Submissions from 2012
An Automaton-based Index Scheme for On-demand XML Data Broadcast, Weiwei SUN, Peng LIU, Jingjing WU, Yongrui QIN, and Baihua ZHENG Conference Proceeding Article
Descriptor Extraction and Matching using Visual Attention Region for CDVS, Lai-Tee CHEOK, Jaeyong SONG, and Kyungmo PARK Report
Detecting Extreme Rank Anomalous Collections, Hanbo DAI, Feida ZHU, Ee-Peng LIM, and Hwee Hwa PANG Conference Proceeding Article
Evaluation of Different Electronic Product Code Discovery Service Models, Su Mon KYWE, Jie SHI, Yingjiu LI, and Raghuwanshi KAILASH Journal Article
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing, Zhiguo WAN, Jun'e LIU, and Robert H. DENG Journal Article
Message Passing Algorithms for MAP Estimation using DC Programming, Akshat KUMAR, Shlomo ZILBERSTEIN, and Marc TOUSSAINT Conference Proceeding Article
Mining Social Dependencies in Dynamic Interaction Networks, Freddy Chong-Tat CHUA, Hady W. LAUW, and Ee Peng LIM Conference Paper
Motivated learning for the development of autonomous agents, Janusz A. STARZYK, James T. GRAHAM, Pawel RAIF, and Ah-hwee TAN Journal Article
Obfuscating the Topical Intention in Enterprise Text Search, Hwee Hwa PANG, Xiaokui XIAO, and Jialie SHEN Conference Proceeding Article
Provable de-anonymization of large datasets with sparse dimensions, Anupam DATTA, Divya SHARMA, and Arunesh SINHA Conference Proceeding Article
Scalable activity-travel pattern monitoring framework for large-scale city environment, Youngki LEE, SangJeong LEE, Byoungjip KIM, Jungwoo KIM, Yunseok Rhee, and Junehwa SONG Journal Article
Scalable Activity-Travel Pattern Monitoring Framework for Large-scale City Environment, Youngki Lee, SangJeong Lee, Byoungjip Kim, Jungwoo Kim, Yunseok Rhee, and Junehwa Song Journal Article
Setting Up a Low-cost Lab Management System for a Multi-purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee MOK and Wee Kiat TAN Journal Article
Structural analysis in multi-relational social networks, Bing Tian DAI, Freddy Chong Tat CHUA, and Ee-peng LIM Conference Proceeding Article
Two-level Path Authentication in EPCglobal Network, Hongbing WANG, Yingjiu LI, Zhongyang ZHANG, and Zhenfu CAO Conference Proceeding Article
Understanding Task-driven Information Flow in Collaborative Networks, Gengxin MIAO, Shu TAO, Winnie CHENG, Randy Moulic, Louise E. Moser, David LO, and Xifeng YAN Conference Proceeding Article
Content Contribution in Social Media: A Dynamic Structural Model Approach, Qian TANG, Bin GU, and Andrew B. WHINSTON Presentation
A Comparative Study of Cyberattacks, Seung Hyun KIM, QIU-HONG WANG, and Johannes B. ULLRICH Journal Article
An Efficient Dataflow Execution Method for Mobile Context Monitoring Applications, Younghyun Ju, Chulhong Min, Youngki Lee, Jihyun Yu, and Junehwa Song Conference Paper
An Efficient Dataflow Execution Method for Mobile Context Monitoring Applications, Younghyun JU, Chulhong MIN, Youngki LEE, Jihyun YU, and Junehwa SONG Conference Proceeding Article
Boosting web video categorization with contextual information from social web, Xiao WU, Chong-wah NGO, Yi-Ming ZHU, and Qiang PENG Journal Article
Business and data analytics: New innovations in the management of e-commerce, Robert J. KAUFFMAN, Jaideep SRIVASTAVA, and Jamshid VAYGHAN Journal Article
Business Process Management and Six Sigma: Leveraging the Synergistic Relationship, Suresh SUBRAMANIAM, Venky Shankararaman, K. V. Krishnankutty, and Ravi Chinta Book Chapter
Business process management in financial services, Randall E. DURAN Book Chapter
