Submissions from 2004
Progressive Protection of JPEG2000 Codestreams, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article
Structuring home video by snippet detection and pattern parsing, Zailiang PAN and Chong-wah NGO Conference Proceeding Article
Study of predicting combined chaotic time series using neural networks, Zhaoxia WANG, Z.Q. Chen, Z.Z. Yuan, T.Z. Hao, and B.H. Yang Journal Article
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Conference Proceeding Article
Trust Establishment in Large Scale Grid Settings, Bo ZHU, Tieyan LI, Huafei ZHU, Mohan S . KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article
A Development Framework for Rapid Metaheuristics Hybridization, Hoong Chuin LAU, M. K. LIM, W. C. Wan, and S. Halim Conference Proceeding Article
A spectroscopy of texts for effective clustering, Wenyuan LI, Wee-Keong NG, Kok-Leong ONG, and Ee Peng LIM Conference Proceeding Article
A Two-level Framework for Coalition Formation via Optimization and Agent Negotiation, Hoong Chuin LAU and Lei ZHANG Conference Proceeding Article
A Visual Language for Animating Sketches, Richard C. DAVIS and James A. Landay Conference Proceeding Article
Classify Encrypted Data in Wireless Sensor Networks, Yongdong WU, Di MA, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Computing of Trust in Wireless Networks, Huafei ZHU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Effect of ocular artifact removal in brain computer interface accuracy, Manoj THULASIDAS, Sitaram RANGANATHA, Jiankang WU, and Wenjie XU Conference Proceeding Article
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes, Guilin WANG, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Proxy Signature Scheme with Multiple Original Signers for Wireless E-Commerce Applications, Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Robust classification of event-related potential for brain-computer interface, Manoj THULASIDAS Conference Paper
SCLOPE: An algorithm for clustering data streams of categorical attributes, Kok-Leong ONG, Wenyuan LI, Wee-Keong NG, and Ee Peng LIM Conference Proceeding Article
Securing Return Routability Protocol against Active Attacks, Huafei ZHU, Feng Bao, and Robert H. DENG Conference Proceeding Article
Security Analysis of Two Signcryption Schemes, Guilin WANG, Robert H. DENG, DongJin KWAK, and Sangjae MOON Conference Proceeding Article
Shared-Storage Auction Ensures Data Availability, Hady W. LAUW, Siu-Cheung HUI, and Edmund M. K. LAI Journal Article
Towards personalised web intelligence, Ah-hwee TAN, Hwee-Leng ONG, Hong PAN, Jamie NG, and Qiu-Xiang LI Journal Article
The Pricing and Profitability of Modular Clusters, Carliss Y. BALDWIN, Kim B. Clark, and C. Jason WOODARD Presentation
Deformable geometry model matching by topological and geometric signatures, Kwok-Leung TAM, Rynson W.H. LAW, and Chong-wah NGO Conference Proceeding Article
Exploiting information theory for adaptive mobility and resource management in future cellular networks, Abhishek ROY, Sajal K. DAS, and Archan MISRA Magazine Article
Gesture tracking and recognition for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Graph based image matching, Hui JIANG and Chong-wah NGO Conference Proceeding Article
Group-based Relevance Feedback with Support Vector Machine Ensembles, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article
High accuracy classification of EEG signal, Wenjie XU, Cuitai GUAN, Chng Eng SIONG, S. RANGANATHA, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article
ICA-FX features for classification of singing voice and instrumental sound, Tat-Wan LEUNG, Chong-wah NGO, and Rynson W. H LAU Conference Proceeding Article
Job Satisfaction of Information Technology Professionals, Nan HU, Simon Poon, and Wan Yun Conference Proceeding Article
LTAM: A Location-Temporal Authorization Model, Hai YU and Ee Peng LIM Conference Proceeding Article
Novel seed selection for multiple objects detection and tracking, Zailiang PAN and Chong-wah NGO Conference Proceeding Article
On Gray-Box Program Tracking for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
Packet-loss resilient coding scheme with only XOR operations, Gui Liang FENG, Robert H. DENG, and Feng BAO Conference Proceeding Article
Rating information security maturity, Arcot Desai Narasimhalu and Nagarajan DAYASINDHU Magazine Article
Returns on Investment in Information Technology, Rajiv BANKER, Mark Anderson, and Nan Hu Conference Paper
Search Continuous Nearest Neighbor on Air, Baihua ZHENG, Wang-chien LEE, and Dik Lun LEE Conference Proceeding Article
