Submissions from 2015
Beyond support and confidence: Exploring interestingness measures for rule-based specification mining, LE BUI TIEN DUY and David LO
Cross-Project Build Co-change Prediction, Xin XIA, David LO, Shane MCINTOSH, Emad SHIHAB, and Ahmed HASSAN Conference Proceeding Article
Modeling the Evolution of Development Topics Using Dynamic Topic Models, Jianjun HU, Xiaobing SUN, David LO, and Bin LI Conference Proceeding Article
Query Expansion via Wordnet for Effective Code Search, Meili LU, Xiaobing SUN, Shaowei WANG, David LO, and Yucong DUAN Conference Proceeding Article
Dual Analysis for Recommending Developers to Resolve Bugs, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Journal Article
A conceptual model to evaluate decisions for service profitability, Eng Lieh OUH and Stan JARZABEK Conference Proceeding Article
Beyond Support and Confidence: Exploring Interestingness Measures for Rule-based Specification Mining, Bui Tien Duy LE and David LO Conference Proceeding Article
Click-boosting multi-modality graph-based reranking for image search, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Chong-wah NGO, and Tao MEI Journal Article
Code Coverage and Test Suite Effectiveness: Empirical Study with Real Bugs in Large Systems, PAVNEET SINGH KOCHHAR, FERDIAN THUNG, and David LO Conference Proceeding Article
Improving public transit accessibility for blind riders by crowdsourcing bus stop landmark locations with Google street view: An extended analysis, Kotaro HARA, Shiri AZENKOT, Megan CAMPBELL, Cynthia L. BENNETT, Vicki LE, Sean PANNELLA, Robert MOORE, Kelly MINCKLER, Rochelle H. NG, and Jon E. FROEHLICH Journal Article
Joint search by social and spatial proximity, Kyriakos MOURATIDIS, Jing LI, Yu TANG, and Nikos MAMOULIS Journal Article
Joint Search by Social and Spatial Proximity, Kyriakos Mouratidis, Jing Li, Yu Tang, and Nikos Mamoulis Journal Article
Managing technical debt: Insights from recent empirical evidence, Narayan RAMASUBBU, Chris F. KEMERER, and C. Jason WOODARD Journal Article
Measuring User Influence, Susceptibility and Cynicalness in Sentiment Diffusion, Roy Ka Wei Lee and Ee Peng LIM Conference Paper
NIRMAL: Automatic Identification of Software Relevant Tweets Leveraging Language Model, Abishek SHARMA, Yuan TIAN, and David LO Conference Proceeding Article
On Efficient k-optimal-location-selection Query Processing in Metric Spaces, Yunjun GAO, Shuyao QI, Lu CHEN, Baihua ZHENG, and Xinhan LI Journal Article
Personal visualization and personal visual analytics, Dandan HUANG, Melanie TORY, Bon Adriel ASENIERO, Lyn BARTRAM, Scott BATEMAN, Sheelagh CARPEDALE, Anthony TANG, and Robert WOODBURY Journal Article
Prediction of venues in foursquare using flipped topic models, Wen Haw CHONG, Bing Tian DAI, and Ee Peng LIM Conference Proceeding Article
Privacy leakage analysis in online social networks, Yan LI; Yingjiu LI; Qiang YAN; and DENG, Robert H. Journal Article
Project Sourcing for Capstone Course Experience from an Undergraduate Program, Benjamin GAN and Venky SHANKARARAMAN Conference Proceeding Article
Reconstruction privacy: Enabling statistical learning, Ke Wang, Chao HAN, Ada Waichee FU, Raymond C. WONG, and Philip S. YU Conference Proceeding Article
Scalable and Personalized Blended Learning for Software Education, BOESCH, Chris and Sandra BOESCH Book Chapter
The Case for Smartwatch-based Diet Monitoring, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article
Towards Sustainable, Green Growth [Podcast@SMU], Kar Way TAN Video
Understanding natural disasters as risks in supply chain management through web data analysis, Jimmy ONG, Zhaoxia WANG, Rick Siow Mong GOH, Xiao Feng YIN, Xin XIN, and Xiuju FU Journal Article
Using infrastructure-provided context filters for efficient fine-grained activity sensing, Vigneshwaran SUBBARAJU, Sougata SEN, Archan MISRA, Satyadip CHAKRABORTY, and Rajesh Krishna BALAN Conference Proceeding Article
