The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2009

PDF

An examination of perceptions of male and female avatars, D. DEWESTER, Fiona Fui-hoon NAH, S. GERVAIS, and Keng SIAU Conference Proceeding Article

BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon Lee, Seungwoo Kang, Youngki Lee, SangJeong Lee, and Junehwa Song Journal Article

PDF

BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon LEE, Seungwoo KANG, Youngki LEE, SangJeong LEE, and Junehwa SONG Journal Article

Link

Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks, Jian Weng, Robert H. DENG, Xuhua DING, Cheng-Kang CHU, and Junzuo LAI Conference Proceeding Article

PDF

Integrated cognitive architectures: A survey, Hui-Qing CHONG, Ah-hwee TAN, and Gee-Wah NG Journal Article

PDF

Learning image‐text associations, Tao JIANG and Ah-hwee TAN Journal Article

PDF

Real-time near-duplicate elimination for web video search with content and context, Xiao WU, Chong-wah NGO, and Alexander G. HAUPTMANN Journal Article

PDF

Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection, Wan-Lei ZHAO and Chong-wah NGO Journal Article

PDF

Stochastic Modeling Western Paintings for Effective Classification, Jialie SHEN Journal Article

PDF

A Comprehensive Study for RFID Malwares on Mobile Devices, Qiang Yan, Yingjiu Li, Tieyan Li, and Robert Huijie DENG Conference Paper

Link

Air Indexes for Spatial Databases, Baihua ZHENG Encyclopaedia

Link

An E-Commerce Performance Assessment Model: Its Development and an Initial Test on E-Commerce Applications in the Retail Sector of China, Jinghua HUANG, Ximin JIANG, and Qian TANG Journal Article

Link

An Efficient Online Auditing Approach to Limit Private Data Disclosure, Haibing LU, Yingjiu LI, Jaideep Vaidya, and Vijay Atluri Conference Proceeding Article

An examination of the effects of offshore and outsourced development on the delegation of responsibilities to software components, Subhajit DATTA and Robert VAN ENGELEN Conference Proceeding Article

Are Online Reviews Just Noise? The Truth, the Whole Truth, or Only the Partial Truth?, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper

PDF

A semiotic analysis of unified modeling language graphical notations, Keng SIAU and Yuhong TIAN Journal Article

Link

Better Security Enforcement in Trusted Computing Enabled Heterogeneous Wireless Sensor Networks, Yanjiang YANG, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article

Link

Caching Schemes for DCOP Search Algorithms, William YEOH, Pradeep Reddy VARAKANTHAM, and Sven Koenig Conference Proceeding Article

PDF

Chaos and uncertainty, M. THULASIDAS Magazine Article

Comparison-Shopping Channel Selection by Small Online Vendors: An Exploratory Study, Nan HU and Wan Yun Book Chapter

Link

Compositemap: A Novel Music Similarity Measure for Personalized Multimodal Music Search, Bingjun ZHANG, Qiaoliang XIANG, Ye WANG, and Jialie SHEN Conference Proceeding Article

PDF

Computing Medoids in Large Spatial Datasets, Kyriakos MOURATIDIS, Dimitris PAPADIAS, and Spiros PAPADIMITRIOU Book Chapter

PDF

Continuous Monitoring of Spatial Queries, Kyriakos MOURATIDIS Encyclopaedia

PDF

Control-Theoretic, Mission-Driven, Optimization Techniques for Wireless Sensor Networks, Archan MISRA, Sharanya ESWARAN, and Thomas LA PORTA Conference Proceeding Article

Link

Developing a Collaborative Supply Chain Reference Model for a Regional Manufacturing Industry in China, Shui-Hua HAN and Chao-Hsien CHU Journal Article

PDF

Distributed Utility-Based Rate Adaptation Protocols for Prioritized, Quasi-Elastic Flows, Sharanya ESWARAN, Matthew P. JOHNSON, Archan MISRA, and Thomas LA PORTA Journal Article

Double Learning or Double Blinding: An Investigation of Vendor Private Information Acquisition and Consumer Learning, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper

