Submissions from 2015
Non-intrusive robust human activity recognition for diverse age groups, Di WANG, Ah-Hwee TAN, and Daqing ZHANG Conference Proceeding Article
On neighborhood effects in location-based social networks, Thanh-Nam DOAN, Freddy Chong-Tat CHUA, and Ee-Peng LIM Conference Proceeding Article
On the unreliability of bug severity data, Yuan TIAN, Nasir ALI, David LO, and Ahmed E. HASSAN Journal Article
On top-k selection in multi-armed bandits and hidden bipartite graphs, Wei CAO, Jian LI, Yufei TAO, and Zhize LI Conference Proceeding Article
Oriented object proposals, Shengfeng HE and Rynson W. H. LAU Conference Proceeding Article
Preface IAT 2015, Ah-hwee TAN, Yuefeng LI, Ee-Peng LIM, An BO, Anita RAJA, and Sarvapali RAMCHURN Conference Proceeding Article
Preface to WI-IAT 2015 workshops and demo/posters, Ah-hwee TAN and Yuefeng LI Conference Proceeding Article
Preface: WI 2015, Ah-Hwee TAN, Yuefeng LI, Ee-peng LIM, Jie ZHANG, Dell ZHANG, and Julita VASSILEVA Conference Proceeding Article
Progressive sequence matching for ADL plan recommendation, Shan GAO, Di WANG, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article
Robust execution strategies for project scheduling with unreliable resources and stochastic durations, Na FU, Hoong Chuin LAU, and Pradeep VARAKANTHAM Journal Article
Silver assistants for aging-in-place, Di WANG, Budhitama SUBAGDJA, Yilin KANG, and Ah-hwee TAN Conference Proceeding Article
SuperCNN: A superpixelwise convolutional neural network for salient object detection, Shengfeng HE, Rynson W.H. LAU, Wenxi LIU, Zhe HUANG, and Qingxiong YANG Journal Article
R2FP: Rich and robust feature pooling for mining visual data, Wei XIONG, Bo DU, Lefei ZHANG, Ruimin HU, Wei BIAN, Jialie SHEN, and Dacheng TAO Conference Proceeding Article
An adaptive Markov strategy for effective network intrusion detection, Jianye HAO, Yinxing XUE, Mahinthan CHANDRAMOHAN, Yang LIU, and Jun SUN Conference Proceeding Article
Online Portfolio Selection: Principles and Algorithms, Bin LI and Steven C. H. HOI Book
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities, Julian THOME, Lwin Khin SHAR, and Lionel BRIAND Conference Proceeding Article
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection, Pinghai YUAN, Qingkai ZENG, and Xuhua DING Conference Proceeding Article
Online Activities in Virtual World and Money Spending in Real World, Young Soo KIM and Gwangjae JUNG Presentation
ShopMiner: Mining customer shopping behavior in physical clothing stores with passive RFIDs, Longfei SHANGGUAN, Zimu ZHOU, Xiaolong ZHENG, Lei YANG, Yunhao LIU, and Jinsong HAN Conference Proceeding Article
Analysis of Aspects and Star Ratings in Consumer Reviews, Maruthi PRITHIVIRAJAN, Vivian LAI, and Kyong Jin SHIM Conference Proceeding Article
A Passive Testing Approach for Protocols in Wireless Sensor Networks, Xiaoping CHE, Stephane MAAG, Hwee Xian TAN, Hwee-Pink TAN, and Zhangbing ZHOU Journal Article
Automating the performance deviation analysis for multiple system releases: An evolutionary study, Felipe PINTO, Uirá KULESZA, and Christoph TREUDE Conference Proceeding Article
Challenges in analyzing software documentation in Portuguese, Christoph TREUDE, Carlos A. PROLO, and Fernando FIGUEIRA FILHO Conference Proceeding Article
CNL: Collective Network Linkage across heterogeneous social platforms, Ming GAO, Ee-peng LIM, David LO, Feida ZHU, Philips Kokoh PRASETYO, and Aoying ZHOU Conference Proceeding Article
CodeHow: Effective Code Search Based on API Understanding and Extended Boolean Model (E), Fei LV, Jian-guang LOU, Shaowei WANG, Dongmei ZHANG, and Jainjun ZHAO Conference Proceeding Article
Cost-sensitive online classification with adaptive regularization and its applications, Peilin ZHAO; Furen ZHUANG; Min WU; Xiao-Li LI; and HOI, Steven C. H. Conference Proceeding Article
Deep multimodal learning for affective analysis and retrieval, Lei PANG, Shiai ZHU, and Chong-wah NGO Journal Article
