The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2013

PDF

Attribute-based encryption with verifiable outsourced decryption, Junzuo LAI, Robert H. DENG, Chaowen GUAN, and Jian WENG Journal Article

PDF

Automated Generation of Interaction Graphs for Value-Factored Decentralized POMDPs, William YEOH, Akshat KUMAR, and Shlomo Zilberstein Conference Proceeding Article

PDF

Best Upgrade Plans for Large Road Networks, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Click-boosting random walk for image search reranking, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Zheng-Jun ZHA, and Chong-Wah NGO Conference Proceeding Article

PDF

Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article

Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Paper

PDF

Cost-Sensitive Online Active Learning with application to malicious URL detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article

PDF

DelayFlow centrality for identifying critical nodes in transportation networks, Yew-Yih CHENG, Roy Ka Wei LEE, Ee-Peng LIM, and Feida ZHU Conference Proceeding Article

PDF

FloTra: Flower-shape trajectory mining for instance-specific parameter tuning, Lindawati LINDAWATI, Feida ZHU, and Hoong Chuin LAU Conference Paper

Hierarchical Parallel Algorithm for Modularity-Based Community Detection Using GPUs, Chun Yew CHEONG, Huynh Phung HUYNH, David LO, and Rick Siow Mong GOH Conference Proceeding Article

PDF

How many researchers does it take to make impact? Mining software engineering publication data for collaboration insights, Subhajit DATTA, Santonu SARKAR, Sajeev A. S. M., and Nishant KUMAR Conference Proceeding Article

PDF

Improving Patient Length-of-Stay in Emergency Department Through Dynamic Resource Allocation Policies, Kar Way TAN, Wei Hao TAN, and Hoong Chuin LAU Conference Proceeding Article

PDF

Incremental and accuracy-aware personalized pagerank through scheduled approximation, Fanwei ZHU, Yuan FANG, Kevin Chen-Chuan CHANG, and Jing YING Conference Proceeding Article

PDF

Integration of Social Media Technologies with ERP:A Prototype Implementation, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article

PDF

Interacting Knapsack Problem in Designing Resource Bundles, Truong Huy D. NGUYEN, Pradeep Reddy VARAKANTHAM, Hoong Chuin LAU, and Shih-Fen CHENG Conference Proceeding Article

PDF

Large scale online kernel classification, Jialei WANG, Peilin ZHAO, Steven C. H. HOI, Jinfeng ZHUANG, and Zhi-Yong LIU Conference Proceeding Article

PDF

Learning to name faces: A multimodal learning scheme for search-based face annotation, Dayong WANG, Steven C. H. HOI, Pengcheng WU, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article

PDF

Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack, Kai-Lung HUI, Seung-Hyun KIM, and QIU-HONG WANG Presentation

PDF

Multi-agent Orienteering Problem with Time-dependent Capacity Constraints, Cen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Conference Paper

PDF

Near-duplicate video retrieval: Current research and future trends, Jiajun LIU, Zi HUANG, Hongyun CAI, Heng Tao SHEN, Chong-wah NGO, and Wei WANG Journal Article

PDF

“Network-Theoretic” Queuing Delay Estimation in Theme Park Attractions, Ajay ARAVAMUDHAN, Archan MISRA, and Hoong Chuin LAU Conference Proceeding Article

PDF

Open source software development process model – A grounded theory approach, Keng SIAU and Y. TIAN Conference Proceeding Article

PDF

Parameter Learning for Latent Network Diffusion, Xiaojian WU, Akshat KUMAR, Daniel SHELDON, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Politics, sharing and emotion in microblogs, Tuan-Anh HOANG, William COHEN, Ee Peng LIM, Doug PIERCE, and David REDLAWSK Conference Proceeding Article

PDF

RiskVis: Supply chain visualization with risk management and real-time monitoring, Rick S. M. GOH, Zhaoxia WANG, Xiaofeng YIN, Xiuju FU, Loganathan PONNANBALAM, Sifei LU, and Xiaorong Li Conference Proceeding Article