Sensorless sensing with WiFi, Zimu ZHOU, Chenshu WU, Zheng YANG, and Yunhao LIU Journal Article
Analysis and improvement on a biometric-based remote user authentication scheme using smart cards, Fengtong WEN, Willy SUSILO, and Guomin YANG Journal Article
Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption, Rasekhar BHAGAVATULA, Blase UR, Kevin IACOVINO, Su Mon KYWE, Lorrie Faith CRANOR, and Marios SAVVIDES Conference Proceeding Article
Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge, Liqiang NIE, Yiliang ZHAO, Akbari Mohammad, Jialie SHEN, and Tat-Seng CHUA Journal Article
DICSA: Distributed and Concurrent Link Scheduling Algorithm for Data Gathering in Wireless Sensor Networks, Behnam DEZFOULI, Marjan RADI, Kamin WHITEHOUSE, Shukor ABD RAZAK, and Hwee-Pink TAN Journal Article
Leakage-resilient password entry: Challenges, design, and evaluation, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Journal Article
On Processing Reverse k-skyband and Ranked Reverse Skyline Queries, Yunjun GAO, Qing LIU, Baihua ZHENG, Mou LI, Gang CHEN, and Qing LI Journal Article
PrivacyCanary: Privacy-aware recommenders with adaptive input obfuscation, Thivya KANDAPPU, Arik FRIEDMAN, Roksan BORELLI, and Vijay SIVARAMAN Conference Proceeding Article
Review Synthesis for Micro-Review Summarization, Thanh-Son Nguyen, Hady W. LAUW, and Panayiotis TSAPARAS Conference Proceeding Article
SimApp: A framework for detecting similar mobile applications by online kernel learning, Ning CHEN, Steven C. H. HOI, Shaohua LI, and Xiaokui XIAO Conference Proceeding Article
Use of a high-value social audience index for target audience identification on Twitter, Siaw Ling LO, David CORNFORTH, and Raymond. CHIONG Conference Proceeding Article
Will this be quick? A case study of bug resolution times across industrial projects, Subhajit DATTA and Prasanth LADE Conference Proceeding Article
Adaptive duty cycling in sensor networks with energy harvesting using continuous-time markov chain and fluid models, Wai Hong Ronald CHAN, Pengfei ZHANG, Ido NEVAT, Sai Ganesh NAGARAJAN, Alvin C. VALERA, Hwee Xian TAN, and Natarajan GAUTAM Journal Article
Algorithm Selection via Ranking, Jayadi Oentaryo Richard, Handoko Stephanus Daniel, and Hoong Chuin LAU Conference Proceeding Article
Ambiguous optimistic fair exchange: Definition and constructions, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article
An adaptive gradient method for online AUC maximization, Yi DING, Peilin ZHAO, Steven C. H. HOI, and Yew-Soon ONG Conference Proceeding Article
Are features equally representative? A feature-centric recommendation, Chenyi ZHANG, Ke WANG, Ee-peng LIM, Qinneng XU, Jianling SUN, and Hongkun YU Conference Proceeding Article
A systematic study on explicit-state non-zenoness checking for timed automata, Ting WANG, Jun SUN, Xinyu WANG, Yang LIU, Yuanjie SI, Jin Song DONG, Xiaohu YANG, and Xiaohong LI Journal Article
Automatic, high accuracy prediction of reopened bugs, Xin Xia, David LO, Emad Shihab, Xinyu Wang, and Bo Zhou Journal Article
Business Modeling with Spreadsheets: Problems, Principles and Practice - 3rd ed, Thin Yin LEONG and Michelle L. F. CHEONG Book
Ciphercard: A token-based approach against camera-based shoulder surfing attacks on common touchscreen devices, Teddy SEYED, Xing-Dong YANG, Anthony TANG, Saul GREENBERG, Jiawei GU, Bin ZHU, and Xiang CIAO Conference Proceeding Article
Community discovery from social media by low-rank matrix recovery, Jinfeng ZHUANG, Mei TAO, Steven C. H. HOI, Xian-Sheng HUA, and Yongdong ZHANG Journal Article
Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG and Junyu CHOY Book Chapter
Designing a portfolio of parameter configurations for online algorithm selection, Aldy GUNAWAN, Hoong Chuin LAU, and Mustafa MISIR Conference Proceeding Article
Improving Internet Security through Mandatory Information Disclosure, Qian TANG and Andrew B. WHINSTON Conference Proceeding Article
