Submissions from 2017
On self-selection biases in online product reviews, Nan HU, Paul A. PAVLOU, and Jie ZHANG Journal Article
On the selection of anchors and targets for video hyperlinking, Zhi-Qi CHENG, Hao ZHANG, Xiao WU, and Chong-wah NGO Conference Proceeding Article
On the similarities between random regret minimization and mother logit: The case of recursive route choice models, Tien MAI, Fabian BASTIN, and Emma FREJINGER Journal Article
Processing long queries against short text: Top-k advertisement matching in news stream applications, Dongxiang ZHANG, Yuchen LI, Ju FAN, Lianli GAO, Fumin SHEN, and Heng Tao SHEN Journal Article
RACK: Code Search in the IDE Using Crowdsourced Knowledge, Mohammad Masudur RAHMAN, Chanchal K. ROY, and David LO Conference Proceeding Article
Revisiting assert use in GitHub projects, Pavneet Singh KOCHHAR and David LO Conference Proceeding Article
Sampling based approaches for minimizing regret in uncertain Markov Decision Problems (MDPs), Asrar AHMED, Pradeep VARAKANTHAM, Meghna LOWALEKAR, Yossiri ADULYASAK, and Patrick JAILLET Journal Article
SAP: Improving continuous top-K queries over streaming data, Rui ZHU, Bin WANG, Xiaochun YANG, Baihua ZHENG, and Guoren WANG Journal Article
Scalable transfer learning in heterogeneous, dynamic environments, Trung Thanh Nguyen, Tomi Silander, Zhuoru LI, and Tze-Yun LEONG Journal Article
SCAN: Multi-hop calibration for mobile sensor arrays, Balz MAAG, Zimu ZHOU, Olga SAUKH, and Lothar THIELE Journal Article
Tackling large-scale home health care delivery problem with uncertainty, Cen CHEN, Zachary RUBINSTEIN, Stephen SMITH, and Hoong Chuin LAU Conference Proceeding Article
The dark side of banning hacking technique discussion, Qiu-Hong WANG and Ting Zhang LE Conference Paper
Towards unobtrusive mental well-being monitoring for independent-living elderly, Sinh HUYNH, Hwee-Pink TAN, and Youngki LEE Conference Proceeding Article
UbiEar: Bringing location-independent sound awareness to the hard-of-hearing people with smartphones, Sicong LIU, Zimu ZHOU, Junzhao DU, Longfei SHANGGUAN, Jun HAN, and Xin WANG Journal Article
Understanding Android app piggybacking: A systematic study of malicious code grafting, Li LI, Daoyuan LI, Tegawende F. BISSYANDE, Jacques KLEIN, Yves Le TRAON, David LO, and Lorenzo CAVALLARO Journal Article
Understanding music track popularity in a social network, Jing REN and Robert J. KAUFFMAN Conference Proceeding Article
Using contextual information to predict co-changes, Igor Scaliante WIESE, Reginaldo RÉ, Igor STEINMACHER, Rodrigo Takashi KURODA, Gustavo A. OLIVA, Christoph TREUDE, and Marco Aurélio GEROSA Journal Article
WebAPIRec: Recommending web APIs to software projects via personalized ranking, Ferdian THUNG, Richard J. OENTARYO, David LO, and Yuan TIAN Journal Article
Well-tuned algorithms for the team orienteering problem with time windows, Aldy GUNAWAN, Hoong Chuin LAU, Kun LU, and Lu KUN Journal Article
Inferring motion direction using commodity Wi-Fi for interactive exergames, Kun QIAN, Chenshu WU, Zimu ZHOU, Yue ZHENG, Yang ZHENG, and Yunhao LIU Conference Proceeding Article
Why players use pings and annotations in Dota 2, Jason WUERTZ, Scott BATEMAN, and Anthony TANG Conference Proceeding Article
BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming, Zhe CHEN, Xu ZHANG, Sulei WANG, Yuedong XU, Jie XIONG, and Xin WANG Conference Proceeding Article
BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming, Zhe CHEN, Xu ZHANG, Sulei WANG, Yuedong XU, Jie XIONG, and Xin WANG Conference Proceeding Article
TUM: Towards ubiquitous multi-device localization for cross-device interaction, Han XU, Zheng YANG, Zimu ZHOU, Ke YI, and Chunyi PENG Conference Proceeding Article
