Submissions from 2009
Tuning On-Air Signatures for Balancing Performance and Confidentiality, Baihua ZHENG, Wang-chien LEE, Peng LIU, Dik Lun LEE, and Xuhua DING Journal Article
Two-Tier Air Indexing for on-Demand Xml Data Broadcast, Weiwei SUN, Ping YU, Yongrui Qin, Zhuoyao ZHANG, and Baihua ZHENG Conference Proceeding Article
Web Social Mining, Hady W. LAUW and Ee Peng LIM Encyclopaedia
When is it Beneficial for a Firm to Pursue a Unified Procurement Strategy for Enterprise Software Solutions?, Robert J. KAUFFMAN and Juliana Y. TSAI Conference Proceeding Article
Submissions from 2008
Text Mining in Radiology Reports, Tianxia GONG, Chew Lim TAN, Tze-Yun LEONG, Cheng Kiang LEE, Boon Chuan PANG, C. C. Tchoyoson LIM, Qi TIAN, Suisheng TANG, and Zhuo ZHANG Conference Proceeding Article
Adoption of 3-D virtual worlds for education, X. CHEN, Keng SIAU, and Fiona Fui-hoon NAH Conference Proceeding Article
A fast pruned‐extreme learning machine for classification problem, Hai-Jun RONG, Yew-Soon ONG, Ah-hwee TAN, and Zexuan ZHU Journal Article
Ambiguous optimistic fair exchange, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Conference Proceeding Article
Analysis and Improvements of a Secure E-Tender Submission, Shaoying CAI, Yingjiu LI, Yunlei ZHAO, and Yiming ZHAO Conference Paper
A Security and Performance Evaluation of Hash-Based Rfid Protocols, Tong-Lee Lim, Tieyan Li, and Yingjiu Li Conference Paper
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairing, Robert H. DENG, Jian Weng, Shengli LIU, and Kefei CHEN Conference Proceeding Article
Cognitive agents integrating rules and reinforcement learning for context-aware decision support, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article
Cultural Factors in Technological Innovation and Entrepreneurship: Israel Versus Singapore, Ori SASSON Conference Paper
Distributing complementary resources across multiple periods with stochastic demand, Shih-Fen CHENG, John TAJAN, and Hoong Chuin LAU Conference Proceeding Article
Efficient Client-to-Client Password Authenticated Key Exchange, Yanjiang YANG, Feng BAO, and Robert H. DENG Conference Proceeding Article
Explaining Inferences in Bayesian Networks, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Journal Article
Graph OLAP: Towards Online Analytical Processing on Graphs, CHEN CHEN, Xifeng YAN, Feida ZHU, Jiawei Han, and Philip S. YU Conference Proceeding Article
Hemorrhage slices detection in brain CT images, Liu R., Tan C., Tze-Yun LEONG, Lee C., Pang B., Lim C., Tian Q., Tang S., and Zhang Z. Conference Proceeding Article
Innovation in the programmable web: Characterizing the mashup ecosystem, C. Jason WOODARD and Shuli YU Conference Proceeding Article
Making Sense of Technology Trends in the Information Technology Landscape, Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta, and Robert J. KAUFFMAN Journal Article
Mobitop: Accessing hierarchically organized georeferenced multimedia annotations, Thi Nhu Quynh KIM, Khasfariyati Razikin, Dion Hoe-Lian GOH, Quang Minh NGUYEN, and Ee Peng LIM Conference Proceeding Article
On visualizing heterogeneous semantic networks from multiple data sources, Maureen Maureen, Aixin SUN, Ee Peng LIM, Anwitaman DATTA, and Kuiyu CHANG Conference Proceeding Article
Planning with iFALCON: Towards a neural-network-based BDI agent architecture, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article
Pricing on-Demand Software Competitively in a Dynamic Market, Dan MA Conference Paper
Privacy Engine for Context-Aware Enterprise Application Services, Marion BLOUNT, John DAVIS, Maria EBLING, William JEROME, Barry LEIBA, Xuan LIU, and Archan MISRA Conference Proceeding Article
