The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2013

PDF

An analysis of post-selection in automatic configuration, Zhi YUAN, Thomas St\303\274tzle, Marco A. Montes De Oca, Hoong Chuin LAU, and Mauro Birattari Conference Proceeding Article

PDF

An Investigation of Decision Analytic Methodologies for Stress Identification, Yong DENG, Chao-Hsien CHU, Huayou SI, Qixun ZHANG, and Zhonghai WU Journal Article

PDF

ConferenceSense: Monitoring of public events using phone sensors, Vigneshwaran SUBBARAJU, Amit KUMAR, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, and Archan MISRA Conference Proceeding Article

PDF

Corporate myths: Sourcing and vendor management in Asia Pacific, Patrick THNG Magazine Article

Cost Efficiency Strategy in the Software-as-a-Service Market: Modeling Results and Related Implementation Issues, Robert J. Kauffman and Dan Ma Conference Paper

Link

Cost Efficiency Strategy in the Software-as-a-Service Market: Modeling Results and Related Implementation Issues, Robert J. KAUFFMAN and Dan MA Conference Proceeding Article

PDF

DriverGuard: Virtualization based fine-grained protection on I/O flows, Yueqiang CHENG, Xuhua DING, and Robert H. DENG Journal Article

Link

DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis, Yuan TIAN, David LO, and Chengnian SUN Conference Proceeding Article

Link

Flexible Grouping and Multiple Centers for Preserving Simplicity and Flexibility in Animation Sketches, Richard C. DAVIS, Kevin STEPPE, Mengyuan Guan, Jing Ting KHOO, Rui ZHANG, and Quee Boon KOH Conference Proceeding Article

PDF

Focus: A Usable & Effective Approach to OLED Display Power Management, Kiat Wee TAN, Tadashi OKOSHI, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Generative models for item adoptions using social correlation, Freddy Chong Tat CHUA, Hady Wirawan LAUW, and Ee Peng LIM Journal Article

PDF

Inferring ongoing human activities based on recurrent self-organizing map trajectory, Qianru SUN and Hong LIU Conference Proceeding Article

PDF

Innovating Services in Science and Technology Parks, Arcot Desai NARASIMHALU Conference Paper

PDF

Learning spatio-temporal co-occurrence correlograms for efficient human action classification, Qianru SUN and Hong LIU Conference Proceeding Article

Link

Multi-Abstraction Concern Localization, Tien-Duy B. DUY, Shaowei WANG, and David LO Conference Proceeding Article

PDF

SecureArray: Improving wifi security with fine-grained physical-layer, Jie XIONG and Kyle JAMIESON Conference Proceeding Article

PDF

The impact of ineffective internal control on the value relevance of accounting information, Nan HU, Baolei QI, Gaoliang TIAN, Lee YAO, and Zhen ZENG Journal Article

PDF

Theory and practice, do they match? A case with spectrum-based fault localization, Tien-Duy B. LE, Ferdian THUNG, and David LO Conference Proceeding Article

PDF

Transforming finance for the future, Siu Loon HOE Journal Article

PDF

Web-scale near-duplicate search: Techniques and applications, Chong-wah NGO, Changsheng XU, Wessel KRAAIJ, and Abdulmotaleb EL SADDIK Journal Article

PDF

Will fault localization work for these failures? An automated approach to predict effectiveness of fault localization tools, Tien-Duy B. LE and David LO Conference Proceeding Article

ProjectorKit: Easing rapid prototyping of interactive applications for mobile projectors, Martin WEIGEL, Sebastian BORING, Jürgen STEIMLE, Nicolai MARQUARDT, Saul GREENBERG, and Anthony TANG Conference Proceeding Article

PDF

Writing for Publication in Biomedical Informatics Journals, Christoph Lehmann, Reinhold Haux, Jan Talmon, Dominik Aronsky, Nicolette de Keizer, Tze-Yun LEONG, and Charles Safran Presentation

