Submissions from 2016
Leveraging Competency Framework to Improve Teaching and Learning: A Methodological Approach, Venky SHANKARARAMAN and Joelle ELMALEH Journal Article
Metaflow: a scalable metadata lookup service for distributed file systems in data centers, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Haiyong XIE Journal Article
Microblogging content propagation modeling using topic-specific behavioral factors, Tuan Anh HOANG and Ee-peng LIM Journal Article
Mining revision histories to detect cross-language clones without intermediates, Lingxiao JIANG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article
Modeling sequential preferences with dynamic user and context factors, Duc Trong LE, Yuan FANG, and Hady W. LAUW Conference Proceeding Article
On the feasibility of detecting cross-platform code clones via identifier similarity, Xiao CHENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article
PADA: Power-aware development assistant for mobile sensing applications, Chulhong MIN, Seungchul LEE, Changhun LEE, Youngki LEE, Seungwoo KANG, Seungpyo CHOI, Wonjung KIM, and Junehwa SONG Conference Proceeding Article
Predicting crashing releases of mobile applications, Xin XIA, Emad SHIHAB, Yasutaka KAMEI, David LO, and Xinyu WANG Conference Proceeding Article
Probabilistic models for contextual agreement in preferences, Loc DO and Hady W. LAUW Journal Article
Provably secure robust optimistic fair exchange of distributed signatures, Yujue WANG, Qianhong WU, Duncan S. WONG, Bo QIN, Jian MAO, and Yong DING Journal Article
Ra2: Predicting simulation execution time for cloud-based design space explorations, Nguyen Binh Duong TA, Wentong CAI, Zengxiang LI, and Suiping ZHOU Conference Proceeding Article
Representation learning for homophilic preferences, Trong T. NGUYEN and Hady W. LAUW Conference Proceeding Article
Server-aided revocable attribute-based encryption, Hui CUI; DENG, Robert H.; Yingjiu LI; and Baodong QIN Conference Proceeding Article
Soft confidence-weighted learning, Jialei WANG; Peilin ZHAO; and HOI, Steven C. H. Journal Article
TASKer: Behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, Nikita JAIMAN, Randy Tandriansyah DARATAN, Archan MISRA, Shih-Fen CHENG, Cen CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article
TASKer: behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, JAIMAN, TANDRIANSYAH, Archan MISRA, Shih-Fen CHENG, CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article
Towards autonomous behavior learning of non-player characters in games, Shu FENG and Ah-hwee TAN Journal Article
Trustworthy authentication on scalable surveillance video with background model support, Zhuo WEI, Zheng YAN, Yongdong WU, and Robert H. DENG Journal Article
What security questions do developers ask? A large-scale study of stack overflow posts, Xinli YANG, David LO, Xin XIA, Zhi-Yuan WAN, and Jian-Ling SUN Journal Article
When a friend online is more than a friend in life: Intimate relationship prediction in microblogs, Yunshi LAN, Mengqi ZHANG, Feida ZHU, Jing JIANG, and Ee-Peng LIM Conference Proceeding Article
Collaborative opportunities: IMIA working groups and personalized medicine & digital health literacy, Tze-Yun LEONG Conference Paper
Towards automatic persona generation using social media, Jisun AN, Hoyoun CHO, Haewoon KWAK, Mohammed Ziyaad HASSEN, and Bernard J JANSEN Conference Proceeding Article
Topic extraction from microblog posts using conversation structures, Jing LI, Ming LIAO, Wei GAO, Yulan HE, and Kam-Fai WONG Conference Proceeding Article
A fast algorithm for personalized travel planning recommendation, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article
A multilingual semi-supervised approach in deriving Singlish sentic patterns for polarity detection, Siaw Ling LO, Erik CAMBRIA, Raymond CHIONG, and David CORNFORTH Journal Article
