The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2012

PDF

Virtualization based password protection against malware in untrusted operating systems, Yueqiang CHENG and Xuhua DING Conference Proceeding Article

PDF

Visualizing media bias through Twitter, Jisun AN, Meeyoung CHA, GUMMADI, Krishna, Jon CROWCROFT, and Daniele QUERIA Conference Proceeding Article

PDF

What does software engineering community microblog about?, Yuan TIAN, Palakorn Achananuparp, Ibrahim Nelman Lubis, David LO, and Ee Peng LIM Conference Proceeding Article

PDF

When a friend in Twitter is a friend in life, Wei XIE, Cheng LI, Feida ZHU, Ee-Peng LIM, and Xueqing GONG Conference Proceeding Article

PDF

Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports, Jian ZHOU, Hongyu ZHANG, and David LO Conference Proceeding Article

PDF

WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment, Christoph TREUDE, Patrick GORMAN, Lars GRAMMEL, and Margaret-Anne STOREY Conference Proceeding Article

PDF

Spatial Queries in Wireless Broadcast Environments [Keynote Speech], Kyriakos MOURATIDIS Conference Proceeding Article

Link

Adaptive Learning in Service Operations, T LI and Robert J. Kauffman Journal Article

À la carte pricing and price elasticity of demand in air travel, N. Granados, Robert John KAUFFMAN, H. Lai, and H.-C. Lin Journal Article

PDF

Coercion Resistance in Authentication Responsibility Shifting, Payas GUPTA, Xuhua DING, and Debin GAO Conference Proceeding Article

Delivering SMS-based mobile services using SOA, Randall E. DURAN and DO Randall E. Book Chapter

Link

Do links matter? An investigation of the impact of consumer feedback, recommendation networks, and price bundling on sales, Nan HU, Gaoliang TIAN, Ling LIU, Bin LIANG, and Yunjun GAO Journal Article

PDF

#EpicPlay: Crowd-sourcing sports video highlights, Anthony TANG and Sebastian BORING Conference Proceeding Article

PDF

Expressive CP-ABE with partially hidden access structures, Junzuo LAI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article

Link

IT-Supported a la Carte Pricing in Air Travel: A Test of the Strategic Decommoditization Hypothesis, N. F. GRANADOS, Robert J. Kauffman, H. C. Lai, and H. C. Lin Journal Article

PDF

Method and apparatus for rapid identification of column heterogeneity, Bing Tian DAI, Nikolaos KOUDAS, Beng Chin OOI, Divesh SRIVASTAVA, and Suresh VENKATASUBRANMANIAN Patent

PDF

Organizing User Search Histories, Heasoo HWANG, Hady W. LAUW, Lise GETOOR, and Alexandros NTOULAS Journal Article

PDF

PAMR: Passive-Aggressive Mean Reversion Strategy for Portfolio Selection, Bin LI, Peilin ZHAO, Steven C. H. HOI, and Vivekanand Gopalkrishnan Journal Article

PDF

Spalendar: Visualizing a group's calendar events over a geographic space on a public display, Chen XIANG, Sebastian BORING, Sheelagh CARPENDALE, Anthony TANG, and Saul GREENBERG Conference Poster

PDF

Spatial Queries in Wireless Broadcast Environments [Keynote Speech], Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Student usage patterns and perceptions for differentiated lab exercises in an undergraduate programming course, Heng Ngee MOK Journal Article

PDF

Vignette: Interactive texture design and manipulation with freeform gestures for pen-and-ink illustration, Rubaiat Habib KAZI, Takeo Igarashi, Shengdong ZHAO, and Richard C. DAVIS Conference Proceeding Article

Managing Successive Generation Product Diffusion in the Presence of Strategic Consumers, Zhiling GUO Presentation

Link

An Automaton-based Index Scheme for On-demand XML Data Broadcast, Weiwei SUN, Peng LIU, Jingjing WU, Yongrui QIN, and Baihua ZHENG Conference Proceeding Article

Descriptor Extraction and Matching using Visual Attention Region for CDVS, Lai-Tee CHEOK, Jaeyong SONG, and Kyungmo PARK Report

PDF

Detecting Extreme Rank Anomalous Collections, Hanbo DAI, Feida ZHU, Ee-Peng LIM, and Hwee Hwa PANG Conference Proceeding Article

