Submissions from 2005
New efficient MDS array codes for RAID part II: Rabin-like codes for tolerating multiple (>=4) disk failures, Gui-Liang FENG, Robert H. DENG, and Feng Bao Journal Article
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei ZHU, Feng Bao, and Robert H. DENG Conference Proceeding Article
Tailored watermarking schemes for authentication of electronic clinical atlases, Feng BAO, Robert H. DENG, Beng-Chin OOI, and Yanjiang YANG Journal Article
WebArc: Website Archival using a structured approach, Ee Peng LIM and Maria MARISSA Conference Proceeding Article
The Learning Curve of Knowledge Workers in a Computing Call Center, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Presentation
Integrating the FURPS+ model with use cases - A metrics driven approach, Subhajit DATTA Conference Proceeding Article
Organisational knowledge systems: An action-oriented perspective on organisation and information systems, Siu Loon HOE Book Review
Accurately Extracting Coherent Relevant Passages Using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Anonymous DoS-Resistant Access Control Protocol using Passwords for Wireless Networks, Zhiguo WAN, Robert H. DENG, Feng BAO, and Akkihebbal L. ANANDA Conference Proceeding Article
ASPs versus MOTS software solutions, Dan MA and Abrahamm Seidmann Conference Proceeding Article
A Threshold-Based Algorithm for Continuous Monitoring of K Nearest Neighbors, Kyriakos MOURATIDIS, Dimitris Papadias, Spiridon Bakiras, and Yufei TAO Journal Article
Balancing Performance and Confidentiality in Air Index, Qingzhao TAN, Wang-chien LEE, Baihua ZHENG, Peng LIU, and Dik Lun LEE Conference Proceeding Article
Defending against Packet Injection Attacks in Unreliable Ad Hoc Networks, Qijun GU, Peng LIU, Sencun ZHU, and Chao-Hsien CHU Conference Proceeding Article
Does Online Review Reveal a Product's True Quality, Nan HU and Jennifer ZHANG Conference Proceeding Article
Exploiting self-adaptive posture-based focus estimation for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Mining ontological knowledge from domain-specific text documents, Xing JIANG and Ah-hwee TAN Conference Proceeding Article
Motion-based approach for BBC rushes structuring and characterization, Chong-wah NGO and Zailiang PAN Conference Paper
On Security Notions of Steganographic Systems, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, and Hyungjun KIM Conference Proceeding Article
Query Processing in Spatial Databases Containing Obstacles, Jun ZHANG, Dimitris Papadias, Kyriakos Mouratidis, and Manli ZHU Journal Article
Scalable trusted online dissemination of JPEG2000 images, Robert H. DENG, Di MA, Weizhong Shao, and Yongdong Wu Journal Article
Selective object stabilization for home video consumers, Zailiang PAN and Chong-wah NGO Journal Article
Slander Resistant Attacker Isolation in Ad Hoc Networks, Q. GU, Chao-Hsien CHU, Peng LIU, and S. ZHU Conference Proceeding Article
PGMC: a framework for probabilistic graphic model combination, Chang-an Jiang, Tze-Yun LEONG, and Kim-Leng Poh Conference Proceeding Article
Agile modeling, agile software development, and extreme programming: The state of research, John ERICKSON, Kalle LYYTINEN, and Keng SIAU Journal Article
AND/OR Graph and Search Algorithm for Discovering Composite Web Services, Qianhui (Althea) LIANG and Stanley Y. W. SU Journal Article
Automatic 3D Face Modeling Using 2D Active Appearance Models, Jianke ZHU, Steven HOI, and Michael R. LYU Conference Proceeding Article
Common pattern discovery using earth mover's distance and local flow maximization, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article
DSIM: A Distance-Based Indexing Method for Genomic Sequences, Xia CAO, Beng-Chin OOI, Hwee Hwa PANG, Kian-Lee TAN, and Anthony K. H. TUNG Conference Proceeding Article
Informal Animation Sketching with K-Sketch, Richard C. DAVIS Conference Paper
Information Systems in Competitive Strategies: Offshoring, Risk Management, Strategic Pricing, E-Sourcing, and Standards., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article
Managerial assessments of E-business investment opportunities: A field study, Anandhi S. BHARADWAJ and Amrit Tiwana Journal Article
NIL is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, WONG, Wei GAO, and Wei GAO Conference Proceeding Article
NIL Is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, Kam-Fai WONG, and Wei GAO Conference Proceeding Article
