Submissions from 2005
Privacy and Ownership Preserving of Outsourced Medical Data, Elisa BERTINO, Beng Chin OOI, Yanjiang YANG, and Robert H. DENG Conference Proceeding Article
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining, Xintao WU, Ying WU, Yongge WANG, and Yingjiu LI Conference Proceeding Article
Proactive Caching for Spatial Queries in Mobile Environments, Haibo HU, Jianliang XU, Wing Sing WONG, Baihua ZHENG, Dik Lun LEE, and Wang-Chien LEE Conference Proceeding Article
Providing Efficient Certification Services against Active Attacks in Ad Hoc Networks, Bo ZHU, Guilin WANG, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article
Walverine: A walrasian trading agent, Shih-Fen CHENG, Evan LEUNG, Kevin M. LOCHNER, Kevin O'MALLEY, Daniel M. REEVES, Julian L. SCHVARTZMAN, and Michael P. WELLMAN Journal Article
An Attribute-Based Access Matrix Mode, Xinwen ZHANG, Yingjiu LI, and Divya Nalla Conference Proceeding Article
CORE: A search and browsing tool for semantic instances of web sites, Myo-Myo NAING, Ee Peng LIM, and Robert CHIANG Conference Proceeding Article
Deque: Querying the deep web, Denis SHESTAKOV, Sourav S. BHOWMICK, and Ee Peng LIM Journal Article
DoS-resistant access control protocol with identity confidentiality for wireless networks, Zhiguo WAN, Bo ZHU, Robert H. DENG, Feng BAO, and A. L. ANANDA Conference Proceeding Article
Effect of training datasets on support vector machine prediction of protein-protein interactions, Siaw Ling LO, Cong Zhong CAI, Maxey CHUNG, and Yu Zong CHEN Journal Article
Evaluation of MPEG-4 IPMP Extension, Hwee Hwa PANG and Yongdong WU Conference Proceeding Article
Fingerprinting relational databases: Schemes and specialities, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Journal Article
MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality Constraints, Inseok HWANG, Qi HAN, and Archan MISRA Conference Proceeding Article
Rational Expectations, Optimal Control and Information Technology Adoption, Yoris A. AU and Robert J. KAUFFMAN Journal Article
Rational Expectations, Optimal Control and Information Technology Adoption., Y. Au and Robert John KAUFFMAN Journal Article
Scheduling queries to improve the freshness of a website, Haifeng LIU, Wee-Keong NG, and Ee Peng LIM Journal Article
Video text detection and segmentation for optical character recognition, Chong-wah NGO and Chi-Kwong CHAN Journal Article
The value of mobile applications: A utility company study, Fiona Fui-hoon NAH, Keng SIAU, and Hong SHENG Journal Article
Video summarization and scene detection by graph modeling, Chong-wah NGO, Yu-Fei MA, and Hong-Jiang ZHANG Journal Article
Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article
A Genetic Algorithm for Layered Multi-Source Video Distribution, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper
A Multi-Agent Approach for Solving Optimization Problems involving Expensive Resources, Hoong Chuin LAU and H. WANG Conference Proceeding Article
An Effective Customization Procedure with Configurable Standard Models, Hyun Jung LEE and Jae Kyu LEE Journal Article
Applying scenario-based design and claim analysis to the design of a digital library of geography examination resources, Yin-Leng THENG, Dion Hoe-Lian GOH, Ee Peng LIM, Zehua LIU, Ming YIN, Natalie Lee-San PANG, and Patricia Bao-Bao WONG Journal Article
Association Rule Mining, Yew-Kwong WOON, Wee-Keong NG, and Ee Peng LIM Encyclopaedia
Beyond the Hype of Frictionless Markets: Evidence of Heterogeneity in Price Rigidity on the Internet, M. Bergen, Robert John KAUFFMAN, and D.W. Lee Journal Article
Conflicts in teamwork: Hybrids to the rescue, Milind TAMBE, Emma Bowring, H. Jung, G. Kaminka, Rajiv Maheswaran, Janusz Marecki, P. J. Modi, Ranjit Nair, Jonathan Pearce, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article
Discovery of concept entities from web sites using web unit mining, Ming YIN, Dion Hoe-Lian GOH, and Ee Peng LIM Journal Article
Elements of Financial Risk Management for Grid and Utility Computing, Giorgos CHELIOTIS and C. KENYON Book Chapter
Exploring bit-difference for approximate KNN search in high-dimensional databases, Bin Cui, Heng Tao Shen, Jialie SHEN, and Kian-Lee Tan Conference Paper
Finding and Classifying Web Units in Web Sites, Ee Peng LIM and Aixin SUN Journal Article
Implementation of next generation Digital Libraries, Ee Peng LIM and San-Yih HWANG Book Chapter
Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article
Learning plans with patterns of actions in bounded-rational agents, Subagdja B. and Sonenberg L. Book
Linear correlation discovery in databases: A data mining approach, Cecil CHUA, Roger Hsiang-Li CHIANG, and Ee Peng LIM Journal Article
Location estimation techniques (determination and prediction) techniques in smart environments, Archan MISRA and Sajal K. DAS Book Chapter
Mobile Cache Management, Jianliang XU, Haibo Hu, Xueyan TANG, and Baihua ZHENG Book Chapter
Networked Distributed POMDPs: A Synthesis of Distributed Constraint Optimization and POMDPs, Ranjit NAIR, Pradeep Reddy VARAKANTHAM, Milind Tambe, and Makoto Yokoo Conference Proceeding Article
New Directions in E-Business Management Research: Exploring Competitive Strategy, Economics and IT Issues: Guest Editors’ Introduction, Robert John KAUFFMAN and Rahul TELANG Editorial
On Efficient Music Genre Classification, Jialie SHEN, Shepherd John, and Ngu Ahh Conference Proceeding Article
Ontology-assisted mining of RDF documents, Tao JIANG and Ah-hwee TAN Book Chapter
oPlexus - A Distributed Platform for IS Research and Education, Y. HUANG, Mei LIN, Andrew B. WHINSTON, and A. GUPTA Conference Proceeding Article
Partnering for perfection: An economics perspective on B2B electronic market strategic alliances, Qizhi DAI and Robert J. KAUFFMAN Book Chapter
Protarget: Automatic Prediction of Protein Structure Novelty, Ori SASSON and Michal Linial Journal Article
Protonet 4.0: A Hierarchical Classification of One Million Protein Sequences, Noam KAPLAN, Ori SASSON, Uri Inbar, Moriah Friedlich, Menachem Fromer, Hillel Fleischer, Elon Portugaly, Nathan Linial, and Michal Linial Journal Article
Robust Temporal Constraint Networks, Hoong Chuin LAU, Thomas Ou, and Melvyn Sim Conference Proceeding Article
Rule Identification from Web Pages by the XRML Approach, Juyoung KANG and Jae Kyu LEE Journal Article
Securing Credit Card Transactions with One-Time Payment Scheme, Yingjiu LI and Xinwen ZHANG Journal Article
Securing Jpeg2000 Code-Streams, Robert Huijie Deng, Yongdong Wu, and Di Ma Book Chapter
Securing JPEG2000 code-streams, Robert H. DENG, Yongdong Wu, and Di MA Book Chapter
Security of an ill-posed operator based scheme for image authentication, Yongdong WU and Robert H. DENG Journal Article
Semantic-Sensitive Classification for Large Image Library, Jialie SHEN, John Shepherd, and AHH Ngu Conference Proceeding Article
Special section: Human-computer interaction research in management information systems, Ping ZHANG, Fiona Fui-hoon NAH, and Izak BENBASAT Journal Article
Systems analysis and design: Should we be researching what we teach?, A. BAJAJ, D. BATRA, A. HEVNER, J. PARSONS, and Keng SIAU Journal Article
Technology competition and optimal investment timing: A real options perspective, Robert J. KAUFFMAN and X. LI Journal Article
Ten Lessons from Finance for Commercial Sharing of IT Resources, Giorgos CHELIOTIS, C. KENYON, and R. Buyya Book Chapter
The Effects of Shilling on Final Bid Prices in Online Auctions, Robert J. KAUFFMAN and Charles A. Wood Journal Article
The International Diffusion of Mobile Commerce: A Coupled Hazard Approach, Robert J. KAUFFMAN and A. A. Techatassanasoontorn Journal Article
The Learning Curve of Knowledge Workers in a Computing Call Cente, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Journal Article
Towards Inferring Protein Interactions: Challenges and Solutions, Y. Zhang, H. Zha, Chao-Hsien Chu, X. Ji, and X. W Chen Journal Article
Towards Semantically Meaningful Feature Spaces for Efficient Indexing in Large Image Databases, Anne H. H. NGU, Jialie SHEN, and John Shepherd Book Chapter
Submissions from 2004
Recursive percentage based hybrid pattern (RPHP) training for curve fitting, Sheng Uei GUAN and Kiruthika RAMANATHAN Conference Proceeding Article
ASPs versus MOTS Software Solutions, Dan MA and Abraham Seidmann Conference Paper
Automatic model structuring from text using biomedical ontology, Joshi R., Li X., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article
Classifying biomedical citations without labeled training examples, Li X., Joshi R., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article
Correlating Summarization of Multi-source News with K-Way Graph Bi-clustering, Ya ZHANG, Chao-Hsien CHU, Xiang JI, and Hongyuan ZHA Journal Article
