Submissions from 2016
SATT: Tailoring code metric thresholds for different software architectures, Maurício ANICHE, Christoph TREUDE, Andy ZAIDMAN, Arie VAN DEURSEN, and Marco Aurélio GEROSA Conference Proceeding Article
Technology-mediated synchronous virtual education: An empirical study, Xiaofeng CHEN and Keng SIAU Journal Article
Tracking virality and susceptibility in social media, Tuan Anh HOANG and Ee-Peng LIM Conference Proceeding Article
When machine meets society: Social impacts of information and information economics, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER Editorial
Who is who in the mailing list? Comparing six disambiguation heuristics to identify multiple addresses of a participant, Igor Scaliante WIESE, José Teodoro DA SILVA, Igor STEINMACHER, Christoph TREUDE, and Marco Aurélio GEROSA Conference Proceeding Article
xD-track: Leveraging multi-dimensional information for passive wi-fi tracking, Yaxiong XIE, Jie XIONG, Mo LI, and Kyle JAMIESON Conference Proceeding Article
CrowdService: Serving the individuals through mobile crowdsourcing and service composition, Xin PENG, Jingxiao GU, Tian Huat TAN, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun Zhao ZHAO Conference Proceeding Article
Get me to my GATE on time: Efficiently solving general-sum bayesian threat screening games, Aaron SCHLENKER, Matthew BROWN, Arunesh SINHA, Milind TAMBE, and Ruta MEHTA Conference Proceeding Article
A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article
A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article
An intelligent system for personalized conference event recommendation and scheduling, Aldy GUNAWAN, Hoong Chuin LAU, Pradeep VARAKANTHAM, and Wenjie WANG Conference Proceeding Article
A reinforcement learning framework for trajectory prediction under uncertainty and budget constraint, Truc Viet LE, Siyuan LIU, and Hoong Chuin LAU Conference Proceeding Article
ASE '16: Proceedings of the 31st ACM/IEEE International Conference on Automated Software Engineering: Singapore, September 3 -7, 2016, David LO, Sven Apel APEL, and Sarfraz KHURSHID Edited Conference Proceeding
Automated bug report field reassignment and refinement prediction, Xin XIA, David LO, Emad SHIHAB, and Xinyu WANG Journal Article
AutoQuery: Automatic Construction of Dependency Queries for Code Search, Shaowei WANG, David LO, and Lingxiao JIANG Journal Article
Control flow integrity enforcement with dynamic code optimization, Yan LIN, Xiaoxiao TANG, Debin GAO, and Jianming FU Conference Proceeding Article
Cross-cultural user perceptions of website design and security: Introduction to a commentary and response on Cyr (2013), Robert John KAUFFMAN Editorial
Detecting community pacemakers of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Conference Proceeding Article
Developers’ perceptions on object-oriented design and architectural roles, Maurício ANICHE, Marco Aurélio GEROSA, and Christoph TREUDE Conference Proceeding Article
Dynamic-MUSIC: Accurate device-free indoor localization, Xiang LI, Shengjie LI, Daqing ZHANG, Jie XIONG, Yasha WANG, and Hong MEI Conference Proceeding Article
Efficient community maintenance for dynamic social networks, Hongchao QIN, Ye YUAN, Feida ZHU, and Guoren WANG Conference Proceeding Article
Extracting Food Substitutes From Food Diary via Distributional Similarity, Palakorn ACHANANUPARP and Ingmar WEBER Conference Paper
Fast covariant VLAD for image search, Wan-Lei ZHAO, Chong-wah NGO, and Hanzi WANG Journal Article
High correlation of Middle East respiratory syndrome spread with Google search and Twitter trends in Korea, Soo-Yong SHIN, Dong-Woo SEO, Jisun AN, Haewoon KWAK, Sung-Han KIM, Jin GWACK, and Min-Woo JO Journal Article
How practitioners perceive the relevance of ESEM research, Jeffrey C. CARVER, Oscar DIESTE, Nicholas A. KRAFT, David LO, and Thomas ZIMMERMANN Conference Proceeding Article
Human-centred design for silver assistants, Zhiwei ZHENG, Di WANG, Ailiya BORJIGIN, Chunyan MIAO, Ah-hwee TAN, and Cyril LEUNG Conference Proceeding Article
Hyperlink-aware object retrieval, Wei ZHANG, Chong-wah NGO, and Xiaochun CAO Journal Article
Improving Carbon Efficiency through Container Size Optimization and Shipment Consolidation, Nang Laik MA, Kar Way TAN, and Edwin Lik Ming CHONG Conference Proceeding Article
Incentive mechanism design for heterogeneous crowdsourcing using all-pay contests, Tie LUO, Salil S. KANHERE, Sajal K. DAS, and Hwee-Pink TAN Journal Article
Indoor localization via multi-modal sensing on smartphones, Han XU, Zheng YANG, Zimu ZHOU, Longfei SHANGGUAN, Ke YI, and Yunhao LIU Conference Proceeding Article
Is Only One GPS Point Position Sufficient to Locate You to The Road Network Accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article
Is only one GPS position sufficient to locate you to the road network accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article
Leveraging Competency Framework to Improve Teaching and Learning: A Methodological Approach, Venky SHANKARARAMAN and Joelle ELMALEH Journal Article