PDF

Dynamic web service selection for reliable web service composition, San-Yih HWANG, Ee Peng LIM, Chien-Hsiang LEE, and Cheng-Hung CHEN Journal Article

Link

Economics, Information Systems, and Electronic Commerce: Empirical Research, Robert J. KAUFFMAN and Paul P. TALLON Edited Book

ECRA Co-editors' introduction for volume 8, issue 1, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

PDF

Efficient Valid Scope Computation for Location-Dependent Spatial Queries in Mobile and Wireless Environments, Ken C. K. LEE, Wang-chien LEE, Hong Va LEONG, Brandon UNGER, and Baihua ZHENG Conference Proceeding Article

Electronic commerce research and applications (ECRA) Co-Editors' Introduction for Volume 8, Issue 3, May - June 2009, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

Link

Empirical Design of Incentive Mechanisms in Group-Buying Auctions: Chapter 8, Her-Sen DOONG, Robert J. KAUFFMAN, Hsiangchu LAI, and Ya-Ting ZHUANG Book Chapter

PDF

Event-Detecting Multi-Agent MDPs: Complexity and Constant-Factor Approximation, Akshat KUMAR and S. Zilberstein Conference Proceeding Article

Feature-based Substructure Similarity Search, Feida ZHU, Xifeng YAN, Philip S. YU, and Jiawei HAN Book Chapter

Finding the same source programs based on the structural fingerprint distance of call graph, Zhiyi YIN, Fuxi ZHU, Jianming FU, and Debin GAO Journal Article

Image Effects and Rational Inattention in Internet-Based Selling., D. W. Lee, Robert John KAUFFMAN, and M. Bergen Journal Article

PDF

Integrated Resource Allocation and Scheduling in Bidirectional Flow Shop with Multi-Machine and COS Constraints, Hoong Chuin LAU, Zhengyi ZHAO, and Shuzhi Sam Ge Journal Article

Link

Introduction to the Special Issue: Competitive Strategy, Economics, and Information Systems, E. K. CLEMONS, Robert J. Kauffman, and T. Weber Journal Article

Link

Introduction to the Special Section: Marketing and E-Commerce, Ming-Hui HUANG and Robert J. Kauffman Journal Article

Link

Linear Regression, Jialie SHEN Encyclopaedia

PDF

Localized Monitoring of kNN Queries in Wireless Sensor Networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Journal Article

Link

Log-Linear Regression, Jialie SHEN Encyclopaedia

Mining Past-Time Temporal Rules: A Dynamic Analysis Approach, David LO, Siau-Cheng KHOO, and Chao LIU Book Chapter

Mining Software Specifications, David LO and Siau-Cheng Khoo Encyclopaedia

PDF

Modelling situation awareness for context‐aware decision support, Yu-Hong FENG, Teck-Hou TENG, and Ah-hwee TAN Journal Article

Link

Multistage Off-line Permutation Packet Routing on a Mesh: an Approach with Elementary Mathematics, Kevin CHIEW and Yingjiu LI Journal Article

PDF

Multiuser private queries over encrypted databases, Yanjiang YANG, Feng Bao, Xuhua DING, and Robert H. DENG Journal Article

Link

Navigational Path Privacy Protection: Navigational Path Privacy Protection, Ken C. K. LEE, Wang-chien LEE, Hong Va LEONG, and Baihua ZHENG Conference Proceeding Article

Link

n PAKE+: a tree-based group password-authenticated key exchange protocol using different passwords, Zhiguo WAN, Robert H. DENG, Feng Bao, Bart Preneel, and Ming GU Journal Article

PDF

Offering RSS Feeds: Does It Help to Gain Competitive Advantage?, Dan MA Conference Proceeding Article

PDF

Ontology-based business process customization for composite web services, Qianhui (Althea) LIANG, Xindong Wu, E. K. PARK, T. Khoshgoftaar, and C. Chi Journal Article

Open Innovation and Platform Pricing, Mei LIN, X. KE, and Andrew B. WHINSTON Conference Proceeding Article

