The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2009

PDF

Streaming 3D Meshes Using Spectral Geometry Images, Ying HE, Boon Seng CHEW, Dayong WANG, Steven C. H. HOI, and Lap Pui CHAU Conference Proceeding Article

The Unified Procurement Strategy for Enterprise Software: A Test of the ‘Move to the Middle’ Hypothesis., Robert John KAUFFMAN and J.Y. Tsai Journal Article

PDF

Towards Google challenge: Combining contextual and social information for web video categorization, Xiao WU, Wan-Lei ZHAO, and Chong-wah NGO Conference Proceeding Article

PDF

Unsupervised Face Alignment by Robust Nonrigid Mapping, Jianke ZHU, Luc VAN GOOL, and Steven C. H. HOI Conference Proceeding Article

Link

Clustering Web Services for Automatic Categorization, Qianhui (Althea) LIANG, Peipei LI, P. Hung, and Xindong Wu Conference Proceeding Article

Link

Improving Scalability of Software Cloud for Composite Web Services, J. WU, Qianhui (Althea) LIANG, and E. Bertino Conference Proceeding Article

PDF

Verifying stateful timed CSP using implicit clocks and zone abstraction, Jun SUN, Yang LIU, Jin Song DONG, and Xian ZHANG Conference Proceeding Article

PDF

Accelerating Sequence Searching: Dimensionality Reduction Method, Guojie SONG, Bin CUI, Baihua ZHENG, Kunqing XIE, and Dongqing YANG Journal Article

PDF

Admission Control for Differentiated Services in Future Generation CDMA Networks, Hwee-Pink TAN, Rudesindo Núñez-Queija, Adriana F. GABOR, and Onno J. BOXMA Journal Article

PDF

A Hybrid Firm's Pricing Strategy in Electronic Commerce under Channel Migration, Robert John KAUFFMAN, Dongwon LEE, Jung LEE, and Byungjoon YOO Journal Article

PDF

A latent model for visual disambiguation of keyword-based image search, Kong-Wah WAN, Ah-hwee TAN, Joo-Hwee LIM, Liang-Tien CHIA, and Sujoy ROY Conference Proceeding Article

Link

Automatically Adapting a Trained Anomaly Detector to Software Patches, Peng LI, Debin GAO, and Michael K. Reiter Conference Proceeding Article

PDF

Batch Mode Active Learning with Applications to Text Categorization and Image Retrieval, Steven C. H. HOI, Rong JIN, and Michael R. LYU Journal Article

PDF

Communication-efficient Classification in P2P Networks, Hock Hee ANG, Vivekanand Gopalkrishnan, Wee Keong NG, and Steven C. H. HOI Conference Proceeding Article

PDF

Detecting automotive exhaust gas based on fuzzy inference system, LI. Shujin, Ming BAI, Quan WANG, Bo CHEN, Xiaobing ZHAO, Ting YANG, and Zhaoxia WANG Conference Proceeding Article

PDF

Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security, Jian WENG, Yanjiang YANG, Qiang TANG, and Robert H. DENG Conference Proceeding Article

Electronic commerce research and applications (ECRA) ECRA co-editors' introduction for volume 8, issue 5, September - October 2009, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

PDF

Font Size: Make font size smaller Make font size default Make font size larger Exploiting Coordination Locales in Distributed POMDPs via Social Model Shaping, Pradeep VARAKANTHAM, Jun Young KWAK, Matthew Taylor, Janusz Marecki, Paul Scerri, and Milind Tambe Conference Proceeding Article

PDF

From Primordial Soup to the Cambrian Explosion; from Adam Smith to Apple and Beyond, C. Jason WOODARD, Eric K. CLEMONS, and Robert J. LARSON

PDF

Hierarchical self-healing key distribution for heterogeneous wireless sensor networks, Yanjiang YANG, Jianying ZHOU, Robert H. DENG, and Feng BAO Conference Proceeding Article

Information Security: Facilitating User Precautions Vis-a-Vis Enforcement Against Attackers, Ivan P. L. PNG and QIU-HONG WANG Journal Article

Link

Innovation Rules: A Step by Step Approach Towards Identifying New Innovation Opportunities, Arcot Desai NARASIMHALU Book

