Submissions from 2014
Automatic detection and quantification of brain midline shift using anatomical marker model, Ruizhe LIU, Shimiao LI, Bolan SU, Chew Lim TAN, Tze-Yun LEONG, Boon Chuan PANG, C.C. Tchoyoson LIM, and Cheng Kiang LEE Journal Article
Collaboration patterns in software developer network, Didi SURIAN, David LO, and Ee Peng LIM Encyclopaedia
Competition between Software-as-a-Service Vendors, Dan MA and Robert John KAUFFMAN Journal Article
Complexity of the soundness problem of workflow nets, Guan Jun LIU, Jun SUN, Yang LIU, and Jin Song DONG Journal Article
Consumer Informedness and Firm Information Strategy., T. Li, Robert John Kauffman, van Heck Eric, Peter Vervest, and B. Dellaert Journal Article
Consumer Informedness and Firm Information Strategy: Evidence from a Choice Experiment, T. Li, Robert John Kauffman, E. van Heck, and P. Vervest Journal Article
Consumer Informedness and Firm Information Strategy: Evidence from a Choice Experiment, T. Li, Robert John Kauffman, E. van Heck, and P. Vervest Journal Article
Coupling graphs, efficient algorithms and B-Cell Epitope prediction, Liang ZHAO, Steven C. H. HOI, Zhenhua LI, Limsoon WONG, and Hung NGUYEN Journal Article
Cross-domain password-based authenticated key exchange revisited, Liqun CHEN, Hoon Wei LIM, and Guomin YANG Journal Article
Detecting click fraud in online advertising: A data mining approach, Richard OENTARYO, Ee Peng LIM, Michael FINEGOLD, David LO, Feida ZHU, Clifton PHUA, Eng-Yeow CHEU, Ghim-Eng YAP, Kelvin SIM, Kasun PERERA, Bijay NEUPANE, Mustafa FAISAL, Zeyar AUNG, Wei Lee WOON, Wei CHEN, Dhaval PATEL, and Daniel BERRAR Journal Article
Dynamic Platform Pricing with Innovative Products, Mei LIN and X. Pan Working Paper
Evaluating electronic market designs: The effects of competitive arousal and social facilitation on electronic group buying, Yuecheng Yu, Karl R. LANG, and Alex PELAEZ Conference Proceeding Article
Extended Comprehensive Study of Association Measures for Fault Localization, Lucia -, David LO, Lingxiao JIANG, Ferdian Thung, and Aditya Budi Journal Article
Externalities, Incentives and Strategic Complementarities: Understanding Herd Behavior in IT Adoption, X. Li, Robert John Kauffman, F. Yu, and Y. Zhang Journal Article
Free market of crowdsourcing: Incentive mechanism design for mobile sensing, Xinglin ZHANG, Zheng YANG, Zimu ZHOU, Haibin CAI, Lei CHEN, and Xiang-Yang LI Journal Article
Free market of crowdsourcing: Incentive mechanism design for mobile sensing, Xinglin ZHANG, Zheng YANG, Zimu ZHOU, Haibin CAI, Lei CHEN, and Xiang-Yang LI Journal Article
Get Trained, Be Future-Ready, Lee Fong Michelle CHEONG News Article
How Can Consumer Preferences Be Leveraged for Targeted Upselling in Cable TV Services?, Bing Tian DAI Conference Paper
How Can Substitution and Complementarity Effects Be Leveraged for Broadband Internet Services Strategy?, Gwangjae JUNG, Young Soo KIM, and Robert J. Kauffman Conference Proceeding Article
Impact, team size, collaboration, and epochs: Stories from four decades of software engineering research, Subhajit DATTA, A. SAJEEV, S. SARKAR, and N. KUMAR Journal Article
Inferring the untold: Mining software engineering research publication networks, Santonu SARKAR and Subhajit DATTA Journal Article
Innovations in Financial IS and Technology Ecosystems: High-Frequency Trading Systems in the Equity Market, Robert J. Kauffman, Jun Liu, and Dan Ma Journal Article
Innovative applications and security of internet of things, Yingjiu LI, Yingjiu LI, and Nai-Wei LO Transcript
Investments in Internet-based Innovations in Financial Services: Strategic Advantage or Strategic Necessity?, K. Goh and Robert John Kauffman Journal Article
