The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2011

Link

On Efficient Obstructed Reverse Nearest Neighbor Query Processing, Yunjun GAO, Jiacheng YANG, Gang CHEN, Baihua ZHENG, and Lidan Shou Conference Proceeding Article

PDF

PAT 3: An extensible architecture for building multi-domain model checkers, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

Price Points and Price Rigidity, Daniel LEVY, Dongwon LEE, Haipeng (Allen) LEE, Robert J. Kauffman, and Mark Bergen Journal Article

PDF

Profit-Maximizing Firm Investments in Customer Information Security, Yong Yick LEE, Robert J. KAUFFMAN, and Ryan SOUGSTAD Journal Article

Samsung's Response to Call-for-Proposal on Compact Descriptor for Visual Search (CDVS), Lai-Tee CHEOK, Jaeyong SONG, and Kyungmo PARK Report

PDF

Software process evaluation: A machine learning approach, Ning CHEN, Steven C. H. HOI, and Xiaokui XIAO Conference Proceeding Article

Supply Chain Coordination under Supply Uncertainty, Zhiling GUO Presentation

Link

Towards More Accurate Retrieval of Duplicate Bug Reports, Chengnian SUN, David LO, Siau-Cheng KHOO, and Jing JIANG Conference Proceeding Article

PDF

Towards Trajectory-Based Experience Sharing in a City, Byoungjip KIM, Youngki LEE, SangJeong LEE, Yunseok RHEE, and Junehwa SONG Conference Proceeding Article

Towards Trajectory-Based Experience Sharing in a City, Byoungjip Kim, Youngki Lee, SangJeong Lee, Yunseok Rhee, and Junehwa Song Conference Paper

PDF

Unsupervised Multiple Kernel Learning, Jinfeng ZHUANG, Jialei WANG, Steven C. H. HOI, and Xiangyang LAN Conference Proceeding Article

Link

Web classification of conceptual entities using co-training, Aixin SUN, Ying LIU, and Ee Peng LIM Journal Article

Link

Zero-error watermarking on JPEG images by shuffling Huffman tree nodes, Yongdong WU and Robert H. DENG Conference Proceeding Article

PDF

Active multiple kernel learning for interactive 3D object retrieval systems, Steven C. H. HOI and Rong JIN Journal Article

PDF

Active multiple kernel learning for interactive 3D object retrieval systems, Steven C. H. HOI and Rong JIN Journal Article

PDF

Adaptive Collision Resolution for Efficient RFID Tag Identification, Yung-Chun CHEN, Kuo-Hui Yeh, Nai-Wei LO, Yingjiu LI, and Enrico WINATA Journal Article

PDF

Allocating Resources in Multiagent Flowshops with Adaptive Auctions, Hoong Chuin LAU, Zhengyi ZHAO, Sam Shuzhi Ge, and Thong Heng LEE Journal Article

Link

A Markov Chain approach to determine the Optimal Performance Period and Bad Definition for Credit Scorecard, Murphy CHOY and Nang Laik MA Journal Article

A meta-analysis comparing relational and semantic models, Keng SIAU, Fiona Fui-Hoon NAH, and Qing CAO Journal Article

A meta-analysis comparing relational and semantic models, Keng SIAU, Fiona Fui-hoon NAH, and Qing CAO Journal Article

PDF

An efficient algorithm for learning event-recording automata, Shang-Wei LIN, Étienne ANDRÉ, Jin Song DONG, Jun SUN, and Yang LIU Conference Proceeding Article

Link

An Exploratory Study of Player and Team Performance in Multiplayer First-Person-Shooter Games, Kyong Jin SHIM, K. W. HSU, S. Damania, C. Delong, and J. SRIVASTAVA Conference Proceeding Article

Link

An Exploratory Study of Player Performance, Motivation and Enjoyment in Massively Multiplayer Online Role-Playing Games, Kyong Jin SHIM, K. W. HSU, and J. SRIVASTAVA Conference Proceeding Article

PDF

An exploratory study of software reverse engineering in a security context, Christoph TREUDE, Fernando FIGUEIRA FILHO, Margaret-Anne STOREY, and Martin SALOIS Conference Proceeding Article