A data-driven approach for benchmarking energy efficiency of warehouse buildings, Wee Leong LEE, Kar Way TAN, and Zui Young LIM Conference Paper
A multi-agent system for coordinating vessel traffic, Teck-Hou TENG, Hoong Chuin LAU, and Akshat KUMAR Conference Proceeding Article
Android repository mining for detecting publicly accessible functions missing permission checks, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN Conference Proceeding Article
A neural network model for semi-supervised review aspect identification, Ying DING, Changlong YU, and Jing JIANG Conference Proceeding Article
A preliminary evaluation of a gamification framework to jump start collaboration behavior change, Flavio STEFFENS, Sabrina MARCZAK, Fernando FIGUEIRA FILHO, Christoph TREUDE, and Cleidson R. B. DA SOUZA Conference Proceeding Article
Assertion generation through active learning, Long H. PHAM, Jun SUN, and Jun SUN Conference Proceeding Article
Choosing an NLP library for analyzing software documentation: A systematic literature review and a series of experiments, Fouad N. A. AL OMRAN and Christoph TREUDE Conference Proceeding Article
Collaborative topic regression for online recommender systems: An online and Bayesian approach, Chenghao LIU, Tao JIN, Steven C. H. HOI, Peilin ZHAO, and Jianling SUN Journal Article
Continuous Top-k monitoring on document streams, Leong Hou U, Junjie ZHANG, Kyriakos MOURATIDIS, and Ye LI Journal Article
Coordinating vessel traffic to improve safety and efficiency, Teck Hou (DENG Dehao) TENG, Hoong Chuin LAU, and Akshat KUMAR Conference Proceeding Article
Core determining class and inequality selection, Ye LUO and Hai WANG Journal Article
Cryptography and data security in cloud computing, Zheng YAN, Robert H. DENG, and Vijay VARADHARAJAN Editorial
Data-driven approach to measuring the level of press freedom using media attention diversity from unfiltered news, Jisun AN and Haewoon KWAK Conference Proceeding Article
Determining the impact regions of competing options in preference space, Bo TANG, Kyriakos MOURATIDIS, and Man Lung. YIU Conference Proceeding Article
Discovering your selling points: Personalized social influential tags exploration, Yuchen LI, Kian-Lee TAN, Ju FAN, and Dongxiang ZHANG Conference Proceeding Article
Dynamic Nearest Neighbor Queries in Euclidean Space, Sarana NUTANONG, Mohammed Eunus ALI, Egemen TANIN, and Kyriakos MOURATIDIS Encyclopaedia
Encrypted data processing with Homomorphic Re-Encryption, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article
Exploiting anonymity and homogeneity in factored Dec-MDPs through pre-computed binomial distributions, Rajiv RANJAN KUMAR and Pradeep VARAKANTHAM Conference Proceeding Article
Exploiting contextual information for fine-grained tweet geolocation, Wen Haw CHONG and Ee Peng LIM Conference Proceeding Article
Feedback-based debugging, Yun LIN, Jun SUN, Yinxing XUE, Yang LIU, and Jin Song DONG Conference Proceeding Article
Follow-my-lead: Intuitive indoor path creation and navigation using see-through interactive videos, Quentin ROY, Simon T. PERRAULT, Shengdong ZHAO, Richard DAVIS, Anuroop PATTENA VANIYAR, Velko VECHEV, Youngki LEE, and Archan MISRA Conference Proceeding Article
Fusing social media and mobile analytics for urban sense-making, Archan MISRA Report
Household informedness and policy analytics for the collection and recycling of household hazardous waste in California, Kustini LIM-WAVDE, Robert J. KAUFFMAN, and Gregory S. DAWSON Journal Article
Impact of artificial intelligence, robotics, and machine learning on sales and marketing, Keng SIAU and Y. YANG Conference Proceeding Article
Joint optimization of resource provisioning in cloud computing, Jonathan David CHASE and Dusit NIYATO Journal Article
