Submissions from 2013
Improved reachability analysis in DTMC via divide and conquer, Songzheng SONG, Lin GUI, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Improving Internet Security Through Social Information and Social Comparison: A Field Quasi-Experiment, Qian TANG, Leigh L. LINDEN, John S. QUARTERMAN, and Andrew B. WHINSTON Conference Paper
Introducing programmers to pair programming: A controlled experiment, A. S. M. Sajeev and Subhajit DATTA Conference Proceeding Article
Launching generic attacks on iOS with approved third-party applications, Jin HAN, Mon Kywe SU, Qiang YAN, Feng BAO, Robert H. DENG, Debin GAO, Yingjiu LI, and Jianying ZHOU Conference Proceeding Article
Mining user relations from online discussions using sentiment analysis and probabilistic matrix factorization, Minghui QIU, Liu Yang, and Jing JIANG Conference Paper
Mining User Relations from Online Discussions using Sentiment Analysis and Probabilistic Matrix Factorization, Minghui QIU, Liu YANG, and Jing JIANG Conference Proceeding Article
Mitigating Access-Driven Timing Channels in Clouds using StopWatch, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article
Real Time Event Detection in Twitter, Xun WANG, Feida ZHU, Jing JIANG, and Sujian LI Conference Proceeding Article
Risk balance defense approach against intrusions for network server, Chengpo MU, Meng YU, Yingjiu LI, and Wanyu Zang Journal Article
SocioPhone: Everyday Face-to-Face Interaction Monitoring Platform Using Multi-Phone Sensor Fusion, Youngki LEE, Chulhong MIN, Chanyou HWANG, Jaeung LEE, Inseok HWANG, Younghyun JU, Chungkuk YOO, Miri MOON, Uichin LEE, and Junehwa SONG Conference Proceeding Article
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion, Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, and Junehwa Song Conference Paper
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper
Technology Investment Decision-making under Uncertainty in Mobile Payment Systems, Robert J. Kauffman, Jun Liu, and Dan Ma Conference Paper
Think Twice before you Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks, YAN LI, Yingjiu LI, Qiang YAN, and Robert H. DENG Conference Proceeding Article
T-Watcher: A New Visual Analytic System for Effective Traffic Surveillance, Jiansu PU, Siyuan LIU, Ye DING, Huamin QU, and Lionel NI Conference Proceeding Article
Understanding Sequential Decisions via Inverse Reinforcement Learning, Siyuan LIU, Miguel ARAUJO, Emma BRUNSKILL, Rosaldo ROSSETTI, Joao BARROS, and Ramayya KRISHNAN Conference Proceeding Article
Visual tracking via locality sensitive histograms, Shengfeng HE, Qingxiong YANG, Rynson W.H. LAU, Jian WANG, and Ming-Hsuan YANG Conference Proceeding Article
When Do Consumers Purchase Online?: Based on Inter-Purchase Time, Youngsoo KIM Conference Proceeding Article
Multi-core model checking algorithms for LTL verification with fairness assumptions, Xuan-Linh HA, Thanh Tho QUAN, Yang LIU, and Jun SUN Conference Proceeding Article
Main-stream media behaviour analysis on Twitter: A case study on UK general election, Zhongyu WEI, Yulan HE, Wei GAO, Binyang LI, Lanjun ZHOU, and Kam-Fai WONG Conference Proceeding Article
Accelerating optimistic HLA-based simulations in virtual execution environments, Zengxiang LI, Xiaorong LI, Nguyen Binh Duong TA, Wentong CAI, and Stephen John TURNER Conference Proceeding Article
Analyzing the friendliness of exchanges in an online software developer community, Brendan CLEARY, Margaret-Anne STOREY, Carlos GÓMEZ, Leif SINGER, and Christoph TREUDE Conference Proceeding Article
An architecture for online semantic labeling on UGVS, Arne SUPPE, Luis NAVARRO-SERMENT, Daniel MUNOZ, Drew BAGNELL, and Martial HEBERT Conference Proceeding Article
Anonymous authentication of visitors for mobile crowd sensing at amusement parks, Divyan KONIDALA, Robert H. DENG, Yingjiu LI, Hoong Chuin LAU, and Stephen FIENBERG Conference Proceeding Article
