Submissions from 2013
Video concept detection by learning from web images: A case study on cross domain learning, Shiai ZHU, Ting YAO, and Chong-wah NGO Conference Proceeding Article
Keystroke Timing Analysis of on-the-fly Web Apps, Chee Meng TEY, Payas GUPTA, Debin GAO, and YAN ZHANG Conference Proceeding Article
Online feature selection for model-based reinforcement learning, Trung Thanh Nguyen, Zhuoru Li, Tomi Silander, and Tze-Yun LEONG Conference Proceeding Article
Data driven modeling based on dynamic parsimonious fuzzy neural network, Mahardhika Pratama, Meng Joo ER, Xiang LI, Richard Jayadi OENTARYO, Edwin Lughofer, and Arifin Imam Journal Article
Adaptive Credit Scoring With Analytic Hierarchy Process, Kwang Yong KOH, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
A Direct Mining Approach To Efficient Constrained Graph Pattern Discovery, Feida ZHU, Zequn ZHANG, and Qiang QU Conference Proceeding Article
A formal semantics for complete UML state machines with communications, Shuang LIU, Yang LIU, Étienne ANDRÉ, Christine CHOPPY, Jun SUN, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article
A latent variable model for viewpoint discovery from threaded forum posts, Minghui QIU and Jing JIANG Conference Paper
A Latent Variable Model for Viewpoint Discovery from Threaded Forum Posts, Minghui QIU and Jing JIANG Conference Proceeding Article
A new unpredictability-based RFID privacy model, Anjia YANG, Yunhui ZHUANG, Duncan S. WONG, and Guomin YANG Conference Proceeding Article
Approximate Inference in Collective Graphical Models, Daniel SHELDON, Tao SUN, Akshat KUMAR, and Thomas G. DIETTERICH Conference Proceeding Article
Approximating the performance of a "Last Mile" transportation system, Hai WANG and Amedeo ODONI Presentation
Architectural Control and Value Migration in Layered Ecosystems: The Case of Open-Source Cloud Management Platforms, Richard TEE and C. Jason WOODARD Conference Paper
A Tool for Designing Business Model Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article
Attribute-based access to scalable media in cloud-assisted content sharing, Yongdong WU, Zhuo Wei, and Robert H. DENG Journal Article
CAMEO: A Middleware for Mobile Advertisement Delivery, Azeem J. KHAN, Kasthuri JAYARAJAH, Dongsu HAN, Archan MISRA, Rajesh Krishna BALAN, and Srinivasan SESHAN Conference Proceeding Article
Collaborative urban logistics – Synchronizing the last mile, Robert DE SOUZA, Mark GOH, Hoong Chuin LAU, Wee-Siong NG, and Puay-Siew TAN Conference Proceeding Article
CUGAR: A model for open innovation in Science and Technology Parks, Arcot Desai NARASIMHALU Journal Article
Demo: SocioPhone: Everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article
Energy-efficient collaborative query processing framework for mobile sensing services, Jin YANG, Tianli MO, Lipyeow LIM, Kai Uwe SATTLER, and Archan MISRA Conference Proceeding Article
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing, Fengjun LI, Bo LUO, Peng LIU, Dongwon LEE, and Chao-Hsien CHU Journal Article
Experiences with Performance Tradeoffs in Practical, Continuous Indoor Localization, Azeem J. KHAN, Vikash RANJAN, Trung-Tuan LUONG, Rajesh Krishna BALAN, and Archan MISRA Conference Proceeding Article
HUNTS: A Trajectory Recommendation System for Effective and Efficient Hunting of Taxi Passengers, Ye DING, Siyuan LIU, Jiansu PU, and Lionel NI Conference Proceeding Article
Improved reachability analysis in DTMC via divide and conquer, Songzheng SONG, Lin GUI, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Improving Internet Security Through Social Information and Social Comparison: A Field Quasi-Experiment, Qian TANG, Leigh L. LINDEN, John S. QUARTERMAN, and Andrew B. WHINSTON Conference Paper
Introducing programmers to pair programming: A controlled experiment, A. S. M. Sajeev and Subhajit DATTA Conference Proceeding Article
Launching generic attacks on iOS with approved third-party applications, Jin HAN, Mon Kywe SU, Qiang YAN, Feng BAO, Robert H. DENG, Debin GAO, Yingjiu LI, and Jianying ZHOU Conference Proceeding Article
Mining User Relations from Online Discussions using Sentiment Analysis and Probabilistic Matrix Factorization, Minghui QIU, Liu YANG, and Jing JIANG Conference Proceeding Article
Mining user relations from online discussions using sentiment analysis and probabilistic matrix factorization, Minghui QIU, Liu Yang, and Jing JIANG Conference Paper
Mitigating Access-Driven Timing Channels in Clouds using StopWatch, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article
Real Time Event Detection in Twitter, Xun WANG, Feida ZHU, Jing JIANG, and Sujian LI Conference Proceeding Article
Risk balance defense approach against intrusions for network server, Chengpo MU, Meng YU, Yingjiu LI, and Wanyu Zang Journal Article
SocioPhone: Everyday Face-to-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, and Junehwa Song Conference Paper
