Submissions from 2010
Preference Queries in Large Multi-Cost Transportation Networks, Kyriakos MOURATIDIS, Yimin LIN, and Man Lung YIU Conference Proceeding Article
Probabilistic public key encryption with equality test, Guomin YANG, Chik How TAN, Qiong HUANG, and Duncan S. WONG Conference Proceeding Article
Symphony: A Platform for Search-Driven Applications, John C. SHAFER, Rakesh AGRAWAL, and Hady W. LAUW Conference Proceeding Article
Top-K Aggregation Queries over Large Networks, Xifeng Yan, Bin He, Feida ZHU, and Jiawei Han Conference Paper
Methods Extends Free Access to Papers and Offers Optional Open Access Model: New services and opportunities for authors and readers, R. Haux, D. Aronsky, Tze-Yun LEONG, and A. McCray Editorial
Content-based Image Authentification: Current Status, Issues, and Challenges, Shui-Hua HAN and Chao-Hsien CHU Journal Article
An Analysis of Extreme Price Shocks and Illiquidity among Trend Followers, Bernard LEE, Shih-Fen CHENG, and Annie KOH Presentation
An Analysis of Extreme Price Shocks and Illiquidity among Trend Followers, Bernard LEE, Shih-Fen CHENG, and Annie KOH Conference Paper
Efficient discrete logarithm based multi-signature scheme in the plain public key model, Changshe MA, Jian Weng, Yingjiu LI, and Robert H. DENG Journal Article
Efficient Valid Scope for Location-Dependent Spatial Queries in Mobile Environments, Ken C. K. LEE, Wang-Chien LEE, Hong Va LEONG, Brandon UNGER, and Baihua ZHENG Journal Article
Estimating the Quality of Postings in the Real-time Web, Hady W. LAUW, Alexandros NTOULAS, and Krishnaram KENTHAPADI Conference Paper
Further exploration on relationship between crisp sets and fuzzy sets, Zhaoxia WANG, Quan WANG, Ming BAI, CHEN Zeng-qiang, and Zhen SUN Conference Proceeding Article
Player Performance Prediction in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM, Richa SHARAN, and Jaideep SRIVASTAVA Report
Privacy-Preserving Similarity-Based Text Retrieval, Hwee Hwa PANG, Jialie SHEN, and Ramayya Krishnan Journal Article
Twitterrank: Finding topic-sensitive influential Twitterers, Jianshu WENG, Ee Peng LIM, Jing JIANG, and Qi HE Conference Proceeding Article
War Gaming in Logistics, Ori SASSON Conference Paper
ECRA co-editors' introduction for Vol. 9, Issue 4, July-August 2010, Robert John KAUFFMAN, P.Y.K. Chau, T.R. Payne, and C.J. Westland Journal Article
A boosting framework for visuality-preserving distance metric learning and its application to medical image retrieval, Yang LIU, Rong JIN, Lily Mummert, Rahul Sukthankar, Adam Goode, Bin ZHENG, Steven C. H. HOI, and Mahadev Satyanarayanan Journal Article
Achieving high security and efficiency in RFID-tagged supply chains, Shaoying CAI, Yingjiu LI, Tieyan LI, Robert H. DENG, and Haixia Yao Journal Article
A Multi-Level Theory Approach to Understanding Price Rigidity in Internet Retailing, Robert J. KAUFFMAN and D. LEE Journal Article
An Adaptive N-Resolution Anti-Collision Algorithm for Rfid Tag Identification, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu LI, and Enrico Winata Conference Paper
An Empirical Analysis of Mobile Voice Service and SMS: A Structural Model, Youngsoo KIM, Rahul Telang, William B. Vogt, and Ramayya Krishnan Journal Article
An Intrusion Response Decision-Making Model Based on Hierarchical Task Network Planning, Chengpo MU and Yingjiu LI Journal Article
An Investigation of Online Review Manipulation, Nan HU, Ling LIU, and Noi Sian KOH Conference Paper
Anonymous Query Processing in Road Networks, Kyriakos MOURATIDIS and Man Lung YIU Journal Article
Applying soft cluster analysis techniques to customer interaction information, Randall E. DURAN, Li ZHANG, and Tom HAYHURST Book Chapter
Are They Valued by the Board?, Nan HU, Ling LIU, and Jianhui HUANG Conference Paper
A Review of the Professionalization of the Software Industry: Has it Made Software Engineering a Real Profession?, Heng Ngee MOK Journal Article
Countervailing Forces and Effects of Process Standardization, Robert J. KAUFFMAN and Juliana Y. TSAI Journal Article
CRCTOL: A semantic based domain ontology learning system, Xing JIANG and Ah-hwee TAN Journal Article
Does Co-opetition Change the Game? A Bayesian Analysis of Participation Strategy in an Industry Standard-Setting Organization, Robert J. KAUFFMAN, Benjamin B. M. SHAO, and Juliana Y. TSAI Conference Proceeding Article
Do online reviews reflect a product's true perceived quality? An investigation of online movie reviews across cultures, Noi Sian KOH, Nan Hu, and Eric K. Clemons Conference Proceeding Article