Dictionary Pair Learning on Grassmann Manifolds for Image Denoising, Xianhua ZENG, Wei BIAN, Wei LIU, Jialie SHEN, and Dacheng TAO Journal Article
Direct or indirect match? Selecting right concepts for zero-example case, Yi-Jie LU, Maaike DE BOER, Hao ZHANG, Klamer SCHUTTE, Wessel KRAAIJ, and Chong-wah NGO Conference Paper
Event detection in wireless sensor networks in random spatial sensors deployments, Pengfei ZHANG, Ido NEVAT, Gareth W. PETERS, Gaoxi XIAO, and Hwee-Pink TAN Journal Article
Experience report: An industrial experience report on test outsourcing practices, Xin XIA, David LO, Pavneet Singh KOCHHAR, Zhenchang XING, Xinyu WANG, and Shanping LI Conference Proceeding Article
Human action recognition in unconstrained videos by explicit motion modeling, Yu-Gang JIANG, Qi DAI, Wei LIU, Xiangyang XUE, and Chong-wah NGO Journal Article
IntelligShop: Enabling intelligent shopping in malls through location-based augmented reality, Aditi ADHIKARI, Vincent W. ZHENG, Hong CAO, Miao LIN, Yuan FANG, and Kevin Chen-Chuan CHANG Conference Proceeding Article
Interpolation guided compositional verification, Shang-Wei LIN, Jun SUN, Truong Khanh NGUYEN, Yang LIU, and Jin Song DONG Conference Proceeding Article
LeSiNN: Detecting anomalies by Identifying least similar nearest neighbours, Guansong PANG, Kai Ming TING, and David ALBRECHT Conference Proceeding Article
Modelling cascades over time in microblogs, Xie WEI, Feida ZHU, Siyuan LIU, and Ke WANG Conference Proceeding Article
Multimedia event detection: Strong by integration, Hao ZHANG, Maaike DE BOER, Yi-Jie LU, Klamer SCHUTTE, Chong-wah NGO, and Chong-Wah NGO Conference Paper
Not all trips are equal: Analyzing foursquare check-ins of trips and city visitors, Wen Haw CHONG, Bingtian DAI, and Ee Peng LIM Conference Proceeding Article
Performance improvement techniques for geospatial web services in a cyberinfrastructure environment - A case study with a disaster management portal, Wenwen LI, Miaomiao SONG, Bin ZHOU, Kai CAO, and Song GAO Journal Article
PowerForecaster: Predicting Smartphone Power Impact of Continuous Sensing Applications at Pre-installation Time, Chulhong MIN, Youngki LEE, Chungkuk YOO, Seungwoo KANG, Sangwon CHOI, Pillsoon PARK, Inseok HWANG, Younghyun JU, Seungpyo CHOI, and Junehwa SONG Conference Proceeding Article
Real-time Detection of Seat Occupancy and Hogging, Huy Hoang NGUYEN, Nakul GULATI, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article
Security and privacy of electronic health information systems: Editorial, Elisa BERTINO, Robert H. DENG, Xinyi HUANG, and Jianying ZHOU Editorial
Should fixing these failures be delegated to automated program repair?, LE DINH XUAN BACH, LE BUI TIEN DUY, and David LO Conference Proceeding Article
Stack Layout Randomization with Minimal Rewriting of Android Binaries, Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin GAO, Guojun Peng, Chunfu Jia, and Huanguo Zhang Conference Proceeding Article
Vireo-Tno @ TRECVID 2015: Multimedia event detection, Hao ZHANG, Yi-Jie LU, Maaike DE BOER, Frank TER HAAR, Zhaofan QIU, Klamer SCHUTTE, Wessel KRAAIJ, and Chong-Wah NGO Conference Paper
Where are the passengers? A Grid-Based Gaussian Mixture Model for taxi bookings, Meng-Fen CHIANG, Tuan Anh HOANG, and Ee-Peng LIM Conference Proceeding Article
Whom should we sense in 'social sensing' - analyzing which users work best for social media now-casting, Jisun AN and Ingmar WEBER Journal Article
Analysis of Star Ratings in Consumer Reviews: A Case Study of Yelp, M Prithivirajan, V Lai, Kyong Jin SHIM, and P.S Koo Conference Proceeding Article
Online Advertising, Retailer Platform Openness, and Long Tail Sellers, Jianqing CHEN and Zhiling GUO Conference Paper
GLUE: A Parameter-Tuning-Free Map Updating System, Hao WU, Chuanchuan TU, Weiwei SUN, Baihua ZHENG, Hao SU, and Wei WANG Conference Proceeding Article
Agent-based modeling for developing pervasive persuasive systems, Budhitama SUBAGDJA Conference Proceeding Article
