The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2007

PDF

Continuous Nearest Neighbor Queries over Sliding Windows, Kyriakos MOURATIDIS and Dimitris Papadias Journal Article

Link

Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods, Dan ZHU, G. Premkumar, Xiaoning ZHANG, and Chao-Hsien CHU Journal Article

PDF

Designing an experimental gaming platform for trading grid resources, Danny OH, Shih-Fen CHENG, Dan MA, and Ravi BAPNA Conference Proceeding Article

PDF

Editors' Introduction to Regular Research Section, Jae Kyu LEE, Patrick Y. K. CHAU, Robert J. KAUFFMAN, and Norman M. SADEH Editorial

PDF

Innovation Engine, Arcot Desai NARASIMHALU Conference Paper

PDF

Instance Weighting for Domain Adaptation in NLP, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article

PDF

Intelligence through interaction: Towards a unified theory for learning, Ah-hwee TAN, Gail A. CARPENTER, and Stephen GROSSBERG Conference Proceeding Article

PDF

Learning Nonparametric Kernel Matrices from Pairwise Constraints, Steven C. H. HOI, Rong JIN, and Michael R. LYU Conference Proceeding Article

PDF

Making the ‘MOST’ Out of RFID Technology: A Research Agenda for the Study of the Adoption, Use and Impact of RFID, John Curtin, Robert J. KAUFFMAN, and Frederick J. Riggins Journal Article

PDF

Maximizing Broadcast and Multicast Traffic Load through Link-Rate Diversity in Wireless Mesh Networks, Chun Tung CHOU, Bao Hua LIU, and Archan MISRA Conference Proceeding Article

PDF

Mobile G-Portal supporting collaborative sharing and learning in geography fieldwork: An empirical study, Yin-Leng THENG, Kuah-Li TAN, Ee Peng LIM, Jun ZHANG, Dion Hoe-Lian GOH, Kalyani CHATTERJEA, Chew-Hung CHANG, Aixin SUN, Han YU, Nam Hai DANG, Yuanyuan LI, and Minh Chanh VO Conference Proceeding Article

Link

New Research Perspectives on Mobility, Organizations, Systems and Technologies, Information Technology and Management: Guest Editorial, Chris FORMAN, Robert J. KAUFFMAN, D. J. WU, and Hemant BHARGAVA Journal Article

New Security Technology Diffusion with Promoters, Imitators, and Privacy Advocates, Nan HU, Yingjiu LI, and Dan MA Conference Paper

New Security Technology Diffusion with Promoters, Imitators, and Privacy Advocates, Nan Hu, Yingjiu LI, and Dan MA Conference Paper

New Security Technology Diffusion with Promoters, Imitators, and Privacy Advocates, Dan MA, Nan HU, and Yingjiu LI Conference Paper

Link

Parity-Based Inference Control for Multi-Dimensional Range Sum Queries, Lingyu WANG, Yingjiu LI, Sushil Jajodia, and Duminda Wijesekera Journal Article

Research Advances for the Mobile Payments Arena., S. Karnouskos, Robert John KAUFFMAN, E. Lawrence, and K. Pousttchi Journal Article

Link

Service Discovery in P2p Service-Oriented Environments, Qianhui (Althea) Liang, J. Chung, and H. LEI Conference Paper

PDF

Similarity Beyond Distance Measurement, Feng KANG, Rong JIN, and Steven C. H. HOI Conference Proceeding Article

PDF

Simplifying Cyber Foraging for Mobile Devices, Rajesh Krishna BALAN, Darren Gergle, Mahadev Satyanarayanan, and James Herbsleb Conference Proceeding Article

Link

Social bookmarking in digital library systems: Framework and case study, Fiftarina PUSPITASARI, Ee Peng LIM, Dion Hoe-Lian GOH, Chew-Hung CHANG, Jun ZHANG, Aixin SUN, Yin-Leng THENG, Kalyani CHATTERJEA, and Yuanyuan LI Conference Proceeding Article

PDF

Teaching "Global Project Management" with Distributed Team Projects, Randy WEINBERG and Benjamin GAN Conference Proceeding Article