Robust regularized Kernel regression, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Journal Article
Scaling up multi-agent reinforcement learning in complex domains, Dan XIAO and Ah-hwee TAN Conference Proceeding Article
Text Cube: Computing IR Measures for Multidimensional Text Database Analysis, Cindy Xinde LIN, Bolin DING, Jiawei HAN, Feida ZHU, and Bo ZHAO Conference Proceeding Article
Value-at-Risk in Services-Oriented Systems and Technology Investments: A Framework for Managing Project Portfolio Uncertainties, Robert J. KAUFFMAN and Ryan Sougstad Journal Article
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer, Pedro PERIS-LOPEZ, Julio Hernandez-Castro, Juan Estevez-Tapiador, Tieyan LI, and Yingjiu LI Conference Paper
Writing for publication in biomedical informatics., D. Aronsky, Tze-Yun LEONG, J. Talmon, R. Haux, Safran, and C. Conference Proceeding Article
A neural network model for a hierarchical spatio-temporal memory, Kiruthika RAMANATHAN, Luping SHI, Jianming LI, Kian Guan LIM, Zhi Ping ANG, and Chong Chong TOW Conference Proceeding Article
A new framework for the design and analysis of identity-based identification schemes, Guomin YANG, Jing CHEN, Duncan S. WONG, Xiaotie DENG, and Dongsheng WANG Journal Article
Beyond semantic search: What you observe may not be what you think, Chong-wah NGO, Yu-Gang JIANG, Xiaoyong WEI, Wanlei ZHAO, Feng WANG, Xiao WU, and Hung-Khoon TAN Conference Paper
Bias and Controversy in Evaluation Systems, Hady Wirawan LAUW, Ee Peng LIM, and Ke WANG Journal Article
Determining Error Bounds for Spectral Filtering Based Reconstruction Methods in Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Journal Article
Market Liquidity Provision for On-Demand Computing, Zhiling GUO Conference Proceeding Article
Modality Mixture Projections for Semantic Video Event Detection, Jialie SHEN, Dacheng TAO, and Xuelong LI Journal Article
Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect, Liang GU, Xuhua DING, Robert H. DENG, Yanzhen ZOU, Bing XIE, Weizhong SHAO, and Hong MEI Conference Proceeding Article
Ontology-Based Compatibility Checking for Web Service Configuration Management, Qianhui (Althea) LIANG and M. N. Huhns Conference Proceeding Article
Profile-guided program simplification for effective testing and analysis, Lingxiao JIANG and Zhendong SU Conference Proceeding Article
Two-factor mutual authentication based on smart cards and passwords, Guomin YANG, Duncan S. WONG, Huaxiong WANG, and Xiaotie DENG Journal Article
Virtual world affordances: Enhancing brand value, S. PARK, Fiona Fui-hoon NAH, D. DEWESTER, B. ESCHENBRENNER, and S. JEON Journal Article
Distribution-Based Similarity Measures for Multi-Dimensional Point Set Retrieval Applications, Jie SHAO, Zi HUANG, Heng Tao SHEN, Jialie SHEN, and Xiaofang ZHOU Conference Proceeding Article
A Federated UDDI System for Concurrent Access to Service Data, Qianhui (Althea) LIANG and J. Chung Conference Proceeding Article
A Service-Oriented Development Platform with Precise Service Discovery, G. LIU, Xindong WU, E. TANG, Qianhui (Althea) LIANG, and Y. LI Conference Proceeding Article
Robust Application Level QoS Management in Service-Oriented Systems, Qianhui (Althea) LIANG, Hoong Chuin LAU, and Xindong WU Conference Proceeding Article
Optimal Routing Policy for Taxi Queuing, Shih-Fen CHENG, Darshan Santani, and C. Jason WOODARD Presentation
Accelerating near-duplicate video matching by combining visual similarity and alignment distortion, Hung-Khoon TAN, Xiao WU, Chong-wah NGO, and Wan-Lei ZHAO Conference Proceeding Article
