Submissions from 2005
Theoretical versus practical complexity: The case of UML, Keng SIAU, John ERICKSON, and LihYunn LEE Journal Article
Towards Inferring Protein Interactions: Challenges and Solutions, Y. Zhang, H. Zha, Chao-Hsien Chu, X. Ji, and X. W Chen Journal Article
Towards Semantically Meaningful Feature Spaces for Efficient Indexing in Large Image Databases, Anne H. H. NGU, Jialie SHEN, and John Shepherd Book Chapter
Ubiquitous commerce: Beyond wireless commerce, H. GALANXHI-JANAQI and Fiona Fui-hoon NAH Book Chapter
Submissions from 2004
Recursive percentage based hybrid pattern (RPHP) training for curve fitting, Sheng Uei GUAN and Kiruthika RAMANATHAN Conference Proceeding Article
ASPs versus MOTS Software Solutions, Dan MA and Abraham Seidmann Conference Paper
Automatic model structuring from text using biomedical ontology, Joshi R., Li X., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article
Classifying biomedical citations without labeled training examples, Li X., Joshi R., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article
Correlating Summarization of Multi-source News with K-Way Graph Bi-clustering, Ya ZHANG, Chao-Hsien CHU, Xiang JI, and Hongyuan ZHA Journal Article
Cost-effectiveness analysis of colorectal cancer screening strategies in singapore: A dynamic decision analytic approach, Wong S., Leong A., and Tze-Yun LEONG Conference Proceeding Article
Design lessons on access features in PAPER, Yin-Leng THENG, Dion Hoe-Lian GOH, Ming YIN, Eng-Kai Suen, and Ee Peng LIM Conference Proceeding Article
Factors impacting e-government development, Keng SIAU and Y. LONG Conference Proceeding Article
High performance P300 speller for brain-computer interface, Cuntai GUAN, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article
Information Security Health Rating for Enterprises, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Conference Paper
IT Orientation, CIO reporting structure and Firm Performance: To Whom Should the CIO Report?, Rajiv BANKER, Nan HU, Jerry Luftman, and Paul Pavlou Conference Paper
JustiLM: Few-shot justification generation for explainable fact-checking of real-world claims, Fengzhu ZENG and Wei GAO Journal Article
Method for identifying individuals, Manoj THULASIDAS Patent
New efficient user identification and key distribution scheme providing enhanced security, Yanjiang YANG, Shuhong WANG, Feng BAO, Jie WANG, and Robert H. DENG Journal Article
On Security Notions for Steganalysis, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, Hyungjun KIM, and Jongin LIM Conference Proceeding Article
Operations Research Approach Towards Layered Multi-Source Video Delivery, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper
Supporting field study with personalized project spaces in a geographical digital library, Ee Peng LIM, Aixin SUN, Zehua LIU, John HEDBERG, Chew-Hung CHANG, Tiong-Sa TEH, Dion Hoe-Lian GOH, and Yin-Leng THENG Conference Proceeding Article
Theoretical and practical complexity of unified modeling language: Delphi study and metrics analyses, J. ERICKSON and Keng SIAU Conference Proceeding Article
The value of mobile commerce to customers, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Conference Proceeding Article
Translation initiation sites prediction with mixture gaussian models, Guoliang Li, Tze-Yun LEONG, and Louxin Zhang Book Chapter
U-commerce: Emerging trends and research issues, H. GALANXHI-JANAQI and Fiona Fui-hoon NAH Journal Article
Values of mobile commerce to customers, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Conference Proceeding Article
Vertical sensitivity for the information security health rating of enterprises, Arcot Desai NARASIMHALU, Nagarajan DAYASINDHU, and Raghavan SUBRAMANIAN Conference Paper
Leading and managing people in the dynamic organisation, Siu Loon HOE Book Review
Organisational behaviour: The state of the science, Siu Loon HOE Book Review
Accommodating Instance Heterogeneities in Database Integration, Ee Peng LIM and Roger Hsiang-Li CHIANG Journal Article
Anonymous Secure Routing in Mobile Ad-Hoc Networks, Bo ZHU, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article
A periodic-review inventory model with application to the continuous-review obsolescence problem, Yuyue SONG and Hoong Chuin LAU Journal Article
