The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2014

Link

Automatic detection and quantification of brain midline shift using anatomical marker model, Ruizhe LIU, Shimiao LI, Bolan SU, Chew Lim TAN, Tze-Yun LEONG, Boon Chuan PANG, C.C. Tchoyoson LIM, and Cheng Kiang LEE Journal Article

Link

Collaboration patterns in software developer network, Didi SURIAN, David LO, and Ee Peng LIM Encyclopaedia

Competition between Software-as-a-Service Vendors, Dan MA and Robert John KAUFFMAN Journal Article

PDF

Complexity of the soundness problem of workflow nets, Guan Jun LIU, Jun SUN, Yang LIU, and Jin Song DONG Journal Article

Consumer Informedness and Firm Information Strategy., T. Li, Robert John Kauffman, van Heck Eric, Peter Vervest, and B. Dellaert Journal Article

Consumer Informedness and Firm Information Strategy: Evidence from a Choice Experiment, T. Li, Robert John Kauffman, E. van Heck, and P. Vervest Journal Article

Consumer Informedness and Firm Information Strategy: Evidence from a Choice Experiment, T. Li, Robert John Kauffman, E. van Heck, and P. Vervest Journal Article

PDF

Coupling graphs, efficient algorithms and B-Cell Epitope prediction, Liang ZHAO, Steven C. H. HOI, Zhenhua LI, Limsoon WONG, and Hung NGUYEN Journal Article

PDF

Cross-domain password-based authenticated key exchange revisited, Liqun CHEN, Hoon Wei LIM, and Guomin YANG Journal Article

PDF

Detecting click fraud in online advertising: A data mining approach, Richard OENTARYO, Ee Peng LIM, Michael FINEGOLD, David LO, Feida ZHU, Clifton PHUA, Eng-Yeow CHEU, Ghim-Eng YAP, Kelvin SIM, Kasun PERERA, Bijay NEUPANE, Mustafa FAISAL, Zeyar AUNG, Wei Lee WOON, Wei CHEN, Dhaval PATEL, and Daniel BERRAR Journal Article

Dynamic Platform Pricing with Innovative Products, Mei LIN and X. Pan Working Paper

PDF

Evaluating electronic market designs: The effects of competitive arousal and social facilitation on electronic group buying, Yuecheng Yu, Karl R. LANG, and Alex PELAEZ Conference Proceeding Article

Extended Comprehensive Study of Association Measures for Fault Localization, Lucia -, David LO, Lingxiao JIANG, Ferdian Thung, and Aditya Budi Journal Article

Externalities, Incentives and Strategic Complementarities: Understanding Herd Behavior in IT Adoption, X. Li, Robert John Kauffman, F. Yu, and Y. Zhang Journal Article

PDF

Free market of crowdsourcing: Incentive mechanism design for mobile sensing, Xinglin ZHANG, Zheng YANG, Zimu ZHOU, Haibin CAI, Lei CHEN, and Xiang-Yang LI Journal Article

PDF

Free market of crowdsourcing: Incentive mechanism design for mobile sensing, Xinglin ZHANG, Zheng YANG, Zimu ZHOU, Haibin CAI, Lei CHEN, and Xiang-Yang LI Journal Article

Get Trained, Be Future-Ready, Lee Fong Michelle CHEONG News Article

PDF

How Can Consumer Preferences Be Leveraged for Targeted Upselling in Cable TV Services?, Bing Tian DAI Conference Paper

PDF

How Can Substitution and Complementarity Effects Be Leveraged for Broadband Internet Services Strategy?, Gwangjae JUNG, Young Soo KIM, and Robert J. Kauffman Conference Proceeding Article

Impact, team size, collaboration, and epochs: Stories from four decades of software engineering research, Subhajit DATTA, A. SAJEEV, S. SARKAR, and N. KUMAR Journal Article

PDF

Inferring the untold: Mining software engineering research publication networks, Santonu SARKAR and Subhajit DATTA Journal Article

Innovations in Financial IS and Technology Ecosystems: High-Frequency Trading Systems in the Equity Market, Robert J. Kauffman, Jun Liu, and Dan Ma Journal Article

PDF

Innovative applications and security of internet of things, Yingjiu LI, Yingjiu LI, and Nai-Wei LO Transcript

