Submissions from 2005
Semantic Web for EC: How to Overcome the Hurdles and Create the Future?, Jae Kyu LEE Conference Paper
Service Mining for Web Service Composition, Qianhui (Althea) LIANG, Steven Miller, and J. Chung Conference Proceeding Article
Towards a theoretical framework of information systems development success, Y. LONG, Keng SIAU, and M. LING Conference Proceeding Article
Translation initiation sites prediction with mixture Gaussian models in human cDNA sequences, G. Li, Tze-Yun LEONG, and Louxin Zhang Journal Article
Tuning Tabu Search strategies via visual diagnosis, Steven HALIM, Wee Chong WAN, and Hoong Chuin LAU Conference Proceeding Article
Using wireless technology to facilitate learning: A grounded theory approach, Hong SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Values of silent commerce: A study using value-focused thinking approach, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Web Mining - The Ontology Approach, Ee Peng LIM and Aixin SUN Conference Paper
WmXML: A System for Watermarking XML Data, Xuan ZHOU, Hwee Hwa PANG, Kian-Lee TAN, and Dhruv MANGLA Conference Proceeding Article
An informatization of society approach to e-government: Analyzing Singapore’s e-government efforts, Calvin M. L. CHAN and Yi Meng LAU Conference Proceeding Article
Approximate strategic reasoning through hierarchical reduction of large symmetric games, Michael P. WELLMAN, Daniel M. REEVES, Kevin M. LOCHNER, Shih-Fen CHENG, and Rahul SURI Conference Proceeding Article
Bridging Units and Business Incubation in a Technology Research Lab, Arcot Desai NARASIMHALU Conference Paper
Co-clustering of time-evolving news story with transcript and keyframe, Xiao WU, Chong-wah NGO, and Qing LI Conference Proceeding Article
Deposit-case attack against secure roaming, Guomin YANG, Duncan S. WONG, and Xiaotie DENG Conference Proceeding Article
Descriptive Naming of Context Data Providers, Norman H. COHEN, Paul CASTRO, and Archan MISRA Conference Proceeding Article
Efficient and Robust Key Management for Large Mobile Ad-Hoc Networks, Bo ZHU, Feng BAO, Robert H. DENG, Mohan S. KANKANHALLI, and Guilin WANG Journal Article
EMD-based video clip retrieval by many-to-many matching, Yuxin PENG and Chong-wah NGO Conference Proceeding Article
Exploiting Belief Bounds: Practical POMDPs for Personal Assistant Agents, Pradeep VARAKANTHAM, Rajiv Maheswaran, and Milind Tambe Conference Proceeding Article
Hot event detection and summarization by graph modeling and matching, Yuxin PENG and Chong-Wah NGO Conference Proceeding Article
How Much You Watch, How Much You Pay, Yongdong WU, Hwee Hwa PANG, and Robert H. DENG Conference Proceeding Article
Middleware Architecture for Evaluation and Selection of 3rd Party Web Services for Service Providers, Dipanjan CHAKRABORTY, Suraj K. JAISWAL, Archan MISRA, and Amit A. NANAVATI Conference Proceeding Article
Multibiometrics based on palmprint and handgeometry, Xiao-Yong WEI, Dan XU, and Chong-wah NGO Conference Proceeding Article
Protocols that hide user's preferences in electronic transactions, Feng BAO and Robert H. DENG Journal Article
Social Network Discovery by Mining Spatio-Temporal Events, Hady LAUW, Ee Peng LIM, Hwee Hwa PANG, and Teck-Tim TAN Journal Article
Strategic Assessment of Information Security Maturity, Arcot Desai NARASIMHALU, Dayasindhu NAGARAJAN, and Raghavan SUBRAMANIAN Report
Synthesis of distributed processes from scenario-based specifications, Jun SUN and Jin Song DONG Conference Proceeding Article
Valuations of Possible States (VPS): A Unifying Quantitative Framework for Evaluating Privacy in Collaboration, Rajiv T. MAHESWARAN, Jonathan Pearce, Pradeep VARAKANTHAM, Emma Bowring, and Milind Tambe Conference Proceeding Article
Aggregate Nearest Neighbor Queries in Spatial Databases, Dimitris PAPADIAS, Yufei TAO, Kyriakos MOURATIDIS, and Chun Kit HUI Journal Article
A Semi-Supervised Active Learning Framework for Image Retrieval, Steven HOI and Michael R. LYU Conference Proceeding Article
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, Feng BAO, Robert H. DENG, Y. HAN, A. JENG, Arcot Desai NARASIMHALU, and T. NGAIR Conference Proceeding Article
Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring, Kyriakos MOURATIDIS, Marios Hadjieleftheriou, and Dimitris Papadias Conference Proceeding Article
DSI: A Fully Distributed Spatial Index for Wireless Data Broadcast, Wang-Chien LEE and Baihua ZHENG Conference Proceeding Article
Efficient anonymous roaming and its security analysis, Guomin YANG, Duncan S. WONG, and Xiaotie DENG Conference Proceeding Article
