The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2006

PDF

Disclosure Analysis for Two-Way Contingency Tables, Haibing LU, Yingjiu LI, and Xintao WU Conference Proceeding Article

PDF

Discovering image-text associations for cross-media web information fusion, Tao JIANG and Ah-Hwee TAN Conference Proceeding Article

Link

Doing their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions, Robert J. KAUFFMAN and Charles A. WOOD Journal Article

Doing Their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions., Robert John KAUFFMAN and C.A. Wood Journal Article

Link

Efficient Algorithms for Mining Maximal Valid Groups, Yida WANG, Ee Peng LIM, and San-Yih HWANG Journal Article

PDF

Masking Page Reference Patterns in Encryption Databases on Untrusted Storage, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Journal Article

PDF

Minimum Latency Broadcasting in Multi-Radio Multi-Channel Multi-Rate Wireless Meshes, Junaid QADIR, Archan MISRA, and Chun Tung CHOU Conference Proceeding Article

PDF

Mining RDF metadata for generalized association rules, Tao JIANG and Ah-hwee TAN Conference Proceeding Article

PDF

Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article

PDF

Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article

Link

On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Conference Proceeding Article

PDF

Practical Private Data Matching Deterrent to Spoofing Attacks, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article

PDF

Rights Protection for Data Cubes, Jie GUO, Yingjiu LI, Robert H. DENG, and Kefei CHEN Conference Proceeding Article

PDF

The boundary spanner’s role in organisational learning: Unleashing untapped potential, Siu Loon HOE Journal Article

PDF

Three Architectures for Trusted Data Dissemination in Edge Computing, Shen-Tat GOH, Hwee Hwa PANG, Robert H. DENG, and Feng BAO Journal Article

PDF

Wireless indoor positioning system with enhanced nearest neighbors in signal space algorithm, Quang TRAN, Juki Wirawan TANTRA, Ah-hwee TAN, Ah-Hwee TAN, Kin-Choong YOW, and Dongyu QIU Conference Proceeding Article

Premier e-Business cases from Asia, Jae Kyu LEE, Benjamin GAN, and Vijay SETHI Edited Book

A mobile lecture slide organization tool for students, K.O. CHOW, Chong-wah NGO, IP H.H.S., and K.S. CHEUNG Conference Proceeding Article

Quantitative retrieval of suspended solid concentration in Lake Taihu based on BP neural net, Heng LYU, Xingguo LI, and Kai CAO Journal Article

PDF

A hybrid architecture combining reactive plan execution and reactive learning, Samin KARIM, Liz SONENBERG, and Ah-Hwee TAN Conference Proceeding Article

PDF

An energy-efficient and access latency optimized indexing scheme for wireless data broadcast, Yuxia YAO, Xueyan TANG, Ee Peng LIM, and Aixin SUN Journal Article

PDF

An experimental study on U-commerce adoption: The impact of personalization and privacy concerns, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article

PDF

Architectural Control and Value Migration in Platform Industries, C. Jason WOODARD Conference Paper

PDF

Bias and Controversy: Beyond the Statistical Deviation, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article

PDF

Collaborative Image Retrieval via Regularized Metric Learning, Luo SI, Rong JIN, Steven C. H. HOI, and Michael R. LYU Journal Article

PDF

Learning the unified Kernel machines for classification, Steven C. H. HOI, Michael R. LYU, and Edward Y. CHANG Conference Proceeding Article

Link

Secure Real-Time User Preference Collection for Broadcast Scheduling, Xuhua DING, Shuhong WANG, and Baihua ZHENG Conference Proceeding Article

Link

Slander-Resistant Forwarding Isolation in Ad Hoc Networks, Qijun GU, Chao-Hsien CHU, Peng LIU, and Sencun ZHU Journal Article

PDF

Social network dynamics for open source software projects, Y. LONG and Keng SIAU Conference Proceeding Article

Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework: Improved Results, Hoong Chuin LAU and B. VIET Conference Paper

PDF

Understanding intrinsic factors influencing benefit maximization of IS usage, Brenda ESCHENBRENNER and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

Use of a classroom response system to enhance classroom interactivity, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Journal Article

PDF

Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU Conference Proceeding Article

A Research Capability on Management of Engineering and Technology, Arcot Desai NARASIMHALU Conference Paper

Link

RECAMM: A Research Capability Maturity Model for Managing Technological Innovations, Arcot Desai NARASIMHALU Conference Paper

Link

A Framework for Technology Transfer, Arcot Desai NARASIMHALU Conference Proceeding Article

Link

An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks, Bo ZHU, Sushil JAJODIA, Mohan S. KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, K. REN, Wenjing Lou, K. KIM, and Robert H. DENG Journal Article

