Submissions from 2013
Attribute-based encryption with verifiable outsourced decryption, Junzuo LAI, Robert H. DENG, Chaowen GUAN, and Jian WENG Journal Article
Automated Generation of Interaction Graphs for Value-Factored Decentralized POMDPs, William YEOH, Akshat KUMAR, and Shlomo Zilberstein Conference Proceeding Article
Best Upgrade Plans for Large Road Networks, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article
Click-boosting random walk for image search reranking, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Zheng-Jun ZHA, and Chong-Wah NGO Conference Proceeding Article
Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article
Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Paper
Cost-Sensitive Online Active Learning with application to malicious URL detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article
DelayFlow centrality for identifying critical nodes in transportation networks, Yew-Yih CHENG, Roy Ka Wei LEE, Ee-Peng LIM, and Feida ZHU Conference Proceeding Article
FloTra: Flower-shape trajectory mining for instance-specific parameter tuning, Lindawati LINDAWATI, Feida ZHU, and Hoong Chuin LAU Conference Paper
Hierarchical Parallel Algorithm for Modularity-Based Community Detection Using GPUs, Chun Yew CHEONG, Huynh Phung HUYNH, David LO, and Rick Siow Mong GOH Conference Proceeding Article
How many researchers does it take to make impact? Mining software engineering publication data for collaboration insights, Subhajit DATTA, Santonu SARKAR, Sajeev A. S. M., and Nishant KUMAR Conference Proceeding Article
Improving Patient Length-of-Stay in Emergency Department Through Dynamic Resource Allocation Policies, Kar Way TAN, Wei Hao TAN, and Hoong Chuin LAU Conference Proceeding Article
Incremental and accuracy-aware personalized pagerank through scheduled approximation, Fanwei ZHU, Yuan FANG, Kevin Chen-Chuan CHANG, and Jing YING Conference Proceeding Article
Integration of Social Media Technologies with ERP:A Prototype Implementation, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article
Interacting Knapsack Problem in Designing Resource Bundles, Truong Huy D. NGUYEN, Pradeep Reddy VARAKANTHAM, Hoong Chuin LAU, and Shih-Fen CHENG Conference Proceeding Article
Large scale online kernel classification, Jialei WANG, Peilin ZHAO, Steven C. H. HOI, Jinfeng ZHUANG, and Zhi-Yong LIU Conference Proceeding Article
Learning to name faces: A multimodal learning scheme for search-based face annotation, Dayong WANG, Steven C. H. HOI, Pengcheng WU, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article
Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack, Kai-Lung HUI, Seung-Hyun KIM, and QIU-HONG WANG Presentation
Multi-agent Orienteering Problem with Time-dependent Capacity Constraints, Cen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Conference Paper
Near-duplicate video retrieval: Current research and future trends, Jiajun LIU, Zi HUANG, Hongyun CAI, Heng Tao SHEN, Chong-wah NGO, and Wei WANG Journal Article
“Network-Theoretic” Queuing Delay Estimation in Theme Park Attractions, Ajay ARAVAMUDHAN, Archan MISRA, and Hoong Chuin LAU Conference Proceeding Article
Open source software development process model – A grounded theory approach, Keng SIAU and Y. TIAN Conference Proceeding Article
Parameter Learning for Latent Network Diffusion, Xiaojian WU, Akshat KUMAR, Daniel SHELDON, and Shlomo ZILBERSTEIN Conference Proceeding Article
Politics, sharing and emotion in microblogs, Tuan-Anh HOANG, William COHEN, Ee Peng LIM, Doug PIERCE, and David REDLAWSK Conference Proceeding Article
RiskVis: Supply chain visualization with risk management and real-time monitoring, Rick S. M. GOH, Zhaoxia WANG, Xiaofeng YIN, Xiuju FU, Loganathan PONNANBALAM, Sifei LU, and Xiaorong Li Conference Proceeding Article
Robust median reversion strategy for on-line portfolio selection, Dingjiang HUANG, Junlong ZHOU, Bin LI, Steven HOI, and Shuigeng ZHOU Conference Proceeding Article
Scalable randomized patrolling for securing rapid transit networks, Pradeep VARAKANTHAM, Hoong Chuin LAU, and Zhi YUAN Conference Proceeding Article
Self-organizing cognitive models for virtual agents, Yilin KANG and Ah-hwee TAN Conference Proceeding Article
Semantic overlay network for large-scale spatial information indexing, Zhiqiang ZOU, Yue WANG, Kai CAO, Tianshan QU, and Zhongmin WANG Journal Article
The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Conference Proceeding Article
Using contracts to guide the search-based verification of concurrent programs, Christopher M. POSKITT and Simon POULDING Conference Proceeding Article
USMMC: A self-contained model checker for UML state machines, Shuang LIU, Yang LIU, Jun SUN, Manchun ZHENG, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article
Vigilance adaptation in adaptive resonance theory, Lei MENG, Ah-hwee TAN, and Donald C. WINSCH Conference Proceeding Article
