Submissions from 2014
Integrating water exclusion theory into β contacts to predict binding free energy changes and binding hot spots, Qian LIU, Steven C. H. HOI, Chee Keong KWOH, Limsoon WONG, and Jinyan LI Journal Article
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage, Cheng-Kang CHU, Sherman S. M. CHOW, Wen-Guey TZENG, Jiangying ZHOU, and Robert H. DENG Journal Article
Key-aggregate cryptosystem for scalable data sharing in cloud storage, Cheng-Kang Chu, Sherman Chow, Wen-Guey Tzeng, Jiangying Zhou, and Huijie Robert Deng Journal Article
LIBOL: A Library for Online Learning Algorithms, Steven C. H. HOI, Jialei WANG, and Peilin ZHAO Journal Article
LiveLabs: Building An In-Situ Real-Time Mobile Experimentation Testbed, Rajesh Krishna Balan, Archan Misra, and Youngki Lee Conference Paper
LiveLabs: Building An In-Situ Real-Time Mobile Experimentation Testbed, Rajesh Krishna BALAN, Archan MISRA, and Youngki LEE Conference Proceeding Article
LOS and NLOS Classification for Underwater Acoustic Localization, Roee DIAMANT, Hwee-Pink TAN, and Lutz LAMPE Journal Article
Predicting response in mobile advertising with Hierarchical Importance-Aware Factorization Machine, Richard Jayadi OENTARYO, Ee Peng LIM, Jia Wei LOW, David LO, and Michael FINEGOLD Conference Proceeding Article
Representative discovery of structure cues for weakly-supervised image segmentation, Luming ZHANG, Yue GAO, Yingjie XIA, Ke LU, Jialie SHEN, and Rongrong JI Journal Article
ROPecker: A Generic and Practical Approach For Defending Against ROP Attack, Yueqiang CHENG, Zongwei ZHOU, Yu MIAO, Xuhua DING, and Robert H. DENG Conference Proceeding Article
Sinabro: Opportunistic and Unobtrusive Mobile ECG Monitoring System, Seungwoo KANG, Sungjun KWON, Sangwon SEO, Chungkuk YOO, Kwangsuk PARK, Junehwa SONG, and Youngki LEE Conference Proceeding Article
Sinabro: Opportunistic and Unobtrusive Mobile ECG Monitoring System, Seungwoo Kang, Sungjun Kwon, Sangwon Seo, Chungkuk Yoo, Kwangsuk Park, Junehwa Song, and Youngki Lee Conference Paper
Sketch: Pen and touch recognition [Workshop summary], Richard C. DAVIS and Aaron ADLER Conference Proceeding Article
TalkBetter: Family-driven Mobile Intervention Care for Children with Language Delay, Inseok Hwang, Chungkuk Yoo, Chanyou Hwang, Dongsun Yim, Youngki Lee, Chulhong Min, Kim John, and Junehwa Song Conference Paper
TalkBetter: Family-driven Mobile Intervention Care for Children with Language Delay, Inseok HWANG, Chungkuk YOO, Chanyou HWANG, Dongsun YIM, Youngki LEE, Chulhong MIN, Hjohn KIM, and Junehwa SONG Conference Proceeding Article
Towards More Accurate Multi-Label Software Behavior Learning, Xin XIA, Feng YANG, David LO, Zhenyu CHEN, and Xinyu WANG Conference Proceeding Article
Visual typo correction by collocative optimization: A case study on merchandize images, Xiao-Yong WEI, Zhen-Qun YANG, Chong-wah NGO, and Wei ZHANG Journal Article
Parameter synthesis for hierarchical concurrent real-time systems, Étienne ANDRÉ, Yang LIU, Jun SUN, and Jin Song DONG Journal Article
Mobile Platform and Application Research at SMU LiveLabs, Swapna GOTTIPATI, Jeena Sebastian, Luong Trung TUAN, Kiat Wee TAN, Joseph CHAN, Joo KENG, Kartik MURALIDARAN, Tadashi OKOSHI, Youngki LEE, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article
Towards verification of computation orchestration, Jin Song DONG, Yang LIU, Jun SUN, and Xian ZHANG Journal Article
Model checking approach to automated planning, Yi LI, Jin Song DONG, Jing SUN, Yang LIU, and Jun SUN Journal Article
Learning assumptions for compositional verification of timed systems, Shang-Wei Lin LIN, Yang LIU, Jun SUN, and Jun SUN Journal Article
Towards formal modelling and verification of pervasive computing systems, Yan LIU, Xian ZHANG, Yang LIU, Jin Song DONG, Jun SUN, Jit BISWAS, and Mounir MOKHTARI Journal Article