PDF

Authenticating Multi-Dimensional Query Results in Data Publishing, Weiwei CHENG, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article

PDF

Crossing the Chasm: The XID Technologies Story, Arcot Desai NARASIMHALU and Roberto MARIANI Conference Proceeding Article

Empirical Analysis of the Value of Code Inspections for Project Management, Narayanasamy RAMASUBBU, Subramanyam Ramanath, Sunil Mithas, and M. S. Krishnan Conference Proceeding Article

PDF

Extraction of Coherent Relevant Passages using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Journal Article

PDF

Hierarchical Hidden Markov Model for rushes structuring and indexing, Chong-Wah NGO, Zailiang PAN, and Xiaoyong WEI Conference Proceeding Article

PDF

Keyframe retrieval by keypoints: Can point-to-point matching help?, Wanlei ZHAO, Yu-Gang JIANG, and Chong-Wah NGO Conference Proceeding Article

PDF

Mobile healthcare informatics, Keng SIAU and Zixing SHEN Journal Article

PDF

OntoSearch: A full-text search engine for the semantic web, Xing JIANG and Ah-hwee TAN Conference Proceeding Article

Optimal Crl Releasing Strategy in Public Key Infrastructure, Nan HU, Yingjiu LI, and Chengyu MA Conference Proceeding Article

PDF

Prediction-based gesture detection in lecture videos by combining visual, speech and electronic slides, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article

PDF

Private Information Retrieval Using Trusted Hardware, Shuhong WANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article

Link

Reflections on: When Internet Companies Morph, Robert J. KAUFFMAN, T. Miller, and B. WANG Journal Article

Recursive self organizing maps with hybrid clustering, Kiruthika RAMANATHAN and Sheng Uei GUAN Conference Proceeding Article

Link

A Close Look at Privacy Preserving Data Mining Methods, Xindong WU, Yunfeng WANG, Chao-Hsien CHU, Fengli LIU, Ping CHEN, and Dianmin YUE Conference Proceeding Article

Airfreight Pricing and Discounts for Dense and Volumetric Cargoes, Michelle Lee Fong CHEONG, R. Bhatnagar, and S. C. Graves Conference Paper

PDF

Batch Mode Active Learning and its Applications to Medical Image Classification, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article

PDF

Can online reviews reveal a product's true quality? Empirical findings analytical modeling of online word-of-mouth communication, Nan HU, Paul Pavlou, and Jennifer ZHANG Conference Proceeding Article

PDF

Cognitive mapping techniques for user-database interaction, Keng SIAU and X. TAN Journal Article

CS Cache Engine: Data Access Accelerator for Location-Based Service in Mobile Environments (demo), Ken C. K. LEE, Wang-chien LEE, Julian Winter, Baihua ZHENG, and JianLiang Xu Conference Paper

PDF

Exploiting Domain Structure for Named Entity Recognition, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article

PDF

Fuzzy cognitive goal net for interactive storytelling plot design, Yundong CAI, Chunyan MIAO, Ah-hwee TAN, and Zhiqi SHEN Conference Proceeding Article

PDF

Learning Distance Metrics with Contextual Constraints for Image Retrieval, Steven C. H. HOI, Wei LIU, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article

PDF

MultiLearner based recursive supervised training, Kiruthika RAMANATHAN, Sheng Uei GUAN, and Laxmi R. IYER Conference Proceeding Article

PDF

On the Release of Crls in Public Key Infrastructure, Chengyu Ma, Nan Hu, and Yingjiu Li Conference Paper

Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper

Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper

PDF

Security analysis on a conference scheme for mobile communications, Zhiguo WAN, Feng BAO, Robert H. DENG, and A. L. ANANDA Journal Article

Link

Tracking Nearest Surrounders in Moving Object Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article

Self-organizing neural architecture for reinforcement learning, Ah-hwee TAN Conference Proceeding Article

Link

An Evolutionary Fuzzy Multi-Objective Approach to Cell Formation, C. C. TSAI, Chao-Hsien CHU, and Xindong Wu Conference Proceeding Article

BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon Lee, Youngki Lee, Seungwoo Kang, SangJeong Lee, Hyunju Jin, Byoungjip Kim, and Junehwa Song Conference Paper

Link

BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon LEE, Youngki LEE, Seungwoo KANG, SangJeong LEE, Hyunju JIN, Byoungjip KIM, and Junehwa SONG Conference Proceeding Article

PDF

Clip-based similarity measure for query-dependent clip retrieval and video summarization, Yuxin PENG and Chong-wah NGO Journal Article