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper
Think Twice before you Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks, YAN LI, Yingjiu LI, Qiang YAN, and Robert H. DENG Conference Proceeding Article
T-Watcher: A New Visual Analytic System for Effective Traffic Surveillance, Jiansu PU, Siyuan LIU, Ye DING, Huamin QU, and Lionel NI Conference Proceeding Article
Understanding Sequential Decisions via Inverse Reinforcement Learning, Siyuan LIU, Miguel ARAUJO, Emma BRUNSKILL, Rosaldo ROSSETTI, Joao BARROS, and Ramayya KRISHNAN Conference Proceeding Article
Visual tracking via locality sensitive histograms, Shengfeng HE, Qingxiong YANG, Rynson W.H. LAU, Jian WANG, and Ming-Hsuan YANG Conference Proceeding Article
When Do Consumers Purchase Online?: Based on Inter-Purchase Time, Youngsoo KIM Conference Proceeding Article
Multi-core model checking algorithms for LTL verification with fairness assumptions, Xuan-Linh HA, Thanh Tho QUAN, Yang LIU, and Jun SUN Conference Proceeding Article
Main-stream media behaviour analysis on Twitter: A case study on UK general election, Zhongyu WEI, Yulan HE, Wei GAO, Binyang LI, Lanjun ZHOU, and Kam-Fai WONG Conference Proceeding Article
Accelerating optimistic HLA-based simulations in virtual execution environments, Zengxiang LI, Xiaorong LI, Nguyen Binh Duong TA, Wentong CAI, and Stephen John TURNER Conference Proceeding Article
Analyzing the friendliness of exchanges in an online software developer community, Brendan CLEARY, Margaret-Anne STOREY, Carlos GÓMEZ, Leif SINGER, and Christoph TREUDE Conference Proceeding Article
An architecture for online semantic labeling on UGVS, Arne SUPPE, Luis NAVARRO-SERMENT, Daniel MUNOZ, Drew BAGNELL, and Martial HEBERT Conference Proceeding Article
Anonymous authentication of visitors for mobile crowd sensing at amusement parks, Divyan KONIDALA, Robert H. DENG, Yingjiu LI, Hoong Chuin LAU, and Stephen FIENBERG Conference Proceeding Article
Behind the magical numbers: Hierarchical chunking and the human working memory capacity, Guoqi LI, Ning NING, Kiruthika RAMANATHAN, Wei HE, Li PAN, and Luping SHI Journal Article
Blogging developer knowledge: Motivations, challenges, and future directions, Chris PARNIN, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article
Cost-Sensitive Double Updating Online Learning and Its Application to Online Anomaly Detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article
Demand Forecasting Using a Growth Model and Negative Binomial Regression Framework, Cally Yeru ONG, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
Designing leakage-resilient password entry on touchscreen mobile devices, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Disclosing climate change patterns using an adaptive markov chain pattern detection method, Zhaoxia WANG, Gary LEE, Hoong Maeng CHAN, Reuben LI, Xiuju FU, Rick GOH, Pauline A. W. POH KIM, Martin L. HIBBERD, and Hoong Chor CHIN Conference Proceeding Article
Distributed Gibbs: A memory-bounded sampling-based DCOP algorithm, Duc Thien NGUYEN, William YEOH, and Hoong Chuin LAU Conference Proceeding Article
Dynamic synthesis of local time requirement for service composition, Tian Huat TAN, Étienne ANDRÉ, Jun SUN, Yang LIU, Jin Song DONG, and Manman CHEN Conference Proceeding Article
Efficient extraction of JSON information in SAS using the SCANOVER function, Murphy CHOY and Kyong Jin SHIM Conference Proceeding Article
Enabling generative, emergent artificial culture, Jaroslaw KOCHANOWICZ, Ah-hwee TAN, and Daniel THALMANN Conference Proceeding Article
Energy-Neutral Scheduling and Forwarding in Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Weng Seng SOH, and Hwee-Pink TAN Journal Article
Enhancing robot perception using human teammates, Jean OH, Arne SUPPE, Anthony STENTZ, and Martial HEBERT Conference Proceeding Article
Expressive Search on Encrypted Data, Junzuo LAI, Xuhua ZHOU, Robert H. DENG, Yingjiu LI, and Kefei CHEN Conference Proceeding Article
FANS: Face annotation by searching large-scale web facial images, Steven HOI, Dayong WANG, I Yeu CHENG, Elmer LIN, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article
Fragmented social media: A look into selective exposure to political news, Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article
Hybrid Mechanism for Heterogeneous E-Procurement Involving a Combinatorial Auction and Bargaining, He HUANG, Robert J. Kauffman, Hongyan XU, and Lan ZHAO Journal Article
Impact of Multimedia in Sina Weibo: Popularity and Life Span, Xun ZHAO, Feida ZHU, Weining QIAN, and Aoying ZHOU Conference Proceeding Article
Implementation of Slowly Changing Dimension to Data Warehouse to Manage Marketing Campaigns in Banks, Lihui WANG, Junyu CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
It Is Not Just What We Say, But How We Say Them: LDA-based Behavior-Topic Model, Minghui QIU, Feida ZHU, and Jing JIANG Conference Proceeding Article
