The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2015

Query Expansion via Wordnet for Effective Code Search, Meili LU, Xiaobing SUN, Shaowei WANG, David LO, and Yucong DUAN Conference Proceeding Article

Dual Analysis for Recommending Developers to Resolve Bugs, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Journal Article

PDF

A conceptual model to evaluate decisions for service profitability, Eng Lieh OUH and Stan JARZABEK Conference Proceeding Article

PDF

Beyond Support and Confidence: Exploring Interestingness Measures for Rule-based Specification Mining, Bui Tien Duy LE and David LO Conference Proceeding Article

PDF

Click-boosting multi-modality graph-based reranking for image search, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Chong-wah NGO, and Tao MEI Journal Article

PDF

Code Coverage and Test Suite Effectiveness: Empirical Study with Real Bugs in Large Systems, PAVNEET SINGH KOCHHAR, FERDIAN THUNG, and David LO Conference Proceeding Article

PDF

Improving public transit accessibility for blind riders by crowdsourcing bus stop landmark locations with Google street view: An extended analysis, Kotaro HARA, Shiri AZENKOT, Megan CAMPBELL, Cynthia L. BENNETT, Vicki LE, Sean PANNELLA, Robert MOORE, Kelly MINCKLER, Rochelle H. NG, and Jon E. FROEHLICH Journal Article

Joint Search by Social and Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, and Nikos Mamoulis Journal Article

PDF

Joint search by social and spatial proximity, Kyriakos MOURATIDIS, Jing LI, Yu TANG, and Nikos MAMOULIS Journal Article

PDF

Managing technical debt: Insights from recent empirical evidence, Narayan RAMASUBBU, Chris F. KEMERER, and C. Jason WOODARD Journal Article

Measuring User Influence, Susceptibility and Cynicalness in Sentiment Diffusion, Roy Ka Wei Lee and Ee Peng LIM Conference Paper

PDF

NIRMAL: Automatic Identification of Software Relevant Tweets Leveraging Language Model, Abishek SHARMA, Yuan TIAN, and David LO Conference Proceeding Article

PDF

On Efficient k-optimal-location-selection Query Processing in Metric Spaces, Yunjun GAO, Shuyao QI, Lu CHEN, Baihua ZHENG, and Xinhan LI Journal Article

PDF

Personal visualization and personal visual analytics, Dandan HUANG, Melanie TORY, Bon Adriel ASENIERO, Lyn BARTRAM, Scott BATEMAN, Sheelagh CARPEDALE, Anthony TANG, and Robert WOODBURY Journal Article

PDF

Prediction of venues in foursquare using flipped topic models, Wen Haw CHONG, Bing Tian DAI, and Ee Peng LIM Conference Proceeding Article

PDF

Privacy leakage analysis in online social networks, Yan LI; Yingjiu LI; Qiang YAN; and DENG, Robert H. Journal Article

PDF

Project Sourcing for Capstone Course Experience from an Undergraduate Program, Benjamin GAN and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Reconstruction privacy: Enabling statistical learning, Ke Wang, Chao HAN, Ada Waichee FU, Raymond C. WONG, and Philip S. YU Conference Proceeding Article

Link

Scalable and Personalized Blended Learning for Software Education, BOESCH, Chris and Sandra BOESCH Book Chapter

PDF

The Case for Smartwatch-based Diet Monitoring, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

Towards Sustainable, Green Growth [Podcast@SMU], Kar Way TAN Video

PDF

Understanding natural disasters as risks in supply chain management through web data analysis, Jimmy ONG, Zhaoxia WANG, Rick Siow Mong GOH, Xiao Feng YIN, Xin XIN, and Xiuju FU Journal Article

PDF

Using infrastructure-provided context filters for efficient fine-grained activity sensing, Vigneshwaran SUBBARAJU, Sougata SEN, Archan MISRA, Satyadip CHAKRABORTY, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Sensorless sensing with WiFi, Zimu ZHOU, Chenshu WU, Zheng YANG, and Yunhao LIU Journal Article

PDF

Analysis and improvement on a biometric-based remote user authentication scheme using smart cards, Fengtong WEN, Willy SUSILO, and Guomin YANG Journal Article

PDF

Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption, Rasekhar BHAGAVATULA, Blase UR, Kevin IACOVINO, Su Mon KYWE, Lorrie Faith CRANOR, and Marios SAVVIDES Conference Proceeding Article

PDF

Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge, Liqiang NIE, Yiliang ZHAO, Akbari Mohammad, Jialie SHEN, and Tat-Seng CHUA Journal Article