PDF

Localized matching using Earth Mover's Distance towards discovery of common patterns from small image samples, Hung-Khoon TAN and Chong-wah NGO Journal Article

PDF

Multi-view ear recognition based on moving least square pose interpolation, Heng LIU, David ZHANG, and Zhiyuan ZHANG Conference Proceeding Article

Link

Research Strategies for E-Business: A Philosophy of Science View in the Age of the Internet, Robert J. KAUFFMAN and Charles A. WOOD Book Chapter

PDF

Understanding early diffusion of digital wireless phones, Robert J. KAUFFMAN and Angsana A. Techatassanasoontorn Journal Article

PDF

Visible Reverse k-Nearest Neighbor Query Processing in Spatial Databases, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Wang-Chien LEE, Ken C. K. LEE, and Qing LI Journal Article

PDF

Why quants fail, M. THULASIDAS Magazine Article

PDF

Exploiting bilingual information to improve web search, Wei GAO, John BITZER, Ming ZHOU, and Kam-Fai WONG Conference Proceeding Article

PDF

A Distributed Spatial Index for Error-Prone Wireless Data Broadcast, Baihua ZHENG, Wang-Chien LEE, Ken C. K. LEE, Dik Lun LEE, and Min SHAO Journal Article

PDF

A Fair Assignment Algorithm for Multiple Preference Queries, Leong Hou U, Nikos Mamoulis, and Kyriakos Mouratidis Conference Proceeding Article

Application of fast independent component analysis in fault detection of induction motors, W. Xu, F. F. Hao, Q. Hao, N. N. Li, T. Yang, and Zhaoxia WANG Journal Article

PDF

Data Mining for Software Engineering, Tao XIE, Suresh Thummalapenta, David LO, and Chao LIU Journal Article

Detecting Review Management, Nan HU and Ling LIU Conference Paper

Do Vendor Pricing Decisions Fully Reflect Information in Online Reviews?, Nan HU, Ling LIU, and Chenkai Ni Conference Paper

PDF

Essential Spreadsheet Modeling Course for Business Students, Thin Yin LEONG and Michelle L. F. CHEONG Journal Article

PDF

Evaluating Straddle Carrier Deployment Policies: A Simulation Study for the Piraeus Container Terminal, Eleni HADJICONSTANTINOU and Nang Laik MA Journal Article

PDF

Extracting Paraphrases of Technical Terms from Noisy Parallel Software Corpus, Xiaoyin WANG, David LO, Jing JIANG, LU ZHANG, and Hong Mei Conference Paper

PDF

Game Action Based Power Management for Multiplayer Online Game, Bhojan ANAND, A. L. ANANDA, Mun Choon CHAN, Long Thanh LE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Inferring Player Rating from Performance Data in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM, Muhammad Aurangzeb AHMAD, Nishith PATHAK, and Jaideep SRIVASTAVA Conference Proceeding Article

Intelligent Road Network Routing Prototype for Singapore (Towards One Nsdi), Tin Seong KAM, Hridaya Misra Aditya, JI Junyao, and Chee Yong Timothy TAN Conference Paper

Interactive GeoVisual Analytic Tool (IGVAT)-A spatio-temporal multivariate data exploratory, Tin Seong KAM, Adhyan Arizki, Nhu Ngoc Cao Dang, and LIM Qiuhui Conference Paper

PDF

Multilayer image inpainting approach based on neural networks, Quan WANG, Zhaoxia WANG, Che Sau CHANG, and Ting YANG Conference Proceeding Article

PDF

Multi-Task Transfer Learning for Weakly-Supervised Relation Extraction, Jing JIANG Conference Proceeding Article

PDF

On Efficient Mutual Nearest Neighbor Query Processing in Spatial Databases, Yunjun GAO, Baihua ZHENG, Gencai CHEN, and Qing LI Journal Article

PDF

Optimal-Location-Selection Query Processing in Spatial Databases, Yunjun GAO, Baihua ZHENG, Gencai CHEN, and Qing LI Journal Article

PDF

Scalable Verification for Outsourced Dynamic Databases, Hwee Hwa PANG, Jilian ZHANG, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Setting discrete bid levels adaptively in repeated auctions, Jilian ZHANG, Hoong Chuin LAU, and Jialie SHEN Conference Proceeding Article

