Submissions from 2013
An analysis of post-selection in automatic configuration, Zhi YUAN, Thomas St\303\274tzle, Marco A. Montes De Oca, Hoong Chuin LAU, and Mauro Birattari Conference Proceeding Article
An Investigation of Decision Analytic Methodologies for Stress Identification, Yong DENG, Chao-Hsien CHU, Huayou SI, Qixun ZHANG, and Zhonghai WU Journal Article
ConferenceSense: Monitoring of public events using phone sensors, Vigneshwaran SUBBARAJU, Amit KUMAR, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, and Archan MISRA Conference Proceeding Article
Corporate myths: Sourcing and vendor management in Asia Pacific, Patrick THNG Magazine Article
Cost Efficiency Strategy in the Software-as-a-Service Market: Modeling Results and Related Implementation Issues, Robert J. Kauffman and Dan Ma Conference Paper
Cost Efficiency Strategy in the Software-as-a-Service Market: Modeling Results and Related Implementation Issues, Robert J. KAUFFMAN and Dan MA Conference Proceeding Article
DriverGuard: Virtualization based fine-grained protection on I/O flows, Yueqiang CHENG, Xuhua DING, and Robert H. DENG Journal Article
DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis, Yuan TIAN, David LO, and Chengnian SUN Conference Proceeding Article
Flexible Grouping and Multiple Centers for Preserving Simplicity and Flexibility in Animation Sketches, Richard C. DAVIS, Kevin STEPPE, Mengyuan Guan, Jing Ting KHOO, Rui ZHANG, and Quee Boon KOH Conference Proceeding Article
Focus: A Usable & Effective Approach to OLED Display Power Management, Kiat Wee TAN, Tadashi OKOSHI, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article
Generative models for item adoptions using social correlation, Freddy Chong Tat CHUA, Hady Wirawan LAUW, and Ee Peng LIM Journal Article
Inferring ongoing human activities based on recurrent self-organizing map trajectory, Qianru SUN and Hong LIU Conference Proceeding Article
Innovating Services in Science and Technology Parks, Arcot Desai NARASIMHALU Conference Paper
Learning spatio-temporal co-occurrence correlograms for efficient human action classification, Qianru SUN and Hong LIU Conference Proceeding Article
Multi-Abstraction Concern Localization, Tien-Duy B. DUY, Shaowei WANG, and David LO Conference Proceeding Article
SecureArray: Improving wifi security with fine-grained physical-layer, Jie XIONG and Kyle JAMIESON Conference Proceeding Article
The impact of ineffective internal control on the value relevance of accounting information, Nan HU, Baolei QI, Gaoliang TIAN, Lee YAO, and Zhen ZENG Journal Article
Theory and practice, do they match? A case with spectrum-based fault localization, Tien-Duy B. LE, Ferdian THUNG, and David LO Conference Proceeding Article
Transforming finance for the future, Siu Loon HOE Journal Article
Web-scale near-duplicate search: Techniques and applications, Chong-wah NGO, Changsheng XU, Wessel KRAAIJ, and Abdulmotaleb EL SADDIK Journal Article
Will fault localization work for these failures? An automated approach to predict effectiveness of fault localization tools, Tien-Duy B. LE and David LO Conference Proceeding Article
ProjectorKit: Easing rapid prototyping of interactive applications for mobile projectors, Martin WEIGEL, Sebastian BORING, Jürgen STEIMLE, Nicolai MARQUARDT, Saul GREENBERG, and Anthony TANG Conference Proceeding Article
Writing for Publication in Biomedical Informatics Journals, Christoph Lehmann, Reinhold Haux, Jan Talmon, Dominik Aronsky, Nicolette de Keizer, Tze-Yun LEONG, and Charles Safran Presentation
Efficacy of communication support in collaborative online shopping: The moderating effect of task types, Keng SIAU, Fiona Fui-hoon NAH, and H. SHA Conference Proceeding Article
An empirical study on uncertainty identification in social media context, Zhongyu WEI, Junwen CHEN, Wei GAO, Binyang LI, Lanjun ZHOU, Yulan HE, and Kam-Fai WONG Conference Proceeding Article
Audit games, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, Ariel D. PROCACCIA, and Arunesh SINHA Conference Proceeding Article
Multi-view discriminant transfer learning, Pei Yang YANG and Wei GAO Conference Proceeding Article
Value Migration and Architectural Design Choices in Innovation Ecosystems: The Case of Cloud Computing, Richard TEE and C. Jason WOODARD Presentation
The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Presentation
Adaptive collective routing using gaussian process dynamic congestion models, Siyuan LIU, Yisong YUE, and Ramayya KRISHNAN Conference Proceeding Article
A Multi-objective Memetic Algorithm for Vehicle Resource Allocation in Sustainable Transportation Planning, Hoong Chuin LAU, Lucas AGUSSURJA, Shih-Fen CHENG, and Pang Jin TAN Conference Proceeding Article
An agent-based network analytic perspective on the evolution of complex adaptive supply chain networks, L. PONNAMBALAM, A. TAN, X. FU, X. F. YIN, Zhaoxia WANG, and R. S. GOH Conference Proceeding Article
