The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2013

PDF

SocioPhone: Everyday Face-to-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article

Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper

Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper

PDF

Think Twice before you Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks, YAN LI, Yingjiu LI, Qiang YAN, and Robert H. DENG Conference Proceeding Article

PDF

T-Watcher: A New Visual Analytic System for Effective Traffic Surveillance, Jiansu PU, Siyuan LIU, Ye DING, Huamin QU, and Lionel NI Conference Proceeding Article

PDF

Understanding Sequential Decisions via Inverse Reinforcement Learning, Siyuan LIU, Miguel ARAUJO, Emma BRUNSKILL, Rosaldo ROSSETTI, Joao BARROS, and Ramayya KRISHNAN Conference Proceeding Article

PDF

Visual tracking via locality sensitive histograms, Shengfeng HE, Qingxiong YANG, Rynson W.H. LAU, Jian WANG, and Ming-Hsuan YANG Conference Proceeding Article

PDF

When Do Consumers Purchase Online?: Based on Inter-Purchase Time, Youngsoo KIM Conference Proceeding Article

Multi-core model checking algorithms for LTL verification with fairness assumptions, Xuan-Linh HA, Thanh Tho QUAN, Yang LIU, and Jun SUN Conference Proceeding Article

PDF

Main-stream media behaviour analysis on Twitter: A case study on UK general election, Zhongyu WEI, Yulan HE, Wei GAO, Binyang LI, Lanjun ZHOU, and Kam-Fai WONG Conference Proceeding Article

PDF

Accelerating optimistic HLA-based simulations in virtual execution environments, Zengxiang LI, Xiaorong LI, Nguyen Binh Duong TA, Wentong CAI, and Stephen John TURNER Conference Proceeding Article

PDF

Analyzing the friendliness of exchanges in an online software developer community, Brendan CLEARY, Margaret-Anne STOREY, Carlos GÓMEZ, Leif SINGER, and Christoph TREUDE Conference Proceeding Article

PDF

An architecture for online semantic labeling on UGVS, Arne SUPPE, Luis NAVARRO-SERMENT, Daniel MUNOZ, Drew BAGNELL, and Martial HEBERT Conference Proceeding Article

PDF

Anonymous authentication of visitors for mobile crowd sensing at amusement parks, Divyan KONIDALA, Robert H. DENG, Yingjiu LI, Hoong Chuin LAU, and Stephen FIENBERG Conference Proceeding Article

PDF

Behind the magical numbers: Hierarchical chunking and the human working memory capacity, Guoqi LI, Ning NING, Kiruthika RAMANATHAN, Wei HE, Li PAN, and Luping SHI Journal Article

PDF

Blogging developer knowledge: Motivations, challenges, and future directions, Chris PARNIN, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article

PDF

Cost-Sensitive Double Updating Online Learning and Its Application to Online Anomaly Detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article

PDF

Demand Forecasting Using a Growth Model and Negative Binomial Regression Framework, Cally Yeru ONG, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article

PDF

Designing leakage-resilient password entry on touchscreen mobile devices, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article

PDF

Disclosing climate change patterns using an adaptive markov chain pattern detection method, Zhaoxia WANG, Gary LEE, Hoong Maeng CHAN, Reuben LI, Xiuju FU, Rick GOH, Pauline A. W. POH KIM, Martin L. HIBBERD, and Hoong Chor CHIN Conference Proceeding Article

PDF

Distributed Gibbs: A memory-bounded sampling-based DCOP algorithm, Duc Thien NGUYEN, William YEOH, and Hoong Chuin LAU Conference Proceeding Article

PDF

Dynamic synthesis of local time requirement for service composition, Tian Huat TAN, Étienne ANDRÉ, Jun SUN, Yang LIU, Jin Song DONG, and Manman CHEN Conference Proceeding Article

PDF

Efficient extraction of JSON information in SAS using the SCANOVER function, Murphy CHOY and Kyong Jin SHIM Conference Proceeding Article

PDF

Enabling generative, emergent artificial culture, Jaroslaw KOCHANOWICZ, Ah-hwee TAN, and Daniel THALMANN Conference Proceeding Article

