Submissions from 2014
A Metrics Suite for Cloud Computing Adoption Readiness, Robert John KAUFFMAN, Dan MA, and Martin Yu Conference Paper
An Exploratory Study on Software Microblogger Behaviors, Yuan Tian and David LO Conference Proceeding Article
AnonEPC - Making the Querying User Anonymous in EPCglobal Network, Gaurang Torvekar and Yingjiu LI Conference Proceeding Article
A study of age gaps between online friends, Lizi LIAO, Jing JIANG, Ee Peng LIM, and Heyan HUANG Conference Proceeding Article
Authorized Keyword Search on Encrypted Data, Jie SHI, Junzuo Lai, Yingjiu LI, Huijie Robert DENG, and Jian Weng Conference Proceeding Article
Automatic early defects detection in use case documents, Shuang LIU, Jun SUN, Yang LIU, Yue ZHANG, Bimlesh WADHWA, Jin Song DONG, and Xinyu WANG Conference Proceeding Article
CLEar: A Real-time Online Observatory for Bursty and Viral Events, Runquan XIE, Feida ZHU, Hui MA, Wei XIE, and Chen LIN Conference Proceeding Article
Control Flow Obfuscation using Neural Network to Fight Concolic Testing, Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin GAO, and Chunfu Jia Conference Proceeding Article
CrossNavi: Enabling real-time crossroad navigation for the blind with commodity phones, Longfei SHANGGUAN, Zheng YANG, Zimu ZHOU, Xiaolong ZHENG, Chenshu WU, and Yunhao LIU Conference Proceeding Article
DupFinder: Integrated tool support for duplicate bug report detection, Ferdian THUNG, Pavneet Singh KOCHHAR, and David LO Conference Proceeding Article
Efficient Data Compression with Error Bound Guarantee in Wireless Sensor Networks, Mohammad Abu Alsheikh, P. K. Poh, S. Lin, Hwee-Pink TAN, and D. Niyato Conference Proceeding Article
Efficient hidden vector encryption with constant-size ciphertext, Tran Viet Xuan PHUONG, Guomin YANG, and Willy SUSILO Conference Proceeding Article
Efficient Reverse Top-k Boolean Spatial Keyword Queries on Road Networks, Yunjun Gao, Qing Liu, Baihua ZHENG, and Gang Chen Journal Article
Event analytics, Jin Song DONG, Jun SUN, Yang LIU, and Yuan-Fang LI Conference Proceeding Article
Exploring Variety Seeking Behavior in Mobile Users, Kasthuri JAYARAJAH, Robert J. KAUFFMAN, and Archan MISRA Conference Proceeding Article
Fusing Fault Localizers, - Lucia, David LO, and Xin XIA Conference Proceeding Article
Graph Matching by Simplified Convex-Concave Relaxation Procedure, Zhiyong LIU, Hong QIAO, Xu YANG, and Steven C. H. HOI Journal Article
High5: Promoting interpersonal hand-to-hand touch for vibrant workplace with electrodermal sensor watches, Yuhwan KIM, Seungchul LEE, Inseok HWANG, Hyunho RO, Youngki LEE, Miri MOON, and Junehwa SONG Conference Proceeding Article
Innovation in Layered Modular Architectures: Value Creation, Value Capture and the Role of Strategic Bottlenecks, Richard TEE and C. Jason WOODARD Working Paper
Interestingness-Driven Diffussion Process Summarization in Dynamic Networks, Qiang Qu, Siyuan Liu, Christian Jensen, Feida ZHU, and Christos Faloutsos Conference Proceeding Article
Linking lightweight and heavyweight systems analysis by converting service responsibility tables into UML diagrams, X. TAN, S. ALTER, and Keng SIAU Conference Proceeding Article
Name-face association in web videos: A large-scale dataset, baselines, and open issues, Zhi-Neng CHEN, Chong-wah NGO, Wei ZHANG, Juan CAO, and Yu-Gang JIANG Journal Article
Online probabilistic learning for fuzzy inference system, Richard Jayadi OENTARYO, Meng Joo ER, San LINN, and Xiang LI Journal Article
Phaser: Enabling phased array signal processing on commodity WiFi access points, Jon GJENGSET, Jie XIONG, Graeme MCPHILIPS, and Kyle JAMIESON Conference Proceeding Article
Potential Biases in Bug Localization: Do they Matter?, Pavneet Singh Kochhar, Yuan Tian, and David LO Conference Proceeding Article
PRESS: A Novel Framework of Trajectory Compression in Road Networks, Renchu SONG, Weiwei SUN, Baihua ZHENG, and Yu ZHENG Conference Proceeding Article
