The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2005

PDF

Linear correlation discovery in databases: A data mining approach, Cecil CHUA, Roger Hsiang-Li CHIANG, and Ee Peng LIM Journal Article

Link

Location estimation techniques (determination and prediction) techniques in smart environments, Archan MISRA and Sajal K. DAS Book Chapter

Mobile Cache Management, Jianliang XU, Haibo Hu, Xueyan TANG, and Baihua ZHENG Book Chapter

Link

Networked Distributed POMDPs: A Synthesis of Distributed Constraint Optimization and POMDPs, Ranjit NAIR, Pradeep Reddy VARAKANTHAM, Milind Tambe, and Makoto Yokoo Conference Proceeding Article

Link

New Directions in E-Business Management Research: Exploring Competitive Strategy, Economics and IT Issues: Guest Editors’ Introduction, Robert John KAUFFMAN and Rahul TELANG Editorial

Link

On Efficient Music Genre Classification, Jialie SHEN, Shepherd John, and Ngu Ahh Conference Proceeding Article

PDF

Ontology-assisted mining of RDF documents, Tao JIANG and Ah-hwee TAN Book Chapter

oPlexus - A Distributed Platform for IS Research and Education, Y. HUANG, Mei LIN, Andrew B. WHINSTON, and A. GUPTA Conference Proceeding Article

PDF

Optimal location of intermodal freight hubs, Illia RACUNICA and Laura WYNTER Journal Article

PDF

Partnering for perfection: An economics perspective on B2B electronic market strategic alliances, Qizhi DAI and Robert J. KAUFFMAN Book Chapter

Link

Protarget: Automatic Prediction of Protein Structure Novelty, Ori SASSON and Michal Linial Journal Article

Link

Protonet 4.0: A Hierarchical Classification of One Million Protein Sequences, Noam KAPLAN, Ori SASSON, Uri Inbar, Moriah Friedlich, Menachem Fromer, Hillel Fleischer, Elon Portugaly, Nathan Linial, and Michal Linial Journal Article

PDF

Robust Temporal Constraint Networks, Hoong Chuin LAU, Thomas Ou, and Melvyn Sim Conference Proceeding Article

Link

Rule Identification from Web Pages by the XRML Approach, Juyoung KANG and Jae Kyu LEE Journal Article

Link

Securing Credit Card Transactions with One-Time Payment Scheme, Yingjiu LI and Xinwen ZHANG Journal Article

Securing Jpeg2000 Code-Streams, Robert Huijie Deng, Yongdong Wu, and Di Ma Book Chapter

Link

Securing JPEG2000 code-streams, Robert H. DENG, Yongdong Wu, and Di MA Book Chapter

PDF

Security of an ill-posed operator based scheme for image authentication, Yongdong WU and Robert H. DENG Journal Article

Link

Semantic-Sensitive Classification for Large Image Library, Jialie SHEN, John Shepherd, and AHH Ngu Conference Proceeding Article

PDF

Special section: Human-computer interaction research in management information systems, Ping ZHANG, Fiona Fui-hoon NAH, and Izak BENBASAT Journal Article

PDF

Systems analysis and design: Should we be researching what we teach?, A. BAJAJ, D. BATRA, A. HEVNER, J. PARSONS, and Keng SIAU Journal Article

PDF

Technology competition and optimal investment timing: A real options perspective, Robert J. KAUFFMAN and X. LI Journal Article

Ten Lessons from Finance for Commercial Sharing of IT Resources, Giorgos CHELIOTIS, C. KENYON, and R. Buyya Book Chapter

PDF

The Effects of Shilling on Final Bid Prices in Online Auctions, Robert J. KAUFFMAN and Charles A. Wood Journal Article

Link

The International Diffusion of Mobile Commerce: A Coupled Hazard Approach, Robert J. KAUFFMAN and A. A. Techatassanasoontorn Journal Article

Link

The Learning Curve of Knowledge Workers in a Computing Call Cente, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Journal Article

Theoretical versus practical complexity: The case of UML, Keng SIAU, John ERICKSON, and LihYunn LEE Journal Article

Towards Inferring Protein Interactions: Challenges and Solutions, Y. Zhang, H. Zha, Chao-Hsien Chu, X. Ji, and X. W Chen Journal Article

Towards Semantically Meaningful Feature Spaces for Efficient Indexing in Large Image Databases, Anne H. H. NGU, Jialie SHEN, and John Shepherd Book Chapter

Ubiquitous commerce: Beyond wireless commerce, H. GALANXHI-JANAQI and Fiona Fui-hoon NAH Book Chapter