Link

Opportunities and challenges for information systems research: Beyond the bounds of statistical inference: An introduction: Chapter 1, Robert J. KAUFFMAN and Paul P. TALLON Book Chapter

PDF

Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases, Kyriakos MOURATIDIS, Dimitris SACHARIDIS, and Hwee Hwa PANG Journal Article

Link

Planning Technology Investments for High Payoffs: A Rational Expectations Approach to Gauging Potential and Realized Value in a Changing Environment, Yoris A. AU, Kim Huat GOH, Robert J. KAUFFMAN, and Frederick J. RIGGINS Book Chapter

Link

Privacy-Preserving Querying in Sensor Networks, Emiliano CRISTOFARO, Xuhua DING, and Gene Tsudik Conference Proceeding Article

PDF

Quality-aware collaborative Question Answering: Methods and evaluation, Maggy Anastasia SURYANTO, Ee Peng LIM, Aixin SUN, and Roger Hsiang-Li CHIANG Conference Proceeding Article

PDF

QUC-Tree: Integrating query context information for efficient music retrieval, Jialie SHEN, Dacheng Tao, and Xuelong LI Journal Article

Ratings Lead You to the Product, Reviews Help you Clinch it? The Dynamics and Impact of Online Review Sentiments on Product Sales, Nan HU, Noi Sian KOH, and Srinivas K. REDDY Working Paper

Link

Rule randomisation and its application to logic-based workflow verification, Qianhui (Althea) LIANG and S. Rubin Journal Article

Link

Should We Collude? Analyzing the Benefits of Bidder Cooperation in Group-Buying Auctions, J. CHEN, X. CHEN, Robert J. Kauffman, and X. SONG Journal Article

Should We Collude? Analyzing the Benefits of Bidder Cooperation in Group-Buying Auctions., J. Chen, X. Chen, Robert John KAUFFMAN, and X. Song Journal Article

Link

Spreadsheet Modeling of Hotel Room Sales and Demand Distribution Estimation, Thin Yin LEONG and Michelle Lee Fong CHEONG Journal Article

PDF

The Architecture of Platforms: A Unified View, Carliss Y. BALDWIN and C. Jason Woodard Book Chapter

PDF

The Price of Stability in Selfish Scheduling Games, Lucas AGUSSURJA and Hoong Chuin LAU Journal Article

PDF

Tuning On-Air Signatures for Balancing Performance and Confidentiality, Baihua ZHENG, Wang-chien LEE, Peng LIU, Dik Lun LEE, and Xuhua DING Journal Article

Link

Two-Tier Air Indexing for on-Demand Xml Data Broadcast, Weiwei SUN, Ping YU, Yongrui Qin, Zhuoyao ZHANG, and Baihua ZHENG Conference Proceeding Article

PDF

Web Social Mining, Hady W. LAUW and Ee Peng LIM Encyclopaedia

PDF

When is it Beneficial for a Firm to Pursue a Unified Procurement Strategy for Enterprise Software Solutions?, Robert J. KAUFFMAN and Juliana Y. TSAI Conference Proceeding Article

Submissions from 2008

PDF

Text Mining in Radiology Reports, Tianxia GONG, Chew Lim TAN, Tze-Yun LEONG, Cheng Kiang LEE, Boon Chuan PANG, C. C. Tchoyoson LIM, Qi TIAN, Suisheng TANG, and Zhuo ZHANG Conference Proceeding Article

PDF

Adoption of 3-D virtual worlds for education, X. CHEN, Keng SIAU, and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

A fast pruned‐extreme learning machine for classification problem, Hai-Jun RONG, Yew-Soon ONG, Ah-hwee TAN, and Zexuan ZHU Journal Article

PDF

Ambiguous optimistic fair exchange, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Conference Proceeding Article

Analysis and Improvements of a Secure E-Tender Submission, Shaoying CAI, Yingjiu LI, Yunlei ZHAO, and Yiming ZHAO Conference Paper

Link

A Security and Performance Evaluation of Hash-Based Rfid Protocols, Tong-Lee Lim, Tieyan Li, and Yingjiu Li Conference Paper