Link

A Survey of Consumer Information Privacy from the Accounting Information Systems Perspective, Robert J. KAUFFMAN, Y. LEE, M. Prosch, and P. Steinbart Journal Article

PDF

A survey of information diffusion models and relevant problems, Minh Duc LUU, Tuan Anh HOANG, and Ee-Peng LIM Conference Paper

PDF

A Survey of Techniques and Challenges in Underwater Localization, Hwee-Pink TAN, Roee DIAMANT, Winston K. G. SEAH, and Marc WALDMEYER Journal Article

PDF

Code search via topic-enriched dependence graph matching, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

Collaborative online learning of user generated content, Guangxia LI, Kuiyu CHANG, Steven C. H. HOI, Wenting LIU, and Ramesh JAIN Conference Proceeding Article

PDF

Concern localization using information retrieval: An empirical study on Linux kernel, Shaowei WANG, David LO, Zhenchang XING, and Lingxiao JIANG Conference Proceeding Article

PDF

Context-Aware Nearest Neighbor Query on Social Networks, Yazhe WANG and Baihua ZHENG Conference Proceeding Article

PDF

Cooperative reinforcement learning in topology-based multi-agent systems, Dan XIAO and Ah-hwee TAN Journal Article

PDF

Differencing labeled transition systems, Zhenchang XING, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Direction-Based Surrounder Queries for Mobile Recommendations, Xi GUO, Baihua ZHENG, Yoshiharu ISHIKAWA, and Yunjun GAO Journal Article

PDF

Efficient Evaluation of Continuous Text Seach Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Journal Article

Enabling Mobile Multimedia with the Cloud, Hari KALVA and Lai-Tee CHEOK Conference Proceeding Article

PDF

General construction of chameleon all-but-one trapdoor functions, Shengli LIU, Junzuo LAI, and Robert H. DENG Conference Proceeding Article

PDF

Influence Diagrams With Memory States: Representation and Algorithms, Xiaojian WU, Akshat KUMAR, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Location-Dependent Spatial Query Containment, Ken C. K. LEE, Brandon UNGER, Baihua ZHENG, and Wang-Chien LEE Journal Article

PDF

Measuring an organisation’s innovation climate: A case study from Singapore, Siu Loon HOE Journal Article

PDF

Mining direct antagonistic communities in explicit trust networks, David LO, Didi SURIAN, Zhang KUAN, and Ee Peng LIM Conference Proceeding Article

PDF

On Modeling Virality of Twitter Content, Tuan Anh HOANG, Ee Peng LIM, Palakorn ACHANANUPARP, Jing JIANG, and Feida ZHU Conference Proceeding Article

Link

Personalized Video Similarity Measure, Jialie SHEN and Zhiyong CHENG Journal Article

PDF

PRTS: An approach for model checking probabilistic real-time hierarchical systems, Jun SUN, Yang LIU, Songzheng SONG, Jin Song DONG, and Xiaohong LI Conference Proceeding Article

PDF

Recommending People in Developers' Collaboration Network, Didi SURIAN, Nian LIU, David LO, Hanghang Tong, Ee Peng LIM, and Christos Faloutsos Conference Proceeding Article

Special Section: Information and Technology: Understanding New Strategies for Firms, Networks, and Markets, E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article

PDF

Strategic Responses to Standardization: Embrace, Extend or Extinguish?, C. Jason WOODARD and Joel WEST Book Chapter

Strategies for European ICT RTD collaboration with Australia and Singapore, Arcot Desai NARASIMHALU; Narayanasamy RAMASUBBU; Alex, Tai Loong TAN; Eric Prem; Ian Morgan; Ashley Stewart; Emma Baron; and Dana Sanchez Report

PDF

The impact of IFRS on accounting quality in a regulated market: An empirical study of China, Chunhui LIU, Lee J. YAO, Nan HU, and Ling LIU Journal Article

PDF

Towards a model checker for NesC and wireless sensor networks, Manchun ZHENG, Jun SUN, Yang LIU, Jin Song DONG, and Yu GU Conference Proceeding Article

PDF

Using social annotations for trend discovery in scientific publications, Meiqun HU, Ee Peng LIM, and Jing JIANG Conference Paper