Link

Technology Roles and Paths of Influence in an Ecosystem Model of Technology Evolution, Gediminas ADOMAVICIUS, Jesse Bockstedt, Alok GUPTA, and Robert J. Kauffman Journal Article

PDF

The multi-agent data collection in HLA-based simulation system, Heng-Jie SONG, Zhi-Qi SHEN, Chunyan MIAO, Ah-hwee TAN, and Guo-Peng ZHAO Conference Proceeding Article

PDF

Time capsule signature: Efficient and provably secure constructions, Bessie C. HU, Duncan S. WONG, Qiong HUANG, Guomin YANG, and Xiaotie DENG Conference Proceeding Article

Towards an intelligent meta-heuristics development framework, Hoong Chuin LAU and Fei XIAO Conference Paper

Link

Transitive Nearest Neighbor Search in Mobile Environments, Baihua ZHENG, Ken C. K. LEE, and Wang-Chien LEE Conference Proceeding Article

PDF

Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems, Robert H. DENG and Yanjiang YANG Conference Proceeding Article

PDF

Analysis of topological characteristics of huge online social networking services, Yong-Yeol AHN, Seungyeop HAN, Haewoon KWAK, Sue MOON, and Hawoong JEONG Conference Proceeding Article

Case study: Enterprise integration and process improvement, Randall E. DURAN Book Chapter

PDF

DECKARD: Scalable and accurate tree-based detection of code clones, Lingxiao JIANG, Ghassan MISHERGHI, Zhendong SU, and Stephane GLONDU Conference Proceeding Article

PDF

Enhancing the performance of semi-supervised classification algorithms with bridging, Jason Yuk Hin CHAN, Josiah POON, and Irena KOPRINSKA Conference Proceeding Article

PDF

Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme, Yongdong WU, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

gPrune: A Constraint Pushing Framework for Graph Pattern Mining, Feida ZHU, Xifeng YAN, Jiawei HAN, and Philip S. YU Conference Proceeding Article

PDF

Learning to classify e-mail, Irena KOPRINSKA, Josiah POON, James CLARK, and Jason Yuk Hin CHAN Journal Article

Measuring the Commons, Giorgos CHELIOTIS, Ankit Guglani, and Giri KUMAR Conference Paper

PDF

Modeling Architectural Strategy Using Design Structure Networks, C. Jason WOODARD Conference Paper

Wireless Networks Design: A Space-Filling Curve Approach, Thin Yin LEONG and Chao-Hsien CHU Conference Proceeding Article

PDF

A multimodal and multilevel ranking framework for content-based video retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article

PDF

A multimodal and multilevel ranking framework for content-based video retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article

A Systematic Exploration of the Feature Space for Relation Extraction, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article

Link

Bursty feature representation for clustering text streams, Qi HE, Kuiyu CHANG, Ee Peng LIM, and Jun ZHANG Conference Proceeding Article

PDF

Mining Colossal Frequent Patterns by Core Pattern Fusion, Feida ZHU, Xifeng YAN, Jiawei HAN, Philip S. YU, and Hong CHENG Conference Proceeding Article

PDF

Social network structures in open source software development teams, Y. LONG and Keng SIAU Journal Article

PDF

Summarizing Review Scores of "Unequal" Reviewers, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article

PDF

Vulnerability analysis of EMAP: An efficient RFID mutual authentication protocol, Tieyan LI and Robert H. DENG Conference Proceeding Article

Link

A software framework for fast prototyping of meta-heuristics hybridization, Hoong Chuin LAU, W. C. Wan, S. Halim, and K. Y. Toh Journal Article

PDF

Efficient algorithms for machine scheduling problems with earliness and tardiness penalties, Guang FENG and Hoong Chuin LAU Journal Article

PDF

Experiences with tracking the effects of changing requirements on Morphbank: A web-based bioinformatics application, Subhajit DATTA, Robert van Engelen, David GAITROS, and Neelima JAMMIGUMPULA Conference Proceeding Article

PDF

Malicious KGC attacks in certificateless cryptography, Man Ho AU, Jing CHEN, Joseph K. LIU, Yi MU, Duncan S. WONG, Guomin YANG, and Guomin YANG Conference Proceeding Article

