The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2010

PDF

Motivated learning as an extension of reinforcement learning, Janusz STARZYK, Pawel RAIF, and Ah-hwee TAN Conference Proceeding Article

Multipath Virtual Sink Architecture for Underwater Sensor Networks, Winston K. G. SEAH, Hwee-Pink TAN, and Pius W. Q. LEE Book Chapter

Link

New Theoretical Perspectives on Technology Adoption, Robert J. KAUFFMAN and A. Techatassanasoontorn Journal Article

PDF

On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones, Qiang YAN, Robert H. DENG, Yingjiu LI, and Tieyan LI Journal Article

PDF

Operational risk in trading platforms, M. THULASIDAS Magazine Article

PDF

Periodic Resource Reallocation in Two-Echelon Repairable Item Inventory Systems, Hoong Chuin LAU, Jie Pan, and Huawei SONG Journal Article

Redefining Medical Tourism, Arcot Desai NARASIMHALU Book Chapter

Link

Regulatory Policies for Demand-Driven Innovation by Heterogeneous Firms, Mei LIN, Shaojin LI, and Andrew WHINSTON Conference Paper

PDF

Remote Attestation on Function Execution, Liang GU, Yueqiang CHENG, Xuhua DING, Robert H. DENG, Yao GUO, and Weizhong SHAO Conference Proceeding Article

Link

Remote Platform Attestation: The Testimony for Trust Manageement, Xuhua DING, LIANG Gu, Robert H. DENG, Bing Xie, and Hong MEI Book Chapter

PDF

Representations of keypoint-based semantic concept detection: A comprehensive study, Yu-Gang JIANG, Jun YANG, and Chong-wah NGO Journal Article

Reputation Building in Online Social Media: An Exploratory Study on YouTube, Qian TANG, Bin Gu, and Andrew Whinston Conference Paper

Link

RFID Information Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations, Rashida PARKS, Chao-Hsien CHU, and Heng XU Journal Article

Risk-Sensitive Planning in Partially Observable, Janusz MARECKI and Pradeep Reddy VARAKANTHAM Conference Paper

Link

Segmenting Uncertain Demand in Group-Buying Auctions, J. CHEN, Robert J. Kauffman, Y. LIU, and X. SONG Journal Article

Should We Go Our Own Way? Analyzing Backsourcing Flexibility in IT Service Outsourcing Contracts., M. Benaroch, Q. Dai, and Robert John KAUFFMAN Journal Article

PDF

Smart media: Bridging interactions and services for the smart internet, Margaret-Anne STOREY, Lars GRAMMEL, and Christoph TREUDE Book Chapter

Spreadsheet Modeling to Determine the Optimum Hotel Room Rate for a Short High-Demand Period, Thin Yin LEONG and Wee Leong LEE Journal Article

PDF

TeleOph: A secure real-time teleophthalmology system, Yongdong WU, Zhou WEI, Haixia YAO, Zhigang ZHAO, Lek Heng NGOH, Robert H. DENG, and Shengsheng YU Journal Article

PDF

The Monetary Value of Virtual Goods: An Exploratory Study In MMORPGs, QIU-HONG WANG and Viktor Mayer-Schonberger Conference Proceeding Article

PDF

Trust-oriented composite service selection with QoS constraints, Lei LI, Yang WANG, and Ee Peng LIM Journal Article

Link

Two Robust Remote User Authentication Protocols Using Smart Cards, Kuo-Hui YEH, Chunhua Su, Nai-Wei LO, Yingjiu LI, and Yi-Xiang Hung Journal Article

PDF

Universal authentication protocols for anonymous wireless communications, Guomin YANG, Qiong HUANG, Duncan S. WONG, and Xiaotie DENG Journal Article

PDF

Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer, Pedro PERIS-LOPEZ, Julio Hernandez-Castro, Juan Tapiador, Tieyan LI, and Yingjiu LI Journal Article

PDF

When discrete meets differential: Assessing the stability of structure from small motion, Wen-yan LIN, Geok-Choo TAN, and Loong-Fah CHEONG Journal Article