PDF

Ssnetviz: A visualization engine for heterogeneous semantic social networks, Ee Peng LIM, Maureen MAUREEN, Nelman Lubis IBRAHIM, Aixin SUN, Anwitaman DATTA, and Kuiyu CHANG Conference Proceeding Article

Strategic Responses to Standardization: Embrace, Extend or Extinguish?, Jason WOODARD and Joel WEST Conference Paper

PDF

Symphony: Enabling Search-Driven Applications, John C. SHAFER, Rakesh AGRAWAL, and Hady W. LAUW Conference Paper

PDF

Formal verification of scalable nonzero indicators, Jun SUN, Yang LIU, Jun SUN, Jin Song DONG, Wei CHEN, and Yanhong A. LIU Conference Proceeding Article

PDF

A Bayesian approach integrating regional and global features for image semantic learning, Luong-Dong NGUYEN, Ghim-Eng YAP, Ying LIU, Ah-hwee TAN, Liang-Tien CHIA, and Joo-Hwee LIM Conference Proceeding Article

PDF

Active learning for causal bayesian network structure with non-symmetrical entropy, Li G. and Tze-Yun LEONG Conference Proceeding Article

A Method for Monetizing Technology Innovations, Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

An Agent-based Commodity Trading Simulation, Shih-Fen CHENG and Yee Pin LIM Conference Proceeding Article

Link

Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University's Security and Risk Analysis, R. L. MARCHANT, R. Cole, and Chao-Hsien CHU Journal Article

PDF

Automatic Steering of Behavioral Model Inference, David LO, Leonardo Mariani, and Mauro Pezze Conference Proceeding Article

PDF

Bonus plans of mice and men, M. THULASIDAS Magazine Article

PDF

Compositemap: A Novel Framework for Music Similarity Measure, Bingjun ZHANG, Jialie SHEN, Qiaoliang XIANG, and Ye WANG Conference Proceeding Article

Link

Concept Drifting Detection on Noisy Streaming Data in Random Ensemble Decision Trees, Peipei LI, X. Hu, Qianhui (Althea) LIANG, and Yunjun GAO Conference Proceeding Article

PDF

Conditional Proxy Broadcast Re-Encryption, Cheng-Kang CHU, Jian Weng, Sherman S. W. Chow, Jianying Zhou, and Robert H. DENG Conference Proceeding Article

PDF

Continuous Obstructed Nearest Neighbor Queries in Spatial Databases, Yunjun GAO and Baihua ZHENG Conference Proceeding Article

PDF

Creating human-like autonomous players in real-time first person shooter computer games, Di WANG, Budhitama SUBAGDJA, Ah-hwee TAN, and Gee-Wah NG Conference Proceeding Article

PDF

Efficient non-interactive range proof, Tsz Hon YUEN, Qiong HUANG, Yi MU, Willy SUSILO, Duncan S. WONG, and Guomin YANG Conference Proceeding Article

Electronic commerce research and applications (ECRA) co-editors' introduction for volume 8, issue 4, July - August 2009, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

Emerging Behaviors in a Large Scale System: The Singapore Education System, Ori SASSON Conference Paper

Enhancing the Speed and Accuracy of Automated Parameter Tuning in Heuristic Design, Hoong Chuin LAU and Fei Xiao Conference Proceeding Article

PDF

Exploring inter-concept relationship with context space for semantic video indexing, Xiao-Yong WEI, Yu-Gang JIANG, and Chong-wah NGO Conference Proceeding Article

PDF

Identifying Bug Signatures Using Discriminative Graph Mining, Hong CHENG, David LO, YANG ZHOU, Xiaoyin WANG, and Xifeng YAN Conference Proceeding Article

PDF

Integrating specification and programs for system modeling and verification, Jun SUN, Yang LIU, Jin Song DONG, and Chunqing CHEN Conference Proceeding Article

Link

Internal Supply Chain Coordination in the Electric Utility Industry, Guiseppi FORGIONNE and Zhiling GUO Journal Article