PrivateDroid: Private Browsing Mode for Android, SU MON KYWE, Christopher LANDIS, Yutong PEI, Justin SATTERFIELD, Yuan TIAN, and Patrick TAGUE Conference Proceeding Article
Saliency detection with flash and no-flash image pairs, Shengfeng HE and Rynson W.H. LAU Conference Proceeding Article
Sharing political news: the balancing act of intimacy and socialization in selective exposure, Jisun AN, Daniele QUERCIA, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Journal Article
Statistical Database Auditing Without Query Denial Threat, Haibing LU, Jaideep VAIDYA, Vijay ATLURI, and Yingjiu LI Journal Article
The Use of Geospatial Clustering in Analysing Health Risk Profile, Sue-Mae YEO, Tin Seong KAM, Kai Xin THIA, and Dan WU Journal Article
Towards rigorously faking bidirectional model transformations, Christopher M. POSKITT, Mike DODDS, Richard F. PAIGE, and Arend RENSINK Conference Proceeding Article
To what extent could we detect field defects? An extended empirical study of false negatives in static bug finding tools, Ferdian THUNG, Lucia Lucia, David LO, Lingxiao JIANG, Foyzur RAHMAN, and Premkumar DEVANBU Journal Article
Uncovering Embarrassing Moments in In-situ Exposure of Incoming Mobile Messages, Chulhong MIN, Saumay PUSHP, Seungchul LEE, Inseok HWANG, Youngki LEE, Seungwoo KANG, and Junehwa SONG Conference Proceeding Article
Unforgeability of an Improved Certificateless Signature Scheme in the Standard Model, Chaowen GUAN, Jian WENG, Robert H. DENG, Minrong CHEN, and Dehua ZHOU Journal Article
Verifiable Computation on Outsourced Encrypted Data, Junzuo LAI, Robert H. DENG, Hwee Hwa PANG, and Jian Weng Conference Proceeding Article
Network mining and analysis for social applications, Feida ZHU, Huan SUN, and Xifeng YAN Conference Proceeding Article
Brain informatics and health - International Conference, BIH 2014, Warsaw, Poland, August 11-14, 2014, Dominik SLEZAK, Ah-hwee TAN, James F. PETERS, and Lars SCHWABE Edited Conference Proceeding
A mathematical model and metaheuristics for Time Dependent Orienteering Problem, Aldy GUNAWAN, Zhi YUAN, and Hoong Chuin LAU Conference Proceeding Article
An Empirical Study of Off-line Configuration and On-line Adaptation in Operator Selection, Zhi YUAN, Stephanus Daniel HANDOKO, Duc Thien NGUYEN, and Hoong Chuin LAU Conference Proceeding Article
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration, Kuo-Hui YEH, Nai-Wei LO, Kuo-Yu TSAI, Yingjiu LI, and Enrico WINATA Journal Article
A palm vein identification system based on Gabor wavelet features, Ran WANG, Guoyou WANG, Zhong CHEN, Zhigang ZENG, and Yong WANG Journal Article
Automated Prediction of Glasgow Outcome Scale for Traumatic Brain Injury, Bolan SU, Thien Anh DINH, A. K. AMBASTHA, Tianxia GONG, Tomi SILANDER, Shijian LU, C. C. Tchoyoson LIM, Boon Chuan PANG, Cheng Kiang LEE, Tze-Yun LEONG, and Chew Lim TAN Conference Proceeding Article
Automatic Defect Categorization based on Fault Triggering Conditions, Xin Xia, David LO, Xinyu Wang, and Bo Zhou Conference Proceeding Article
Automatic Fine-Grained Issue Report Reclassification, Pavneet Singh Kochhar, Ferdian Thung, and David LO Conference Proceeding Article
Collaborative online multitask learning, Guangxia LI, Steven C. H. HOI, Kuiyu CHANG, Wenting LIU, and Ramesh JAIN Journal Article
Direct Neighbor Search, Jilian ZHANG, Kyriakos MOURATIDIS, and Hwee Hwa PANG Journal Article
Diversified Social Influence Maximization, Fangshuang Tang, Qi Liu, Hengshu Zhu, Enhong Chen, and Feida ZHU Conference Proceeding Article
Diversity-Oriented Bi-Objective Hyper-heuristics for Patrol Scheduling, Mustafa MISIR and Hoong Chuin LAU Conference Proceeding Article
Externalities, Incentives and Strategic Complementarities: Understanding Herd Behavior in IT Adoption, Xiaotong LI, Robert J. Kauffman, Feifei YU, and Ying ZHANG Journal Article
Generating Supplementary Travel Guides from Social Media, Liu YANG, Jing JIANG, Lifu HUANG, Minghui QIU, and Lizi LIAO Conference Proceeding Article
