The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2011

PDF

Differencing labeled transition systems, Zhenchang XING, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Direction-Based Surrounder Queries for Mobile Recommendations, Xi GUO, Baihua ZHENG, Yoshiharu ISHIKAWA, and Yunjun GAO Journal Article

PDF

Efficient Evaluation of Continuous Text Seach Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Journal Article

Enabling Mobile Multimedia with the Cloud, Hari KALVA and Lai-Tee CHEOK Conference Proceeding Article

PDF

General construction of chameleon all-but-one trapdoor functions, Shengli LIU, Junzuo LAI, and Robert H. DENG Conference Proceeding Article

PDF

Influence Diagrams With Memory States: Representation and Algorithms, Xiaojian WU, Akshat KUMAR, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Location-Dependent Spatial Query Containment, Ken C. K. LEE, Brandon UNGER, Baihua ZHENG, and Wang-Chien LEE Journal Article

PDF

Measuring an organisation’s innovation climate: A case study from Singapore, Siu Loon HOE Journal Article

PDF

Mining direct antagonistic communities in explicit trust networks, David LO, Didi SURIAN, Zhang KUAN, and Ee Peng LIM Conference Proceeding Article

PDF

On Modeling Virality of Twitter Content, Tuan Anh HOANG, Ee Peng LIM, Palakorn ACHANANUPARP, Jing JIANG, and Feida ZHU Conference Proceeding Article

Link

Personalized Video Similarity Measure, Jialie SHEN and Zhiyong CHENG Journal Article

PDF

PRTS: An approach for model checking probabilistic real-time hierarchical systems, Jun SUN, Yang LIU, Songzheng SONG, Jin Song DONG, and Xiaohong LI Conference Proceeding Article

PDF

Recommending People in Developers' Collaboration Network, Didi SURIAN, Nian LIU, David LO, Hanghang Tong, Ee Peng LIM, and Christos Faloutsos Conference Proceeding Article

Special Section: Information and Technology: Understanding New Strategies for Firms, Networks, and Markets, E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article

PDF

Strategic Responses to Standardization: Embrace, Extend or Extinguish?, C. Jason WOODARD and Joel WEST Book Chapter

Strategies for European ICT RTD collaboration with Australia and Singapore, Arcot Desai NARASIMHALU; Narayanasamy RAMASUBBU; Alex, Tai Loong TAN; Eric Prem; Ian Morgan; Ashley Stewart; Emma Baron; and Dana Sanchez Report

PDF

The impact of IFRS on accounting quality in a regulated market: An empirical study of China, Chunhui LIU, Lee J. YAO, Nan HU, and Ling LIU Journal Article

PDF

Towards a model checker for NesC and wireless sensor networks, Manchun ZHENG, Jun SUN, Yang LIU, Jin Song DONG, and Yu GU Conference Proceeding Article

PDF

Using social annotations for trend discovery in scientific publications, Meiqun HU, Ee Peng LIM, and Jing JIANG Conference Paper

PDF

Verification of orchestration systems using compositional partial order reduction, Tian Huat TAN, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

Virality Modeling and Analysis, Tuan Anh HOANG and Ee-Peng LIM Conference Paper

PDF

Packed, Printable, and Polymorphic Return-Oriented Programming, Kangjie LU, Dabi Zou, Weiping Wen, and Debin GAO Conference Proceeding Article

PDF

Linear Obfuscation to Combat Symbolic Execution, Zhi WANG, Jiang Ming, Chunfu Jia, and Debin GAO Conference Proceeding Article

PDF

An efficient adaptive vortex particle method for real-time smoke simulation, Shengfeng HE, Hon-Cheng WONG, and Un-Hong WONG Conference Proceeding Article

PDF

Certificateless cryptography with KGC trust level 3, Guomin YANG and Chik How TAN Journal Article

PDF

DriverGuard: A fine-grained protection on I/O flow, Yueqiang CHENG, Xuhua DING, and Robert H. DENG Conference Proceeding Article

PDF

Effective communication of software development knowledge through community portals, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

Improved ordinary measure and image entropy theory based intelligent copy detection method, Dengpan YE, Longfei MA, Lina WANG, and Robert H. DENG Journal Article

