The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2005

Link

Defending against Packet Injection Attacks in Unreliable Ad Hoc Networks, Qijun GU, Peng LIU, Sencun ZHU, and Chao-Hsien CHU Conference Proceeding Article

Does Online Review Reveal a Product's True Quality, Nan HU and Jennifer ZHANG Conference Proceeding Article

PDF

Exploiting self-adaptive posture-based focus estimation for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article

Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper

Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper

PDF

Mining ontological knowledge from domain-specific text documents, Xing JIANG and Ah-hwee TAN Conference Proceeding Article

PDF

Motion-based approach for BBC rushes structuring and characterization, Chong-wah NGO and Zailiang PAN Conference Paper

PDF

On Security Notions of Steganographic Systems, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, and Hyungjun KIM Conference Proceeding Article

PDF

Query Processing in Spatial Databases Containing Obstacles, Jun ZHANG, Dimitris Papadias, Kyriakos Mouratidis, and Manli ZHU Journal Article

Link

Scalable trusted online dissemination of JPEG2000 images, Robert H. DENG, Di MA, Weizhong Shao, and Yongdong Wu Journal Article

PDF

Selective object stabilization for home video consumers, Zailiang PAN and Chong-wah NGO Journal Article

Link

Slander Resistant Attacker Isolation in Ad Hoc Networks, Q. GU, Chao-Hsien CHU, Peng LIU, and S. ZHU Conference Proceeding Article

PGMC: a framework for probabilistic graphic model combination, Chang-an Jiang, Tze-Yun LEONG, and Kim-Leng Poh Conference Proceeding Article

PDF

AND/OR Graph and Search Algorithm for Discovering Composite Web Services, Qianhui (Althea) LIANG and Stanley Y. W. SU Journal Article

PDF

Automatic 3D Face Modeling Using 2D Active Appearance Models, Jianke ZHU, Steven HOI, and Michael R. LYU Conference Proceeding Article

PDF

Common pattern discovery using earth mover's distance and local flow maximization, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article

PDF

DSIM: A Distance-Based Indexing Method for Genomic Sequences, Xia CAO, Beng-Chin OOI, Hwee Hwa PANG, Kian-Lee TAN, and Anthony K. H. TUNG Conference Proceeding Article

PDF

Informal Animation Sketching with K-Sketch, Richard C. DAVIS Conference Paper

Information Systems in Competitive Strategies: Offshoring, Risk Management, Strategic Pricing, E-Sourcing, and Standards., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article

PDF

Managerial assessments of E-business investment opportunities: A field study, Anandhi S. BHARADWAJ and Amrit Tiwana Journal Article

PDF

NIL is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, WONG, Wei GAO, and Wei GAO Conference Proceeding Article

PDF

NIL Is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, Kam-Fai WONG, and Wei GAO Conference Proceeding Article

PDF

Towards Semantic Service Request of Web Service Composition, Qianhui Althea LIANG, Jen-Yao CHUNG, and Steven M. MILLER Conference Proceeding Article

Link

A Generic Protocol for Controlling Access to Mobile Services, Shuhong WANG, Yingjiu LI, Bo ZHU, and Nan Hu Conference Proceeding Article

Link

An Efficient Certified E-Mail Scheme Suitable for Wireless Mobile Environments, Guilin WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article

Applied public key infrastructure: 4th International Workshop on Applied Public Key Infrastructure, Jianying ZHOU, Meng-Chow Kang, Feng Bao, and Hwee Hwa PANG Edited Conference Proceeding

Link

Behavioral Distance for Intrusion Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

PDF

CUHK at imageCLEF 2005: cross-language and cross-media image retrieval, Steven C. H. HOI, J. ZHU, and M. LYU Conference Proceeding Article

PDF

Forms of Expression for Designing Visual Languages for Animation, Richard C. DAVIS and James A. Landay Conference Proceeding Article

PDF

Low Latency Multimedia Broadcast in Multi-rate Wireless Meshes, Chun-Tong CHOU and Archan MISRA Conference Paper

