Submissions from 2007
Continuous Nearest Neighbor Queries over Sliding Windows, Kyriakos MOURATIDIS and Dimitris Papadias Journal Article
Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods, Dan ZHU, G. Premkumar, Xiaoning ZHANG, and Chao-Hsien CHU Journal Article
Designing an experimental gaming platform for trading grid resources, Danny OH, Shih-Fen CHENG, Dan MA, and Ravi BAPNA Conference Proceeding Article
Editors' Introduction to Regular Research Section, Jae Kyu LEE, Patrick Y. K. CHAU, Robert J. KAUFFMAN, and Norman M. SADEH Editorial
Innovation Engine, Arcot Desai NARASIMHALU Conference Paper
Instance Weighting for Domain Adaptation in NLP, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Intelligence through interaction: Towards a unified theory for learning, Ah-hwee TAN, Gail A. CARPENTER, and Stephen GROSSBERG Conference Proceeding Article
Learning Nonparametric Kernel Matrices from Pairwise Constraints, Steven C. H. HOI, Rong JIN, and Michael R. LYU Conference Proceeding Article
Making the ‘MOST’ Out of RFID Technology: A Research Agenda for the Study of the Adoption, Use and Impact of RFID, John Curtin, Robert J. KAUFFMAN, and Frederick J. Riggins Journal Article
Maximizing Broadcast and Multicast Traffic Load through Link-Rate Diversity in Wireless Mesh Networks, Chun Tung CHOU, Bao Hua LIU, and Archan MISRA Conference Proceeding Article
Mobile G-Portal supporting collaborative sharing and learning in geography fieldwork: An empirical study, Yin-Leng THENG, Kuah-Li TAN, Ee Peng LIM, Jun ZHANG, Dion Hoe-Lian GOH, Kalyani CHATTERJEA, Chew-Hung CHANG, Aixin SUN, Han YU, Nam Hai DANG, Yuanyuan LI, and Minh Chanh VO Conference Proceeding Article
New Research Perspectives on Mobility, Organizations, Systems and Technologies, Information Technology and Management: Guest Editorial, Chris FORMAN, Robert J. KAUFFMAN, D. J. WU, and Hemant BHARGAVA Journal Article
New Security Technology Diffusion with Promoters, Imitators, and Privacy Advocates, Nan HU, Yingjiu LI, and Dan MA Conference Paper
New Security Technology Diffusion with Promoters, Imitators, and Privacy Advocates, Nan Hu, Yingjiu LI, and Dan MA Conference Paper
New Security Technology Diffusion with Promoters, Imitators, and Privacy Advocates, Dan MA, Nan HU, and Yingjiu LI Conference Paper
Parity-Based Inference Control for Multi-Dimensional Range Sum Queries, Lingyu WANG, Yingjiu LI, Sushil Jajodia, and Duminda Wijesekera Journal Article
Research Advances for the Mobile Payments Arena., S. Karnouskos, Robert John KAUFFMAN, E. Lawrence, and K. Pousttchi Journal Article
Service Discovery in P2p Service-Oriented Environments, Qianhui (Althea) Liang, J. Chung, and H. LEI Conference Paper
Similarity Beyond Distance Measurement, Feng KANG, Rong JIN, and Steven C. H. HOI Conference Proceeding Article
Simplifying Cyber Foraging for Mobile Devices, Rajesh Krishna BALAN, Darren Gergle, Mahadev Satyanarayanan, and James Herbsleb Conference Proceeding Article
Social bookmarking in digital library systems: Framework and case study, Fiftarina PUSPITASARI, Ee Peng LIM, Dion Hoe-Lian GOH, Chew-Hung CHANG, Jun ZHANG, Aixin SUN, Yin-Leng THENG, Kalyani CHATTERJEA, and Yuanyuan LI Conference Proceeding Article
Teaching "Global Project Management" with Distributed Team Projects, Randy WEINBERG and Benjamin GAN Conference Proceeding Article
Technology Roles and Paths of Influence in an Ecosystem Model of Technology Evolution, Gediminas ADOMAVICIUS, Jesse Bockstedt, Alok GUPTA, and Robert J. Kauffman Journal Article