PDF

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairing, Robert H. DENG, Jian Weng, Shengli LIU, and Kefei CHEN Conference Proceeding Article

PDF

Cognitive agents integrating rules and reinforcement learning for context-aware decision support, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article

Cultural Factors in Technological Innovation and Entrepreneurship: Israel Versus Singapore, Ori SASSON Conference Paper

PDF

Distributing complementary resources across multiple periods with stochastic demand, Shih-Fen CHENG, John TAJAN, and Hoong Chuin LAU Conference Proceeding Article

PDF

Efficient Client-to-Client Password Authenticated Key Exchange, Yanjiang YANG, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

Explaining Inferences in Bayesian Networks, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Journal Article

Link

Graph OLAP: Towards Online Analytical Processing on Graphs, CHEN CHEN, Xifeng YAN, Feida ZHU, Jiawei Han, and Philip S. YU Conference Proceeding Article

Hemorrhage slices detection in brain CT images, Liu R., Tan C., Tze-Yun LEONG, Lee C., Pang B., Lim C., Tian Q., Tang S., and Zhang Z. Conference Proceeding Article

PDF

Innovation in the programmable web: Characterizing the mashup ecosystem, C. Jason WOODARD and Shuli YU Conference Proceeding Article

PDF

Making Sense of Technology Trends in the Information Technology Landscape, Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta, and Robert J. KAUFFMAN Journal Article

PDF

Mobitop: Accessing hierarchically organized georeferenced multimedia annotations, Thi Nhu Quynh KIM, Khasfariyati Razikin, Dion Hoe-Lian GOH, Quang Minh NGUYEN, and Ee Peng LIM Conference Proceeding Article

PDF

On visualizing heterogeneous semantic networks from multiple data sources, Maureen Maureen, Aixin SUN, Ee Peng LIM, Anwitaman DATTA, and Kuiyu CHANG Conference Proceeding Article

PDF

Planning with iFALCON: Towards a neural-network-based BDI agent architecture, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article

Pricing on-Demand Software Competitively in a Dynamic Market, Dan MA Conference Paper

PDF

Privacy Engine for Context-Aware Enterprise Application Services, Marion BLOUNT, John DAVIS, Maria EBLING, William JEROME, Barry LEIBA, Xuan LIU, and Archan MISRA Conference Proceeding Article

PDF

Robust regularized Kernel regression, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Journal Article

PDF

Scaling up multi-agent reinforcement learning in complex domains, Dan XIAO and Ah-hwee TAN Conference Proceeding Article

PDF

Text Cube: Computing IR Measures for Multidimensional Text Database Analysis, Cindy Xinde LIN, Bolin DING, Jiawei HAN, Feida ZHU, and Bo ZHAO Conference Proceeding Article

Link

Value-at-Risk in Services-Oriented Systems and Technology Investments: A Framework for Managing Project Portfolio Uncertainties, Robert J. KAUFFMAN and Ryan Sougstad Journal Article

Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer, Pedro PERIS-LOPEZ, Julio Hernandez-Castro, Juan Estevez-Tapiador, Tieyan LI, and Yingjiu LI Conference Paper

Writing for publication in biomedical informatics., D. Aronsky, Tze-Yun LEONG, J. Talmon, R. Haux, Safran, and C. Conference Proceeding Article

PDF

A neural network model for a hierarchical spatio-temporal memory, Kiruthika RAMANATHAN, Luping SHI, Jianming LI, Kian Guan LIM, Zhi Ping ANG, and Chong Chong TOW Conference Proceeding Article

PDF

A new framework for the design and analysis of identity-based identification schemes, Guomin YANG, Jing CHEN, Duncan S. WONG, Xiaotie DENG, and Dongsheng WANG Journal Article

PDF

Beyond semantic search: What you observe may not be what you think, Chong-wah NGO, Yu-Gang JIANG, Xiaoyong WEI, Wanlei ZHAO, Feng WANG, Xiao WU, and Hung-Khoon TAN Conference Paper