The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2012

PDF

Snap-and-ask: Answering multimodal question by naming visual instance, Wei ZHANG, Lei PANG, and Chong-wah NGO Conference Proceeding Article

PDF

(Strong) multidesignated verifiers signatures secure against rogue key attack, Yunmei ZHANG, Man Ho AU, Guomin YANG, and Willy SUSILO Conference Proceeding Article

Link

SymPhoney: A Coordinated Sensing Flow Execution Engine for Concurrent Mobile Sensing Applications, Younghyun JU, Youngki LEE, Jihyun YU, Chulhong MIN, Insik SHIN, and Junehwa SONG Conference Proceeding Article

SymPhoney: A Coordinated Sensing Flow Execution Engine for Concurrent Mobile Sensing Applications, Younghyun Ju, Youngki Lee, Jihyun Yu, Chulhong Min, Insik Shin, and Junehwa Song Conference Paper

PDF

Tournament-based Teaching, Shannon Christopher BOESCH and Sandra BOESCH Conference Proceeding Article

PDF

US Presidential election 2012 prediction using census corrected Twitter model, Junyu CHOY, Michelle L. F. CHEONG, Nang Laik MA, and Ping Shung KOO Report

PDF

Video hyperlinking: Libraries and tools for threading and visualizing large video collection, Lei PANG, Wei ZHANG, Hung-Khoon TAN, and Chong-wah NGO Conference Proceeding Article

PDF

VIREO@TRECVID 2012: Searching with topology, recounting will small concepts, learning with free examples, Wei ZHANG, Chun-Chet TAN, Shi-Ai ZHU, Ting YAO, Lei PANG, and Chong-Wah NGO Conference Paper

QoS-aware revenue-cost optimization for latency-sensitive services in IaaS clouds, Nguyen Binh Duong TA, Xiaorong LI, Rick Siow Mong GOH, Xueyan TANG, and Wentong CAI Conference Proceeding Article

MedInfo2013: Join the International Biomedical and Health Informatics Community in Copenhagen., Aronsky D. and Tze-Yun LEONG Editorial

Bootstrapping Monte Carlo tree search with an imperfect heuristic, Nguyen T., Lee W., and Tze-Yun LEONG Conference Proceeding Article

Improved spin images for 3D surface matching using signed angles, Zhiyuan ZHANG, Sim Heng ONG, and Kelvin FOONG Conference Proceeding Article

PDF

A feasibility study of crowdsourcing and Google street view to determine sidewalk accessibility, Kotaro HARA, Victoria LE, and Jon FROEHLICH Conference Proceeding Article

PDF

A flexible mixed integer programming framework for nurse scheduling, Murphy CHOY and Michelle L. F. CHEONG Working Paper

Link

A Generic Approach for Providing Revocation Support in Secret Handshake, Yanjiang YANG, Haibing LU, Jian WENG, Xuhua DING, and Jianying ZHOU Conference Proceeding Article

PDF

A Probabilistic Graphical Model for Topic and Preference Discovery on Social Media, Lu LIU, Feida ZHU, Lei ZHANG, and Shiqiang YANG Journal Article

Link

A scalable and format-compliant encryption scheme for H.264/SVC bitstreams, Zhuo WEI, Yongdong Wu, Xuhua DING, and Robert H. DENG Journal Article

PDF

Automatic defect categorization, Ferdian THUNG, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

Content Contribution for Revenue Sharing and Reputation: A Dynamic Structural Model, Qian TANG, Bin GU, and Andrew B. Whinston Journal Article

PDF

Credit card program value maximization with promotion density for product discounts in shopping malls, Rae M. CHANG, Robert John KAUFFMAN, and Kwansoo KIM Conference Paper

PDF

Eating alone, together: New forms of commensality, Catherine GREVET, Anthony TANG, and Elizabeth MYNATT Conference Proceeding Article

PDF

Entity Synonyms for Structured Web Search, Tao CHENG, Hady W. LAUW, and Stelios PAPARIZOS Journal Article

PDF

Handling interpretation and representation in multilingual research: A meta-study of pragmatic issues resulting from the use of multiple languages in a qualitative Information Systems research work, Ilse BAUMGARTNER Journal Article

