The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2013

PDF

Video concept detection by learning from web images: A case study on cross domain learning, Shiai ZHU, Ting YAO, and Chong-wah NGO Conference Proceeding Article

PDF

Keystroke Timing Analysis of on-the-fly Web Apps, Chee Meng TEY, Payas GUPTA, Debin GAO, and YAN ZHANG Conference Proceeding Article

Online feature selection for model-based reinforcement learning, Trung Thanh Nguyen, Zhuoru Li, Tomi Silander, and Tze-Yun LEONG Conference Proceeding Article

Data driven modeling based on dynamic parsimonious fuzzy neural network, Mahardhika Pratama, Meng Joo ER, Xiang LI, Richard Jayadi OENTARYO, Edwin Lughofer, and Arifin Imam Journal Article

PDF

Adaptive Credit Scoring With Analytic Hierarchy Process, Kwang Yong KOH, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article

PDF

A Direct Mining Approach To Efficient Constrained Graph Pattern Discovery, Feida ZHU, Zequn ZHANG, and Qiang QU Conference Proceeding Article

PDF

A formal semantics for complete UML state machines with communications, Shuang LIU, Yang LIU, Étienne ANDRÉ, Christine CHOPPY, Jun SUN, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article

PDF

A latent variable model for viewpoint discovery from threaded forum posts, Minghui QIU and Jing JIANG Conference Paper

PDF

A Latent Variable Model for Viewpoint Discovery from Threaded Forum Posts, Minghui QIU and Jing JIANG Conference Proceeding Article

PDF

A new unpredictability-based RFID privacy model, Anjia YANG, Yunhui ZHUANG, Duncan S. WONG, and Guomin YANG Conference Proceeding Article

PDF

Approximate Inference in Collective Graphical Models, Daniel SHELDON, Tao SUN, Akshat KUMAR, and Thomas G. DIETTERICH Conference Proceeding Article

PDF

Approximating the performance of a "Last Mile" transportation system, Hai WANG and Amedeo ODONI Presentation

PDF

Architectural Control and Value Migration in Layered Ecosystems: The Case of Open-Source Cloud Management Platforms, Richard TEE and C. Jason WOODARD Conference Paper

A Tool for Designing Business Model Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

Attribute-based access to scalable media in cloud-assisted content sharing, Yongdong WU, Zhuo Wei, and Robert H. DENG Journal Article

PDF

CAMEO: A Middleware for Mobile Advertisement Delivery, Azeem J. KHAN, Kasthuri JAYARAJAH, Dongsu HAN, Archan MISRA, Rajesh Krishna BALAN, and Srinivasan SESHAN Conference Proceeding Article

PDF

Collaborative urban logistics – Synchronizing the last mile, Robert DE SOUZA, Mark GOH, Hoong Chuin LAU, Wee-Siong NG, and Puay-Siew TAN Conference Proceeding Article

PDF

CUGAR: A model for open innovation in Science and Technology Parks, Arcot Desai NARASIMHALU Journal Article

PDF

Demo: SocioPhone: Everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article

PDF

Energy-efficient collaborative query processing framework for mobile sensing services, Jin YANG, Tianli MO, Lipyeow LIM, Kai Uwe SATTLER, and Archan MISRA Conference Proceeding Article

PDF

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing, Fengjun LI, Bo LUO, Peng LIU, Dongwon LEE, and Chao-Hsien CHU Journal Article

PDF

Experiences with Performance Tradeoffs in Practical, Continuous Indoor Localization, Azeem J. KHAN, Vikash RANJAN, Trung-Tuan LUONG, Rajesh Krishna BALAN, and Archan MISRA Conference Proceeding Article

PDF

HUNTS: A Trajectory Recommendation System for Effective and Efficient Hunting of Taxi Passengers, Ye DING, Siyuan LIU, Jiansu PU, and Lionel NI Conference Proceeding Article

PDF

Improved reachability analysis in DTMC via divide and conquer, Songzheng SONG, Lin GUI, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Improving Internet Security Through Social Information and Social Comparison: A Field Quasi-Experiment, Qian TANG, Leigh L. LINDEN, John S. QUARTERMAN, and Andrew B. WHINSTON Conference Paper

