Submissions from 2012
Virtualization based password protection against malware in untrusted operating systems, Yueqiang CHENG and Xuhua DING Conference Proceeding Article
Visualizing media bias through Twitter, Jisun AN, Meeyoung CHA, GUMMADI, Krishna, Jon CROWCROFT, and Daniele QUERIA Conference Proceeding Article
What does software engineering community microblog about?, Yuan TIAN, Palakorn Achananuparp, Ibrahim Nelman Lubis, David LO, and Ee Peng LIM Conference Proceeding Article
When a friend in Twitter is a friend in life, Wei XIE, Cheng LI, Feida ZHU, Ee-Peng LIM, and Xueqing GONG Conference Proceeding Article
Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports, Jian ZHOU, Hongyu ZHANG, and David LO Conference Proceeding Article
WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment, Christoph TREUDE, Patrick GORMAN, Lars GRAMMEL, and Margaret-Anne STOREY Conference Proceeding Article
Spatial Queries in Wireless Broadcast Environments [Keynote Speech], Kyriakos MOURATIDIS Conference Proceeding Article
Adaptive Learning in Service Operations, T LI and Robert J. Kauffman Journal Article
À la carte pricing and price elasticity of demand in air travel, N. Granados, Robert John KAUFFMAN, H. Lai, and H.-C. Lin Journal Article
Coercion Resistance in Authentication Responsibility Shifting, Payas GUPTA, Xuhua DING, and Debin GAO Conference Proceeding Article
Delivering SMS-based mobile services using SOA, Randall E. DURAN and DO Randall E. Book Chapter
Do links matter? An investigation of the impact of consumer feedback, recommendation networks, and price bundling on sales, Nan HU, Gaoliang TIAN, Ling LIU, Bin LIANG, and Yunjun GAO Journal Article
#EpicPlay: Crowd-sourcing sports video highlights, Anthony TANG and Sebastian BORING Conference Proceeding Article
Expressive CP-ABE with partially hidden access structures, Junzuo LAI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article
IT-Supported a la Carte Pricing in Air Travel: A Test of the Strategic Decommoditization Hypothesis, N. F. GRANADOS, Robert J. Kauffman, H. C. Lai, and H. C. Lin Journal Article
Method and apparatus for rapid identification of column heterogeneity, Bing Tian DAI, Nikolaos KOUDAS, Beng Chin OOI, Divesh SRIVASTAVA, and Suresh VENKATASUBRANMANIAN Patent
Organizing User Search Histories, Heasoo HWANG, Hady W. LAUW, Lise GETOOR, and Alexandros NTOULAS Journal Article
PAMR: Passive-Aggressive Mean Reversion Strategy for Portfolio Selection, Bin LI, Peilin ZHAO, Steven C. H. HOI, and Vivekanand Gopalkrishnan Journal Article
Spalendar: Visualizing a group's calendar events over a geographic space on a public display, Chen XIANG, Sebastian BORING, Sheelagh CARPENDALE, Anthony TANG, and Saul GREENBERG Conference Poster
Spatial Queries in Wireless Broadcast Environments [Keynote Speech], Kyriakos MOURATIDIS Conference Proceeding Article
Student usage patterns and perceptions for differentiated lab exercises in an undergraduate programming course, Heng Ngee MOK Journal Article
Vignette: Interactive texture design and manipulation with freeform gestures for pen-and-ink illustration, Rubaiat Habib KAZI, Takeo Igarashi, Shengdong ZHAO, and Richard C. DAVIS Conference Proceeding Article
Managing Successive Generation Product Diffusion in the Presence of Strategic Consumers, Zhiling GUO Presentation
An Automaton-based Index Scheme for On-demand XML Data Broadcast, Weiwei SUN, Peng LIU, Jingjing WU, Yongrui QIN, and Baihua ZHENG Conference Proceeding Article
Descriptor Extraction and Matching using Visual Attention Region for CDVS, Lai-Tee CHEOK, Jaeyong SONG, and Kyungmo PARK Report
