Submissions from 2012
Diversity maximization speedup for fault localization, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article
Duplicate Bug Report Detection with a Combination of Information Retrieval and Topic Modeling, Anh Tuan NGUYEN, Tung NGUYEN, Tien NGUYEN, David LO, and Chengnian SUN Conference Proceeding Article
Ensuring Flexible Process Compliance with Semantic Constraints using Mixed-Integer Programming, Akhil KUMAR, Wen YAO, and Chao-Hsien CHU Journal Article
Extending a mobile device's interaction space through body-centric interaction, Xiang CHEN, Nicolai MARQUARDT, Anthony TANG, Sebastian BORING, and Saul GREENBERG Conference Proceeding Article
Guest editors’ introduction: Methods innovations for the empirical study of technology adoption and diffusion, Robert John KAUFFMAN and Angsana A. TECHATASSANASOONTORN Transcript
Guest editors’ introduction: Poverty, technology, microfinance and development, Robert J. KAUFFMAN and Frederick J. Riggins Editorial
Inferring Semantically Related Software Terms and their Taxonomy by Leveraging Collaborative Tagging, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article
Information and Communication Technology, and the Sustainability of Microfinance, Robert J. KAUFFMAN and Frederick J. Riggins Journal Article
In-game action list segmentation and labeling in real-time strategy games, Wei GONG, Ee-Peng LIM, Palakorn ACHANANUPARP, Feida ZHU, David LO, and Freddy Chong-Tat CHUA Conference Proceeding Article
In Search of Efficient Flexibility: Effects of Software Component Granularity on Development Effort, Defects, and Customization Effort, Ramanath SUBRAMANYAM, Narayanasamy RAMASUBBU, and M. S. Krishnan Journal Article
Interactive fault localization leveraging simple user feedback, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article
kbe-Anonymity: Test Data Anonymization for Evolving Programs, - Lucia, David LO, Lingxiao JIANG, and Aditya Budi Conference Paper
kbe-anonymity: Test data anonymization for evolving programs, Lucia LUCIA, David LO, Lingxiao JIANG, and Aditya BUDI Conference Proceeding Article
Learning Fine-Grained Structured Input for Memory Corruption Detection, Lei ZHAO, Debin GAO, and Lina WANG Conference Proceeding Article
No tradeoff between confidentiality and performance: An analysis on H.264/SVC partial encryption, Zhuo WEI, Xuhua DING, Robert H. DENG, and Yongdong WU Conference Proceeding Article
Observatory of trends in software related microblogs, Achananuparp PALAKORN, Nelman Lubis IBRAHIM, Yuan TIAN, David LO, and Ee Peng LIM Conference Proceeding Article
Reputation as Public Policy for Internet Security, Leigh L. Linden, John S. Quarterman, Qian TANG, and Andrew B. Whinston Conference Proceeding Article
Scalable content authentication in H.264/SVC videos using perceptual hashing based on Dempster-Shafer theory, Dengpan YE, Zhuo Wei, Xuhua DING, and Robert H. DENG Journal Article
Semantic Patch Inference, Jesper ABDERSEN, Anh Cuong NGUYEN, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Proceeding Article
Semantic Patch Inference, Jesper Andersen, Anh Cuong Nguyen, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Paper
The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Nicolai MARQUARDT, Anthony TANG, and Saul GREENBERG Conference Proceeding Article
The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Anthony TANG, Anthony TANG, and Saul GREENBERG Conference Paper
To What Extent Could We Detect Field Defects? —An Empirical Study of False Negatives in Static Bug Finding Tools, Ferdian Thung, - Lucia, David LO, Lingxiao JIANG, Premkumar Devanbu, and Foyzur Rahman Conference Paper