Evaluating G-Portal for Geography learning and teaching, Chew-Hung CHANG, John G. HEDBERG, Yin-Leng THENG, Ee Peng LIM, Tiong-Sa TEH, and Dion Hoe-Lian GOH Conference Proceeding Article
Innovation Cube: Triggers, Drivers and Enablers for Successful Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article
Knowledge management mechanisms of financial service sites, Fiona Fui-hoon NAH, Keng SIAU, and Y. TIAN Journal Article
Learning outcomes oriented assessment methods in an active learning environment, Arcot Desai Narasimhalu Conference Paper
On assigning place names to geography related web pages, Wenbo ZONG, Dan WU, Aixin SUN, Ee Peng LIM, and Dion Hoe-Lian GOH Conference Proceeding Article
Personalized project space for managing metadata of geography learning objects, Wenbo ZONG, Dan WU, Aixin SUN, Ee Peng LIM, Dion Hoe-Lian GOH, Yin-Leng THENG, John HEDBERG, and Chew-Hung CHANG Conference Proceeding Article
Reports on the 2005 AAAI Spring Symposium Series, Michael L. Anderson, Thomas Barkowsky, Pauline Berry, Douglas Blank, Timothy Chklovski, Pedro Domingos, Marek J. Druzdzel, Christian Freksa, John Gersh, Mary Hegarty, Tze-Yun LEONG, Henry Lieberman, Ric Lowe, Susann Luperfoy, Rada Mihalcea, Lisa Meeden, David P., Tim Oates Miller, Robert Popp, and Daniel Shapiro Magazine Article
Verifying Completeness of Relational Query Results in Data Publishing, Hwee Hwa PANG, Arpit JAIN, Krithi RAMAMRITHAM, and Kian-Lee TAN Conference Proceeding Article
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises, Yanjiang YANG, Feng BAO, and Robert H. Deng Conference Proceeding Article
Dynamically Optimized Context in Recommender Systems, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article
Dynamically-optimized context in recommender systems, Ghim-Eng YAP, Ah-hwee TAN, and Hwee-Hwa PANG Conference Proceeding Article
Event-driven document selection for terrorism, Zhen SUN, Ee Peng LIM, Kuiyu CHANG, Teng-Kwee ONG, and Rohan Kumar Gunaratna Conference Proceeding Article
Feature selection for the prediction of translation initiation sites, Li G. and Tze-Yun LEONG Journal Article
Information Dissemination via Wireless Broadcast, Baihua ZHENG and Dik Lun LEE Journal Article
Information Systems Leadership and Future Firm Performance, Rajiv BANKER, Mark Anderson, and Nan HU Conference Paper
Leveraging global resources: A distributed process maturity framework for software product development, Narayan RAMASUBBU, M. S. Krishnan, and Prasad Kompalli Journal Article
Live Data Views: Programming Pervasive Applications that Use “Timely” and “Dynamic” Data, Jay BLACK, Paul CASTRO, Archan MISRA, and Jerome WHITE Conference Proceeding Article
Minimum Energy Reliable Paths using Unreliable Wireless Links, Qunfeng DONG, Suman BANERJEE, Micah ADLER, and Archan MISRA Conference Proceeding Article
Mining mobile group patterns: A trajectory-based approach, San-Yih HWANG, Ying-Han LIU, Jeng-Kuen CHIU, and Ee Peng LIM Conference Proceeding Article
On discovering concept entities from web sites, Ming YIN, Dion Hoe-Lian GOH, and Ee Peng LIM Conference Proceeding Article
Protecting Group Dynamic Information in Large Scale Multicast Groups, Yongdong WU, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Secure Human Communications Based on Biometrics Signals, Yongdong WU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Synthesizing e-government stage models – A meta-synthesis based on meta-ethnography approach, Keng SIAU and Y. LONG Journal Article
TOSA: A Near-Optimal Scheduling Algorithm for Multi-Channel Data Broadcast, Baihua ZHENG, Xia XU, Xing JIN, and Dik Lun LEE Conference Proceeding Article
A Fully Distributed Spatial Index for Wireless Data Broadcast, Wang-chien LEE and Baihua ZHENG Conference Proceeding Article
AMOD: a morpholino oligonucleotide selection tool, Eric W. KLEE, Kyong Jin SHIM, Michael A. Pickart, Stephen C. Ekker, and Lynda B. M. Ellis Journal Article
GRACE: Introducción a la Ingeniería, Rafael J. BARROS, Gerardo DUQUE, John A. ROJAS, Luz Marina SÁNCHEZ, and José Divitt VELOSA Book
Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14: Proceedings, Robert Huijie DENG, Feng Bao, Hwee Hwa PANG, and Jianying ZHOU Edited Book
Integrating user feedback log into relevance feedback by coupled SVM for content-based image retrieval, Steven C. H. HOI, Michael R. LYU, and Rong JIN Conference Proceeding Article
Mining social network from spatio-temporal events, Hady Wirawan LAUW, Ee Peng LIM, Teck Tim TAN, and Hwee Hwa PANG Conference Proceeding Article
Predicting Fold Novelty Based on ProtoNet Hierarchical Classification, Ilona KIFER, Ori SASSON, and Michal Linial Journal Article
Predictive neural networks for gene expression data analysis, Ah-hwee TAN and Hong PAN Journal Article