Detecting Extreme Rank Anomalous Collections, Hanbo DAI, Feida ZHU, Ee-Peng LIM, and Hwee Hwa PANG Conference Proceeding Article
Evaluation of Different Electronic Product Code Discovery Service Models, Su Mon KYWE, Jie SHI, Yingjiu LI, and Raghuwanshi KAILASH Journal Article
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing, Zhiguo WAN, Jun'e LIU, and Robert H. DENG Journal Article
Message Passing Algorithms for MAP Estimation using DC Programming, Akshat KUMAR, Shlomo ZILBERSTEIN, and Marc TOUSSAINT Conference Proceeding Article
Mining Social Dependencies in Dynamic Interaction Networks, Freddy Chong-Tat CHUA, Hady W. LAUW, and Ee Peng LIM Conference Paper
Motivated learning for the development of autonomous agents, Janusz A. STARZYK, James T. GRAHAM, Pawel RAIF, and Ah-hwee TAN Journal Article
Obfuscating the Topical Intention in Enterprise Text Search, Hwee Hwa PANG, Xiaokui XIAO, and Jialie SHEN Conference Proceeding Article
Provable de-anonymization of large datasets with sparse dimensions, Anupam DATTA, Divya SHARMA, and Arunesh SINHA Conference Proceeding Article
Scalable Activity-Travel Pattern Monitoring Framework for Large-scale City Environment, Youngki Lee, SangJeong Lee, Byoungjip Kim, Jungwoo Kim, Yunseok Rhee, and Junehwa Song Journal Article
Scalable activity-travel pattern monitoring framework for large-scale city environment, Youngki LEE, SangJeong LEE, Byoungjip KIM, Jungwoo KIM, Yunseok Rhee, and Junehwa SONG Journal Article
Setting Up a Low-cost Lab Management System for a Multi-purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee MOK and Wee Kiat TAN Journal Article
Structural analysis in multi-relational social networks, Bing Tian DAI, Freddy Chong Tat CHUA, and Ee-peng LIM Conference Proceeding Article
Two-level Path Authentication in EPCglobal Network, Hongbing WANG, Yingjiu LI, Zhongyang ZHANG, and Zhenfu CAO Conference Proceeding Article
Understanding Task-driven Information Flow in Collaborative Networks, Gengxin MIAO, Shu TAO, Winnie CHENG, Randy Moulic, Louise E. Moser, David LO, and Xifeng YAN Conference Proceeding Article
Content Contribution in Social Media: A Dynamic Structural Model Approach, Qian TANG, Bin GU, and Andrew B. WHINSTON Presentation
A Comparative Study of Cyberattacks, Seung Hyun KIM, QIU-HONG WANG, and Johannes B. ULLRICH Journal Article
An Efficient Dataflow Execution Method for Mobile Context Monitoring Applications, Younghyun JU, Chulhong MIN, Youngki LEE, Jihyun YU, and Junehwa SONG Conference Proceeding Article
An Efficient Dataflow Execution Method for Mobile Context Monitoring Applications, Younghyun Ju, Chulhong Min, Youngki Lee, Jihyun Yu, and Junehwa Song Conference Paper
Boosting web video categorization with contextual information from social web, Xiao WU, Chong-wah NGO, Yi-Ming ZHU, and Qiang PENG Journal Article
Business and data analytics: New innovations in the management of e-commerce, Robert J. KAUFFMAN, Jaideep SRIVASTAVA, and Jamshid VAYGHAN Journal Article
Business Process Management and Six Sigma: Leveraging the Synergistic Relationship, Suresh SUBRAMANIAM, Venky Shankararaman, K. V. Krishnankutty, and Ravi Chinta Book Chapter
Business process management in financial services, Randall E. DURAN Book Chapter
Coordinating occupant behavior for building energy and comfort management using multi-agent systems, Laura KLEIN, Jun Young Kwak, Geoffrey Kavulya, Farrokh Jazizadeh, Burcin Becerik-Gerber, Pradeep VARAKANTHAM, and Milind Tambe Journal Article
Dynamic lookahead mechanism for conserving power in multi-player mobile games, Karthik THIRUGNANAM, Bhojan Anand, Jeena Sebastian, Pravein Kannan, Akhihebbal L. Ananda, Rajesh Krishna BALAN, and Mun Choon CHAN Conference Proceeding Article
