Submissions from 2006
Bias and Controversy: Beyond the Statistical Deviation, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Collaborative Image Retrieval via Regularized Metric Learning, Luo SI, Rong JIN, Steven C. H. HOI, and Michael R. LYU Journal Article
Learning the unified Kernel machines for classification, Steven C. H. HOI, Michael R. LYU, and Edward Y. CHANG Conference Proceeding Article
Secure Real-Time User Preference Collection for Broadcast Scheduling, Xuhua DING, Shuhong WANG, and Baihua ZHENG Conference Proceeding Article
Slander-Resistant Forwarding Isolation in Ad Hoc Networks, Qijun GU, Chao-Hsien CHU, Peng LIU, and Sencun ZHU Journal Article
Social network dynamics for open source software projects, Y. LONG and Keng SIAU Conference Proceeding Article
Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework: Improved Results, Hoong Chuin LAU and B. VIET Conference Paper
Understanding intrinsic factors influencing benefit maximization of IS usage, Brenda ESCHENBRENNER and Fiona Fui-hoon NAH Conference Proceeding Article
Use of a classroom response system to enhance classroom interactivity, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Journal Article
Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU Conference Proceeding Article
A Research Capability on Management of Engineering and Technology, Arcot Desai NARASIMHALU Conference Paper
RECAMM: A Research Capability Maturity Model for Managing Technological Innovations, Arcot Desai NARASIMHALU Conference Paper
A Framework for Technology Transfer, Arcot Desai NARASIMHALU Conference Proceeding Article
An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks, Bo ZHU, Sushil JAJODIA, Mohan S. KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, K. REN, Wenjing Lou, K. KIM, and Robert H. DENG Journal Article
Authenticating Multi-Dimensional Query Results in Data Publishing, Weiwei CHENG, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Crossing the Chasm: The XID Technologies Story, Arcot Desai NARASIMHALU and Roberto MARIANI Conference Proceeding Article
Empirical Analysis of the Value of Code Inspections for Project Management, Narayanasamy RAMASUBBU, Subramanyam Ramanath, Sunil Mithas, and M. S. Krishnan Conference Proceeding Article
Extraction of Coherent Relevant Passages using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Journal Article
Generalized on-demand service architecture for interactive applications [US 2006/0168107 A1], Rajesh K. BALAN, Paul C. CASTRO, Maria R. EBLING, and Archan MISRA Patent
Hierarchical Hidden Markov Model for rushes structuring and indexing, Chong-Wah NGO, Zailiang PAN, and Xiaoyong WEI Conference Proceeding Article
Keyframe retrieval by keypoints: Can point-to-point matching help?, Wanlei ZHAO, Yu-Gang JIANG, and Chong-Wah NGO Conference Proceeding Article
Mobile healthcare informatics, Keng SIAU and Zixing SHEN Journal Article
OntoSearch: A full-text search engine for the semantic web, Xing JIANG and Ah-hwee TAN Conference Proceeding Article
Optimal Crl Releasing Strategy in Public Key Infrastructure, Nan HU, Yingjiu LI, and Chengyu MA Conference Proceeding Article
Prediction-based gesture detection in lecture videos by combining visual, speech and electronic slides, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Private Information Retrieval Using Trusted Hardware, Shuhong WANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article
Reflections on: When Internet Companies Morph, Robert J. KAUFFMAN, T. Miller, and B. WANG Journal Article
Recursive self organizing maps with hybrid clustering, Kiruthika RAMANATHAN and Sheng Uei GUAN Conference Proceeding Article
A Close Look at Privacy Preserving Data Mining Methods, Xindong WU, Yunfeng WANG, Chao-Hsien CHU, Fengli LIU, Ping CHEN, and Dianmin YUE Conference Proceeding Article
Airfreight Pricing and Discounts for Dense and Volumetric Cargoes, Michelle Lee Fong CHEONG, R. Bhatnagar, and S. C. Graves Conference Paper
Batch Mode Active Learning and its Applications to Medical Image Classification, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Can online reviews reveal a product's true quality? Empirical findings analytical modeling of online word-of-mouth communication, Nan HU, Paul Pavlou, and Jennifer ZHANG Conference Proceeding Article
Cognitive mapping techniques for user-database interaction, Keng SIAU and X. TAN Journal Article