Cost-effectiveness analysis of colorectal cancer screening strategies in singapore: A dynamic decision analytic approach, Wong S., Leong A., and Tze-Yun LEONG Conference Proceeding Article
Design lessons on access features in PAPER, Yin-Leng THENG, Dion Hoe-Lian GOH, Ming YIN, Eng-Kai Suen, and Ee Peng LIM Conference Proceeding Article
Factors impacting e-government development, Keng SIAU and Y. LONG Conference Proceeding Article
High performance P300 speller for brain-computer interface, Cuntai GUAN, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article
Information Security Health Rating for Enterprises, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Conference Paper
IT Orientation, CIO reporting structure and Firm Performance: To Whom Should the CIO Report?, Rajiv BANKER, Nan HU, Jerry Luftman, and Paul Pavlou Conference Paper
JustiLM: Few-shot justification generation for explainable fact-checking of real-world claims, Fengzhu ZENG and Wei GAO Journal Article
Method for identifying individuals, Manoj THULASIDAS Patent
New efficient user identification and key distribution scheme providing enhanced security, Yanjiang YANG, Shuhong WANG, Feng BAO, Jie WANG, and Robert H. DENG Journal Article
On Security Notions for Steganalysis, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, Hyungjun KIM, and Jongin LIM Conference Proceeding Article
Operations Research Approach Towards Layered Multi-Source Video Delivery, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper
Supporting field study with personalized project spaces in a geographical digital library, Ee Peng LIM, Aixin SUN, Zehua LIU, John HEDBERG, Chew-Hung CHANG, Tiong-Sa TEH, Dion Hoe-Lian GOH, and Yin-Leng THENG Conference Proceeding Article
Theoretical and practical complexity of unified modeling language: Delphi study and metrics analyses, J. ERICKSON and Keng SIAU Conference Proceeding Article
The value of mobile commerce to customers, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Conference Proceeding Article
Translation initiation sites prediction with mixture gaussian models, Guoliang Li, Tze-Yun LEONG, and Louxin Zhang Book Chapter
U-commerce: Emerging trends and research issues, H. GALANXHI-JANAQI and Fiona Fui-hoon NAH Journal Article
Values of mobile commerce to customers, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Conference Proceeding Article
Vertical sensitivity for the information security health rating of enterprises, Arcot Desai NARASIMHALU, Nagarajan DAYASINDHU, and Raghavan SUBRAMANIAN Conference Paper
Leading and managing people in the dynamic organisation, Siu Loon HOE Book Review
Organisational behaviour: The state of the science, Siu Loon HOE Book Review
Accommodating Instance Heterogeneities in Database Integration, Ee Peng LIM and Roger Hsiang-Li CHIANG Journal Article
Anonymous Secure Routing in Mobile Ad-Hoc Networks, Bo ZHU, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article
A periodic-review inventory model with application to the continuous-review obsolescence problem, Yuyue SONG and Hoong Chuin LAU Journal Article
Corrective Maintenance Optimization in an Air Force, Hoong Chuin LAU, K. Y. Neo, and W. C. Wan Conference Proceeding Article
Finding Constrained Frequent Episodes Using Minimal Occurrences, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Job Scheduling with Unfixed Availability Constraints, Hoong Chuin LAU and C. ZHANG Conference Proceeding Article
Logistics Network Design with Differentiated Delivery Lead Time: A Chemical Industry Case Study, Michelle Lee Fong CHEONG, Rohit Bhatnagar, and Stephen C. Graves Working Paper
On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article
Spatial Queries in Wireless Broadcast Systems, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article
The D-tree: An index structure for planar point queries location-based wireless services, Jianliang XU, Baihua ZHENG, Wang-chien LEE, and Dik Lun LEE Journal Article
Two-Echelon Repairable Item Inventory System with Limited Repair Capacity under Nonstationary Demands, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article
A robust method for recovering geometric proxy from multiple panoramic images, Ada S. K. WAN, Angus M. K. SIU, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article
Gray-Box Extraction of Execution Graphs for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
airConn: A framework for tiered services in public wireless LAN hot spots, A. ACHARYA, C. Bisdikian, Archan MISRA, and Y. Ko Magazine Article