PDF

Influentials, novelty, and social contagion: The viral power of average friends, close communities, and old news, Nicholas HARRIGAN, Palakorn ACHANANUPARP, and Ee Peng LIM Journal Article

PDF

Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction, Yuan TIAN, David LO, and Chengnian SUN Conference Proceeding Article

Knowledge Discovery from Multi-sources Healthcare Informatics, Tin Seong KAM, Juhi SHARMA, Michael Tack Keong WONG, and Asokan LAVANYA Conference Paper

PDF

Model checking software architecture design, Jiexin ZHANG, Yang LIU, Jing SUN, Jin Song DONG, and Jun SUN Conference Proceeding Article

Multimedia Recommendation, Jialie SHEN, Meng WANG, Shuicheng YAN, and Peng CUI Presentation

PDF

Neural modeling of episodic memory: Encoding, retrieval, and forgetting, Wenwen WANG, Budhitama SUBAGDJA, Ah-hwee TAN, and Janusz A. STARZYK Journal Article

PDF

OTO: Online Trust Oracle for User-Centric Trust Establishment, Tiffany Hyun-Jin KIM, Payas GUPTA, Jun HAN, Emmanuel Owusu, Jason Hong, Adrian Perrig, and Debin GAO Conference Proceeding Article

PDF

Self-regulating action exploration in reinforcement learning, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article

PDF

Sensor OpenFlow: Enabling Software-Defined Wireless Sensor Networks, Tie LUO, Hwee-Pink TAN, and Tony Q. S. QUEK Journal Article

PDF

Talk versus work: Characteristics of developer collaboration on the Jazz platform, Subhajit DATTA, Renuka SINDHGATTA, and Bikram SENGUPTA Conference Proceeding Article

PDF

The shanghai-hongkong team at mediaeval2012: Violent scene detection using trajectory-based features, Yu-Gang JIANG, Qi DAI, Chun Chet TAN, Xiangyang XUE, and Chong-wah NGO Conference Paper

PDF

Trajectory-based modeling of human actions with motion reference points, Yu-Gang JIANG, Qi DAI, Xiangyang XUE, Wei LIU, and Chong-wah NGO Conference Proceeding Article

PDF

Understanding engagement in educational computer games, Fiona Fui-hoon NAH, Yunjie ZHOU, Adeline BOEY, and Hanji LI Conference Proceeding Article

Social Media Analytics: Discovering insights from a connected world, Tin Seong KAM Presentation

PDF

Predicting common web application vulnerabilities from input validation and sanitization code patterns, Lwin Khin SHAR and Hee Beng Kuan TAN Conference Proceeding Article

PDF

A Computational Analysis of Bundle Trading Markets Design for Distributed Resource Allocation, Zhiling GUO, Gary J. KOEHLER, and Andrew B. WHINSTON Journal Article

PDF

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks, Sharanya ESWARAN, James EDWARDS, Archan MISRA, and Thomas LA PORTA Journal Article

PDF

Automatic classification of software related microblogs, Philips Kokoh PRASETYO, David LO, Achananuparp PALAKORN, Yuan TIAN, and Ee Peng LIM Conference Proceeding Article

PDF

BDUOL: Double Updating Online Learning on a Fixed Budget, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article

Link

Combining Multiple Sensor Features For Stress Detection using Combinatorial Fusion, Yong DENG, D. F. HSU, Z. Wu, and Chao-Hsien CHU Journal Article

PDF

Detecting Similar Applications with Collaborative Tagging, Ferdian THUNG, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

Diversity maximization speedup for fault localization, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article

Link

Diversity Maximization Speedup for Fault Localization, Liang Gong, David LO, Lingxiao JIANG, and Hongyu Zhang Conference Paper

PDF

Duplicate Bug Report Detection with a Combination of Information Retrieval and Topic Modeling, Anh Tuan NGUYEN, Tung NGUYEN, Tien NGUYEN, David LO, and Chengnian SUN Conference Proceeding Article

Link

Ensuring Flexible Process Compliance with Semantic Constraints using Mixed-Integer Programming, Akhil KUMAR, Wen YAO, and Chao-Hsien CHU Journal Article