Metaflow: a scalable metadata lookup service for distributed file systems in data centers, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Haiyong XIE Journal Article
Microblogging content propagation modeling using topic-specific behavioral factors, Tuan Anh HOANG and Ee-peng LIM Journal Article
Mining revision histories to detect cross-language clones without intermediates, Lingxiao JIANG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article
Modeling sequential preferences with dynamic user and context factors, Duc Trong LE, Yuan FANG, and Hady W. LAUW Conference Proceeding Article
On the feasibility of detecting cross-platform code clones via identifier similarity, Xiao CHENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article
PADA: Power-aware development assistant for mobile sensing applications, Chulhong MIN, Seungchul LEE, Changhun LEE, Youngki LEE, Seungwoo KANG, Seungpyo CHOI, Wonjung KIM, and Junehwa SONG Conference Proceeding Article
Predicting crashing releases of mobile applications, Xin XIA, Emad SHIHAB, Yasutaka KAMEI, David LO, and Xinyu WANG Conference Proceeding Article
Probabilistic models for contextual agreement in preferences, Loc DO and Hady W. LAUW Journal Article
Provably secure robust optimistic fair exchange of distributed signatures, Yujue WANG, Qianhong WU, Duncan S. WONG, Bo QIN, Jian MAO, and Yong DING Journal Article
Ra2: Predicting simulation execution time for cloud-based design space explorations, Nguyen Binh Duong TA, Wentong CAI, Zengxiang LI, and Suiping ZHOU Conference Proceeding Article
Representation learning for homophilic preferences, Trong T. NGUYEN and Hady W. LAUW Conference Proceeding Article
Server-aided revocable attribute-based encryption, Hui CUI; DENG, Robert H.; Yingjiu LI; and Baodong QIN Conference Proceeding Article
Soft confidence-weighted learning, Jialei WANG; Peilin ZHAO; and HOI, Steven C. H. Journal Article
TASKer: Behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, Nikita JAIMAN, Randy Tandriansyah DARATAN, Archan MISRA, Shih-Fen CHENG, Cen CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article
TASKer: behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, JAIMAN, TANDRIANSYAH, Archan MISRA, Shih-Fen CHENG, CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article
Towards autonomous behavior learning of non-player characters in games, Shu FENG and Ah-hwee TAN Journal Article
Trustworthy authentication on scalable surveillance video with background model support, Zhuo WEI, Zheng YAN, Yongdong WU, and Robert H. DENG Journal Article
What security questions do developers ask? A large-scale study of stack overflow posts, Xinli YANG, David LO, Xin XIA, Zhi-Yuan WAN, and Jian-Ling SUN Journal Article
When a friend online is more than a friend in life: Intimate relationship prediction in microblogs, Yunshi LAN, Mengqi ZHANG, Feida ZHU, Jing JIANG, and Ee-Peng LIM Conference Proceeding Article
Collaborative opportunities: IMIA working groups and personalized medicine & digital health literacy, Tze-Yun LEONG Conference Paper
Towards automatic persona generation using social media, Jisun AN, Hoyoun CHO, Haewoon KWAK, Mohammed Ziyaad HASSEN, and Bernard J JANSEN Conference Proceeding Article
Topic extraction from microblog posts using conversation structures, Jing LI, Ming LIAO, Wei GAO, Yulan HE, and Kam-Fai WONG Conference Proceeding Article
A fast algorithm for personalized travel planning recommendation, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article
A multilingual semi-supervised approach in deriving Singlish sentic patterns for polarity detection, Siaw Ling LO, Erik CAMBRIA, Raymond CHIONG, and David CORNFORTH Journal Article
API recommendation system for software development, FERDIAN THUNG Conference Proceeding Article
Code comment quality analysis and improvement recommendation: An automated approach, Xiaobing SUN, Qiang GENG, David LO, Yucong DUAN, Xiangyue LIU, and LI Bin Journal Article
CoMon+: A Cooperative Context Monitoring System for Multi-Device Personal Sensing Environments, Youngki LEE, Seungwoo KANG, Chulhong MIN, Younghyun JU, Inseok HWANG, and Junehwa SONG Journal Article
Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice, Weizhi MENG, Xiapu LUO, Wenjuan LI, and Yan LI Conference Proceeding Article
Detecting communities using coordination games: A short paper, Radhika ARAVA and Pradeep VARAKANTHAM Conference Proceeding Article
Enhancing local search with adaptive operator ordering and its application to the time dependent orienteering problem, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article
Extending the network: The influence of offline friendship on Twitter network, Young Soo KIM, Kyungsub Stephen CHOI, and FELICIA NATALI Conference Proceeding Article
Fine-grained appliance usage and energy monitoring through mobile and power-line sensing, Nirmalya ROY, Nilavra PATHAK, and Archan MISRA Journal Article