PDF

Introducing programmers to pair programming: A controlled experiment, A. S. M. Sajeev and Subhajit DATTA Conference Proceeding Article

PDF

Launching generic attacks on iOS with approved third-party applications, Jin HAN, Mon Kywe SU, Qiang YAN, Feng BAO, Robert H. DENG, Debin GAO, Yingjiu LI, and Jianying ZHOU Conference Proceeding Article

PDF

Mining User Relations from Online Discussions using Sentiment Analysis and Probabilistic Matrix Factorization, Minghui QIU, Liu YANG, and Jing JIANG Conference Proceeding Article

PDF

Mining user relations from online discussions using sentiment analysis and probabilistic matrix factorization, Minghui QIU, Liu Yang, and Jing JIANG Conference Paper

PDF

Mitigating Access-Driven Timing Channels in Clouds using StopWatch, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article

PDF

Real Time Event Detection in Twitter, Xun WANG, Feida ZHU, Jing JIANG, and Sujian LI Conference Proceeding Article

Link

Risk balance defense approach against intrusions for network server, Chengpo MU, Meng YU, Yingjiu LI, and Wanyu Zang Journal Article

PDF

SocioPhone: Everyday Face-to-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article

SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, and Junehwa Song Conference Paper

Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper

Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper

PDF

Think Twice before you Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks, YAN LI, Yingjiu LI, Qiang YAN, and Robert H. DENG Conference Proceeding Article

PDF

T-Watcher: A New Visual Analytic System for Effective Traffic Surveillance, Jiansu PU, Siyuan LIU, Ye DING, Huamin QU, and Lionel NI Conference Proceeding Article

PDF

Understanding Sequential Decisions via Inverse Reinforcement Learning, Siyuan LIU, Miguel ARAUJO, Emma BRUNSKILL, Rosaldo ROSSETTI, Joao BARROS, and Ramayya KRISHNAN Conference Proceeding Article

PDF

Visual tracking via locality sensitive histograms, Shengfeng HE, Qingxiong YANG, Rynson W.H. LAU, Jian WANG, and Ming-Hsuan YANG Conference Proceeding Article

PDF

When Do Consumers Purchase Online?: Based on Inter-Purchase Time, Youngsoo KIM Conference Proceeding Article

Multi-core model checking algorithms for LTL verification with fairness assumptions, Xuan-Linh HA, Thanh Tho QUAN, Yang LIU, and Jun SUN Conference Proceeding Article

PDF

Main-stream media behaviour analysis on Twitter: A case study on UK general election, Zhongyu WEI, Yulan HE, Wei GAO, Binyang LI, Lanjun ZHOU, and Kam-Fai WONG Conference Proceeding Article

PDF

Accelerating optimistic HLA-based simulations in virtual execution environments, Zengxiang LI, Xiaorong LI, Nguyen Binh Duong TA, Wentong CAI, and Stephen John TURNER Conference Proceeding Article

PDF

Analyzing the friendliness of exchanges in an online software developer community, Brendan CLEARY, Margaret-Anne STOREY, Carlos GÓMEZ, Leif SINGER, and Christoph TREUDE Conference Proceeding Article

PDF

An architecture for online semantic labeling on UGVS, Arne SUPPE, Luis NAVARRO-SERMENT, Daniel MUNOZ, Drew BAGNELL, and Martial HEBERT Conference Proceeding Article

PDF

Anonymous authentication of visitors for mobile crowd sensing at amusement parks, Divyan KONIDALA, Robert H. DENG, Yingjiu LI, Hoong Chuin LAU, and Stephen FIENBERG Conference Proceeding Article

PDF

Behind the magical numbers: Hierarchical chunking and the human working memory capacity, Guoqi LI, Ning NING, Kiruthika RAMANATHAN, Wei HE, Li PAN, and Luping SHI Journal Article

PDF

Blogging developer knowledge: Motivations, challenges, and future directions, Chris PARNIN, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article