Efficacy of communication support in collaborative online shopping: The moderating effect of task types, Keng SIAU, Fiona Fui-hoon NAH, and H. SHA Conference Proceeding Article

PDF

An empirical study on uncertainty identification in social media context, Zhongyu WEI, Junwen CHEN, Wei GAO, Binyang LI, Lanjun ZHOU, Yulan HE, and Kam-Fai WONG Conference Proceeding Article

PDF

Audit games, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, Ariel D. PROCACCIA, and Arunesh SINHA Conference Proceeding Article

PDF

Multi-view discriminant transfer learning, Pei Yang YANG and Wei GAO Conference Proceeding Article

Value Migration and Architectural Design Choices in Innovation Ecosystems: The Case of Cloud Computing, Richard TEE and C. Jason WOODARD Presentation

PDF

The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Presentation

PDF

Adaptive collective routing using gaussian process dynamic congestion models, Siyuan LIU, Yisong YUE, and Ramayya KRISHNAN Conference Proceeding Article

PDF

A Multi-objective Memetic Algorithm for Vehicle Resource Allocation in Sustainable Transportation Planning, Hoong Chuin LAU, Lucas AGUSSURJA, Shih-Fen CHENG, and Pang Jin TAN Conference Proceeding Article

PDF

An agent-based network analytic perspective on the evolution of complex adaptive supply chain networks, L. PONNAMBALAM, A. TAN, X. FU, X. F. YIN, Zhaoxia WANG, and R. S. GOH Conference Proceeding Article

PDF

An agent-based network analytic perspective on the evolution of complex adaptive supply chain networks, Loganathan PONNANBALAM, A. Tan, Xiuju FU, Xiaofeng YIN, Zhaoxia WANG, and Rick S. M. GOH Conference Proceeding Article

PDF

An empirical analysis of a network of expertise, LE TRUC VIET and Minh Thap NGUYEN Conference Proceeding Article

PDF

Applying search in an automatic contract-based testing tool, Alexey KOLESNICHENKO, Christopher M. POSKITT, and Bertrand MEYER Conference Proceeding Article

A Study of the Software-as-a-Service Business Model, Dan Ma and Abraham Seidmann Conference Paper

A Study of the Software-as-a-Service Business Model, Dan Ma and Abraham Seidmann Conference Paper

A Study of the Software-as-a-Service Business Model, Dan MA and Abraham Seidmann Conference Paper

PDF

Attribute-based encryption with verifiable outsourced decryption, Junzuo LAI, Robert H. DENG, Chaowen GUAN, and Jian WENG Journal Article

PDF

Automated Generation of Interaction Graphs for Value-Factored Decentralized POMDPs, William YEOH, Akshat KUMAR, and Shlomo Zilberstein Conference Proceeding Article

PDF

Best Upgrade Plans for Large Road Networks, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Click-boosting random walk for image search reranking, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Zheng-Jun ZHA, and Chong-Wah NGO Conference Proceeding Article

Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Paper

PDF

Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article

PDF

Cost-Sensitive Online Active Learning with application to malicious URL detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article

PDF

DelayFlow centrality for identifying critical nodes in transportation networks, Yew-Yih CHENG, Roy Ka Wei LEE, Ee-Peng LIM, and Feida ZHU Conference Proceeding Article

PDF

FloTra: Flower-shape trajectory mining for instance-specific parameter tuning, Lindawati LINDAWATI, Feida ZHU, and Hoong Chuin LAU Conference Paper

Hierarchical Parallel Algorithm for Modularity-Based Community Detection Using GPUs, Chun Yew CHEONG, Huynh Phung HUYNH, David LO, and Rick Siow Mong GOH Conference Proceeding Article

PDF

How many researchers does it take to make impact? Mining software engineering publication data for collaboration insights, Subhajit DATTA, Santonu SARKAR, Sajeev A. S. M., and Nishant KUMAR Conference Proceeding Article

PDF

Improving Patient Length-of-Stay in Emergency Department Through Dynamic Resource Allocation Policies, Kar Way TAN, Wei Hao TAN, and Hoong Chuin LAU Conference Proceeding Article