To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools, Ferdian THUNG, Lucia Lucia, David LO, Lingxiao JIANG, Premkumar DEVANBU, and Foyzur RAHMAN Conference Proceeding Article
Verification of graph programs, Christopher M. POSKITT Conference Proceeding Article
Verifying total correctness of graph programs, Christopher M. POSKITT and Detlef PLUMP Conference Proceeding Article
What's Public Feedback? Linking High Quality Feedback to Social Issues Using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Paper
What's Public Feedback? Linking High Quality Feedback to Social Issues using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Proceeding Article
When would this bug get reported?, Ferdian THUNG, David LO, Lingxiao JIANG, Lucia Lucia, Foyzur Rahman, and Premkumar Devanbu Conference Proceeding Article
Auditing the XSS defence features implemented in web application programs, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article
Defeating SQL injection, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article
Niche-Seeking in Influence Maximization with Adversary, Long Foong LIOW, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article
A Context-aware Reminder System for Elders Based on Fuzzy Linguistic Approach, Shandan ZHOU, Chao-Hsien CHU, Zhiwen YU, and Jungyoon KIM Journal Article
Adapting Video Delivery Based on Motion Triggered Visual Attention, Hari KALVA, V. Adzic, and Lai-Tee Cheok Conference Paper
Adaptive Display Power Management for OLED Displays, Kiat Wee TAN and Rajesh Krishna BALAN Conference Proceeding Article
A non-parametric visual-sense model of images: Extending the cluster hypothesis beyond text, Kong-Wah WAN, Ah-hwee TAN, Joo-Hwee LIM, and Liang-Tien CHIA Journal Article
A secure and efficient discovery service system in EPCglobal network, Jie SHI, Yingjiu LI, and Robert H. DENG Journal Article
Automatic compositional verification of timed systems, Shang-Wei LIN, Yang LIU, Jun SUN, Jin Song DONG, and Étienne ANDRÉ Conference Proceeding Article
Bidder behaviors in repeated B2B procurement auctions, Jong Han PARK, Jae Kyu LEE, and Hoong Chuin LAU Conference Proceeding Article
Boosting multi-kernel Locality-Sensitive Hashing for scalable image retrieval, Hao XIA, Steven C. H. HOI, Pengcheng WU, and Rong JIN Conference Proceeding Article
Collective churn prediction in social network, Richard J. OENTARYO, Ee-peng LIM, David LO, Feida ZHU, and Philips K. PRASETYO Conference Proceeding Article
Confidence-aware graph regularization with heterogeneous pairwise features, Yuan FANG, Bo-June Paul HSU, and Kevin Chen-Chuan CHANG Conference Proceeding Article
Consumer Micro-behavior and TV Viewership Patterns: Data Analytics for the Two-way Set-top box, Ray M. CHANG, Robert J. KAUFFMAN, and Insoo SON Conference Proceeding Article
Control-theoretic Utility Maximization in Multihop Wireless Networks under Mission Dynamics, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Journal Article
Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper
Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper
Dynamic Stochastic Orienteering Problems for Risk-Aware Applications, Hoong Chuin LAU, William YEOH, Pradeep VARAKANTHAM, and Duc Thien NGUYEN Conference Proceeding Article
Follow Link Seeking Strategy: A pattern based approach, Agus Trisnajaya KWEE, Ee Peng LIM, Achananuparp PALAKORN, and Feida ZHU Conference Proceeding Article
Framing core and advanced competencies for undergraduate Information Systems program courses: does the nature, level, complexity and audience of a course matter?, Ilse BAUMGARTNER and Venky SHANKARAMAN Conference Proceeding Article