PDF

Evaluation of Different Electronic Product Code Discovery Service Models, Su Mon KYWE, Jie SHI, Yingjiu LI, and Raghuwanshi KAILASH Journal Article

PDF

HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing, Zhiguo WAN, Jun'e LIU, and Robert H. DENG Journal Article

PDF

Message Passing Algorithms for MAP Estimation using DC Programming, Akshat KUMAR, Shlomo ZILBERSTEIN, and Marc TOUSSAINT Conference Proceeding Article

PDF

Mining Social Dependencies in Dynamic Interaction Networks, Freddy Chong-Tat CHUA, Hady W. LAUW, and Ee Peng LIM Conference Paper

PDF

Motivated learning for the development of autonomous agents, Janusz A. STARZYK, James T. GRAHAM, Pawel RAIF, and Ah-hwee TAN Journal Article

PDF

Obfuscating the Topical Intention in Enterprise Text Search, Hwee Hwa PANG, Xiaokui XIAO, and Jialie SHEN Conference Proceeding Article

PDF

Provable de-anonymization of large datasets with sparse dimensions, Anupam DATTA, Divya SHARMA, and Arunesh SINHA Conference Proceeding Article

Scalable Activity-Travel Pattern Monitoring Framework for Large-scale City Environment, Youngki Lee, SangJeong Lee, Byoungjip Kim, Jungwoo Kim, Yunseok Rhee, and Junehwa Song Journal Article

PDF

Scalable activity-travel pattern monitoring framework for large-scale city environment, Youngki LEE, SangJeong LEE, Byoungjip KIM, Jungwoo KIM, Yunseok Rhee, and Junehwa SONG Journal Article

PDF

Setting Up a Low-cost Lab Management System for a Multi-purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee MOK and Wee Kiat TAN Journal Article

PDF

Structural analysis in multi-relational social networks, Bing Tian DAI, Freddy Chong Tat CHUA, and Ee-peng LIM Conference Proceeding Article

Link

Two-level Path Authentication in EPCglobal Network, Hongbing WANG, Yingjiu LI, Zhongyang ZHANG, and Zhenfu CAO Conference Proceeding Article

Link

Understanding Task-driven Information Flow in Collaborative Networks, Gengxin MIAO, Shu TAO, Winnie CHENG, Randy Moulic, Louise E. Moser, David LO, and Xifeng YAN Conference Proceeding Article

Content Contribution in Social Media: A Dynamic Structural Model Approach, Qian TANG, Bin GU, and Andrew B. WHINSTON Presentation

PDF

A Comparative Study of Cyberattacks, Seung Hyun KIM, QIU-HONG WANG, and Johannes B. ULLRICH Journal Article

Link

An Efficient Dataflow Execution Method for Mobile Context Monitoring Applications, Younghyun JU, Chulhong MIN, Youngki LEE, Jihyun YU, and Junehwa SONG Conference Proceeding Article

An Efficient Dataflow Execution Method for Mobile Context Monitoring Applications, Younghyun Ju, Chulhong Min, Youngki Lee, Jihyun Yu, and Junehwa Song Conference Paper

PDF

Boosting web video categorization with contextual information from social web, Xiao WU, Chong-wah NGO, Yi-Ming ZHU, and Qiang PENG Journal Article

PDF

Business and data analytics: New innovations in the management of e-commerce, Robert J. KAUFFMAN, Jaideep SRIVASTAVA, and Jamshid VAYGHAN Journal Article

Business Process Management and Six Sigma: Leveraging the Synergistic Relationship, Suresh SUBRAMANIAM, Venky Shankararaman, K. V. Krishnankutty, and Ravi Chinta Book Chapter

Business process management in financial services, Randall E. DURAN Book Chapter

PDF

Coordinating occupant behavior for building energy and comfort management using multi-agent systems, Laura KLEIN, Jun Young Kwak, Geoffrey Kavulya, Farrokh Jazizadeh, Burcin Becerik-Gerber, Pradeep VARAKANTHAM, and Milind Tambe Journal Article

PDF

Dynamic lookahead mechanism for conserving power in multi-player mobile games, Karthik THIRUGNANAM, Bhojan Anand, Jeena Sebastian, Pravein Kannan, Akhihebbal L. Ananda, Rajesh Krishna BALAN, and Mun Choon CHAN Conference Proceeding Article