Tracking the Mindset of Open Source Participation, Nan HU, Simon Poon, and Wan Yun Conference Proceeding Article
We did the right thing: an intervention analysis approach to modeling intervened SARS propagation in Singapore., Bin Han Han and Tze-Yun LEONG Conference Proceeding Article
Transport Logistics Planning with Service-Level Constraints, Hoong Chuin LAU, K. M. NG, and Xintao WU Conference Proceeding Article
An Interactive Learning Environment for a Dynamic Educational Digital Library, Ee Peng LIM, Dion Hoe-Lian GOH, Yin-Leng THENG, and Eng-Kai SUEN Journal Article
Approach for shot retrieval by optimal matching in the bipartite graph, Yu-Xin PENG, Chong-wah NGO, and Jian-Guo XIAO Journal Article
A support-ordered trie for fast frequent itemset discovery, Ee Peng LIM, Yew-Kwong WOON, and Wee-Keong NG Journal Article
Biased Support Vector Machine for Relevance Feedback in Image Retrieval, Steven HOI, Chi-Hang CHAN, Kaizhu HUANG, Michael R. LYU, and Irwin KING Conference Proceeding Article
Defending against Additive Attacks with Maximal Errors in Watermarking Relational Databases, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Conference Proceeding Article
Effect of Quality Management Practices in Distributed Offshore Software Development: An Empirical Analysis, Narayan RAMASUBBU, Sunil Mithas, M. S. Krishnan, and Chris F. Kemerer Conference Proceeding Article
INFOSeMM: Infosys IT Security Maturity Model: A Report, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Report
Notes on Equilibria in Symmetric Games, Shih-Fen CHENG, Daniel M. REEVES, Yevgeniy VOROBEYCHIK, and Michael P. WELLMAN Conference Proceeding Article
Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Event Scheduling, Rajiv MAHESWARAN, Milind Tambe, Emma Bowring, Jonathan Pearce, and Pradeep VARAKANTHAM Conference Proceeding Article
A Rate-Distortion Framework for Information-Theoretic Mobility Management, Abhishek ROY, Archan MISRA, and Sajal K. DAS Conference Proceeding Article
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity, Bok-Min GOI, Raphael C. W. PHAN, Yanjiang YANG, Feng BAO, Robert H. DENG, and M. U. Siddiqi Conference Proceeding Article
Proprietary and Open Systems Adoption in E-Procurement: A Risk-Augmented Transactions Cost Perspective, Robert J. Kauffman and Hamid Mohtadi Journal Article
Robust Face Recognition using Minimax Probability Machine, Steven HOI and Michael R. LYU Conference Proceeding Article
Steganographic Schemes for File System and B-Tree, Hwee Hwa PANG, Kian-Lee TAN, and Xuan ZHOU Journal Article
Tournament versus Fitness Uniform Selection, Shane LEGG, Marcus HUTTER, and Akshat KUMAR Conference Proceeding Article
Individuals and Institutions in Strategic Network Formation, C. Jason WOODARD Presentation
Mastering IBM Websphere Portal Server, Ben-Natan RON, Gornitsky Richard, Hanis Tim, and Ori SASSON Book
Modified ART 2A growing network capable of generating a fixed number of nodes, Ji HE, Ah-hwee TAN, and Chew-Lim TAN Journal Article
Multi-Period Multi-Dimensional Knapsack Problem and Its Application to Available-to-Promise, Hoong Chuin LAU and M. K. LIM Conference Proceeding Article
Power Adaptation Based Optimization for Energy Efficient Reliable Wireless Paths, Suman BANERJEE and Archan MISRA Conference Proceeding Article
Toolglasses, marking menus, and hotkeys: a comparison of one and two-handed command selection techniques, Daniel L. ODELL, Richard C. DAVIS, Andrew Smith, and Paul K. Wright Conference Proceeding Article
Towards building logical views of websites, Ee Peng LIM, Zehua LIU, Wee-Keong NG, and Feifei LI Journal Article
Transport Scheduling with Service-Level Constraints - Complexity and Algorithms, Hoong Chuin LAU, K. M. NG, and Xintao WU Conference Proceeding Article
Web Image Learning for Searching Semantic Concepts in Image Databases, Steven HOI and Michael R. LYU Conference Proceeding Article
A Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing Economy, Mei LIN and Zhangxi LIN Conference Proceeding Article
Unloading unwanted information: From physical websites to personalized web views, Zehua LIU, Wee-Keong NG, Ee Peng LIM, Yangfeng HUANG, and Feifei LI Conference Proceeding Article
A Modeling Framework for Computing Lifetime and Information Capacity in Wireless Sensor Networks, Enrique DUARTE-MELO, Mingyan LIU, and Archan MISRA Conference Proceeding Article
An Automated Algorithm for Extracting Website Skeleton, Zehua LIU, Wee-Keong NG, and Ee Peng LIM Conference Proceeding Article