From Clickstreams to Searchstreams: Search Network Graph Evidence from a B2B E-Market, Mei LIN, M. F. LIN, and Robert J. KAUFFMAN Conference Proceeding Article
Hedonic Valuation of Online Game Participation, Robert J. KAUFFMAN, Kwansoo KIM, and Byungjoon YOO Conference Proceeding Article
Improved BDD-based discrete analysis of timed systems, Truong Khanh NGUYEN, Jun SUN, Yang LIU, Jin Song DONG, and Yan LIU Conference Proceeding Article
Improving ethics education in accounting: Lessons from medicine and law, Chunhui LIU, Lee J. YAO, and Nan HU Journal Article
Improving ethics education in accounting: Lessons from medicine and law, Chunhui LIU, Lee J. YAO, and Nan HU Journal Article
Improving patient flow in emergency department through dynamic priority queue, Kar Way TAN, Chao WANG, and Hoong Chuin LAU Conference Proceeding Article
Integrating Enterprise System's 3rd Wave into IS Curriculum, Venky SHANKARARAMAN, Eng Kit LUM, and Dale SIMON Conference Proceeding Article
Investment Timing for Mobile Payment Systems, Robert J. KAUFFMAN, Jun Liu, and Dan MA Conference Paper
Investment Timing for Mobile Payment Systems, Robert J. KAUFFMAN, Jun LIU, and Dan MA Conference Proceeding Article
Measurement-driven performance analysis of indoor femtocellular networks, Trung-Tuan LUONG, Vigneshwaran SUBBARAJU, Archan MISRA, and Srinivasan SESHAN Conference Proceeding Article
Message from General Chair and Program Co-Chairs [of ICEC '12, 14th Annual International Conference on Electronic Commerce, held in Singapore, 7-8 August 2012], Robert J. KAUFFMAN, Martin BICHLER, Hoong Chuin LAU, Christopher YANG, and Yinping YANG Editorial
Modeling Concept Dynamics for Large Scale Music Search, Jialie SHEN, Hwee Hwa PANG, Meng WANG, and Shuicheng YAN Conference Proceeding Article
Online feature selection for mining big data, Steven C. H. HOI, Jialei WANG, Peilin ZHAO, and Rong JIN Conference Proceeding Article
Presynaptic learning and memory with a persistent firing neuron and a habituating synapse: A model of short term persistent habituation, Kiruthika RAMANATHAN, Ning NING, Dhiviya DHANASEKAR, Guoqi LI, Luping SHI, and Prahlad VADAKKEPAT Journal Article
Sampling and ontologically pooling web images for visual concept learning, Shiai ZHU, Chong-wah NGO, and Yu-Gang JIANG Journal Article
Shortest Path Computation with No Information Leakage, Kyriakos MOURATIDIS and Man Lung YIU Conference Proceeding Article
Shortest Path Computation with No Information Leakage, Kyriakos MOURATIDIS and Man Lung Yiu Conference Paper
The Case for Cloud-Enabled Mobile Sensing Services, Sougata SEN, Archan MISRA, Rajesh Krishna BALAN, and Lipyeow LIM Conference Proceeding Article
The Evolution of Platform Architectures, C. Jason WOODARD and Eric K. CLEMONS Conference Paper
The patrol scheduling problem, Hoong Chuin LAU and Aldy GUNAWAN Conference Proceeding Article
The Pricing Model of Cloud Computing Services, Jianhui Huang and Dan MA Conference Paper
The Pricing Model of Cloud Computing Services, Jianhui HUANG and Dan MA Conference Proceeding Article
Toward a Mobile Platform for Pervasive Games, Inseok Hwang, Youngki Lee, Taiwoo Park, and Junehwa Song Conference Paper
Toward a Mobile Platform for Pervasive Games, Inseok HWANG, Youngki LEE, Taiwoo PARK, and Junehwa SONG Conference Proceeding Article
Toward large-scale agent guidance in an urban taxi service, Agussurja LUCAS and Hoong Chuin LAU Conference Proceeding Article
Uncertain Congestion Games with Assorted Human Agent Populations, Asrar AHMED, Pradeep Reddy VARAKANTHAM, and Shih-Fen CHENG Conference Proceeding Article
Valuation of Benchmark Provisions on IT Services Contracts, Robert J. KAUFFMAN and Ryan SOUGSTAD Conference Proceeding Article
