Submissions from 2010
TeleOph: A secure real-time teleophthalmology system, Yongdong WU, Zhou WEI, Haixia YAO, Zhigang ZHAO, Lek Heng NGOH, Robert H. DENG, and Shengsheng YU Journal Article
The Monetary Value of Virtual Goods: An Exploratory Study In MMORPGs, QIU-HONG WANG and Viktor Mayer-Schonberger Conference Proceeding Article
Trust-oriented composite service selection with QoS constraints, Lei LI, Yang WANG, and Ee Peng LIM Journal Article
Two Robust Remote User Authentication Protocols Using Smart Cards, Kuo-Hui YEH, Chunhua Su, Nai-Wei LO, Yingjiu LI, and Yi-Xiang Hung Journal Article
Universal authentication protocols for anonymous wireless communications, Guomin YANG, Qiong HUANG, Duncan S. WONG, and Xiaotie DENG Journal Article
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer, Pedro PERIS-LOPEZ, Julio Hernandez-Castro, Juan Tapiador, Tieyan LI, and Yingjiu LI Journal Article
When discrete meets differential: Assessing the stability of structure from small motion, Wen-yan LIN, Geok-Choo TAN, and Loong-Fah CHEONG Journal Article
Wikipedia2Onto: Building concept ontology automatically, experimenting with web image retrieval, Huan WANG, Xing JIANG, Liang-Tien CHIA, and Ah-hwee TAN Journal Article
Workshop report from Web2SE: First workshop on Web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN Journal Article
Submissions from 2009
Scalable multi-core model checking fairness enhanced systems, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article
Adaptive type-2 fuzzy maintenance advisor for offshore power systems, Zhaoxia WANG, C. S. CHANG, Fan YANG, and W. W. Tan Conference Proceeding Article
A new approach for anonymous password authentication, Yanjiang YANG, Jianying ZHOU, Jian Weng, and Feng BAO Conference Proceeding Article
A Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies, Ge FU, Hong ZHU, and Yingjiu LI Conference Proceeding Article
A robust damage assessment model for corrupted database systems, Ge FU, Hong ZHU, and Yingjiu LI Conference Proceeding Article
Bayesian Network Based Services Recommendation, J. WU, H. Jian, and Qianhui (Althea) LIANG Conference Proceeding Article
Coherent phrase model for efficient image near-duplicate retrieval, Yiqun HU, Xiangang CHENG, Liang-Tien CHIA, Xing XIE, Deepu RAJAN, and Ah-hwee TAN Journal Article
Computationally Secure Hierarchical Self-Healing Key Distribution for Heterogeneous Wireless Sensor Networks, Yanjiang YANG, Jianying Zhou, Robert H. DENG, and Feng Bao Conference Proceeding Article
Cyber attacks: Does physical boundary matter?, QIU-HONG WANG and Seung-Hyun KIM Conference Proceeding Article
Denial-of-Service Attacks on Host-Based Generic Unpackers, Limin LIU, Jiang MING, Zhi WANG, Debin GAO, and Chunfu JIA Conference Proceeding Article
DUOL: A Double Updating Approach for Online Learning, Peilin ZHAO, Steven C. H. HOI, and Rong JIN Conference Proceeding Article
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains, Shaoying CAI, Tieyan LI, Changshe MA, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Extending CRM with mobile messaging: A case study, Randall E. DURAN Journal Article
Insights into Malware Detection and Prevention on Mobile Phones, Qiang YAN, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Learning Bregman Distance Functions and its Application for Semi-Supervised Clustering, Lei WU, Rong JIN, Steven C. H. HOI, Jianke ZHU, and Nenghai YU Conference Proceeding Article
Managing Supply Uncertainty with an Information Market, Zhiling GUO, Fang FANG, and Andrew B. WHINSTON Conference Proceeding Article
Modeling Syntactic Structures of Topics with a Nested HMM-LDA, Jing JIANG Conference Proceeding Article