GTA-m: Greedy Trajectory-Aware (m copies) routing for airborne networks, Xiaoping MA, Hwee Xian TAN, and Alvin C. VALERA Conference Proceeding Article
Guest editorial: Special issue on brain inspired models of cognitive memory, Huajin TANG, Kiruthika RAMANATHAN, and Ning NIGN Transcript
Hybrid Metaheuristics for Solving the Quadratic Assignment Problem and the Generalized Quadratic Assignment Problem, Aldy GUNAWAN, Kien Ming Ng, Kim Leng Poh, and Hoong Chuin LAU Conference Proceeding Article
Incorporating Microblogging ('Tweeting') in Higher Education: Lessons Learnt in a Knowledge Management Course, Thomas MENKHOFF, Yue Wah Chay, Magnus Lars Bengtsson, C. Jason WOODARD, and Benjamin GAN Conference Paper
Incorporating Microblogging (“Tweeting”) in Higher Education: Lessons Learnt in a Knowledge Management Course, Thomas MENKHOFF, Yue Wah Chay, Magnus Lars Bengtsson, Charles Jason WOODARD, and Kok Siew Benjamin GAN Conference Paper
Incorporating Microblogging (“Tweeting”) in Higher Education: Lessons Learnt in a Knowledge Management Course, Thomas MENKHOFF, Yue Wah Chay, Magnus Lars Bengtsson, C. Jason WOODARD, and Benjamin GAN Conference Paper
Integrating motivated learning and k-winner-take-all to coordinate multi-agent reinforcement learning, Teck-Hou TENG, Ah-hwee TAN, Janusz STARZYK, Yuan-Sin TAN, and Loo-Nin TEOW Conference Proceeding Article
Integrating motivated learning and k-winner-take-all to coordinate multi-agent reinforcement learning, Teck-Hou TENG, Ah-hwee TAN, Janusz STARZYK, Yuan-Sin TAN, and Loo-Nin TEOW Conference Proceeding Article
Jointly Modeling Aspects, Ratings and Sentiments for Movie Recommendation (JMARS), Qiming DIAO, Minghui QIU, Chao-Yuan WU, Alexander J. SMOLA, Jing JIANG, and Chong WANG Conference Proceeding Article
Managing complexity through selective decoupling, C. Jason WOODARD and Eric K. CLEMONS Conference Proceeding Article
Online Multiple Kernel Regression, Doyen SAHOO, Steven C. H. HOI, and Bin LI Conference Proceeding Article
On macro and micro exploration of hashtag diffusion in Twitter, Yazhe WANG and Baihua ZHENG Conference Proceeding Article
Reducing carbon emission of ocean shipments by optimizing container size selection, Edwin Lik Ming CHONG, Nang Laik MA, and Kar Way TAN Conference Proceeding Article
Reducing carbon emission of ocean shipments by optimizing container size selection, Edwin Lik Ming Chong, Nang Laik MA, and Kar Way TAN Conference Paper
Semantic Visualization for Spherical Representation, Tuan M. V. LE and Hady W. LAUW Conference Proceeding Article
Skills Frameworks: A Tool for Reform in Information Technology Higher Education, Mehdi ASGARKHANI and Venky SHANKARAMAN Conference Proceeding Article
The Learning Curves in Open-Source Software (OSS) Development Network, Youngsoo KIM and Lingxiao JIANG Conference Proceeding Article
Unleashing Dec-MDPs in Security Games: Enabling Effective Defender Teamwork, Eric Shieh, Albert Jiang, Amulya Yadav, Pradeep Reddy VARAKANTHAM, and Milind Tambe Conference Proceeding Article
Unobtrusive monitoring of ECG-derived features during daily smartphone use, Sungjun Kwon, Seungwoo Kang, Youngki LEE, Chungkuk Yoo, and Kwangsuk Park Conference Proceeding Article
Urban planning process: Can technology enhance participatory communication?, Rojin VISHKAIE, Richard LEVY, and Anthony TANG Journal Article
Utilizing microblogs for improving automatic news high-lights extraction, Zhongyu WEI and Wei GAO Conference Proceeding Article
Video event detection using motion relativity and feature selection, Feng WANG, Zhanhu SUN, Yu-Gang JIANG, and Chong-wah NGO Journal Article
Ranking model selection and fusion for effective microblog search, Zhongyu WEI, Wei GAO, Tarek EL-GANAINY, Walid MAGDY, and Kam-Fai WONG Conference Proceeding Article
Symbolic analysis of an electric vehicle charging protocol, Li LI, Jun PANG, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article