PDF

Managing geography learning objects using personalized project spaces in G-Portal, Dion Hoe-Lian GOH, Aixin SUN, Wenbo ZONG, Dan WU, Ee Peng LIM, Yin-Leng THENG, John HEDBERG, and Chew-Hung CHANG Conference Proceeding Article

PDF

New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-like Codes for Tolerating Three Disk Failures, Gui-Liang FENG, Robert H. DENG, Feng Bao, and Jia-Chen SHEN Journal Article

PDF

On organizing and accessing geospatial and georeferenced web resources using the g-portal system, Zehua LIU, Ee Peng LIM, Yin-Leng THENG, Dion Hoe-Lian GOH, and Wee-Keong NG Journal Article

Link

Optimization of BCI speller based on P300 potential, Manoj THULASIDAS and Cuntai GUAN Conference Proceeding Article

PDF

Partial Adjustable Autonomy in Multi-Agent Environment and Its Application to Military Logistics, Hoong Chuin LAU, Lucas AGUSSURJA, and Ramesh THANGARAJOO Conference Proceeding Article

Link

Protocol for Hiding Movement of Mobile Nodes in Mobile IPv6, Ying QIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

Security Analysis and Improvement of Return Routability Protocol, Ying QIU, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article

PDF

Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework, Hoong Chuin LAU, Lei ZHANG, and Chang LIU Conference Proceeding Article

PDF

Strategic implications of mobile technology: A case study using value-focused thinking, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Journal Article

A unified learning paradigm for large-scale personalized information management, Edward Y. CHANG, Steven C. H. HOI, Xinjing WANG, Wei-Ying MA, and Michael R. LYU Conference Proceeding Article

PDF

Constrained Shortest Path Computation, Manolis TERROVITIS, Spiridon BAKIRAS, Dimitris PAPADIAS, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Dispatching Vehicles in a Mega Container Terminal, Ebru K. BISH, Frank Y. CHEN, Thin Yin LEONG, Barry L. Nelson, Jonathan W. C. NG, and David SIMCHI-LEVI Journal Article

PDF

Evaluation of Time-Varying Availability in Multi-Echelon Inventory System with Combat Damage, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article

PDF

GeogDL: A web-based approach to geography examination, Ee Peng LIM, Dion Hoe-Lian GOH, and Yin-Leng THENG Journal Article

PDF

Impact on open source software performance: A view from social structure, Y. LONG and Keng SIAU Conference Proceeding Article

PDF

Medoid Queries in Large Spatial Databases, Kyriakos MOURATIDIS, Dimitris Papadias, and Spiros Papadimitriou Conference Proceeding Article

PDF

Personalization of web services: A study on the fit between web tasks and personalization mechanisms, Fiona Fui-hoon NAH, Keng SIAU, and Min LING Conference Proceeding Article

PDF

Privacy issues in the era of ubiquitous commerce, Holtjona GALANXHI and Fiona Fui-hoon NAH Conference Proceeding Article

Semantic Web for EC: How to Overcome the Hurdles and Create the Future?, Jae Kyu LEE Conference Paper

Link

Service Mining for Web Service Composition, Qianhui (Althea) LIANG, Steven Miller, and J. Chung Conference Proceeding Article

PDF

Towards a theoretical framework of information systems development success, Y. LONG, Keng SIAU, and M. LING Conference Proceeding Article

PDF

Translation initiation sites prediction with mixture Gaussian models in human cDNA sequences, G. Li, Tze-Yun LEONG, and Louxin Zhang Journal Article

PDF

Tuning Tabu Search strategies via visual diagnosis, Steven HALIM, Wee Chong WAN, and Hoong Chuin LAU Conference Proceeding Article

PDF

Using wireless technology to facilitate learning: A grounded theory approach, Hong SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article

PDF

Web Mining - The Ontology Approach, Ee Peng LIM and Aixin SUN Conference Paper

PDF

WmXML: A System for Watermarking XML Data, Xuan ZHOU, Hwee Hwa PANG, Kian-Lee TAN, and Dhruv MANGLA Conference Proceeding Article

