The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2012

PDF

Predicting common web application vulnerabilities from input validation and sanitization code patterns, Lwin Khin SHAR and Hee Beng Kuan TAN Conference Proceeding Article

PDF

A Computational Analysis of Bundle Trading Markets Design for Distributed Resource Allocation, Zhiling GUO, Gary J. KOEHLER, and Andrew B. WHINSTON Journal Article

PDF

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks, Sharanya ESWARAN, James EDWARDS, Archan MISRA, and Thomas LA PORTA Journal Article

PDF

Automatic classification of software related microblogs, Philips Kokoh PRASETYO, David LO, Achananuparp PALAKORN, Yuan TIAN, and Ee Peng LIM Conference Proceeding Article

PDF

BDUOL: Double Updating Online Learning on a Fixed Budget, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article

Link

Combining Multiple Sensor Features For Stress Detection using Combinatorial Fusion, Yong DENG, D. F. HSU, Z. Wu, and Chao-Hsien CHU Journal Article

PDF

Detecting Similar Applications with Collaborative Tagging, Ferdian THUNG, David LO, and Lingxiao JIANG Conference Proceeding Article

Link

Diversity Maximization Speedup for Fault Localization, Liang Gong, David LO, Lingxiao JIANG, and Hongyu Zhang Conference Paper

PDF

Diversity maximization speedup for fault localization, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article

PDF

Duplicate Bug Report Detection with a Combination of Information Retrieval and Topic Modeling, Anh Tuan NGUYEN, Tung NGUYEN, Tien NGUYEN, David LO, and Chengnian SUN Conference Proceeding Article

Link

Ensuring Flexible Process Compliance with Semantic Constraints using Mixed-Integer Programming, Akhil KUMAR, Wen YAO, and Chao-Hsien CHU Journal Article

PDF

Extending a mobile device's interaction space through body-centric interaction, Xiang CHEN, Nicolai MARQUARDT, Anthony TANG, Sebastian BORING, and Saul GREENBERG Conference Proceeding Article

PDF

Guest editors’ introduction: Methods innovations for the empirical study of technology adoption and diffusion, Robert John KAUFFMAN and Angsana A. TECHATASSANASOONTORN Transcript

PDF

Guest editors’ introduction: Poverty, technology, microfinance and development, Robert J. KAUFFMAN and Frederick J. Riggins Editorial

Link

Inferring Semantically Related Software Terms and their Taxonomy by Leveraging Collaborative Tagging, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article

Link

Information and Communication Technology, and the Sustainability of Microfinance, Robert J. KAUFFMAN and Frederick J. Riggins Journal Article

PDF

In-game action list segmentation and labeling in real-time strategy games, Wei GONG, Ee-Peng LIM, Palakorn ACHANANUPARP, Feida ZHU, David LO, and Freddy Chong-Tat CHUA Conference Proceeding Article

Link

In Search of Efficient Flexibility: Effects of Software Component Granularity on Development Effort, Defects, and Customization Effort, Ramanath SUBRAMANYAM, Narayanasamy RAMASUBBU, and M. S. Krishnan Journal Article

PDF

Interactive fault localization leveraging simple user feedback, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article

Link

kbe-Anonymity: Test Data Anonymization for Evolving Programs, - Lucia, David LO, Lingxiao JIANG, and Aditya Budi Conference Paper

PDF

kbe-anonymity: Test data anonymization for evolving programs, Lucia LUCIA, David LO, Lingxiao JIANG, and Aditya BUDI Conference Proceeding Article

PDF

Learning Fine-Grained Structured Input for Memory Corruption Detection, Lei ZHAO, Debin GAO, and Lina WANG Conference Proceeding Article

PDF

No tradeoff between confidentiality and performance: An analysis on H.264/SVC partial encryption, Zhuo WEI, Xuhua DING, Robert H. DENG, and Yongdong WU Conference Proceeding Article

PDF

Observatory of trends in software related microblogs, Achananuparp PALAKORN, Nelman Lubis IBRAHIM, Yuan TIAN, David LO, and Ee Peng LIM Conference Proceeding Article