PDF

Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article

PDF

TUBE (Text-cUBE) for discovering documentary evidence of associations among entities, Hady LAUW, Ee Peng LIM, and Hwee Hwa PANG Conference Proceeding Article

PDF

Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. KAUFFMAN, and Salvatore T. March Journal Article

Link

Access control protocols with two-layer architecture for wireless networks, Zhiguo WAN, Robert H. DENG, Feng Bao, and A. L. Ananda Journal Article

PDF

Clustering and combinatorial optimization in recursive supervised learning, Kiruthika RAMANATHAN and Sheng Uei GUAN Journal Article

Link

Equipping "Smart Devices" With Public Key Signatures, Xuhua DING, D. Mozzacchi, and Gene Tsudik Journal Article

PDF

Lecture video enhancement and editing by integrating posture, gesture, and text, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Journal Article

PDF

Logistics Network Design with Supplier Consolidation Hubs and Multiple Shipment Options, Michelle L. F. Cheong, Rohit Bhatnagar, and Stephen C. Graves Journal Article

PDF

Mining generalized associations of semantic relations from textual web content, Tao JIANG, Ah-hwee TAN, and We WANG Journal Article

PDF

Moving-object detection, association, and selection in home videos, Zailiang PAN and Chong-wah NGO Journal Article

PDF

Quality of service routing strategy using supervised genetic algorithm, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, and Huayu SHEN Journal Article

Link

Temporal classification of multichannel near-infrared spectroscopy signals of motor imagery for developing a brain-computer interface, R. Sitaram, H. Zhang, C. Guan, Manoj THULASIDAS, Y. Hoshi, A. Ishikawa, K. Shimizu, and N. Birbaumer Journal Article

PDF

Towards efficient planning for real world partially observable domains, Pradeep R. VARAKANTHAM PhD Dissertation

Hybrid outcome prediction model for severe traumatic brain injury, Boon Chuan Pang, Vellaisamy Kuralmani, Rohit Joshi, Hongli Yin, Kah Keow Lee, Beng Ti Ang, Jinyan Li, Tze-Yun LEONG, and Ivan Ng Journal Article

PDF

A Growth Theory Perspective on the International Diffusion of Electronic Commerce., S.C Ho, Robert John KAUFFMAN, and T.P. Liang Journal Article

An Empirical Study of Query Effectiveness Improvement via Multiple Visual Feature Integration, Jialie SHEN, John Shepherd, and Anne H. H. Ngu Journal Article

Link

An Improved Fuzzy Clustering Method for Cellular Manufacturing , J. LI, Chao-Hsien CHU, Y. WANG, and W. YAN Journal Article

PDF

An improvement heuristic for the timetabling problem, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Journal Article

PDF

Anticipatory event detection via classification, He QI, Kuiyu CHANG, and Ee Peng LIM Journal Article

Applying Information Economics to Corporate Strategy., E.K. Clemons, R.D. Dewan, and Robert John KAUFFMAN Journal Article

PDF

BusinessFinder: Harnessing presence to enable live Yellow Pages for small, medium and micro mobile businesses, D. CHAKRABORTY, K. Dasgupta, S. Mittal, Archan MISRA, C. OBERLE, A. GUPTA, and E. NEWMARK Magazine Article

Link

Chaining Watermarks for Detecting Malicious Modifications to Streaming Data, Huiping GUO, Yingjiu LI, and Sushil Jajodia Journal Article

Claim: An Efficient Method for Relaxed Frequent Closed Itemsets Mining over Stream Data, Guojie SONG, Dongqing YANG, Bin Cui, Baihua ZHENG, and Tengjiao WANG Conference Proceeding Article

Link

Defense Against Packet Injection in Ad Hoc Networks, Qijun GU, Peng LIU, Chao-Hsien CHU, and Sencun ZHU Journal Article

PDF

Direct code access in self-organizing neural networks for reinforcement learning, Ah-hwee TAN Conference Proceeding Article

Link

Dispatching Vehicles in a Mega Container Terminal, Ebru K. Bish, Frank Y Chen, Thin Yin LEONG, Barry L Nelson, Jonathan W. C. Ng, and David Simchi-Levi Book Chapter

