Submissions from 2014
Leveraging Web 2.0 for Software Evolution, Yuan TIAN and David LO Book Chapter
Loki: A privacy-conscious platform for crowdsourced surveys, Thivya KANDAPPU, Vijay SIVARAMAN, Arik FRIEDMAN, and Roksana BORELI Conference Proceeding Article
Measuring and modelling the thermal performance of the Tamar Suspension Bridge using a wireless sensor network, Nicholas DE BATTISTA, James M. W. BROWNJOHN, Hwee-Pink TAN, and Ki Young KOO Journal Article
Mining Long Patterns, Feida ZHU Book Chapter
Mining weakly labeled web facial images for search-based face annotation, Dayong WANG, Steven C. H. HOI, Ying HE, and Jianke ZHU Journal Article
Mini-track introduction: Information economics, competition, regulation, law and society, Eric K. CLEMONS, Robert John KAUFFMAN, and Thomas A. WEBER Conference Proceeding Article
Multi-agent orienteering problem with time-dependent capacity constraints, Chen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Journal Article
On Empirical Validation of Compactness Measures for Electoral Redistricting and Its Significance for Application of Models in the Social Sciences, Christine CHOU, Steven O. KIMBROUGH, Frederic H. MURPHY, John SULLIVAN-FEDOCK, and C. Jason WOODARD Journal Article
Online Multiple Kernel Similarity Learning for Visual Search, Hao Xia, Chu Hong HOI, Rong Jin, and Peilin Zhao Journal Article
Online portfolio selection: A survey, Bin LI and Steven C. H. HOI Journal Article
On the security of auditing mechanisms for secure cloud storage, Yong YU, Lei NIU, Guomin YANG, Yi MU, and Willy SUSILO Journal Article
On Understanding Diffusion Dynamics of Patrons at a Themepark, Jiali DU, Akshat KUMAR, and Pradeep Varkantham
Panel Data Analysis Via Variable Selection and Subject Clustering, Haibing LU, Shengsheng HUANG, Yingjiu LI, and Yanjiang YANG Book Chapter
Personalizing Software Development Practice Using Mastery-based Coaching, Chris BOESCH and Sandra BOESCH Conference Paper
Platform Pricing with Endogenous Network Effects, Mei Lin, Ruhai Wu, and Wen Zhou Working Paper
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data, Hwee Hwa PANG and Xuhua DING Journal Article
Real Time Process Compliance Checking using Nomenclature Approach, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Paper
Reshaping Society through Analytics, Collaboration, and Decision Support: Role of Business Intelligence and Social Media, Lee Fong Michelle Cheong and Junyu Choy Book Chapter
RFID Security and Privacy, Yingjiu Li, Huijie Robert Deng, and Elisa Bertino Book
Risk balance defense approach against intrusions for network server, Chengpo Mu, Meng Yu, Yingjiu Li, and Wanyu Zang Journal Article
Risk minimization of disjunctive temporal problem with uncertainty, Hoong Chuin LAU and Tuan Anh HOANG Conference Proceeding Article
Running and Chasing: The Competition between Paid Search Marketing and Search Engine Optimization, Kai LI, Mei LIN, Zhangxi LIN, and Bo XING Conference Proceeding Article
Sherlock: Microenvironment sensing for smartphones, Zheng YANG, Longfei SHANGGUAN, Weixi GU, Zimu ZHOU, Chenshu WU, and Yunhao LIU Journal Article
Solving Risk-Sensitive Stochastic Orienteering Problems using Optimization and Local Search, Pradeep Reddy VARAKANTHAM, Akshat KUMAR, Hoong Chuin LAU, and William Yeoh Journal Article
Solving Selfish Routing Problems with Involuntary Movements and Bounded Rationality, Pradeep Reddy VARAKANTHAM, Asrar Ahmed, and Shih-Fen Cheng Working Paper
Strategic Decision Support System using Heuristic Algorithm for Practical Outlet Zones Allocation to Dealers in a Beer Supply Distribution Network, Michelle Lee Fong CHEONG Conference Proceeding Article