Learning to recommend descriptive tags for questions in social forums, Liqiang NIE, Yiliang ZHAO, Xiangyu WANG, Jialie SHEN, and Tat-Seng CHUA Journal Article
Leveraging machine learning and information retrieval techniques in software evolution tasks: Summary of the first MALIR-SE Workshop, at ASE 2013, - LUCIA, David LO, Giuseppe Scanniello, Alessandro Marchetto, Nasir Ali, and Collin McMillan Journal Article
Leveraging Web 2.0 for Software Evolution, Yuan TIAN and David LO Book Chapter
Loki: A privacy-conscious platform for crowdsourced surveys, Thivya KANDAPPU, Vijay SIVARAMAN, Arik FRIEDMAN, and Roksana BORELI Conference Proceeding Article
Measuring and modelling the thermal performance of the Tamar Suspension Bridge using a wireless sensor network, Nicholas DE BATTISTA, James M. W. BROWNJOHN, Hwee-Pink TAN, and Ki Young KOO Journal Article
Mining Long Patterns, Feida ZHU Book Chapter
Mining weakly labeled web facial images for search-based face annotation, Dayong WANG, Steven C. H. HOI, Ying HE, and Jianke ZHU Journal Article
Mini-track introduction: Information economics, competition, regulation, law and society, Eric K. CLEMONS, Robert John KAUFFMAN, and Thomas A. WEBER Conference Proceeding Article
Multi-agent orienteering problem with time-dependent capacity constraints, Chen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Journal Article
On Empirical Validation of Compactness Measures for Electoral Redistricting and Its Significance for Application of Models in the Social Sciences, Christine CHOU, Steven O. KIMBROUGH, Frederic H. MURPHY, John SULLIVAN-FEDOCK, and C. Jason WOODARD Journal Article
Online Multiple Kernel Similarity Learning for Visual Search, Hao Xia, Chu Hong HOI, Rong Jin, and Peilin Zhao Journal Article
Online portfolio selection: A survey, Bin LI and Steven C. H. HOI Journal Article
On the security of auditing mechanisms for secure cloud storage, Yong YU, Lei NIU, Guomin YANG, Yi MU, and Willy SUSILO Journal Article
On Understanding Diffusion Dynamics of Patrons at a Themepark, Jiali DU, Akshat KUMAR, and Pradeep Varkantham
Panel Data Analysis Via Variable Selection and Subject Clustering, Haibing LU, Shengsheng HUANG, Yingjiu LI, and Yanjiang YANG Book Chapter
Personalizing Software Development Practice Using Mastery-based Coaching, Chris BOESCH and Sandra BOESCH Conference Paper
Platform Pricing with Endogenous Network Effects, Mei Lin, Ruhai Wu, and Wen Zhou Working Paper
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data, Hwee Hwa PANG and Xuhua DING Journal Article
Real Time Process Compliance Checking using Nomenclature Approach, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Paper
Reshaping Society through Analytics, Collaboration, and Decision Support: Role of Business Intelligence and Social Media, Lee Fong Michelle Cheong and Junyu Choy Book Chapter
RFID Security and Privacy, Yingjiu Li, Huijie Robert Deng, and Elisa Bertino Book
Risk balance defense approach against intrusions for network server, Chengpo Mu, Meng Yu, Yingjiu Li, and Wanyu Zang Journal Article
Risk minimization of disjunctive temporal problem with uncertainty, Hoong Chuin LAU and Tuan Anh HOANG Conference Proceeding Article
Running and Chasing: The Competition between Paid Search Marketing and Search Engine Optimization, Kai LI, Mei LIN, Zhangxi LIN, and Bo XING Conference Proceeding Article
Sherlock: Microenvironment sensing for smartphones, Zheng YANG, Longfei SHANGGUAN, Weixi GU, Zimu ZHOU, Chenshu WU, and Yunhao LIU Journal Article
Solving Risk-Sensitive Stochastic Orienteering Problems using Optimization and Local Search, Pradeep Reddy VARAKANTHAM, Akshat KUMAR, Hoong Chuin LAU, and William Yeoh Journal Article
Solving Selfish Routing Problems with Involuntary Movements and Bounded Rationality, Pradeep Reddy VARAKANTHAM, Asrar Ahmed, and Shih-Fen Cheng Working Paper