An agent-based network analytic perspective on the evolution of complex adaptive supply chain networks, Loganathan PONNANBALAM, A. Tan, Xiuju FU, Xiaofeng YIN, Zhaoxia WANG, and Rick S. M. GOH Conference Proceeding Article
An empirical analysis of a network of expertise, LE TRUC VIET and Minh Thap NGUYEN Conference Proceeding Article
Applying search in an automatic contract-based testing tool, Alexey KOLESNICHENKO, Christopher M. POSKITT, and Bertrand MEYER Conference Proceeding Article
A Study of the Software-as-a-Service Business Model, Dan Ma and Abraham Seidmann Conference Paper
A Study of the Software-as-a-Service Business Model, Dan Ma and Abraham Seidmann Conference Paper
A Study of the Software-as-a-Service Business Model, Dan MA and Abraham Seidmann Conference Paper
Attribute-based encryption with verifiable outsourced decryption, Junzuo LAI, Robert H. DENG, Chaowen GUAN, and Jian WENG Journal Article
Automated Generation of Interaction Graphs for Value-Factored Decentralized POMDPs, William YEOH, Akshat KUMAR, and Shlomo Zilberstein Conference Proceeding Article
Best Upgrade Plans for Large Road Networks, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article
Click-boosting random walk for image search reranking, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Zheng-Jun ZHA, and Chong-Wah NGO Conference Proceeding Article
Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Paper
Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article
Cost-Sensitive Online Active Learning with application to malicious URL detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article
DelayFlow centrality for identifying critical nodes in transportation networks, Yew-Yih CHENG, Roy Ka Wei LEE, Ee-Peng LIM, and Feida ZHU Conference Proceeding Article
FloTra: Flower-shape trajectory mining for instance-specific parameter tuning, Lindawati LINDAWATI, Feida ZHU, and Hoong Chuin LAU Conference Paper
Hierarchical Parallel Algorithm for Modularity-Based Community Detection Using GPUs, Chun Yew CHEONG, Huynh Phung HUYNH, David LO, and Rick Siow Mong GOH Conference Proceeding Article
How many researchers does it take to make impact? Mining software engineering publication data for collaboration insights, Subhajit DATTA, Santonu SARKAR, Sajeev A. S. M., and Nishant KUMAR Conference Proceeding Article
Improving Patient Length-of-Stay in Emergency Department Through Dynamic Resource Allocation Policies, Kar Way TAN, Wei Hao TAN, and Hoong Chuin LAU Conference Proceeding Article
Incremental and accuracy-aware personalized pagerank through scheduled approximation, Fanwei ZHU, Yuan FANG, Kevin Chen-Chuan CHANG, and Jing YING Conference Proceeding Article
Integration of Social Media Technologies with ERP:A Prototype Implementation, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article
Interacting Knapsack Problem in Designing Resource Bundles, Truong Huy D. NGUYEN, Pradeep Reddy VARAKANTHAM, Hoong Chuin LAU, and Shih-Fen CHENG Conference Proceeding Article
Large scale online kernel classification, Jialei WANG, Peilin ZHAO, Steven C. H. HOI, Jinfeng ZHUANG, and Zhi-Yong LIU Conference Proceeding Article
Learning to name faces: A multimodal learning scheme for search-based face annotation, Dayong WANG, Steven C. H. HOI, Pengcheng WU, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article
Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack, Kai-Lung HUI, Seung-Hyun KIM, and QIU-HONG WANG Presentation
Multi-agent Orienteering Problem with Time-dependent Capacity Constraints, Cen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Conference Paper
Near-duplicate video retrieval: Current research and future trends, Jiajun LIU, Zi HUANG, Hongyun CAI, Heng Tao SHEN, Chong-wah NGO, and Wei WANG Journal Article
“Network-Theoretic” Queuing Delay Estimation in Theme Park Attractions, Ajay ARAVAMUDHAN, Archan MISRA, and Hoong Chuin LAU Conference Proceeding Article
Open source software development process model – A grounded theory approach, Keng SIAU and Y. TIAN Conference Proceeding Article
Parameter Learning for Latent Network Diffusion, Xiaojian WU, Akshat KUMAR, Daniel SHELDON, and Shlomo ZILBERSTEIN Conference Proceeding Article
Politics, sharing and emotion in microblogs, Tuan-Anh HOANG, William COHEN, Ee Peng LIM, Doug PIERCE, and David REDLAWSK Conference Proceeding Article
RiskVis: Supply chain visualization with risk management and real-time monitoring, Rick S. M. GOH, Zhaoxia WANG, Xiaofeng YIN, Xiuju FU, Loganathan PONNANBALAM, Sifei LU, and Xiaorong Li Conference Proceeding Article
Robust median reversion strategy for on-line portfolio selection, Dingjiang HUANG, Junlong ZHOU, Bin LI, Steven HOI, and Shuigeng ZHOU Conference Proceeding Article
Scalable randomized patrolling for securing rapid transit networks, Pradeep VARAKANTHAM, Hoong Chuin LAU, and Zhi YUAN Conference Proceeding Article
Self-organizing cognitive models for virtual agents, Yilin KANG and Ah-hwee TAN Conference Proceeding Article