Improving Software Quality and Productivity Leveraging Mining Techniques: [Summary of the Second Workshop on Software Mining, at ASE 2013], Ming LI, Hongyu ZHANG, David LO, and Lucia Lucia Magazine Article
Integrated intelligence for human-robot teams, Jean OH and et. al. Conference Proceeding Article
Intelligent polar cyberinfrastructure: enabling semantic search in geospatial metadata catalogue to support polar data discovery, Wenwen LI, Vidit BHATIA, and Kai CAO Journal Article
Low effort crowdsourcing: Leveraging peripheral attention for crowd work, Vaish RAJAN, Peter ORGANISCIAK, Kotaro HARA, Jeffrey P. BIGHAM, and Haoqi ZHANG Conference Poster
Mechanism Design for Near Real-Time Retail Payment and Settlement Systems, Zhiling GUO, Robert John KAUFFMAN, Mei LIN, and Dan MA Conference Proceeding Article
Modeling neuromorphic persistent firing networks, Ning NING, Guoqi LI, Wei HE, Kejie HUANG, Li PAN, Kiruthika RAMANATHAN, Rong ZHAO, and Luping SHI Journal Article
Multidimensional context awareness in mobile devices, Zhuo WEI, Robert H. DENG, Jialie SHEN, Jixiang ZHU, Kun OUYANG, and Yongdong WU Conference Proceeding Article
Multi-user multiple input multiple output (MIMO) communication with distributed antenna systems in wireless networks, Karthikeyan SUNDARESAN, Mohammad KHOJASTEPOUR, Sampath RANGARAJAN, and Jie XIONG Patent
On the Financification of Cloud Computing: An Agenda for Pricing and Service Delivery Mechanism Design Research, Robert John KAUFFMAN, Dan MA, Richard Shang, Jianhui Huang, and Yinping Yang Journal Article
On the Financification of Cloud Computing: An Agenda for Pricing and Service Delivery Mechanism Design Research, Robert John KAUFFMAN, Dan MA, Richard Shang, Jianhui Huang, and Yinping Yang Journal Article
Pricing Strategy for Cloud Computing: A Damaged Services Perspective, Jianhui HUANG, Robert John KAUFFMAN, and Dan MA Journal Article
Pricing Strategy for Cloud Computing: a Damaged Services Perspective, Jianhui Huang, Robert John KAUFFMAN, and Dan MA Journal Article
Push or Pull? A Website's Strategic Choice of Content Delivery Mechanism, Dan MA Journal Article
Recovering Household Preferences for Digital Entertainment, Jin LI, Zhiling GUO, and Robert J. KAUFFMAN Conference Proceeding Article
ReputationPro: The efficient approaches to contextual transaction trust computation in e-commerce environments, Haibin ZHANG, Yan WANG, Xiuzhen ZHANG, and Ee Peng LIM Journal Article
Risk based Optimization for Improving Emergency Medical Systems, Sandhya SAISUBRAMANIAN, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article
Saliency-Guided Color-to-Gray Conversion Using Region-Based Optimization, Hao DU, Shengfeng HE, Bin SHENG, Lizhuang MA, and Rynson W.H. LAU Journal Article
Semi-universal portfolios with transaction costs, Dingjiang HUANG, Yan ZHU, Bin LI, Shuigeng ZHOU, and Steven C. H. HOI Conference Proceeding Article
Software puzzle: A countermeasure to resource-inflated denial-of-service attacks, Yongdong WU, Zhigang ZHAO, Bao FENG, and Robert H. DENG Journal Article
Solving Uncertain MDPs with Objectives that are Separable over Instantiations of Model Uncertainty, Yossiri ADULYASAK, Pradeep VARAKANTHAM, Asrar AHMED, and Patrick JAILLET Conference Proceeding Article
Special section: Economics, electronic commerce, and competitive strategy, Eric K. CLEMONS, Rajiv M. DEWAN, and Robert John KAUFFMAN Journal Article
Technology Investment Decision-Making under Uncertainty, Robert J. Kauffman, Jun Liu, and Dan Ma Journal Article
The Knowledge Accumulation and Transfer in Open-Source Software (OSS) Development, Youngsoo KIM and Lingxiao JIANG Conference Proceeding Article
Toward mobile robots reasoning like humans, Jean OH, Arne SUPPE, Felix DUVALLET, Abdeslam BOULARIAS, Luis NAVARRO-SERMENT, Martial HEBERT, Anthony STENTZ, Jerry VINOKUROV, Oscar ROMERO, Christian LEBIERE, and Robert DEAN Conference Proceeding Article