Investments in Internet-based Innovations in Financial Services: Strategic Advantage or Strategic Necessity?, K. Goh and Robert John Kauffman Journal Article

PDF

Learning to recommend descriptive tags for questions in social forums, Liqiang NIE, Yiliang ZHAO, Xiangyu WANG, Jialie SHEN, and Tat-Seng CHUA Journal Article

Link

Leveraging machine learning and information retrieval techniques in software evolution tasks: Summary of the first MALIR-SE Workshop, at ASE 2013, - LUCIA, David LO, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, and Collin McMillan Journal Article

Link

Leveraging Web 2.0 for Software Evolution, Yuan TIAN and David LO Book Chapter

PDF

Loki: A privacy-conscious platform for crowdsourced surveys, Thivya KANDAPPU, Vijay SIVARAMAN, Arik FRIEDMAN, and Roksana BORELI Conference Proceeding Article

PDF

Measuring and modelling the thermal performance of the Tamar Suspension Bridge using a wireless sensor network, Nicholas DE BATTISTA, James M. W. BROWNJOHN, Hwee-Pink TAN, and Ki Young KOO Journal Article

Link

Mining Long Patterns, Feida ZHU Book Chapter

PDF

Mining weakly labeled web facial images for search-based face annotation, Dayong WANG, Steven C. H. HOI, Ying HE, and Jianke ZHU Journal Article

PDF

Mini-track introduction: Information economics, competition, regulation, law and society, Eric K. CLEMONS, Robert John KAUFFMAN, and Thomas A. WEBER Conference Proceeding Article

Multi-agent orienteering problem with time-dependent capacity constraints, Chen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Journal Article

PDF

On Empirical Validation of Compactness Measures for Electoral Redistricting and Its Significance for Application of Models in the Social Sciences, Christine CHOU, Steven O. KIMBROUGH, Frederic H. MURPHY, John SULLIVAN-FEDOCK, and C. Jason WOODARD Journal Article

PDF

Online Multiple Kernel Similarity Learning for Visual Search, Hao Xia, Chu Hong HOI, Rong Jin, and Peilin Zhao Journal Article

PDF

Online portfolio selection: A survey, Bin LI and Steven C. H. HOI Journal Article

PDF

On the security of auditing mechanisms for secure cloud storage, Yong YU, Lei NIU, Guomin YANG, Yi MU, and Willy SUSILO Journal Article

On Understanding Diffusion Dynamics of Patrons at a Themepark, Jiali DU, Akshat KUMAR, and Pradeep Varkantham

Link

Panel Data Analysis Via Variable Selection and Subject Clustering, Haibing LU, Shengsheng HUANG, Yingjiu LI, and Yanjiang YANG Book Chapter

PDF

Personalizing Software Development Practice Using Mastery-based Coaching, Chris BOESCH and Sandra BOESCH Conference Paper

Platform Pricing with Endogenous Network Effects, Mei Lin, Ruhai Wu, and Wen Zhou Working Paper

PDF

Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data, Hwee Hwa PANG and Xuhua DING Journal Article

Link

Real Time Process Compliance Checking using Nomenclature Approach, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Paper

Reshaping Society through Analytics, Collaboration, and Decision Support: Role of Business Intelligence and Social Media, Lee Fong Michelle Cheong and Junyu Choy Book Chapter

RFID Security and Privacy, Yingjiu Li, Huijie Robert Deng, and Elisa Bertino Book

Risk balance defense approach against intrusions for network server, Chengpo Mu, Meng Yu, Yingjiu Li, and Wanyu Zang Journal Article

PDF

Risk minimization of disjunctive temporal problem with uncertainty, Hoong Chuin LAU and Tuan Anh HOANG Conference Proceeding Article

PDF

Running and Chasing: The Competition between Paid Search Marketing and Search Engine Optimization, Kai LI, Mei LIN, Zhangxi LIN, and Bo XING Conference Proceeding Article

PDF

Sherlock: Microenvironment sensing for smartphones, Zheng YANG, Longfei SHANGGUAN, Weixi GU, Zimu ZHOU, Chenshu WU, and Yunhao LIU Journal Article