Lexicons in sentiment analytics, B. YUAN and Keng SIAU Conference Proceeding Article
Machine learning approaches to sentiment analytics, W. ZHAO and Keng SIAU Conference Proceeding Article
Online/offline provable data possession, Yujue WANG, Qianhong WU, Bo QIN, Shaohua TANG, and Willy SUSILO Journal Article
Parametric model checking timed automata under non-Zenoness assumption, Étienne ANDRE, Hoang Gia NGUYEN, Laure PETRUCCI, and Jun SUN Conference Proceeding Article
Persona generation from aggregated social media data, Soon-Gyo Jung, Jisun AN, Haewoon KWAK, Moeed Ahmad, Lene Nielsen, and Bernard J. Jansen Conference Proceeding Article
Provably secure attribute based signcryption with delegated computation and efficient key updating, Hanshu HONG, Yunhao XIA, Zhixin SUN, and Ximeng LIU Journal Article
Real-time prediction of length of stay using passive Wi-Fi sensing, Truc Viet LE, Baoyang SONG, and Laura WYNTER Conference Proceeding Article
Real-time prediction of length of stay using passive Wi-Fi sensing, Truc Viet LE, Baoyang SONG, and Laura WYNTER Conference Proceeding Article
RGBD salient object detection via deep fusion, Liangqiong QU, Shengfeng HE, Jiawei ZHANG, Jiandong TIAN, Yandong TANG, and Qingxiong YANG Journal Article
Robust Object Tracking via Locality Sensitive Histograms, Shengfeng HE, Rynson W.H LAU, Qingxiong YANG, Jiang WANG, and Ming-Hsuan YANG Journal Article
Search-driven string constraint solving for vulnerability detection, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Conference Proceeding Article
Stop nuclear smuggling through efficient container inspection, Xinrun WANG, Qingyu GUO, and Bo AN Conference Proceeding Article
Towards distributed machine learning in shared clusters: A dynamically-partitioned approach, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Shengen YAN Conference Proceeding Article
Watching 360° videos together, Anthony TANG and Omid FAKOURFAR Conference Proceeding Article
What gets media attention and how media attention evolves over time: Large-scale empirical evidence from 196 countries, Jisun AN and Haewoon KWAK Conference Proceeding Article
Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Shanping LI Conference Proceeding Article
Using deep learning to bridge the gap between perception and intelligence, Arne SUPPE and Martial HERBERT Conference Proceeding Article
Design and implementation of an RFID-based customer shopping behavior mining system, Zimu ZHOU, Longfei SHANGGUAN, Xiaolong ZHENG, Lei YANG, and Yunhao LIU Journal Article
A platform for free-weight exercise monitoring with passive tags, Han DING, Jinsong HAN, Longfei SHANGGUAN, Wei XI, Zhiping JIANG, Zheng YANG, Zimu ZHOU, Panlong YANG, and Jizhong ZHAO Journal Article
Achievement and friends: Key factors of player retention vary across player levels in online multiplayer games, Korea Advanced Institute of Science & Technology, Qatar Computing Research Institute, and Haewoon KWAK Conference Proceeding Article
A compare-aggregate model for matching text sequences, Shuohang WANG and Jing JIANG Conference Proceeding Article
A dynamic programming approach for quickly estimating large network-based MEV models, Tien MAI, Emma FREJINGER, Mogens FOSGEREAU, and Fabian BASTIN Journal Article
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks, Limin SHEN, Jianfeng MA, Ximeng LIU, Fushan WEI, and Meixia MIAO Journal Article
Aspect extraction from product reviews using category hierarchy information, Yifeng YANG, CHEN CEN, Minghui QIU, and Forrest Sheng BAO Conference Proceeding Article
Assessing the language of chat for teamwork dialogue, Antonette SHIBANI, Elizabeth KOH, Vivian LAI, and Kyong Jin SHIM Journal Article