PDF

Energy-Neutral Scheduling and Forwarding in Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Weng Seng SOH, and Hwee-Pink TAN Journal Article

PDF

Enhancing robot perception using human teammates, Jean OH, Arne SUPPE, Anthony STENTZ, and Martial HEBERT Conference Proceeding Article

PDF

Expressive Search on Encrypted Data, Junzuo LAI, Xuhua ZHOU, Robert H. DENG, Yingjiu LI, and Kefei CHEN Conference Proceeding Article

PDF

FANS: Face annotation by searching large-scale web facial images, Steven HOI, Dayong WANG, I Yeu CHENG, Elmer LIN, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article

PDF

Fragmented social media: A look into selective exposure to political news, Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article

Link

Hybrid Mechanism for Heterogeneous E-Procurement Involving a Combinatorial Auction and Bargaining, He HUANG, Robert J. Kauffman, Hongyan XU, and Lan ZHAO Journal Article

PDF

Impact of Multimedia in Sina Weibo: Popularity and Life Span, Xun ZHAO, Feida ZHU, Weining QIAN, and Aoying ZHOU Conference Proceeding Article

PDF

Implementation of Slowly Changing Dimension to Data Warehouse to Manage Marketing Campaigns in Banks, Lihui WANG, Junyu CHOY, and Michelle L. F. CHEONG Conference Proceeding Article

PDF

It Is Not Just What We Say, But How We Say Them: LDA-based Behavior-Topic Model, Minghui QIU, Feida ZHU, and Jing JIANG Conference Proceeding Article

PDF

Leakage resilient authenticated key exchange secure in the auxiliary input model, Guomin YANG, Yi MU, Willy SUSILO, and Duncan S. WONG Conference Proceeding Article

PDF

Master Physician Scheduling Problem, Aldy GUNAWAN and Hoong Chuin LAU Journal Article

PDF

Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, Lwin Khin SHAR, Hee Beng Kuan TAN, and Lionel C. BRIAND Conference Proceeding Article

PDF

ONESPACE: Shared depth-corrected video interaction, David LEDO, Bon Adriel ASENIERO, Sebastian BORING, and Anthony TANG Conference Poster

OR-AHaD: An Opportunistic Routing Algorithm for Energy Harvesting WSN, Sanam Shirazi BEHESHTIHA, Hwee-Pink TAN, and Masoud SABAEI Book Chapter

PDF

Personal informatics in chronic illness management, Haley MACLEOD, Anthony TANG, and Sheelagh CARPENDALE Conference Proceeding Article

PDF

R-energy for evaluating robustness of dynamic networks, Ming GAO, Ee Peng LIM, and David LO Conference Proceeding Article

PDF

Retweeting: An act of viral users, susceptible users, or viral topics?, Tuan-Anh HOANG and Ee Peng LIM Conference Proceeding Article

PDF

Tag Recommendation in Software Information Sites, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Conference Proceeding Article

PDF

TESLA: An Energy-saving Agent that Leverages Schedule Flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Burcin Becerik-Gerber, and Milind Tambe Conference Proceeding Article

The application of decision tree to intensity change classification of tropical cyclones in western North Pacific, Wei ZHANG, Si GAO, Bin CHEN, and Kai CAO Journal Article

PDF

Tower of babel: a crowdsourcing game building sentiment lexicons for resource-scarce languages, Yoonsung HONG, Haewoon KWAK, Youngmin BAEK, and Sue. MOON Conference Proceeding Article

PDF

Traditional media seen from social media, Jisun AN, Daniele QUERCIA, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article

PDF

Unified entity search in social media community, Ting YAO, Yuan LIU, Chong-wah NGO, and Tao MEI Conference Proceeding Article

Using non-graded formative online exercises to increase the students’ motivation and performance in classroom: A longitudinal study from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article

PDF

Vehicle localization along a previously driven route using an image database, Hideyuki KUME, Arne SUPPE, and Arne SUPPE Conference Proceeding Article

PDF

Why individuals seek diverse opinions (or why they don't), Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article

