The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2013

PDF

Online multimodal distance metric learning with application to image retrieval, Pengcheng WU, Steven C. H. HOI, Hao XIA, Peilin ZHAO, Dayong WANG, and Chunyan MIAO Conference Proceeding Article

PDF

Online multi-task collaborative filtering for on-the-fly recommender systems, Jialei WANG, Steven C. H. HOI, Peilin ZHAO, and Zhi-Yong LIU Conference Proceeding Article

PDF

Predictive Handling of Asynchronous Concept Drifts in Distributed Environments, Hock Hee ANG, Vivek Gopalkrishnan, Indre Zliobaite, Mykola Pechenizkiy, and Steven C. H. HOI Journal Article

PDF

SkyHunter: A multi-surface environment for supporting oil and gas exploration, Teddy SEYED, Mario Costa SOUSA, Frank MAURER, and Anthony TANG Conference Proceeding Article

PDF

The vireo team at MediaEval 2013: Violent Scenes Detection by mid-level concepts learnt from youtube, Chun Chet TAN and Chong-Wah NGO Conference Paper

PDF

TODMIS: Mining Communities from Trajectories, Siyuan LIU, Shuhui WANG, Kasthuri JAYARAJAH, Archan MISRA, and Rammaya KRISHNAN Conference Proceeding Article

PDF

Understanding Online Consumer’s Inter-Purchase Time, Youngsoo KIM Presentation

PDF

RIGA: A Rich Internet Geospatial Analytics Application for Area-based Data, Tin Seong KAM Presentation

PDF

The Myths of G-Tech for Business Decision Making, Tin Seong KAM Presentation

Revised online learning with kernels for classification and regression, Guoqi LI, Kiruthika RAMANATHAN, Kiruthika RAMANATHAN, and Luping SHI Conference Proceeding Article

Towards accurate object localization with smartphones, Longfei SHANGGUAN, Zimu ZHOU, Zheng YANG, Kebin LIU, Zhenjiang LI, and Yunhao LIU Journal Article

Towards accurate object localization with smartphones, Longfei SHANGGUAN, Zimu ZHOU, Zheng YANG, Kebin LIU, Zhenjiang LI, and Yunhao LIU Journal Article

Link

Attack and Defense Mechanisms of Malicious EPC Event Injection in EPC Discovery Service, Mon Kywe SU, Yingjiu LI, and Jie SHI Conference Proceeding Article

PDF

A highly efficient RFID distance bounding protocol without real-time PRF evaluation, Yunhui ZHUANG, Anjia YANG, Duncan S. WONG, Guomin YANG, and Qi XIE Conference Proceeding Article

PDF

An analysis of post-selection in automatic configuration, Zhi YUAN, Thomas St\303\274tzle, Marco A. Montes De Oca, Hoong Chuin LAU, and Mauro Birattari Conference Proceeding Article

PDF

An Investigation of Decision Analytic Methodologies for Stress Identification, Yong DENG, Chao-Hsien CHU, Huayou SI, Qixun ZHANG, and Zhonghai WU Journal Article

PDF

ConferenceSense: Monitoring of public events using phone sensors, Vigneshwaran SUBBARAJU, Amit KUMAR, Vikrant Nandakumar, Sonali Batra, Salil Kanhere, Pradipta De, Vinayak Naik, Dipanjan Chakraborty, and Archan MISRA Conference Proceeding Article

PDF

Corporate myths: Sourcing and vendor management in Asia Pacific, Patrick THNG Magazine Article

Cost Efficiency Strategy in the Software-as-a-Service Market: Modeling Results and Related Implementation Issues, Robert J. Kauffman and Dan Ma Conference Paper

Link

Cost Efficiency Strategy in the Software-as-a-Service Market: Modeling Results and Related Implementation Issues, Robert J. KAUFFMAN and Dan MA Conference Proceeding Article

PDF

DriverGuard: Virtualization based fine-grained protection on I/O flows, Yueqiang CHENG, Xuhua DING, and Robert H. DENG Journal Article

Link

DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis, Yuan TIAN, David LO, and Chengnian SUN Conference Proceeding Article

Link

Flexible Grouping and Multiple Centers for Preserving Simplicity and Flexibility in Animation Sketches, Richard C. DAVIS, Kevin STEPPE, Mengyuan Guan, Jing Ting KHOO, Rui ZHANG, and Quee Boon KOH Conference Proceeding Article