PDF

Reputation as Public Policy for Internet Security, Leigh L. Linden, John S. Quarterman, Qian TANG, and Andrew B. Whinston Conference Proceeding Article

PDF

Scalable content authentication in H.264/SVC videos using perceptual hashing based on Dempster-Shafer theory, Dengpan YE, Zhuo Wei, Xuhua DING, and Robert H. DENG Journal Article

Link

Semantic Patch Inference, Jesper ABDERSEN, Anh Cuong NGUYEN, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Proceeding Article

Link

Semantic Patch Inference, Jesper Andersen, Anh Cuong Nguyen, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Paper

PDF

The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Nicolai MARQUARDT, Anthony TANG, and Saul GREENBERG Conference Proceeding Article

PDF

The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Anthony TANG, Anthony TANG, and Saul GREENBERG Conference Paper

Link

To What Extent Could We Detect Field Defects? —An Empirical Study of False Negatives in Static Bug Finding Tools, Ferdian Thung, - Lucia, David LO, Lingxiao JIANG, Premkumar Devanbu, and Foyzur Rahman Conference Paper

PDF

To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools, Ferdian THUNG, Lucia Lucia, David LO, Lingxiao JIANG, Premkumar DEVANBU, and Foyzur RAHMAN Conference Proceeding Article

PDF

Verification of graph programs, Christopher M. POSKITT Conference Proceeding Article

PDF

Verifying total correctness of graph programs, Christopher M. POSKITT and Detlef PLUMP Conference Proceeding Article

What's Public Feedback? Linking High Quality Feedback to Social Issues Using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Paper

Link

What's Public Feedback? Linking High Quality Feedback to Social Issues using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Proceeding Article

PDF

When would this bug get reported?, Ferdian THUNG, David LO, Lingxiao JIANG, Lucia Lucia, Foyzur Rahman, and Premkumar Devanbu Conference Proceeding Article

Auditing the XSS defence features implemented in web application programs, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article

PDF

Defeating SQL injection, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article

PDF

Niche-Seeking in Influence Maximization with Adversary, Long Foong LIOW, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

Link

A Context-aware Reminder System for Elders Based on Fuzzy Linguistic Approach, Shandan ZHOU, Chao-Hsien CHU, Zhiwen YU, and Jungyoon KIM Journal Article

PDF

Adapting Video Delivery Based on Motion Triggered Visual Attention, Hari KALVA, V. Adzic, and Lai-Tee Cheok Conference Paper

PDF

Adaptive Display Power Management for OLED Displays, Kiat Wee TAN and Rajesh Krishna BALAN Conference Proceeding Article

PDF

A non-parametric visual-sense model of images: Extending the cluster hypothesis beyond text, Kong-Wah WAN, Ah-hwee TAN, Joo-Hwee LIM, and Liang-Tien CHIA Journal Article

PDF

A secure and efficient discovery service system in EPCglobal network, Jie SHI, Yingjiu LI, and Robert H. DENG Journal Article

PDF

Automatic compositional verification of timed systems, Shang-Wei LIN, Yang LIU, Jun SUN, Jin Song DONG, and Étienne ANDRÉ Conference Proceeding Article

PDF

Bidder behaviors in repeated B2B procurement auctions, Jong Han PARK, Jae Kyu LEE, and Hoong Chuin LAU Conference Proceeding Article

PDF

Boosting multi-kernel Locality-Sensitive Hashing for scalable image retrieval, Hao XIA, Steven C. H. HOI, Pengcheng WU, and Rong JIN Conference Proceeding Article

PDF

Collective churn prediction in social network, Richard J. OENTARYO, Ee-peng LIM, David LO, Feida ZHU, and Philips K. PRASETYO Conference Proceeding Article

PDF

Confidence-aware graph regularization with heterogeneous pairwise features, Yuan FANG, Bo-June Paul HSU, and Kevin Chen-Chuan CHANG Conference Proceeding Article

PDF

Consumer Micro-behavior and TV Viewership Patterns: Data Analytics for the Two-way Set-top box, Ray M. CHANG, Robert J. KAUFFMAN, and Insoo SON Conference Proceeding Article