Analyzing Auction and Bargaining Mechanisms in E-Procurement with Supply Quality Risk, He HUANG, Hongyan XU, Robert J. Kauffman, and Ning SUN Journal Article
Performance Measurement Design for a Parcel Delivery Company, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Proceeding Article
Active Learning with Expert Advice, Peilin ZHAO, Steven C. H. HOI, and Jinfeng ZHUANG Conference Proceeding Article
Analyzing Auction and Bargaining Mechanism Design in E-Procurement with Quality Verification and Risk Aversion., H. Huang, H. Xu, Robert John KAUFFMAN, and N. Sun Journal Article
An analysis of post-selection in automatic tuning, Zhi Yuan, Thomas Stuetzle, Marco Montes De Oca, and Hoong Chuin LAU Conference Paper
An Empirical Study of Adoption of Software Testing in Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, and Lingxiao Jiang Conference Paper
An empirical study of adoption of software testing in open source projects, Pavneet Singh KOCHHAR, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article
An empirical study of bugs in software build systems, Xin XIA, Xiaozhen ZHOU, David LO, and Xiaoqiong ZHAO Conference Proceeding Article
Case study methodology in technology-focused Information Systems courses: Examining the students’ perspective, Ilse BAUMGARTNER Conference Proceeding Article
Coarse-grained parallel genetic algorithm applied to a vector based land use allocation optimization problem: The case study of Tongzhou Newtown, Beijing, China, Kai CAO and Xinyue YE Journal Article
Collective Diffusion Over Networks: Models and Inference, Akshat KUMAR, Daniel SHELDON, and Biplav SRIVASTAVA Conference Proceeding Article
Combining model checking and testing with an application to reliability prediction and distribution, Lin GUI, Jun SUN, Yang LIU, Yuanjie SI, Jin Song DONG, and Xinyu WANG Conference Proceeding Article
Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG, Junyu CHOY, and Nang Laik MA Conference Paper
Effective use of Data and Decision Analytics to Improve Order Distribution in a Supply Chain, Michelle Lee Fong CHEONG and Junyu CHOY Report
Improving tool support for software reverse engineering in a security context, Brendan CLEARY, Christoph TREUDE, Fernando FIGUEIRA FILHO, Margaret-Anne STOREY, and Martin SALOIS Conference Proceeding Article
Mining direct antagonistic communities in signed social networks, David LO, Didi SURIAN, Philips Kokoh PRASETYO, Zhang KUAN, and Ee Peng LIM Journal Article
MKBoost: A framework of multiple kernel boosting, Hao XIA and Steven C. H. HOI Journal Article
Orion: A software project search engine with integrated diverse software artifacts, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article
Platform Regulation on Seller Heterogeneity, Ruhai WU and Mei Lin Working Paper
Popularity, interoperability, and impact of programming languages in 100,000 open source projects, Tegawende F. BISSYANDE, Ferdian THUNG, David LO, Lingxiao JIANG, and Laurent Réveillère Conference Proceeding Article
PSyHCoS: Parameter synthesis for hierarchical concurrent real-time systems, Étienne ANDRÉ, Yang LIU, Jun SUN, Jin Song DONG, and Shang-Wei LIN Conference Proceeding Article
Real-life vehicle routing with non-standard constraints, Wee Leong Lee Conference Proceeding Article
Real-Life Vehicle Routing with Non-Standard Constraints, Wee Leong Lee
Reviving dormant ties in an online social network experiment, Ee Peng LIM, Denzil CORREA, David LO, Michael FINEGOLD, and Feida ZHU Conference Proceeding Article
Shortlisting Top-K Assignments, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article
Software Internationalization and Localization: An Industrial Experience, Xin XIA, David LO, Feng ZHU, Xinyu WANG, and Bo ZHOU Conference Proceeding Article
Technique for Authenticating H.264/SVC Streams in Surveillance Applications, Wei ZHUO, Robert H. DENG, Jialie SHEN, Yongdong WU, Xuhua DING, and Swee Won LO Conference Proceeding Article
TESLA: An extended study of an energy-saving agent that leverages schedule flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Milind Tambe, and Burcin Becerik-Gerber Journal Article
The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection, Joseph Joo Keng CHAN, Kiat Wee TAN, Lingxiao JIANG, and Rajesh Krishna BALAN Conference Proceeding Article
The Determinants of Monetary Value of Virtual Goods: An Empirical Study for a Cross-section of MMORPGs, QIU-HONG WANG, Viktor Mayer-Schonberger, and Xue YANG Journal Article
The Evolution of Modular Product Architectures and the Emergence of Platform Ecosystems, C. Jason WOODARD and Eric K. Clemons Conference Paper
Unified modeling language: The teen years and growing pains, J. ERICKSON and Keng SIAU Conference Proceeding Article
Usability of performance dashboards, usefulness of operational and tactical support, and quality of strategic support: A research framework, Bih-Ru LEA and Fiona Fui-hoon NAH Conference Proceeding Article