A hybrid heuristic algorithm for the 2D variable-sized bin packing problem, S. Hong, Defu Zhang, Hoong Chuin LAU, and X. Zeng Journal Article
A hybrid scheme for authenticating scalable video codestreams, Zhuo Wei, Yongdong Wu, Huijie Robert Deng, and Xuhua Ding Journal Article
An approach for clone detection in documentation reuse, Dmitry V. LUTSIV, Dmitry KOZNOV, Hamid A. BASIT, Eng Lieh OUH, Mikhail N. SMIRNOV, and Konstantin Y. ROMANOVSKY Journal Article
An auction mechanism for the last-mile deliveries via urban consolidation centre, Stephanus Daniel Handoko, Duc Thien NGUYEN, and Hoong Chuin LAU Conference Proceeding Article
A robust smart card-based anonymous user authentication protocol for wireless communications, Fengton WEN, Willy SUSILO, and Guomin YANG Journal Article
Automatic detection and quantification of brain midline shift using anatomical marker model, Ruizhe LIU, Shimiao LI, Bolan SU, Chew Lim TAN, Tze-Yun LEONG, Boon Chuan PANG, C.C. Tchoyoson LIM, and Cheng Kiang LEE Journal Article
Collaboration patterns in software developer network, Didi SURIAN, David LO, and Ee Peng LIM Encyclopaedia
Competition between Software-as-a-Service Vendors, Dan MA and Robert John KAUFFMAN Journal Article
Complexity of the soundness problem of workflow nets, Guan Jun LIU, Jun SUN, Yang LIU, and Jin Song DONG Journal Article
Consumer Informedness and Firm Information Strategy., T. Li, Robert John Kauffman, van Heck Eric, Peter Vervest, and B. Dellaert Journal Article
Consumer Informedness and Firm Information Strategy: Evidence from a Choice Experiment, T. Li, Robert John Kauffman, E. van Heck, and P. Vervest Journal Article
Consumer Informedness and Firm Information Strategy: Evidence from a Choice Experiment, T. Li, Robert John Kauffman, E. van Heck, and P. Vervest Journal Article
Coupling graphs, efficient algorithms and B-Cell Epitope prediction, Liang ZHAO, Steven C. H. HOI, Zhenhua LI, Limsoon WONG, and Hung NGUYEN Journal Article
Cross-domain password-based authenticated key exchange revisited, Liqun CHEN, Hoon Wei LIM, and Guomin YANG Journal Article
Detecting click fraud in online advertising: A data mining approach, Richard OENTARYO, Ee Peng LIM, Michael FINEGOLD, David LO, Feida ZHU, Clifton PHUA, Eng-Yeow CHEU, Ghim-Eng YAP, Kelvin SIM, Kasun PERERA, Bijay NEUPANE, Mustafa FAISAL, Zeyar AUNG, Wei Lee WOON, Wei CHEN, Dhaval PATEL, and Daniel BERRAR Journal Article
Dynamic Platform Pricing with Innovative Products, Mei LIN and X. Pan Working Paper
Evaluating electronic market designs: The effects of competitive arousal and social facilitation on electronic group buying, Yuecheng Yu, Karl R. LANG, and Alex PELAEZ Conference Proceeding Article
Extended Comprehensive Study of Association Measures for Fault Localization, Lucia -, David LO, Lingxiao JIANG, Ferdian Thung, and Aditya Budi Journal Article
Externalities, Incentives and Strategic Complementarities: Understanding Herd Behavior in IT Adoption, X. Li, Robert John Kauffman, F. Yu, and Y. Zhang Journal Article
Free market of crowdsourcing: Incentive mechanism design for mobile sensing, Xinglin ZHANG, Zheng YANG, Zimu ZHOU, Haibin CAI, Lei CHEN, and Xiang-Yang LI Journal Article
Free market of crowdsourcing: Incentive mechanism design for mobile sensing, Xinglin ZHANG, Zheng YANG, Zimu ZHOU, Haibin CAI, Lei CHEN, and Xiang-Yang LI Journal Article
Get Trained, Be Future-Ready, Lee Fong Michelle CHEONG News Article
How Can Consumer Preferences Be Leveraged for Targeted Upselling in Cable TV Services?, Bing Tian DAI Conference Paper
How Can Substitution and Complementarity Effects Be Leveraged for Broadband Internet Services Strategy?, Gwangjae JUNG, Young Soo KIM, and Robert J. Kauffman Conference Proceeding Article