PDF

Extending a mobile device's interaction space through body-centric interaction, Xiang CHEN, Nicolai MARQUARDT, Anthony TANG, Sebastian BORING, and Saul GREENBERG Conference Proceeding Article

PDF

Guest editors’ introduction: Methods innovations for the empirical study of technology adoption and diffusion, Robert John KAUFFMAN and Angsana A. TECHATASSANASOONTORN Transcript

PDF

Guest editors’ introduction: Poverty, technology, microfinance and development, Robert J. KAUFFMAN and Frederick J. Riggins Editorial

Link

Inferring Semantically Related Software Terms and their Taxonomy by Leveraging Collaborative Tagging, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article

Link

Information and Communication Technology, and the Sustainability of Microfinance, Robert J. KAUFFMAN and Frederick J. Riggins Journal Article

PDF

In-game action list segmentation and labeling in real-time strategy games, Wei GONG, Ee-Peng LIM, Palakorn ACHANANUPARP, Feida ZHU, David LO, and Freddy Chong-Tat CHUA Conference Proceeding Article

Link

In Search of Efficient Flexibility: Effects of Software Component Granularity on Development Effort, Defects, and Customization Effort, Ramanath SUBRAMANYAM, Narayanasamy RAMASUBBU, and M. S. Krishnan Journal Article

PDF

Interactive fault localization leveraging simple user feedback, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article

Link

kbe-Anonymity: Test Data Anonymization for Evolving Programs, - Lucia, David LO, Lingxiao JIANG, and Aditya Budi Conference Paper

PDF

kbe-anonymity: Test data anonymization for evolving programs, Lucia LUCIA, David LO, Lingxiao JIANG, and Aditya BUDI Conference Proceeding Article

PDF

Learning Fine-Grained Structured Input for Memory Corruption Detection, Lei ZHAO, Debin GAO, and Lina WANG Conference Proceeding Article

PDF

No tradeoff between confidentiality and performance: An analysis on H.264/SVC partial encryption, Zhuo WEI, Xuhua DING, Robert H. DENG, and Yongdong WU Conference Proceeding Article

PDF

Observatory of trends in software related microblogs, Achananuparp PALAKORN, Nelman Lubis IBRAHIM, Yuan TIAN, David LO, and Ee Peng LIM Conference Proceeding Article

PDF

Reputation as Public Policy for Internet Security, Leigh L. Linden, John S. Quarterman, Qian TANG, and Andrew B. Whinston Conference Proceeding Article

PDF

Scalable content authentication in H.264/SVC videos using perceptual hashing based on Dempster-Shafer theory, Dengpan YE, Zhuo Wei, Xuhua DING, and Robert H. DENG Journal Article

Link

Semantic Patch Inference, Jesper ABDERSEN, Anh Cuong NGUYEN, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Proceeding Article

Link

Semantic Patch Inference, Jesper Andersen, Anh Cuong Nguyen, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Paper

PDF

The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Nicolai MARQUARDT, Anthony TANG, and Saul GREENBERG Conference Proceeding Article

PDF

The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Anthony TANG, Anthony TANG, and Saul GREENBERG Conference Paper

Link

To What Extent Could We Detect Field Defects? —An Empirical Study of False Negatives in Static Bug Finding Tools, Ferdian Thung, - Lucia, David LO, Lingxiao JIANG, Premkumar Devanbu, and Foyzur Rahman Conference Paper

PDF

To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools, Ferdian THUNG, Lucia Lucia, David LO, Lingxiao JIANG, Premkumar DEVANBU, and Foyzur RAHMAN Conference Proceeding Article

PDF

Verification of graph programs, Christopher M. POSKITT Conference Proceeding Article

PDF

Verifying total correctness of graph programs, Christopher M. POSKITT and Detlef PLUMP Conference Proceeding Article

What's Public Feedback? Linking High Quality Feedback to Social Issues Using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Paper

Link

What's Public Feedback? Linking High Quality Feedback to Social Issues using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Proceeding Article