Travel Recommendation via Author Topic Model Based Collaborative Filtering, Shuhui JIANG, Xueming QIAN, Jialie SHEN, and Tao MEI Conference Proceeding Article
Submissions from 2014
The Communication in A Social Networking Site (SNS) and Its Dynamics, Young Soo KIM Presentation
Effects of training datasets on both the extreme learning machine and support vector machine for target audience identification on twitter, Siaw Ling LO, David CORNFORTH, and Raymond CHIONG Conference Proceeding Article
Human action classification based on sequential bag-of-words model, Hong LIU, Qiaoduo ZHANG, and Qianru SUN Conference Proceeding Article
Online learning on incremental distance metric for person re-identification, Yuke SUN, Hong LIU, and Qianru SUN Conference Proceeding Article
Enhancing machine-learning methods for sentiment classification of web data, Zhaoxia WANG, Victor Joo Chuan TONG, and Hoong Chor CHIN Conference Proceeding Article
FM 2014: Formal methods: 19th international symposium, Cliff B. JONES, Pekka PIHLAJASAARI, and Jun SUN Edited Book
14th IEEE International Conference on Data Mining Workshops: Proceedings: Shenzhen, China, 14 December 2014, Ming LI, Hongyu ZHANG, and David LO Edited Conference Proceeding
Aligning Assessments with Competencies using Keyphrase Extraction, Venky SHANKARARAMAN and Swapna GOTTIPATI Conference Proceeding Article
A metrics suite of cloud computing adoption readiness, Robert J. KAUFFMAN, Dan MA, and Martin YU Conference Proceeding Article
Analyzing Course Competencies: What can Competencies Reveal about the Curriculum?, Swapna GOTTIPATI and Venky SHANKARARAMAN Conference Proceeding Article
Android or iOS for Better Privacy Protection?, Jin Han, Qiang Yan, Debin GAO, Jianying Zhou, and Huijie Robert DENG Conference Paper
An Empirical Study on the Adequacy of Testing in Open Source Projects, Pavneet Singh Kochhar, Ferdian Thung, David LO, and Julia Lawall Conference Paper
An Empirical Study on the Adequacy of Testing in Open Source Projects, Pavneet Singh Kochhar, Ferdian Thung, David LO, and Julia Lawall Conference Proceeding Article
Anomaly detection through enhanced sentiment analysis on social media data, Zhaoxia WANG, Victor JOO, Chuan TONG, Xin XIN, and Hoong Chor CHIN Conference Proceeding Article
CardioGuard: A Brassiere-based Reliable ECG Monitoring Sensor System for Supporting Daily Smartphone Healthcare Applications, Sungjun Kwon, Jeehoon Kim, Seungwoo Kang, Youngki LEE, Hyunjae Baek, and Kwangsuk Park Journal Article
Detecting Camouflaged Applications on Mobile Application Markets, Mon Kywe SU, Yingjiu LI, Huijie Robert DENG, and Jason HONG Conference Proceeding Article
Detecting flow anomalies in distributed systems, Freddy Chong-Tat CHUA, Ee Peng LIM, and Bernardo HUBERMAN Conference Proceeding Article
Experimenting with Gamification in the Classroom, Emanuel Grant, Venkataramanan (Venky) SHANKARARAMAN, and Jeremy Kian Loong LECK Conference Proceeding Article
Extracting Interest Tags from Twitter User Biographies, Ying DING and Jing JIANG Conference Proceeding Article
From cells to streets: Estimating mobile paths with cellular-side data, Qatar Computing Research Institute, University of Birmingham, Seattle University of Washington, and Haewoon KWAK Conference Proceeding Article
High-dimensional Data Stream Classification via Sparse Online Learning, Dayong WANG, Pengcheng WU, Peilin ZHAO, Yue WU, Chunyan MIAO, and Steven C. H. HOI Conference Proceeding Article
High Utility Episode Mining Made Practical and Fast, Guangming GUO, Lei Zhang, Qi Liu, Enhong Chen, Feida ZHU, and Guan Chu Conference Proceeding Article
High Utility K-anonymization for Social Network Publishing, Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C.K. LEE Journal Article
I’ve heard you have problems: Cellular signal monitoring through UE participatory sensing, Huiguang Liang, Hyong Kim, Hwee-Pink TAN, and Wai-Leong Yeow Conference Proceeding Article