The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2015

PDF

An iterated local search algorithm for solving the Orienteering Problem with Time Windows, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article

PDF

Best Upgrade Plans for Single and Multiple Source-Destination Pairs, Yimin Lin and Kyriakos MOURATIDIS Journal Article

Best Upgrade Plans for Single and Multiple Source-Destination Pairs, Yimin Lin and Kyriakos MOURATIDIS Journal Article

PDF

Chalk and cheese in Twitter: Discriminating personal and organization accounts, Richard Jayadi OENTARYO, Jia-Wei LOW, and Ee Peng LIM Conference Proceeding Article

PDF

CoFaçade: A Customizable Assistive Approach for Elders and Their Helpers, Jason Chen ZHAO, Richard Christopher DAVIS, Pin Sym FOONG, and Shengdong ZHAO Conference Proceeding Article

Link

DaVinci: Data-driven Visual Interface Construction for Subgraph Search in Graph Databases, Jinbo Zhang, Sourav Bhowmick, Hong Nguyen, Byron Choi, and Feida ZHU Conference Proceeding Article

PDF

Effect of machine translation in interlingual conversation: Lessons from a formative study, Kotaro HARA and Shamsi T. IQBAL Conference Proceeding Article

PDF

Evaluating Defect Prediction using a Massive Set of Metrics, Xiao XUAN, David LO, Xin XIA, and Yuan TIAN Conference Proceeding Article

PDF

Exploring cyberbullying and other toxic behavior in team competition online games, Haewoon KWAK, Jeremy BLACKBURN, and Seungyeop. HAN Conference Proceeding Article

PDF

Exploring discriminative features for anomaly detection in public spaces, Shriguru NAYAK, Archan MISRA, Kasthuri JEYARAJAH, Philips Kokoh PRASETYO, and Ee-peng LIM Conference Proceeding Article

PDF

High-throughput reliable multicast in multi-hop wireless mesh networks, Xin ZHAO, Jun GUO, Chun Tung CHOU, Archan MISRA, and Sanjay K. JHA Journal Article

Link

Leakage Resilient Password Systems, Yingjiu LI, Qiang YAN, and Robert H. DENG Book

PDF

Markov decision processes with applications in wireless sensor networks: A survey, Abu Mohammad ALSHEIKH, Dinh Thai HOANG, Dusit NIYATO, and Hwee-Pink TAN Journal Article

PDF

Maximizing lifetime in clustered WSNs with energy harvesting relay: Profiling and modeling, Pengfei ZHANG, Hwee-Pink TAN, Gaoxi XIAO, and Yi YU Conference Proceeding Article

PDF

Measuring user influence, susceptibility and cynicalness in sentiment diffusion, Roy Ka-Wei LEE and Ee Peng LIM Conference Proceeding Article

PDF

Memory dynamics in attractor networks, Guoqi LI, Kiruthika RAMANATHAN, Ning NING, Luping SHI, and Changyun WEN Journal Article

PDF

Mining Business Competitiveness from User Visitation Data, DOAN THANH NAM, Freddy Chong Tat CHUA, and Ee-peng LIM Conference Proceeding Article

PDF

Mobility increases localizability: A survey on wireless indoor localization using inertial sensors, Zheng YANG, Chenshu WU, Zimu ZHOU, Xinglin ZHANG, Xu WANG, and Yunhao LIY Journal Article

PDF

Multi-roles affiliation model for general user profiling, Lizi LIAO, Heyan HUANG, and Yashen WANG Conference Proceeding Article

Link

On Product-level Uncertainty and Online Purchase Behaviour: An Empirical Analysis, Youngsoo KIM and Ramayya Krishnan Journal Article

PDF

Physio@Home: Exploring visual guidance and feedback techniques for physiotherapy exercises, Richard TANG, Xing-Dong YANG, Scott BATEMAN, Joaquim JORGE, and Anthony TANG Conference Proceeding Article

Link

Preserving Privacy in Social Networks Against Connection Fingerprint Attacks, Yazhe WANG and Baihua ZHENG Conference Proceeding Article

PDF

QueueVadis: Queuing analytics using smartphones, Tadashi OKOSHIi, Lu YU, Chetna VIG, Youngki LEE, Rajesh Krishna BALAN, and Archan MISRA Conference Proceeding Article

Review Selection Using Micro-Reviews, Thanh-Son NGUYEN, Hady Wirawan LAUW, and Panayiotis TSAPARAS Journal Article

PDF

Review Selection Using Micro-Reviews, Thanh-Son NGUYEN, Hady W. LAUW, and Panayiotis TSAPARAS Journal Article