Corrective Maintenance Optimization in an Air Force, Hoong Chuin LAU, K. Y. Neo, and W. C. Wan Conference Proceeding Article
Finding Constrained Frequent Episodes Using Minimal Occurrences, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Job Scheduling with Unfixed Availability Constraints, Hoong Chuin LAU and C. ZHANG Conference Proceeding Article
Logistics Network Design with Differentiated Delivery Lead Time: A Chemical Industry Case Study, Michelle Lee Fong CHEONG, Rohit Bhatnagar, and Stephen C. Graves Working Paper
On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article
Spatial Queries in Wireless Broadcast Systems, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article
The D-tree: An index structure for planar point queries location-based wireless services, Jianliang XU, Baihua ZHENG, Wang-chien LEE, and Dik Lun LEE Journal Article
Two-Echelon Repairable Item Inventory System with Limited Repair Capacity under Nonstationary Demands, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article
A robust method for recovering geometric proxy from multiple panoramic images, Ada S. K. WAN, Angus M. K. SIU, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article
Gray-Box Extraction of Execution Graphs for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
airConn: A framework for tiered services in public wireless LAN hot spots, A. ACHARYA, C. Bisdikian, Archan MISRA, and Y. Ko Magazine Article
An Entrepreneur's Dilemma: To SWOT or not to SWOT, A. Desai CHAANAKYA and Arcot Desai NARASIMHALU Conference Proceeding Article
A Novel Log-based Relevance Feedback Technique in Content-based Image Retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article
Are use case and class diagrams complementary in requirements analysis? An experimental study on use case and class diagrams in UML, Keng SIAU and Lihyunn LEE Journal Article
A survey of online e-banking retail initiatives, P. SOUTHARD and Keng SIAU Journal Article
Blocking reduction strategies in hierarchical text classification, Ee Peng LIM, Aixin SUN, Wee-Keong NG, and Jaideep SRIVASTAVA Journal Article
Clip-based similarity measure for hierarchical video retrieval, Yuxin PENG and Chong-wah NGO Conference Proceeding Article
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem", Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Journal Article
Competitive Strategy, Economics and Information Systems., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article
Compliant Encryption of JPEG2000 Codestreams, Yongdong WU and Robert H. DENG Conference Proceeding Article
Deformable object model matching by topological and geometric similarity, Kwok-Leung TAN, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article
Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks, Arup ACHARYA, Archan MISRA, and Sorav BANSAL Conference Proceeding Article
Dynamic Access Control for Multi-Privileged Group Communications, Di MA, Robert H. DENG, Yongdong WU, and Tieyan LI Conference Proceeding Article
Exploring Stickiness of Information Technology Employee, Nan HU, Jenny Zhong, and ling LIU Conference Proceeding Article
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN, Tieyan LI, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article
Improving transliteration with precise alignment of phoneme chunks and using contextual features, Wei GAO, Kam-Fai WONG, and Wai LAM Conference Proceeding Article
Indexing and matching of polyphonic songs for query-by-singing system, Tat-Wan LEUNG and Chong-wah NGO Conference Proceeding Article
Informal animation sketching: Requirements and design, Richard C. DAVIS and James A. Landay Conference Proceeding Article
Informational and computational equivalence in comparing information modeling methods, Keng SIAU Journal Article
Information Exploitation and Interorganizational Systems Ownership., K. Han, Robert John KAUFFMAN, and B.R. Nault Journal Article
Progressive Protection of JPEG2000 Codestreams, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article
Structuring home video by snippet detection and pattern parsing, Zailiang PAN and Chong-wah NGO Conference Proceeding Article
Study of predicting combined chaotic time series using neural networks, Zhaoxia WANG, Z.Q. Chen, Z.Z. Yuan, T.Z. Hao, and B.H. Yang Journal Article
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Conference Proceeding Article