PDF

Robust median reversion strategy for on-line portfolio selection, Dingjiang HUANG, Junlong ZHOU, Bin LI, Steven HOI, and Shuigeng ZHOU Conference Proceeding Article

PDF

Scalable randomized patrolling for securing rapid transit networks, Pradeep VARAKANTHAM, Hoong Chuin LAU, and Zhi YUAN Conference Proceeding Article

PDF

Self-organizing cognitive models for virtual agents, Yilin KANG and Ah-hwee TAN Conference Proceeding Article

Semantic overlay network for large-scale spatial information indexing, Zhiqiang ZOU, Yue WANG, Kai CAO, Tianshan QU, and Zhongmin WANG Journal Article

PDF

The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Conference Proceeding Article

PDF

Using contracts to guide the search-based verification of concurrent programs, Christopher M. POSKITT and Simon POULDING Conference Proceeding Article

PDF

USMMC: A self-contained model checker for UML state machines, Shuang LIU, Yang LIU, Jun SUN, Manchun ZHENG, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article

PDF

Vigilance adaptation in adaptive resonance theory, Lei MENG, Ah-hwee TAN, and Donald C. WINSCH Conference Proceeding Article

Link

Analyzing Auction and Bargaining Mechanisms in E-Procurement with Supply Quality Risk, He HUANG, Hongyan XU, Robert J. Kauffman, and Ning SUN Journal Article

PDF

Performance Measurement Design for a Parcel Delivery Company, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Proceeding Article

PDF

Active Learning with Expert Advice, Peilin ZHAO, Steven C. H. HOI, and Jinfeng ZHUANG Conference Proceeding Article

Analyzing Auction and Bargaining Mechanism Design in E-Procurement with Quality Verification and Risk Aversion., H. Huang, H. Xu, Robert John KAUFFMAN, and N. Sun Journal Article

An analysis of post-selection in automatic tuning, Zhi Yuan, Thomas Stuetzle, Marco Montes De Oca, and Hoong Chuin LAU Conference Paper

PDF

An Empirical Study of Adoption of Software Testing in Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, and Lingxiao Jiang Conference Paper

PDF

An empirical study of adoption of software testing in open source projects, Pavneet Singh KOCHHAR, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

An empirical study of bugs in software build systems, Xin XIA, Xiaozhen ZHOU, David LO, and Xiaoqiong ZHAO Conference Proceeding Article

Case study methodology in technology-focused Information Systems courses: Examining the students’ perspective, Ilse BAUMGARTNER Conference Proceeding Article

Coarse-grained parallel genetic algorithm applied to a vector based land use allocation optimization problem: The case study of Tongzhou Newtown, Beijing, China, Kai CAO and Xinyue YE Journal Article

PDF

Collective Diffusion Over Networks: Models and Inference, Akshat KUMAR, Daniel SHELDON, and Biplav SRIVASTAVA Conference Proceeding Article

PDF

Combining model checking and testing with an application to reliability prediction and distribution, Lin GUI, Jun SUN, Yang LIU, Yuanjie SI, Jin Song DONG, and Xinyu WANG Conference Proceeding Article

Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG, Junyu CHOY, and Nang Laik MA Conference Paper

Effective use of Data and Decision Analytics to Improve Order Distribution in a Supply Chain, Michelle Lee Fong CHEONG and Junyu CHOY Report

PDF

Improving tool support for software reverse engineering in a security context, Brendan CLEARY, Christoph TREUDE, Fernando FIGUEIRA FILHO, Margaret-Anne STOREY, and Martin SALOIS Conference Proceeding Article

PDF

Mining direct antagonistic communities in signed social networks, David LO, Didi SURIAN, Philips Kokoh PRASETYO, Zhang KUAN, and Ee Peng LIM Journal Article

PDF

MKBoost: A framework of multiple kernel boosting, Hao XIA and Steven C. H. HOI Journal Article