Leakage resilient authenticated key exchange secure in the auxiliary input model, Guomin YANG, Yi MU, Willy SUSILO, and Duncan S. WONG Conference Proceeding Article
Master Physician Scheduling Problem, Aldy GUNAWAN and Hoong Chuin LAU Journal Article
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, Lwin Khin SHAR, Hee Beng Kuan TAN, and Lionel C. BRIAND Conference Proceeding Article
ONESPACE: Shared depth-corrected video interaction, David LEDO, Bon Adriel ASENIERO, Sebastian BORING, and Anthony TANG Conference Poster
OR-AHaD: An Opportunistic Routing Algorithm for Energy Harvesting WSN, Sanam Shirazi BEHESHTIHA, Hwee-Pink TAN, and Masoud SABAEI Book Chapter
Personal informatics in chronic illness management, Haley MACLEOD, Anthony TANG, and Sheelagh CARPENDALE Conference Proceeding Article
R-energy for evaluating robustness of dynamic networks, Ming GAO, Ee Peng LIM, and David LO Conference Proceeding Article
Retweeting: An act of viral users, susceptible users, or viral topics?, Tuan-Anh HOANG and Ee Peng LIM Conference Proceeding Article
Tag Recommendation in Software Information Sites, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Conference Proceeding Article
TESLA: An Energy-saving Agent that Leverages Schedule Flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Burcin Becerik-Gerber, and Milind Tambe Conference Proceeding Article
The application of decision tree to intensity change classification of tropical cyclones in western North Pacific, Wei ZHANG, Si GAO, Bin CHEN, and Kai CAO Journal Article
Tower of babel: a crowdsourcing game building sentiment lexicons for resource-scarce languages, Yoonsung HONG, Haewoon KWAK, Youngmin BAEK, and Sue. MOON Conference Proceeding Article
Traditional media seen from social media, Jisun AN, Daniele QUERCIA, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article
Unified entity search in social media community, Ting YAO, Yuan LIU, Chong-wah NGO, and Tao MEI Conference Proceeding Article
Using non-graded formative online exercises to increase the students’ motivation and performance in classroom: A longitudinal study from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article
Vehicle localization along a previously driven route using an image database, Hideyuki KUME, Arne SUPPE, and Arne SUPPE Conference Proceeding Article
Why individuals seek diverse opinions (or why they don't), Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article
Your love is public now: Questioning the use of personal information in authentication, Payas Gupta, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Paper
Your Love is Public Now: Questioning the Use of Personal Information in Authentication, Payas GUPTA, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Proceeding Article
Strong Location Privacy: A Case Study on Shortest Path Queries [Invited Paper], Kyriakos MOURATIDIS Conference Proceeding Article
ArrayTrack: A fine-grained indoor location system, Jie XIONG and Kyle JAMIESON Conference Proceeding Article
Be Customer Wise or Otherwise: Combining Data Mining and Interactive Visual Analytics to Analyse Large and Complex Customer Resource Management (CRM) Data, Tin Seong KAM, Aditya Hridaya MISRA, and Jun Yao JI Conference Proceeding Article
Beta Atomic Contacts: Identifying Critical Specific Contacts in Protein Binding Interfaces, Qian LU, Chee Keong KWOH, and Steven C. H. HOI Journal Article
Circular reranking for visual search, Ting YAO and Chong-wah NGO Journal Article
Core versus peripheral information technology employees and their impact on firm performance, Ling LIU, Daniel Q. CHEN, Nan HU, Indranil BOSE, and Garry D. BRUTON Journal Article
Cross-domain password-based authenticated key exchange revisited, Liqun CHEN, Hoon Wei LIM, and Guomin YANG Conference Proceeding Article
Delayed insertion and rule effect moderation of domain knowledge for reinforcement learning, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article
Dynamic label propagation in social networks, Juan DU, Feida ZHU, and Ee Peng LIM Conference Proceeding Article
Enabling an integrated rate-temporal learning scheme on memristor, Wei HE, Kejie HUANG, Ning NING, Kiruthika RAMANATHAN, Guoqi LI, Yu JIANG, JiaYin SZE, Luping SHI, Rong ZHAO, and Jing PEI Journal Article
Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks, Guanfeng LIU, Yan WANG, Mehmet A. ORGUN, and Ee Peng LIM Journal Article
F-Trail: Finding Patterns in Taxi Trajectories, Yasuko MATSUBARA, Evangelos Papalexakis, Lei LI, David LO, Yasushi Sakurai, and Christos Faloutsos Conference Proceeding Article
Information security as a credence good, Ping Fan KE, Kai-Lung HUI, and Wei Thoo YUE Conference Proceeding Article
Modeling Social Information Learning among Taxi Drivers, Siyuan LIU, Ramayya KRISHNAN, Emma BRUNSKILL, and Lionel NI Conference Proceeding Article
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article