Trust Establishment in Large Scale Grid Settings, Bo ZHU, Tieyan LI, Huafei ZHU, Mohan S . KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article
A Development Framework for Rapid Metaheuristics Hybridization, Hoong Chuin LAU, M. K. LIM, W. C. Wan, and S. Halim Conference Proceeding Article
A qualitative investigation on consumer trust in mobile commerce, Keng SIAU, Hong SHENG, Fiona Fui-hoon NAH, and Sidney A. DAVIS Journal Article
A spectroscopy of texts for effective clustering, Wenyuan LI, Wee-Keong NG, Kok-Leong ONG, and Ee Peng LIM Conference Proceeding Article
A Two-level Framework for Coalition Formation via Optimization and Agent Negotiation, Hoong Chuin LAU and Lei ZHANG Conference Proceeding Article
A Visual Language for Animating Sketches, Richard C. DAVIS and James A. Landay Conference Proceeding Article
Classify Encrypted Data in Wireless Sensor Networks, Yongdong WU, Di MA, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Computing of Trust in Wireless Networks, Huafei ZHU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Effect of ocular artifact removal in brain computer interface accuracy, Manoj THULASIDAS, Sitaram RANGANATHA, Jiankang WU, and Wenjie XU Conference Proceeding Article
Electronic government strategies and implementation, Wayne HUANG, Keng SIAU, and Kwok Kee WEI Edited Book
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes, Guilin WANG, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Optimizing proportionally fair prices, Laura WYNTER Journal Article
Proxy Signature Scheme with Multiple Original Signers for Wireless E-Commerce Applications, Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Robust classification of event-related potential for brain-computer interface, Manoj THULASIDAS Conference Paper
SCLOPE: An algorithm for clustering data streams of categorical attributes, Kok-Leong ONG, Wenyuan LI, Wee-Keong NG, and Ee Peng LIM Conference Proceeding Article
Securing Return Routability Protocol against Active Attacks, Huafei ZHU, Feng Bao, and Robert H. DENG Conference Proceeding Article
Security Analysis of Two Signcryption Schemes, Guilin WANG, Robert H. DENG, DongJin KWAK, and Sangjae MOON Conference Proceeding Article
Shared-Storage Auction Ensures Data Availability, Hady W. LAUW, Siu-Cheung HUI, and Edmund M. K. LAI Journal Article
Towards personalised web intelligence, Ah-hwee TAN, Hwee-Leng ONG, Hong PAN, Jamie NG, and Qiu-Xiang LI Journal Article
The Pricing and Profitability of Modular Clusters, Carliss Y. BALDWIN, Kim B. Clark, and C. Jason WOODARD Presentation
Deformable geometry model matching by topological and geometric signatures, Kwok-Leung TAM, Rynson W.H. LAW, and Chong-wah NGO Conference Proceeding Article
Exploiting information theory for adaptive mobility and resource management in future cellular networks, Abhishek ROY, Sajal K. DAS, and Archan MISRA Magazine Article
Gesture tracking and recognition for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Graph based image matching, Hui JIANG and Chong-wah NGO Conference Proceeding Article
Group-based Relevance Feedback with Support Vector Machine Ensembles, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article
High accuracy classification of EEG signal, Wenjie XU, Cuitai GUAN, Chng Eng SIONG, S. RANGANATHA, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article
ICA-FX features for classification of singing voice and instrumental sound, Tat-Wan LEUNG, Chong-wah NGO, and Rynson W. H LAU Conference Proceeding Article
Information Modeling Methods and Methodologies: Advanced topics in database research, J. KROGSTIE, T. HALPIN, and Keng SIAU Edited Book
Investigating deception in cyberspace, Holtjona Galanxhi and Fiona Fui-hoon NAH Conference Proceeding Article
Job Satisfaction of Information Technology Professionals, Nan HU, Simon Poon, and Wan Yun Conference Proceeding Article
LTAM: A Location-Temporal Authorization Model, Hai YU and Ee Peng LIM Conference Proceeding Article
Novel seed selection for multiple objects detection and tracking, Zailiang PAN and Chong-wah NGO Conference Proceeding Article
On Gray-Box Program Tracking for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
Packet-loss resilient coding scheme with only XOR operations, Gui Liang FENG, Robert H. DENG, and Feng BAO Conference Proceeding Article