CS Cache Engine: Data Access Accelerator for Location-Based Service in Mobile Environments (demo), Ken C. K. LEE, Wang-chien LEE, Julian Winter, Baihua ZHENG, and JianLiang Xu Conference Paper
Exploiting Domain Structure for Named Entity Recognition, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Fuzzy cognitive goal net for interactive storytelling plot design, Yundong CAI, Chunyan MIAO, Ah-hwee TAN, and Zhiqi SHEN Conference Proceeding Article
Learning Distance Metrics with Contextual Constraints for Image Retrieval, Steven C. H. HOI, Wei LIU, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article
MultiLearner based recursive supervised training, Kiruthika RAMANATHAN, Sheng Uei GUAN, and Laxmi R. IYER Conference Proceeding Article
On the Release of Crls in Public Key Infrastructure, Chengyu Ma, Nan Hu, and Yingjiu Li Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Security analysis on a conference scheme for mobile communications, Zhiguo WAN, Feng BAO, Robert H. DENG, and A. L. ANANDA Journal Article
Tracking Nearest Surrounders in Moving Object Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article
Self-organizing neural architecture for reinforcement learning, Ah-hwee TAN Conference Proceeding Article
An Evolutionary Fuzzy Multi-Objective Approach to Cell Formation, C. C. TSAI, Chao-Hsien CHU, and Xindong Wu Conference Proceeding Article
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon LEE, Youngki LEE, Seungwoo KANG, SangJeong LEE, Hyunju JIN, Byoungjip KIM, and Junehwa SONG Conference Proceeding Article
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon Lee, Youngki Lee, Seungwoo Kang, SangJeong Lee, Hyunju Jin, Byoungjip Kim, and Junehwa Song Conference Paper
Clip-based similarity measure for query-dependent clip retrieval and video summarization, Yuxin PENG and Chong-wah NGO Journal Article
Data Access Techniques in Location-Based Services, Jianliang XU, Baihua ZHENG, and Wang-Chien LEE Conference Proceeding Article
Discovering Causal Dependencies in Mobile Context-Aware Recommenders, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article
Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks, Zhiguo WAN, B. ZHU, Robert H. DENG, Feng Bao, and A. L. Ananda Conference Proceeding Article
Efficient querying and resource management using distributed presence information in converged networks, Dipanjan CHAKRABORTY, Koustuv DASGUPTA, and Archan MISRA Conference Proceeding Article
GECON 2006: Proceedings of the 3rd International Workshop on Grid Economics and Business Models, Hing-Yan LEE and Steven M. MILLER Edited Conference Proceeding
Gestalt-based feature similarity measure in trademark database, Hui JIANG, Chong-wah NGO, and Hung-Khoon TAN Journal Article
Guest editorial: Mobile technology in education, Keng SIAU and Fiona Fui-hoon NAH Journal Article
Large-Scale Text Categorization by Batch Mode Active Learning, Steven C. H. HOI, Rong JIN, and Michael R. LYU Conference Proceeding Article
Mining RDF metadata for generalized association rules: Knowledge discovery in the semantic web era, Tao JIANG and Ah-hwee TAN Conference Proceeding Article
On in-network synopsis join processing for sensor networks, Hai YU, Ee Peng LIM, and Jun ZHANG Conference Proceeding Article
Osprey: A practical type system for validating dimensional unit correctness of C programs, Lingxiao JIANG and Zhendong SU Conference Proceeding Article
Real-Time Non-Rigid Shape Recovery via Active Appearance Models for Augmented Reality, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Conference Proceeding Article
Time-dependent semantic similarity measure of queries using historical click-through data, Qiankun ZHAO, Steven C. H. HOI, Tie-Yan LIU, Sourav S. BHOWMICK, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article
Towards Statistical Modeling Based Value Disclosure Analysis in General Databases, Xintao Wu, Songtao Guo, and Yingjiu LI Conference Paper
Winning back the CUP for Distributed POMDPs: Planning over continuous belief spaces, Pradeep VARAKANTHAM, Ranjit Nair, Milind Tambe, and Makoto Yokoo Conference Proceeding Article
A Fuzzy Multi-Objective Linear Programming Model for Manufacturing Cell Formation, C.C. TSAI and Chao-Hsien Chu Journal Article
Anonymous signature schemes, Guomin YANG, Duncan S. WONG, Xiaotie DENG, and Huaxiong WANG Conference Proceeding Article
A practical password-based two-server authentication and key exchange system, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article
A Unified Log-based Relevance Feedback Scheme for Image Retrieval, Steven HOI, Michael R. LYU, and Rong JIN Journal Article
