Submissions from 2011
Differencing labeled transition systems, Zhenchang XING, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article
Direction-Based Surrounder Queries for Mobile Recommendations, Xi GUO, Baihua ZHENG, Yoshiharu ISHIKAWA, and Yunjun GAO Journal Article
Efficient Evaluation of Continuous Text Seach Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Journal Article
Enabling Mobile Multimedia with the Cloud, Hari KALVA and Lai-Tee CHEOK Conference Proceeding Article
General construction of chameleon all-but-one trapdoor functions, Shengli LIU, Junzuo LAI, and Robert H. DENG Conference Proceeding Article
Influence Diagrams With Memory States: Representation and Algorithms, Xiaojian WU, Akshat KUMAR, and Shlomo ZILBERSTEIN Conference Proceeding Article
Location-Dependent Spatial Query Containment, Ken C. K. LEE, Brandon UNGER, Baihua ZHENG, and Wang-Chien LEE Journal Article
Measuring an organisation’s innovation climate: A case study from Singapore, Siu Loon HOE Journal Article
Mining direct antagonistic communities in explicit trust networks, David LO, Didi SURIAN, Zhang KUAN, and Ee Peng LIM Conference Proceeding Article
On Modeling Virality of Twitter Content, Tuan Anh HOANG, Ee Peng LIM, Palakorn ACHANANUPARP, Jing JIANG, and Feida ZHU Conference Proceeding Article
Personalized Video Similarity Measure, Jialie SHEN and Zhiyong CHENG Journal Article
PRTS: An approach for model checking probabilistic real-time hierarchical systems, Jun SUN, Yang LIU, Songzheng SONG, Jin Song DONG, and Xiaohong LI Conference Proceeding Article
Recommending People in Developers' Collaboration Network, Didi SURIAN, Nian LIU, David LO, Hanghang Tong, Ee Peng LIM, and Christos Faloutsos Conference Proceeding Article
Special Section: Information and Technology: Understanding New Strategies for Firms, Networks, and Markets, E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article
Strategic Responses to Standardization: Embrace, Extend or Extinguish?, C. Jason WOODARD and Joel WEST Book Chapter
Strategies for European ICT RTD collaboration with Australia and Singapore, Arcot Desai NARASIMHALU; Narayanasamy RAMASUBBU; Alex, Tai Loong TAN; Eric Prem; Ian Morgan; Ashley Stewart; Emma Baron; and Dana Sanchez Report
The impact of IFRS on accounting quality in a regulated market: An empirical study of China, Chunhui LIU, Lee J. YAO, Nan HU, and Ling LIU Journal Article
Towards a model checker for NesC and wireless sensor networks, Manchun ZHENG, Jun SUN, Yang LIU, Jin Song DONG, and Yu GU Conference Proceeding Article
Using social annotations for trend discovery in scientific publications, Meiqun HU, Ee Peng LIM, and Jing JIANG Conference Paper
Verification of orchestration systems using compositional partial order reduction, Tian Huat TAN, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article
Virality Modeling and Analysis, Tuan Anh HOANG and Ee-Peng LIM Conference Paper
Packed, Printable, and Polymorphic Return-Oriented Programming, Kangjie LU, Dabi Zou, Weiping Wen, and Debin GAO Conference Proceeding Article
Linear Obfuscation to Combat Symbolic Execution, Zhi WANG, Jiang Ming, Chunfu Jia, and Debin GAO Conference Proceeding Article
An efficient adaptive vortex particle method for real-time smoke simulation, Shengfeng HE, Hon-Cheng WONG, and Un-Hong WONG Conference Proceeding Article
Certificateless cryptography with KGC trust level 3, Guomin YANG and Chik How TAN Journal Article
DriverGuard: A fine-grained protection on I/O flow, Yueqiang CHENG, Xuhua DING, and Robert H. DENG Conference Proceeding Article
Effective communication of software development knowledge through community portals, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article