PDF

When would this bug get reported?, Ferdian THUNG, David LO, Lingxiao JIANG, Lucia Lucia, Foyzur Rahman, and Premkumar Devanbu Conference Proceeding Article

Auditing the XSS defence features implemented in web application programs, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article

PDF

Defeating SQL injection, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article

PDF

Niche-Seeking in Influence Maximization with Adversary, Long Foong LIOW, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

Link

A Context-aware Reminder System for Elders Based on Fuzzy Linguistic Approach, Shandan ZHOU, Chao-Hsien CHU, Zhiwen YU, and Jungyoon KIM Journal Article

PDF

Adapting Video Delivery Based on Motion Triggered Visual Attention, Hari KALVA, V. Adzic, and Lai-Tee Cheok Conference Paper

PDF

Adaptive Display Power Management for OLED Displays, Kiat Wee TAN and Rajesh Krishna BALAN Conference Proceeding Article

PDF

A non-parametric visual-sense model of images: Extending the cluster hypothesis beyond text, Kong-Wah WAN, Ah-hwee TAN, Joo-Hwee LIM, and Liang-Tien CHIA Journal Article

PDF

A secure and efficient discovery service system in EPCglobal network, Jie SHI, Yingjiu LI, and Robert H. DENG Journal Article

PDF

Automatic compositional verification of timed systems, Shang-Wei LIN, Yang LIU, Jun SUN, Jin Song DONG, and Étienne ANDRÉ Conference Proceeding Article

PDF

Bidder behaviors in repeated B2B procurement auctions, Jong Han PARK, Jae Kyu LEE, and Hoong Chuin LAU Conference Proceeding Article

PDF

Boosting multi-kernel Locality-Sensitive Hashing for scalable image retrieval, Hao XIA, Steven C. H. HOI, Pengcheng WU, and Rong JIN Conference Proceeding Article

PDF

Collective churn prediction in social network, Richard J. OENTARYO, Ee-peng LIM, David LO, Feida ZHU, and Philips K. PRASETYO Conference Proceeding Article

PDF

Confidence-aware graph regularization with heterogeneous pairwise features, Yuan FANG, Bo-June Paul HSU, and Kevin Chen-Chuan CHANG Conference Proceeding Article

PDF

Consumer Micro-behavior and TV Viewership Patterns: Data Analytics for the Two-way Set-top box, Ray M. CHANG, Robert J. KAUFFMAN, and Insoo SON Conference Proceeding Article

PDF

Control-theoretic Utility Maximization in Multihop Wireless Networks under Mission Dynamics, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Journal Article

Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper

Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper

PDF

Dynamic Stochastic Orienteering Problems for Risk-Aware Applications, Hoong Chuin LAU, William YEOH, Pradeep VARAKANTHAM, and Duc Thien NGUYEN Conference Proceeding Article

Follow Link Seeking Strategy: A pattern based approach, Agus Trisnajaya KWEE, Ee Peng LIM, Achananuparp PALAKORN, and Feida ZHU Conference Proceeding Article

Framing core and advanced competencies for undergraduate Information Systems program courses: does the nature, level, complexity and audience of a course matter?, Ilse BAUMGARTNER and Venky SHANKARAMAN Conference Proceeding Article

PDF

From Clickstreams to Searchstreams: Search Network Graph Evidence from a B2B E-Market, Mei LIN, M. F. LIN, and Robert J. KAUFFMAN Conference Proceeding Article

PDF

Hedonic Valuation of Online Game Participation, Robert J. KAUFFMAN, Kwansoo KIM, and Byungjoon YOO Conference Proceeding Article

PDF

(Hidden) social influences in switching mobile service platforms, Virpi K. TUUNAINEN, Tuure TUUNANEN, and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

Improved BDD-based discrete analysis of timed systems, Truong Khanh NGUYEN, Jun SUN, Yang LIU, Jin Song DONG, and Yan LIU Conference Proceeding Article

PDF

Improving ethics education in accounting: Lessons from medicine and law, Chunhui LIU, Lee J. YAO, and Nan HU Journal Article

PDF

Improving ethics education in accounting: Lessons from medicine and law, Chunhui LIU, Lee J. YAO, and Nan HU Journal Article