Semantic overlay network for large-scale spatial information indexing, Zhiqiang ZOU, Yue WANG, Kai CAO, Tianshan QU, and Zhongmin WANG Journal Article
The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Conference Proceeding Article
Using contracts to guide the search-based verification of concurrent programs, Christopher M. POSKITT and Simon POULDING Conference Proceeding Article
USMMC: A self-contained model checker for UML state machines, Shuang LIU, Yang LIU, Jun SUN, Manchun ZHENG, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article
Vigilance adaptation in adaptive resonance theory, Lei MENG, Ah-hwee TAN, and Donald C. WINSCH Conference Proceeding Article
Analyzing Auction and Bargaining Mechanisms in E-Procurement with Supply Quality Risk, He HUANG, Hongyan XU, Robert J. Kauffman, and Ning SUN Journal Article
Performance Measurement Design for a Parcel Delivery Company, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Proceeding Article
Active Learning with Expert Advice, Peilin ZHAO, Steven C. H. HOI, and Jinfeng ZHUANG Conference Proceeding Article
Analyzing Auction and Bargaining Mechanism Design in E-Procurement with Quality Verification and Risk Aversion., H. Huang, H. Xu, Robert John KAUFFMAN, and N. Sun Journal Article
An analysis of post-selection in automatic tuning, Zhi Yuan, Thomas Stuetzle, Marco Montes De Oca, and Hoong Chuin LAU Conference Paper
An Empirical Study of Adoption of Software Testing in Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, and Lingxiao Jiang Conference Paper
An empirical study of adoption of software testing in open source projects, Pavneet Singh KOCHHAR, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article
An empirical study of bugs in software build systems, Xin XIA, Xiaozhen ZHOU, David LO, and Xiaoqiong ZHAO Conference Proceeding Article
Case study methodology in technology-focused Information Systems courses: Examining the students’ perspective, Ilse BAUMGARTNER Conference Proceeding Article
Coarse-grained parallel genetic algorithm applied to a vector based land use allocation optimization problem: The case study of Tongzhou Newtown, Beijing, China, Kai CAO and Xinyue YE Journal Article
Collective Diffusion Over Networks: Models and Inference, Akshat KUMAR, Daniel SHELDON, and Biplav SRIVASTAVA Conference Proceeding Article
Combining model checking and testing with an application to reliability prediction and distribution, Lin GUI, Jun SUN, Yang LIU, Yuanjie SI, Jin Song DONG, and Xinyu WANG Conference Proceeding Article
Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG, Junyu CHOY, and Nang Laik MA Conference Paper
Effective use of Data and Decision Analytics to Improve Order Distribution in a Supply Chain, Michelle Lee Fong CHEONG and Junyu CHOY Report
Improving tool support for software reverse engineering in a security context, Brendan CLEARY, Christoph TREUDE, Fernando FIGUEIRA FILHO, Margaret-Anne STOREY, and Martin SALOIS Conference Proceeding Article
Mining direct antagonistic communities in signed social networks, David LO, Didi SURIAN, Philips Kokoh PRASETYO, Zhang KUAN, and Ee Peng LIM Journal Article
MKBoost: A framework of multiple kernel boosting, Hao XIA and Steven C. H. HOI Journal Article
Orion: A software project search engine with integrated diverse software artifacts, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article
Platform Regulation on Seller Heterogeneity, Ruhai WU and Mei Lin Working Paper
Popularity, interoperability, and impact of programming languages in 100,000 open source projects, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article
PSyHCoS: Parameter synthesis for hierarchical concurrent real-time systems, Étienne ANDRÉ, Yang LIU, Jun SUN, Jin Song DONG, and Shang-Wei LIN Conference Proceeding Article
Real-life vehicle routing with non-standard constraints, Wee Leong Lee Conference Proceeding Article
Reviving dormant ties in an online social network experiment, Ee Peng LIM, Denzil CORREA, David LO, Michael FINEGOLD, and Feida ZHU Conference Proceeding Article
Shortlisting Top-K Assignments, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article
Software Internationalization and Localization: An Industrial Experience, Xin XIA, David LO, Feng ZHU, Xinyu WANG, and Bo ZHOU Conference Proceeding Article
Technique for Authenticating H.264/SVC Streams in Surveillance Applications, Wei ZHUO, Robert H. DENG, Jialie SHEN, Yongdong WU, Xuhua DING, and Swee Won LO Conference Proceeding Article
TESLA: An extended study of an energy-saving agent that leverages schedule flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Milind Tambe, and Burcin Becerik-Gerber Journal Article
The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection, Joseph Joo Keng CHAN, Kiat Wee TAN, Lingxiao JIANG, and Rajesh Krishna BALAN Conference Proceeding Article
The Determinants of Monetary Value of Virtual Goods: An Empirical Study for a Cross-section of MMORPGs, QIU-HONG WANG, Viktor Mayer-Schonberger, and Xue YANG Journal Article