PDF

Wikipedia2Onto: Building concept ontology automatically, experimenting with web image retrieval, Huan WANG, Xing JIANG, Liang-Tien CHIA, and Ah-hwee TAN Journal Article

PDF

Workshop report from Web2SE: First workshop on Web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN Journal Article

Submissions from 2009

PDF

Scalable multi-core model checking fairness enhanced systems, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

Adaptive type-2 fuzzy maintenance advisor for offshore power systems, Zhaoxia WANG, C. S. CHANG, Fan YANG, and W. W. Tan Conference Proceeding Article

PDF

A new approach for anonymous password authentication, Yanjiang YANG, Jianying ZHOU, Jian Weng, and Feng BAO Conference Proceeding Article

Link

A Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies, Ge FU, Hong ZHU, and Yingjiu LI Conference Proceeding Article

PDF

A robust damage assessment model for corrupted database systems, Ge FU, Hong ZHU, and Yingjiu LI Conference Proceeding Article

Link

Bayesian Network Based Services Recommendation, J. WU, H. Jian, and Qianhui (Althea) LIANG Conference Proceeding Article

PDF

Coherent phrase model for efficient image near-duplicate retrieval, Yiqun HU, Xiangang CHENG, Liang-Tien CHIA, Xing XIE, Deepu RAJAN, and Ah-hwee TAN Journal Article

PDF

Computationally Secure Hierarchical Self-Healing Key Distribution for Heterogeneous Wireless Sensor Networks, Yanjiang YANG, Jianying Zhou, Robert H. DENG, and Feng Bao Conference Proceeding Article

PDF

Cyber attacks: Does physical boundary matter?, QIU-HONG WANG and Seung-Hyun KIM Conference Proceeding Article

PDF

Denial-of-Service Attacks on Host-Based Generic Unpackers, Limin LIU, Jiang MING, Zhi WANG, Debin GAO, and Chunfu JIA Conference Proceeding Article

PDF

DUOL: A Double Updating Approach for Online Learning, Peilin ZHAO, Steven C. H. HOI, and Rong JIN Conference Proceeding Article

PDF

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains, Shaoying CAI, Tieyan LI, Changshe MA, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

Link

Extending CRM with mobile messaging: A case study, Randall E. DURAN Journal Article

PDF

Insights into Malware Detection and Prevention on Mobile Phones, Qiang YAN, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article

PDF

Learning Bregman Distance Functions and its Application for Semi-Supervised Clustering, Lei WU, Rong JIN, Steven C. H. HOI, Jianke ZHU, and Nenghai YU Conference Proceeding Article

PDF

Managing Supply Uncertainty with an Information Market, Zhiling GUO, Fang FANG, and Andrew B. WHINSTON Conference Proceeding Article

Link

Modeling Syntactic Structures of Topics with a Nested HMM-LDA, Jing JIANG Conference Proceeding Article

PDF

On strategies for imbalanced text classification using SVM: A comparative study, Aixin SUN, Ee Peng LIM, and Ying LIU Journal Article

PDF

On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup, Bing LIANG, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article

Link

Perceptual effects in relativity and astrophysics, Manoj THULASIDAS Journal Article

The Future of Innovation is Bright and Shiny as Never Before, Arcot Desai NARASIMHALU Book Chapter

PDF

To trust or not to trust? Predicting online trusts using Trust Antecedent Framework, Viet-An NGUYEN, Ee Peng LIM, Jing JIANG, and Aixin SUN Conference Proceeding Article

PDF

Wake up or Fall Asleep: Value Implication of Trusted Computing, Nan HU, Jianhui HUANG, Ling LIU, Yingjiu LI, and Dan MA Journal Article

Link

On Group Key Management for Secure Multicast Employing the Inverse Element, Wen Tao ZHU and Robert H. DENG Conference Proceeding Article

Link

Does Sampling Influence Customers in Online Retailing of Digital Music?, Nan HU, Ling LIU, Indranil Bose, and Jialie SHEN Journal Article

Designing and Validating an Agent-Based Commodity Trading Simulation, Shih-Fen CHENG and Yee Pin LIM Conference Paper