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert John KAUFFMAN, Jun LIU, and Dan MA
The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna Balan, Youngki Lee, Kiat Wee Tan, and Archan Misra Conference Paper
The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna BALAN, Youngki LEE, Kiat Wee TAN, and Archan MISRA Conference Proceeding Article
The impact of corporate social responsibility activities on brand evaluation, M. TIAN, C. LI, and Keng SIAU Journal Article
Twitter microblog sentiment analysis, Guangxia LI, Kuiyu CHANG, and Steven C. H. HOI Book Chapter
Understanding the Paradigm Shift in Computational Social Science in the Presence of Big Data, M. Chang, Robert John Kauffman, and Y.O Kwon Journal Article
WenZher: Comprehensive Vertical search for Healthcare Domain, Liqiang Nie, Tao Li, Mohammad Akbari, Jialie SHEN, and Tat-Seng CHUA Conference Proceeding Article
Submissions from 2013
Designing Optimal Innovation Portfolio, Arcot Desai NARASIMHALU Conference Paper
Adaptive computer‐generated forces for simulator‐based training, Expert Systems with Applications, Teck-Hou TENG, Ah-hwee TAN, and Loo-Nin TEOW Journal Article
A Dynamic Programming Approach to Achieving an Optimal End State along a Serial Production Line, Shih-Fen CHENG, Blake E. Nicholson, Marina A. Epelman, Daniel J. Reaume, and Robert L. Smith Journal Article
A Local Social Network Approach for Research Management, Xiaoyan LIU, Zhiling GUO, Zhenjiang LIN, and Jian MA Journal Article
An Agent-based Simulation Approach to Experience Management in Theme Parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article
An efficient partial shape matching algorithm for 3D tooth recognition, Zhiyuan ZHANG, Xin ZHONG, Sim Heng ONG, and Kelvin W. C. FOONG Conference Proceeding Article
An integrated model of team motivation and worker skills for a computer-based project management simulation, Wee Leong Lee Conference Proceeding Article
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks, Fengtong WEN, Willy SUSILO, and Guomin YANG Journal Article
A simple integration of social relationship and text data for identifying potential customers in microblogging, Guansong PANG, Shengyi JIANG, and Dongyi CHEN Conference Proceeding Article
Coupling alignments with recognition for still-to-video face recognition, Zhiwu HUANG, X. ZHAO, S. SHAN, R. WANG, and X. CHEN Conference Proceeding Article
Damaged Services: Why Interruptible Spot-Priced Cloud Computing Services are Worthwhile to Offer with Uninterruptible Reserved Services, Jianhui HUANG, Robert J. KAUFFMAN, and Dan MA Conference Paper
Decision trees to model the impact of disruption and recovery in supply chain networks, Loganathan PONNANBALAM, L. WENBIN, Xiuju FU, Xiaofeng YIN, Zhaoxia WANG, and Rick S. M. GOH Conference Proceeding Article
Dense image correspondence under large appearance variations, Linlin LIU, Kok-Lim LOW, and Wen-yan LIN Conference Proceeding Article
Dynamic joint sentiment-topic mode, Yulan HE, Chenghua LIN, Wei GAO, and Kam-Fai WONG Journal Article
Dynamic Platform Pricing on Innovative Products, Mei LIN and Xiajun Pan Working Paper
Exposing and mitigating privacy loss in crowdsourced survey platforms, Thivya KANDAPPU, Vijay SIVARAMAN, Arik FRIEDMAN, and Roksana BORELL Conference Proceeding Article
Factors influencing research contributions and researcher interactions in software engineering: An empirical study, Subhajit DATTA, A. S. M. Sajeev, Santonu SARKAR, and Nishant KUMAR Conference Proceeding Article
Firm strategy and the Internet in U.S. commercial banking, Kim Huat Goh and Robert J. Kauffman Journal Article
Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks, Luiz Felipe VIERA, Mario GERLA, and Archan MISRA Journal Article
Hibernating Process: Modeling Mobile Calls at Multiple Scales, Siyuan LIU, Lei LI, and Ramayya KRISHNAN Conference Proceeding Article
Improving patient length-of-stay in emergency department through dynamic queue management, Kar Way TAN, Hoong Chuin LAU, and Francis Chun Yue LEE Conference Proceeding Article
Modeling Preferences with Availability Constraints, Bingtian DAI and Hady W. LAUW Conference Proceeding Article
Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat CHUA, Richard Jayadi Oentaryo, and Ee Peng LIM Conference Proceeding Article
Partial least squares regression on Grassmannian manifold for emotion recognition, M. LIU, R. WANG, Zhiwu HUANG, S. SHAN, and X. CHEN Conference Proceeding Article
Query-document-dependent fusion: A case study of multimodal music retrieval, Zhonghua LI, Bingjun ZHANG, Yi YU, Jialie SHEN, and Ye WANG Journal Article
RFID Security and Privacy, Yingjiu LI, Robert H. DENG, and Elisa BERTINO Book
Social media for supply chain risk management, Xiuju FU, Rick S. M. GOH, J. C. Tong, Loganathan PONNANBALAM, Xiaofeng YIN, Zhaoxia WANG, H. Y. Xu, and Sifei LU Conference Proceeding Article
The influence of online word-of-mouth on long tail formation, Bin GU, Qian TANG, and Andrew B. WHINSTON Journal Article
TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Towards a hybrid framework for detecting input manipulation vulnerabilities, Sun DING, Hee Beng Kuan TAN, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article
Two Formulas for Success in Social Media: Social Learning and Network Effects, Liangfei QIU, Qian TANG, and Andrew B. Whinston Conference Paper
Unsupervised medical image classification by combining case-based classifiers, Thien Anh Dinh, Tomi Silander, Bolan Su, Tianxia Gong, Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang Lee, Chew Lim Tan, and Tze-Yun LEONG Conference Proceeding Article
Defending against heap overflow by using randomization in nested virtual clusters, Chee Meng TEY and Debin GAO Conference Proceeding Article
Adaptive regret minimization in bounded-memory games, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, and Arunesh SINHA Conference Paper
Achieving revocable fine-grained cryptographic access control over cloud data, Yanjiang YANG, Xuhua DING, Haibing LU, Zhiguo WAN, and Jianying ZHOU Conference Proceeding Article
Adaptable ciphertext-policy attribute-based encryption, Junzuo LAI, Robert H. DENG, Yanjiang YANG, and Jian WENG Conference Proceeding Article
A link-bridged topic model for cross-domain document classification, Pei YANG, Wei GAO, Qi TAN, and Kam-Fai WONG Journal Article
An agent-based simulation approach to experience management in theme parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Presentation
A scalable approach for malware detection through bounded feature space behavior modeling, Mahinthan CHANDRAMOHAN, Hee Beng Kuan TAN, Lionel C BRIAND, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article
A Social Network-Empowered Research Analytics Framework for Project Selection, Thushari SILVA, Zhiling GUO, Jian MA, Hongbing JIANG, and Huaping CHEN Journal Article
Assessing the Moderating Effect of Consumer Product Knowledge and Online Shopping Experience on using Recommedation Agents for Customer Loyalty, Victoria Y. YOON, R. Eric HOSTLER, Zhiling GUO, and Tor GUIMARAES Journal Article
Automatically partition software into least privilege components using dynamic data dependency analysis, Yongzheng WU, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Automatic Recommendation of API Methods from Feature Requests, Ferdian THUNG, Shaowei WANG, David LO, and Julia LAWALL Conference Proceeding Article