PDF

Incremental and accuracy-aware personalized pagerank through scheduled approximation, Fanwei ZHU, Yuan FANG, Kevin Chen-Chuan CHANG, and Jing YING Conference Proceeding Article

PDF

Integration of Social Media Technologies with ERP:A Prototype Implementation, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article

PDF

Interacting Knapsack Problem in Designing Resource Bundles, Truong Huy D. NGUYEN, Pradeep Reddy VARAKANTHAM, Hoong Chuin LAU, and Shih-Fen CHENG Conference Proceeding Article

PDF

Large scale online kernel classification, Jialei WANG, Peilin ZHAO, Steven C. H. HOI, Jinfeng ZHUANG, and Zhi-Yong LIU Conference Proceeding Article

PDF

Learning to name faces: A multimodal learning scheme for search-based face annotation, Dayong WANG, Steven C. H. HOI, Pengcheng WU, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article

PDF

Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack, Kai-Lung HUI, Seung-Hyun KIM, and QIU-HONG WANG Presentation

PDF

Multi-agent Orienteering Problem with Time-dependent Capacity Constraints, Cen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Conference Paper

PDF

Near-duplicate video retrieval: Current research and future trends, Jiajun LIU, Zi HUANG, Hongyun CAI, Heng Tao SHEN, Chong-wah NGO, and Wei WANG Journal Article

PDF

“Network-Theoretic” Queuing Delay Estimation in Theme Park Attractions, Ajay ARAVAMUDHAN, Archan MISRA, and Hoong Chuin LAU Conference Proceeding Article

PDF

Open source software development process model – A grounded theory approach, Keng SIAU and Y. TIAN Conference Proceeding Article

PDF

Parameter Learning for Latent Network Diffusion, Xiaojian WU, Akshat KUMAR, Daniel SHELDON, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Politics, sharing and emotion in microblogs, Tuan-Anh HOANG, William COHEN, Ee Peng LIM, Doug PIERCE, and David REDLAWSK Conference Proceeding Article

PDF

RiskVis: Supply chain visualization with risk management and real-time monitoring, Rick S. M. GOH, Zhaoxia WANG, Xiaofeng YIN, Xiuju FU, Loganathan PONNANBALAM, Sifei LU, and Xiaorong Li Conference Proceeding Article

PDF

Robust median reversion strategy for on-line portfolio selection, Dingjiang HUANG, Junlong ZHOU, Bin LI, Steven HOI, and Shuigeng ZHOU Conference Proceeding Article

PDF

Scalable randomized patrolling for securing rapid transit networks, Pradeep VARAKANTHAM, Hoong Chuin LAU, and Zhi YUAN Conference Proceeding Article

PDF

Self-organizing cognitive models for virtual agents, Yilin KANG and Ah-hwee TAN Conference Proceeding Article

Semantic overlay network for large-scale spatial information indexing, Zhiqiang ZOU, Yue WANG, Kai CAO, Tianshan QU, and Zhongmin WANG Journal Article

PDF

The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Conference Proceeding Article

PDF

Using contracts to guide the search-based verification of concurrent programs, Christopher M. POSKITT and Simon POULDING Conference Proceeding Article

PDF

USMMC: A self-contained model checker for UML state machines, Shuang LIU, Yang LIU, Jun SUN, Manchun ZHENG, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article

PDF

Vigilance adaptation in adaptive resonance theory, Lei MENG, Ah-hwee TAN, and Donald C. WINSCH Conference Proceeding Article

Link

Analyzing Auction and Bargaining Mechanisms in E-Procurement with Supply Quality Risk, He HUANG, Hongyan XU, Robert J. Kauffman, and Ning SUN Journal Article

PDF

Performance Measurement Design for a Parcel Delivery Company, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Proceeding Article

PDF

Active Learning with Expert Advice, Peilin ZHAO, Steven C. H. HOI, and Jinfeng ZHUANG Conference Proceeding Article