An Enterprise Integration Methodology, W. LAM and Venky Shankararaman Journal Article
An Information-Theoretic Framework for Optimal Location Tracking in Multi-System 4G Wireless Networks, Archan MISRA, Abhishek ROY, and Sajal K. DAS Conference Proceeding Article
A smart-card-enabled privacy preserving E-prescription system, Yanjiang YANG, Xiaoxi HAN, Feng BAO, and Robert H. DENG Journal Article
Authenticating Query Results in Edge Computing, Hwee Hwa PANG and Kian-Lee TAN Conference Proceeding Article
CLASH: A Protocol for Internet-Scale Utility-Oriented Distributed Computing, Archan MISRA, Paul CASTRO, and Jinwon LEE Conference Proceeding Article
Efficient group pattern mining using data summarization, Yida WANG, Ee Peng LIM, and San-Yih HWANG Conference Proceeding Article
Energy-Conserving Air Indexes for Nearest Neighbor Search, Baihua ZHENG, Jianliang XU, Wang-chien LEE, and Dik Lun LEE Conference Proceeding Article
Group Nearest Neighbor Queries, Dimitris PAPADIAS, Qiongmao SHEN, Yufei TAO, and Kyriakos MOURATIDIS Conference Proceeding Article
Hiding Data Accesses in Steganographic File System, Xuan ZHOU, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Phoneme-based transliteration of foreign names for OOV problem, Wei GAO, Kam-Fai WONG, and Wai LAM Conference Proceeding Article
Prediction of RNA-binding proteins from primary sequence by a support vector machine approach., Lian Yi HAN, Cong Zhong CAI, Siaw Ling LO, Maxey CHUNG, and Yu Zong CHEN Journal Article
Security Analysis of Some Proxy Signature, Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Spatial Queries in the Presence of Obstacles, Jun ZHANG, Dimitris PAPADIAS, Kyriakos MOURATIDIS, and Manli ZHU Conference Proceeding Article
The Evolution of Research on Information Systems: A Fiftieth Year Survey of the Literature in Management Science, Rajiv D. BANKER and Robert J. Kauffman Journal Article
The Minimum Expected Cost Paging Problem for Multi-System Wireless, Abhishek ROY, Archan MISRA, and Sajal K. DAS Conference Paper
Tool Support for Model Based Architectural Design for Automotive Control Systems, Kevin STEPPE Conference Paper
Fine-grained Control of Security Capabilities, D. BONEH, Xuhua DING, and Gene Tsudik Journal Article
Stochastic Analysis and Performance Evaluation of Wireless Schedulers, R. Rom and Hwee-Pink TAN Journal Article
Tool Support for Two-Tiered Architectural Design for Automotive Control Systems, Kevin STEPPE, Greg Bylenok, David Garlan, Bradley Schmerl, Kanat Abirov, and Nataliya Shevchenko Conference Proceeding Article
Key technologies for content-based video retrieval, Y. PENG, Chong-wah NGO, C.W. NGO, Z. GUO, and J. XIAO Journal Article
A secure and privacy enhanced location-based service transaction protocol in ubiquitous computing environment, Konidala DIVYAN, Robert H. DENG, Jianying ZHOU, and Kwanjo KIM Conference Proceeding Article
A Semi-automatic Approach to Composite Web Services Discovery, Description and Invocation, Qianhui (Althea) LIANG, L. N. Chakarapani, S. Su, R. N. Chikkamagalur, and Herman LAM Journal Article
Case-based Modification for Optimization Agents: AGENT-OPT, Yong Sik CHANG and Jae Kyu LEE Journal Article
Functional Annotation and Protein Families: From Theory to Practice, Noam KAPLAN, Ori SASSON, and Michal Linial Book Chapter
Grid Resource Commercialization: Economic Engineering and Delivery Scenarios, Giorgos CHELIOTIS and C. KENYON Book Chapter
Highly Reliable Trust Establishment Scheme in Ad-Hoc Networks, K. REN, Tieyan LI, Zhiguo Wan, Feng Bao, Robert H. DENG, and K. KIM Journal Article
Improving Query Effectiveness for Large Image Databases with Multiple Visual Feature Combination, Jialie SHEN, John Shepherd, AHH Ngu, and Du Q. Huynh Conference Proceeding Article
Integrating Heterogeneous Features for Efficient Content-based Music Retrieval, Jialie SHEN, Shepherd John, and Ngu Ahh Conference Proceeding Article
Introduction to the Special Issue: Competitive Strategy, Economics and Information Systems, E. K. CLEMONS, Robert J. Kauffman, and T. Weber Journal Article
Java-based digital library portal for geography education, Zehua LIU, Hai YUAN, Ee Peng LIM, Ming YIN, Dion Hoe-Lian GOH, Yin-Leng THENG, and Wee-Keong NG Journal Article
Leak-Free Group Signatures with Immediate Revocation, Xuhua DING, Gene Tsudik, and Shouhuai XU Conference Proceeding Article
Logistics Outsourcing and 3PL Challenges, Michelle L. F. CHEONG Report
Moving People, Goods, and Information in Singapore: The Sea, P. S. LUI, T. S. TAN, and Thin Yin LEONG Book Chapter