Link

Data Access Techniques in Location-Based Services, Jianliang XU, Baihua ZHENG, and Wang-Chien LEE Conference Proceeding Article

PDF

Discovering Causal Dependencies in Mobile Context-Aware Recommenders, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article

Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks, Zhiguo WAN, B. ZHU, Robert H. DENG, Feng Bao, and A. L. Ananda Conference Proceeding Article

PDF

Efficient querying and resource management using distributed presence information in converged networks, Dipanjan CHAKRABORTY, Koustuv DASGUPTA, and Archan MISRA Conference Proceeding Article

Link

GECON 2006: Proceedings of the 3rd International Workshop on Grid Economics and Business Models, Hing-Yan LEE and Steven M. MILLER Edited Conference Proceeding

PDF

Gestalt-based feature similarity measure in trademark database, Hui JIANG, Chong-wah NGO, and Hung-Khoon TAN Journal Article

PDF

Large-Scale Text Categorization by Batch Mode Active Learning, Steven C. H. HOI, Rong JIN, and Michael R. LYU Conference Proceeding Article

PDF

Mining RDF metadata for generalized association rules: Knowledge discovery in the semantic web era, Tao JIANG and Ah-hwee TAN Conference Proceeding Article

PDF

On in-network synopsis join processing for sensor networks, Hai YU, Ee Peng LIM, and Jun ZHANG Conference Proceeding Article

PDF

Osprey: A practical type system for validating dimensional unit correctness of C programs, Lingxiao JIANG and Zhendong SU Conference Proceeding Article

PDF

Real-Time Non-Rigid Shape Recovery via Active Appearance Models for Augmented Reality, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Conference Proceeding Article

PDF

Time-dependent semantic similarity measure of queries using historical click-through data, Qiankun ZHAO, Steven C. H. HOI, Tie-Yan LIU, Sourav S. BHOWMICK, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article

Towards Statistical Modeling Based Value Disclosure Analysis in General Databases, Xintao Wu, Songtao Guo, and Yingjiu LI Conference Paper

PDF

Winning back the CUP for Distributed POMDPs: Planning over continuous belief spaces, Pradeep VARAKANTHAM, Ranjit Nair, Milind Tambe, and Makoto Yokoo Conference Proceeding Article

Link

A Fuzzy Multi-Objective Linear Programming Model for Manufacturing Cell Formation, C.C. TSAI and Chao-Hsien Chu Journal Article

PDF

Anonymous signature schemes, Guomin YANG, Duncan S. WONG, Xiaotie DENG, and Huaxiong WANG Conference Proceeding Article

PDF

A practical password-based two-server authentication and key exchange system, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article

PDF

A Unified Log-based Relevance Feedback Scheme for Image Retrieval, Steven HOI, Michael R. LYU, and Rong JIN Journal Article

Link

Caching Complementary Space for Location-Based Services, Ken C. K. LEE, Wang-chien LEE, Baihua ZHENG, and Jianliang XU Conference Proceeding Article

Link

Deriving Private Information from Perturbed Data using IQR Based Approach, Songtao GUO, Xintao WU, and Yingjiu LI Conference Proceeding Article

Link

Dimorphic Computing, H. Andreas LAGAR-CAVILLA, Niraj Tolia, Rajesh Krishna BALAN, Eyal De Lara, Mahadev Satyanarayanan, and David O'Halloran Report

PDF

Effect of changing requirements: A tracking mechanism for the analysis workflow, Subhajit DATTA and Robert van Engelen Conference Proceeding Article

PDF

Efficient client-to-server assignments for distributed virtual environments, Nguyen Binh Duong TA and Suiping ZHOU Conference Proceeding Article

PDF

Enterprise agility and the enabling role of information technology, Eric OVERBY, Anandhi S. Bharadwaj, and V. SAMBAMURTHY Journal Article

PDF

Evaluation of time-varying availability in multi-echelon spare parts systems with passivation, Hoong Chuin LAU, Huawei SONG, Chuen Teck SEE, and Siew Yen CHENG Journal Article

PDF

Experimental and Empirical Perspectives on Grid Resource Allocation for the Singapore Market, Danny OH, Steven MILLER, and Nan HU Conference Proceeding Article

PDF

FISA: Feature-based instance selection for imbalanced text classification, Aixin SUN, Ee Peng LIM, Boualem Benatallah, and Mahbub Hassan Conference Proceeding Article

INEXT: An Investigative Search Tool for Knowledge Extraction, Zhen SUN and Ee Peng LIM Conference Proceeding Article

PDF

In-network processing of nearest neigbor queries for wireless sensor networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Conference Proceeding Article