PDF

Sensorem – An efficient mobile platform for wireless sensor network visualization, Jin Ming KOH, Marcus SAK, Hwee Xian TAN, Huiguang LIANG, Fachmin FOLIANTO, and Tony QUEK Conference Paper

PDF

Software Watermarking using Return-Oriented Programming, Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, and Debin GAO Conference Proceeding Article

PDF

Students’ Perspectives on Flipped Classroom Implementation in Higher Education, Joelle ELMALEH and Nachamma SOCKALINGAM Conference Paper

PDF

Understanding the Test Automation Culture of App Developers, Pavneet Singh KOCHHAR, Ferdian. THUNG, Nachiappan NAGAPPAN, Thomas ZIMMERMANN, and David LO Conference Proceeding Article

PDF

Using support vector machine ensembles for target audience classification on Twitter, Siaw Ling LO, Raymond CHIONG, and David CORNFORTH Journal Article

Beyond support and confidence: Exploring interestingness measures for rule-based specification mining, LE BUI TIEN DUY and David LO

Cross-Project Build Co-change Prediction, Xin XIA, David LO, Shane MCINTOSH, Emad SHIHAB, and Ahmed HASSAN Conference Proceeding Article

Modeling the Evolution of Development Topics Using Dynamic Topic Models, Jianjun HU, Xiaobing SUN, David LO, and Bin LI Conference Proceeding Article

Query Expansion via Wordnet for Effective Code Search, Meili LU, Xiaobing SUN, Shaowei WANG, David LO, and Yucong DUAN Conference Proceeding Article

Dual Analysis for Recommending Developers to Resolve Bugs, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Journal Article

PDF

A conceptual model to evaluate decisions for service profitability, Eng Lieh OUH and Stan JARZABEK Conference Proceeding Article

PDF

Beyond Support and Confidence: Exploring Interestingness Measures for Rule-based Specification Mining, Bui Tien Duy LE and David LO Conference Proceeding Article

PDF

Click-boosting multi-modality graph-based reranking for image search, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Chong-wah NGO, and Tao MEI Journal Article

PDF

Code Coverage and Test Suite Effectiveness: Empirical Study with Real Bugs in Large Systems, PAVNEET SINGH KOCHHAR, FERDIAN THUNG, and David LO Conference Proceeding Article

PDF

Improving public transit accessibility for blind riders by crowdsourcing bus stop landmark locations with Google street view: An extended analysis, Kotaro HARA, Shiri AZENKOT, Megan CAMPBELL, Cynthia L. BENNETT, Vicki LE, Sean PANNELLA, Robert MOORE, Kelly MINCKLER, Rochelle H. NG, and Jon E. FROEHLICH Journal Article

PDF

Joint search by social and spatial proximity, Kyriakos MOURATIDIS, Jing LI, Yu TANG, and Nikos MAMOULIS Journal Article

Joint Search by Social and Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, and Nikos Mamoulis Journal Article

PDF

Managing technical debt: Insights from recent empirical evidence, Narayan RAMASUBBU, Chris F. KEMERER, and C. Jason WOODARD Journal Article

Measuring User Influence, Susceptibility and Cynicalness in Sentiment Diffusion, Roy Ka Wei Lee and Ee Peng LIM Conference Paper

PDF

NIRMAL: Automatic Identification of Software Relevant Tweets Leveraging Language Model, Abishek SHARMA, Yuan TIAN, and David LO Conference Proceeding Article

PDF

On Efficient k-optimal-location-selection Query Processing in Metric Spaces, Yunjun GAO, Shuyao QI, Lu CHEN, Baihua ZHENG, and Xinhan LI Journal Article

PDF

Personal visualization and personal visual analytics, Dandan HUANG, Melanie TORY, Bon Adriel ASENIERO, Lyn BARTRAM, Scott BATEMAN, Sheelagh CARPEDALE, Anthony TANG, and Robert WOODBURY Journal Article

PDF

Prediction of venues in foursquare using flipped topic models, Wen Haw CHONG, Bing Tian DAI, and Ee Peng LIM Conference Proceeding Article

PDF

Privacy leakage analysis in online social networks, Yan LI; Yingjiu LI; Qiang YAN; and DENG, Robert H. Journal Article

PDF

Project Sourcing for Capstone Course Experience from an Undergraduate Program, Benjamin GAN and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Reconstruction privacy: Enabling statistical learning, Ke Wang, Chao HAN, Ada Waichee FU, Raymond C. WONG, and Philip S. YU Conference Proceeding Article