PDF

Control-theoretic Utility Maximization in Multihop Wireless Networks under Mission Dynamics, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Journal Article

Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper

Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper

PDF

Dynamic Stochastic Orienteering Problems for Risk-Aware Applications, Hoong Chuin LAU, William YEOH, Pradeep VARAKANTHAM, and Duc Thien NGUYEN Conference Proceeding Article

Follow Link Seeking Strategy: A pattern based approach, Agus Trisnajaya KWEE, Ee Peng LIM, Achananuparp PALAKORN, and Feida ZHU Conference Proceeding Article

Framing core and advanced competencies for undergraduate Information Systems program courses: does the nature, level, complexity and audience of a course matter?, Ilse BAUMGARTNER and Venky SHANKARAMAN Conference Proceeding Article

PDF

From Clickstreams to Searchstreams: Search Network Graph Evidence from a B2B E-Market, Mei LIN, M. F. LIN, and Robert J. KAUFFMAN Conference Proceeding Article

PDF

Hedonic Valuation of Online Game Participation, Robert J. KAUFFMAN, Kwansoo KIM, and Byungjoon YOO Conference Proceeding Article

PDF

Improved BDD-based discrete analysis of timed systems, Truong Khanh NGUYEN, Jun SUN, Yang LIU, Jin Song DONG, and Yan LIU Conference Proceeding Article

PDF

Improving ethics education in accounting: Lessons from medicine and law, Chunhui LIU, Lee J. YAO, and Nan HU Journal Article

PDF

Improving ethics education in accounting: Lessons from medicine and law, Chunhui LIU, Lee J. YAO, and Nan HU Journal Article

PDF

Improving patient flow in emergency department through dynamic priority queue, Kar Way TAN, Chao WANG, and Hoong Chuin LAU Conference Proceeding Article

Integrating Enterprise System's 3rd Wave into IS Curriculum, Venky SHANKARARAMAN, Eng Kit LUM, and Dale SIMON Conference Proceeding Article

Investment Timing for Mobile Payment Systems, Robert J. KAUFFMAN, Jun Liu, and Dan MA Conference Paper

PDF

Investment Timing for Mobile Payment Systems, Robert J. KAUFFMAN, Jun LIU, and Dan MA Conference Proceeding Article

PDF

Measurement-driven performance analysis of indoor femtocellular networks, Trung-Tuan LUONG, Vigneshwaran SUBBARAJU, Archan MISRA, and Srinivasan SESHAN Conference Proceeding Article

PDF

Message from General Chair and Program Co-Chairs [of ICEC '12, 14th Annual International Conference on Electronic Commerce, held in Singapore, 7-8 August 2012], Robert J. KAUFFMAN, Martin BICHLER, Hoong Chuin LAU, Christopher YANG, and Yinping YANG Editorial

PDF

Modeling Concept Dynamics for Large Scale Music Search, Jialie SHEN, Hwee Hwa PANG, Meng WANG, and Shuicheng YAN Conference Proceeding Article

PDF

Online feature selection for mining big data, Steven C. H. HOI, Jialei WANG, Peilin ZHAO, and Rong JIN Conference Proceeding Article

PDF

Presynaptic learning and memory with a persistent firing neuron and a habituating synapse: A model of short term persistent habituation, Kiruthika RAMANATHAN, Ning NING, Dhiviya DHANASEKAR, Guoqi LI, Luping SHI, and Prahlad VADAKKEPAT Journal Article

PDF

Sampling and ontologically pooling web images for visual concept learning, Shiai ZHU, Chong-wah NGO, and Yu-Gang JIANG Journal Article

Shortest Path Computation with No Information Leakage, Kyriakos MOURATIDIS and Man Lung Yiu Conference Paper

PDF

Shortest Path Computation with No Information Leakage, Kyriakos MOURATIDIS and Man Lung YIU Conference Proceeding Article

PDF

The Case for Cloud-Enabled Mobile Sensing Services, Sougata SEN, Archan MISRA, Rajesh Krishna BALAN, and Lipyeow LIM Conference Proceeding Article

The Evolution of Platform Architectures, C. Jason WOODARD and Eric K. CLEMONS Conference Paper