Coordinating occupant behavior for building energy and comfort management using multi-agent systems, Laura KLEIN, Jun Young Kwak, Geoffrey Kavulya, Farrokh Jazizadeh, Burcin Becerik-Gerber, Pradeep VARAKANTHAM, and Milind Tambe Journal Article
Dynamic lookahead mechanism for conserving power in multi-player mobile games, Karthik THIRUGNANAM, Bhojan Anand, Jeena Sebastian, Pravein Kannan, Akhihebbal L. Ananda, Rajesh Krishna BALAN, and Mun Choon CHAN Conference Proceeding Article
Hierarchical fuzzy logic system for implementing maintenance schedules of offshore power systems, C. S. CHANG, Zhaoxia WANG, Fan YANG, and W. W. TAN Journal Article
Hoare-style verification of graph programs, Christopher M. POSKITT and Detlef PLUMP Journal Article
HuMan: Creating Memorable Fingerprints of Mobile Users, Gupta PAYAS, Kiat Wee TAN, Narayanasamy RAMASUBBU, David LO, Debin GAO, and Rajesh Krishna BALAN Conference Proceeding Article
Improved Duplicate Bug Report Identification, Yuan TIAN, Chengnian SUN, and David LO Conference Proceeding Article
MobiCon: A mobile context-monitoring platform, Youngki LEE, S. S. Iyengar, Chulhong MIN, Younghyun JU, Taiwoo PARK, Jinwon LEE, Yunseok RHEE, and Junehwa SONG Journal Article
MobiCon: Mobile Context Monitoring Platform, Youngki Lee, S. S. Iyengar, Chulhong Min, Younghyun Ju, Taiwoo Park, Jinwon Lee, Yunseok Rhee, and Junehwa Song Journal Article
Quality and leniency in online collaborative rating systems, Hady W. LAUW, Ee Peng LIM, and Ke WANG Journal Article
ROAD: A New Spatial Object Search Framework for Road Networks, Ken C. K. LEE, Wang-Chien LEE, Baihua ZHENG, and Yuan TIAN Journal Article
Scenario-Based and Value-Based Specification Mining: Better Together, David LO and Shahar MAOZ Journal Article
Utility-based Bandwidth Adaptation in Mission-Oriented Wireless Sensor Networks, Sharanya ESWARAN, Archan MISRA, Flavio BERGAMASCHI, and Thomas LA PORTA Journal Article
Verbal coordination in first person shooter games, Anthony TANG, Jonathan MASSEY, Nelson WONG, Derek REILLY, and W. Keith EDWARDS Conference Proceeding Article
SecDS: A Secure EPC Discovery Services System in EPCglobal Network, Jie SHI, Darren SIM, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
ARIVU: Making Networked Mobile Games Green: A Scalable Power-Aware Middleware, Anand BHOJAN, Ananda L. Akhihebbal L., Mun Choon CHAN, and Rajesh Krishna BALAN Journal Article
Does Complexity Deter Customer-Focus?, Sendil K. ETHIRAJ, Narayanasamy RAMASUBBU, and M. S. Krishnan Journal Article
Extreme learning machine terrain-based navigation for unmanned aerial vehicles, Ee May KAN, Meng Hiot LIM, Yew Soon ONG, Ah-hwee TAN, and Swee Ping YEO Journal Article
Manipulation of Online Reviews: An Analysis of Ratings, Readability, and Sentiments, Nan HU, Indranil BOSE, Noi Sian KOH, and Ling LIU Journal Article
Mitigating the true cost of advertisement-supported "free" mobile applications, Azeem J. KHAN, Vigneshwaran SUBBARAJU, Archan MISRA, and Srinivasan SESHAN Conference Proceeding Article
On Limitations of Designing Usable Leakage-Resilient Password Systems: Attacks, Principles and Usability, Qiang YAN; Jin HAN; Yingjiu LI; and Huijie, Robert DENG Conference Proceeding Article
Query Answer Authentication, Hwee Hwa PANG and Kian-Lee TAN Book
Summarizing rushes videos by motion, object, and event understanding, Feng WANG and Chong-wah NGO Journal Article
The social network of software engineering research, Subhajit DATTA, Nishant KUMAR, and Santonu SARKAR Conference Proceeding Article
Towards fine-grained radio-based indoor location, Jie XIONG and Kyle JAMIESON Conference Proceeding Article