The multi-agent data collection in HLA-based simulation system, Heng-Jie SONG, Zhi-Qi SHEN, Chunyan MIAO, Ah-hwee TAN, and Guo-Peng ZHAO Conference Proceeding Article
Time capsule signature: Efficient and provably secure constructions, Bessie C. HU, Duncan S. WONG, Qiong HUANG, Guomin YANG, and Xiaotie DENG Conference Proceeding Article
Towards an intelligent meta-heuristics development framework, Hoong Chuin LAU and Fei XIAO Conference Paper
Transitive Nearest Neighbor Search in Mobile Environments, Baihua ZHENG, Ken C. K. LEE, and Wang-Chien LEE Conference Proceeding Article
Achieving end-to-end authentication in intermediary-enabled multimedia delivery systems, Robert H. DENG and Yanjiang YANG Conference Proceeding Article
Analysis of topological characteristics of huge online social networking services, Yong-Yeol AHN, Seungyeop HAN, Haewoon KWAK, Sue MOON, and Hawoong JEONG Conference Proceeding Article
Case study: Enterprise integration and process improvement, Randall E. DURAN Book Chapter
DECKARD: Scalable and accurate tree-based detection of code clones, Lingxiao JIANG, Ghassan MISHERGHI, Zhendong SU, and Stephane GLONDU Conference Proceeding Article
Enhancing the performance of semi-supervised classification algorithms with bridging, Jason Yuk Hin CHAN, Josiah POON, and Irena KOPRINSKA Conference Proceeding Article
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme, Yongdong WU, Feng BAO, and Robert H. DENG Conference Proceeding Article
gPrune: A Constraint Pushing Framework for Graph Pattern Mining, Feida ZHU, Xifeng YAN, Jiawei HAN, and Philip S. YU Conference Proceeding Article
Learning to classify e-mail, Irena KOPRINSKA, Josiah POON, James CLARK, and Jason Yuk Hin CHAN Journal Article
Measuring the Commons, Giorgos CHELIOTIS, Ankit Guglani, and Giri KUMAR Conference Paper
Modeling Architectural Strategy Using Design Structure Networks, C. Jason WOODARD Conference Paper
Wireless Networks Design: A Space-Filling Curve Approach, Thin Yin LEONG and Chao-Hsien CHU Conference Proceeding Article
A multimodal and multilevel ranking framework for content-based video retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article
A multimodal and multilevel ranking framework for content-based video retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article
A Systematic Exploration of the Feature Space for Relation Extraction, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Bursty feature representation for clustering text streams, Qi HE, Kuiyu CHANG, Ee Peng LIM, and Jun ZHANG Conference Proceeding Article
Mining Colossal Frequent Patterns by Core Pattern Fusion, Feida ZHU, Xifeng YAN, Jiawei HAN, Philip S. YU, and Hong CHENG Conference Proceeding Article
Social network structures in open source software development teams, Y. LONG and Keng SIAU Journal Article
Summarizing Review Scores of "Unequal" Reviewers, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Vulnerability analysis of EMAP: An efficient RFID mutual authentication protocol, Tieyan LI and Robert H. DENG Conference Proceeding Article
A software framework for fast prototyping of meta-heuristics hybridization, Hoong Chuin LAU, W. C. Wan, S. Halim, and K. Y. Toh Journal Article
Efficient algorithms for machine scheduling problems with earliness and tardiness penalties, Guang FENG and Hoong Chuin LAU Journal Article
Experiences with tracking the effects of changing requirements on Morphbank: A web-based bioinformatics application, Subhajit DATTA, Robert van Engelen, David GAITROS, and Neelima JAMMIGUMPULA Conference Proceeding Article
Malicious KGC attacks in certificateless cryptography, Man Ho AU, Jing CHEN, Joseph K. LIU, Yi MU, Duncan S. WONG, Guomin YANG, and Guomin YANG Conference Proceeding Article