Solving Risk-Sensitive Stochastic Orienteering Problems using Optimization and Local Search, Pradeep Reddy VARAKANTHAM, Akshat KUMAR, Hoong Chuin LAU, and William Yeoh Journal Article

Solving Selfish Routing Problems with Involuntary Movements and Bounded Rationality, Pradeep Reddy VARAKANTHAM, Asrar Ahmed, and Shih-Fen Cheng Working Paper

PDF

Strategic Decision Support System using Heuristic Algorithm for Practical Outlet Zones Allocation to Dealers in a Beer Supply Distribution Network, Michelle Lee Fong CHEONG Conference Proceeding Article

Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert John KAUFFMAN, Jun LIU, and Dan MA

PDF

The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna BALAN, Youngki LEE, Kiat Wee TAN, and Archan MISRA Conference Proceeding Article

The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna Balan, Youngki Lee, Kiat Wee Tan, and Archan Misra Conference Paper

The impact of corporate social responsibility activities on brand evaluation, M. TIAN, C. LI, and Keng SIAU Journal Article

Twitter microblog sentiment analysis, Guangxia LI, Kuiyu CHANG, and Steven C. H. HOI Book Chapter

Understanding the Paradigm Shift in Computational Social Science in the Presence of Big Data, M. Chang, Robert John Kauffman, and Y.O Kwon Journal Article

PDF

WenZher: Comprehensive Vertical search for Healthcare Domain, Liqiang Nie, Tao Li, Mohammad Akbari, Jialie SHEN, and Tat-Seng CHUA Conference Proceeding Article

Submissions from 2013

PDF

Designing Optimal Innovation Portfolio, Arcot Desai NARASIMHALU Conference Paper

PDF

Adaptive computer‐generated forces for simulator‐based training, Expert Systems with Applications, Teck-Hou TENG, Ah-hwee TAN, and Loo-Nin TEOW Journal Article

PDF

A Dynamic Programming Approach to Achieving an Optimal End State along a Serial Production Line, Shih-Fen CHENG, Blake E. Nicholson, Marina A. Epelman, Daniel J. Reaume, and Robert L. Smith Journal Article

PDF

A Local Social Network Approach for Research Management, Xiaoyan LIU, Zhiling GUO, Zhenjiang LIN, and Jian MA Journal Article

PDF

An Agent-based Simulation Approach to Experience Management in Theme Parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article

PDF

An efficient partial shape matching algorithm for 3D tooth recognition, Zhiyuan ZHANG, Xin ZHONG, Sim Heng ONG, and Kelvin W. C. FOONG Conference Proceeding Article

PDF

An integrated model of team motivation and worker skills for a computer-based project management simulation, Wee Leong Lee Conference Proceeding Article

PDF

A secure and effective anonymous user authentication scheme for roaming service in global mobility networks, Fengtong WEN, Willy SUSILO, and Guomin YANG Journal Article

PDF

A simple integration of social relationship and text data for identifying potential customers in microblogging, Guansong PANG, Shengyi JIANG, and Dongyi CHEN Conference Proceeding Article

PDF

Coupling alignments with recognition for still-to-video face recognition, Zhiwu HUANG, X. ZHAO, S. SHAN, R. WANG, and X. CHEN Conference Proceeding Article

Damaged Services: Why Interruptible Spot-Priced Cloud Computing Services are Worthwhile to Offer with Uninterruptible Reserved Services, Jianhui HUANG, Robert J. KAUFFMAN, and Dan MA Conference Paper

PDF

Decision trees to model the impact of disruption and recovery in supply chain networks, Loganathan PONNANBALAM, L. WENBIN, Xiuju FU, Xiaofeng YIN, Zhaoxia WANG, and Rick S. M. GOH Conference Proceeding Article

PDF

Dense image correspondence under large appearance variations, Linlin LIU, Kok-Lim LOW, and Wen-yan LIN Conference Proceeding Article

PDF

Dynamic joint sentiment-topic mode, Yulan HE, Chenghua LIN, Wei GAO, and Kam-Fai WONG Journal Article

Dynamic Platform Pricing on Innovative Products, Mei LIN and Xiajun Pan Working Paper