Behind the magical numbers: Hierarchical chunking and the human working memory capacity, Guoqi LI, Ning NING, Kiruthika RAMANATHAN, Wei HE, Li PAN, and Luping SHI Journal Article
Blogging developer knowledge: Motivations, challenges, and future directions, Chris PARNIN, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article
Cost-Sensitive Double Updating Online Learning and Its Application to Online Anomaly Detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article
Demand Forecasting Using a Growth Model and Negative Binomial Regression Framework, Cally Yeru ONG, Murphy CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
Designing leakage-resilient password entry on touchscreen mobile devices, Qiang YAN, Jin HAN, Yingjiu LI, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Disclosing climate change patterns using an adaptive markov chain pattern detection method, Zhaoxia WANG, Gary LEE, Hoong Maeng CHAN, Reuben LI, Xiuju FU, Rick GOH, Pauline A. W. POH KIM, Martin L. HIBBERD, and Hoong Chor CHIN Conference Proceeding Article
Distributed Gibbs: A memory-bounded sampling-based DCOP algorithm, Duc Thien NGUYEN, William YEOH, and Hoong Chuin LAU Conference Proceeding Article
Dynamic synthesis of local time requirement for service composition, Tian Huat TAN, Étienne ANDRÉ, Jun SUN, Yang LIU, Jin Song DONG, and Manman CHEN Conference Proceeding Article
Efficient extraction of JSON information in SAS using the SCANOVER function, Murphy CHOY and Kyong Jin SHIM Conference Proceeding Article
Enabling generative, emergent artificial culture, Jaroslaw KOCHANOWICZ, Ah-hwee TAN, and Daniel THALMANN Conference Proceeding Article
Energy-Neutral Scheduling and Forwarding in Environmentally-Powered Wireless Sensor Networks, Alvin Cerdena VALERA, Weng Seng SOH, and Hwee-Pink TAN Journal Article
Enhancing robot perception using human teammates, Jean OH, Arne SUPPE, Anthony STENTZ, and Martial HEBERT Conference Proceeding Article
Expressive Search on Encrypted Data, Junzuo LAI, Xuhua ZHOU, Robert H. DENG, Yingjiu LI, and Kefei CHEN Conference Proceeding Article
FANS: Face annotation by searching large-scale web facial images, Steven HOI, Dayong WANG, I Yeu CHENG, Elmer LIN, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article
Fragmented social media: A look into selective exposure to political news, Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article
Hybrid Mechanism for Heterogeneous E-Procurement Involving a Combinatorial Auction and Bargaining, He HUANG, Robert J. Kauffman, Hongyan XU, and Lan ZHAO Journal Article
Impact of Multimedia in Sina Weibo: Popularity and Life Span, Xun ZHAO, Feida ZHU, Weining QIAN, and Aoying ZHOU Conference Proceeding Article
Implementation of Slowly Changing Dimension to Data Warehouse to Manage Marketing Campaigns in Banks, Lihui WANG, Junyu CHOY, and Michelle L. F. CHEONG Conference Proceeding Article
It Is Not Just What We Say, But How We Say Them: LDA-based Behavior-Topic Model, Minghui QIU, Feida ZHU, and Jing JIANG Conference Proceeding Article
Leakage resilient authenticated key exchange secure in the auxiliary input model, Guomin YANG, Yi MU, Willy SUSILO, and Duncan S. WONG Conference Proceeding Article
Master Physician Scheduling Problem, Aldy GUNAWAN and Hoong Chuin LAU Journal Article
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, Lwin Khin SHAR, Hee Beng Kuan TAN, and Lionel C. BRIAND Conference Proceeding Article
ONESPACE: Shared depth-corrected video interaction, David LEDO, Bon Adriel ASENIERO, Sebastian BORING, and Anthony TANG Conference Poster
OR-AHaD: An Opportunistic Routing Algorithm for Energy Harvesting WSN, Sanam Shirazi BEHESHTIHA, Hwee-Pink TAN, and Masoud SABAEI Book Chapter
Personal informatics in chronic illness management, Haley MACLEOD, Anthony TANG, and Sheelagh CARPENDALE Conference Proceeding Article