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article
TUBE (Text-cUBE) for discovering documentary evidence of associations among entities, Hady LAUW, Ee Peng LIM, and Hwee Hwa PANG Conference Proceeding Article
Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. KAUFFMAN, and Salvatore T. March Journal Article
Access control protocols with two-layer architecture for wireless networks, Zhiguo WAN, Robert H. DENG, Feng Bao, and A. L. Ananda Journal Article
Clustering and combinatorial optimization in recursive supervised learning, Kiruthika RAMANATHAN and Sheng Uei GUAN Journal Article
Equipping "Smart Devices" With Public Key Signatures, Xuhua DING, D. Mozzacchi, and Gene Tsudik Journal Article
Lecture video enhancement and editing by integrating posture, gesture, and text, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Journal Article
Logistics Network Design with Supplier Consolidation Hubs and Multiple Shipment Options, Michelle L. F. Cheong, Rohit Bhatnagar, and Stephen C. Graves Journal Article
Mining generalized associations of semantic relations from textual web content, Tao JIANG, Ah-hwee TAN, and We WANG Journal Article
Moving-object detection, association, and selection in home videos, Zailiang PAN and Chong-wah NGO Journal Article
Quality of service routing strategy using supervised genetic algorithm, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, and Huayu SHEN Journal Article
Temporal classification of multichannel near-infrared spectroscopy signals of motor imagery for developing a brain-computer interface, R. Sitaram, H. Zhang, C. Guan, Manoj THULASIDAS, Y. Hoshi, A. Ishikawa, K. Shimizu, and N. Birbaumer Journal Article
Towards efficient planning for real world partially observable domains, Pradeep R. VARAKANTHAM PhD Dissertation
Hybrid outcome prediction model for severe traumatic brain injury, Boon Chuan Pang, Vellaisamy Kuralmani, Rohit Joshi, Hongli Yin, Kah Keow Lee, Beng Ti Ang, Jinyan Li, Tze-Yun LEONG, and Ivan Ng Journal Article
A Growth Theory Perspective on the International Diffusion of Electronic Commerce., S.C Ho, Robert John KAUFFMAN, and T.P. Liang Journal Article
An Empirical Study of Query Effectiveness Improvement via Multiple Visual Feature Integration, Jialie SHEN, John Shepherd, and Anne H. H. Ngu Journal Article
An Improved Fuzzy Clustering Method for Cellular Manufacturing , J. LI, Chao-Hsien CHU, Y. WANG, and W. YAN Journal Article
An improvement heuristic for the timetabling problem, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Journal Article
Anticipatory event detection via classification, He QI, Kuiyu CHANG, and Ee Peng LIM Journal Article
Applying Information Economics to Corporate Strategy., E.K. Clemons, R.D. Dewan, and Robert John KAUFFMAN Journal Article
BusinessFinder: Harnessing presence to enable live Yellow Pages for small, medium and micro mobile businesses, D. CHAKRABORTY, K. Dasgupta, S. Mittal, Archan MISRA, C. OBERLE, A. GUPTA, and E. NEWMARK Magazine Article
Chaining Watermarks for Detecting Malicious Modifications to Streaming Data, Huiping GUO, Yingjiu LI, and Sushil Jajodia Journal Article
Claim: An Efficient Method for Relaxed Frequent Closed Itemsets Mining over Stream Data, Guojie SONG, Dongqing YANG, Bin Cui, Baihua ZHENG, and Tengjiao WANG Conference Proceeding Article
Defense Against Packet Injection in Ad Hoc Networks, Qijun GU, Peng LIU, Chao-Hsien CHU, and Sencun ZHU Journal Article
Direct code access in self-organizing neural networks for reinforcement learning, Ah-hwee TAN Conference Proceeding Article