On strategies for imbalanced text classification using SVM: A comparative study, Aixin SUN, Ee Peng LIM, and Ying LIU Journal Article
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup, Bing LIANG, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Perceptual effects in relativity and astrophysics, Manoj THULASIDAS Journal Article
The Future of Innovation is Bright and Shiny as Never Before, Arcot Desai NARASIMHALU Book Chapter
To trust or not to trust? Predicting online trusts using Trust Antecedent Framework, Viet-An NGUYEN, Ee Peng LIM, Jing JIANG, and Aixin SUN Conference Proceeding Article
Wake up or Fall Asleep: Value Implication of Trusted Computing, Nan HU, Jianhui HUANG, Ling LIU, Yingjiu LI, and Dan MA Journal Article
On Group Key Management for Secure Multicast Employing the Inverse Element, Wen Tao ZHU and Robert H. DENG Conference Proceeding Article
Does Sampling Influence Customers in Online Retailing of Digital Music?, Nan HU, Ling LIU, Indranil Bose, and Jialie SHEN Journal Article
Designing and Validating an Agent-Based Commodity Trading Simulation, Shih-Fen CHENG and Yee Pin LIM Conference Paper
ECRA co-editors' introduction for volume 8, issue 6, November - December 2009, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Ensemble and individual noise reduction method for induction-motor signature analysis, Zhaoxia WANG, C.S. CHANG, TW CHUA, and W.W TAN Conference Proceeding Article
Fooling Public-Key Watermarking Detectors with Optimal Color Noise, Yongdong WU and Robert H. DENG Conference Proceeding Article
Minimum Latency Broadcasting in Multiradio, Multichannel, Multirate Wireless Meshes, Junaid QADIR, ChunTung CHOU, Archan MISRA, and Joo Ghee LIM Journal Article
Mining communities in networks: A solution for consistency and its evaluation, Haewoon KWAK, Yoonchan CHOI, Young-Ho EOM, Hawoong JEONG, and Sue MOON Conference Proceeding Article
Mining Hierarchical Scenario-Based Specifications, David LO and Shahar Maoz Conference Proceeding Article
Online fault detection of induction motors using independent component analysis and fuzzy neural network, Zhaoxia WANG, C. S. CHANG, X. GERMAN, and W.W. TAN Conference Proceeding Article
RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction, Changshe MA, Yingjiu LI, Robert H. DENG, and Tieyan LI Conference Proceeding Article
Rfid Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction, Changshe MA, Yingjiu LI, Robert Huijie DENG, and Tieyan LI Conference Paper
Self-Enforcing Private Inference Control, Yanjiang YANG, Yingjiu LI, Jian Weng, Jianying ZHOU, and Feng Bao Conference Proceeding Article
Static validation of C preprocessor macros, Andreas SAEBJORNSEN, Lingxiao JIANG, Daniel Quinlan, and Zhendong SU Conference Proceeding Article
Stereotrust: A group based personalized trust model, Xin LIU, Anwitaman DATTA, Krzysztof RAZDCA, and Ee Peng LIM Conference Proceeding Article
Trust-Oriented Composite Services Selection and Discovery, Lei LI, YAN WANG, and Ee Peng LIM Conference Proceeding Article
Trust relationship prediction using online product review data, Nan MA, Ee Peng LIM, Viet-An NGUYEN, and Aixin SUN Conference Proceeding Article
UDEL/SMU at TREC 2009 Entity Track, Wei ZHENG, Swapna GOTTIPATI, Jing JIANG, and Hui FANG Conference Paper
User interfaces for visual analysis and monitoring in business intelligence, Lars GRAMMEL, Margaret-Anne STOREY, and Christoph TREUDE Conference Proceeding Article
VIREO/DVMM at TRECVID 2009: High-level feature extraction, automatic video search, and content-based copy detection, Chong-wah NGO, Yu-Gang JIANG, Xiao-Yong WEI, Wanlei ZHAO, Yang LIU, Jun WANG, Shiai ZHU, and Shih-Fu CHANG Conference Paper
What makes categories difficult to classify?, Aixin SUN, Ee Peng LIM, and Ying LIU Conference Proceeding Article