Hierarchical fuzzy logic system for implementing maintenance schedules of offshore power systems, C. S. CHANG, Zhaoxia WANG, Fan YANG, and W. W. TAN Journal Article
Hoare-style verification of graph programs, Christopher M. POSKITT and Detlef PLUMP Journal Article
HuMan: Creating Memorable Fingerprints of Mobile Users, Gupta PAYAS, Kiat Wee TAN, Narayanasamy RAMASUBBU, David LO, Debin GAO, and Rajesh Krishna BALAN Conference Proceeding Article
Improved Duplicate Bug Report Identification, Yuan TIAN, Chengnian SUN, and David LO Conference Proceeding Article
MobiCon: A mobile context-monitoring platform, Youngki LEE, S. S. Iyengar, Chulhong MIN, Younghyun JU, Taiwoo PARK, Jinwon LEE, Yunseok RHEE, and Junehwa SONG Journal Article
MobiCon: Mobile Context Monitoring Platform, Youngki Lee, S. S. Iyengar, Chulhong Min, Younghyun Ju, Taiwoo Park, Jinwon Lee, Yunseok Rhee, and Junehwa Song Journal Article
Quality and leniency in online collaborative rating systems, Hady W. LAUW, Ee Peng LIM, and Ke WANG Journal Article
ROAD: A New Spatial Object Search Framework for Road Networks, Ken C. K. LEE, Wang-Chien LEE, Baihua ZHENG, and Yuan TIAN Journal Article
Scenario-Based and Value-Based Specification Mining: Better Together, David LO and Shahar MAOZ Journal Article
Utility-based Bandwidth Adaptation in Mission-Oriented Wireless Sensor Networks, Sharanya ESWARAN, Archan MISRA, Flavio BERGAMASCHI, and Thomas LA PORTA Journal Article
Verbal coordination in first person shooter games, Anthony TANG, Jonathan MASSEY, Nelson WONG, Derek REILLY, and W. Keith EDWARDS Conference Proceeding Article
SecDS: A Secure EPC Discovery Services System in EPCglobal Network, Jie SHI, Darren SIM, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
ARIVU: Making Networked Mobile Games Green: A Scalable Power-Aware Middleware, Anand BHOJAN, Ananda L. Akhihebbal L., Mun Choon CHAN, and Rajesh Krishna BALAN Journal Article
Does Complexity Deter Customer-Focus?, Sendil K. ETHIRAJ, Narayanasamy RAMASUBBU, and M. S. Krishnan Journal Article
Extreme learning machine terrain-based navigation for unmanned aerial vehicles, Ee May KAN, Meng Hiot LIM, Yew Soon ONG, Ah-hwee TAN, and Swee Ping YEO Journal Article
Manipulation of Online Reviews: An Analysis of Ratings, Readability, and Sentiments, Nan HU, Indranil BOSE, Noi Sian KOH, and Ling LIU Journal Article
Mitigating the true cost of advertisement-supported "free" mobile applications, Azeem J. KHAN, Vigneshwaran SUBBARAJU, Archan MISRA, and Srinivasan SESHAN Conference Proceeding Article
On Limitations of Designing Usable Leakage-Resilient Password Systems: Attacks, Principles and Usability, Qiang YAN; Jin HAN; Yingjiu LI; and Huijie, Robert DENG Conference Proceeding Article
Query Answer Authentication, Hwee Hwa PANG and Kian-Lee TAN Book
Summarizing rushes videos by motion, object, and event understanding, Feng WANG and Chong-wah NGO Journal Article
The social network of software engineering research, Subhajit DATTA, Nishant KUMAR, and Santonu SARKAR Conference Proceeding Article
Towards fine-grained radio-based indoor location, Jie XIONG and Kyle JAMIESON Conference Proceeding Article
Using Visual Attention Region for Compact Descriptor for Visual Search, Lai-Tee CHEOK, Jaeyong SONG, and Kyungmo PARK Report
Video Evaluation Criteria for Compact Descriptor for Visual Search, Jaeyong SONG, Lai Tee Cheok, and Kyungmo PARK Report
Work item tagging: Communicating concerns in collaborative software development, Christoph TREUDE and Margaret-Anne STOREY Journal Article