R-energy for evaluating robustness of dynamic networks, Ming GAO, Ee Peng LIM, and David LO Conference Proceeding Article
Retweeting: An act of viral users, susceptible users, or viral topics?, Tuan-Anh HOANG and Ee Peng LIM Conference Proceeding Article
Tag Recommendation in Software Information Sites, Xin XIA, David LO, Xinyu WANG, and Bo ZHOU Conference Proceeding Article
TESLA: An Energy-saving Agent that Leverages Schedule Flexibility, Jun Young KWAK, Pradeep VARAKANTHAM, Rajiv Maheswaran, Burcin Becerik-Gerber, and Milind Tambe Conference Proceeding Article
The application of decision tree to intensity change classification of tropical cyclones in western North Pacific, Wei ZHANG, Si GAO, Bin CHEN, and Kai CAO Journal Article
Tower of babel: a crowdsourcing game building sentiment lexicons for resource-scarce languages, Yoonsung HONG, Haewoon KWAK, Youngmin BAEK, and Sue. MOON Conference Proceeding Article
Traditional media seen from social media, Jisun AN, Daniele QUERCIA, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article
Unified entity search in social media community, Ting YAO, Yuan LIU, Chong-wah NGO, and Tao MEI Conference Proceeding Article
Using non-graded formative online exercises to increase the students’ motivation and performance in classroom: A longitudinal study from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article
Vehicle localization along a previously driven route using an image database, Hideyuki KUME, Arne SUPPE, and Arne SUPPE Conference Proceeding Article
Why individuals seek diverse opinions (or why they don't), Jisun AN, Daniele QUERCIA, and Jon CROWCROFT Conference Proceeding Article
Your love is public now: Questioning the use of personal information in authentication, Payas Gupta, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Paper
Your Love is Public Now: Questioning the Use of Personal Information in Authentication, Payas GUPTA, Swapna GOTTIPATI, Jing JIANG, and Debin GAO Conference Proceeding Article
Strong Location Privacy: A Case Study on Shortest Path Queries [Invited Paper], Kyriakos MOURATIDIS Conference Proceeding Article
ArrayTrack: A fine-grained indoor location system, Jie XIONG and Kyle JAMIESON Conference Proceeding Article
Be Customer Wise or Otherwise: Combining Data Mining and Interactive Visual Analytics to Analyse Large and Complex Customer Resource Management (CRM) Data, Tin Seong KAM, Aditya Hridaya MISRA, and Jun Yao JI Conference Proceeding Article
Beta Atomic Contacts: Identifying Critical Specific Contacts in Protein Binding Interfaces, Qian LU, Chee Keong KWOH, and Steven C. H. HOI Journal Article
Circular reranking for visual search, Ting YAO and Chong-wah NGO Journal Article
Core versus peripheral information technology employees and their impact on firm performance, Ling LIU, Daniel Q. CHEN, Nan HU, Indranil BOSE, and Garry D. BRUTON Journal Article
Cross-domain password-based authenticated key exchange revisited, Liqun CHEN, Hoon Wei LIM, and Guomin YANG Conference Proceeding Article
Delayed insertion and rule effect moderation of domain knowledge for reinforcement learning, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article
Dynamic label propagation in social networks, Juan DU, Feida ZHU, and Ee Peng LIM Conference Proceeding Article
Enabling an integrated rate-temporal learning scheme on memristor, Wei HE, Kejie HUANG, Ning NING, Kiruthika RAMANATHAN, Guoqi LI, Yu JIANG, JiaYin SZE, Luping SHI, Rong ZHAO, and Jing PEI Journal Article
Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks, Guanfeng LIU, Yan WANG, Mehmet A. ORGUN, and Ee Peng LIM Journal Article
F-Trail: Finding Patterns in Taxi Trajectories, Yasuko MATSUBARA, Evangelos Papalexakis, Lei LI, David LO, Yasushi Sakurai, and Christos Faloutsos Conference Proceeding Article