Improved ordinary measure and image entropy theory based intelligent copy detection method, Dengpan YE, Longfei MA, Lina WANG, and Robert H. DENG Journal Article
Linear Obfuscation to Combat Symbolic Execution, Zhi Wang, Jiang Ming, Chunfu Jia, and Debin GAO Conference Paper
Mining Top-K Large Structural Patterns in a Massive Network, Feida ZHU, Qiang QU, David LO, Xifeng YAN, Jiawei HAN, and Philip S. YU Conference Proceeding Article
NORT: Runtime Anomaly-based Monitoring of Malicious Behavior for Windows, Narcisa Andrea MILEA, Siau-Cheng KHOO, David LO, and Cristi POP Conference Proceeding Article
On Detection of Erratic Arguments, Jin HAN, Qiang YAN, Robert H. DENG, and Debin GAO Conference Proceeding Article
Player and Team Performance in EverQuest II and Halo 3, Kyong Jin SHIM, S. Damania, C. Delong, and J. Srivastava Magazine Article
Privacy beyond single sensitive attribute, Yuan FANG, Mafruz Zaman ASHRAFI, and See Kiong NG Conference Proceeding Article
Secure and Practical Key Distribution for RFID-Enabled Supply Chains, Tieyan LI, Yingjiu LI, and Guilin WANG Conference Proceeding Article
Spectral geometry image: Image based 3D models for digital broadcasting applications, Boon Seng CHEW, Lap Pui CHAU, Ying HE, Dayong WANG, and Steven C. H. HOI Journal Article
Structural analysis of the hot spots in the binding between H1N1 HA and the 2DI antibody: Do mutations of H1N1 from 1918 to 2009 affect much on this binding?, Qian LIU, Steven C. H. HOI, Chinh T. T. SU, Zhenhua LI, Chee-Keong KWOH, Limsoon WONG, and Jinyan LI Journal Article
Structural complexity and programmer team strategy: An experimental test, Narayan RAMASUBBU, Chris F. Kemerer, and Jeff Min Teck HONG Journal Article
Tamper detection in the EPC network using digital watermarking, Shui-Hua HAN, Chao-Hsien CHU, and Zongwei LUO Journal Article
Towards Ground Truthing Observations in Gray-Box Anomaly Detection, Jiang MING, Haibin ZHANG, and Debin GAO Conference Proceeding Article
Unifying EA, BPM and SOA through a Synergestic Framework, Venky SHANKARARAMAN and Pervez Kazmi Conference Proceeding Article
When Recommendation Meets Mobile: Contextual and Personalised Recommendation on the Go, Jinfeng ZHUANG, Tao MEI, Steven C. H. HOI, Ying-Qing XU, and Shipeng LI Conference Proceeding Article
Utilizing Hubel Wiesel models for semantic associations and topics extraction from unstructured text, Sandeep TIWARI and Kiruthika RAMANATHAN Conference Proceeding Article
A generic framework for three-factor authentication: preserving security and privacy in distributed systems, Xinyi HUANG, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. DENG Journal Article
A Hubel Wiesel model of early concept generalization based on local correlation of input features, Sepideh SADEGHI and Kiruthika RAMANATHAN Conference Proceeding Article
An Incremental Approach to Closest Pair Queries in Spatial Networks Using Best-First Search, Chunan CHEN, Weiwei SUN, Baihua ZHENG, Dingding Mao, and Weimo LIU Conference Proceeding Article
CCRank: Parallel Learning to Rank with Cooperative Coevolution, Shuaiqiang WANG, Byron J. GAO, Ke WANG, and Hady W. LAUW Conference Proceeding Article
Defending against cross site scripting attacks, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article
General Construction of Chameleon All-but-one Trapdoor Functions, Shengli LIU, Junzuo LAI, and Robert H. DENG Journal Article
Probabilistic indexing of media sequences, Jialie SHEN, Meng WANG, Shuicheng YAN, and TIAN QI Conference Proceeding Article
TaxiSim: A multiagent simulation platform for evaluating taxi fleet operations, Shih-Fen CHENG and Thi Duong NGUYEN Conference Proceeding Article
Acceptance of Service Oriented Computing: what do IT professionals think?, Ilse BAUMGARTNER and Peter GREEN Conference Proceeding Article