PDF

Hierarchical fuzzy logic system for implementing maintenance schedules of offshore power systems, C. S. CHANG, Zhaoxia WANG, Fan YANG, and W. W. TAN Journal Article

PDF

Hoare-style verification of graph programs, Christopher M. POSKITT and Detlef PLUMP Journal Article

PDF

HuMan: Creating Memorable Fingerprints of Mobile Users, Gupta PAYAS, Kiat Wee TAN, Narayanasamy RAMASUBBU, David LO, Debin GAO, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Improved Duplicate Bug Report Identification, Yuan TIAN, Chengnian SUN, and David LO Conference Proceeding Article

PDF

MobiCon: A mobile context-monitoring platform, Youngki LEE, S. S. Iyengar, Chulhong MIN, Younghyun JU, Taiwoo PARK, Jinwon LEE, Yunseok RHEE, and Junehwa SONG Journal Article

MobiCon: Mobile Context Monitoring Platform, Youngki Lee, S. S. Iyengar, Chulhong Min, Younghyun Ju, Taiwoo Park, Jinwon Lee, Yunseok Rhee, and Junehwa Song Journal Article

PDF

Quality and leniency in online collaborative rating systems, Hady W. LAUW, Ee Peng LIM, and Ke WANG Journal Article

PDF

ROAD: A New Spatial Object Search Framework for Road Networks, Ken C. K. LEE, Wang-Chien LEE, Baihua ZHENG, and Yuan TIAN Journal Article

PDF

Scenario-Based and Value-Based Specification Mining: Better Together, David LO and Shahar MAOZ Journal Article

PDF

Utility-based Bandwidth Adaptation in Mission-Oriented Wireless Sensor Networks, Sharanya ESWARAN, Archan MISRA, Flavio BERGAMASCHI, and Thomas LA PORTA Journal Article

Verbal coordination in first person shooter games, Anthony TANG, Jonathan MASSEY, Nelson WONG, Derek REILLY, and W. Keith EDWARDS Conference Proceeding Article

PDF

SecDS: A Secure EPC Discovery Services System in EPCglobal Network, Jie SHI, Darren SIM, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

ARIVU: Making Networked Mobile Games Green: A Scalable Power-Aware Middleware, Anand BHOJAN, Ananda L. Akhihebbal L., Mun Choon CHAN, and Rajesh Krishna BALAN Journal Article

PDF

Does Complexity Deter Customer-Focus?, Sendil K. ETHIRAJ, Narayanasamy RAMASUBBU, and M. S. Krishnan Journal Article

PDF

Extreme learning machine terrain-based navigation for unmanned aerial vehicles, Ee May KAN, Meng Hiot LIM, Yew Soon ONG, Ah-hwee TAN, and Swee Ping YEO Journal Article

PDF

Manipulation of Online Reviews: An Analysis of Ratings, Readability, and Sentiments, Nan HU, Indranil BOSE, Noi Sian KOH, and Ling LIU Journal Article

PDF

Mitigating the true cost of advertisement-supported "free" mobile applications, Azeem J. KHAN, Vigneshwaran SUBBARAJU, Archan MISRA, and Srinivasan SESHAN Conference Proceeding Article

PDF

On Limitations of Designing Usable Leakage-Resilient Password Systems: Attacks, Principles and Usability, Qiang YAN; Jin HAN; Yingjiu LI; and Huijie, Robert DENG Conference Proceeding Article

Link

Query Answer Authentication, Hwee Hwa PANG and Kian-Lee TAN Book

PDF

Summarizing rushes videos by motion, object, and event understanding, Feng WANG and Chong-wah NGO Journal Article

PDF

The social network of software engineering research, Subhajit DATTA, Nishant KUMAR, and Santonu SARKAR Conference Proceeding Article

PDF

Towards fine-grained radio-based indoor location, Jie XIONG and Kyle JAMIESON Conference Proceeding Article

Using Visual Attention Region for Compact Descriptor for Visual Search, Lai-Tee CHEOK, Jaeyong SONG, and Kyungmo PARK Report

Video Evaluation Criteria for Compact Descriptor for Visual Search, Jaeyong SONG, Lai Tee Cheok, and Kyungmo PARK Report

PDF

Work item tagging: Communicating concerns in collaborative software development, Christoph TREUDE and Margaret-Anne STOREY Journal Article