Formal modeling and validation of Stateflow diagrams, Chunqing CHEN, Jun SUN, Yang LIU, Jin Song DONG, and Manchun ZHENG Journal Article
Adaptive Collision Resolution for Efficient RFID Tag Identification, Yung-Chun CHEN, Kuo-Hui YEH, Nai-Wei LO, Yingjiu LI, and Enrico WINATA Journal Article
A Fuzzy Logic Multi-Criteria Decision Framework for Selecting IT Service Providers, Amir KARAMI and Zhiling GUO Conference Proceeding Article
A Generic Construction of Accountable Decryption and Its Applications, Xuhua ZHOU, Xuhua DING, and Kefei CHEN Conference Proceeding Article
A hybridized Lagrangian relaxation and simulated annealing method for the course timetabling problem, Aldy GUNAWAN and Kim Leng POH Journal Article
A new efficient optimistic fair exchange protocol without random oracles, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article
An improved K-nearest-neighbor algorithm for text categorization, Shengyi JIANG, Guansong PANG, Meiling WU, and Limin KUANG Journal Article
Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems, Qiang YAN, Yingjiu LI, and Robert H. DENG Journal Article
A Sentiment Analysis of Singapore Presidential Election 2011 using Twitter Data with Census Correction, Murphy Junyu CHOY, Michelle Lee Fong CHEONG, Nang Laik MA, and Ping Shung KOO Report
A Survey on Privacy Frameworks for RFID Authentication, Chunhua SU; Yingjiu LI; Yunlei ZHAO; Huijie, Robert DENG; Yiming ZHAO; and Jianying ZHOU Journal Article
A survey on privacy frameworks for RFID authentication, Chunhua SU, Yingjiu LI, Yunlei ZHAO, Robert H. DENG, Yiming ZHAO, and Jianying ZHOU Journal Article
Consumer-driven innovation management, Arcot Desai NARASIMHALU and Shekhar MITRA Book Chapter
Content Contribution in Social Media: The Case of YouTube, Qian TANG, Bin GU, and Andrew B. WHINSTON Conference Proceeding Article
Detecting node replication attacks in mobile sensor networks: theory and approaches, Wen Tao ZHU, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article
Detecting node replication attacks in wireless sensor networks: a survey, Wen Tao ZHU, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article
Do Hacker Forums Contribute to Security Attacks?, QIU-HONG WANG, Wei T. YUE, and Kai-Lung HUI Conference Proceeding Article
Dynamic Secure Cloud Storage with Provenance, Sherman S. M. CHOW, Cheng-Kang CHU, Xinyi HUANG, Jianying ZHOU, and Robert H. DENG Book Chapter
Empirical comparison of 3-D virtual world and face-to-face classroom for higher education, Xiaofeng CHEN, Keng SIAU, and Fiona Fui-hoon NAH Journal Article
Evaluating the use of a mobile annotation system for geography education, Dion Hoe-Lian GOH, Khasfariyati Razikin, Chei Sian LEE, Ee Peng LIM, Kalyani CHATTERJEA, and Chew-Hung CHANG Journal Article
Event History, Spatial Analysis and Count Data Methods for Empirical Research in IS, Robert J. KAUFFMAN, A. A. Techatassanasoontorn, and B. WANG Journal Article
Identification of Demand through Statistical Distribution Modeling for Improved Demand Forecasting, Murphy CHOY and Michelle Lee Fong CHEONG Journal Article
Imbalance Challenge of Enacting Information Privacy Safeguards in Healthcare: A Grounded Theory Approach, Rachida Parks, Heng XU, and Chao-Hsien CHU Conference Paper
Information Extraction from Text, Jing JIANG Book Chapter
Information Extraction from Text, Jing JIANG Book Chapter
Integrating the Cloud-Scenarios and Solutions, Venky SHANKARARAMAN and Eng Kit Lum Book Chapter
IT-Supported a la Carte Pricing in Air Travel: A Test of the Strategic Decommoditization Hypothesis, N.F. Granados, Robert John Kauffman, H.C. Lai, and H.C. Lin Journal Article