The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2009

A Method for Monetizing Technology Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

An Agent-based Commodity Trading Simulation, Shih-Fen CHENG and Yee Pin LIM Conference Proceeding Article

Link

Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University's Security and Risk Analysis, R. L. MARCHANT, R. Cole, and Chao-Hsien CHU Journal Article

PDF

Automatic Steering of Behavioral Model Inference, David LO, Leonardo Mariani, and Mauro Pezze Conference Proceeding Article

PDF

Bonus plans of mice and men, M. THULASIDAS Magazine Article

PDF

Compositemap: A Novel Framework for Music Similarity Measure, Bingjun ZHANG, Jialie SHEN, Qiaoliang XIANG, and Ye WANG Conference Proceeding Article

Link

Concept Drifting Detection on Noisy Streaming Data in Random Ensemble Decision Trees, Peipei LI, X. Hu, Qianhui (Althea) LIANG, and Yunjun GAO Conference Proceeding Article

PDF

Conditional Proxy Broadcast Re-Encryption, Cheng-Kang CHU, Jian Weng, Sherman S. W. Chow, Jianying Zhou, and Robert H. DENG Conference Proceeding Article

PDF

Continuous Obstructed Nearest Neighbor Queries in Spatial Databases, Yunjun GAO and Baihua ZHENG Conference Proceeding Article

PDF

Creating human-like autonomous players in real-time first person shooter computer games, Di WANG, Budhitama SUBAGDJA, Ah-hwee TAN, and Gee-Wah NG Conference Proceeding Article

PDF

Efficient non-interactive range proof, Tsz Hon YUEN, Qiong HUANG, Yi MU, Willy SUSILO, Duncan S. WONG, and Guomin YANG Conference Proceeding Article

Electronic commerce research and applications (ECRA) co-editors' introduction for volume 8, issue 4, July - August 2009, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

Emerging Behaviors in a Large Scale System: The Singapore Education System, Ori SASSON Conference Paper

Enhancing the Speed and Accuracy of Automated Parameter Tuning in Heuristic Design, Hoong Chuin LAU and Fei Xiao Conference Proceeding Article

PDF

Exploring inter-concept relationship with context space for semantic video indexing, Xiao-Yong WEI, Yu-Gang JIANG, and Chong-wah NGO Conference Proceeding Article

PDF

Identifying Bug Signatures Using Discriminative Graph Mining, Hong CHENG, David LO, YANG ZHOU, Xiaoyin WANG, and Xifeng YAN Conference Proceeding Article

PDF

Integrating specification and programs for system modeling and verification, Jun SUN, Yang LIU, Jin Song DONG, and Chunqing CHEN Conference Proceeding Article

Link

Internal Supply Chain Coordination in the Electric Utility Industry, Guiseppi FORGIONNE and Zhiling GUO Journal Article

PDF

KTR: An efficient key management scheme for secure data access control in wireless broadcast services recovery, Qijun GU, Peng LIU, Wang-Chien LEE, and Chao-Hsien CHU Journal Article

PDF

Large-scale near-duplicate web video search: Challenge and opportunity, Wan-Lei ZHAO, Song TAN, and Chong-wah NGO Conference Proceeding Article

PDF

Leak-Free Mediated Group Signatures, Xuhua DING, Gene TSUDIK, and Shouhuai XU Journal Article

PDF

Learning and inferencing in user ontology for personalized Semantic Web search, Xing JIANG and Ah-hwee TAN Journal Article

PDF

On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities, Jin HAN, Debin GAO, and Robert H. DENG Conference Proceeding Article

On using genetic algorithms to support post-solution deliberation in the generalized assignment problem, Steven O. KIMBROUGH, Ann KUO, and Hoong Chuin LAU Conference Paper

PDF

Poster abstract: BeamCast: Harnessing beamforming capabilities for link layer multicast, Souvik SEN, Rahul GHOSH, Jie XIONG, and Romit Roy CHOUDHURY Magazine Article

Link

Randomization for Testing Systems of Systems, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article

PDF

Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity, Kar Way TAN, Yimin LIN, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

The wisdom of the few: A collaborative filtering approach based on expert opinions from the web, Xavier AMATRIAIN, Neal LATHIA, Josep M. PUJOL, Haewoon KWAK, and Nuria. OLIVER Conference Proceeding Article

PDF

Towards expressive specification and efficient model checking, Jin Song DONG and Jun SUN Conference Proceeding Article

PDF

Verification of population ring protocols in PAT, Yang LIU, Jun PANG, Jun SUN, and Jianhua ZHAO Conference Proceeding Article

Bridging Academic and Industry Innovation Networks, Arcot Desai NARASIMHALU Conference Paper

PDF

Fair model checking with process counter abstraction, Jun SUN, Yang LIU, Abhik ROYCHOUDHURY, Shanshan LIU, and Jin Song DONG Conference Proceeding Article

PDF

Model checking linearizability via refinement, Yang LIU, Wei CHEN, Yanhong A. LIU, and Jun SUN Conference Proceeding Article

PDF

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks, Sharanya ESWARAN, Matthew JOHNSON, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article