PDF

KTR: An efficient key management scheme for secure data access control in wireless broadcast services recovery, Qijun GU, Peng LIU, Wang-Chien LEE, and Chao-Hsien CHU Journal Article

PDF

Large-scale near-duplicate web video search: Challenge and opportunity, Wan-Lei ZHAO, Song TAN, and Chong-wah NGO Conference Proceeding Article

PDF

Leak-Free Mediated Group Signatures, Xuhua DING, Gene TSUDIK, and Shouhuai XU Journal Article

PDF

Learning and inferencing in user ontology for personalized Semantic Web search, Xing JIANG and Ah-hwee TAN Journal Article

PDF

On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities, Jin HAN, Debin GAO, and Robert H. DENG Conference Proceeding Article

On using genetic algorithms to support post-solution deliberation in the generalized assignment problem, Steven O. KIMBROUGH, Ann KUO, and Hoong Chuin LAU Conference Paper

PDF

Poster abstract: BeamCast: Harnessing beamforming capabilities for link layer multicast, Souvik SEN, Rahul GHOSH, Jie XIONG, and Romit Roy CHOUDHURY Magazine Article

Link

Randomization for Testing Systems of Systems, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article

PDF

Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity, Kar Way TAN, Yimin LIN, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

The wisdom of the few: A collaborative filtering approach based on expert opinions from the web, Xavier AMATRIAIN, Neal LATHIA, Josep M. PUJOL, Haewoon KWAK, and Nuria. OLIVER Conference Proceeding Article

PDF

Towards expressive specification and efficient model checking, Jin Song DONG and Jun SUN Conference Proceeding Article

PDF

Verification of population ring protocols in PAT, Yang LIU, Jun PANG, Jun SUN, and Jianhua ZHAO Conference Proceeding Article

Bridging Academic and Industry Innovation Networks, Arcot Desai NARASIMHALU Conference Paper

PDF

Fair model checking with process counter abstraction, Jun SUN, Yang LIU, Abhik ROYCHOUDHURY, Shanshan LIU, and Jin Song DONG Conference Proceeding Article

PDF

Model checking linearizability via refinement, Yang LIU, Wei CHEN, Yanhong A. LIU, and Jun SUN Conference Proceeding Article

PDF

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks, Sharanya ESWARAN, Matthew JOHNSON, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article

PDF

Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection, Kar Way TAN and Robert H. DENG Conference Proceeding Article

PDF

Architectural Dualities in Complex Systems: Components, Interfaces, Technologies and Organizations, C. Jason WOODARD and Joel West Conference Paper

PDF

A revisit of generative model for automatic image annotation using markov random fields, Yu XIANG, Xiangdong ZHOU, Tat-Seng CHUA, and Chong-wah NGO Conference Proceeding Article

Buzzspace: Virtual World Based Game for Youth Engagement, Ori SASSON and Shamim Akhtar Conference Paper

Link

Conceptual framework of a dynamic resource allocation test bed and its practical realization with ProModel, I. R. WIOR, Z. J. ZHAO, M. LUO, J. B. ZHANG, S. S. GE, and Hoong Chuin LAU Conference Proceeding Article

Link

Control-theoretic optimization of utility over mission lifetimes in multi-hop wireless networks, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article

PDF

Cyber attacks: Cross-country interdependence and enforcement, QIU-HONG WANG and Seung Hyun KIM Conference Proceeding Article

Goldenspear Hls: Wargame for Peacekeeping and Homeland Security, Ori SASSON and Hajindar Singh Conference Paper

PDF

Information sharing and strategic signaling in supply chains, Robert J. KAUFFMAN and Hamid MOHTADI Journal Article

PDF

Intentional learning agent architecture, Budhitama SUBAGDJA, Liz SONENBERG, and Iyad RAHWAN Journal Article

PDF

Interference-aware routing protocol in multi-radio wireless mesh networks, Byoungheon SHIN, Yangwoo KO, Jisun AN, and Dongman LEE Conference Proceeding Article

PDF

mFerio: The design and evaluation of a peer-to-peer mobile payment system, Rajesh Krishna BALAN, Narayanasamy RAMASUBBU, Komsit Prakobphol, Nicolas Christin, and Jason Hong Conference Proceeding Article