Dispatching Vehicles in a Mega Container Terminal, Ebru K. Bish, Frank Y Chen, Thin Yin LEONG, Barry L Nelson, Jonathan W. C. Ng, and David Simchi-Levi Book Chapter
ECTracker - An Efficient Algorithm for Haplotype Analysis and Classification, Li Lin, Limsoon Wong, Tze-Yun LEONG, and Lai Pohsan Conference Proceeding Article
Editors' Introduction, Robert John KAUFFMAN, Jae Kyu LEE, and Norman M. SADEH Editorial
Editors' Introduction: ECRA Vol. 6, No. 3, Patrick Y. K. Chau, Robert J. KAUFFMAN, Norman M. Sadeh, and J. Christopher Westland Editorial
Editors' Introduction: ECRA Vol. 6, No. 4, Patrick Y. K. CHAU, Robert J. KAUFFMAN, Norman M. SADEH, and J. Christopher WESTLAND Journal Article
Editors' Introduction: ECRA Vol. 6, No. 4, Patrick Y. K. Chau, Robert J. KAUFFMAN, Norman M. Sadeh, and J. Christopher Westland Editorial
Global Sourcing of IT Services: Necessary Evil or Blessing in Disguise?, J. Cederlund, Robert John KAUFFMAN, R. Kohli, M. L. Markus, N. Melville, and P. A. Pavlou Journal Article
Image segmentation using multi-coloured active illumination, Tze Ki (XU Shuqi) KOH, Nicholas MILES, and Barrie HAYES-GILL Journal Article
Information mediation using metamodels: An approach using XML and common warehouse metamodel, Luyin ZHAO and Keng SIAU Journal Article
Integrating semantic templates with decision tree for image semantic learning, Ying LIU, Dengsheng ZHANG, Guojun LU, and Ah-hwee TAN Conference Proceeding Article
Introduction: special issue for the selected papers in the fourth international conference on Intelligent Multimedia Computing and Networking (IMMCN) 2005, Chong-wah NGO and Hong-Va LEONG Journal Article
IT-Enabled Transparent Electronic Markets: The Case of the Air Travel Industry, N. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article
Iterated Weaker-than-Weak Dominance, Shih-Fen CHENG and Michael P. WELLMAN Conference Proceeding Article
Letting loose a SPIDER on a network of POMDPs: Generating quality guranteed policies, Pradeep Reddy VARAKANTHAM, Janusz Marecki, Makoto Yokoo, and Milind Tambe Conference Proceeding Article
Mining multiple visual appearances of semantics for image annotation, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article
Modeling and Analysis of Bandwidth Competition in 802.11 Networks, Qijun GU, Chao-Hsien CHU, and Peng LIU Journal Article
Modeling Internet firm survival using Bayesian dynamic models with time-varying coefficients, Sudipto BANERJEE, Robert J. Kauffman, and Bin WANG Journal Article
Monte Carlo Spreadsheet Simulation using Resampling, Thin Yin LEONG Journal Article
National culture and its effects on knowledge communication in online virtual communities, Keng SIAU, Fiona Fui-hoon NAH, and Min LING Journal Article
PASTA: Deriving Rich Presence for Converged Telecommunications Network Applications, Eran BELINSKY, Natalia MARMASSE, Eyal SONSINO, Maria EBLING, William JEROME, Archan MISRA, Daby SOW, and Sune JAKOBSSON Conference Proceeding Article
Preserving Privacy in Association Rule Mining with Bloom Filters, Ling QIU, Yingjiu LI, and Xintao Wu Journal Article
Preserving privacy in on-line analytical processing (OLAP), Lingyu WANG, Sushil JAJODIA, and Duminda WIJESEKERA Book
Quality of service in mobile ad hoc networks: Myth or reality?, W.K.G. SEAH and Hwee Xian TAN Encyclopaedia
Real-Time Supply Chain Control via Multi-Agent Adjustable Autonomy, Hoong Chuin LAU, Lucas Agussurja, and Ramesh Thangarajoo Journal Article
Searching and Tagging: Two Sides of the Same Coin?, Qiaozhu MEI, Jing JIANG, Hang SU, and ChengXiang ZHAI Report