Detecting differences across multiple instances of code clones, Yun LIN, Zhenchang XING, Yinxing XUE, Yang LIU, Xin PENG, Jun SUN, and Wenyun ZHAO Conference Proceeding Article
NomLoc: Calibrationfree indoor localization with nomadic access points, Jiang XIAO, Youwen YI, Lu WANG, Haochao LI, Zimu ZHOU, Kaishun WU, and Lionel M. NI Conference Proceeding Article
A novel algorithm based on visual saliency attention for localization and segmentation in rapidly-stained leukocyte images, Xin ZHENG, Yong WANG, Guoyou WANG, and Zhong CHEN Journal Article
A retail bank's BPM experience, SHANKARARAMAN, Venky; GOTTIPATI Swapna; and Randall E. DURAN Journal Article
A simple polynomial-time randomized distributed algorithm for connected row convex constraints, T. K. Satish KUMAR, NGUYEN DUC THIEN, William YEOH, and Sven KOENIG Conference Proceeding Article
Automated Configuration Bug Report Prediction Using Text Mining, Xin Xia, David LO, Weiwei Qiu, Wang Xingen, and Bo Zhou Conference Proceeding Article
Board interlock networks and the use of relative performance evaluation, Qian HAO, Nan HU, Ling LIU, and Lee J. Yao Journal Article
Building algorithm portfolios for memetic algorithms, Mustafa MISIR, Stephanus Daniel HANDOKO, and Hoong Chuin LAU Conference Proceeding Article
Build Predictor: More Accurate Missed Dependency Prediction in Build Configuration Files, Bo Zhou, Xia Xin, David LO, and Xinyu Wang Conference Proceeding Article
CenKNN: A scalable and effective text classifier, Guansong PANG, Huidong JIN, and Shengyi JIANG Journal Article
Click-through-based cross-view learning for image search, Yingwei PAN, Ting YAO, Tao MEI, Houqiang LI, Chong-wah NGO, and Yong RUI Conference Proceeding Article
Cloud-based Query Evaluation for Energy-Efficient Mobile Sensing, Tianli MO, Sougata SEN, Lipyeow LIM, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article
Collaborative error reduction for hierarchical classification, Shiai ZHU, Xiao-Yong WEI, and Chong-wah NGO Journal Article
Creating autonomous adaptive agents in a real-time first-person shooter computer game, Di WANG and Ah-hwee TAN Journal Article
Decentralized multi-agent reinforcement learning in average-reward dynamic DCOPs, Duc Thien Nguyen, William YEOH, Hoong Chuin LAU, Shlomo Zilberstein, and Chongjie ZHANG Conference Proceeding Article
Decentralized Stochastic Planning with Anonymity in Interactions, Pradeep VARAKANTHAM, Yossiri ADULYASAK, and Patrick JAILLET Conference Proceeding Article
Diamonds are a girl's best friend: Partial order reduction for timed automata with abstractions, Henri HANSEN, Shang-Wei LIN, Yang LIU, Truong Khanh NGUYEN, and Jun SUN Conference Proceeding Article
Enterprise Systems Enabling Smart Commerce, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article
Facilitating crowd sourced software engineering via stack overflow, Ohad BARZILAY, Christoph TREUDE, and Alexey ZAGALSKY Book Chapter
FSpH: Fitted spectral hashing for efficient similarity search, Yong-Dong ZHANG, Yu WANG, Sheng TANG, Steven C. H. HOI, and Jin-Tao LI Journal Article
FSpH: Fitted spectral hashing for efficient similarity search, Yong-Dong ZHANG, Yu WANG, Sheng TANG, Steven C. H. HOI, and Jin-Tao LI Journal Article
Individual and Collective Trade-offs In Small World Decisions, Prabir Sen and Nang Laik MA Conference Paper
Influences of Influential Users: An Empirical Study of Music Social Network, Jing REN, Zhiyong CHENG, Jialie SHEN, and Feida ZHU Conference Proceeding Article
Integrating self-organizing neural network and motivated learning for coordinated multi-agent reinforcement learning in multi-stage stochastic game, Teck-Hou TENG, Ah-Hwee TAN, Janusz A. STARZYK, Yuan-Sin TAN, and Loo-Nin TEOW Conference Proceeding Article
Just-for-Me: An Adaptive Personalization System for Location-Aware Social Music Recommendation, Zhiyong Cheng, Jialie SHEN, and Tao Mei Conference Proceeding Article