PDF

An informatization of society approach to e-government: Analyzing Singapore’s e-government efforts, Calvin M. L. CHAN and Yi Meng LAU Conference Proceeding Article

PDF

Approximate strategic reasoning through hierarchical reduction of large symmetric games, Michael P. WELLMAN, Daniel M. REEVES, Kevin M. LOCHNER, Shih-Fen CHENG, and Rahul SURI Conference Proceeding Article

Bridging Units and Business Incubation in a Technology Research Lab, Arcot Desai NARASIMHALU Conference Paper

PDF

Co-clustering of time-evolving news story with transcript and keyframe, Xiao WU, Chong-wah NGO, and Qing LI Conference Proceeding Article

PDF

Deposit-case attack against secure roaming, Guomin YANG, Duncan S. WONG, and Xiaotie DENG Conference Proceeding Article

PDF

Descriptive Naming of Context Data Providers, Norman H. COHEN, Paul CASTRO, and Archan MISRA Conference Proceeding Article

Link

Efficient and Robust Key Management for Large Mobile Ad-Hoc Networks, Bo ZHU, Feng BAO, Robert H. DENG, Mohan S. KANKANHALLI, and Guilin WANG Journal Article

PDF

EMD-based video clip retrieval by many-to-many matching, Yuxin PENG and Chong-wah NGO Conference Proceeding Article

PDF

Exploiting Belief Bounds: Practical POMDPs for Personal Assistant Agents, Pradeep VARAKANTHAM, Rajiv Maheswaran, and Milind Tambe Conference Proceeding Article

PDF

Hot event detection and summarization by graph modeling and matching, Yuxin PENG and Chong-Wah NGO Conference Proceeding Article

PDF

How Much You Watch, How Much You Pay, Yongdong WU, Hwee Hwa PANG, and Robert H. DENG Conference Proceeding Article

PDF

Middleware Architecture for Evaluation and Selection of 3rd Party Web Services for Service Providers, Dipanjan CHAKRABORTY, Suraj K. JAISWAL, Archan MISRA, and Amit A. NANAVATI Conference Proceeding Article

PDF

Multibiometrics based on palmprint and handgeometry, Xiao-Yong WEI, Dan XU, and Chong-wah NGO Conference Proceeding Article

Link

Protocols that hide user's preferences in electronic transactions, Feng BAO and Robert H. DENG Journal Article

PDF

Social Network Discovery by Mining Spatio-Temporal Events, Hady LAUW, Ee Peng LIM, Hwee Hwa PANG, and Teck-Tim TAN Journal Article

PDF

Strategic Assessment of Information Security Maturity, Arcot Desai NARASIMHALU, Dayasindhu NAGARAJAN, and Raghavan SUBRAMANIAN Report

PDF

Synthesis of distributed processes from scenario-based specifications, Jun SUN and Jin Song DONG Conference Proceeding Article

PDF

Valuations of Possible States (VPS): A Unifying Quantitative Framework for Evaluating Privacy in Collaboration, Rajiv T. MAHESWARAN, Jonathan Pearce, Pradeep VARAKANTHAM, Emma Bowring, and Milind Tambe Conference Proceeding Article

PDF

Aggregate Nearest Neighbor Queries in Spatial Databases, Dimitris PAPADIAS, Yufei TAO, Kyriakos MOURATIDIS, and Chun Kit HUI Journal Article

PDF

A Semi-Supervised Active Learning Framework for Image Retrieval, Steven HOI and Michael R. LYU Conference Proceeding Article

PDF

Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, Feng BAO, Robert H. DENG, Y. HAN, A. JENG, Arcot Desai NARASIMHALU, and T. NGAIR Conference Proceeding Article

PDF

Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring, Kyriakos MOURATIDIS, Marios Hadjieleftheriou, and Dimitris Papadias Conference Proceeding Article