Impact, team size, collaboration, and epochs: Stories from four decades of software engineering research, Subhajit DATTA, A. SAJEEV, S. SARKAR, and N. KUMAR Journal Article
Inferring the untold: Mining software engineering research publication networks, Santonu SARKAR and Subhajit DATTA Journal Article
Innovations in Financial IS and Technology Ecosystems: High-Frequency Trading Systems in the Equity Market, Robert J. Kauffman, Jun Liu, and Dan Ma Journal Article
Innovative applications and security of internet of things, Yingjiu LI, Yingjiu LI, and Nai-Wei LO Transcript
Investments in Internet-based Innovations in Financial Services: Strategic Advantage or Strategic Necessity?, K. Goh and Robert John Kauffman Journal Article
Learning to recommend descriptive tags for questions in social forums, Liqiang NIE, Yiliang ZHAO, Xiangyu WANG, Jialie SHEN, and Tat-Seng CHUA Journal Article
Leveraging machine learning and information retrieval techniques in software evolution tasks: Summary of the first MALIR-SE Workshop, at ASE 2013, - LUCIA, David LO, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, and Collin McMillan Journal Article
Leveraging Web 2.0 for Software Evolution, Yuan TIAN and David LO Book Chapter
Loki: A privacy-conscious platform for crowdsourced surveys, Thivya KANDAPPU, Vijay SIVARAMAN, Arik FRIEDMAN, and Roksana BORELI Conference Proceeding Article
Measuring and modelling the thermal performance of the Tamar Suspension Bridge using a wireless sensor network, Nicholas DE BATTISTA, James M. W. BROWNJOHN, Hwee-Pink TAN, and Ki Young KOO Journal Article
Mining Long Patterns, Feida ZHU Book Chapter
Mining weakly labeled web facial images for search-based face annotation, Dayong WANG, Steven C. H. HOI, Ying HE, and Jianke ZHU Journal Article
Mini-track introduction: Information economics, competition, regulation, law and society, Eric K. CLEMONS, Robert John KAUFFMAN, and Thomas A. WEBER Conference Proceeding Article
Multi-agent orienteering problem with time-dependent capacity constraints, Chen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Journal Article
On Empirical Validation of Compactness Measures for Electoral Redistricting and Its Significance for Application of Models in the Social Sciences, Christine CHOU, Steven O. KIMBROUGH, Frederic H. MURPHY, John SULLIVAN-FEDOCK, and C. Jason WOODARD Journal Article
Online Multiple Kernel Similarity Learning for Visual Search, Hao Xia, Chu Hong HOI, Rong Jin, and Peilin Zhao Journal Article
Online portfolio selection: A survey, Bin LI and Steven C. H. HOI Journal Article
On the security of auditing mechanisms for secure cloud storage, Yong YU, Lei NIU, Guomin YANG, Yi MU, and Willy SUSILO Journal Article
On Understanding Diffusion Dynamics of Patrons at a Themepark, Jiali DU, Akshat KUMAR, and Pradeep Varkantham
Panel Data Analysis Via Variable Selection and Subject Clustering, Haibing LU, Shengsheng HUANG, Yingjiu LI, and Yanjiang YANG Book Chapter
Personalizing Software Development Practice Using Mastery-based Coaching, Chris BOESCH and Sandra BOESCH Conference Paper
Platform Pricing with Endogenous Network Effects, Mei Lin, Ruhai Wu, and Wen Zhou Working Paper
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data, Hwee Hwa PANG and Xuhua DING Journal Article
Real Time Process Compliance Checking using Nomenclature Approach, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Paper
Reshaping Society through Analytics, Collaboration, and Decision Support: Role of Business Intelligence and Social Media, Lee Fong Michelle Cheong and Junyu Choy Book Chapter
RFID Security and Privacy, Yingjiu Li, Huijie Robert Deng, and Elisa Bertino Book
Risk balance defense approach against intrusions for network server, Chengpo Mu, Meng Yu, Yingjiu Li, and Wanyu Zang Journal Article
Risk minimization of disjunctive temporal problem with uncertainty, Hoong Chuin LAU and Tuan Anh HOANG Conference Proceeding Article