Linear Obfuscation to Combat Symbolic Execution, Zhi Wang, Jiang Ming, Chunfu Jia, and Debin GAO Conference Paper

PDF

Mining Top-K Large Structural Patterns in a Massive Network, Feida ZHU, Qiang QU, David LO, Xifeng YAN, Jiawei HAN, and Philip S. YU Conference Proceeding Article

Link

NORT: Runtime Anomaly-based Monitoring of Malicious Behavior for Windows, Narcisa Andrea MILEA, Siau-Cheng KHOO, David LO, and Cristi POP Conference Proceeding Article

PDF

On Detection of Erratic Arguments, Jin HAN, Qiang YAN, Robert H. DENG, and Debin GAO Conference Proceeding Article

Link

Player and Team Performance in EverQuest II and Halo 3, Kyong Jin SHIM, S. Damania, C. Delong, and J. Srivastava Magazine Article

PDF

Privacy beyond single sensitive attribute, Yuan FANG, Mafruz Zaman ASHRAFI, and See Kiong NG Conference Proceeding Article

Secure and Practical Key Distribution for RFID-Enabled Supply Chains, Tieyan LI, Yingjiu LI, and Guilin WANG Conference Proceeding Article

PDF

Spectral geometry image: Image based 3D models for digital broadcasting applications, Boon Seng CHEW, Lap Pui CHAU, Ying HE, Dayong WANG, and Steven C. H. HOI Journal Article

PDF

Structural analysis of the hot spots in the binding between H1N1 HA and the 2DI antibody: Do mutations of H1N1 from 1918 to 2009 affect much on this binding?, Qian LIU, Steven C. H. HOI, Chinh T. T. SU, Zhenhua LI, Chee-Keong KWOH, Limsoon WONG, and Jinyan LI Journal Article

PDF

Structural complexity and programmer team strategy: An experimental test, Narayan RAMASUBBU, Chris F. Kemerer, and Jeff Min Teck HONG Journal Article

PDF

Tamper detection in the EPC network using digital watermarking, Shui-Hua HAN, Chao-Hsien CHU, and Zongwei LUO Journal Article

PDF

Towards Ground Truthing Observations in Gray-Box Anomaly Detection, Jiang MING, Haibin ZHANG, and Debin GAO Conference Proceeding Article

Unifying EA, BPM and SOA through a Synergestic Framework, Venky SHANKARARAMAN and Pervez Kazmi Conference Proceeding Article

PDF

When Recommendation Meets Mobile: Contextual and Personalised Recommendation on the Go, Jinfeng ZHUANG, Tao MEI, Steven C. H. HOI, Ying-Qing XU, and Shipeng LI Conference Proceeding Article

Utilizing Hubel Wiesel models for semantic associations and topics extraction from unstructured text, Sandeep TIWARI and Kiruthika RAMANATHAN Conference Proceeding Article

PDF

A generic framework for three-factor authentication: preserving security and privacy in distributed systems, Xinyi HUANG, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. DENG Journal Article

PDF

A Hubel Wiesel model of early concept generalization based on local correlation of input features, Sepideh SADEGHI and Kiruthika RAMANATHAN Conference Proceeding Article

Link

An Incremental Approach to Closest Pair Queries in Spatial Networks Using Best-First Search, Chunan CHEN, Weiwei SUN, Baihua ZHENG, Dingding Mao, and Weimo LIU Conference Proceeding Article

PDF

CCRank: Parallel Learning to Rank with Cooperative Coevolution, Shuaiqiang WANG, Byron J. GAO, Ke WANG, and Hady W. LAUW Conference Proceeding Article

PDF

Defending against cross site scripting attacks, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article

PDF

General Construction of Chameleon All-but-one Trapdoor Functions, Shengli LIU, Junzuo LAI, and Robert H. DENG Journal Article

Probabilistic indexing of media sequences, Jialie SHEN, Meng WANG, Shuicheng YAN, and TIAN QI Conference Proceeding Article

PDF

TaxiSim: A multiagent simulation platform for evaluating taxi fleet operations, Shih-Fen CHENG and Thi Duong NGUYEN Conference Proceeding Article