PDF

Orion: A software project search engine with integrated diverse software artifacts, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article

PDF

Platform Regulation on Seller Heterogeneity, Ruhai WU and Mei Lin Working Paper

PDF

Popularity, interoperability, and impact of programming languages in 100,000 open source projects, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article

PDF

PSyHCoS: Parameter synthesis for hierarchical concurrent real-time systems, Étienne ANDRÉ, Yang LIU, Jun SUN, Jin Song DONG, and Shang-Wei LIN Conference Proceeding Article

PDF

Real-life vehicle routing with non-standard constraints, Wee Leong Lee Conference Proceeding Article

Real-Life Vehicle Routing with Non-Standard Constraints, Wee Leong Lee

PDF

Reviving dormant ties in an online social network experiment, Ee Peng LIM, Denzil CORREA, David LO, Michael FINEGOLD, and Feida ZHU Conference Proceeding Article

PDF

Shortlisting Top-K Assignments, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article

Software Internationalization and Localization: An Industrial Experience, Xin XIA, David LO, Feng ZHU, Xinyu WANG, and Bo ZHOU Conference Proceeding Article

PDF

Technique for Authenticating H.264/SVC Streams in Surveillance Applications, Wei ZHUO, Robert H. DENG, Jialie SHEN, Yongdong WU, Xuhua DING, and Swee Won LO Conference Proceeding Article

PDF

TESLA: An extended study of an energy-saving agent that leverages schedule flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Milind Tambe, and Burcin Becerik-Gerber Journal Article

PDF

The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection, Joseph Joo Keng CHAN, Kiat Wee TAN, Lingxiao JIANG, and Rajesh Krishna BALAN Conference Proceeding Article

The Determinants of Monetary Value of Virtual Goods: An Empirical Study for a Cross-section of MMORPGs, QIU-HONG WANG, Viktor Mayer-Schonberger, and Xue YANG Journal Article

PDF

The Evolution of Modular Product Architectures and the Emergence of Platform Ecosystems, C. Jason WOODARD and Eric K. Clemons Conference Paper

PDF

Unified modeling language: The teen years and growing pains, J. ERICKSON and Keng SIAU Conference Proceeding Article

PDF

Usability of performance dashboards, usefulness of operational and tactical support, and quality of strategic support: A research framework, Bih-Ru LEA and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

Using case studies to design and deliver technology-centered computing education courses: An innovative approach from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article

PDF

Video concept detection by learning from web images: A case study on cross domain learning, Shiai ZHU, Ting YAO, and Chong-wah NGO Conference Proceeding Article

PDF

Keystroke Timing Analysis of on-the-fly Web Apps, Chee Meng TEY, Payas GUPTA, Debin GAO, and YAN ZHANG Conference Proceeding Article

Online feature selection for model-based reinforcement learning, Trung Thanh Nguyen, Zhuoru Li, Tomi Silander, and Tze-Yun LEONG Conference Proceeding Article

Data driven modeling based on dynamic parsimonious fuzzy neural network, Mahardhika Pratama, Meng Joo ER, Xiang LI, Richard Jayadi OENTARYO, Edwin Lughofer, and Arifin Imam Journal Article

PDF

Adaptive Credit Scoring With Analytic Hierarchy Process, Kwang Yong KOH, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article

PDF

A Direct Mining Approach To Efficient Constrained Graph Pattern Discovery, Feida ZHU, Zequn ZHANG, and Qiang QU Conference Proceeding Article

PDF

A formal semantics for complete UML state machines with communications, Shuang LIU, Yang LIU, Étienne ANDRÉ, Christine CHOPPY, Jun SUN, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article

PDF

A Latent Variable Model for Viewpoint Discovery from Threaded Forum Posts, Minghui QIU and Jing JIANG Conference Proceeding Article

PDF

A latent variable model for viewpoint discovery from threaded forum posts, Minghui QIU and Jing JIANG Conference Paper