PDF

Formal modeling and validation of Stateflow diagrams, Chunqing CHEN, Jun SUN, Yang LIU, Jin Song DONG, and Manchun ZHENG Journal Article

Adaptive Collision Resolution for Efficient RFID Tag Identification, Yung-Chun CHEN, Kuo-Hui YEH, Nai-Wei LO, Yingjiu LI, and Enrico WINATA Journal Article

PDF

A Fuzzy Logic Multi-Criteria Decision Framework for Selecting IT Service Providers, Amir KARAMI and Zhiling GUO Conference Proceeding Article

Link

A Generic Construction of Accountable Decryption and Its Applications, Xuhua ZHOU, Xuhua DING, and Kefei CHEN Conference Proceeding Article

PDF

A hybridized Lagrangian relaxation and simulated annealing method for the course timetabling problem, Aldy GUNAWAN and Kim Leng POH Journal Article

PDF

A new efficient optimistic fair exchange protocol without random oracles, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article

PDF

An improved K-nearest-neighbor algorithm for text categorization, Shengyi JIANG, Guansong PANG, Meiling WU, and Limin KUANG Journal Article

Link

Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems, Qiang YAN, Yingjiu LI, and Robert H. DENG Journal Article

PDF

A Sentiment Analysis of Singapore Presidential Election 2011 using Twitter Data with Census Correction, Murphy Junyu CHOY, Michelle Lee Fong CHEONG, Nang Laik MA, and Ping Shung KOO Report

A Survey on Privacy Frameworks for RFID Authentication, Chunhua SU; Yingjiu LI; Yunlei ZHAO; Huijie, Robert DENG; Yiming ZHAO; and Jianying ZHOU Journal Article

PDF

A survey on privacy frameworks for RFID authentication, Chunhua SU, Yingjiu LI, Yunlei ZHAO, Robert H. DENG, Yiming ZHAO, and Jianying ZHOU Journal Article

PDF

Consumer-driven innovation management, Arcot Desai NARASIMHALU and Shekhar MITRA Book Chapter

PDF

Content Contribution in Social Media: The Case of YouTube, Qian TANG, Bin GU, and Andrew B. WHINSTON Conference Proceeding Article

Link

Detecting node replication attacks in mobile sensor networks: theory and approaches, Wen Tao ZHU, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article

Link

Detecting node replication attacks in wireless sensor networks: a survey, Wen Tao ZHU, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article

Do Hacker Forums Contribute to Security Attacks?, QIU-HONG WANG, Wei T. YUE, and Kai-Lung HUI Conference Proceeding Article

PDF

Dynamic Secure Cloud Storage with Provenance, Sherman S. M. CHOW, Cheng-Kang CHU, Xinyi HUANG, Jianying ZHOU, and Robert H. DENG Book Chapter

Empirical comparison of 3-D virtual world and face-to-face classroom for higher education, Xiaofeng CHEN, Keng SIAU, and Fiona Fui-hoon NAH Journal Article

PDF

Evaluating the use of a mobile annotation system for geography education, Dion Hoe-Lian GOH, Khasfariyati Razikin, Chei Sian LEE, Ee Peng LIM, Kalyani CHATTERJEA, and Chew-Hung CHANG Journal Article

Link

Event History, Spatial Analysis and Count Data Methods for Empirical Research in IS, Robert J. KAUFFMAN, A. A. Techatassanasoontorn, and B. WANG Journal Article

Link

Identification of Demand through Statistical Distribution Modeling for Improved Demand Forecasting, Murphy CHOY and Michelle Lee Fong CHEONG Journal Article

PDF

Imbalance Challenge of Enacting Information Privacy Safeguards in Healthcare: A Grounded Theory Approach, Rachida Parks, Heng XU, and Chao-Hsien CHU Conference Paper

Link

Information Extraction from Text, Jing JIANG Book Chapter

PDF

Information Extraction from Text, Jing JIANG Book Chapter

Integrating the Cloud-Scenarios and Solutions, Venky SHANKARARAMAN and Eng Kit Lum Book Chapter

IT-Supported a la Carte Pricing in Air Travel: A Test of the Strategic Decommoditization Hypothesis, N.F. Granados, Robert John Kauffman, H.C. Lai, and H.C. Lin Journal Article