PDF

Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection, Kar Way TAN and Robert H. DENG Conference Proceeding Article

PDF

Architectural Dualities in Complex Systems: Components, Interfaces, Technologies and Organizations, C. Jason WOODARD and Joel West Conference Paper

PDF

A revisit of generative model for automatic image annotation using markov random fields, Yu XIANG, Xiangdong ZHOU, Tat-Seng CHUA, and Chong-wah NGO Conference Proceeding Article

Buzzspace: Virtual World Based Game for Youth Engagement, Ori SASSON and Shamim Akhtar Conference Paper

Link

Conceptual framework of a dynamic resource allocation test bed and its practical realization with ProModel, I. R. WIOR, Z. J. ZHAO, M. LUO, J. B. ZHANG, S. S. GE, and Hoong Chuin LAU Conference Proceeding Article

Link

Control-theoretic optimization of utility over mission lifetimes in multi-hop wireless networks, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article

PDF

Cyber attacks: Cross-country interdependence and enforcement, QIU-HONG WANG and Seung Hyun KIM Conference Proceeding Article

Goldenspear Hls: Wargame for Peacekeeping and Homeland Security, Ori SASSON and Hajindar Singh Conference Paper

PDF

Information sharing and strategic signaling in supply chains, Robert J. KAUFFMAN and Hamid MOHTADI Journal Article

PDF

Intentional learning agent architecture, Budhitama SUBAGDJA, Liz SONENBERG, and Iyad RAHWAN Journal Article

PDF

Interference-aware routing protocol in multi-radio wireless mesh networks, Byoungheon SHIN, Yangwoo KO, Jisun AN, and Dongman LEE Conference Proceeding Article

PDF

mFerio: The design and evaluation of a peer-to-peer mobile payment system, Rajesh Krishna BALAN, Narayanasamy RAMASUBBU, Komsit Prakobphol, Nicolas Christin, and Jason Hong Conference Proceeding Article

PDF

Non-Redundant Sequential Rules - Theory and Algorithm, David LO, Siau-Cheng KHOO, and Limsoon WONG Journal Article

PDF

Nonrigid Shape Recovery by Gaussian Process Regression, Jianke ZHU, Steven C. H. HOI, and Michael R. LIU Conference Proceeding Article

PDF

SimpleNPKL: Simple Non-Parametric Kernel Learning, Jinfeng ZHUANG, Ivor TSANG, and Steven C. H. HOI Conference Proceeding Article

The Influence of Online Word-of-Mouth of Long Tail Formation in Online Book Sale: An Empirical Analysis, Qian TANG, Bin GU, and Andrew WHINSTON Presentation

PDF

A formal framework for modeling and validating Simulink diagrams, Chunqing CHEN, Jin Song DONG, and Jun SUN Journal Article

PDF

An Agent-based Commodity Trading Simulation, Shih-Fen CHENG, Yee Pin LIM, and Chao-Chi LIU Conference Proceeding Article

PDF

A Novel Framework for Efficient Automated Singer Identification in Large Music Databases, Jialie SHEN, John Shepherd, Bin CUI, and Kian-Lee TAN Journal Article

PDF

Are Online Auction Markets Efficient? An Empirical Study of Market Liquidity and Abnormal Returns., Robert J. KAUFFMAN, Trent J Spaulding, and Charles A. Wood Journal Article

PDF

A self-organizing neural network architecture for intentional planning agents, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article

PDF

Automatic mining of functionally equivalent code fragments via random testing, Lingxiao JIANG and Zhendong SU Conference Proceeding Article

PDF

Classification of Software Behaviors for Failure Detection: A Discriminative Pattern Mining Approach, David LO, Hong CHENG, Jiawei Han, Siau-Cheng KHOO, and Chengnian SUN Conference Proceeding Article

PDF

ConcernLines: A timeline view of co-occurring concerns, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

Constraint-Based Dynamic Programming for Decentralized POMDPs with Structured Interactions, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Distributed Constraint Optimization with Structured Resource Constraints, Akshat KUMAR, Boi FALTINGS, and Adrian PETCU Conference Proceeding Article

PDF

Dynamic Programming Approximations for Partially Observable Stochastic Games, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

How tagging helps bridge the gap between social and technical aspects in software development, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

On Mining Rating Dependencies in Online Collaborative Rating Networks, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article

PDF

Predicting outcome for collaborative featured article nomination in Wikipedia, Meiqun HU, Ee Peng LIM, and Ramayya KRISHNAN Conference Paper

PDF

Semisupervised SVM batch mode active learning with applications to image retrieval, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Journal Article

Service Innovation Opportunity Identification, Arcot Desai NARASIMHALU Conference Paper

PDF

Sharing hierarchical mobile multimedia content using the MobiTOP system, Quang Minh NGUYEN, Thi Nhu Quynh KIM, Dion Hoe-Lian GOH, Ee-peng LIM, Yin-Leng THENG, Kalyani CHATTERJEA, Chew-Hung CHANG, Aixin SUN, and Khasfariyati RAZIKIN Conference Proceeding Article