PDF

A new unpredictability-based RFID privacy model, Anjia YANG, Yunhui ZHUANG, Duncan S. WONG, and Guomin YANG Conference Proceeding Article

PDF

Approximate Inference in Collective Graphical Models, Daniel SHELDON, Tao SUN, Akshat KUMAR, and Thomas G. DIETTERICH Conference Proceeding Article

PDF

Approximating the performance of a "Last Mile" transportation system, Hai WANG and Amedeo ODONI Presentation

PDF

Architectural Control and Value Migration in Layered Ecosystems: The Case of Open-Source Cloud Management Platforms, Richard TEE and C. Jason WOODARD Conference Paper

A Tool for Designing Business Model Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

Attribute-based access to scalable media in cloud-assisted content sharing, Yongdong WU, Zhuo Wei, and Robert H. DENG Journal Article

PDF

CAMEO: A Middleware for Mobile Advertisement Delivery, Azeem J. KHAN, Kasthuri JAYARAJAH, Dongsu HAN, Archan MISRA, Rajesh Krishna BALAN, and Srinivasan SESHAN Conference Proceeding Article

PDF

Collaborative urban logistics – Synchronizing the last mile, Robert DE SOUZA, Mark GOH, Hoong Chuin LAU, Wee-Siong NG, and Puay-Siew TAN Conference Proceeding Article

PDF

CUGAR: A model for open innovation in Science and Technology Parks, Arcot Desai NARASIMHALU Journal Article

PDF

Demo: SocioPhone: Everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article

PDF

Energy-efficient collaborative query processing framework for mobile sensing services, Jin YANG, Tianli MO, Lipyeow LIM, Kai Uwe SATTLER, and Archan MISRA Conference Proceeding Article

PDF

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing, Fengjun LI, Bo LUO, Peng LIU, Dongwon LEE, and Chao-Hsien CHU Journal Article

PDF

Experiences with Performance Tradeoffs in Practical, Continuous Indoor Localization, Azeem J. KHAN, Vikash RANJAN, Trung-Tuan LUONG, Rajesh Krishna BALAN, and Archan MISRA Conference Proceeding Article

PDF

HUNTS: A Trajectory Recommendation System for Effective and Efficient Hunting of Taxi Passengers, Ye DING, Siyuan LIU, Jiansu PU, and Lionel NI Conference Proceeding Article

PDF

Improved reachability analysis in DTMC via divide and conquer, Songzheng SONG, Lin GUI, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Improving Internet Security Through Social Information and Social Comparison: A Field Quasi-Experiment, Qian TANG, Leigh L. LINDEN, John S. QUARTERMAN, and Andrew B. WHINSTON Conference Paper

PDF

Introducing programmers to pair programming: A controlled experiment, A. S. M. Sajeev and Subhajit DATTA Conference Proceeding Article

PDF

Launching generic attacks on iOS with approved third-party applications, Jin HAN, Mon Kywe SU, Qiang YAN, Feng BAO, Robert H. DENG, Debin GAO, Yingjiu LI, and Jianying ZHOU Conference Proceeding Article

PDF

Mining User Relations from Online Discussions using Sentiment Analysis and Probabilistic Matrix Factorization, Minghui QIU, Liu YANG, and Jing JIANG Conference Proceeding Article

PDF

Mining user relations from online discussions using sentiment analysis and probabilistic matrix factorization, Minghui QIU, Liu Yang, and Jing JIANG Conference Paper

PDF

Mitigating Access-Driven Timing Channels in Clouds using StopWatch, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article

PDF

Real Time Event Detection in Twitter, Xun WANG, Feida ZHU, Jing JIANG, and Sujian LI Conference Proceeding Article

Link

Risk balance defense approach against intrusions for network server, Chengpo MU, Meng YU, Yingjiu LI, and Wanyu Zang Journal Article

SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, and Junehwa Song Conference Paper