Analyzing Auction and Bargaining Mechanism Design in E-Procurement with Quality Verification and Risk Aversion., H. Huang, H. Xu, Robert John KAUFFMAN, and N. Sun Journal Article

An analysis of post-selection in automatic tuning, Zhi Yuan, Thomas Stuetzle, Marco Montes De Oca, and Hoong Chuin LAU Conference Paper

PDF

An Empirical Study of Adoption of Software Testing in Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, and Lingxiao Jiang Conference Paper

PDF

An empirical study of adoption of software testing in open source projects, Pavneet Singh KOCHHAR, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

An empirical study of bugs in software build systems, Xin XIA, Xiaozhen ZHOU, David LO, and Xiaoqiong ZHAO Conference Proceeding Article

Case study methodology in technology-focused Information Systems courses: Examining the students’ perspective, Ilse BAUMGARTNER Conference Proceeding Article

Coarse-grained parallel genetic algorithm applied to a vector based land use allocation optimization problem: The case study of Tongzhou Newtown, Beijing, China, Kai CAO and Xinyue YE Journal Article

PDF

Collective Diffusion Over Networks: Models and Inference, Akshat KUMAR, Daniel SHELDON, and Biplav SRIVASTAVA Conference Proceeding Article

PDF

Combining model checking and testing with an application to reliability prediction and distribution, Lin GUI, Jun SUN, Yang LIU, Yuanjie SI, Jin Song DONG, and Xinyu WANG Conference Proceeding Article

Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG, Junyu CHOY, and Nang Laik MA Conference Paper

Effective use of Data and Decision Analytics to Improve Order Distribution in a Supply Chain, Michelle Lee Fong CHEONG and Junyu CHOY Report

PDF

Improving tool support for software reverse engineering in a security context, Brendan CLEARY, Christoph TREUDE, Fernando FIGUEIRA FILHO, Margaret-Anne STOREY, and Martin SALOIS Conference Proceeding Article

PDF

Mining direct antagonistic communities in signed social networks, David LO, Didi SURIAN, Philips Kokoh PRASETYO, Zhang KUAN, and Ee Peng LIM Journal Article

PDF

MKBoost: A framework of multiple kernel boosting, Hao XIA and Steven C. H. HOI Journal Article

PDF

Orion: A software project search engine with integrated diverse software artifacts, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article

PDF

Platform Regulation on Seller Heterogeneity, Ruhai WU and Mei Lin Working Paper

PDF

Popularity, interoperability, and impact of programming languages in 100,000 open source projects, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article

PDF

PSyHCoS: Parameter synthesis for hierarchical concurrent real-time systems, Étienne ANDRÉ, Yang LIU, Jun SUN, Jin Song DONG, and Shang-Wei LIN Conference Proceeding Article

PDF

Real-life vehicle routing with non-standard constraints, Wee Leong Lee Conference Proceeding Article

PDF

Reviving dormant ties in an online social network experiment, Ee Peng LIM, Denzil CORREA, David LO, Michael FINEGOLD, and Feida ZHU Conference Proceeding Article

PDF

Shortlisting Top-K Assignments, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article

Software Internationalization and Localization: An Industrial Experience, Xin XIA, David LO, Feng ZHU, Xinyu WANG, and Bo ZHOU Conference Proceeding Article

PDF

Technique for Authenticating H.264/SVC Streams in Surveillance Applications, Wei ZHUO, Robert H. DENG, Jialie SHEN, Yongdong WU, Xuhua DING, and Swee Won LO Conference Proceeding Article

PDF

TESLA: An extended study of an energy-saving agent that leverages schedule flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Milind Tambe, and Burcin Becerik-Gerber Journal Article

PDF

The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection, Joseph Joo Keng CHAN, Kiat Wee TAN, Lingxiao JIANG, and Rajesh Krishna BALAN Conference Proceeding Article

The Determinants of Monetary Value of Virtual Goods: An Empirical Study for a Cross-section of MMORPGs, QIU-HONG WANG, Viktor Mayer-Schonberger, and Xue YANG Journal Article