Link

Acceptance of Service Oriented Computing: what do IT professionals think?, Ilse BAUMGARTNER and Peter GREEN Conference Proceeding Article

PDF

A hybrid agent architecture integrating desire, intention and reinforcement learning, Ah-hwee TAN, Yew-Soon ONG, and Akejariyawong TAPANUJ Journal Article

PDF

Automated Detection of Likely Design Flaws in Layered Architectures, Aditya BUDI, - Lucia, David LO, Lingxiao JIANG, and Shaowei WANG Conference Proceeding Article

Link

Developing and Applying a User-Centered Model for the Design and Implementation of Information Visualisation, Lian Chee KOH, A. Slingsby, J. Dykes, and Tin Seong KAM Conference Proceeding Article

PDF

Effects of Mentoring on Player Performance in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM, Kuo-Wei HSU, and Jaideep SRIVASTAVA Conference Proceeding Article

E-referral and Word-of-Mouth Marketing, Zhiling GUO Presentation

PDF

Finding robust-under-risk solutions for flowshop scheduling, Steven O. Kimbrough, Ann KUO, and Hoong Chuin LAU Conference Paper

PDF

Generating Aspect-oriented Multi-document Summarization with Event-Aspect Model, Peng LI, Yinglin WANG, Wei GAO, and Jing JIANG Conference Proceeding Article

PDF

Generating aspect-oriented multi-document summarization with event-aspect model, Peng LI, Yinglin WANG, Wei GAO, and Jing JIANG Conference Proceeding Article

PDF

Heuristic Algorithms for Balanced Multi-way Number Partitioning, Jilian ZHANG, Kyriakos MOURATIDIS, and Hwee Hwa PANG Conference Proceeding Article

High-Performance Composite Event Monitoring System Supporting Large Numbers of Queries and Sources, SangJeong Lee, Youngki Lee, Byoungjip Kim, K. Selcuk Candan, Yunseok Rhee, and Junehwa Song Conference Paper

PDF

Linking Entities to a Knowledge Base with Query Expansion, Swapna GOTTIPATI and Jing JIANG Conference Proceeding Article

PDF

Media landscape in Twitter: A world of new conventions and political diversity, Jisun AN, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article

PDF

Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Mining weakly labeled web facial images for search-based face annotation, Dayang WANG, Steven C. H. HOI, and Ying HE Conference Proceeding Article

Link

Modeling Player Performance in Massively Multiplayer Online Role-Playing Games: The Effects of Diversity in Mentoring Network, Kyong Jin SHIM, K. W. HSU, and J. SRIVASTAVA Conference Proceeding Article

PDF

Online AUC maximization, Peilin ZHAO, Steven C. H. HOI, Rong JIN, and Tianbo YANG Conference Proceeding Article

PDF

Parallel Learning to Rank for Information Retrieval, Shuaiqiang WANG, Byron J. GAO, Ke WANG, and Hady W. LAUW Conference Proceeding Article

PDF

Real-world parameter tuning using factorial design with parameter decomposition, Aldy GUNAWAN, Hoong Chuin LAU, and Elaine WONG Conference Proceeding Article

PDF

Relevant knowledge helps in choosing right teacher: Active query selection for ranking adaptation, Peng CAI, Wei GAO, Kam-Fai WONG, and Aoying ZHOU Conference Proceeding Article

PDF

Scalable Multiagent Planning using Probabilistic Inference, Akshat KUMAR, Shlomo ZILBERSTEIN, and Marc TOUSSAINT Conference Proceeding Article

PDF

Solution pluralism and metaheuristics, Steven O. Kimbrough, Ann KUO, Hoong Chuin LAU, Frederic H. Murphy, and David Harlan Wood Conference Paper

PDF

Trust network inference for online rating data using generative models, Freddy Tat Chua CHUA and Ee Peng LIM Conference Proceeding Article

PDF

Unsupervised discovery of discourse relations for eliminating intra-sentence polarity ambiguities, Lanjun ZHOU, Binyang LI, Wei GAO, Zhongyu WEI, and Kam-Fai WONG Conference Proceeding Article

PDF

Unsupervised Information Extraction with Distributional Prior Knowledge, Cane Wing-ki LEUNG, Jing JIANG, Kian Ming A. CHAI, Hai Leong Chieu, and Loo-Nin Teow Conference Proceeding Article