DICSA: Distributed and Concurrent Link Scheduling Algorithm for Data Gathering in Wireless Sensor Networks, Behnam DEZFOULI, Marjan RADI, Kamin WHITEHOUSE, Shukor ABD RAZAK, and Hwee-Pink TAN Journal Article

PDF

Leakage-resilient password entry: Challenges, design, and evaluation, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Journal Article

PDF

On Processing Reverse k-skyband and Ranked Reverse Skyline Queries, Yunjun GAO, Qing LIU, Baihua ZHENG, Mou LI, Gang CHEN, and Qing LI Journal Article

PDF

PrivacyCanary: Privacy-aware recommenders with adaptive input obfuscation, Thivya KANDAPPU, Arik FRIEDMAN, Roksan BORELLI, and Vijay SIVARAMAN Conference Proceeding Article

PDF

Review Synthesis for Micro-Review Summarization, Thanh-Son Nguyen, Hady W. LAUW, and Panayiotis TSAPARAS Conference Proceeding Article

PDF

SimApp: A framework for detecting similar mobile applications by online kernel learning, Ning CHEN, Steven C. H. HOI, Shaohua LI, and Xiaokui XIAO Conference Proceeding Article

PDF

Use of a high-value social audience index for target audience identification on Twitter, Siaw Ling LO, David CORNFORTH, and Raymond. CHIONG Conference Proceeding Article

PDF

Will this be quick? A case study of bug resolution times across industrial projects, Subhajit DATTA and Prasanth LADE Conference Proceeding Article

PDF

Adaptive duty cycling in sensor networks with energy harvesting using continuous-time markov chain and fluid models, Wai Hong Ronald CHAN, Pengfei ZHANG, Ido NEVAT, Sai Ganesh NAGARAJAN, Alvin C. VALERA, Hwee Xian TAN, and Natarajan GAUTAM Journal Article

PDF

Algorithm Selection via Ranking, Jayadi Oentaryo Richard, Handoko Stephanus Daniel, and Hoong Chuin LAU Conference Proceeding Article

PDF

Ambiguous optimistic fair exchange: Definition and constructions, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article

PDF

An adaptive gradient method for online AUC maximization, Yi DING, Peilin ZHAO, Steven C. H. HOI, and Yew-Soon ONG Conference Proceeding Article

PDF

Are features equally representative? A feature-centric recommendation, Chenyi ZHANG, Ke WANG, Ee-peng LIM, Qinneng XU, Jianling SUN, and Hongkun YU Conference Proceeding Article

PDF

A systematic study on explicit-state non-zenoness checking for timed automata, Ting WANG, Jun SUN, Xinyu WANG, Yang LIU, Yuanjie SI, Jin Song DONG, Xiaohu YANG, and Xiaohong LI Journal Article

PDF

Automatic, high accuracy prediction of reopened bugs, Xin Xia, David LO, Emad Shihab, Xinyu Wang, and Bo Zhou Journal Article

Business Modeling with Spreadsheets: Problems, Principles and Practice - 3rd ed, Thin Yin LEONG and Michelle L. F. CHEONG Book

PDF

Ciphercard: A token-based approach against camera-based shoulder surfing attacks on common touchscreen devices, Teddy SEYED, Xing-Dong YANG, Anthony TANG, Saul GREENBERG, Jiawei GU, Bin ZHU, and Xiang CIAO Conference Proceeding Article

PDF

Community discovery from social media by low-rank matrix recovery, Jinfeng ZHUANG, Mei TAO, Steven C. H. HOI, Xian-Sheng HUA, and Yongdong ZHANG Journal Article

Link

Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG and Junyu CHOY Book Chapter

PDF

Designing a portfolio of parameter configurations for online algorithm selection, Aldy GUNAWAN, Hoong Chuin LAU, and Mustafa MISIR Conference Proceeding Article

PDF

Improving Internet Security through Mandatory Information Disclosure, Qian TANG and Andrew B. WHINSTON Conference Proceeding Article

PDF

Improving Software Quality and Productivity Leveraging Mining Techniques: [Summary of the Second Workshop on Software Mining, at ASE 2013], Ming LI, Hongyu ZHANG, David LO, and Lucia Lucia Magazine Article

PDF

Integrated intelligence for human-robot teams, Jean OH and et. al. Conference Proceeding Article

Intelligent polar cyberinfrastructure: enabling semantic search in geospatial metadata catalogue to support polar data discovery, Wenwen LI, Vidit BHATIA, and Kai CAO Journal Article