Budgeted personalized incentive approaches for smoothing congestion in resource networks, Pradeep VARAKANTHAM, Na FU, William YEOH, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article
Challenges and opportunities in taxi fleet anomaly detection, Rijurekha SEN and Rajesh Krishna BALAN Conference Proceeding Article
Classification in P2P Networks with Cascade Support Vendor Machines, Hock Hee ANG, Vivekanand Gopalkrishnan, Steven C. H. HOI, and Wee-Keong NG Journal Article
Constraint-based automatic symmetry detection, Shao Jie ZHANG, Jun SUN, Chengnian SUN, Yang LIU, Junwei MA, and Jin Song DONG Conference Proceeding Article
Covariance Selection by Thresholding the Sample Correlation Matrix, Binyan JIANG Journal Article
Efficient Index-Based Approaches for Skyline Queries in Location-Based Applications, Ken C. K. LEE, Baihua ZHENG, Cindy CHEN, and Chi-Yin CHOW Journal Article
Efficient lossy trapdoor functions based on subgroup membership assumptions, Haiyang XUE, Bao LI, Xianhui LU, Dingding JIA, and Yamin LIU Conference Proceeding Article
Electroweak measurements in electron-positron collisions at W-boson-pair energies at LEP, S. SCHAEL and Manoj THULASIDAS Journal Article
From RSSI to CSI: Indoor localization via channel response, Zheng YANG, Zimu ZHOU, and Yunhao LIU Journal Article
Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub, Tegawende F. BISSYANDE, David LO, Lingxiao JIANG, Laurent REVEILLERE, Jacques KLEIN, and Yves LE TRAON Conference Proceeding Article
Information vs interaction: An alternative user ranking model for social networks, Wei XIE, Ai Phuong HOANG, Feida ZHU, and Ee Peng LIM Conference Proceeding Article
Mining Branching-Time Scenarios, Dirk FAHLAND, David LO, and Shahar MAOZ Conference Proceeding Article
Mining fraudulent patterns in online advertising, Richard J. OENTARYO and Ee-peng LIM Conference Paper
Multimedia modeling, Chong-Wah NGO, Klaus SCHOEFFMANN, Yiannis ANDREOPOULOS, and Christian BREITENEDER Journal Article
Optimization Approaches for Solving Chance Constrained Stochastic Orienteering Problems, Pradeep VARAKANTHAM and Akshat KUMAR Conference Proceeding Article
Predicting best answerers for new questions: An approach leveraging topic modeling and collaborative voting, Yuan TIAN, Pavneet Singh Kochhar, Ee Peng LIM, Feida ZHU, and David LO Conference Proceeding Article
Predicting User's Political Party using Ideological Stances, Swapna GOTTOPATI, Minghui QIU, Liu YANG, Feida ZHU, and Jing JIANG Conference Proceeding Article
Search of small objects by topology matching, context modeling, and pattern mining, Wei ZHANG and Chong-wah NGO Conference Paper
Second Order Online Collaborative Filtering, Jing Lu, Steven C. H. HOI, Jialei Wang, and Peilin Zhao Conference Proceeding Article
Self-blindable credential: Towards anonymous entity authentication upon resource-constrained devices, Yanjiang YANG, Xuhua DING, Haibing LU, Jian WENG, and Jianying ZHOU Conference Proceeding Article
Social informatics, Adam JATOWT, Ee-peng LIM, Ying DING, Asako MIURA, Taro TEZUKA, Gael DIAS, Katsumi TANAKA, Andrew J. FLANAGIN, and Bing Tian DAI Edited Conference Proceeding
Social Listening for Customer Acquisition, Juan DU, Biying TAN, Feida ZHU, and Ee-Peng LIM Conference Proceeding Article
Social-Loc: Improving indoor localization with social sensing, Jung-Hyun JUN, Yu GU, Long CHENG, Banghui LU, Jun SUN, Ting ZHU, and Jianwei NIU Conference Proceeding Article
Social sensing for urban crisis management: The case of Singapore Haze, Philips Kokoh PRASETYO, Ming GAO, Ee Peng LIM, and Christie N. SCOLLON Conference Proceeding Article