Towards Semantic Service Request of Web Service Composition, Qianhui Althea LIANG, Jen-Yao CHUNG, and Steven M. MILLER Conference Proceeding Article
A Generic Protocol for Controlling Access to Mobile Services, Shuhong WANG, Yingjiu LI, Bo ZHU, and Nan Hu Conference Proceeding Article
An Efficient Certified E-Mail Scheme Suitable for Wireless Mobile Environments, Guilin WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article
Applied public key infrastructure: 4th International Workshop on Applied Public Key Infrastructure, Jianying ZHOU, Meng-Chow Kang, Feng Bao, and Hwee Hwa PANG Edited Conference Proceeding
Behavioral Distance for Intrusion Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
CUHK at imageCLEF 2005: cross-language and cross-media image retrieval, Steven C. H. HOI, J. ZHU, and M. LYU Conference Proceeding Article
Forms of Expression for Designing Visual Languages for Animation, Richard C. DAVIS and James A. Landay Conference Proceeding Article
Low Latency Multimedia Broadcast in Multi-rate Wireless Meshes, Chun-Tong CHOU and Archan MISRA Conference Paper
Managing geography learning objects using personalized project spaces in G-Portal, Dion Hoe-Lian GOH, Aixin SUN, Wenbo ZONG, Dan WU, Ee Peng LIM, Yin-Leng THENG, John HEDBERG, and Chew-Hung CHANG Conference Proceeding Article
New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-like Codes for Tolerating Three Disk Failures, Gui-Liang FENG, Robert H. DENG, Feng Bao, and Jia-Chen SHEN Journal Article
On organizing and accessing geospatial and georeferenced web resources using the g-portal system, Zehua LIU, Ee Peng LIM, Yin-Leng THENG, Dion Hoe-Lian GOH, and Wee-Keong NG Journal Article
Optimization of BCI speller based on P300 potential, Manoj THULASIDAS and Cuntai GUAN Conference Proceeding Article
Partial Adjustable Autonomy in Multi-Agent Environment and Its Application to Military Logistics, Hoong Chuin LAU, Lucas AGUSSURJA, and Ramesh THANGARAJOO Conference Proceeding Article
Protocol for Hiding Movement of Mobile Nodes in Mobile IPv6, Ying QIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Security Analysis and Improvement of Return Routability Protocol, Ying QIU, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework, Hoong Chuin LAU, Lei ZHANG, and Chang LIU Conference Proceeding Article
Strategic implications of mobile technology: A case study using value-focused thinking, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Journal Article
A unified learning paradigm for large-scale personalized information management, Edward Y. CHANG, Steven C. H. HOI, Xinjing WANG, Wei-Ying MA, and Michael R. LYU Conference Proceeding Article
An investigation into the continued use of Unified Modeling Language (UML) in information systems development, Keng SIAU and X. TAN Conference Proceeding Article
A semiotics view of modeling method complexity – The case of UML, Keng SIAU and Y. TIAN Conference Proceeding Article
Constrained Shortest Path Computation, Manolis TERROVITIS, Spiridon BAKIRAS, Dimitris PAPADIAS, and Kyriakos MOURATIDIS Conference Proceeding Article
Dispatching Vehicles in a Mega Container Terminal, Ebru K. BISH, Frank Y. CHEN, Thin Yin LEONG, Barry L. Nelson, Jonathan W. C. NG, and David SIMCHI-LEVI Journal Article
End-users’ acceptance of enterprise resource planning systems: An investigation using grounded theory approach, Fiona Fui-hoon NAH, Xin TAN, and Monica BEETHE Conference Proceeding Article
Evaluation criteria for information systems development methodologies, Keng SIAU and Xin TAN Conference Proceeding Article
Evaluation of Time-Varying Availability in Multi-Echelon Inventory System with Combat Damage, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article
GeogDL: A web-based approach to geography examination, Ee Peng LIM, Dion Hoe-Lian GOH, and Yin-Leng THENG Journal Article
Impact on open source software performance: A view from social structure, Y. LONG and Keng SIAU Conference Proceeding Article
Information search patterns in e-commerce product comparison services, Fiona Fui-hoon NAH, Hong-Hee LEE, and Liqiang CHEN Conference Proceeding Article
Introduction: Human-computer interaction studies in management information systems, Fiona Fui-hoon NAH, P. ZHANG, and S. McCOY Journal Article
Medoid Queries in Large Spatial Databases, Kyriakos MOURATIDIS, Dimitris Papadias, and Spiros Papadimitriou Conference Proceeding Article
Personalization of web services: A study on the fit between web tasks and personalization mechanisms, Fiona Fui-hoon NAH, Keng SIAU, and Min LING Conference Proceeding Article