PDF

The patrol scheduling problem, Hoong Chuin LAU and Aldy GUNAWAN Conference Proceeding Article

PDF

The Pricing Model of Cloud Computing Services, Jianhui HUANG and Dan MA Conference Proceeding Article

The Pricing Model of Cloud Computing Services, Jianhui Huang and Dan MA Conference Paper

PDF

Toward a Mobile Platform for Pervasive Games, Inseok HWANG, Youngki LEE, Taiwoo PARK, and Junehwa SONG Conference Proceeding Article

Toward a Mobile Platform for Pervasive Games, Inseok Hwang, Youngki Lee, Taiwoo Park, and Junehwa Song Conference Paper

PDF

Toward large-scale agent guidance in an urban taxi service, Agussurja LUCAS and Hoong Chuin LAU Conference Proceeding Article

PDF

Uncertain Congestion Games with Assorted Human Agent Populations, Asrar AHMED, Pradeep Reddy VARAKANTHAM, and Shih-Fen CHENG Conference Proceeding Article

PDF

Valuation of Benchmark Provisions on IT Services Contracts, Robert J. KAUFFMAN and Ryan SOUGSTAD Conference Proceeding Article

PDF

Vignette: A Style Preserving Sketching Tool for Pen-and-Ink Illustration with Texture Synthesis, Rubaiat Habib Kazi, Takeo Igarashi, Shengdong Zhao, Richard Christopher DAVIS, and Kenshi Takayama

Vignette: A Style Preserving Sketching Tool for Pen-and-Ink Illustration with Texture Synthesis, Rubaiat Habib KAZI, Takeo Igarashi, Shengdong ZHAO, Richard Christopher DAVIS, and Kenshi Takayama Conference Proceeding Article

Link

Innovation and Value Migration in Layered Architectures: The Case of Cloud Orchestration Stacks, Richard TEE and C. Jason WOODARD Presentation

Link

Uncovering Insights through Data Analytics for an Airport Operation to Improve Profitability, Nang Laik MA, Michelle Lee Fong CHEONG, and Junyu CHOY Conference Proceeding Article

PDF

Embracing Analytics for a Better Competitive Edge, Tin Seong KAM News Article

PDF

Using monterey phoenix to formalize and verify system architectures, Jiexin ZHANG, Yang LIU, Mikhail AUGUSTON, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

Probabilistic model checking multi-agent behaviors in dispersion games using counter abstraction, Jianye HAO, Songzheng SONG, Yang LIU, Jun SUN, Lin GUI, Jin Song DONG, and Ho-fung LEUNG Conference Proceeding Article

Tracking sentiment and topic dynamics from social media, Yulan HE, Chenghua LIN, Wei GAO, and Kam-Fai WONG Conference Proceeding Article

Integrating course-level competencies into a program-wide learning outcomes framework: Review of the competencies extraction and definition process, Ilse BAUMGARTNER Conference Paper

PDF

Adaptive CGF for pilots training in air combat simulation, Teck-Hou TENG, Ah-hwee TAN, Wee-Sze ONG, and Kien-Lip LEE Conference Proceeding Article

PDF

A model checker for hierarchical probabilistic real-time systems, Songzheng SONG, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

An Economic Analysis of the Online Counterfeit Market and the Impact of Anti-Counterfeit Technology, Xiong ZHANG, Zhiling GUO, and Wei Thoo YUE Conference Proceeding Article

PDF

A Pollution Attack to Public-key Watermarking Schemes, Yongdong WU and Robert H. DENG Conference Proceeding Article

PDF

Decision Support for Agent Populations in Uncertain and Congested Environments, Pradeep Reddy VARAKANTHAM, Shih-Fen CHENG, Geoff GORDON, and Asrar AHMED Conference Proceeding Article

Deep Online Learning: A Framework of Exploring Hierarchical Representations for Online Learning, Jialei WANG and Steven C. H. HOI Report

PDF

Detecting Anomalous Twitter Users by Extreme Group Behaviors, Hanbo DAI, Ee-peng LIM, Feida ZHU, and Hwee Hwa PANG Conference Proceeding Article