Submissions from 2013
Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks, Luiz Felipe VIERA, Mario GERLA, and Archan MISRA Journal Article
Hibernating Process: Modeling Mobile Calls at Multiple Scales, Siyuan LIU, Lei LI, and Ramayya KRISHNAN Conference Proceeding Article
Improving patient length-of-stay in emergency department through dynamic queue management, Kar Way TAN, Hoong Chuin LAU, and Francis Chun Yue LEE Conference Proceeding Article
Modeling Preferences with Availability Constraints, Bingtian DAI and Hady W. LAUW Conference Proceeding Article
Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat CHUA, Richard Jayadi Oentaryo, and Ee Peng LIM Conference Proceeding Article
Partial least squares regression on Grassmannian manifold for emotion recognition, M. LIU, R. WANG, Zhiwu HUANG, S. SHAN, and X. CHEN Conference Proceeding Article
Query-document-dependent fusion: A case study of multimodal music retrieval, Zhonghua LI, Bingjun ZHANG, Yi YU, Jialie SHEN, and Ye WANG Journal Article
RFID Security and Privacy, Yingjiu LI, Robert H. DENG, and Elisa BERTINO Book
Social media for supply chain risk management, Xiuju FU, Rick S. M. GOH, J. C. Tong, Loganathan PONNANBALAM, Xiaofeng YIN, Zhaoxia WANG, H. Y. Xu, and Sifei LU Conference Proceeding Article
The influence of online word-of-mouth on long tail formation, Bin GU, Qian TANG, and Andrew B. WHINSTON Journal Article
TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Towards a hybrid framework for detecting input manipulation vulnerabilities, Sun DING, Hee Beng Kuan TAN, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article
Two Formulas for Success in Social Media: Social Learning and Network Effects, Liangfei QIU, Qian TANG, and Andrew B. Whinston Conference Paper
Unsupervised medical image classification by combining case-based classifiers, Thien Anh Dinh, Tomi Silander, Bolan Su, Tianxia Gong, Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang Lee, Chew Lim Tan, and Tze-Yun LEONG Conference Proceeding Article
Defending against heap overflow by using randomization in nested virtual clusters, Chee Meng TEY and Debin GAO Conference Proceeding Article
Adaptive regret minimization in bounded-memory games, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, and Arunesh SINHA Conference Paper
Achieving revocable fine-grained cryptographic access control over cloud data, Yanjiang YANG, Xuhua DING, Haibing LU, Zhiguo WAN, and Jianying ZHOU Conference Proceeding Article
Adaptable ciphertext-policy attribute-based encryption, Junzuo LAI, Robert H. DENG, Yanjiang YANG, and Jian WENG Conference Proceeding Article
A link-bridged topic model for cross-domain document classification, Pei YANG, Wei GAO, Qi TAN, and Kam-Fai WONG Journal Article
An agent-based simulation approach to experience management in theme parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Presentation
A scalable approach for malware detection through bounded feature space behavior modeling, Mahinthan CHANDRAMOHAN, Hee Beng Kuan TAN, Lionel C BRIAND, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article
A Social Network-Empowered Research Analytics Framework for Project Selection, Thushari SILVA, Zhiling GUO, Jian MA, Hongbing JIANG, and Huaping CHEN Journal Article
Assessing the Moderating Effect of Consumer Product Knowledge and Online Shopping Experience on using Recommedation Agents for Customer Loyalty, Victoria Y. YOON, R. Eric HOSTLER, Zhiling GUO, and Tor GUIMARAES Journal Article
Automatically partition software into least privilege components using dynamic data dependency analysis, Yongzheng WU, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Automatic Recommendation of API Methods from Feature Requests, Ferdian THUNG, Shaowei WANG, David LO, and Julia LAWALL Conference Proceeding Article