Parallel Markets, Interdependent Assets, and Market Crashes: An Agent-Based Modeling Perspective, Shih-Fen CHENG, Wing Bernard LEE, and Annie KOH Presentation

Trajectory-Based Consumer Segmentation and Product Recommender System in the Online Market, Young Soo KIM and Ramayya Krishnan Presentation

A mobile context monitoring platform for pervasive computing environments, Youngki LEE, Chulhong MIN, Younghyun JU, Saumay PUSHP, and Junehwa SONG Conference Proceeding Article

PDF

Adaptive display power management for mobile games, Bhojan ANAND, Karthik THIRUGNANAM, Jeena SEBASTIAN, Pravein G. KANNAN, Akhihebbal L. ANANDA, Mun Choon CHAN, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

A feature based frequency domain analysis algorithm for fault detection of induction motors, Zhaoxia WANG, C. S. CHANG, and ZHANG Yifan Conference Proceeding Article

PDF

A Quality Metric for Sustainable Innovations, Arcot Desai NARASIMHALU Conference Paper

PDF

A Solution with Security Concern for RFID-Based Track and Trace Services in EPCglobal-Enabled Supply Chains, Wei HE, Yingjiu LI, Kevin CHIEW, Tieyan LI, and Eng Wah LEE Book Chapter

PDF

CIO reporting structure, strategic positioning, and firm performance, Rajiv D BANKER, Nan HU, Paul A PAVLOU, and Jerry LUFTMAN Journal Article

PDF

Continuous Visible Nearest Neighbor Query Processing in Spatial Databases, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Qing LI, and Xiaofa GUO Journal Article

Enhancing SOA Integration through Enterprise Services, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article

PDF

Fully Secure Cipertext-Policy Hiding CP-ABE, Junzuo LAI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article

PDF

Getting to Global Yes! Designing a Distributed Student Collaboration, Selma Limam MANSAR, Randy WEINBERG, and Benjamin Kok Siew GAN Conference Proceeding Article

PDF

Hierarchical identity-based chameleon hash and its applications, Feng BAO, Robert H. DENG, Xuhua DING, Junzuo LAI, and Yunlei ZHAO Conference Proceeding Article

PDF

High-Performance Composite Event Monitoring System Supporting Large Numbers of Queries and Sources, SangJeong LEE, Youngki LEE, Byoungjip KIM, K. Selcuk CANDAN, Yunseok RHEE, and Junehwa SONG Conference Proceeding Article

PDF

kb-anonymity: A model for anonymized behavior-preserving test and debugging data, Aditya BUDI, David LO, Lingxiao JIANG, and Lucia Lucia Conference Proceeding Article

PDF

Link type based pre-cluster pair model for coreference resolution, Yang SONG, Houfeng WANG, and Jing JIANG Conference Proceeding Article

PDF

On combining state space reductions with global fairness assumptions, Shao Jie ZHANG, Jun SUN, Jun PANG, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Online fault detection of induction motors using frequency domain independent components analysis, Zhaoxia WANG and C. S. CHANG Conference Proceeding Article

PDF

Optimizing Sensor Data Acquisition for Energy-Efficient Smartphone-based Continuous Event Processing, Archan MISRA and Lipyeow LIM Conference Proceeding Article

PDF

Preserving transparency and accountability in optimistic fair exchange of digital signatures, Xinyi HUANG, Yi Mu, Willy Susilo, Jianying Zhou, and Robert H. DENG Journal Article

PDF

Query weighting for ranking model adaptation, Peng CAI, Wei GAO, Aoying ZHOU, and Kam-Fai WONG Conference Proceeding Article

PDF

Real-time trip information service for a large taxi fleet, Rajesh Krishna BALAN, Nguyen Xuan KHOA, and Lingxiao JIANG Conference Proceeding Article

PDF

Regret minimizing audits: A learning-theoretic basis for privacy protection, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, and Arunesh SINHA Conference Proceeding Article

Link

Secure localization with attack detection in wireless sensor networks, Wentao ZHU, Yang Xiang, Jianying Zhou, Robert H. DENG, and Bao Feng Journal Article