PDF

Low effort crowdsourcing: Leveraging peripheral attention for crowd work, Vaish RAJAN, Peter ORGANISCIAK, Kotaro HARA, Jeffrey P. BIGHAM, and Haoqi ZHANG Conference Poster

PDF

Mechanism Design for Near Real-Time Retail Payment and Settlement Systems, Zhiling GUO, Robert John KAUFFMAN, Mei LIN, and Dan MA Conference Proceeding Article

PDF

Modeling neuromorphic persistent firing networks, Ning NING, Guoqi LI, Wei HE, Kejie HUANG, Li PAN, Kiruthika RAMANATHAN, Rong ZHAO, and Luping SHI Journal Article

PDF

Multidimensional context awareness in mobile devices, Zhuo WEI, Robert H. DENG, Jialie SHEN, Jixiang ZHU, Kun OUYANG, and Yongdong WU Conference Proceeding Article

PDF

Multi-user multiple input multiple output (MIMO) communication with distributed antenna systems in wireless networks, Karthikeyan SUNDARESAN, Mohammad KHOJASTEPOUR, Sampath RANGARAJAN, and Jie XIONG Patent

On the Financification of Cloud Computing: An Agenda for Pricing and Service Delivery Mechanism Design Research, Robert John KAUFFMAN, Dan MA, Richard Shang, Jianhui Huang, and Yinping Yang Journal Article

On the Financification of Cloud Computing: An Agenda for Pricing and Service Delivery Mechanism Design Research, Robert John KAUFFMAN, Dan MA, Richard Shang, Jianhui Huang, and Yinping Yang Journal Article

Pricing Strategy for Cloud Computing: a Damaged Services Perspective, Jianhui Huang, Robert John KAUFFMAN, and Dan MA Journal Article

Pricing Strategy for Cloud Computing: A Damaged Services Perspective, Jianhui HUANG, Robert John KAUFFMAN, and Dan MA Journal Article

PDF

Push or Pull? A Website's Strategic Choice of Content Delivery Mechanism, Dan MA Journal Article

PDF

Recovering Household Preferences for Digital Entertainment, Jin LI, Zhiling GUO, and Robert J. KAUFFMAN Conference Proceeding Article

PDF

ReputationPro: The efficient approaches to contextual transaction trust computation in e-commerce environments, Haibin ZHANG, Yan WANG, Xiuzhen ZHANG, and Ee Peng LIM Journal Article

PDF

Risk based Optimization for Improving Emergency Medical Systems, Sandhya SAISUBRAMANIAN, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article

PDF

Saliency-Guided Color-to-Gray Conversion Using Region-Based Optimization, Hao DU, Shengfeng HE, Bin SHENG, Lizhuang MA, and Rynson W.H. LAU Journal Article

PDF

Semi-universal portfolios with transaction costs, Dingjiang HUANG, Yan ZHU, Bin LI, Shuigeng ZHOU, and Steven C. H. HOI Conference Proceeding Article

PDF

Software puzzle: A countermeasure to resource-inflated denial-of-service attacks, Yongdong WU, Zhigang ZHAO, Bao FENG, and Robert H. DENG Journal Article

PDF

Solving Uncertain MDPs with Objectives that are Separable over Instantiations of Model Uncertainty, Yossiri ADULYASAK, Pradeep VARAKANTHAM, Asrar AHMED, and Patrick JAILLET Conference Proceeding Article

PDF

Special section: Economics, electronic commerce, and competitive strategy, Eric K. CLEMONS, Rajiv M. DEWAN, and Robert John KAUFFMAN Journal Article

Technology Investment Decision-Making under Uncertainty, Robert J. Kauffman, Jun Liu, and Dan Ma Journal Article

PDF

The Knowledge Accumulation and Transfer in Open-Source Software (OSS) Development, Youngsoo KIM and Lingxiao JIANG Conference Proceeding Article

PDF

Toward mobile robots reasoning like humans, Jean OH, Arne SUPPE, Felix DUVALLET, Abdeslam BOULARIAS, Luis NAVARRO-SERMENT, Martial HEBERT, Anthony STENTZ, Jerry VINOKUROV, Oscar ROMERO, Christian LEBIERE, and Robert DEAN Conference Proceeding Article

PDF

Travel Recommendation via Author Topic Model Based Collaborative Filtering, Shuhui JIANG, Xueming QIAN, Jialie SHEN, and Tao MEI Conference Proceeding Article