Budgeted personalized incentive approaches for smoothing congestion in resource networks, Pradeep VARAKANTHAM, Na FU, William YEOH, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article
Challenges and opportunities in taxi fleet anomaly detection, Rijurekha SEN and Rajesh Krishna BALAN Conference Proceeding Article
Classification in P2P Networks with Cascade Support Vendor Machines, Hock Hee ANG, Vivekanand Gopalkrishnan, Steven C. H. HOI, and Wee-Keong NG Journal Article
Constraint-based automatic symmetry detection, Shao Jie ZHANG, Jun SUN, Chengnian SUN, Yang LIU, Junwei MA, and Jin Song DONG Conference Proceeding Article
Covariance Selection by Thresholding the Sample Correlation Matrix, Binyan JIANG Journal Article
Efficient Index-Based Approaches for Skyline Queries in Location-Based Applications, Ken C. K. LEE, Baihua ZHENG, Cindy CHEN, and Chi-Yin CHOW Journal Article
Efficient lossy trapdoor functions based on subgroup membership assumptions, Haiyang XUE, Bao LI, Xianhui LU, Dingding JIA, and Yamin LIU Conference Proceeding Article
Electroweak measurements in electron-positron collisions at W-boson-pair energies at LEP, S. SCHAEL and Manoj THULASIDAS Journal Article
From RSSI to CSI: Indoor localization via channel response, Zheng YANG, Zimu ZHOU, and Yunhao LIU Journal Article
Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub, Tegawende F. BISSYANDE, David LO, Lingxiao JIANG, Laurent REVEILLERE, Jacques KLEIN, and Yves LE TRAON Conference Proceeding Article
Information vs interaction: An alternative user ranking model for social networks, Wei XIE, Ai Phuong HOANG, Feida ZHU, and Ee Peng LIM Conference Proceeding Article
Mining Branching-Time Scenarios, Dirk FAHLAND, David LO, and Shahar MAOZ Conference Proceeding Article
Mining fraudulent patterns in online advertising, Richard J. OENTARYO and Ee-peng LIM Conference Paper
Multimedia modeling, Chong-Wah NGO, Klaus SCHOEFFMANN, Yiannis ANDREOPOULOS, and Christian BREITENEDER Journal Article
Optimization Approaches for Solving Chance Constrained Stochastic Orienteering Problems, Pradeep VARAKANTHAM and Akshat KUMAR Conference Proceeding Article
Predicting best answerers for new questions: An approach leveraging topic modeling and collaborative voting, Yuan TIAN, Pavneet Singh Kochhar, Ee Peng LIM, Feida ZHU, and David LO Conference Proceeding Article
Predicting User's Political Party using Ideological Stances, Swapna GOTTOPATI, Minghui QIU, Liu YANG, Feida ZHU, and Jing JIANG Conference Proceeding Article
Search of small objects by topology matching, context modeling, and pattern mining, Wei ZHANG and Chong-wah NGO Conference Paper
Second Order Online Collaborative Filtering, Jing Lu, Steven C. H. HOI, Jialei Wang, and Peilin Zhao Conference Proceeding Article
Self-blindable credential: Towards anonymous entity authentication upon resource-constrained devices, Yanjiang YANG, Xuhua DING, Haibing LU, Jian WENG, and Jianying ZHOU Conference Proceeding Article
Social informatics, Adam JATOWT, Ee-peng LIM, Ying DING, Asako MIURA, Taro TEZUKA, Gael DIAS, Katsumi TANAKA, Andrew J. FLANAGIN, and Bing Tian DAI Edited Conference Proceeding
Social Listening for Customer Acquisition, Juan DU, Biying TAN, Feida ZHU, and Ee-Peng LIM Conference Proceeding Article
Social-Loc: Improving indoor localization with social sensing, Jung-Hyun JUN, Yu GU, Long CHENG, Banghui LU, Jun SUN, Ting ZHU, and Jianwei NIU Conference Proceeding Article
Social sensing for urban crisis management: The case of Singapore Haze, Philips Kokoh PRASETYO, Ming GAO, Ee Peng LIM, and Christie N. SCOLLON Conference Proceeding Article