Link

Scalable and Personalized Blended Learning for Software Education, BOESCH, Chris and Sandra BOESCH Book Chapter

PDF

The Case for Smartwatch-based Diet Monitoring, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

Towards Sustainable, Green Growth [Podcast@SMU], Kar Way TAN Video

PDF

Understanding natural disasters as risks in supply chain management through web data analysis, Jimmy ONG, Zhaoxia WANG, Rick Siow Mong GOH, Xiao Feng YIN, Xin XIN, and Xiuju FU Journal Article

PDF

Using infrastructure-provided context filters for efficient fine-grained activity sensing, Vigneshwaran SUBBARAJU, Sougata SEN, Archan MISRA, Satyadip CHAKRABORTY, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Sensorless sensing with WiFi, Zimu ZHOU, Chenshu WU, Zheng YANG, and Yunhao LIU Journal Article

PDF

Analysis and improvement on a biometric-based remote user authentication scheme using smart cards, Fengtong WEN, Willy SUSILO, and Guomin YANG Journal Article

PDF

Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption, Rasekhar BHAGAVATULA, Blase UR, Kevin IACOVINO, Su Mon KYWE, Lorrie Faith CRANOR, and Marios SAVVIDES Conference Proceeding Article

PDF

Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge, Liqiang NIE, Yiliang ZHAO, Akbari Mohammad, Jialie SHEN, and Tat-Seng CHUA Journal Article

DICSA: Distributed and Concurrent Link Scheduling Algorithm for Data Gathering in Wireless Sensor Networks, Behnam DEZFOULI, Marjan RADI, Kamin WHITEHOUSE, Shukor ABD RAZAK, and Hwee-Pink TAN Journal Article

PDF

Leakage-resilient password entry: Challenges, design, and evaluation, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Journal Article

PDF

On Processing Reverse k-skyband and Ranked Reverse Skyline Queries, Yunjun GAO, Qing LIU, Baihua ZHENG, Mou LI, Gang CHEN, and Qing LI Journal Article

PDF

PrivacyCanary: Privacy-aware recommenders with adaptive input obfuscation, Thivya KANDAPPU, Arik FRIEDMAN, Roksan BORELLI, and Vijay SIVARAMAN Conference Proceeding Article

PDF

Review Synthesis for Micro-Review Summarization, Thanh-Son Nguyen, Hady W. LAUW, and Panayiotis TSAPARAS Conference Proceeding Article

PDF

SimApp: A framework for detecting similar mobile applications by online kernel learning, Ning CHEN, Steven C. H. HOI, Shaohua LI, and Xiaokui XIAO Conference Proceeding Article

PDF

Use of a high-value social audience index for target audience identification on Twitter, Siaw Ling LO, David CORNFORTH, and Raymond. CHIONG Conference Proceeding Article

PDF

Will this be quick? A case study of bug resolution times across industrial projects, Subhajit DATTA and Prasanth LADE Conference Proceeding Article

PDF

Adaptive duty cycling in sensor networks with energy harvesting using continuous-time markov chain and fluid models, Wai Hong Ronald CHAN, Pengfei ZHANG, Ido NEVAT, Sai Ganesh NAGARAJAN, Alvin C. VALERA, Hwee Xian TAN, and Natarajan GAUTAM Journal Article

PDF

Algorithm Selection via Ranking, Jayadi Oentaryo Richard, Handoko Stephanus Daniel, and Hoong Chuin LAU Conference Proceeding Article

PDF

Ambiguous optimistic fair exchange: Definition and constructions, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article

PDF

An adaptive gradient method for online AUC maximization, Yi DING, Peilin ZHAO, Steven C. H. HOI, and Yew-Soon ONG Conference Proceeding Article

PDF

Are features equally representative? A feature-centric recommendation, Chenyi ZHANG, Ke WANG, Ee-peng LIM, Qinneng XU, Jianling SUN, and Hongkun YU Conference Proceeding Article

PDF

A systematic study on explicit-state non-zenoness checking for timed automata, Ting WANG, Jun SUN, Xinyu WANG, Yang LIU, Yuanjie SI, Jin Song DONG, Xiaohu YANG, and Xiaohong LI Journal Article

PDF

Automatic, high accuracy prediction of reopened bugs, Xin Xia, David LO, Emad Shihab, Xinyu Wang, and Bo Zhou Journal Article

Business Modeling with Spreadsheets: Problems, Principles and Practice - 3rd ed, Thin Yin LEONG and Michelle L. F. CHEONG Book