Submissions from 2014

The Communication in A Social Networking Site (SNS) and Its Dynamics, Young Soo KIM Presentation

PDF

Effects of training datasets on both the extreme learning machine and support vector machine for target audience identification on twitter, Siaw Ling LO, David CORNFORTH, and Raymond CHIONG Conference Proceeding Article

PDF

Human action classification based on sequential bag-of-words model, Hong LIU, Qiaoduo ZHANG, and Qianru SUN Conference Proceeding Article

PDF

Online learning on incremental distance metric for person re-identification, Yuke SUN, Hong LIU, and Qianru SUN Conference Proceeding Article

Enhancing machine-learning methods for sentiment classification of web data, Zhaoxia WANG, Victor Joo Chuan TONG, and Hoong Chor CHIN Conference Proceeding Article

FM 2014: Formal methods: 19th international symposium, Cliff B. JONES, Pekka PIHLAJASAARI, and Jun SUN Edited Book

Link

14th IEEE International Conference on Data Mining Workshops: Proceedings: Shenzhen, China, 14 December 2014, Ming LI, Hongyu ZHANG, and David LO Edited Conference Proceeding

Link

Aligning Assessments with Competencies using Keyphrase Extraction, Venky SHANKARARAMAN and Swapna GOTTIPATI Conference Proceeding Article

PDF

A metrics suite of cloud computing adoption readiness, Robert J. KAUFFMAN, Dan MA, and Martin YU Conference Proceeding Article

Analyzing Course Competencies: What can Competencies Reveal about the Curriculum?, Swapna GOTTIPATI and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Android or iOS for Better Privacy Protection?, Jin Han, Qiang Yan, Debin GAO, Jianying Zhou, and Huijie Robert DENG Conference Paper

An Empirical Study on the Adequacy of Testing in Open Source Projects, Pavneet Singh Kochhar, Ferdian Thung, David LO, and Julia Lawall Conference Paper

PDF

An Empirical Study on the Adequacy of Testing in Open Source Projects, Pavneet Singh Kochhar, Ferdian Thung, David LO, and Julia Lawall Conference Proceeding Article

PDF

Anomaly detection through enhanced sentiment analysis on social media data, Zhaoxia WANG, Victor JOO, Chuan TONG, Xin XIN, and Hoong Chor CHIN Conference Proceeding Article

PDF

CardioGuard: A Brassiere-based Reliable ECG Monitoring Sensor System for Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki LEE, Hyunjae Baek, and Kwangsuk Park Journal Article

PDF

Detecting Camouflaged Applications on Mobile Application Markets, Mon Kywe SU, Yingjiu LI, Huijie Robert DENG, and Jason HONG Conference Proceeding Article

PDF

Detecting flow anomalies in distributed systems, Freddy Chong-Tat CHUA, Ee Peng LIM, and Bernardo HUBERMAN Conference Proceeding Article

Link

Experimenting with Gamification in the Classroom, Emanuel Grant, Venkataramanan (Venky) SHANKARARAMAN, and Jeremy Kian Loong LECK Conference Proceeding Article

PDF

Extracting Interest Tags from Twitter User Biographies, Ying DING and Jing JIANG Conference Proceeding Article

PDF

From cells to streets: Estimating mobile paths with cellular-side data, Qatar Computing Research Institute, University of Birmingham, Seattle University of Washington, and Haewoon KWAK Conference Proceeding Article

PDF

High-dimensional Data Stream Classification via Sparse Online Learning, Dayong WANG, Pengcheng WU, Peilin ZHAO, Yue WU, Chunyan MIAO, and Steven C. H. HOI Conference Proceeding Article

Link

High Utility Episode Mining Made Practical and Fast, Guangming GUO, Lei Zhang, Qi Liu, Enhong Chen, Feida ZHU, and Guan Chu Conference Proceeding Article

Link

High Utility K-anonymization for Social Network Publishing, Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C.K. LEE Journal Article

PDF

I’ve heard you have problems: Cellular signal monitoring through UE participatory sensing, Huiguang Liang, Hyong Kim, Hwee-Pink TAN, and Wai-Leong Yeow Conference Proceeding Article

Learning Analytics Applied to Curriculum Analysis, Swapna GOTTIPATI and Venky SHANKARARAMAN Conference Paper

Measuring Student Performance and Providing Feedback Using Competency Framework, Joelle DUCROT and Venky SHANKARARAMAN

PDF

Measuring Student Performance and Providing Feedback using Competency Framework, Joelle ELMALEH and Venky SHANKARARAMAN Conference Proceeding Article