Symmetry robust descriptor for non-rigid surface matching, Zhiyuan ZHANG, KangKang YIN, and Kelvin W. C. FOONG Journal Article
TzuYu: Learning stateful typestates, Hao XIAO, Jun SUN, Yang LIU, Shang-Wei LIN, and Chengnian SUN Conference Proceeding Article
Understanding the Genetic Makeup of Linux Device Drivers, Peter Senna Tschudin, Laurent Reveillere, Lingxiao JIANG, David LO, and Julia Lawall Conference Paper
Understanding the Genetic Makeup of Linux Device Drivers, Peter Senna TSCHUDIN, Laurent REVEILLERE, Lingxiao JIANG, David LO, and Julia LAWALL Conference Proceeding Article
UpSizeR: Synthetically scaling an empirical relational database, Y. C. TAY, Bing Tian DAI, Daniel T. WANG, Eldora Y. SUN, Yong LIN, and Yuting LIN Journal Article
Using Micro-Reviews to Select an Efficient Set of Reviews, Thanh-Son NGUYEN, Hady W. LAUW, and Panayiotis TSAPARAS Conference Proceeding Article
Vireo/ECNU @ TRECVID 2013: A video dance of detection, recounting and search with motion relativity and concept learning from wild, Chong-wah NGO, Feng WANG, Wei ZHANG, Chun-Chet TAN, Zhanhu SUN, Shi-Ai ZHU, and Ting YAO Conference Paper
Why do I retweet it? An information propagation model for microblogs, Fabio PEZZONI, Jisun AN, Andrea PASSARELLA, Jon CROWCROFT, and Marco CONTI Conference Proceeding Article
Omnidirectional coverage for device-free passive human detection, Zimu ZHOU, Zheng YANG, Chenshu WU, Longfei SHANGGUAN, and Yunhao LIU Journal Article
Accurate Developer Recommendation for Bug Resolution, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Conference Proceeding Article
A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting, Zhiguo WAN, June LIU, Rui ZHANG, and Robert H. DENG Journal Article
Adaptive Gameplay for Programming Practice, Chris BOESCH and Sandra BOESCH Conference Proceeding Article
A Dynamic Programming Algorithm for Learning Chain Event Graphs, Silander T. and Tze-Yun LEONG Conference Proceeding Article
An Experimental Study for Inter-User Interference Mitigation in Wireless Body Sensor Networks, Bin CAO, Yu GE, Chee Wee KIM, Gang FENG, Hwee-Pink TAN, and Yun LI Journal Article
Annotation for free: Video tagging by mining user search behavior, Yao TING, Tao MEI, Chong-wah NGO, and Shipeng LI Conference Proceeding Article
A Unified Model for Topics, Events and Users on Twitter, Qiming DIAO and Jing JIANG Conference Proceeding Article
Automated Library Recommendation, Ferdian THUNG, David LO, and Julia LAWALL Conference Proceeding Article
Automatic Recovery of Root Causes from Bug-Fixing Changes, Ferdian Thung, David LO, and Lingxiao JIANG Conference Paper
Automatic recovery of root causes from bug-fixing changes, Ferdian THUNG, David LO, and Lingxiao JIANG Conference Proceeding Article
CELL: A compositional verification framework, Kun JI, Yang LIU, Jun SUN, Jun SUN, Jin Song DONG, and Truong Khanh NGUYEN Conference Proceeding Article
Clustering Algorithms for Maximizing the Lifetime of Wireless Sensor Networks with Energy-Harvesting Sensors, Pengfei ZHANG, Gaoxi XIAO, and Hwee-Pink TAN Journal Article
Consistent stereo image editing, Tao YAN, Shengfeng HE, Rynson W.H. LAU, and Yun Xu Conference Proceeding Article
Creating Adaptive Quests to Support Personalized Learning Experiences when Learning Software Languages, Chris BOESCH and Sandra BOESCH Conference Proceeding Article
Error recovered hierarchical classification, Shiai ZHU, Xiao-Yong WEI, and Chong-wah NGO Conference Proceeding Article
Image search by graph-based label propagation with image representation from DNN, Yingwei PAN, Yao TING, Kuiyuan YANG, Houqiang LI, Chong-wah NGO, Jingdong WANG, and Tao MEI Conference Proceeding Article
Innovations in Financial Information Systems and Technology Ecosystems, Robert J. KAUFFMAN, Jun LIU, and Dan MA Conference Paper