PDF

Your Love is Public Now: Questioning the Use of Personal Information in Authentication, Payas GUPTA, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Proceeding Article

PDF

Your love is public now: Questioning the use of personal information in authentication, Payas Gupta, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Paper

PDF

Strong Location Privacy: A Case Study on Shortest Path Queries [Invited Paper], Kyriakos MOURATIDIS Conference Proceeding Article

PDF

ArrayTrack: A fine-grained indoor location system, Jie XIONG and Kyle JAMIESON Conference Proceeding Article

Link

Be Customer Wise or Otherwise: Combining Data Mining and Interactive Visual Analytics to Analyse Large and Complex Customer Resource Management (CRM) Data, Tin Seong KAM, Aditya Hridaya MISRA, and Jun Yao JI Conference Proceeding Article

PDF

Beta Atomic Contacts: Identifying Critical Specific Contacts in Protein Binding Interfaces, Qian LU, Chee Keong KWOH, and Steven C. H. HOI Journal Article

PDF

Circular reranking for visual search, Ting YAO and Chong-wah NGO Journal Article

PDF

Core versus peripheral information technology employees and their impact on firm performance, Ling LIU, Daniel Q. CHEN, Nan HU, Indranil BOSE, and Garry D. BRUTON Journal Article

PDF

Cross-domain password-based authenticated key exchange revisited, Liqun CHEN, Hoon Wei LIM, and Guomin YANG Conference Proceeding Article

PDF

Delayed insertion and rule effect moderation of domain knowledge for reinforcement learning, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article

PDF

Dynamic label propagation in social networks, Juan DU, Feida ZHU, and Ee Peng LIM Conference Proceeding Article

PDF

Enabling an integrated rate-temporal learning scheme on memristor, Wei HE, Kejie HUANG, Ning NING, Kiruthika RAMANATHAN, Guoqi LI, Yu JIANG, JiaYin SZE, Luping SHI, Rong ZHAO, and Jing PEI Journal Article

PDF

Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks, Guanfeng LIU, Yan WANG, Mehmet A. ORGUN, and Ee Peng LIM Journal Article

Link

F-Trail: Finding Patterns in Taxi Trajectories, Yasuko MATSUBARA, Evangelos Papalexakis, Lei LI, David LO, Yasushi Sakurai, and Christos Faloutsos Conference Proceeding Article

PDF

Information security as a credence good, Ping Fan KE, Kai-Lung HUI, and Wei Thoo YUE Conference Proceeding Article

PDF

Modeling Social Information Learning among Taxi Drivers, Siyuan LIU, Ramayya KRISHNAN, Emma BRUNSKILL, and Lionel NI Conference Proceeding Article

PDF

Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article

PDF

RoundTripRank: Graph-based Proximity with Importance and Specificity, Yuan FANG, Kevin Chen-Chuan CHANG, and Hady W. LAUW Conference Proceeding Article

PDF

Searching visual instances with topology checking and context modeling, Wei ZHANG and Chong-wah NGO Conference Proceeding Article

PDF

Towards omnidirectional passive human detection, Zimu ZHOU, Zheng YANG, Chenshu WU, Longfei SHANGGUAN, and Yunhao LIU Conference Proceeding Article

PDF

TwiCube: A real-time Twitter online community analysis tool, Juan DU, Wei XIE, Cheng LI, Feida ZHU, and Ee Peng LIM Conference Proceeding Article

PDF

ViStruclizer: A Structural Visualizer for Multi-dimensional Social Networks, Bingtian DAI, Agus Trisnajaya Kwee, and Ee Peng LIM Conference Proceeding Article

Value Migration and Architectural Design Choices in Innovation Ecosystems: The Case of Cloud Computing, Richard TEE and C. Jason WOODARD Presentation

PDF

Accountable Authority Identity-Based Encryption with Public Traceability, Junzuo LAI, Robert H. DENG, Yunlei ZHAO, and Jian Weng Conference Proceeding Article