PDF

Exposing and mitigating privacy loss in crowdsourced survey platforms, Thivya KANDAPPU, Vijay SIVARAMAN, Arik FRIEDMAN, and Roksana BORELL Conference Proceeding Article

PDF

Factors influencing research contributions and researcher interactions in software engineering: An empirical study, Subhajit DATTA, A. S. M. Sajeev, Santonu SARKAR, and Nishant KUMAR Conference Proceeding Article

PDF

Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks, Luiz Felipe VIERA, Mario GERLA, and Archan MISRA Journal Article

PDF

Hibernating Process: Modeling Mobile Calls at Multiple Scales, Siyuan LIU, Lei LI, and Ramayya KRISHNAN Conference Proceeding Article

PDF

Improving patient length-of-stay in emergency department through dynamic queue management, Kar Way TAN, Hoong Chuin LAU, and Francis Chun Yue LEE Conference Proceeding Article

PDF

Modeling Preferences with Availability Constraints, Bingtian DAI and Hady W. LAUW Conference Proceeding Article

PDF

Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat CHUA, Richard Jayadi Oentaryo, and Ee Peng LIM Conference Proceeding Article

PDF

Partial least squares regression on Grassmannian manifold for emotion recognition, M. LIU, R. WANG, Zhiwu HUANG, S. SHAN, and X. CHEN Conference Proceeding Article

PDF

Query-document-dependent fusion: A case study of multimodal music retrieval, Zhonghua LI, Bingjun ZHANG, Yi YU, Jialie SHEN, and Ye WANG Journal Article

Link

RFID Security and Privacy, Yingjiu LI, Robert H. DENG, and Elisa BERTINO Book

PDF

Social media for supply chain risk management, Xiuju FU, Rick S. M. GOH, J. C. Tong, Loganathan PONNANBALAM, Xiaofeng YIN, Zhaoxia WANG, H. Y. Xu, and Sifei LU Conference Proceeding Article

PDF

The influence of online word-of-mouth on long tail formation, Bin GU, Qian TANG, and Andrew B. WHINSTON Journal Article

PDF

TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee Peng LIM, and Ke WANG Conference Proceeding Article

PDF

Towards a hybrid framework for detecting input manipulation vulnerabilities, Sun DING, Hee Beng Kuan TAN, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article

PDF

Two Formulas for Success in Social Media: Social Learning and Network Effects, Liangfei QIU, Qian TANG, and Andrew B. Whinston Conference Paper

Unsupervised medical image classification by combining case-based classifiers, Thien Anh Dinh, Tomi Silander, Bolan Su, Tianxia Gong, Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang Lee, Chew Lim Tan, and Tze-Yun LEONG Conference Proceeding Article

PDF

Defending against heap overflow by using randomization in nested virtual clusters, Chee Meng TEY and Debin GAO Conference Proceeding Article

PDF

Adaptive regret minimization in bounded-memory games, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, and Arunesh SINHA Conference Paper

PDF

Achieving revocable fine-grained cryptographic access control over cloud data, Yanjiang YANG, Xuhua DING, Haibing LU, Zhiguo WAN, and Jianying ZHOU Conference Proceeding Article

PDF

Adaptable ciphertext-policy attribute-based encryption, Junzuo LAI, Robert H. DENG, Yanjiang YANG, and Jian WENG Conference Proceeding Article

PDF

A link-bridged topic model for cross-domain document classification, Pei YANG, Wei GAO, Qi TAN, and Kam-Fai WONG Journal Article

An agent-based simulation approach to experience management in theme parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Presentation

PDF

A scalable approach for malware detection through bounded feature space behavior modeling, Mahinthan CHANDRAMOHAN, Hee Beng Kuan TAN, Lionel C BRIAND, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article

PDF

A Social Network-Empowered Research Analytics Framework for Project Selection, Thushari SILVA, Zhiling GUO, Jian MA, Hongbing JIANG, and Huaping CHEN Journal Article

PDF

Assessing the Moderating Effect of Consumer Product Knowledge and Online Shopping Experience on using Recommedation Agents for Customer Loyalty, Victoria Y. YOON, R. Eric HOSTLER, Zhiling GUO, and Tor GUIMARAES Journal Article

PDF

Automatically partition software into least privilege components using dynamic data dependency analysis, Yongzheng WU, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article