Intermediation or Non-intermediation: A Market Design for Distributed Computing, Zhiling GUO Presentation
Robust Semantic Concept Detection in Large Video Collections, Jialie SHEN, Dacheng Tao, and Xuelong LI Conference Proceeding Article
Analysis of Tradeoffs between Buffer and QoS Requirements in Wireless Networks, Raphael ROM and Hwee-Pink TAN Journal Article
Analyzing the video popularity characteristics of large-scale user generated content systems, Meeyoung CHA, Haewoon KWAK, Pablo RODRIGUEZ, Yong-Yeol AHN, and Sue MOON Journal Article
A Service Choice Model for Optimizing Taxi Service Delivery, Shih-Fen CHENG and Xin QU Conference Proceeding Article
A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications, Robert H. DENG and Yanjiang YANG Journal Article
A Surprise Triggered Adaptive and Reactive (STAR) Framework for Online Adaptation in Non-stationary Environments, Truong-Huy Dinh NGUYEN and Tze-Yun LEONG Conference Proceeding Article
Competitive Strategy, Economics, and Information Systems., E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article
Comprehensive Query-Dependent Fusion Using Regression-on-Folksonomies: A Case Study of Multimodal Music Search, Bingjun ZHANG, Qiaoliang Xiang, Huanhuan LU, Jialie SHEN, and Ye WANG Conference Proceeding Article
Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments, Kyriakos MOURATIDIS, Spiridon Bakiras, and Dimitris Papadias Journal Article
Distance metric learning from uncertain side information with application to automated photo tagging, Lei WU, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Nenghai YU Conference Proceeding Article
Distribution-based concept selection for concept-based video retrieval, Juan CAO, HongFang JING, Chong-wah NGO, and YongDong ZHANG Conference Proceeding Article
Domain adaptive semantic diffusion for large scale context-based video annotation, Yu-Gang JIANG, Jun WANG, Shih-Fu CHANG, and Chong-wah NGO Conference Proceeding Article
Extracting Logistics-Related Knowledge Artefacts from Wargames, Ori SASSON Conference Paper
First ACM SIGMM International Workshop on Social Media (WSM'09), Suzanne BOLL, Steven C. H. HOI, Jiebo LUO, Rong JIN, Dong XU, and Irwin KING Conference Proceeding Article
First ACM SIGMM International Workshop on Social Media (WSM'09), Suzanne BOLL, Steven C. H. HOI, Jiebo LUO, Rong JIN, Dong XU, and Irwin KING Conference Proceeding Article
Graph OLAP: A Multi-dimensional Framework for Graph Data Analysis, Chen CHEN, Xifeng YAN, Feida ZHU, Jiawei HAN, and Philip S. YU Journal Article
Guest Editors’ Introduction to Special Issue: Marketing and Electronic Commerce, Ming-Hui HUANG and Robert John KAUFFMAN Journal Article
Localizing volumetric motion for action recognition in realistic videos, Xiao WU, Chong-wah NGO, Jintao LI, and Yongdong ZHANG Conference Proceeding Article
Mining globally distributed frequent subgraphs in a single labeled graph, Xing JIANG, Hui XIONG, Chen WANG, and Ah-hwee TAN Journal Article
Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation, David LO, Ganesan Ramalingam, Venkatesh-Prasad Ranganath, and Kapil Vaswani Conference Proceeding Article
Mining Scenario-Based Specifications with Value-Based Invariants, David LO and Shahar Maoz Conference Proceeding Article
Overcoming the J-shaped Distribution of Product Reviews, Nan HU, Jennifer ZHANG, and Paul Pavlou Journal Article
Parallel Sets in the Real World: Three Case Studies, Robert Kosara, Caroline Ziemkiewicz, F. Joseph III Mako, and Tin Seong KAM Presentation
Scalable detection of partial near-duplicate videos by visual-temporal consistency, Hung-Khoon TAN, Chong-wah NGO, Richang HONG, and Tat-Seng CHUA Conference Proceeding Article