Information security as a credence good, Ping Fan KE, Kai-Lung HUI, and Wei Thoo YUE Conference Proceeding Article
Modeling Social Information Learning among Taxi Drivers, Siyuan LIU, Ramayya KRISHNAN, Emma BRUNSKILL, and Lionel NI Conference Proceeding Article
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article
RoundTripRank: Graph-based Proximity with Importance and Specificity, Yuan FANG, Kevin Chen-Chuan CHANG, and Hady W. LAUW Conference Proceeding Article
Searching visual instances with topology checking and context modeling, Wei ZHANG and Chong-wah NGO Conference Proceeding Article
Towards omnidirectional passive human detection, Zimu ZHOU, Zheng YANG, Chenshu WU, Longfei SHANGGUAN, and Yunhao LIU Conference Proceeding Article
TwiCube: A real-time Twitter online community analysis tool, Juan DU, Wei XIE, Cheng LI, Feida ZHU, and Ee Peng LIM Conference Proceeding Article
ViStruclizer: A Structural Visualizer for Multi-dimensional Social Networks, Bingtian DAI, Agus Trisnajaya Kwee, and Ee Peng LIM Conference Proceeding Article
Value Migration and Architectural Design Choices in Innovation Ecosystems: The Case of Cloud Computing, Richard TEE and C. Jason WOODARD Presentation
Accountable Authority Identity-Based Encryption with Public Traceability, Junzuo LAI, Robert H. DENG, Yunlei ZHAO, and Jian Weng Conference Proceeding Article
A Comparative Study of Supervised Learning Algorithms for Re-opened Bug Prediction, Xin XIA, David LO, Xinyu WANG, Xiaohu YANG, Shanping LI, and Jianling SUN Conference Proceeding Article
Actively linking learning outcomes and competencies to course design and delivery: Experiences from an undergraduate Information Systems program in Singapore, Ilse BAUMGARTNER Conference Proceeding Article
Actively linking learning outcomes and competencies to course design and delivery: experiences from an undergraduate Information Systems program in Singapore, Ilse Baumgartner and Venky Shankararaman Conference Paper
Adoption of Software Testing in Open Source Projects: A Preliminary Study on 50,000 Projects, Pavneet Singh KOCHHAR, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article
Almost touching: Parent-child remote communication using the sharetable system, Svetlana YAROSH, Anthony TANG, Sanika MOKASHI, and Gregory D. ABOWD Conference Proceeding Article
An Empirical Study on Developer Interactions in StackOverflow, Shaowei Wang, David LO, and Lingxiao JIANG Conference Paper
An empirical study on developer interactions in StackOverflow, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article
A self-training framework for automatic identification of exploratory dialogue, Zhongyu WEI, Yulan HE, Simon SHUM, Rebecca FERGUSON, Wei GAO, and Kam-Fai WONG Conference Proceeding Article
Confidence Weighted Mean Reversion Strategy for Online Portfolio Selection, Bin LI, Steven C. H. HOI, Peilin ZHAO, and Vivekanand Gopalkrishnan Journal Article
Data visualization on interactive surfaces: A research agenda, Petra ISENBERG, Tobias ISENBERG, Tobias HESSELMANN, Bongshin LEE, Ulrich VON ZADOW, and Anthony TANG Journal Article
Empirical evaluation of bug linking, Tegawende F. BISSYANDE, Ferdian THUNG, Shaowei WANG, David LO, Lingxiao JIANG, and Laurent REVEILLERE Conference Proceeding Article
Flip-invariant SIFT for copy and object detection, Wan-Lei ZHAO and Chong-wah NGO Journal Article
Image collection summarization via dictionary learning for sparse representation, Chunlei YANG, Jialie SHEN, Jinye PENG, and Jianping FAN Journal Article
Infrastructure-Assisted Smartphone-based ADL Recognition in Multi-Inhabitant Smart Environments, Nirmalya ROY, Archan MISRA, and Diane COOK Conference Proceeding Article
Master Physician Scheduling Problem, Aldy GUNAWAN and Hoong Chuin LAU Journal Article
Network structure of social coding in GitHub, Ferdian THUNG, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article