Using case studies to design and deliver technology-centered computing education courses: An innovative approach from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article
Video concept detection by learning from web images: A case study on cross domain learning, Shiai ZHU, Ting YAO, and Chong-wah NGO Conference Proceeding Article
Keystroke Timing Analysis of on-the-fly Web Apps, Chee Meng TEY, Payas GUPTA, Debin GAO, and YAN ZHANG Conference Proceeding Article
Online feature selection for model-based reinforcement learning, Trung Thanh Nguyen, Zhuoru Li, Tomi Silander, and Tze-Yun LEONG Conference Proceeding Article
Data driven modeling based on dynamic parsimonious fuzzy neural network, Mahardhika Pratama, Meng Joo ER, Xiang LI, Richard Jayadi OENTARYO, Edwin Lughofer, and Arifin Imam Journal Article
Adaptive Credit Scoring With Analytic Hierarchy Process, Kwang Yong KOH, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
A Direct Mining Approach To Efficient Constrained Graph Pattern Discovery, Feida ZHU, Zequn ZHANG, and Qiang QU Conference Proceeding Article
A formal semantics for complete UML state machines with communications, Shuang LIU, Yang LIU, Étienne ANDRÉ, Christine CHOPPY, Jun SUN, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article
A Latent Variable Model for Viewpoint Discovery from Threaded Forum Posts, Minghui QIU and Jing JIANG Conference Proceeding Article
A latent variable model for viewpoint discovery from threaded forum posts, Minghui QIU and Jing JIANG Conference Paper
A new unpredictability-based RFID privacy model, Anjia YANG, Yunhui ZHUANG, Duncan S. WONG, and Guomin YANG Conference Proceeding Article
Approximate Inference in Collective Graphical Models, Daniel SHELDON, Tao SUN, Akshat KUMAR, and Thomas G. DIETTERICH Conference Proceeding Article
Approximating the performance of a "Last Mile" transportation system, Hai WANG and Amedeo ODONI Presentation
Architectural Control and Value Migration in Layered Ecosystems: The Case of Open-Source Cloud Management Platforms, Richard TEE and C. Jason WOODARD Conference Paper
A Tool for Designing Business Model Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article
Attribute-based access to scalable media in cloud-assisted content sharing, Yongdong WU, Zhuo Wei, and Robert H. DENG Journal Article
CAMEO: A Middleware for Mobile Advertisement Delivery, Azeem J. KHAN, Kasthuri JAYARAJAH, Dongsu HAN, Archan MISRA, Rajesh Krishna BALAN, and Srinivasan SESHAN Conference Proceeding Article
Collaborative urban logistics – Synchronizing the last mile, Robert DE SOUZA, Mark GOH, Hoong Chuin LAU, Wee-Siong NG, and Puay-Siew TAN Conference Proceeding Article
CUGAR: A model for open innovation in Science and Technology Parks, Arcot Desai NARASIMHALU Journal Article
Demo: SocioPhone: Everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article
Energy-efficient collaborative query processing framework for mobile sensing services, Jin YANG, Tianli MO, Lipyeow LIM, Kai Uwe SATTLER, and Archan MISRA Conference Proceeding Article
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing, Fengjun LI, Bo LUO, Peng LIU, Dongwon LEE, and Chao-Hsien CHU Journal Article
Experiences with Performance Tradeoffs in Practical, Continuous Indoor Localization, Azeem J. KHAN, Vikash RANJAN, Trung-Tuan LUONG, Rajesh Krishna BALAN, and Archan MISRA Conference Proceeding Article
HUNTS: A Trajectory Recommendation System for Effective and Efficient Hunting of Taxi Passengers, Ye DING, Siyuan LIU, Jiansu PU, and Lionel NI Conference Proceeding Article
Improved reachability analysis in DTMC via divide and conquer, Songzheng SONG, Lin GUI, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Improving Internet Security Through Social Information and Social Comparison: A Field Quasi-Experiment, Qian TANG, Leigh L. LINDEN, John S. QUARTERMAN, and Andrew B. WHINSTON Conference Paper
Introducing programmers to pair programming: A controlled experiment, A. S. M. Sajeev and Subhajit DATTA Conference Proceeding Article
Launching generic attacks on iOS with approved third-party applications, Jin HAN, Mon Kywe SU, Qiang YAN, Feng BAO, Robert H. DENG, Debin GAO, Yingjiu LI, and Jianying ZHOU Conference Proceeding Article
Mining User Relations from Online Discussions using Sentiment Analysis and Probabilistic Matrix Factorization, Minghui QIU, Liu YANG, and Jing JIANG Conference Proceeding Article
Mining user relations from online discussions using sentiment analysis and probabilistic matrix factorization, Minghui QIU, Liu Yang, and Jing JIANG Conference Paper
Mitigating Access-Driven Timing Channels in Clouds using StopWatch, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article
Real Time Event Detection in Twitter, Xun WANG, Feida ZHU, Jing JIANG, and Sujian LI Conference Proceeding Article
Risk balance defense approach against intrusions for network server, Chengpo MU, Meng YU, Yingjiu LI, and Wanyu Zang Journal Article
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, and Junehwa Song Conference Paper