Privacy issues in the era of ubiquitous commerce, Holtjona GALANXHI and Fiona Fui-hoon NAH Conference Proceeding Article
Privacy issues in the era of ubiquitous commerce, Holtjona GALANXHI and Fiona Fui-hoon NAH Conference Proceeding Article
Semantic Web for EC: How to Overcome the Hurdles and Create the Future?, Jae Kyu LEE Conference Paper
Service Mining for Web Service Composition, Qianhui (Althea) LIANG, Steven Miller, and J. Chung Conference Proceeding Article
Toward practical measures of complexity in real-time modeling methods, J. ERICKSON and Keng SIAU Conference Proceeding Article
Towards a theoretical framework of information systems development success, Y. LONG, Keng SIAU, and M. LING Conference Proceeding Article
Translation initiation sites prediction with mixture Gaussian models in human cDNA sequences, G. Li, Tze-Yun LEONG, and Louxin Zhang Journal Article
Tuning Tabu Search strategies via visual diagnosis, Steven HALIM, Wee Chong WAN, and Hoong Chuin LAU Conference Proceeding Article
Using wireless technology to facilitate learning: A grounded theory approach, Hong SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Values of silent commerce: A study using value-focused thinking approach, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Web browsing and spyware intrusion, S. SHUKLA and Fiona Fui-hoon NAH Magazine Article
Web Mining - The Ontology Approach, Ee Peng LIM and Aixin SUN Conference Paper
WmXML: A System for Watermarking XML Data, Xuan ZHOU, Hwee Hwa PANG, Kian-Lee TAN, and Dhruv MANGLA Conference Proceeding Article
Implications of mobile education, Keng SIAU, F. NAH, and H. SHENG Conference Proceeding Article
An informatization of society approach to e-government: Analyzing Singapore’s e-government efforts, Calvin M. L. CHAN and Yi Meng LAU Conference Proceeding Article
Approximate strategic reasoning through hierarchical reduction of large symmetric games, Michael P. WELLMAN, Daniel M. REEVES, Kevin M. LOCHNER, Shih-Fen CHENG, and Rahul SURI Conference Proceeding Article
Bridging Units and Business Incubation in a Technology Research Lab, Arcot Desai NARASIMHALU Conference Paper
Co-clustering of time-evolving news story with transcript and keyframe, Xiao WU, Chong-wah NGO, and Qing LI Conference Proceeding Article
Deposit-case attack against secure roaming, Guomin YANG, Duncan S. WONG, and Xiaotie DENG Conference Proceeding Article
Descriptive Naming of Context Data Providers, Norman H. COHEN, Paul CASTRO, and Archan MISRA Conference Proceeding Article
Efficient and Robust Key Management for Large Mobile Ad-Hoc Networks, Bo ZHU, Feng BAO, Robert H. DENG, Mohan S. KANKANHALLI, and Guilin WANG Journal Article
EMD-based video clip retrieval by many-to-many matching, Yuxin PENG and Chong-wah NGO Conference Proceeding Article
Exploiting Belief Bounds: Practical POMDPs for Personal Assistant Agents, Pradeep VARAKANTHAM, Rajiv Maheswaran, and Milind Tambe Conference Proceeding Article
Hot event detection and summarization by graph modeling and matching, Yuxin PENG and Chong-Wah NGO Conference Proceeding Article
How Much You Watch, How Much You Pay, Yongdong WU, Hwee Hwa PANG, and Robert H. DENG Conference Proceeding Article
Middleware Architecture for Evaluation and Selection of 3rd Party Web Services for Service Providers, Dipanjan CHAKRABORTY, Suraj K. JAISWAL, Archan MISRA, and Amit A. NANAVATI Conference Proceeding Article
Multibiometrics based on palmprint and handgeometry, Xiao-Yong WEI, Dan XU, and Chong-wah NGO Conference Proceeding Article
Protocols that hide user's preferences in electronic transactions, Feng BAO and Robert H. DENG Journal Article
Social Network Discovery by Mining Spatio-Temporal Events, Hady LAUW, Ee Peng LIM, Hwee Hwa PANG, and Teck-Tim TAN Journal Article
Strategic Assessment of Information Security Maturity, Arcot Desai NARASIMHALU, Dayasindhu NAGARAJAN, and Raghavan SUBRAMANIAN Report
Synthesis of distributed processes from scenario-based specifications, Jun SUN and Jin Song DONG Conference Proceeding Article
Valuations of Possible States (VPS): A Unifying Quantitative Framework for Evaluating Privacy in Collaboration, Rajiv T. MAHESWARAN, Jonathan Pearce, Pradeep VARAKANTHAM, Emma Bowring, and Milind Tambe Conference Proceeding Article
Advanced topics in database research, Volume 4, Keng SIAU Edited Book
Aggregate Nearest Neighbor Queries in Spatial Databases, Dimitris PAPADIAS, Yufei TAO, Kyriakos MOURATIDIS, and Chun Kit HUI Journal Article