Analyzing Educational Comments for Topics and Sentiments: A Text Analytics Approach, Gokran Ila NITIN, Swapna GOTTIPATI, and Venky SHANKARARAMAN Conference Proceeding Article
An emergent model of end-users’ acceptance of enterprise resource planning systems: A grounded theory approach, Fiona Fui-hoon NAH and Xin TAN Journal Article
A note on the security of KHL scheme, Jian WENG; Yunlei ZHAO; DENG, Robert H.; Shengli LIU; Yanjiang YANG; and Kouichi SAKURAI Journal Article
Assessing developer contribution with repository mining-based metrics, Jalerson LIMA, Christoph TREUDE, Fernando FIGUEIRA FILHO, and Uirá KULESZA Conference Proceeding Article
Automated Prediction of Bug Report Priority Using Multi-Factor Analysis, Yuan TIAN, David LO, Chengnian SUN, and Xin XIA Journal Article
Choosing your weapons: On sentiment analysis tools for software engineering research, Robbert JONGELING, Subhajit DATTA, and Alexander SEREBRENIK Conference Proceeding Article
Constrained Feature Selection for Localizing Faults, Tien-Duy B. LE, David LO, and Ming LI Conference Proceeding Article
Contract-based general-purpose GPU programming, Alexey KOLESNICHENKO, Christopher M. POSKITT, Sebastian NANZ, and Bertrand MEYER Conference Proceeding Article
Density Peaks Clustering Approach for Discovering Demand Hot Spots in City-scale Taxi Fleet Dataset, Dongchang LIU, Shih-Fen CHENG, and Yiping YANG Conference Proceeding Article
Detect rumors using time series of social context information on microblogging websites, Jing MA, Wei GAO, Zhongyu WEI, Yueming LU, and Kam-Fai WONG Conference Proceeding Article
Endogenous Network Effects, Platform Pricing and Market Liquidity, Mei Lin, Ruhai Wu, and Wen Zhou Working Paper
Enhancing students' learning process through interactive digital media: New opportunities for collaborative learning, Benjamin GAN, Thomas MENKHOFF, and Richard R. SMITH Journal Article
Evaluation of chlorophyll-a retrieval algorithms based on MERIS bands for optically varying eutrophic inland lakes, Heng LYU, Xiaojun LI, Yannan WANG, Qi JIN, Kai CAO, Qiao WANG, and Yunmei LI Journal Article
Face recognition on large-scale video in the wild with hybrid Euclidean-and-Riemannian metric learning, Zhiwu HUANG, R. WANG, S. SHAN, and X CHEN Journal Article
Guest editorial: Market transformation to an IT-enabled services-oriented economy, Robert J. KAUFFMAN, Dan MA, and Byungjoon YOO Editorial
Incorporating Microblogging (“Tweeting”) in Higher Education: Lessons Learnt in a Knowledge Management Course, Thomas Menkhoff, Yue Wah CHUA, Magnus L. Bengtsson, C. Jason WOODARD, and Benjamin GAN Journal Article
Inferring door locations from a teammate's trajectory in stealth human-robot team operations, Jean OH, Arne SUPPE, Arne SUPPE, Anthony STENTZ, and Martial HEBERT Conference Proceeding Article
Innovations in financial IS and technology ecosystems: High-frequency trading in the equity market, Robert John KAUFFMAN, LIU JUN, and Dan MA Journal Article
Innovations in Financial IS and Technology Ecosystems: High-Frequency Trading Systems in the Equity Market, Robert J. Kauffman, Jun Liu, and Dan Ma Journal Article
Learning relative similarity from data streams: Active online learning approaches, Shuji Hao, Peilin Zhao, Steven C. H. HOI, and Chunyan Miao Conference Proceeding Article
Mood self-assessment on smartphones, Le Minh KHUE, Eng Lieh OUH, and Stan JARZABEK Conference Proceeding Article
On Robust Image Spam Filtering via Comprehensive Visual Modeling, Jialie SHEN; DENG, Robert H.; Zhiyong CHENG; Liqiang NIE; and Shuicheng YAN Journal Article
Pricing Strategy for Cloud Computing: A Damaged Services Perspective., Jianhui HUANG, Robert John KAUFFMAN, and Dan MA Journal Article
Privacy in crowdsourced platforms, Thivya KANDAPPU, Arik Friedman, Vijay Sivaraman, and Roksana Boreli Book Chapter
Scheduled approximation for Personalized PageRank with Utility-based hub selection, Fanwei ZHU, Yuan FANG, Kevin Chen-Chuan CHANG, and Jing YING Journal Article
Seeing your Face is not Enough: An Inertial Sensor-based Liveness Detection for Face Authentication, Yan Li, Yingjiu LI, Qiang YAN, Hancong KONG, and Robert H. DENG Conference Proceeding Article