Submissions from 2004

Recursive percentage based hybrid pattern (RPHP) training for curve fitting, Sheng Uei GUAN and Kiruthika RAMANATHAN Conference Proceeding Article

ASPs versus MOTS Software Solutions, Dan MA and Abraham Seidmann Conference Paper

PDF

Automatic model structuring from text using biomedical ontology, Joshi R., Li X., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article

Classifying biomedical citations without labeled training examples, Li X., Joshi R., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article

Link

Correlating Summarization of Multi-source News with K-Way Graph Bi-clustering, Ya ZHANG, Chao-Hsien CHU, Xiang JI, and Hongyuan ZHA Journal Article

Cost-effectiveness analysis of colorectal cancer screening strategies in singapore: A dynamic decision analytic approach, Wong S., Leong A., and Tze-Yun LEONG Conference Proceeding Article

PDF

Design lessons on access features in PAPER, Yin-Leng THENG, Dion Hoe-Lian GOH, Ming YIN, Eng-Kai Suen, and Ee Peng LIM Conference Proceeding Article

PDF

Factors impacting e-government development, Keng SIAU and Y. LONG Conference Proceeding Article

PDF

High performance P300 speller for brain-computer interface, Cuntai GUAN, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article

Information Security Health Rating for Enterprises, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Conference Paper

IT Orientation, CIO reporting structure and Firm Performance: To Whom Should the CIO Report?, Rajiv BANKER, Nan HU, Jerry Luftman, and Paul Pavlou Conference Paper

PDF

JustiLM: Few-shot justification generation for explainable fact-checking of real-world claims, Fengzhu ZENG and Wei GAO Journal Article

PDF

Method for identifying individuals, Manoj THULASIDAS Patent

Link

New efficient user identification and key distribution scheme providing enhanced security, Yanjiang YANG, Shuhong WANG, Feng BAO, Jie WANG, and Robert H. DENG Journal Article

PDF

On Security Notions for Steganalysis, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, Hyungjun KIM, and Jongin LIM Conference Proceeding Article

Operations Research Approach Towards Layered Multi-Source Video Delivery, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper

PDF

Supporting field study with personalized project spaces in a geographical digital library, Ee Peng LIM, Aixin SUN, Zehua LIU, John HEDBERG, Chew-Hung CHANG, Tiong-Sa TEH, Dion Hoe-Lian GOH, and Yin-Leng THENG Conference Proceeding Article

PDF

Theoretical and practical complexity of unified modeling language: Delphi study and metrics analyses, J. ERICKSON and Keng SIAU Conference Proceeding Article

PDF

The value of mobile commerce to customers, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Conference Proceeding Article

Translation initiation sites prediction with mixture gaussian models, Guoliang Li, Tze-Yun LEONG, and Louxin Zhang Book Chapter

PDF

U-commerce: Emerging trends and research issues, H. GALANXHI-JANAQI and Fiona Fui-hoon NAH Journal Article

PDF

Values of mobile commerce to customers, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

Vertical sensitivity for the information security health rating of enterprises, Arcot Desai NARASIMHALU, Nagarajan DAYASINDHU, and Raghavan SUBRAMANIAN Conference Paper

Leading and managing people in the dynamic organisation, Siu Loon HOE Book Review

Organisational behaviour: The state of the science, Siu Loon HOE Book Review

PDF

Accommodating Instance Heterogeneities in Database Integration, Ee Peng LIM and Roger Hsiang-Li CHIANG Journal Article

PDF

Anonymous Secure Routing in Mobile Ad-Hoc Networks, Bo ZHU, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

A periodic-review inventory model with application to the continuous-review obsolescence problem, Yuyue SONG and Hoong Chuin LAU Journal Article

PDF

Corrective Maintenance Optimization in an Air Force, Hoong Chuin LAU, K. Y. Neo, and W. C. Wan Conference Proceeding Article

PDF

Finding Constrained Frequent Episodes Using Minimal Occurrences, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article

PDF

Job Scheduling with Unfixed Availability Constraints, Hoong Chuin LAU and C. ZHANG Conference Proceeding Article

PDF

Logistics Network Design with Differentiated Delivery Lead Time: A Chemical Industry Case Study, Michelle Lee Fong CHEONG, Rohit Bhatnagar, and Stephen C. Graves Working Paper

PDF

On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article

PDF

Spatial Queries in Wireless Broadcast Systems, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article

PDF

The D-tree: An index structure for planar point queries location-based wireless services, Jianliang XU, Baihua ZHENG, Wang-chien LEE, and Dik Lun LEE Journal Article

