDF

Intermediaries vs Peer-to-Peer: A Study of Lenders’ Incentive on a Donation-based Crowdfunding Platform, Ling GE, Zhiling GUO, and Xuechen LUO Conference Proceeding Article

PDF

New developments in metaheuristics and their applications: Selected extended contributions from the 10th Metaheuristics International Conference (MIC 2013), Hoong Chuin LAU, Günther R. Raidl, and Pascal Van Hentenryck Editorial

PDF

Probabilistic Robust Route Recovery with Spatio-Temporal Dynamics, Hao WU, Jiangyun MAO, Weiwei SUN, Baihua ZHENG, Hanyuan ZHANG, Ziyang CHEN, and Wei WANG Conference Proceeding Article

PDF

Revocable and decentralized attribute-based encryption, Hui CUI and DENG, Robert H. Journal Article

PDF

SafeGPU: Contract- and library-based GPGPU for object-oriented languages, Alexey KOLESNICHENKO, Christopher M. POSKITT, and Sebastian NANZ Journal Article

PDF

Social sentiment and stock trading via mobile phones, Kwansoo KIM, Sang Yong LEE, and Robert John KAUFFMAN Conference Proceeding Article

PDF

TafLoc: Time-adaptive and fine-grained device-free localization with little cost, Liqiong CHANG, Jie XIONG, Xiaojiang CHEN, Ju WANG, Junhao HU, and Wei WANG Conference Proceeding Article

TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee-Peng LIM, and Ke WANG Journal Article

PDF

Understanding patient portal use intentions: Enablers and inhibitors of IT use, M. MOQBEL, Fiona Fui-hoon NAH, V. BARTELT, and R. O’DELL Conference Proceeding Article

PDF

Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval, Liang XIE, Lei ZHU, and Guoqi CHEN Journal Article

PDF

User Identity Linkage by Latent User Space Modelling, Xin MU, Feida ZHU, Ee-Peng LIM, Jing XIAO, Jianzong WANG, and Zhi-Hua ZHOU Conference Proceeding Article

Landscape synergy in evolutionary multitasking, Abhishek GUPTA, Yew Soon ONG, B. DA, Handoko Stephanus Daniel, and Stephanus D. HANDOKO Conference Proceeding Article

The retransmission of rumor-related tweets: Characteristics of source and message, Alton Y. K. CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article

The retransmission of rumor-related tweets: Characteristics of source and message, CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article

Targeted gamification to encourage and measure intrinsically motivated game-based learning, Chris BOESCH Conference Proceeding Article

PDF

A Feasible No-Root Approach on Android, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

A Learning-to-Rank Based Fault Localization Approach using Likely Invariants, Tien-Duy B. LE, David LO, Claire LE GOUES, and Lars GRUNSKE Conference Proceeding Article

PDF

An adaptability-driven model and tool for analysis of service profitability, Eng Lieh OUH and Jarzabek STAN Conference Proceeding Article

PDF

A survey on future internet security architectures, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article

PDF

Automatic hookworm detection in wireless capsule endoscopy images, Xiao WU, Honghan CHEN, Tao GAN, Junzhou CHEN, Chong-wah NGO, and Qiang PENG Journal Article

PDF

Build emotion lexicon from the mood of crowd via topic-assisted joint non-negative matrix factorization, Kaisong SONG, Wei GAO, Ling CHEN, Shi FENG, Daling WANG, and Chengqi ZHANG Conference Proceeding Article

PDF

Can Instagram posts help characterize urban micro-events?, Kasthuri JAYARAJAH and Archan MISRA Conference Proceeding Article

PDF

Cross-Modal Self-Taught Hashing for large-scale image retrieval, Liang XIE, Lei ZHU, Peng PAN, and Yansheng LU Journal Article

PDF

Detecting rumors from microblogs with recurrent neural networks, Jing MA, Wei GAO, Prasenjit MITRA, Sejeong KWON, Bernard J. JANSEN, Kam-Fai WONG, and Meeyoung CHA Conference Proceeding Article

PDF

Edit distance based encryption and its application, Tran Viet Xuan PHUONG, Guomin YANG, Willy SUSILO, and Kaitai LIANG Conference Proceeding Article

PDF

Fine-grained detection of programming students’ frustration using keystrokes, mouse clicks and interaction logs, Hua Leong FWA Journal Article

PDF

From offline to online: How health insurance policies drive the demand for online healthcare service?, Yue YU, Qiu-Yan MEI, and QIU-HONG WANG Conference Proceeding Article

PDF

Generic anonymous identity-based broadcast encryption with chosen-ciphertext security, Kai HE; Jian WENG; Man Ho AU; Yijun MAO; and DENG, Robert H. Conference Proceeding Article

PDF

Learning compact visual representation with canonical views for robust mobile landmark search, Lei ZHU, Jialie SHEN, Xiaobai LIU, Liang XIE, and Liqiang NIE Conference Proceeding Article

PDF

Linear encryption with keyword search, Shiwei ZHANG, Guomin YANG, and Yi MU Conference Proceeding Article

PDF

On effective personalized music retrieval by exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

On effective personalized music retrieval via exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

One-round strong oblivious signature-based envelope, Rongmao CHEN, Yi MU, Willy SUSILO, Guomin YANG, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article

PDF

On very large scale test collection for landmark image search benchmarking, Zhiyong CHENG and Jialie SHEN Journal Article

PDF

Ordinal text quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article