PDF

Focus: A Usable & Effective Approach to OLED Display Power Management, Kiat Wee TAN, Tadashi OKOSHI, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Generative models for item adoptions using social correlation, Freddy Chong Tat CHUA, Hady Wirawan LAUW, and Ee Peng LIM Journal Article

PDF

Inferring ongoing human activities based on recurrent self-organizing map trajectory, Qianru SUN and Hong LIU Conference Proceeding Article

PDF

Innovating Services in Science and Technology Parks, Arcot Desai NARASIMHALU Conference Paper

PDF

Learning spatio-temporal co-occurrence correlograms for efficient human action classification, Qianru SUN and Hong LIU Conference Proceeding Article

Link

Multi-Abstraction Concern Localization, Tien-Duy B. DUY, Shaowei WANG, and David LO Conference Proceeding Article

PDF

SecureArray: Improving wifi security with fine-grained physical-layer, Jie XIONG and Kyle JAMIESON Conference Proceeding Article

PDF

The impact of ineffective internal control on the value relevance of accounting information, Nan HU, Baolei QI, Gaoliang TIAN, Lee YAO, and Zhen ZENG Journal Article

PDF

Theory and practice, do they match? A case with spectrum-based fault localization, Tien-Duy B. LE, Ferdian THUNG, and David LO Conference Proceeding Article

PDF

Transforming finance for the future, Siu Loon HOE Journal Article

PDF

Web-scale near-duplicate search: Techniques and applications, Chong-wah NGO, Changsheng XU, Wessel KRAAIJ, and Abdulmotaleb EL SADDIK Journal Article

PDF

Will fault localization work for these failures? An automated approach to predict effectiveness of fault localization tools, Tien-Duy B. LE and David LO Conference Proceeding Article

ProjectorKit: Easing rapid prototyping of interactive applications for mobile projectors, Martin WEIGEL, Sebastian BORING, Jürgen STEIMLE, Nicolai MARQUARDT, Saul GREENBERG, and Anthony TANG Conference Proceeding Article

PDF

Writing for Publication in Biomedical Informatics Journals, Christoph Lehmann, Reinhold Haux, Jan Talmon, Dominik Aronsky, Nicolette de Keizer, Tze-Yun LEONG, and Charles Safran Presentation

Efficacy of communication support in collaborative online shopping: The moderating effect of task types, Keng SIAU, Fiona Fui-hoon NAH, and H. SHA Conference Proceeding Article

PDF

An empirical study on uncertainty identification in social media context, Zhongyu WEI, Junwen CHEN, Wei GAO, Binyang LI, Lanjun ZHOU, Yulan HE, and Kam-Fai WONG Conference Proceeding Article

PDF

Audit games, Jeremiah BLOCKI, Nicolas CHRISTIN, Anupam DATTA, Ariel D. PROCACCIA, and Arunesh SINHA Conference Proceeding Article

PDF

Multi-view discriminant transfer learning, Pei Yang YANG and Wei GAO Conference Proceeding Article

Value Migration and Architectural Design Choices in Innovation Ecosystems: The Case of Cloud Computing, Richard TEE and C. Jason WOODARD Presentation

PDF

The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Presentation

PDF

Adaptive collective routing using gaussian process dynamic congestion models, Siyuan LIU, Yisong YUE, and Ramayya KRISHNAN Conference Proceeding Article

PDF

A Multi-objective Memetic Algorithm for Vehicle Resource Allocation in Sustainable Transportation Planning, Hoong Chuin LAU, Lucas AGUSSURJA, Shih-Fen CHENG, and Pang Jin TAN Conference Proceeding Article

PDF

An agent-based network analytic perspective on the evolution of complex adaptive supply chain networks, L. PONNAMBALAM, A. TAN, X. FU, X. F. YIN, Zhaoxia WANG, and R. S. GOH Conference Proceeding Article

PDF

An agent-based network analytic perspective on the evolution of complex adaptive supply chain networks, Loganathan PONNANBALAM, A. Tan, Xiuju FU, Xiaofeng YIN, Zhaoxia WANG, and Rick S. M. GOH Conference Proceeding Article

PDF

An empirical analysis of a network of expertise, LE TRUC VIET and Minh Thap NGUYEN Conference Proceeding Article