SHINESeniors: Personalized Services for Active Ageing-in-Place, Liming BAI, Alex I. GAVINO, Wei Qi LEE, Jungyoon KIM, Na LIU, Hwee-Pink TAN, Hwee Xian TAN, Lee Buay TAN, Xiaoping TOH, Alvin Cerdena VALERA, Elina Jia YU, Alfred WU, and Mark S. FOX Conference Proceeding Article
Should I follow this fault localization tool's output? Automated prediction of fault localization effectiveness, Tien-Duy B. LE, David LO, and Ferdian THUNG Journal Article
Smartphones and BLE services: Empirical insights, Meera RADHAKRISHNAN, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article
Social Signal Processing for Real-time Situational Understanding: A Vision and Approach, Kasthuri JEYARAJAH, Shuchao YAO, Raghava MUTHURAJU, Archan MISRA, Geeth DE MEL, Julie SKIPPER, Tarek ABDELZAHER, and Michael KOLODNY Conference Proceeding Article
Social tag relevance estimation via ranking-oriented neighbour voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN Conference Proceeding Article
Structural Constraints for Multipartite Entity Resolution with Markov Logic Network, Tengyuan YE and Hady W. LAUW Conference Proceeding Article
Targeted Blended Learning through Competency Assessment in an Undergraduate Information Systems Program, Joelle ELMALEH and SHANKARARAMAN, Venky Conference Proceeding Article
The importance of being isolated: An empirical study on Chromium reviews, Subhajit DATTA, Devarshi BHATT, Manish JAIN, Proshanta SARKAR, and Santonu SARKAR Conference Proceeding Article
Towards automatic generation of security-centric descriptions for Android apps, Mu ZHANG, Yue DUAN, Qian FENG, and Heng YIN Conference Proceeding Article
Two formulas for success in social media: Learning and network effects, Liangfei QIU, Qian TANG, and Andrew B. WHINSTON Journal Article
What Are the Characteristics of High-Rated Apps? A Case Study on Free Android Applications, TIAN YUAN, Meiyappan NAGAPPAN, David LO, and Ahmed E. HASSAN Conference Proceeding Article
What's Hot in Software Engineering Twitter Space?, ABHISHEK SHARMA, TIAN YUAN, and David LO Conference Proceeding Article
Who Should Review This Change? Putting Text and File Location Analyses Together for More Accurate Recommendations, Xin XIA, David LO, Xinyu WANG, and Xiaohu YANG Conference Proceeding Article
15th IEEE International Working Conference on Source Code Analysis and Manipulation, Michael W. GODFREY, David LO, and Foutse KHOMH Edited Conference Proceeding
Improving the efficiency of stochastic vehicle routing: A partial Lagrange multiplier method, Zhiguang CAO, GUO Hongliang, ZHANG Jie, NIYATO Dusit, and FASTENRATH Ulrich Journal Article
EXCITE: Exploring collaborative interaction in tracked environments, Nicolai MARQUARDT, Frederico SCHARDONG, and Anthony TANG Conference Proceeding Article
Enhancing WiFi-based localization with visual clues, Han XU, Zheng YANG, Zimu ZHOU, Longfei SHANGGUAN, Yunhao LIU, and Ke YI Conference Proceeding Article
Need accurate user behaviour? Pay attention to groups, K. JAYARAJAH, Y. LEE, Archan MISRA, and R. BALAN Conference Proceeding Article
A generalization of spatial and temporal fusion methods for remotely sensed surface parameters, Hankui K. ZHANG, Bo HUANG, Ming ZHANG, Kai CAO, and Le YU Journal Article
A Joint Model of Product Properties, Aspects and Ratings for Online Reviews, DING YING and Jing JIANG Conference Proceeding Article
Answering Why-not Questions on Reverse Top-k Queries, Yunjun GAO, Qing LIU, Gang CHEN, Baihua ZHENG, and Linlin ZHOU Conference Proceeding Article
A Rolling Horizon Auction Mechanism and Virtual Pricing of Shipping Capacity for Urban Consolidation Centers, Chen WANG, Hoong Chuin LAU, and Yun Fong LIM Conference Proceeding Article
A survey on artificial intelligence-based modeling techniques for high speed milling processes, Amin Jahromi TORABI, Meng Joo ER, Xiang LI, Beng Siong LIM, Lianyin ZHAI, Richard Jayadi OENTARYO, Gan Oon PEEN, and Jacek M. ZURADA Journal Article