ECRA co-editors' introduction for volume 8, issue 6, November - December 2009, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

PDF

Ensemble and individual noise reduction method for induction-motor signature analysis, Zhaoxia WANG, C.S. CHANG, TW CHUA, and W.W TAN Conference Proceeding Article

Link

Fooling Public-Key Watermarking Detectors with Optimal Color Noise, Yongdong WU and Robert H. DENG Conference Proceeding Article

PDF

Minimum Latency Broadcasting in Multiradio, Multichannel, Multirate Wireless Meshes, Junaid QADIR, ChunTung CHOU, Archan MISRA, and Joo Ghee LIM Journal Article

PDF

Mining communities in networks: A solution for consistency and its evaluation, Haewoon KWAK, Yoonchan CHOI, Young-Ho EOM, Hawoong JEONG, and Sue MOON Conference Proceeding Article

PDF

Mining Hierarchical Scenario-Based Specifications, David LO and Shahar Maoz Conference Proceeding Article

PDF

Online fault detection of induction motors using independent component analysis and fuzzy neural network, Zhaoxia WANG, C. S. CHANG, X. GERMAN, and W.W. TAN Conference Proceeding Article

Link

RFID Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction, Changshe MA, Yingjiu LI, Robert H. DENG, and Tieyan LI Conference Proceeding Article

Rfid Privacy: Relation between Two Notions, Minimal Condition, and Efficient Construction, Changshe MA, Yingjiu LI, Robert Huijie DENG, and Tieyan LI Conference Paper

Link

Self-Enforcing Private Inference Control, Yanjiang YANG, Yingjiu LI, Jian Weng, Jianying ZHOU, and Feng Bao Conference Proceeding Article

PDF

Static validation of C preprocessor macros, Andreas SAEBJORNSEN, Lingxiao JIANG, Daniel Quinlan, and Zhendong SU Conference Proceeding Article

Link

Stereotrust: A group based personalized trust model, Xin LIU, Anwitaman DATTA, Krzysztof RAZDCA, and Ee Peng LIM Conference Proceeding Article

PDF

Trust-Oriented Composite Services Selection and Discovery, Lei LI, YAN WANG, and Ee Peng LIM Conference Proceeding Article

PDF

Trust relationship prediction using online product review data, Nan MA, Ee Peng LIM, Viet-An NGUYEN, and Aixin SUN Conference Proceeding Article

PDF

UDEL/SMU at TREC 2009 Entity Track, Wei ZHENG, Swapna GOTTIPATI, Jing JIANG, and Hui FANG Conference Paper

PDF

User interfaces for visual analysis and monitoring in business intelligence, Lars GRAMMEL, Margaret-Anne STOREY, and Christoph TREUDE Conference Proceeding Article

PDF

VIREO/DVMM at TRECVID 2009: High-level feature extraction, automatic video search, and content-based copy detection, Chong-wah NGO, Yu-Gang JIANG, Xiao-Yong WEI, Wanlei ZHAO, Yang LIU, Jun WANG, Shiai ZHU, and Shih-Fu CHANG Conference Paper

PDF

What makes categories difficult to classify?, Aixin SUN, Ee Peng LIM, and Ying LIU Conference Proceeding Article

Intermediation or Non-intermediation: A Market Design for Distributed Computing, Zhiling GUO Presentation

Link

Robust Semantic Concept Detection in Large Video Collections, Jialie SHEN, Dacheng Tao, and Xuelong LI Conference Proceeding Article

PDF

Analysis of Tradeoffs between Buffer and QoS Requirements in Wireless Networks, Raphael ROM and Hwee-Pink TAN Journal Article

PDF

Analyzing the video popularity characteristics of large-scale user generated content systems, Meeyoung CHA, Haewoon KWAK, Pablo RODRIGUEZ, Yong-Yeol AHN, and Sue MOON Journal Article

PDF

A Service Choice Model for Optimizing Taxi Service Delivery, Shih-Fen CHENG and Xin QU Conference Proceeding Article

PDF

A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications, Robert H. DENG and Yanjiang YANG Journal Article