PDF

SS-IDS: Statistical Signature based IDS, Payas GUPTA, Chedy RAISSI, Gerard DRAY, Pascal PONCELET, and Johan BRISSAUD Conference Proceeding Article

PDF

The Impact of Process Choice in High Maturity Environments: An Empirical Analysis, Narayanasamy RAMASUBBU and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Zeros and ones, M. THULASIDAS Magazine Article

PDF

Joint ranking for multilingual web search, Wei GAO, Cheng NIU, Ming ZHOU, and Kam-Fai WONG Conference Proceeding Article

On Technology Innovation: A Community Succession Model for Software Enterprise, Qianhui (Althea) LIANG and W. H. DAI Conference Paper

PDF

Achieving better privacy protection in wireless sensor networks using trusted computing, Yanjiang YANG, Robert H. DENG, Jianying ZHOU, and Ying QIU Conference Proceeding Article

PDF

An Incremental Threshold Method for Continuous Text Search Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article

PDF

Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance, Debin GAO, Michael K. Reiter, and Dawn SONG Journal Article

PDF

Describing fuzzy sets using a new concept: Fuzzify functor, Kexin WEI, Zhaoxia WANG, and Quan WANG Journal Article

PDF

Efficient Evaluation of Multiple Preference Queries, Hou U LEONG, Nikos MAMAOULIS, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database, Bolin DING, David LO, Jiawei Han, and Siau-Cheng KHOO Conference Proceeding Article

PDF

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems, Shaoying CAI, Tieyan LI, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

Exploring hierarchically organized georeferenced multimedia annotations in the MobiTOP system, Thi Nhu Quynh KIM, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Yin Leng THENG, Quang Minh NGUYEN, Ee-peng LIM, Aixin SUN, Chew Hung CHANG, and Kalyani CHATTERJEA Conference Proceeding Article

PDF

OPAQUE: Protecting Path Privacy in Directions Search, Ken C. K. LEE, Wang-Chien LEE, Hong Va LEONG, and Baihua ZHENG Conference Proceeding Article

PDF

Optimal Digital Content Distribution Strategy in the Presence of Consumer-to-Consumer Channel, Yunfang FENG, Zhiling GUO, and Wei-Yu Kevin CHIANG Journal Article

PDF

Optimizing service systems based on application-level QoS, Qianhui LIANG, Xindong WU, and Hoong Chuin LAU Journal Article

PDF

RSA-based certificateless public key encryption, Junzuo LAI, Robert H. DENG, Shengli LIU, and Weidong KOU Conference Proceeding Article

PDF

The Digital Wallet: Opportunities and Prototypes, Rajesh Krishna BALAN and Narayanasamy RAMASUBBU Journal Article

Link

Visible Reverse K-Nearest Neighbor Queries, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Wang-chien LEE, Ken C. K. LEE, and Qing LI Conference Proceeding Article

PDF

A social relation aware routing protocol for mobile ad hoc networks, Jisun AN, Yangwoo KO, and Dongman LEE Conference Proceeding Article

Link

Attacks and Improvements to an RFID Mutual Authentication Protocol, Shaoying CAI, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article

Link

Certificate Revocation Release Policies, Nan HU, Giri Kumar Tayi, Chengyu MA, and Yingjiu LI Journal Article

PDF

Continuous Visible Nearest Neighbour Queries, Yunjun GAO, Baihua ZHENG, Wang-Chien LEE, and Gencai CHEN Conference Proceeding Article

PDF

Electronic commerce research and applications ECRA co-editors' introduction for volume 8, issue 2, March - April 2009, Robert J. KAUFFMAN, Patrick Y. K. CHAU, Terry R. PAYNE, and J. Christopher WESTLAND Editorial

PDF

Fast Object Search on Road Networks, Ken C. K. LEE, Wang-Chien LEE, and Baihua ZHENG Conference Proceeding Article

PDF

House of cards, M. THULASIDAS Magazine Article

Link

Parameter Estimation in Semi-Random Decision Tree Ensembling on Streaming Data, Peipei LI, Qianhui (Althea) LIANG, Xindong WU, and X. Hu Conference Proceeding Article

Link

Privacy-preserving Rental Services using One-show Anonymous Credentials, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article

PDF

Programmable Presence Virtualization for Next-Generation Context-based Applications, Arup ACHARYA, Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv Dasgupta, Archan MISRA, Shachi SHARMA, Xiping WANG, and Charles P. WRIGHT Conference Proceeding Article

PDF

Server-assisted Context-Dependent Pervasive Wellness Monitoring, Archan MISRA, Ben FALCHUK, and Shoshana LOEB Conference Proceeding Article

PDF

Visual word proximity and linguistics for semantic video indexing and near-duplicate retrieval, Yu-Gang JIANG and Chong-wah NGO Journal Article

PDF

Web query recommendation via sequential query prediction, Qi HE, Daxin JIANG, Zhen LIAO, Steven C. H. HOI, Kuiyu CHANG, Ee Peng LIM, and Hang LI Conference Proceeding Article

PDF

PAT: Towards flexible verification under fairness, Jun SUN, Yang LIU, Jin Song DONG, and Jun PANG Conference Proceeding Article