Using Visual Attention Region for Compact Descriptor for Visual Search, Lai-Tee CHEOK, Jaeyong SONG, and Kyungmo PARK Report
Video Evaluation Criteria for Compact Descriptor for Visual Search, Jaeyong SONG, Lai Tee Cheok, and Kyungmo PARK Report
Work item tagging: Communicating concerns in collaborative software development, Christoph TREUDE and Margaret-Anne STOREY Journal Article
Formal modeling and validation of Stateflow diagrams, Chunqing CHEN, Jun SUN, Yang LIU, Jin Song DONG, and Manchun ZHENG Journal Article
Adaptive Collision Resolution for Efficient RFID Tag Identification, Yung-Chun CHEN, Kuo-Hui YEH, Nai-Wei LO, Yingjiu LI, and Enrico WINATA Journal Article
A Fuzzy Logic Multi-Criteria Decision Framework for Selecting IT Service Providers, Amir KARAMI and Zhiling GUO Conference Proceeding Article
A Generic Construction of Accountable Decryption and Its Applications, Xuhua ZHOU, Xuhua DING, and Kefei CHEN Conference Proceeding Article
A hybridized Lagrangian relaxation and simulated annealing method for the course timetabling problem, Aldy GUNAWAN and Kim Leng POH Journal Article
A new efficient optimistic fair exchange protocol without random oracles, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article
An improved K-nearest-neighbor algorithm for text categorization, Shengyi JIANG, Guansong PANG, Meiling WU, and Limin KUANG Journal Article
Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems, Qiang YAN, Yingjiu LI, and Robert H. DENG Journal Article
A Sentiment Analysis of Singapore Presidential Election 2011 using Twitter Data with Census Correction, Murphy Junyu CHOY, Michelle Lee Fong CHEONG, Nang Laik MA, and Ping Shung KOO Report
A Survey on Privacy Frameworks for RFID Authentication, Chunhua SU; Yingjiu LI; Yunlei ZHAO; Huijie, Robert DENG; Yiming ZHAO; and Jianying ZHOU Journal Article
A survey on privacy frameworks for RFID authentication, Chunhua SU, Yingjiu LI, Yunlei ZHAO, Robert H. DENG, Yiming ZHAO, and Jianying ZHOU Journal Article
Consumer-driven innovation management, Arcot Desai NARASIMHALU and Shekhar MITRA Book Chapter
Content Contribution in Social Media: The Case of YouTube, Qian TANG, Bin GU, and Andrew B. WHINSTON Conference Proceeding Article
Detecting node replication attacks in mobile sensor networks: theory and approaches, Wen Tao ZHU, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article
Detecting node replication attacks in wireless sensor networks: a survey, Wen Tao ZHU, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article
Do Hacker Forums Contribute to Security Attacks?, QIU-HONG WANG, Wei T. YUE, and Kai-Lung HUI Conference Proceeding Article
Dynamic Secure Cloud Storage with Provenance, Sherman S. M. CHOW, Cheng-Kang CHU, Xinyi HUANG, Jianying ZHOU, and Robert H. DENG Book Chapter
Evaluating the use of a mobile annotation system for geography education, Dion Hoe-Lian GOH, Khasfariyati Razikin, Chei Sian LEE, Ee Peng LIM, Kalyani CHATTERJEA, and Chew-Hung CHANG Journal Article
Event History, Spatial Analysis and Count Data Methods for Empirical Research in IS, Robert J. KAUFFMAN, A. A. Techatassanasoontorn, and B. WANG Journal Article
Identification of Demand through Statistical Distribution Modeling for Improved Demand Forecasting, Murphy CHOY and Michelle Lee Fong CHEONG Journal Article
Imbalance Challenge of Enacting Information Privacy Safeguards in Healthcare: A Grounded Theory Approach, Rachida Parks, Heng XU, and Chao-Hsien CHU Conference Paper
Information Extraction from Text, Jing JIANG Book Chapter
Information Extraction from Text, Jing JIANG Book Chapter