PDF

Two-Echelon Repairable Item Inventory System with Limited Repair Capacity under Nonstationary Demands, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article

A robust method for recovering geometric proxy from multiple panoramic images, Ada S. K. WAN, Angus M. K. SIU, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article

Link

Gray-Box Extraction of Execution Graphs for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

PDF

airConn: A framework for tiered services in public wireless LAN hot spots, A. ACHARYA, C. Bisdikian, Archan MISRA, and Y. Ko Magazine Article

Link

An Entrepreneur's Dilemma: To SWOT or not to SWOT, A. Desai CHAANAKYA and Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

A Novel Log-based Relevance Feedback Technique in Content-based Image Retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article

PDF

Are use case and class diagrams complementary in requirements analysis? An experimental study on use case and class diagrams in UML, Keng SIAU and Lihyunn LEE Journal Article

PDF

A survey of online e-banking retail initiatives, P. SOUTHARD and Keng SIAU Journal Article

PDF

Blocking reduction strategies in hierarchical text classification, Ee Peng LIM, Aixin SUN, Wee-Keong NG, and Jaideep SRIVASTAVA Journal Article

PDF

Clip-based similarity measure for hierarchical video retrieval, Yuxin PENG and Chong-wah NGO Conference Proceeding Article

PDF

Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem", Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Journal Article

Competitive Strategy, Economics and Information Systems., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article

PDF

Compliant Encryption of JPEG2000 Codestreams, Yongdong WU and Robert H. DENG Conference Proceeding Article

PDF

Deformable object model matching by topological and geometric similarity, Kwok-Leung TAN, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article

PDF

Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks, Arup ACHARYA, Archan MISRA, and Sorav BANSAL Conference Proceeding Article

PDF

Dynamic Access Control for Multi-Privileged Group Communications, Di MA, Robert H. DENG, Yongdong WU, and Tieyan LI Conference Proceeding Article

Exploring Stickiness of Information Technology Employee, Nan HU, Jenny Zhong, and ling LIU Conference Proceeding Article

PDF

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN, Tieyan LI, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article

PDF

Improving transliteration with precise alignment of phoneme chunks and using contextual features, Wei GAO, Kam-Fai WONG, and Wai LAM Conference Proceeding Article

PDF

Indexing and matching of polyphonic songs for query-by-singing system, Tat-Wan LEUNG and Chong-wah NGO Conference Proceeding Article

PDF

Informal animation sketching: Requirements and design, Richard C. DAVIS and James A. Landay Conference Proceeding Article

Informational and computational equivalence in comparing information modeling methods, Keng SIAU Journal Article

Information Exploitation and Interorganizational Systems Ownership., K. Han, Robert John KAUFFMAN, and B.R. Nault Journal Article

Link

Progressive Protection of JPEG2000 Codestreams, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article

PDF

Structuring home video by snippet detection and pattern parsing, Zailiang PAN and Chong-wah NGO Conference Proceeding Article

Study of predicting combined chaotic time series using neural networks, Zhaoxia WANG, Z.Q. Chen, Z.Z. Yuan, T.Z. Hao, and B.H. Yang Journal Article

Link

Tamper Detection and Localization for Categorical Data Using Fragile Watermarks, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Conference Proceeding Article

PDF

Trust Establishment in Large Scale Grid Settings, Bo ZHU, Tieyan LI, Huafei ZHU, Mohan S . KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

A Development Framework for Rapid Metaheuristics Hybridization, Hoong Chuin LAU, M. K. LIM, W. C. Wan, and S. Halim Conference Proceeding Article

PDF

A qualitative investigation on consumer trust in mobile commerce, Keng SIAU, Hong SHENG, Fiona Fui-hoon NAH, and Sidney A. DAVIS Journal Article

PDF

A spectroscopy of texts for effective clustering, Wenyuan LI, Wee-Keong NG, Kok-Leong ONG, and Ee Peng LIM Conference Proceeding Article

PDF

A Two-level Framework for Coalition Formation via Optimization and Agent Negotiation, Hoong Chuin LAU and Lei ZHANG Conference Proceeding Article

PDF

A Visual Language for Animating Sketches, Richard C. DAVIS and James A. Landay Conference Proceeding Article

Link

Classify Encrypted Data in Wireless Sensor Networks, Yongdong WU, Di MA, Tieyan LI, and Robert H. DENG Conference Proceeding Article

Link

Computing of Trust in Wireless Networks, Huafei ZHU, Feng BAO, and Robert H. DENG Conference Proceeding Article