Intermediaries vs Peer-to-Peer: A Study of Lenders’ Incentive on a Donation-based Crowdfunding Platform, Ling GE, Zhiling GUO, and Xuechen LUO Conference Proceeding Article
New developments in metaheuristics and their applications: Selected extended contributions from the 10th Metaheuristics International Conference (MIC 2013), Hoong Chuin LAU, Günther R. Raidl, and Pascal Van Hentenryck Editorial
Probabilistic Robust Route Recovery with Spatio-Temporal Dynamics, Hao WU, Jiangyun MAO, Weiwei SUN, Baihua ZHENG, Hanyuan ZHANG, Ziyang CHEN, and Wei WANG Conference Proceeding Article
Revocable and decentralized attribute-based encryption, Hui CUI and DENG, Robert H. Journal Article
SafeGPU: Contract- and library-based GPGPU for object-oriented languages, Alexey KOLESNICHENKO, Christopher M. POSKITT, and Sebastian NANZ Journal Article
Social sentiment and stock trading via mobile phones, Kwansoo KIM, Sang Yong LEE, and Robert John KAUFFMAN Conference Proceeding Article
TafLoc: Time-adaptive and fine-grained device-free localization with little cost, Liqiong CHANG, Jie XIONG, Xiaojiang CHEN, Ju WANG, Junhao HU, and Wei WANG Conference Proceeding Article
TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee-Peng LIM, and Ke WANG Journal Article
Understanding patient portal use intentions: Enablers and inhibitors of IT use, M. MOQBEL, Fiona Fui-hoon NAH, V. BARTELT, and R. O’DELL Conference Proceeding Article
Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval, Liang XIE, Lei ZHU, and Guoqi CHEN Journal Article
User Identity Linkage by Latent User Space Modelling, Xin MU, Feida ZHU, Ee-Peng LIM, Jing XIAO, Jianzong WANG, and Zhi-Hua ZHOU Conference Proceeding Article
Landscape synergy in evolutionary multitasking, Abhishek GUPTA, Yew Soon ONG, B. DA, Handoko Stephanus Daniel, and Stephanus D. HANDOKO Conference Proceeding Article
The retransmission of rumor-related tweets: Characteristics of source and message, Alton Y. K. CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article
The retransmission of rumor-related tweets: Characteristics of source and message, CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article
Targeted gamification to encourage and measure intrinsically motivated game-based learning, Chris BOESCH Conference Proceeding Article
A Feasible No-Root Approach on Android, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
A Learning-to-Rank Based Fault Localization Approach using Likely Invariants, Tien-Duy B. LE, David LO, Claire LE GOUES, and Lars GRUNSKE Conference Proceeding Article
An adaptability-driven model and tool for analysis of service profitability, Eng Lieh OUH and Jarzabek STAN Conference Proceeding Article
A survey on future internet security architectures, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article
Automatic hookworm detection in wireless capsule endoscopy images, Xiao WU, Honghan CHEN, Tao GAN, Junzhou CHEN, Chong-wah NGO, and Qiang PENG Journal Article
Build emotion lexicon from the mood of crowd via topic-assisted joint non-negative matrix factorization, Kaisong SONG, Wei GAO, Ling CHEN, Shi FENG, Daling WANG, and Chengqi ZHANG Conference Proceeding Article
Can Instagram posts help characterize urban micro-events?, Kasthuri JAYARAJAH and Archan MISRA Conference Proceeding Article
Cross-Modal Self-Taught Hashing for large-scale image retrieval, Liang XIE, Lei ZHU, Peng PAN, and Yansheng LU Journal Article
Detecting rumors from microblogs with recurrent neural networks, Jing MA, Wei GAO, Prasenjit MITRA, Sejeong KWON, Bernard J. JANSEN, Kam-Fai WONG, and Meeyoung CHA Conference Proceeding Article
Edit distance based encryption and its application, Tran Viet Xuan PHUONG, Guomin YANG, Willy SUSILO, and Kaitai LIANG Conference Proceeding Article
Fine-grained detection of programming students’ frustration using keystrokes, mouse clicks and interaction logs, Hua Leong FWA Journal Article
From offline to online: How health insurance policies drive the demand for online healthcare service?, Yue YU, Qiu-Yan MEI, and QIU-HONG WANG Conference Proceeding Article
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security, Kai HE; Jian WENG; Man Ho AU; Yijun MAO; and DENG, Robert H. Conference Proceeding Article
Learning compact visual representation with canonical views for robust mobile landmark search, Lei ZHU, Jialie SHEN, Xiaobai LIU, Liang XIE, and Liqiang NIE Conference Proceeding Article
Linear encryption with keyword search, Shiwei ZHANG, Guomin YANG, and Yi MU Conference Proceeding Article
On effective personalized music retrieval by exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article
On effective personalized music retrieval via exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article
One-round strong oblivious signature-based envelope, Rongmao CHEN, Yi MU, Willy SUSILO, Guomin YANG, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article
On very large scale test collection for landmark image search benchmarking, Zhiyong CHENG and Jialie SHEN Journal Article
Ordinal text quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article