Vignette: A Style Preserving Sketching Tool for Pen-and-Ink Illustration with Texture Synthesis, Rubaiat Habib KAZI, Takeo Igarashi, Shengdong ZHAO, Richard Christopher DAVIS, and Kenshi Takayama Conference Proceeding Article
Vignette: A Style Preserving Sketching Tool for Pen-and-Ink Illustration with Texture Synthesis, Rubaiat Habib Kazi, Takeo Igarashi, Shengdong Zhao, Richard Christopher DAVIS, and Kenshi Takayama
Innovation and Value Migration in Layered Architectures: The Case of Cloud Orchestration Stacks, Richard TEE and C. Jason WOODARD Presentation
Uncovering Insights through Data Analytics for an Airport Operation to Improve Profitability, Nang Laik MA, Michelle Lee Fong CHEONG, and Junyu CHOY Conference Proceeding Article
Embracing Analytics for a Better Competitive Edge, Tin Seong KAM News Article
Using monterey phoenix to formalize and verify system architectures, Jiexin ZHANG, Yang LIU, Mikhail AUGUSTON, Jun SUN, and Jin Song DONG Conference Proceeding Article
Probabilistic model checking multi-agent behaviors in dispersion games using counter abstraction, Jianye HAO, Songzheng SONG, Yang LIU, Jun SUN, Lin GUI, Jin Song DONG, and Ho-fung LEUNG Conference Proceeding Article
Tracking sentiment and topic dynamics from social media, Yulan HE, Chenghua LIN, Wei GAO, and Kam-Fai WONG Conference Proceeding Article
Integrating course-level competencies into a program-wide learning outcomes framework: Review of the competencies extraction and definition process, Ilse BAUMGARTNER Conference Paper
Adaptive CGF for pilots training in air combat simulation, Teck-Hou TENG, Ah-hwee TAN, Wee-Sze ONG, and Kien-Lip LEE Conference Proceeding Article
A model checker for hierarchical probabilistic real-time systems, Songzheng SONG, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
An Economic Analysis of the Online Counterfeit Market and the Impact of Anti-Counterfeit Technology, Xiong ZHANG, Zhiling GUO, and Wei Thoo YUE Conference Proceeding Article
A Pollution Attack to Public-key Watermarking Schemes, Yongdong WU and Robert H. DENG Conference Proceeding Article
Decision Support for Agent Populations in Uncertain and Congested Environments, Pradeep Reddy VARAKANTHAM, Shih-Fen CHENG, Geoff GORDON, and Asrar AHMED Conference Proceeding Article
Deep Online Learning: A Framework of Exploring Hierarchical Representations for Online Learning, Jialei WANG and Steven C. H. HOI Report
Detecting Anomalous Twitter Users by Extreme Group Behaviors, Hanbo DAI, Ee-peng LIM, Feida ZHU, and Hwee Hwa PANG Conference Proceeding Article
Empirical comparison of 3-D virtual world and face-to-face classroom for higher education, Xiaofeng CHEN, Keng SIAU, and Fiona Fui-hoon NAH Journal Article
Enhancing Access Privacy of Range Retrievals over B+Trees, Hwee Hwa PANG, Jilian ZHANG, and Kyriakos MOURATIDIS Journal Article
Exact soft confidence-weighted learning, Jialei WANG and Steven C. H. HOI Conference Proceeding Article
Fast bounded online gradient descent algorithms for scalable kernel-based online learning, Peilin ZHAO, Jialei WANG, Pengcheng WU, Rong JIN, and Steven C. H. HOI Conference Proceeding Article
Finding Bursty Topics From Microblogs, Qiming DIAO, Jing JIANG, Feida ZHU, and Ee Peng LIM Conference Proceeding Article
Formal analysis of pervasive computing systems, Yan LIU, Xian ZHANG, Jin Song DONG, Yang LIU, Jun SUN, Jit BISWAS, and Mounir MOKHTARI Conference Proceeding Article
Identifying Event-related Bursts via Social Media Activities, Xin ZHAO, Baihan Shu, Jing JIANG, YANG SONG, Hongfei YAN, and Xiaoming LI Conference Proceeding Article
Information-theoretic multi-view domain adaptation, Pei YANG, Wei GAO, Qi TAN, and Kam-Fai WONG Conference Proceeding Article