Secure Mobile Agents with Designated Hosts, Qi ZHANG, Yi MU, Minji ZHANG, and Robert H. DENG Conference Proceeding Article
Semantic context transfer across heterogeneous sources for domain adaptive video search, Yu-Gang JIANG, Chong-wah NGO, and Shih-Fu CHANG Conference Proceeding Article
Semantics-preserving bag-of-words models for efficient image annotation, Lei WU, Steven C. H. HOI, and Nenghai YU Conference Proceeding Article
Sharing mobile multimedia annotations to support inquiry-based learning using Mobitop, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Yin-Leng THENG, Quang Minh NGUYEN, Thi Nhu Quynh KIM, Ee Peng LIM, Chew-Hung CHANG, Kalyani CHATTERJEA, and Aixin SUN Conference Proceeding Article
Streaming 3D Meshes Using Spectral Geometry Images, Ying HE, Boon Seng CHEW, Dayong WANG, Steven C. H. HOI, and Lap Pui CHAU Conference Proceeding Article
The Unified Procurement Strategy for Enterprise Software: A Test of the ‘Move to the Middle’ Hypothesis., Robert John KAUFFMAN and J.Y. Tsai Journal Article
Towards Google challenge: Combining contextual and social information for web video categorization, Xiao WU, Wan-Lei ZHAO, and Chong-wah NGO Conference Proceeding Article
Unsupervised Face Alignment by Robust Nonrigid Mapping, Jianke ZHU, Luc VAN GOOL, and Steven C. H. HOI Conference Proceeding Article
Clustering Web Services for Automatic Categorization, Qianhui (Althea) LIANG, Peipei LI, P. Hung, and Xindong Wu Conference Proceeding Article
Improving Scalability of Software Cloud for Composite Web Services, J. WU, Qianhui (Althea) LIANG, and E. Bertino Conference Proceeding Article
Verifying stateful timed CSP using implicit clocks and zone abstraction, Jun SUN, Yang LIU, Jin Song DONG, and Xian ZHANG Conference Proceeding Article
Accelerating Sequence Searching: Dimensionality Reduction Method, Guojie SONG, Bin CUI, Baihua ZHENG, Kunqing XIE, and Dongqing YANG Journal Article
Admission Control for Differentiated Services in Future Generation CDMA Networks, Hwee-Pink TAN, Rudesindo Núñez-Queija, Adriana F. GABOR, and Onno J. BOXMA Journal Article
A Hybrid Firm's Pricing Strategy in Electronic Commerce under Channel Migration, Robert John KAUFFMAN, Dongwon LEE, Jung LEE, and Byungjoon YOO Journal Article
A latent model for visual disambiguation of keyword-based image search, Kong-Wah WAN, Ah-hwee TAN, Joo-Hwee LIM, Liang-Tien CHIA, and Sujoy ROY Conference Proceeding Article
Automatically Adapting a Trained Anomaly Detector to Software Patches, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article
Batch Mode Active Learning with Applications to Text Categorization and Image Retrieval, Steven C. H. HOI, Rong JIN, and Michael R. LYU Journal Article
Communication-efficient Classification in P2P Networks, Hock Hee ANG, Vivekanand Gopalkrishnan, Wee Keong NG, and Steven C. H. HOI Conference Proceeding Article
Detecting automotive exhaust gas based on fuzzy inference system, LI. Shujin, Ming BAI, Quan WANG, Bo CHEN, Xiaobing ZHAO, Ting YANG, and Zhaoxia WANG Conference Proceeding Article
Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security, Jian WENG, Yanjiang YANG, Qiang TANG, and Robert H. DENG Conference Proceeding Article
Electronic commerce research and applications (ECRA) ECRA co-editors' introduction for volume 8, issue 5, September - October 2009, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Font Size: Make font size smaller Make font size default Make font size larger Exploiting Coordination Locales in Distributed POMDPs via Social Model Shaping, Pradeep VARAKANTHAM, Jun Young KWAK, Matthew Taylor, Janusz Marecki, Paul Scerri, and Milind Tambe Conference Proceeding Article