A hybrid agent architecture integrating desire, intention and reinforcement learning, Ah-hwee TAN, Yew-Soon ONG, and Akejariyawong TAPANUJ Journal Article
Automated Detection of Likely Design Flaws in Layered Architectures, Aditya BUDI, - Lucia, David LO, Lingxiao JIANG, and Shaowei WANG Conference Proceeding Article
Developing and Applying a User-Centered Model for the Design and Implementation of Information Visualisation, Lian Chee KOH, A. Slingsby, J. Dykes, and Tin Seong KAM Conference Proceeding Article
Effects of Mentoring on Player Performance in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM, Kuo-Wei HSU, and Jaideep SRIVASTAVA Conference Proceeding Article
E-referral and Word-of-Mouth Marketing, Zhiling GUO Presentation
Finding robust-under-risk solutions for flowshop scheduling, Steven O. Kimbrough, Ann KUO, and Hoong Chuin LAU Conference Paper
Generating Aspect-oriented Multi-document Summarization with Event-Aspect Model, Peng LI, Yinglin WANG, Wei GAO, and Jing JIANG Conference Proceeding Article
Generating aspect-oriented multi-document summarization with event-aspect model, Peng LI, Yinglin WANG, Wei GAO, and Jing JIANG Conference Proceeding Article
Heuristic Algorithms for Balanced Multi-way Number Partitioning, Jilian ZHANG, Kyriakos MOURATIDIS, and Hwee Hwa PANG Conference Proceeding Article
High-Performance Composite Event Monitoring System Supporting Large Numbers of Queries and Sources, SangJeong Lee, Youngki Lee, Byoungjip Kim, K. Selcuk Candan, Yunseok Rhee, and Junehwa Song Conference Paper
Linking Entities to a Knowledge Base with Query Expansion, Swapna GOTTIPATI and Jing JIANG Conference Proceeding Article
Media landscape in Twitter: A world of new conventions and political diversity, Jisun AN, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article
Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
Mining weakly labeled web facial images for search-based face annotation, Dayang WANG, Steven C. H. HOI, and Ying HE Conference Proceeding Article
Modeling Player Performance in Massively Multiplayer Online Role-Playing Games: The Effects of Diversity in Mentoring Network, Kyong Jin SHIM, K. W. HSU, and J. SRIVASTAVA Conference Proceeding Article
Online AUC maximization, Peilin ZHAO, Steven C. H. HOI, Rong JIN, and Tianbo YANG Conference Proceeding Article
Parallel Learning to Rank for Information Retrieval, Shuaiqiang WANG, Byron J. GAO, Ke WANG, and Hady W. LAUW Conference Proceeding Article
Real-world parameter tuning using factorial design with parameter decomposition, Aldy GUNAWAN, Hoong Chuin LAU, and Elaine WONG Conference Proceeding Article
Relevant knowledge helps in choosing right teacher: Active query selection for ranking adaptation, Peng CAI, Wei GAO, Kam-Fai WONG, and Aoying ZHOU Conference Proceeding Article
Scalable Multiagent Planning using Probabilistic Inference, Akshat KUMAR, Shlomo ZILBERSTEIN, and Marc TOUSSAINT Conference Proceeding Article
Solution pluralism and metaheuristics, Steven O. Kimbrough, Ann KUO, Hoong Chuin LAU, Frederic H. Murphy, and David Harlan Wood Conference Paper
Trust network inference for online rating data using generative models, Freddy Tat Chua CHUA and Ee Peng LIM Conference Proceeding Article
Unsupervised discovery of discourse relations for eliminating intra-sentence polarity ambiguities, Lanjun ZHOU, Binyang LI, Wei GAO, Zhongyu WEI, and Kam-Fai WONG Conference Proceeding Article
Unsupervised Information Extraction with Distributional Prior Knowledge, Cane Wing-ki LEUNG, Jing JIANG, Kian Ming A. CHAI, Hai Leong Chieu, and Loo-Nin Teow Conference Proceeding Article