Caching Complementary Space for Location-Based Services, Ken C. K. LEE, Wang-chien LEE, Baihua ZHENG, and Jianliang XU Conference Proceeding Article
Deriving Private Information from Perturbed Data using IQR Based Approach, Songtao GUO, Xintao WU, and Yingjiu LI Conference Proceeding Article
Dimorphic Computing, H. Andreas LAGAR-CAVILLA, Niraj Tolia, Rajesh Krishna BALAN, Eyal De Lara, Mahadev Satyanarayanan, and David O'Halloran Report
Effect of changing requirements: A tracking mechanism for the analysis workflow, Subhajit DATTA and Robert van Engelen Conference Proceeding Article
Efficient client-to-server assignments for distributed virtual environments, Nguyen Binh Duong TA and Suiping ZHOU Conference Proceeding Article
Enterprise agility and the enabling role of information technology, Eric OVERBY, Anandhi S. Bharadwaj, and V. SAMBAMURTHY Journal Article
Evaluation of time-varying availability in multi-echelon spare parts systems with passivation, Hoong Chuin LAU, Huawei SONG, Chuen Teck SEE, and Siew Yen CHENG Journal Article
Experimental and Empirical Perspectives on Grid Resource Allocation for the Singapore Market, Danny OH, Steven MILLER, and Nan HU Conference Proceeding Article
FISA: Feature-based instance selection for imbalanced text classification, Aixin SUN, Ee Peng LIM, Boualem Benatallah, and Mahbub Hassan Conference Proceeding Article
INEXT: An Investigative Search Tool for Knowledge Extraction, Zhen SUN and Ee Peng LIM Conference Proceeding Article
In-network processing of nearest neigbor queries for wireless sensor networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Conference Proceeding Article
Searching Substructures with Superimposed Distance, Xifeng YAN, Feida ZHU, Jiawei HAN, and Philip S. YU Conference Proceeding Article
SGPM: Static Group Pattern Mining using apriori-like sliding window, John GOH, David Taniar, and Ee Peng LIM Conference Proceeding Article
To Be or Not to B2B? An Evaluative Model for E-Procurement Channel Adoption., Q. Dai and Robert John KAUFFMAN Journal Article
Towards Inferring Protein Interactions: Challenges and Solutions, Ya ZHANG, Hongyuan ZHA, Chao-Hsien CHU, Xiang JI, and X. W. CHEN Journal Article
Agility measurement index: A metric for the crossroads of software development methodologies, Subhajit DATTA Conference Proceeding Article
A Survey of Worm Detection and Defense, R. COLE and Chao-Hsien CHU Conference Paper
CAPS: Energy-Efficient Processing of Continuous Aggregate Queries in Sensor Networks, Wen HU, Archan MISRA, and Rajiv SHOREY Conference Proceeding Article
Crosscutting score: An indicator metric for aspect orientation, Subhajit DATTA Conference Proceeding Article
Enforcing Security in Mobile Networks: Challenges and Solutions, Robert H. DENG, Feng BAO, Ying QIU, and Jianying ZHOU Book Chapter
Fortifying Password Authentication in Integrated Healthcare Delivery Systems, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article
Practical Inference Control for Data Cubes, Yingjiu LI, Haibing LU, and Robert H. DENG Conference Proceeding Article
Publicly Verifiable Ownership Protection for Relational Databases, Yingjiu LI and Robert H. DENG Conference Proceeding Article
Robust classification of EEG signal for brain-computer interface, Manoj THULASIDAS, Cuntai GUAN, and Jiankang WU Journal Article
Routing Algorithms for Energy-Efficient Reliable Packet Delivery in Multihop Wireless Networks, Suman BANERJEE and Archan MISRA Book Chapter
SPLASH: Systematic proteomics laboratory analysis and storage hub, Siaw Ling LO, You TAO, Qingsong LIN, Shashikant B. JOSHI, Maxey CHUNG, and Choy Leong HEW Journal Article
Tacit knowledge, Nonaka and Takeuchi SECI model and informal knowledge processes, Siu Loon HOE Journal Article
Threading and autodocumenting news videos: A promising solution to rapidly browse news topics, Xiao WU, Chong-wah NGO, and Qing LI Journal Article
Energy Efficiency and Capacity for TCP Traffic in Multi-Hop Wireless Networks, Sorav BANSAL, Rajeev SHOREY, Rajeev GUPTA, and Archan MISRA Journal Article
Least modification principle for case-based reasoning: a software project planning experience, Jae Kyu LEE and Nobok LEE Journal Article
Processing Multiple Aggregation Queries in Geo-Sensor Networks, Ken C. K. LEE, Wang-chien LEE, Baihua ZHENG, and Julian Winter Conference Proceeding Article
Scalable authentication of MPEG-4 streams, Yongdong WU and Robert H. DENG Journal Article