Link

A Comparative Study of Supervised Learning Algorithms for Re-opened Bug Prediction, Xin XIA, David LO, Xinyu WANG, Xiaohu YANG, Shanping LI, and Jianling SUN Conference Proceeding Article

Actively linking learning outcomes and competencies to course design and delivery: Experiences from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article

Actively linking learning outcomes and competencies to course design and delivery: experiences from an undergraduate Information Systems program in Singapore, Ilse Baumgartner and Venky Shankararaman Conference Paper

PDF

Adoption of Software Testing in Open Source Projects: A Preliminary Study on 50,000 Projects, Pavneet Singh KOCHHAR, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

Almost touching: Parent-child remote communication using the sharetable system, Svetlana YAROSH, Anthony TANG, Sanika MOKASHI, and Gregory D. ABOWD Conference Proceeding Article

PDF

An empirical study on developer interactions in StackOverflow, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article

Link

An Empirical Study on Developer Interactions in StackOverflow, Shaowei Wang, David LO, and Lingxiao JIANG Conference Paper

PDF

A self-training framework for automatic identification of exploratory dialogue, Zhongyu WEI, Yulan HE, Simon SHUM, Rebecca FERGUSON, Wei GAO, and Kam-Fai WONG Conference Proceeding Article

PDF

Confidence Weighted Mean Reversion Strategy for Online Portfolio Selection, Bin LI, Steven C. H. HOI, Peilin ZHAO, and Vivekanand Gopalkrishnan Journal Article

PDF

Data visualization on interactive surfaces: A research agenda, Petra ISENBERG, Tobias ISENBERG, Tobias HESSELMANN, Bongshin LEE, Ulrich VON ZADOW, and Anthony TANG Journal Article

PDF

Empirical evaluation of bug linking, Tegawende F. BISSYANDE, Ferdian THUNG, Shaowei WANG, David LO, Lingxiao JIANG, and Laurent REVEILLERE Conference Proceeding Article

PDF

Flip-invariant SIFT for copy and object detection, Wan-Lei ZHAO and Chong-wah NGO Journal Article

PDF

Image collection summarization via dictionary learning for sparse representation, Chunlei YANG, Jialie SHEN, Jinye PENG, and Jianping FAN Journal Article

PDF

Infrastructure-Assisted Smartphone-based ADL Recognition in Multi-Inhabitant Smart Environments, Nirmalya ROY, Archan MISRA, and Diane COOK Conference Proceeding Article

Link

Master Physician Scheduling Problem, Aldy GUNAWAN and Hoong Chuin LAU Journal Article

PDF

Network structure of social coding in GitHub, Ferdian THUNG, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

Network Structure of Social Coding in GitHub, Ferdian Thung, David LO, and Lingxiao JIANG Conference Paper

PDF

Predicting project outcome leveraging socio-technical network patterns, Didi SURIAN, Yuan TIAN, David LO, Hong CHENG, and Ee Peng LIM Conference Proceeding Article

PDF

Robust image analysis with sparse representation on quantized visual features, Bingkun BAO, Guangyu ZHU, Jialie SHEN, and Shuicheng YAN Journal Article

PDF

Semi-supervised heterogeneous fusion for multimedia data co-clustering, Lei MENG, Ah-hwee TAN, and Dong XU Journal Article

PDF

Understanding Widespread Changes: A Taxonomic Study, Shaowei Wang, David LO, and Lingxiao JIANG Conference Paper

PDF

Understanding widespread changes: A taxonomic study, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

Using enterprise level software for a large scale compulsory course in an Information Systems undergraduate program: An example from Singapore, Ilse BAUMGARTNER Conference Paper

PDF

AUTHSCAN: Automatic extraction of web authentication protocols from implementations, Guangdong BAI, Jike LEI, Guozhu MENG, Sai Sathyanarayan VENKATRAMAN, Prateek SAXENA, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Combining crowdsourcing and Google street view to identify street-level accessibility problems, Kotaro HARA, Victoria LE, and Jon FROEHLICH Conference Proceeding Article

PDF

Comparing Mobile Privacy Protection through Cross-Platform Applications, Jin HAN, Qiang YAN, Debin GAO, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article