PDF

Cost-Sensitive Double Updating Online Learning and Its Application to Online Anomaly Detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article

PDF

Demand Forecasting Using a Growth Model and Negative Binomial Regression Framework, Cally Yeru ONG, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article

PDF

Designing leakage-resilient password entry on touchscreen mobile devices, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article

PDF

Disclosing climate change patterns using an adaptive markov chain pattern detection method, Zhaoxia WANG, Gary LEE, Hoong Maeng CHAN, Reuben LI, Xiuju FU, Rick GOH, Pauline A. W. POH KIM, Martin L. HIBBERD, and Hoong Chor CHIN Conference Proceeding Article

PDF

Distributed Gibbs: A memory-bounded sampling-based DCOP algorithm, Duc Thien NGUYEN, William YEOH, and Hoong Chuin LAU Conference Proceeding Article

PDF

Dynamic synthesis of local time requirement for service composition, Tian Huat TAN, Étienne ANDRÉ, Jun SUN, Yang LIU, Jin Song DONG, and Manman CHEN Conference Proceeding Article

PDF

Efficient extraction of JSON information in SAS using the SCANOVER function, Murphy CHOY and Kyong Jin SHIM Conference Proceeding Article

PDF

Enabling generative, emergent artificial culture, Jaroslaw KOCHANOWICZ, Ah-hwee TAN, and Daniel THALMANN Conference Proceeding Article

PDF

Energy-Neutral Scheduling and Forwarding in Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Weng Seng SOH, and Hwee-Pink TAN Journal Article

PDF

Enhancing robot perception using human teammates, Jean OH, Arne SUPPE, Anthony STENTZ, and Martial HEBERT Conference Proceeding Article

PDF

Expressive Search on Encrypted Data, Junzuo LAI, Xuhua ZHOU, Robert H. DENG, Yingjiu LI, and Kefei CHEN Conference Proceeding Article

PDF

FANS: Face annotation by searching large-scale web facial images, Steven HOI, Dayong WANG, I Yeu CHENG, Elmer LIN, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article

PDF

Fragmented social media: A look into selective exposure to political news, Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article

Link

Hybrid Mechanism for Heterogeneous E-Procurement Involving a Combinatorial Auction and Bargaining, He HUANG, Robert J. Kauffman, Hongyan XU, and Lan ZHAO Journal Article

PDF

Impact of Multimedia in Sina Weibo: Popularity and Life Span, Xun ZHAO, Feida ZHU, Weining QIAN, and Aoying ZHOU Conference Proceeding Article

PDF

Implementation of Slowly Changing Dimension to Data Warehouse to Manage Marketing Campaigns in Banks, Lihui WANG, Junyu CHOY, and Michelle L. F. CHEONG Conference Proceeding Article

PDF

It Is Not Just What We Say, But How We Say Them: LDA-based Behavior-Topic Model, Minghui QIU, Feida ZHU, and Jing JIANG Conference Proceeding Article

PDF

Leakage resilient authenticated key exchange secure in the auxiliary input model, Guomin YANG, Yi MU, Willy SUSILO, and Duncan S. WONG Conference Proceeding Article

PDF

Master Physician Scheduling Problem, Aldy GUNAWAN and Hoong Chuin LAU Journal Article

PDF

Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, Lwin Khin SHAR, Hee Beng Kuan TAN, and Lionel C. BRIAND Conference Proceeding Article

PDF

ONESPACE: Shared depth-corrected video interaction, David LEDO, Bon Adriel ASENIERO, Sebastian BORING, and Anthony TANG Conference Poster

OR-AHaD: An Opportunistic Routing Algorithm for Energy Harvesting WSN, Sanam Shirazi BEHESHTIHA, Hwee-Pink TAN, and Masoud SABAEI Book Chapter

PDF

Personal informatics in chronic illness management, Haley MACLEOD, Anthony TANG, and Sheelagh CARPENDALE Conference Proceeding Article

PDF

R-energy for evaluating robustness of dynamic networks, Ming GAO, Ee Peng LIM, and David LO Conference Proceeding Article