Running and Chasing: The Competition between Paid Search Marketing and Search Engine Optimization, Kai LI, Mei LIN, Zhangxi LIN, and Bo XING Conference Proceeding Article
Sherlock: Microenvironment sensing for smartphones, Zheng YANG, Longfei SHANGGUAN, Weixi GU, Zimu ZHOU, Chenshu WU, and Yunhao LIU Journal Article
Solving Risk-Sensitive Stochastic Orienteering Problems using Optimization and Local Search, Pradeep Reddy VARAKANTHAM, Akshat KUMAR, Hoong Chuin LAU, and William Yeoh Journal Article
Solving Selfish Routing Problems with Involuntary Movements and Bounded Rationality, Pradeep Reddy VARAKANTHAM, Asrar Ahmed, and Shih-Fen Cheng Working Paper
Strategic Decision Support System using Heuristic Algorithm for Practical Outlet Zones Allocation to Dealers in a Beer Supply Distribution Network, Michelle Lee Fong CHEONG Conference Proceeding Article
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert John KAUFFMAN, Jun LIU, and Dan MA
The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna Balan, Youngki Lee, Kiat Wee Tan, and Archan Misra Conference Paper
The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna BALAN, Youngki LEE, Kiat Wee TAN, and Archan MISRA Conference Proceeding Article
The impact of corporate social responsibility activities on brand evaluation, M. TIAN, C. LI, and Keng SIAU Journal Article
Twitter microblog sentiment analysis, Guangxia LI, Kuiyu CHANG, and Steven C. H. HOI Book Chapter
Understanding the Paradigm Shift in Computational Social Science in the Presence of Big Data, M. Chang, Robert John Kauffman, and Y.O Kwon Journal Article
WenZher: Comprehensive Vertical search for Healthcare Domain, Liqiang Nie, Tao Li, Mohammad Akbari, Jialie SHEN, and Tat-Seng CHUA Conference Proceeding Article
Submissions from 2013
Designing Optimal Innovation Portfolio, Arcot Desai NARASIMHALU Conference Paper
Adaptive computer‐generated forces for simulator‐based training, Expert Systems with Applications, Teck-Hou TENG, Ah-hwee TAN, and Loo-Nin TEOW Journal Article
A Dynamic Programming Approach to Achieving an Optimal End State along a Serial Production Line, Shih-Fen CHENG, Blake E. Nicholson, Marina A. Epelman, Daniel J. Reaume, and Robert L. Smith Journal Article
A Local Social Network Approach for Research Management, Xiaoyan LIU, Zhiling GUO, Zhenjiang LIN, and Jian MA Journal Article
An Agent-based Simulation Approach to Experience Management in Theme Parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article
An efficient partial shape matching algorithm for 3D tooth recognition, Zhiyuan ZHANG, Xin ZHONG, Sim Heng ONG, and Kelvin W. C. FOONG Conference Proceeding Article
An integrated model of team motivation and worker skills for a computer-based project management simulation, Wee Leong Lee Conference Proceeding Article
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks, Fengtong WEN, Willy SUSILO, and Guomin YANG Journal Article
A simple integration of social relationship and text data for identifying potential customers in microblogging, Guansong PANG, Shengyi JIANG, and Dongyi CHEN Conference Proceeding Article
Coupling alignments with recognition for still-to-video face recognition, Zhiwu HUANG, X. ZHAO, S. SHAN, R. WANG, and X. CHEN Conference Proceeding Article
Damaged Services: Why Interruptible Spot-Priced Cloud Computing Services are Worthwhile to Offer with Uninterruptible Reserved Services, Jianhui HUANG, Robert J. KAUFFMAN, and Dan MA Conference Paper
Decision trees to model the impact of disruption and recovery in supply chain networks, Loganathan PONNANBALAM, L. WENBIN, Xiuju FU, Xiaofeng YIN, Zhaoxia WANG, and Rick S. M. GOH Conference Proceeding Article
Dense image correspondence under large appearance variations, Linlin LIU, Kok-Lim LOW, and Wen-yan LIN Conference Proceeding Article