Parallel Markets, Interdependent Assets, and Market Crashes: An Agent-Based Modeling Perspective, Shih-Fen CHENG, Wing Bernard LEE, and Annie KOH Presentation
Trajectory-Based Consumer Segmentation and Product Recommender System in the Online Market, Young Soo KIM and Ramayya Krishnan Presentation
A mobile context monitoring platform for pervasive computing environments, Youngki LEE, Chulhong MIN, Younghyun JU, Saumay PUSHP, and Junehwa SONG Conference Proceeding Article
Adaptive display power management for mobile games, Bhojan ANAND, Karthik THIRUGNANAM, Jeena SEBASTIAN, Pravein G. KANNAN, Akhihebbal L. ANANDA, Mun Choon CHAN, and Rajesh Krishna BALAN Conference Proceeding Article
A feature based frequency domain analysis algorithm for fault detection of induction motors, Zhaoxia WANG, C. S. CHANG, and ZHANG Yifan Conference Proceeding Article
A Quality Metric for Sustainable Innovations, Arcot Desai NARASIMHALU Conference Paper
A Solution with Security Concern for RFID-Based Track and Trace Services in EPCglobal-Enabled Supply Chains, Wei HE, Yingjiu LI, Kevin CHIEW, Tieyan LI, and Eng Wah LEE Book Chapter
CIO reporting structure, strategic positioning, and firm performance, Rajiv D BANKER, Nan HU, Paul A PAVLOU, and Jerry LUFTMAN Journal Article
Continuous Visible Nearest Neighbor Query Processing in Spatial Databases, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Qing LI, and Xiaofa GUO Journal Article
Enhancing SOA Integration through Enterprise Services, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article
Fully Secure Cipertext-Policy Hiding CP-ABE, Junzuo LAI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article
Getting to Global Yes! Designing a Distributed Student Collaboration, Selma Limam MANSAR, Randy WEINBERG, and Benjamin Kok Siew GAN Conference Proceeding Article
Hierarchical identity-based chameleon hash and its applications, Feng BAO, Robert H. DENG, Xuhua DING, Junzuo LAI, and Yunlei ZHAO Conference Proceeding Article
High-Performance Composite Event Monitoring System Supporting Large Numbers of Queries and Sources, SangJeong LEE, Youngki LEE, Byoungjip KIM, K. Selcuk CANDAN, Yunseok RHEE, and Junehwa SONG Conference Proceeding Article
kb-anonymity: A model for anonymized behavior-preserving test and debugging data, Aditya BUDI, David LO, Lingxiao JIANG, and Lucia Lucia Conference Proceeding Article
Link type based pre-cluster pair model for coreference resolution, Yang SONG, Houfeng WANG, and Jing JIANG Conference Proceeding Article
On combining state space reductions with global fairness assumptions, Shao Jie ZHANG, Jun SUN, Jun PANG, Yang LIU, and Jin Song DONG Conference Proceeding Article
Online fault detection of induction motors using frequency domain independent components analysis, Zhaoxia WANG and C. S. CHANG Conference Proceeding Article
Optimizing Sensor Data Acquisition for Energy-Efficient Smartphone-based Continuous Event Processing, Archan MISRA and Lipyeow LIM Conference Proceeding Article
Preserving transparency and accountability in optimistic fair exchange of digital signatures, Xinyi HUANG, Yi Mu, Willy Susilo, Jianying Zhou, and Robert H. DENG Journal Article
Query weighting for ranking model adaptation, Peng CAI, Wei GAO, Aoying ZHOU, and Kam-Fai WONG Conference Proceeding Article
Real-time trip information service for a large taxi fleet, Rajesh Krishna BALAN, Nguyen Xuan KHOA, and Lingxiao JIANG Conference Proceeding Article
Regret minimizing audits: A learning-theoretic basis for privacy protection, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, and Arunesh SINHA Conference Proceeding Article
Secure localization with attack detection in wireless sensor networks, Wentao ZHU, Yang Xiang, Jianying Zhou, Robert H. DENG, and Bao Feng Journal Article