An effective approach to 3D deformable surface tracking, Jianke ZHU, Steven C. H. HOI, Zenglin XU, and Michael R. LYU Conference Proceeding Article
A Secure and Synthesis Tele-Ophthalmology System, Zhuo WEI, Yongdong Wu, Robert H. DENG, Shengsheng YU, Haixia YAO, Zhigang ZHAO, Lek Heng NGOH, Tock Han LIM, and Eugenie POH Journal Article
A study of early stage game design and prototyping, Brien COLWELL, Richard C. DAVIS, and James A. Landay Report
Bayesian Tensor Approach for 3-D Face Modeling, Dacheng TAO, Mingli SONG, Xuelong LI, Jialie SHEN, Jimeng SUN, Xindong WU, Christos Faloutsos, and Stephen J. Maybank Journal Article
Binhunt: Automatically Finding Semantic Differences in Binary Programs, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection, Peng LI, Hyundo PARK, Debin GAO, and Jianming Fu Conference Proceeding Article
Comparison of online social relations in volume vs interaction: A case study of Cyworld, Hyunwoo CHUN, Haewoon KWAK, Young-Ho EOM, Yong-Yeol AHN, Sue MOON, and Hawoong. JEONG Conference Proceeding Article
Determining the number of BP neural network hidden layer units, Huayu SHEN, Zhaoxia WANG, Chengyao GAO, Juan QIN, Fubin YAO, and Wei XU Journal Article
Evaluation of operational plans in container terminal yards using Discrete-Event Simulation, Nang Laik MA and Eleni Hadjiconstantinou Journal Article
Event detection with common user interests, Meishan HU, Aixin SUN, and Ee Peng LIM Conference Proceeding Article
Fusing semantics, observability, reliability and diversity of concept detectors for video search, Xiao-Yong WEI and Chong-wah NGO Conference Proceeding Article
Hierarchical Inter-Object Traces for Specification Mining, David LO and Shahar Maoz Conference Proceeding Article
Impacts of Information and Communication Technologies on Country Development: Accounting for Area Interrelationships, Robert J. KAUFFMAN and Ajay Kumar Journal Article
Leveraging Social Context for Searching Social Media, Marc SMITH, Vladimir BARASH, Lise GETOOR, and Hady W. LAUW Conference Proceeding Article
Link layer multicast using smart antennas: No client left behind, Souvik SEN, Jie XIONG, Rahul GHOSH, and Romit Roy CHOUDHURY Conference Proceeding Article
Mining Specifications in Diversified Formats from Execution Traces, David LO Conference Proceeding Article
Model checking CSP revisited: Introducing a process analysis toolkit, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Modeling video hyperlinks with hypergraph for web video reranking, Hung-Khoon TAN, Chong-wah NGO, and Xiao WU Conference Proceeding Article
Near-Duplicate Keyframe Retrieval by Nonrigid Image Matching, Jianke ZHU, Steven C. H. HOI, Michael R. LYU, and Shuicheng YAN Conference Proceeding Article
Offering RSS Feeds: Will it Increase Website Profitability?, Dan MA Conference Paper
Ontology-based visual word matching for near-duplicate retrieval, Yu-Gang JIANG and Chong-wah NGO Conference Proceeding Article
Ontology enhanced web image retrieval: Aided by Wikipedia and spreading activation theory, Huan WANG, Xing JIANG, Liang-Tien CHIA, and Ah-hwee TAN Conference Proceeding Article
Output regularized metric learning with side information, Wei LIU, Steven C. H. HOI, and Jianzhuang LIU Conference Proceeding Article
Recursive pattern based hybrid supervised training, Kiruthika RAMANATHAN and Sheng Uei GUAN Book Chapter
Remote Attestation on Program Execution, Liang GU, Xuhua DING, Robert H. DENG, Bing Xie, and Hong MEI Conference Proceeding Article
Representative entry selection for profiling blogs, Jinfeng ZHUANG, Steven C. H. HOI, Aixin SUN, and Rong JIN Conference Proceeding Article