Characterizing malicious Android apps by mining topic-specific data flow signatures, Xinli YANG, David LO, Li LI, Xin XIA, Tegawendé F. BISSYANDE, and Jacques KLEIN Journal Article
Clustering classes in packages for program comprehension, Xiaobing SUN, Xiangyue LIU, Bin LI, Bixin LI, David LO, and Lingzhi LIAO Journal Article
Collective entity linking in tweets over space and time, Wen Haw CHONG, Ee-peng LIM, and William COHEN Conference Proceeding Article
Comparative relation generative model, Maksim TKACHENKO and Hady W. LAUW Journal Article
Discovering anomalous events from urban informatics data, Kasthuri JAYARAJAH, Vigneshwaran SUBBARAJU, Dulanga KAVEESHA WEERAKOON MUDIYANSELAGE, Archan MISRA, La Thanh TAM, and Noel ATHAIDE Conference Proceeding Article
Empirical study of usage and performance of java collections, Diego COSTA, Artur ANDRZEJAK, Janos SEBOEK, and David LO Conference Proceeding Article
Factored similarity models with social trust for top-N item recommendation, Guibing GUO, Jie ZHANG, Feida ZHU, and Xingwei WANG
Finding causality and responsibility for probabilistic reverse skyline query non-answers [Extended Abstract], Yunjun GAO, Qing LIU, Gang CHEN, Linlin ZHOU, and Baihua ZHENG Conference Proceeding Article
Identity-based data outsourcing with comprehensive auditing in clouds, Yujue WANG, Qianhong WU, Bo QIN, Wenchang SHI, Robert H. DENG, and Jiankun HU Journal Article
Inferring smartphone keypress via smartwatch inertial sensing, Sougata SEN, Karan GROVER, Vigneshwaran SUBBARAJU, and Archan MISRA Conference Proceeding Article
Innovation and productivity in the maritime industry, Kar Way TAN
I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test, Qatar Computing Research Institute, The State University of New York University at Buffalo, Haewoon KWAK, and Korea University Conference Proceeding Article
Learning personalized preference of strong and weak ties for social recommendation, Xin WANG, Steven C. H. HOI, Martin ESTER, Jiajun BU, and Chun CHEN Conference Proceeding Article
Machine comprehension using match-LSTM and answer pointer, Shuohang WANG and Jing JIANG Conference Proceeding Article
Modeling topics and behavior of microbloggers: An integrated approach, Tuan Anh HOANG and Ee-Peng LIM Journal Article
Neural collaborative filtering, Xiangnan HE, Lizi LIAO, Hanwang ZHANG, Liqiang NIE, Xia HU, and Tat-Seng CHUA Conference Proceeding Article
Neural collaborative filtering, Xiangnan HE, Lizi LIAO, Hanwang ZHANG, Liqiang NIE, Xia HU, and Tat-Seng CHUA Conference Proceeding Article
Now you see it, now you don't! A study of content modification behavior in Facebook, Fuxiang CHEN and Ee-peng LIM Conference Proceeding Article
On analyzing user topic-specific platform preferences across multiple social media sites, Roy Ka Wei LEE, Tuan Anh HOANG, and Ee Peng LIM Conference Proceeding Article
Online growing neural gas for anomaly detection in changing surveillance scenes, Qianru SUN, Hong LIU, and Tatsuya HARADA Journal Article
On the effectiveness of virtualization based memory isolation on multicore platforms, Siqi ZHAO and Xuhua DING Conference Proceeding Article
Predicting the impact of software engineering topics: An empirical study, Santonu SARKAR, Rumana LAKDAWALA, and Subhajit DATTA Conference Proceeding Article
Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, and Dawu GU Journal Article
Should we learn probabilistic models for model checking? A new approach and an empirical study, Jingyi WANG, Jun SUN, Qixia YUAN, and Jun PANG Conference Proceeding Article
The crowd work accessibility problem, Saiganesh SWAMINATHAN, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article
Understanding the information-based transformation of strategy and society, Eric K. CLEMONS, Rajiv M. DEWAN, Robert J. KAUFFMAN, and Thomas A. WEBER Journal Article