A novel digital image classification algorithm via low-rank sparse bag-of-features model, Xiu-Ming ZOU, Huai-Jiang SUN, Sai YANG, and Yan ZHU
API recommendation system for software development, FERDIAN THUNG Conference Proceeding Article
Code comment quality analysis and improvement recommendation: An automated approach, Xiaobing SUN, Qiang GENG, David LO, Yucong DUAN, Xiangyue LIU, and LI Bin Journal Article
CoMon+: A Cooperative Context Monitoring System for Multi-Device Personal Sensing Environments, Youngki LEE, Seungwoo KANG, Chulhong MIN, Younghyun JU, Inseok HWANG, and Junehwa SONG Journal Article
Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice, Weizhi MENG, Xiapu LUO, Wenjuan LI, and Yan LI Conference Proceeding Article
Detecting communities using coordination games: A short paper, Radhika ARAVA and Pradeep VARAKANTHAM Conference Proceeding Article
Enhancing local search with adaptive operator ordering and its application to the time dependent orienteering problem, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article
Extending the network: The influence of offline friendship on Twitter network, Young Soo KIM, Kyungsub Stephen CHOI, and FELICIA NATALI Conference Proceeding Article
Fine-grained appliance usage and energy monitoring through mobile and power-line sensing, Nirmalya ROY, Nilavra PATHAK, and Archan MISRA Journal Article
Intermediaries vs Peer-to-Peer: A Study of Lenders’ Incentive on a Donation-based Crowdfunding Platform, Ling GE, Zhiling GUO, and Xuechen LUO Conference Proceeding Article
New developments in metaheuristics and their applications: Selected extended contributions from the 10th Metaheuristics International Conference (MIC 2013), Hoong Chuin LAU, Günther R. Raidl, and Pascal Van Hentenryck Editorial
Probabilistic Robust Route Recovery with Spatio-Temporal Dynamics, Hao WU, Jiangyun MAO, Weiwei SUN, Baihua ZHENG, Hanyuan ZHANG, Ziyang CHEN, and Wei WANG Conference Proceeding Article
Revocable and decentralized attribute-based encryption, Hui CUI and DENG, Robert H. Journal Article
SafeGPU: Contract- and library-based GPGPU for object-oriented languages, Alexey KOLESNICHENKO, Christopher M. POSKITT, and Sebastian NANZ Journal Article
Social sentiment and stock trading via mobile phones, Kwansoo KIM, Sang Yong LEE, and Robert John KAUFFMAN Conference Proceeding Article
TafLoc: Time-adaptive and fine-grained device-free localization with little cost, Liqiong CHANG, Jie XIONG, Xiaojiang CHEN, Ju WANG, Junhao HU, and Wei WANG Conference Proceeding Article
TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee-Peng LIM, and Ke WANG Journal Article
Understanding patient portal use intentions: Enablers and inhibitors of IT use, M. MOQBEL, Fiona Fui-hoon NAH, V. BARTELT, and R. O’DELL Conference Proceeding Article
Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval, Liang XIE, Lei ZHU, and Guoqi CHEN Journal Article
User Identity Linkage by Latent User Space Modelling, Xin MU, Feida ZHU, Ee-Peng LIM, Jing XIAO, Jianzong WANG, and Zhi-Hua ZHOU Conference Proceeding Article
Landscape synergy in evolutionary multitasking, Abhishek GUPTA, Yew Soon ONG, B. DA, Handoko Stephanus Daniel, and Stephanus D. HANDOKO Conference Proceeding Article
The retransmission of rumor-related tweets: Characteristics of source and message, Alton Y. K. CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article
The retransmission of rumor-related tweets: Characteristics of source and message, CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article
Targeted gamification to encourage and measure intrinsically motivated game-based learning, Chris BOESCH Conference Proceeding Article
A Feasible No-Root Approach on Android, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