PDF

DSI: A Fully Distributed Spatial Index for Wireless Data Broadcast, Wang-Chien LEE and Baihua ZHENG Conference Proceeding Article

PDF

Efficient anonymous roaming and its security analysis, Guomin YANG, Duncan S. WONG, and Xiaotie DENG Conference Proceeding Article

PDF

Evaluating G-Portal for Geography learning and teaching, Chew-Hung CHANG, John G. HEDBERG, Yin-Leng THENG, Ee Peng LIM, Tiong-Sa TEH, and Dion Hoe-Lian GOH Conference Proceeding Article

Innovation Cube: Triggers, Drivers and Enablers for Successful Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

Knowledge management mechanisms of financial service sites, Fiona Fui-hoon NAH, Keng SIAU, and Y. TIAN Journal Article

PDF

Learning outcomes oriented assessment methods in an active learning environment, Arcot Desai Narasimhalu Conference Paper

PDF

On assigning place names to geography related web pages, Wenbo ZONG, Dan WU, Aixin SUN, Ee Peng LIM, and Dion Hoe-Lian GOH Conference Proceeding Article

Link

Personalized project space for managing metadata of geography learning objects, Wenbo ZONG, Dan WU, Aixin SUN, Ee Peng LIM, Dion Hoe-Lian GOH, Yin-Leng THENG, John HEDBERG, and Chew-Hung CHANG Conference Proceeding Article

Reports on the 2005 AAAI Spring Symposium Series, Michael L. Anderson, Thomas Barkowsky, Pauline Berry, Douglas Blank, Timothy Chklovski, Pedro Domingos, Marek J. Druzdzel, Christian Freksa, John Gersh, Mary Hegarty, Tze-Yun LEONG, Henry Lieberman, Ric Lowe, Susann Luperfoy, Rada Mihalcea, Lisa Meeden, David P., Tim Oates Miller, Robert Popp, and Daniel Shapiro Magazine Article

PDF

Verifying Completeness of Relational Query Results in Data Publishing, Hwee Hwa PANG, Arpit JAIN, Krithi RAMAMRITHAM, and Kian-Lee TAN Conference Proceeding Article

PDF

A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises, Yanjiang YANG, Feng BAO, and Robert H. Deng Conference Proceeding Article

PDF

Dynamically Optimized Context in Recommender Systems, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article

PDF

Dynamically-optimized context in recommender systems, Ghim-Eng YAP, Ah-hwee TAN, and Hwee-Hwa PANG Conference Proceeding Article

PDF

Event-driven document selection for terrorism, Zhen SUN, Ee Peng LIM, Kuiyu CHANG, Teng-Kwee ONG, and Rohan Kumar Gunaratna Conference Proceeding Article

Feature selection for the prediction of translation initiation sites, Li G. and Tze-Yun LEONG Journal Article

PDF

Information Dissemination via Wireless Broadcast, Baihua ZHENG and Dik Lun LEE Journal Article

Information Systems Leadership and Future Firm Performance, Rajiv BANKER, Mark Anderson, and Nan HU Conference Paper

PDF

Leveraging global resources: A distributed process maturity framework for software product development, Narayan RAMASUBBU, M. S. Krishnan, and Prasad Kompalli Journal Article

PDF

Live Data Views: Programming Pervasive Applications that Use “Timely” and “Dynamic” Data, Jay BLACK, Paul CASTRO, Archan MISRA, and Jerome WHITE Conference Proceeding Article

PDF

Minimum Energy Reliable Paths using Unreliable Wireless Links, Qunfeng DONG, Suman BANERJEE, Micah ADLER, and Archan MISRA Conference Proceeding Article

PDF

Mining mobile group patterns: A trajectory-based approach, San-Yih HWANG, Ying-Han LIU, Jeng-Kuen CHIU, and Ee Peng LIM Conference Proceeding Article

Link

On discovering concept entities from web sites, Ming YIN, Dion Hoe-Lian GOH, and Ee Peng LIM Conference Proceeding Article