PDF

Applying search in an automatic contract-based testing tool, Alexey KOLESNICHENKO, Christopher M. POSKITT, and Bertrand MEYER Conference Proceeding Article

A Study of the Software-as-a-Service Business Model, Dan MA and Abraham Seidmann Conference Paper

A Study of the Software-as-a-Service Business Model, Dan Ma and Abraham Seidmann Conference Paper

A Study of the Software-as-a-Service Business Model, Dan Ma and Abraham Seidmann Conference Paper

PDF

Attribute-based encryption with verifiable outsourced decryption, Junzuo LAI, Robert H. DENG, Chaowen GUAN, and Jian WENG Journal Article

PDF

Automated Generation of Interaction Graphs for Value-Factored Decentralized POMDPs, William YEOH, Akshat KUMAR, and Shlomo Zilberstein Conference Proceeding Article

PDF

Best Upgrade Plans for Large Road Networks, Yimin LIN and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Click-boosting random walk for image search reranking, Xiaopeng YANG, Yongdong ZHANG, Ting YAO, Zheng-Jun ZHA, and Chong-Wah NGO Conference Proceeding Article

PDF

Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article

Computing Immutable Regions for Subspace Top-k Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Paper

PDF

Cost-Sensitive Online Active Learning with application to malicious URL detection, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article

Creative innovativeness with information systems (IS) and its role in quality IS usage, Brenda ESCHENBRENNER and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

DelayFlow centrality for identifying critical nodes in transportation networks, Yew-Yih CHENG, Roy Ka Wei LEE, Ee-Peng LIM, and Feida ZHU Conference Proceeding Article

PDF

FloTra: Flower-shape trajectory mining for instance-specific parameter tuning, Lindawati LINDAWATI, Feida ZHU, and Hoong Chuin LAU Conference Paper

Hierarchical Parallel Algorithm for Modularity-Based Community Detection Using GPUs, Chun Yew CHEONG, Huynh Phung HUYNH, David LO, and Rick Siow Mong GOH Conference Proceeding Article

PDF

How many researchers does it take to make impact? Mining software engineering publication data for collaboration insights, Subhajit DATTA, Santonu SARKAR, Sajeev A. S. M., and Nishant KUMAR Conference Proceeding Article

PDF

Improving Patient Length-of-Stay in Emergency Department Through Dynamic Resource Allocation Policies, Kar Way TAN, Wei Hao TAN, and Hoong Chuin LAU Conference Proceeding Article

PDF

Improving traffic prediction with tweet semantics, Jingrui HE, Wei SHEN, Phani DIVAKARUNI, Laura WYNTER, and Rick LAWRENCE Conference Proceeding Article

PDF

Incremental and accuracy-aware personalized pagerank through scheduled approximation, Fanwei ZHU, Yuan FANG, Kevin Chen-Chuan CHANG, and Jing YING Conference Proceeding Article

PDF

Integration of Social Media Technologies with ERP:A Prototype Implementation, Venky SHANKARARAMAN and Eng Kit LUM Conference Proceeding Article

PDF

Interacting Knapsack Problem in Designing Resource Bundles, Truong Huy D. NGUYEN, Pradeep Reddy VARAKANTHAM, Hoong Chuin LAU, and Shih-Fen CHENG Conference Proceeding Article

PDF

Large scale online kernel classification, Jialei WANG, Peilin ZHAO, Steven C. H. HOI, Jinfeng ZHUANG, and Zhi-Yong LIU Conference Proceeding Article

PDF

Learning to name faces: A multimodal learning scheme for search-based face annotation, Dayong WANG, Steven C. H. HOI, Pengcheng WU, Jianke ZHU, Ying HE, and Chunyan MIAO Conference Proceeding Article

PDF

Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack, Kai-Lung HUI, Seung-Hyun KIM, and QIU-HONG WANG Presentation

PDF

Multi-agent Orienteering Problem with Time-dependent Capacity Constraints, Cen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU Conference Paper

PDF

Near-duplicate video retrieval: Current research and future trends, Jiajun LIU, Zi HUANG, Hongyun CAI, Heng Tao SHEN, Chong-wah NGO, and Wei WANG Journal Article

PDF

“Network-Theoretic” Queuing Delay Estimation in Theme Park Attractions, Ajay ARAVAMUDHAN, Archan MISRA, and Hoong Chuin LAU Conference Proceeding Article