PDF

Ciphercard: A token-based approach against camera-based shoulder surfing attacks on common touchscreen devices, Teddy SEYED, Xing-Dong YANG, Anthony TANG, Saul GREENBERG, Jiawei GU, Bin ZHU, and Xiang CIAO Conference Proceeding Article

PDF

Community discovery from social media by low-rank matrix recovery, Jinfeng ZHUANG, Mei TAO, Steven C. H. HOI, Xian-Sheng HUA, and Yongdong ZHANG Journal Article

Link

Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG and Junyu CHOY Book Chapter

PDF

Designing a portfolio of parameter configurations for online algorithm selection, Aldy GUNAWAN, Hoong Chuin LAU, and Mustafa MISIR Conference Proceeding Article

PDF

Improving Internet Security through Mandatory Information Disclosure, Qian TANG and Andrew B. WHINSTON Conference Proceeding Article

PDF

Improving Software Quality and Productivity Leveraging Mining Techniques: [Summary of the Second Workshop on Software Mining, at ASE 2013], Ming LI, Hongyu ZHANG, David LO, and Lucia Lucia Magazine Article

PDF

Integrated intelligence for human-robot teams, Jean OH and et. al. Conference Proceeding Article

Intelligent polar cyberinfrastructure: enabling semantic search in geospatial metadata catalogue to support polar data discovery, Wenwen LI, Vidit BHATIA, and Kai CAO Journal Article

PDF

Low effort crowdsourcing: Leveraging peripheral attention for crowd work, Vaish RAJAN, Peter ORGANISCIAK, Kotaro HARA, Jeffrey P. BIGHAM, and Haoqi ZHANG Conference Poster

PDF

Mechanism Design for Near Real-Time Retail Payment and Settlement Systems, Zhiling GUO, Robert John KAUFFMAN, Mei LIN, and Dan MA Conference Proceeding Article

PDF

Modeling neuromorphic persistent firing networks, Ning NING, Guoqi LI, Wei HE, Kejie HUANG, Li PAN, Kiruthika RAMANATHAN, Rong ZHAO, and Luping SHI Journal Article

PDF

Multidimensional context awareness in mobile devices, Zhuo WEI, Robert H. DENG, Jialie SHEN, Jixiang ZHU, Kun OUYANG, and Yongdong WU Conference Proceeding Article

PDF

Multi-user multiple input multiple output (MIMO) communication with distributed antenna systems in wireless networks, Karthikeyan SUNDARESAN, Mohammad KHOJASTEPOUR, Sampath RANGARAJAN, and Jie XIONG Patent

On the Financification of Cloud Computing: An Agenda for Pricing and Service Delivery Mechanism Design Research, Robert John KAUFFMAN, Dan MA, Richard Shang, Jianhui Huang, and Yinping Yang Journal Article

On the Financification of Cloud Computing: An Agenda for Pricing and Service Delivery Mechanism Design Research, Robert John KAUFFMAN, Dan MA, Richard Shang, Jianhui Huang, and Yinping Yang Journal Article

Pricing Strategy for Cloud Computing: a Damaged Services Perspective, Jianhui Huang, Robert John KAUFFMAN, and Dan MA Journal Article

Pricing Strategy for Cloud Computing: A Damaged Services Perspective, Jianhui HUANG, Robert John KAUFFMAN, and Dan MA Journal Article

PDF

Push or Pull? A Website's Strategic Choice of Content Delivery Mechanism, Dan MA Journal Article

PDF

Recovering Household Preferences for Digital Entertainment, Jin LI, Zhiling GUO, and Robert J. KAUFFMAN Conference Proceeding Article

PDF

ReputationPro: The efficient approaches to contextual transaction trust computation in e-commerce environments, Haibin ZHANG, Yan WANG, Xiuzhen ZHANG, and Ee Peng LIM Journal Article

PDF

Risk based Optimization for Improving Emergency Medical Systems, Sandhya SAISUBRAMANIAN, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article

PDF

Saliency-Guided Color-to-Gray Conversion Using Region-Based Optimization, Hao DU, Shengfeng HE, Bin SHENG, Lizhuang MA, and Rynson W.H. LAU Journal Article

PDF

Semi-universal portfolios with transaction costs, Dingjiang HUANG, Yan ZHU, Bin LI, Shuigeng ZHOU, and Steven C. H. HOI Conference Proceeding Article

PDF

Software puzzle: A countermeasure to resource-inflated denial-of-service attacks, Yongdong WU, Zhigang ZHAO, Bao FENG, and Robert H. DENG Journal Article