Integrating the Cloud-Scenarios and Solutions, Venky SHANKARARAMAN and Eng Kit Lum Book Chapter
IT-Supported a la Carte Pricing in Air Travel: A Test of the Strategic Decommoditization Hypothesis, N.F. Granados, Robert John Kauffman, H.C. Lai, and H.C. Lin Journal Article
Learning Bregman distance functions for semi-supervised clustering, Lei Wu, Chu Hong HOI, Rong Jin, Jianke Zhu, and N. Yu Journal Article
Learning Extended FSA from Software: An Empirical Assessment, David LO, Leonardo Mariani, and Mauro Santoro Journal Article
Managing Successful Innovation Delivery, Arcot Desai NARASIMHALU Book Chapter
Mining Diversity on Social Media Networks, Lu LIU, Feida ZHU, Meng JIANG, Jiawei Han, Lifeng SUN, and Shiqiang YANG Journal Article
Modeling and Compressing 3-D Facial Expressions Using Geometry Videos, Jiazhi XIA, Dao T. P. QUYNH, Ying HE, Xiaoming CHEN, and Steven C. H. HOI Journal Article
Multi-Party Multi-Period Supply Chain Coordination, Thin Yin LEONG and Michelle Lee Fong CHEONG Journal Article
NBS: a network-bandwidth-aware streaming version switcher for mobile streaming applications under fuzzy logic control, Pengcheng XIONG, Jialie SHEN, Qingyang WANG, Deepal Jayasinghe, Jack LI, and Calton Pu Conference Proceeding Article
New Findings on RFID Authentication Schemes against De-synchronization Attack, Kuo-Hui YEH, Nai-Wei LO, Yingjiu LI, Yung-Chun CHEN, and Tzong-Chen WU Journal Article
Online and Offline Demand and Price Elasticities: Evidence from the Air Travel Industry, N. F. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article
Optimal decision making for online referral marketing, Zhiling GUO Journal Article
Predicting Image Popularity in an Incomplete Social Media Community by a Weighted Bi-partite Graph, Xiang NIU, Lusong LI, Tao MEI, Jialie SHEN, and Ke XU Conference Proceeding Article
Preface: Trends in natural and machine intelligence, Jonathan H. CHAN and Ah-hwee TAN Journal Article
ROAD: A New Spatial Object Search Framework for Road Networks, Ken C. K. Lee, Wang-chien Lee, Baihua ZHENG, and Yuan Tian Journal Article
Robust distributed scheduling via time period aggregation, Shih-Fen CHENG, John Tajan, and Hoong Chuin LAU Journal Article
Robust Local Search for Solving RCPSP/max with Durational Uncertainty, Na FU, Hoong Chuin LAU, Pradeep VARAKANTHAM, and Fei XIAO Journal Article
SecTTS: A Secure Track and Trace System for RFID-Enabled Supply Chains, Jie SHI, Yingjiu LI, Wei He, and Darren Sim Journal Article
Self‐regulating action exploration in reinforcement learning, Teck-Hou TENG, Ah-hwee TAN, and Yuan-Sin TAN Journal Article
Simultaneous camera pose and correspondence estimation with motion coherence, Wen-yan LIN, Loong-Fah CHEONG, Ping TAN, Guo DONG, and Siying LIU Journal Article
Structural analysis in multi-relational social networks, Bingtian DAI, Freddy CHUA, and Ee Peng LIM Conference Paper
Systems and methods for transaction account offerings, Clinton ALLEN, Michael DiGregorio, Glade ERIKSON, Deepinder GULATI, Jacob Plammoottil JACOB, Sanjiv KHOSLA, and Seema CHOKSHI Patent
Text Mining in Multimedia, Zheng-Jun ZHA, Meng WANG, Jialie SHEN, and Tat-Seng CHUA Book Chapter
The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review, W. YAO, Chao-Hsien CHU, and Z. LI Journal Article
The impact of ultimate ownerships on audit fees: Evidence from Chinese listed companies, Nan HU, Fanjun WANG, Peng WANG, Lee J. YAO, and Junrui ZHANG Journal Article
The Learning Curve of Knowledge Workers in a Computing Call Cente, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Journal Article