PDF

Retweeting: An act of viral users, susceptible users, or viral topics?, Tuan-Anh HOANG and Ee Peng LIM Conference Proceeding Article

PDF

Tag Recommendation in Software Information Sites, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Conference Proceeding Article

PDF

TESLA: An Energy-saving Agent that Leverages Schedule Flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Burcin Becerik-Gerber, and Milind Tambe Conference Proceeding Article

The application of decision tree to intensity change classification of tropical cyclones in western North Pacific, Wei ZHANG, Si GAO, Bin CHEN, and Kai CAO Journal Article

PDF

Tower of babel: a crowdsourcing game building sentiment lexicons for resource-scarce languages, Yoonsung HONG, Haewoon KWAK, Youngmin BAEK, and Sue. MOON Conference Proceeding Article

PDF

Traditional media seen from social media, Jisun AN, Daniele QUERCIA, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article

PDF

Unified entity search in social media community, Ting YAO, Yuan LIU, Chong-wah NGO, and Tao MEI Conference Proceeding Article

Using non-graded formative online exercises to increase the students’ motivation and performance in classroom: A longitudinal study from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article

PDF

Vehicle localization along a previously driven route using an image database, Hideyuki KUME, Arne SUPPE, and Arne SUPPE Conference Proceeding Article

PDF

Why individuals seek diverse opinions (or why they don't), Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article

PDF

Your love is public now: Questioning the use of personal information in authentication, Payas Gupta, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Paper

PDF

Your Love is Public Now: Questioning the Use of Personal Information in Authentication, Payas GUPTA, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Proceeding Article

PDF

Strong Location Privacy: A Case Study on Shortest Path Queries [Invited Paper], Kyriakos MOURATIDIS Conference Proceeding Article

PDF

ArrayTrack: A fine-grained indoor location system, Jie XIONG and Kyle JAMIESON Conference Proceeding Article

Link

Be Customer Wise or Otherwise: Combining Data Mining and Interactive Visual Analytics to Analyse Large and Complex Customer Resource Management (CRM) Data, Tin Seong KAM, Aditya Hridaya MISRA, and Jun Yao JI Conference Proceeding Article

PDF

Beta Atomic Contacts: Identifying Critical Specific Contacts in Protein Binding Interfaces, Qian LU, Chee Keong KWOH, and Steven C. H. HOI Journal Article

PDF

Circular reranking for visual search, Ting YAO and Chong-wah NGO Journal Article

PDF

Core versus peripheral information technology employees and their impact on firm performance, Ling LIU, Daniel Q. CHEN, Nan HU, Indranil BOSE, and Garry D. BRUTON Journal Article

PDF

Cross-domain password-based authenticated key exchange revisited, Liqun CHEN, Hoon Wei LIM, and Guomin YANG Conference Proceeding Article

PDF

Delayed insertion and rule effect moderation of domain knowledge for reinforcement learning, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article

PDF

Dynamic label propagation in social networks, Juan DU, Feida ZHU, and Ee Peng LIM Conference Proceeding Article

PDF

Enabling an integrated rate-temporal learning scheme on memristor, Wei HE, Kejie HUANG, Ning NING, Kiruthika RAMANATHAN, Guoqi LI, Yu JIANG, JiaYin SZE, Luping SHI, Rong ZHAO, and Jing PEI Journal Article

PDF

Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks, Guanfeng LIU, Yan WANG, Mehmet A. ORGUN, and Ee Peng LIM Journal Article

Link

F-Trail: Finding Patterns in Taxi Trajectories, Yasuko MATSUBARA, Evangelos Papalexakis, Lei LI, David LO, Yasushi Sakurai, and Christos Faloutsos Conference Proceeding Article

PDF

Information security as a credence good, Ping Fan KE, Kai-Lung HUI, and Wei Thoo YUE Conference Proceeding Article

PDF

Modeling Social Information Learning among Taxi Drivers, Siyuan LIU, Ramayya KRISHNAN, Emma BRUNSKILL, and Lionel NI Conference Proceeding Article

PDF

Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article