Dual Phase Learning for Large Scale Video Gait Recognition, Jialie SHEN, Hwee Hwa PANG, Dacheng TAO, and Xuelong LI Conference Proceeding Article
ECRA co-editors' introduction for volume 9, issue 1, January-February 2010, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Incentive Mechanisms, Fairness and Participation in Group-Buying Auctions, Robert J. KAUFFMAN, Hsiangchu LAI, and Chao-Tsung HO Journal Article
InfoNetOLAP: OLAP and Mining of Information Networks, CHEN CHEN, Feida ZHU, Xifeng YAN, Jiawei HAN, Yu Philip S., and Raghu Ramacrishnan Book Chapter
Information integration for graph databases, Ee Peng LIM, Aixin SUN, Anwitaman DATTA, and CHANG KUIYU Book Chapter
Information Technology Diffusion with Influentials, Imitators, and Opponents: Model and Preliminary Evidence, Hasan Cavusoglu, Nan HU, Yingjiu LI, and Dan MA Journal Article
Information Transparency in Business-to-Consumer Markets: Concepts, Framework and Research Agenda., N. F. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article
Introducing Communication in Dis-POMDPs with Locality of Interaction, Makoto TASAKI, Yuichi Yabu, Yuki Iwanari, Makoto Yokoo, Janusz Marecki, Pradeep Reddy VARAKANTHAM, and Milind Tambe Journal Article
Introduction to the Special Issue: Information Systems in Services, Indranil B. BARDHAN, Haluk Demirkan, P. K. Kannan, and Robert J. Kauffman Journal Article
Introduction to the Special Section: Service Science in Electronic Commerce, Indranil B. BARDHAN, Haluk Demirkan, P. K. Kannan, and Robert J. Kauffman Journal Article
Keep it simple with time: A reexamination of probabilistic topic detection models, Qi HE, Kuiyu CHANG, Ee Peng LIM, and Arindam Banerjee Journal Article
Modeling Anticipatory Event Transitions, He QI, Kuiyu CHANG, and Ee Peng LIM Book Chapter
Motivated learning as an extension of reinforcement learning, Janusz STARZYK, Pawel RAIF, and Ah-hwee TAN Conference Proceeding Article
Multipath Virtual Sink Architecture for Underwater Sensor Networks, Winston K. G. SEAH, Hwee-Pink TAN, and Pius W. Q. LEE Book Chapter
New Theoretical Perspectives on Technology Adoption, Robert J. KAUFFMAN and A. Techatassanasoontorn Journal Article
On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones, Qiang YAN, Robert H. DENG, Yingjiu LI, and Tieyan LI Journal Article
Operational risk in trading platforms, M. THULASIDAS Magazine Article
Periodic Resource Reallocation in Two-Echelon Repairable Item Inventory Systems, Hoong Chuin LAU, Jie Pan, and Huawei SONG Journal Article
Redefining Medical Tourism, Arcot Desai NARASIMHALU Book Chapter
Regulatory Policies for Demand-Driven Innovation by Heterogeneous Firms, Mei LIN, Shaojin LI, and Andrew WHINSTON Conference Paper
Remote Attestation on Function Execution, Liang GU, Yueqiang CHENG, Xuhua DING, Robert H. DENG, Yao GUO, and Weizhong SHAO Conference Proceeding Article
Remote Platform Attestation: The Testimony for Trust Manageement, Xuhua DING, LIANG Gu, Robert H. DENG, Bing Xie, and Hong MEI Book Chapter
Representations of keypoint-based semantic concept detection: A comprehensive study, Yu-Gang JIANG, Jun YANG, and Chong-wah NGO Journal Article
Reputation Building in Online Social Media: An Exploratory Study on YouTube, Qian TANG, Bin Gu, and Andrew Whinston Conference Paper
RFID Information Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations, Rashida PARKS, Chao-Hsien CHU, and Heng XU Journal Article
Risk-Sensitive Planning in Partially Observable, Janusz MARECKI and Pradeep Reddy VARAKANTHAM Conference Paper
Segmenting Uncertain Demand in Group-Buying Auctions, J. CHEN, Robert J. Kauffman, Y. LIU, and X. SONG Journal Article
Should We Go Our Own Way? Analyzing Backsourcing Flexibility in IT Service Outsourcing Contracts., M. Benaroch, Q. Dai, and Robert John KAUFFMAN Journal Article
Smart media: Bridging interactions and services for the smart internet, Margaret-Anne STOREY, Lars GRAMMEL, and Christoph TREUDE Book Chapter
Spreadsheet Modeling to Determine the Optimum Hotel Room Rate for a Short High-Demand Period, Thin Yin LEONG and Wee Leong LEE Journal Article
TeleOph: A secure real-time teleophthalmology system, Yongdong WU, Zhou WEI, Haixia YAO, Zhigang ZHAO, Lek Heng NGOH, Robert H. DENG, and Shengsheng YU Journal Article
The Monetary Value of Virtual Goods: An Exploratory Study In MMORPGs, QIU-HONG WANG and Viktor Mayer-Schonberger Conference Proceeding Article
Trust-oriented composite service selection with QoS constraints, Lei LI, Yang WANG, and Ee Peng LIM Journal Article
Two Robust Remote User Authentication Protocols Using Smart Cards, Kuo-Hui YEH, Chunhua Su, Nai-Wei LO, Yingjiu LI, and Yi-Xiang Hung Journal Article