Resource-aware Video Multicasting via Access Gateways in Wireless Mesh Networks, Wanqing TU, Cormac J. SREENAN, Chun Tung CHOU, and Archan MISRA Conference Proceeding Article
ROAD: An Efficient Framework for Location De-pendent Spatial Queries on Road Networks, Ken C. K. LEE, Wang-chien LEE, and Baihua ZHENG Conference Proceeding Article
Selection of concept detectors for video search by ontology-enriched semantic spaces, Xiao-Yong WEI, Chong-wah NGO, and Yu-Gang JIANG Journal Article
Spatio-temporal efficiency in a taxi dispatch system, Darshan SANTANI, Rajesh Krishna BALAN, and C. Jason WOODARD Report
Specification Mining of Symbolic Scenario-Based Models, David LO and Shahar Maoz Conference Proceeding Article
Specifying and verifying event-based fairness enhanced systems, Jun SUN, Yang LIU, Jin Song DONG, and Hai H. WANG Conference Proceeding Article
Specifying and verifying sensor networks: An experiment of formal methods, Jin Song DONG, Jing SUN, Jun SUN, Kenji TAGUCHI, and Xian ZHANG Conference Proceeding Article
Spreadsheet Data Resampling for Monte-Carlo Simulation, Thin Yin LEONG and Wee Leong LEE Journal Article
Structuring low-quality videotaped lectures for cross-reference browsing by video text analysis, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Journal Article
The evaluation of situational transaction trust in e-service environments, Yan WANG and Ee Peng LIM Conference Proceeding Article
Understanding Evolution in Technology Ecosystems, Gediminas Adomavicius, Jesse Bockstedt, Alok Gupta, and Robert J. Kauffman Journal Article
Using English information in Non-English web search, Wei GAO, Wei GAO, and Ming ZHOU Conference Proceeding Article
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks, Yanjiang YANG, Robert H. DENG, Feng BAO, and Jianying ZHOU Conference Proceeding Article
Valid Scope Computation for Location-Dependent Spatial Query in Mobile Broadcast Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article
Video event detection using motion relativity and visual relatedness, Feng WANG, Yu-Gang JIANG, and Chong-wah NGO Conference Proceeding Article
Adoption of Service Oriented Computing from the IT Professionals’ Perspective: An e-Government Case Study , Ilse BAUMGARTNER and Peter GREEN Conference Proceeding Article
A heuristic method for job-shop scheduling with an infinite wait buffer: From one-machine to multi-machine problems, Z. J. ZHAO, J. KIM, M. LUO, Hoong Chuin LAU, and S. S. GE Conference Proceeding Article
An Efficient PIR Construction using Trusted Hardware, Yanjiang YANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article
Cascade RSVM in Peer-to-Peer Network, Hock Hee ANG, Vivekanand Gopalkrishnan, Steven C. H. HOI, and Wee Keong NG Conference Proceeding Article
Disclosure Analysis and Control in Statistical Databases, Yingjiu LI and Haibing LU Conference Proceeding Article
Distinguishing between FE and DDoS using Randomness Check, Hyundo PARK, Peng LI, Debin GAO, Heejo LEE, and Robert H. DENG Conference Proceeding Article
Do Online Reviews Affect Product Sales? The Role of Reviewer Characteristics and Temporal Effects, Nan HU, Ling LIU, and Jennifer ZHANG Journal Article
Generating robust schedules subject to resource and duration uncertainties, Na FU, Hoong Chuin LAU, and Fei XIAO Conference Proceeding Article
Network Effects and Embedded Options: Decision-Making under Uncertainty for Network Technology Investments., Robert John KAUFFMAN and A. Kumar Journal Article
Relative Importance, Specific Investment and Ownership in Interorganizational Systems., Kunsoo Han, Robert J. KAUFFMAN, and Barrie R. Nault Journal Article