Strategic Decision Support System using Heuristic Algorithm for Practical Outlet Zones Allocation to Dealers in a Beer Supply Distribution Network, Michelle Lee Fong CHEONG Conference Proceeding Article
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert John KAUFFMAN, Jun LIU, and Dan MA
The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna BALAN, Youngki LEE, Kiat Wee TAN, and Archan MISRA Conference Proceeding Article
The Challenge of Continuous Mobile Context Sensing, Rajesh Krishna Balan, Youngki Lee, Kiat Wee Tan, and Archan Misra Conference Paper
The impact of corporate social responsibility activities on brand evaluation, M. TIAN, C. LI, and Keng SIAU Journal Article
Twitter microblog sentiment analysis, Guangxia LI, Kuiyu CHANG, and Steven C. H. HOI Book Chapter
Understanding the Paradigm Shift in Computational Social Science in the Presence of Big Data, M. Chang, Robert John Kauffman, and Y.O Kwon Journal Article
WenZher: Comprehensive Vertical search for Healthcare Domain, Liqiang Nie, Tao Li, Mohammad Akbari, Jialie SHEN, and Tat-Seng CHUA Conference Proceeding Article
Submissions from 2013
Designing Optimal Innovation Portfolio, Arcot Desai NARASIMHALU Conference Paper
Adaptive computer‐generated forces for simulator‐based training, Expert Systems with Applications, Teck-Hou TENG, Ah-hwee TAN, and Loo-Nin TEOW Journal Article
A Dynamic Programming Approach to Achieving an Optimal End State along a Serial Production Line, Shih-Fen CHENG, Blake E. Nicholson, Marina A. Epelman, Daniel J. Reaume, and Robert L. Smith Journal Article
A Local Social Network Approach for Research Management, Xiaoyan LIU, Zhiling GUO, Zhenjiang LIN, and Jian MA Journal Article
An Agent-based Simulation Approach to Experience Management in Theme Parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article
An efficient partial shape matching algorithm for 3D tooth recognition, Zhiyuan ZHANG, Xin ZHONG, Sim Heng ONG, and Kelvin W. C. FOONG Conference Proceeding Article
An integrated model of team motivation and worker skills for a computer-based project management simulation, Wee Leong Lee Conference Proceeding Article
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks, Fengtong WEN, Willy SUSILO, and Guomin YANG Journal Article
A simple integration of social relationship and text data for identifying potential customers in microblogging, Guansong PANG, Shengyi JIANG, and Dongyi CHEN Conference Proceeding Article
Coupling alignments with recognition for still-to-video face recognition, Zhiwu HUANG, X. ZHAO, S. SHAN, R. WANG, and X. CHEN Conference Proceeding Article
Damaged Services: Why Interruptible Spot-Priced Cloud Computing Services are Worthwhile to Offer with Uninterruptible Reserved Services, Jianhui HUANG, Robert J. KAUFFMAN, and Dan MA Conference Paper
Decision trees to model the impact of disruption and recovery in supply chain networks, Loganathan PONNANBALAM, L. WENBIN, Xiuju FU, Xiaofeng YIN, Zhaoxia WANG, and Rick S. M. GOH Conference Proceeding Article
Dense image correspondence under large appearance variations, Linlin LIU, Kok-Lim LOW, and Wen-yan LIN Conference Proceeding Article
Dynamic joint sentiment-topic mode, Yulan HE, Chenghua LIN, Wei GAO, and Kam-Fai WONG Journal Article
Dynamic Platform Pricing on Innovative Products, Mei LIN and Xiajun Pan Working Paper
Exposing and mitigating privacy loss in crowdsourced survey platforms, Thivya KANDAPPU, Vijay SIVARAMAN, Arik FRIEDMAN, and Roksana BORELL Conference Proceeding Article
Factors influencing research contributions and researcher interactions in software engineering: An empirical study, Subhajit DATTA, A. S. M. Sajeev, Santonu SARKAR, and Nishant KUMAR Conference Proceeding Article
Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks, Luiz Felipe VIERA, Mario GERLA, and Archan MISRA Journal Article
Hibernating Process: Modeling Mobile Calls at Multiple Scales, Siyuan LIU, Lei LI, and Ramayya KRISHNAN Conference Proceeding Article
Improving patient length-of-stay in emergency department through dynamic queue management, Kar Way TAN, Hoong Chuin LAU, and Francis Chun Yue LEE Conference Proceeding Article
Modeling Preferences with Availability Constraints, Bingtian DAI and Hady W. LAUW Conference Proceeding Article
Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat CHUA, Richard Jayadi Oentaryo, and Ee Peng LIM Conference Proceeding Article
Partial least squares regression on Grassmannian manifold for emotion recognition, M. LIU, R. WANG, Zhiwu HUANG, S. SHAN, and X. CHEN Conference Proceeding Article
Query-document-dependent fusion: A case study of multimodal music retrieval, Zhonghua LI, Bingjun ZHANG, Yi YU, Jialie SHEN, and Ye WANG Journal Article
RFID Security and Privacy, Yingjiu LI, Robert H. DENG, and Elisa BERTINO Book
Social media for supply chain risk management, Xiuju FU, Rick S. M. GOH, J. C. Tong, Loganathan PONNANBALAM, Xiaofeng YIN, Zhaoxia WANG, H. Y. Xu, and Sifei LU Conference Proceeding Article
The influence of online word-of-mouth on long tail formation, Bin GU, Qian TANG, and Andrew B. WHINSTON Journal Article
TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Towards a hybrid framework for detecting input manipulation vulnerabilities, Sun DING, Hee Beng Kuan TAN, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article
Two Formulas for Success in Social Media: Social Learning and Network Effects, Liangfei QIU, Qian TANG, and Andrew B. Whinston Conference Paper
Unsupervised medical image classification by combining case-based classifiers, Thien Anh Dinh, Tomi Silander, Bolan Su, Tianxia Gong, Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang Lee, Chew Lim Tan, and Tze-Yun LEONG Conference Proceeding Article
Defending against heap overflow by using randomization in nested virtual clusters, Chee Meng TEY and Debin GAO Conference Proceeding Article
Adaptive regret minimization in bounded-memory games, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, and Arunesh SINHA Conference Paper
Achieving revocable fine-grained cryptographic access control over cloud data, Yanjiang YANG, Xuhua DING, Haibing LU, Zhiguo WAN, and Jianying ZHOU Conference Proceeding Article
Adaptable ciphertext-policy attribute-based encryption, Junzuo LAI, Robert H. DENG, Yanjiang YANG, and Jian WENG Conference Proceeding Article
A link-bridged topic model for cross-domain document classification, Pei YANG, Wei GAO, Qi TAN, and Kam-Fai WONG Journal Article
An agent-based simulation approach to experience management in theme parks, Shih-Fen CHENG, Larry Junjie LIN, Jiali DU, Hoong Chuin LAU, and Pradeep Reddy VARAKANTHAM Presentation
A scalable approach for malware detection through bounded feature space behavior modeling, Mahinthan CHANDRAMOHAN, Hee Beng Kuan TAN, Lionel C BRIAND, Lwin Khin SHAR, and Bindu Madhavi PADMANABHUNI Conference Proceeding Article
A Social Network-Empowered Research Analytics Framework for Project Selection, Thushari SILVA, Zhiling GUO, Jian MA, Hongbing JIANG, and Huaping CHEN Journal Article
Assessing the Moderating Effect of Consumer Product Knowledge and Online Shopping Experience on using Recommedation Agents for Customer Loyalty, Victoria Y. YOON, R. Eric HOSTLER, Zhiling GUO, and Tor GUIMARAES Journal Article
Automatically partition software into least privilege components using dynamic data dependency analysis, Yongzheng WU, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article