A Learning-to-Rank Based Fault Localization Approach using Likely Invariants, Tien-Duy B. LE, David LO, Claire LE GOUES, and Lars GRUNSKE Conference Proceeding Article
An adaptability-driven model and tool for analysis of service profitability, Eng Lieh OUH and Jarzabek STAN Conference Proceeding Article
A survey on future internet security architectures, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article
Automatic hookworm detection in wireless capsule endoscopy images, Xiao WU, Honghan CHEN, Tao GAN, Junzhou CHEN, Chong-wah NGO, and Qiang PENG Journal Article
Build emotion lexicon from the mood of crowd via topic-assisted joint non-negative matrix factorization, Kaisong SONG, Wei GAO, Ling CHEN, Shi FENG, Daling WANG, and Chengqi ZHANG Conference Proceeding Article
Can Instagram posts help characterize urban micro-events?, Kasthuri JAYARAJAH and Archan MISRA Conference Proceeding Article
Cross-Modal Self-Taught Hashing for large-scale image retrieval, Liang XIE, Lei ZHU, Peng PAN, and Yansheng LU Journal Article
Detecting rumors from microblogs with recurrent neural networks, Jing MA, Wei GAO, Prasenjit MITRA, Sejeong KWON, Bernard J. JANSEN, Kam-Fai WONG, and Meeyoung CHA Conference Proceeding Article
Edit distance based encryption and its application, Tran Viet Xuan PHUONG, Guomin YANG, Willy SUSILO, and Kaitai LIANG Conference Proceeding Article
Fine-grained detection of programming students’ frustration using keystrokes, mouse clicks and interaction logs, Hua Leong FWA Journal Article
From offline to online: How health insurance policies drive the demand for online healthcare service?, Yue YU, Qiu-Yan MEI, and QIU-HONG WANG Conference Proceeding Article
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security, Kai HE; Jian WENG; Man Ho AU; Yijun MAO; and DENG, Robert H. Conference Proceeding Article
Learning compact visual representation with canonical views for robust mobile landmark search, Lei ZHU, Jialie SHEN, Xiaobai LIU, Liang XIE, and Liqiang NIE Conference Proceeding Article
Linear encryption with keyword search, Shiwei ZHANG, Guomin YANG, and Yi MU Conference Proceeding Article
On effective personalized music retrieval by exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article
On effective personalized music retrieval via exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article
One-round strong oblivious signature-based envelope, Rongmao CHEN, Yi MU, Willy SUSILO, Guomin YANG, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article
On very large scale test collection for landmark image search benchmarking, Zhiyong CHENG and Jialie SHEN Journal Article
Ordinal text quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article
Outlier detection in complex categorical data by modeling the feature value couplings, Guansong PANG, Longbing CAO, and Ling CHEN Conference Proceeding Article
Outlier-robust tensor PCA, Pan ZHOU and Jiashi FENG Conference Proceeding Article
Passively testing routing protocols in wireless sensor networks, Xiaoping CHE, Stephane MAAG, Hwee-Xian TAN, and Hwee-Pink TAN Conference Proceeding Article
Patient engagement in the medical facility waiting room using gamified healthcare information delivery, Raheel HASSAN, Nathan W. TWYMAN, Fiona F. NAH, and Keng SIAU Conference Proceeding Article
Practitioners' expectations on automated fault localization, Pavneet Singh KOCHHAR, Xin XIA, David LO, and Shanping LI Conference Proceeding Article
Proxy signature with revocation, Shengmin XU, Guomin YANG, Yi MU, and Shu MA Conference Proceeding Article
Real-time salient object detection with a minimum spanning tree, Wei-Chih TU, Shengfeng HE, Qingxiong YANG, and Shao-Yi CHIEN Conference Proceeding Article
Response to SBP-BRiMS Data Challenge: Agent-based approach to human migration movement, LIN JUNJIE, LARRY and Kathleen M. CARLEY Conference Paper