Universal authentication protocols for anonymous wireless communications, Guomin YANG, Qiong HUANG, Duncan S. WONG, and Xiaotie DENG Journal Article
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer, Pedro PERIS-LOPEZ, Julio Hernandez-Castro, Juan Tapiador, Tieyan LI, and Yingjiu LI Journal Article
When discrete meets differential: Assessing the stability of structure from small motion, Wen-yan LIN, Geok-Choo TAN, and Loong-Fah CHEONG Journal Article
Wikipedia2Onto: Building concept ontology automatically, experimenting with web image retrieval, Huan WANG, Xing JIANG, Liang-Tien CHIA, and Ah-hwee TAN Journal Article
Workshop report from Web2SE: First workshop on Web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN Journal Article
Submissions from 2009
Scalable multi-core model checking fairness enhanced systems, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article
Adaptive type-2 fuzzy maintenance advisor for offshore power systems, Zhaoxia WANG, C. S. CHANG, Fan YANG, and W. W. Tan Conference Proceeding Article
A new approach for anonymous password authentication, Yanjiang YANG, Jianying ZHOU, Jian Weng, and Feng BAO Conference Proceeding Article
A Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies, Ge FU, Hong ZHU, and Yingjiu LI Conference Proceeding Article
A robust damage assessment model for corrupted database systems, Ge FU, Hong ZHU, and Yingjiu LI Conference Proceeding Article
Bayesian Network Based Services Recommendation, J. WU, H. Jian, and Qianhui (Althea) LIANG Conference Proceeding Article
Coherent phrase model for efficient image near-duplicate retrieval, Yiqun HU, Xiangang CHENG, Liang-Tien CHIA, Xing XIE, Deepu RAJAN, and Ah-hwee TAN Journal Article
Computationally Secure Hierarchical Self-Healing Key Distribution for Heterogeneous Wireless Sensor Networks, Yanjiang YANG, Jianying Zhou, Robert H. DENG, and Feng Bao Conference Proceeding Article
Cyber attacks: Does physical boundary matter?, QIU-HONG WANG and Seung-Hyun KIM Conference Proceeding Article
Denial-of-Service Attacks on Host-Based Generic Unpackers, Limin LIU, Jiang MING, Zhi WANG, Debin GAO, and Chunfu JIA Conference Proceeding Article
DUOL: A Double Updating Approach for Online Learning, Peilin ZHAO, Steven C. H. HOI, and Rong JIN Conference Proceeding Article
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains, Shaoying CAI, Tieyan LI, Changshe MA, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Extending CRM with mobile messaging: A case study, Randall E. DURAN Journal Article
Insights into Malware Detection and Prevention on Mobile Phones, Qiang YAN, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Learning Bregman Distance Functions and its Application for Semi-Supervised Clustering, Lei WU, Rong JIN, Steven C. H. HOI, Jianke ZHU, and Nenghai YU Conference Proceeding Article
Managing Supply Uncertainty with an Information Market, Zhiling GUO, Fang FANG, and Andrew B. WHINSTON Conference Proceeding Article
Modeling Syntactic Structures of Topics with a Nested HMM-LDA, Jing JIANG Conference Proceeding Article
On strategies for imbalanced text classification using SVM: A comparative study, Aixin SUN, Ee Peng LIM, and Ying LIU Journal Article
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup, Bing LIANG, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Perceptual effects in relativity and astrophysics, Manoj THULASIDAS Journal Article
The Future of Innovation is Bright and Shiny as Never Before, Arcot Desai NARASIMHALU Book Chapter
To trust or not to trust? Predicting online trusts using Trust Antecedent Framework, Viet-An NGUYEN, Ee Peng LIM, Jing JIANG, and Aixin SUN Conference Proceeding Article
Wake up or Fall Asleep: Value Implication of Trusted Computing, Nan HU, Jianhui HUANG, Ling LIU, Yingjiu LI, and Dan MA Journal Article
On Group Key Management for Secure Multicast Employing the Inverse Element, Wen Tao ZHU and Robert H. DENG Conference Proceeding Article
Does Sampling Influence Customers in Online Retailing of Digital Music?, Nan HU, Ling LIU, Indranil Bose, and Jialie SHEN Journal Article
Designing and Validating an Agent-Based Commodity Trading Simulation, Shih-Fen CHENG and Yee Pin LIM Conference Paper
ECRA co-editors' introduction for volume 8, issue 6, November - December 2009, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Ensemble and individual noise reduction method for induction-motor signature analysis, Zhaoxia WANG, C.S. CHANG, TW CHUA, and W.W TAN Conference Proceeding Article
Fooling Public-Key Watermarking Detectors with Optimal Color Noise, Yongdong WU and Robert H. DENG Conference Proceeding Article