Link

ECTracker - An Efficient Algorithm for Haplotype Analysis and Classification, Li Lin, Limsoon Wong, Tze-Yun LEONG, and Lai Pohsan Conference Proceeding Article

PDF

Editors' Introduction, Robert John KAUFFMAN, Jae Kyu LEE, and Norman M. SADEH Editorial

Editors' Introduction: ECRA Vol. 6, No. 3, Patrick Y. K. Chau, Robert J. KAUFFMAN, Norman M. Sadeh, and J. Christopher Westland Editorial

PDF

Editors' Introduction: ECRA Vol. 6, No. 4, Patrick Y. K. CHAU, Robert J. KAUFFMAN, Norman M. SADEH, and J. Christopher WESTLAND Journal Article

Editors' Introduction: ECRA Vol. 6, No. 4, Patrick Y. K. Chau, Robert J. KAUFFMAN, Norman M. Sadeh, and J. Christopher Westland Editorial

Global Sourcing of IT Services: Necessary Evil or Blessing in Disguise?, J. Cederlund, Robert John KAUFFMAN, R. Kohli, M. L. Markus, N. Melville, and P. A. Pavlou Journal Article

PDF

Image segmentation using multi-coloured active illumination, Tze Ki (XU Shuqi) KOH, Nicholas MILES, and Barrie HAYES-GILL Journal Article

Information mediation using metamodels: An approach using XML and common warehouse metamodel, Luyin ZHAO and Keng SIAU Journal Article

PDF

Integrating semantic templates with decision tree for image semantic learning, Ying LIU, Dengsheng ZHANG, Guojun LU, and Ah-hwee TAN Conference Proceeding Article

PDF

Introduction: special issue for the selected papers in the fourth international conference on Intelligent Multimedia Computing and Networking (IMMCN) 2005, Chong-wah NGO and Hong-Va LEONG Journal Article

Link

IT-Enabled Transparent Electronic Markets: The Case of the Air Travel Industry, N. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article

PDF

Iterated Weaker-than-Weak Dominance, Shih-Fen CHENG and Michael P. WELLMAN Conference Proceeding Article

Link

Letting loose a SPIDER on a network of POMDPs: Generating quality guranteed policies, Pradeep Reddy VARAKANTHAM, Janusz Marecki, Makoto Yokoo, and Milind Tambe Conference Proceeding Article

PDF

Mining multiple visual appearances of semantics for image annotation, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article

Link

Modeling and Analysis of Bandwidth Competition in 802.11 Networks, Qijun GU, Chao-Hsien CHU, and Peng LIU Journal Article

Link

Modeling Internet firm survival using Bayesian dynamic models with time-varying coefficients, Sudipto BANERJEE, Robert J. Kauffman, and Bin WANG Journal Article

Link

Monte Carlo Spreadsheet Simulation using Resampling, Thin Yin LEONG Journal Article

PDF

National culture and its effects on knowledge communication in online virtual communities, Keng SIAU, Fiona Fui-hoon NAH, and Min LING Journal Article

Link

PASTA: Deriving Rich Presence for Converged Telecommunications Network Applications, Eran BELINSKY, Natalia MARMASSE, Eyal SONSINO, Maria EBLING, William JEROME, Archan MISRA, Daby SOW, and Sune JAKOBSSON Conference Proceeding Article

Link

Preserving Privacy in Association Rule Mining with Bloom Filters, Ling QIU, Yingjiu LI, and Xintao Wu Journal Article

Link

Preserving privacy in on-line analytical processing (OLAP), Lingyu WANG, Sushil JAJODIA, and Duminda WIJESEKERA Book

Link

Quality of service in mobile ad hoc networks: Myth or reality?, W.K.G. SEAH and Hwee Xian TAN Encyclopaedia

PDF

Real-Time Supply Chain Control via Multi-Agent Adjustable Autonomy, Hoong Chuin LAU, Lucas Agussurja, and Ramesh Thangarajoo Journal Article

PDF

Searching and Tagging: Two Sides of the Same Coin?, Qiaozhu MEI, Jing JIANG, Hang SU, and ChengXiang ZHAI Report