Privacy and Ownership Preserving of Outsourced Medical Data, Elisa BERTINO, Beng Chin OOI, Yanjiang YANG, and Robert H. DENG Conference Proceeding Article
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining, Xintao WU, Ying WU, Yongge WANG, and Yingjiu LI Conference Proceeding Article
Proactive Caching for Spatial Queries in Mobile Environments, Haibo HU, Jianliang XU, Wing Sing WONG, Baihua ZHENG, Dik Lun LEE, and Wang-Chien LEE Conference Proceeding Article
Providing Efficient Certification Services against Active Attacks in Ad Hoc Networks, Bo ZHU, Guilin WANG, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article
Walverine: A walrasian trading agent, Shih-Fen CHENG, Evan LEUNG, Kevin M. LOCHNER, Kevin O'MALLEY, Daniel M. REEVES, Julian L. SCHVARTZMAN, and Michael P. WELLMAN Journal Article
An Attribute-Based Access Matrix Mode, Xinwen ZHANG, Yingjiu LI, and Divya Nalla Conference Proceeding Article
CORE: A search and browsing tool for semantic instances of web sites, Myo-Myo NAING, Ee Peng LIM, and Robert CHIANG Conference Proceeding Article
Deque: Querying the deep web, Denis SHESTAKOV, Sourav S. BHOWMICK, and Ee Peng LIM Journal Article
DoS-resistant access control protocol with identity confidentiality for wireless networks, Zhiguo WAN, Bo ZHU, Robert H. DENG, Feng BAO, and A. L. ANANDA Conference Proceeding Article
Effect of training datasets on support vector machine prediction of protein-protein interactions, Siaw Ling LO, Cong Zhong CAI, Maxey CHUNG, and Yu Zong CHEN Journal Article
Evaluation of MPEG-4 IPMP Extension, Hwee Hwa PANG and Yongdong WU Conference Proceeding Article
Fingerprinting relational databases: Schemes and specialities, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Journal Article
MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality Constraints, Inseok HWANG, Qi HAN, and Archan MISRA Conference Proceeding Article
Rational Expectations, Optimal Control and Information Technology Adoption, Yoris A. AU and Robert J. KAUFFMAN Journal Article
Rational Expectations, Optimal Control and Information Technology Adoption., Y. Au and Robert John KAUFFMAN Journal Article
Scheduling queries to improve the freshness of a website, Haifeng LIU, Wee-Keong NG, and Ee Peng LIM Journal Article
Video text detection and segmentation for optical character recognition, Chong-wah NGO and Chi-Kwong CHAN Journal Article
The value of mobile applications: A utility company study, Fiona Fui-hoon NAH, Keng SIAU, and Hong SHENG Journal Article
Video summarization and scene detection by graph modeling, Chong-wah NGO, Yu-Fei MA, and Hong-Jiang ZHANG Journal Article
Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article
A Genetic Algorithm for Layered Multi-Source Video Distribution, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper
A Multi-Agent Approach for Solving Optimization Problems involving Expensive Resources, Hoong Chuin LAU and H. WANG Conference Proceeding Article
An Effective Customization Procedure with Configurable Standard Models, Hyun Jung LEE and Jae Kyu LEE Journal Article
Applying scenario-based design and claim analysis to the design of a digital library of geography examination resources, Yin-Leng THENG, Dion Hoe-Lian GOH, Ee Peng LIM, Zehua LIU, Ming YIN, Natalie Lee-San PANG, and Patricia Bao-Bao WONG Journal Article
Association Rule Mining, Yew-Kwong WOON, Wee-Keong NG, and Ee Peng LIM Encyclopaedia
Beyond the Hype of Frictionless Markets: Evidence of Heterogeneity in Price Rigidity on the Internet, M. Bergen, Robert John KAUFFMAN, and D.W. Lee Journal Article
Conflicts in teamwork: Hybrids to the rescue, Milind TAMBE, Emma Bowring, H. Jung, G. Kaminka, Rajiv Maheswaran, Janusz Marecki, P. J. Modi, Ranjit Nair, Jonathan Pearce, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article
Discovery of concept entities from web sites using web unit mining, Ming YIN, Dion Hoe-Lian GOH, and Ee Peng LIM Journal Article
Elements of Financial Risk Management for Grid and Utility Computing, Giorgos CHELIOTIS and C. KENYON Book Chapter
Exploring bit-difference for approximate KNN search in high-dimensional databases, Bin Cui, Heng Tao Shen, Jialie SHEN, and Kian-Lee Tan Conference Paper
Finding and Classifying Web Units in Web Sites, Ee Peng LIM and Aixin SUN Journal Article
Implementation of next generation Digital Libraries, Ee Peng LIM and San-Yih HWANG Book Chapter
Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article
Learning plans with patterns of actions in bounded-rational agents, Subagdja B. and Sonenberg L. Book
Linear correlation discovery in databases: A data mining approach, Cecil CHUA, Roger Hsiang-Li CHIANG, and Ee Peng LIM Journal Article