PDF

Open source software development process model – A grounded theory approach, Keng SIAU and Y. TIAN Conference Proceeding Article

PDF

Parameter Learning for Latent Network Diffusion, Xiaojian WU, Akshat KUMAR, Daniel SHELDON, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Politics, sharing and emotion in microblogs, Tuan-Anh HOANG, William COHEN, Ee Peng LIM, Doug PIERCE, and David REDLAWSK Conference Proceeding Article

PDF

RiskVis: Supply chain visualization with risk management and real-time monitoring, Rick S. M. GOH, Zhaoxia WANG, Xiaofeng YIN, Xiuju FU, Loganathan PONNANBALAM, Sifei LU, and Xiaorong Li Conference Proceeding Article

PDF

Robust median reversion strategy for on-line portfolio selection, Dingjiang HUANG, Junlong ZHOU, Bin LI, Steven HOI, and Shuigeng ZHOU Conference Proceeding Article

PDF

Scalable randomized patrolling for securing rapid transit networks, Pradeep VARAKANTHAM, Hoong Chuin LAU, and Zhi YUAN Conference Proceeding Article

PDF

Self-organizing cognitive models for virtual agents, Yilin KANG and Ah-hwee TAN Conference Proceeding Article

Semantic overlay network for large-scale spatial information indexing, Zhiqiang ZOU, Yue WANG, Kai CAO, Tianshan QU, and Zhongmin WANG Journal Article

PDF

The User’s Communication Patterns on a Mobile Social Network Site, Youngsoo KIM Conference Proceeding Article

PDF

Using contracts to guide the search-based verification of concurrent programs, Christopher M. POSKITT and Simon POULDING Conference Proceeding Article

PDF

USMMC: A self-contained model checker for UML state machines, Shuang LIU, Yang LIU, Jun SUN, Manchun ZHENG, Bimlesh WADHWA, and Jin Song DONG Conference Proceeding Article

PDF

Vigilance adaptation in adaptive resonance theory, Lei MENG, Ah-hwee TAN, and Donald C. WINSCH Conference Proceeding Article

Link

Analyzing Auction and Bargaining Mechanisms in E-Procurement with Supply Quality Risk, He HUANG, Hongyan XU, Robert J. Kauffman, and Ning SUN Journal Article

PDF

Performance Measurement Design for a Parcel Delivery Company, Junyu CHOY, Nang Laik MA, and Ping Shung KOO Conference Proceeding Article

PDF

Active Learning with Expert Advice, Peilin ZHAO, Steven C. H. HOI, and Jinfeng ZHUANG Conference Proceeding Article

Analyzing Auction and Bargaining Mechanism Design in E-Procurement with Quality Verification and Risk Aversion., H. Huang, H. Xu, Robert John KAUFFMAN, and N. Sun Journal Article

An analysis of post-selection in automatic tuning, Zhi Yuan, Thomas Stuetzle, Marco Montes De Oca, and Hoong Chuin LAU Conference Paper

PDF

An Empirical Study of Adoption of Software Testing in Open Source Projects, Pavneet Singh Kochhar, Tegawende F. Bissyande, David Lo, and Lingxiao Jiang Conference Paper

PDF

An empirical study of adoption of software testing in open source projects, Pavneet Singh KOCHHAR, Tegawende F. BISSYANDE, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

An empirical study of bugs in software build systems, Xin XIA, Xiaozhen ZHOU, David LO, and Xiaoqiong ZHAO Conference Proceeding Article

Case study methodology in technology-focused Information Systems courses: Examining the students’ perspective, Ilse BAUMGARTNER Conference Proceeding Article

Coarse-grained parallel genetic algorithm applied to a vector based land use allocation optimization problem: The case study of Tongzhou Newtown, Beijing, China, Kai CAO and Xinyue YE Journal Article

PDF

Collective Diffusion Over Networks: Models and Inference, Akshat KUMAR, Daniel SHELDON, and Biplav SRIVASTAVA Conference Proceeding Article

PDF

Combining model checking and testing with an application to reliability prediction and distribution, Lin GUI, Jun SUN, Yang LIU, Yuanjie SI, Jin Song DONG, and Xinyu WANG Conference Proceeding Article

Data Analysis of Retailer Orders to Improve Order Distribution, Michelle Lee Fong CHEONG, Junyu CHOY, and Nang Laik MA Conference Paper