PDF

Verification of orchestration systems using compositional partial order reduction, Tian Huat TAN, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

Virality Modeling and Analysis, Tuan Anh HOANG and Ee-Peng LIM Conference Paper

PDF

Packed, Printable, and Polymorphic Return-Oriented Programming, Kangjie LU, Dabi Zou, Weiping Wen, and Debin GAO Conference Proceeding Article

PDF

Linear Obfuscation to Combat Symbolic Execution, Zhi WANG, Jiang Ming, Chunfu Jia, and Debin GAO Conference Proceeding Article

PDF

An efficient adaptive vortex particle method for real-time smoke simulation, Shengfeng HE, Hon-Cheng WONG, and Un-Hong WONG Conference Proceeding Article

PDF

Certificateless cryptography with KGC trust level 3, Guomin YANG and Chik How TAN Journal Article

PDF

DriverGuard: A fine-grained protection on I/O flow, Yueqiang CHENG, Xuhua DING, and Robert H. DENG Conference Proceeding Article

PDF

Effective communication of software development knowledge through community portals, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

Enhancing brand equity through flow and telepresence: A comparison of 2D and 3D virtual worlds, Fiona Fui-hoon NAH, B. ESCHENBRENNER, and D. DEWESTER Journal Article

PDF

Improved ordinary measure and image entropy theory based intelligent copy detection method, Dengpan YE, Longfei MA, Lina WANG, and Robert H. DENG Journal Article

Linear Obfuscation to Combat Symbolic Execution, Zhi Wang, Jiang Ming, Chunfu Jia, and Debin GAO Conference Paper

PDF

Mining Top-K Large Structural Patterns in a Massive Network, Feida ZHU, Qiang QU, David LO, Xifeng YAN, Jiawei HAN, and Philip S. YU Conference Proceeding Article

Link

NORT: Runtime Anomaly-based Monitoring of Malicious Behavior for Windows, Narcisa Andrea MILEA, Siau-Cheng KHOO, David LO, and Cristi POP Conference Proceeding Article

PDF

On Detection of Erratic Arguments, Jin HAN, Qiang YAN, Robert H. DENG, and Debin GAO Conference Proceeding Article

Link

Player and Team Performance in EverQuest II and Halo 3, Kyong Jin SHIM, S. Damania, C. Delong, and J. Srivastava Magazine Article

PDF

Privacy beyond single sensitive attribute, Yuan FANG, Mafruz Zaman ASHRAFI, and See Kiong NG Conference Proceeding Article

Secure and Practical Key Distribution for RFID-Enabled Supply Chains, Tieyan LI, Yingjiu LI, and Guilin WANG Conference Proceeding Article

PDF

Spectral geometry image: Image based 3D models for digital broadcasting applications, Boon Seng CHEW, Lap Pui CHAU, Ying HE, Dayong WANG, and Steven C. H. HOI Journal Article

PDF

Structural analysis of the hot spots in the binding between H1N1 HA and the 2DI antibody: Do mutations of H1N1 from 1918 to 2009 affect much on this binding?, Qian LIU, Steven C. H. HOI, Chinh T. T. SU, Zhenhua LI, Chee-Keong KWOH, Limsoon WONG, and Jinyan LI Journal Article

PDF

Structural complexity and programmer team strategy: An experimental test, Narayan RAMASUBBU, Chris F. Kemerer, and Jeff Min Teck HONG Journal Article

PDF

Tamper detection in the EPC network using digital watermarking, Shui-Hua HAN, Chao-Hsien CHU, and Zongwei LUO Journal Article

PDF

Towards Ground Truthing Observations in Gray-Box Anomaly Detection, Jiang MING, Haibin ZHANG, and Debin GAO Conference Proceeding Article

Unifying EA, BPM and SOA through a Synergestic Framework, Venky SHANKARARAMAN and Pervez Kazmi Conference Proceeding Article

PDF

When Recommendation Meets Mobile: Contextual and Personalised Recommendation on the Go, Jinfeng ZHUANG, Tao MEI, Steven C. H. HOI, Ying-Qing XU, and Shipeng LI Conference Proceeding Article

Utilizing Hubel Wiesel models for semantic associations and topics extraction from unstructured text, Sandeep TIWARI and Kiruthika RAMANATHAN Conference Proceeding Article