PDF

A Surprise Triggered Adaptive and Reactive (STAR) Framework for Online Adaptation in Non-stationary Environments, Truong-Huy Dinh NGUYEN and Tze-Yun LEONG Conference Proceeding Article

Competitive Strategy, Economics, and Information Systems., E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article

Link

Comprehensive Query-Dependent Fusion Using Regression-on-Folksonomies: A Case Study of Multimodal Music Search, Bingjun ZHANG, Qiaoliang Xiang, Huanhuan LU, Jialie SHEN, and Ye WANG Conference Proceeding Article

PDF

Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments, Kyriakos MOURATIDIS, Spiridon Bakiras, and Dimitris Papadias Journal Article

PDF

Distance metric learning from uncertain side information with application to automated photo tagging, Lei WU, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Nenghai YU Conference Proceeding Article

PDF

Distribution-based concept selection for concept-based video retrieval, Juan CAO, HongFang JING, Chong-wah NGO, and YongDong ZHANG Conference Proceeding Article

PDF

Domain adaptive semantic diffusion for large scale context-based video annotation, Yu-Gang JIANG, Jun WANG, Shih-Fu CHANG, and Chong-wah NGO Conference Proceeding Article

Extracting Logistics-Related Knowledge Artefacts from Wargames, Ori SASSON Conference Paper

PDF

First ACM SIGMM International Workshop on Social Media (WSM'09), Suzanne BOLL, Steven C. H. HOI, Jiebo LUO, Rong JIN, Dong XU, and Irwin KING Conference Proceeding Article

PDF

First ACM SIGMM International Workshop on Social Media (WSM'09), Suzanne BOLL, Steven C. H. HOI, Jiebo LUO, Rong JIN, Dong XU, and Irwin KING Conference Proceeding Article

Link

Graph OLAP: A Multi-dimensional Framework for Graph Data Analysis, Chen CHEN, Xifeng YAN, Feida ZHU, Jiawei HAN, and Philip S. YU Journal Article

Link

Guest Editors’ Introduction to Special Issue: Marketing and Electronic Commerce, Ming-Hui HUANG and Robert John KAUFFMAN Journal Article

PDF

Localizing volumetric motion for action recognition in realistic videos, Xiao WU, Chong-wah NGO, Jintao LI, and Yongdong ZHANG Conference Proceeding Article

PDF

Mining globally distributed frequent subgraphs in a single labeled graph, Xing JIANG, Hui XIONG, Chen WANG, and Ah-hwee TAN Journal Article

PDF

Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation, David LO, Ganesan Ramalingam, Venkatesh-Prasad Ranganath, and Kapil Vaswani Conference Proceeding Article

Link

Mining Scenario-Based Specifications with Value-Based Invariants, David LO and Shahar Maoz Conference Proceeding Article

Link

Overcoming the J-shaped Distribution of Product Reviews, Nan HU, Jennifer ZHANG, and Paul Pavlou Journal Article

PDF

Parallel Sets in the Real World: Three Case Studies, Robert Kosara, Caroline Ziemkiewicz, F. Joseph III Mako, and Tin Seong KAM Presentation

PDF

Scalable detection of partial near-duplicate videos by visual-temporal consistency, Hung-Khoon TAN, Chong-wah NGO, Richang HONG, and Tat-Seng CHUA Conference Proceeding Article

PDF

Secure Mobile Agents with Designated Hosts, Qi ZHANG, Yi MU, Minji ZHANG, and Robert H. DENG Conference Proceeding Article

PDF

Semantic context transfer across heterogeneous sources for domain adaptive video search, Yu-Gang JIANG, Chong-wah NGO, and Shih-Fu CHANG Conference Proceeding Article

PDF

Semantics-preserving bag-of-words models for efficient image annotation, Lei WU, Steven C. H. HOI, and Nenghai YU Conference Proceeding Article

PDF

Sharing mobile multimedia annotations to support inquiry-based learning using Mobitop, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Yin-Leng THENG, Quang Minh NGUYEN, Thi Nhu Quynh KIM, Ee Peng LIM, Chew-Hung CHANG, Kalyani CHATTERJEA, and Aixin SUN Conference Proceeding Article