K-time proxy signature: Formal definition and efficient construction, Weiwei LIU, Guomin YANG, Yi MU, and Jiannan WEI Conference Proceeding Article
Learning Topics and Positions from Debatepedia, Swapna GOTTIPATI, Minghui QIU, Yanchuan Sim, Jing JIANG, and Noah Smith Conference Paper
Learning Topics and Positions from Debatepedia, Swapna GOTTOPATI, Minghui QIU, Yanchuan SIM, Jing JIANG, and Noah SMITH Conference Proceeding Article
LiveLabs: Initial Reflections on Building a Large-scale Mobile Behavioral Experimentation Testbed, Archan MISRA and Rajesh Krishna BALAN Journal Article
Merged Aggregate Nearest Neighbor Query Processing in Road Networks, Weiwei SUN, Chong CHEN, Baihua ZHENG, Chunan CHEN, and Liang ZHU Conference Proceeding Article
Modeling Interaction Features for Debate Side Clustering, Minghui QIU, Liu YANG, and Jing JIANG Conference Proceeding Article
On effects of visual query complexity, Jialie SHEN and CHENG ZHIYONG Conference Proceeding Article
Online multimodal distance metric learning with application to image retrieval, Pengcheng WU, Steven C. H. HOI, Hao XIA, Peilin ZHAO, Dayong WANG, and Chunyan MIAO Conference Proceeding Article
Online multi-task collaborative filtering for on-the-fly recommender systems, Jialei WANG, Steven C. H. HOI, Peilin ZHAO, and Zhi-Yong LIU Conference Proceeding Article
Predictive Handling of Asynchronous Concept Drifts in Distributed Environments, Hock Hee ANG, Vivek Gopalkrishnan, Indre Zliobaite, Mykola Pechenizkiy, and Steven C. H. HOI Journal Article
SkyHunter: A multi-surface environment for supporting oil and gas exploration, Teddy SEYED, Mario Costa SOUSA, Frank MAURER, and Anthony TANG Conference Proceeding Article
The vireo team at MediaEval 2013: Violent Scenes Detection by mid-level concepts learnt from youtube, Chun Chet TAN and Chong-Wah NGO Conference Paper
TODMIS: Mining Communities from Trajectories, Siyuan LIU, Shuhui WANG, Kasthuri JAYARAJAH, Archan MISRA, and Rammaya KRISHNAN Conference Proceeding Article
Understanding Online Consumer’s Inter-Purchase Time, Youngsoo KIM Presentation
RIGA: A Rich Internet Geospatial Analytics Application for Area-based Data, Tin Seong KAM Presentation
The Myths of G-Tech for Business Decision Making, Tin Seong KAM Presentation
Revised online learning with kernels for classification and regression, Guoqi LI, Kiruthika RAMANATHAN, Kiruthika RAMANATHAN, and Luping SHI Conference Proceeding Article
Towards accurate object localization with smartphones, Longfei SHANGGUAN, Zimu ZHOU, Zheng YANG, Kebin LIU, Zhenjiang LI, and Yunhao LIU Journal Article
Towards accurate object localization with smartphones, Longfei SHANGGUAN, Zimu ZHOU, Zheng YANG, Kebin LIU, Zhenjiang LI, and Yunhao LIU Journal Article
Attack and Defense Mechanisms of Malicious EPC Event Injection in EPC Discovery Service, Mon Kywe SU, Yingjiu LI, and Jie SHI Conference Proceeding Article
A highly efficient RFID distance bounding protocol without real-time PRF evaluation, Yunhui ZHUANG, Anjia YANG, Duncan S. WONG, Guomin YANG, and Qi XIE Conference Proceeding Article
An analysis of post-selection in automatic configuration, Zhi YUAN, Thomas St\303\274tzle, Marco A. Montes De Oca, Hoong Chuin LAU, and Mauro Birattari Conference Proceeding Article
An Investigation of Decision Analytic Methodologies for Stress Identification, Yong DENG, Chao-Hsien CHU, Huayou SI, Qixun ZHANG, and Zhonghai WU Journal Article
ConferenceSense: Monitoring of public events using phone sensors, Vigneshwaran SUBBARAJU, Amit KUMAR, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, and Archan MISRA Conference Proceeding Article
Corporate myths: Sourcing and vendor management in Asia Pacific, Patrick THNG Magazine Article