PDF

A generic framework for three-factor authentication: preserving security and privacy in distributed systems, Xinyi HUANG, Yang Xiang, Ashley Chonka, Jianying Zhou, and Robert H. DENG Journal Article

PDF

A Hubel Wiesel model of early concept generalization based on local correlation of input features, Sepideh SADEGHI and Kiruthika RAMANATHAN Conference Proceeding Article

Link

An Incremental Approach to Closest Pair Queries in Spatial Networks Using Best-First Search, Chunan CHEN, Weiwei SUN, Baihua ZHENG, Dingding Mao, and Weimo LIU Conference Proceeding Article

PDF

CCRank: Parallel Learning to Rank with Cooperative Coevolution, Shuaiqiang WANG, Byron J. GAO, Ke WANG, and Hady W. LAUW Conference Proceeding Article

PDF

Defending against cross site scripting attacks, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article

PDF

General Construction of Chameleon All-but-one Trapdoor Functions, Shengli LIU, Junzuo LAI, and Robert H. DENG Journal Article

Probabilistic indexing of media sequences, Jialie SHEN, Meng WANG, Shuicheng YAN, and TIAN QI Conference Proceeding Article

PDF

TaxiSim: A multiagent simulation platform for evaluating taxi fleet operations, Shih-Fen CHENG and Thi Duong NGUYEN Conference Proceeding Article

Link

Acceptance of Service Oriented Computing: what do IT professionals think?, Ilse BAUMGARTNER and Peter GREEN Conference Proceeding Article

PDF

A hybrid agent architecture integrating desire, intention and reinforcement learning, Ah-hwee TAN, Yew-Soon ONG, and Akejariyawong TAPANUJ Journal Article

PDF

Automated Detection of Likely Design Flaws in Layered Architectures, Aditya BUDI, - Lucia, David LO, Lingxiao JIANG, and Shaowei WANG Conference Proceeding Article

Link

Developing and Applying a User-Centered Model for the Design and Implementation of Information Visualisation, Lian Chee KOH, A. Slingsby, J. Dykes, and Tin Seong KAM Conference Proceeding Article

PDF

Effects of Mentoring on Player Performance in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM, Kuo-Wei HSU, and Jaideep SRIVASTAVA Conference Proceeding Article

E-referral and Word-of-Mouth Marketing, Zhiling GUO Presentation

PDF

Finding robust-under-risk solutions for flowshop scheduling, Steven O. Kimbrough, Ann KUO, and Hoong Chuin LAU Conference Paper

PDF

Generating Aspect-oriented Multi-document Summarization with Event-Aspect Model, Peng LI, Yinglin WANG, Wei GAO, and Jing JIANG Conference Proceeding Article

PDF

Generating aspect-oriented multi-document summarization with event-aspect model, Peng LI, Yinglin WANG, Wei GAO, and Jing JIANG Conference Proceeding Article

PDF

Heuristic Algorithms for Balanced Multi-way Number Partitioning, Jilian ZHANG, Kyriakos MOURATIDIS, and Hwee Hwa PANG Conference Proceeding Article

High-Performance Composite Event Monitoring System Supporting Large Numbers of Queries and Sources, SangJeong Lee, Youngki Lee, Byoungjip Kim, K. Selcuk Candan, Yunseok Rhee, and Junehwa Song Conference Paper

PDF

Linking Entities to a Knowledge Base with Query Expansion, Swapna GOTTIPATI and Jing JIANG Conference Proceeding Article

PDF

Media landscape in Twitter: A world of new conventions and political diversity, Jisun AN, Meeyoung CHA, Krishna GUMMADI, and Jon CROWCROFT Conference Proceeding Article

PDF

Message-Passing Algorithms for Quadratic Programming Formulations of MAP Estimation, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Mining weakly labeled web facial images for search-based face annotation, Dayang WANG, Steven C. H. HOI, and Ying HE Conference Proceeding Article

Link

Modeling Player Performance in Massively Multiplayer Online Role-Playing Games: The Effects of Diversity in Mentoring Network, Kyong Jin SHIM, K. W. HSU, and J. SRIVASTAVA Conference Proceeding Article