Robust median reversion strategy for online portfolio selection, Dingjiang HUANG; Junlong ZHOU; Bin LI; HOI, Steven C. H.; and Shuigeng ZHOU Journal Article
Robust Repositioning to Counter Unpredictable Demand in Bike Sharing Systems, Supriyo GHOSH, Michael TRICK, and Pradeep VARAKANTHAM Conference Proceeding Article
Satisfiability modulo heap-based programs, Quang Loc LE, Jun SUN, and Wei-Ngan CHIN Conference Proceeding Article
Scalable greedy algorithms for task/resource constrained multi-agent stochastic planning, Pritee AGRAWAL, Pradeep VARAKANTHAM, and William YEOH Conference Proceeding Article
Self-regulated incremental clustering with focused preferences, Di WANG and Ah-hwee TAN Conference Proceeding Article
Sequential decision making for improving efficiency in urban environments, Pradeep VARAKANTHAM Conference Proceeding Article
STPP: Spatial-Temporal Phase Profiling based method for relative RFID tag localization, Longfei SHANGGUAN, Zheng YANG, Alex X. LIU, Zimu ZHOU, and Yunhao LIU Journal Article
The Effects of Multiple Query Evidences on Social Image Retrieval, Zhiyong CHENG, Jialie SHEN, and Haiyan MIAO Journal Article
The impact of NASD Rule 2711 and NYSE Rule 472 on analyst behavior: The strategic timing of recommendations issued on weekends, Yi DONG and Nan HU Journal Article
Three strategies to success: Learning adversary models in security games, Nika HAGHTALAB, Fei FANG, Thanh Hong NGUYEN, Arunesh SINHA, Ariel D. PROCACCIA, and Milind TAMBE Conference Proceeding Article
Understanding gender differences in media perceptions of hedonic systems: A comparison of 2D versus 3D media, Fiona Fui-hoon NAH and Brenda ESCHENBRENNER Journal Article
Where is the goldmine? Finding promising business locations through Facebook data analytics, Jovian LIN, Richard OENTARYO, Ee-peng LIM, Casey VU, Adrian VU, and Agus Kwee Conference Proceeding Article
Which information sources are more effective and reliable in video search, CHENG ZHIYONG, Xuanchong LI, Jialie SHEN, and Alexander G. Hauptmann Conference Proceeding Article
Word clouds with latent variable analysis for visual comparison of documents, Tuan M. V. LE and Hady W. LAUW Conference Proceeding Article
It takes two to tango: Deleted Stack Overflow question prediction with text and meta features, Xin XIA, David LO, Denzil CORREA, Ashish SUREKA, and Emad SHIHAB Conference Proceeding Article
An interference-free programming model for network objects, Mischael SCHILL, Christopher M. POSKITT, and Bertrand MEYER Conference Proceeding Article
Elevating communication, collaboration, and shared experiences in mobile video through drones, Brennan JONES, Kody DILLMAN, Richard TANG, Anthony TANG, Ehud SHARLIN, Lora OEHLBERG, Carman NEUSTAEDTER, and Scott BATEMAN Conference Proceeding Article
Adaptable key-policy attribute-based encryption with time interval, Siqi MA; Junzuo LAI; DENG, Robert H.; and Xuhua DING Journal Article
An Economic Analysis of Consumer Learning for Online Entertainment Shopping, Jin LI, Zhiling GUO, and Geoffrey K.F. TSO Conference Proceeding Article
An Experimental Investigation of Product Competition and Marketing in Social Networks, Cen CHEN, Zhiling GUO, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article
Automated identification of high impact bug reports leveraging imbalanced learning strategies, Xinli YANG, David LO, Qiao HUANG, Xin XIA, and Jianling SUN Conference Proceeding Article
CACE: Exploiting behavioral interactions for improved activity recognition in multi-inhabitant smart homes, Mohammad Arif Ul Alam, Nirmalya ROY, Archan MISRA, and Joseph TAYLOR Conference Proceeding Article
CDRep: Automatic repair of cryptographic-misuses in Android applications, Siqi MA, David LO, Teng LI, and Robert H. DENG Conference Proceeding Article