Submissions from 2011
Editorial: Special issue on ubiquitous electronic commerce systems, Robert H. DENG, Jari Veijalainen, Shiguo LIAN, and Dimitris Kanellopoulos Editorial
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article
Efficient Topological OLAP on Information Networks, Qiang QU, Feida ZHU, Xifeng YAN, Jiawei HAN, Philip YU, and Hongyan LI Conference Paper
Enhancing Bag-of-Words Models by Efficient Semantics-Preserving Metric Learning, Lei WU and Steven C. H. HOI Journal Article
Fine-tuning algorithm parameters using the design of experiments approach, Aldy GUNAWAN, Hoong Chuin LAU, and Linda Lindawati Conference Proceeding Article
Identity-based strong designated verifier signature revisited, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article
Improving Service through Just-in-Time Concept in a Dynamic Operational Environment, Kar Way TAN, Hoong Chuin LAU, and Na FU Conference Proceeding Article
Inkjet Printer Pricing, Thin Yin LEONG and Nang Laik MA Journal Article
Innovation and Price Competition in a Two-Sided Market, Mei LIN, Shaojin LI, and Andrew B. Whinston Journal Article
Instance-based parameter tuning via search trajectory similarity clustering, Linda LINDAWATI, Hoong Chuin LAU, and David LO Conference Proceeding Article
Introduction to the Special Section: Economics of Electronic Commerce, E. K. CLEMONS, Robert J. Kauffman, and T. Weber Journal Article
Lightweight Delegated Subset Test with Privacy Protection, Xuhua ZHOU, Xuhua DING, and Kefei CHEN Conference Proceeding Article
Mechanism Design for E- Procurement Auctions: On the Efficacy of Post-Auction Negotiation and Quality Effort Incentives, He HUANG, Robert J. Kauffman, Hongyan XU, and Lan ZHAO Journal Article
Mechanism Design for E-Procurement Auctions: On the Efficacy of Post-Auction Negotiation and Quality Effort Incentives, H. Huang, Robert John Kauffman, H. Xu, and L. Zhao Journal Article
Mining event structures from web videos, Xiao WU, Yi-Jie LU, Qiang PENG, and Chong-wah NGO Journal Article
Modeling bipartite graphs using hierarchical structures, Freddy Chong-Tat CHUA and Ee Peng LIM Conference Proceeding Article
Modeling socialness in dynamic social networks, Tuan Anh HOANG, Ee Peng LIM, Palakorn ACHANANUPARP, Jing JIANG, and Loo-Nin TEOW Conference Proceeding Article
Near-duplicate keyframe retrieval by semi-supervised learning and nonrigid image matching, Jianke ZHU, Steven C. H. HOI, Michael R. LYU, and Shuicheng YAN Journal Article
Privacy Risk Assessment with Bounds Deduced from Bounds, Yingjiu LI and Haibing LU Journal Article
Project Management Spreadsheet Gaming Application, Wee Leong LEE Book Chapter
Randomly Projected KD-Trees with Distance Metric Learning for Image Retrieval, Pengcheng WU, Steven HOI, Duc Dung NGUYEN, and Ying HE Conference Proceeding Article
Returns to Information Technology Outsourcing, K. HAN, Robert J. Kauffman, and B. R. Nault Journal Article
SAUCeR: A QoS-aware slotted-aloha UWB MAC with cooperative retransmissions, Hwee Xian TAN, Mun Choon CHAN, Peng-Yong KONG, and Chen khong THAM Journal Article
Secure Mobile Agents with Controlled Resources, Qi ZHANG, Yi Mu, Minjie ZHANG, and Robert H. DENG Journal Article
Social Media Modeling and Computing, Steven C. H. HOI, Jiebo LUO, Susanne BOLL, Dong XU, Rong JIN, and Irwin KING Edited Book
Solving the quadratic assignment problem by a Hybrid Algorithm, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Conference Proceeding Article
Solving the teacher assignment problem by two Metaheuristics, Aldy GUNAWAN and Kien Ming NG Journal Article
Specification Mining: A Concise Introduction, David LO, Siau-Cheng Khoo, Chao LIU, and Jiawei Han Book Chapter
Starting up the School of Information Systems at Singapore Management University: Critical Success Factors and Questions of Balance, Paul S. GOODMAN and Steven M. MILLER Book Chapter
The effects of heterogeneous information combination on large scale social image search., Zhiyong CHENG, Jing Ren, Jialie SHEN, and Haiyan MIAO Conference Proceeding Article
The Impact of Internet-Based Selling Technology: A Hybrid Growth Theory Perspective with Cross-Model Inference, S. C. HO, Robert J. Kauffman, and T. P. LIANG Journal Article
The Value of IT-Enabled Business Process Standardization from the Real Options Perspective., Q. Dai, Robert John KAUFFMAN, and B. Wang Book Chapter
Toward Service Innovation: An Investigation of the Business Potential of Mobile Video Services in China, Rong CHEN, Zang LI, and Chao-Hsien CHU Journal Article
Trends and controversies: AI, virtual worlds, and massively multiplayer online games, Hsinchun CHEN, Yulei ZHANG, W. S. Bainbridge, Kyong Jin SHIM, N. Pathak, M. A. Ahmad, C. DeLong, Z. Borbora, A. Mahapatra, and J. Srivastava Journal Article
Visualizing and querying semantic social network, Aixin SUN, Anwitaman DATTA, Ee Peng LIM, and Kuiyu CHANG Conference Proceeding Article
What Drives ICT Global Adoption? Analysis and Research Directions, David M. WEBER and Robert J. Kauffman Journal Article
Workshop report from Web2SE 2011: 2nd International Workshop on Web 2.0 for Software Engineering, Christoph TREUDE, Margaret-Anne STOREY, Arie VAN DEURSEN, Andrew BEGEL, and Sue BLACK Journal Article
Would price limits have made any difference to the 'Flash Crash' on May 6, 2010, Wing Bernard LEE, Shih-Fen CHENG, and Annie KOH Journal Article
Submissions from 2010
A Model Driven Approach to Imbalanced Data Sampling in Medical Decision Making, Yin H. and Tze-Yun LEONG Conference Proceeding Article
A Multi-User Steganographic File System on Untrusted Shared Storage, Jin HAN, Meng PAN, Debin GAO, and Hwee Hwa PANG Conference Proceeding Article
A structure first image inpainting approach based on self-organizing map (SOM), Bo CHEN, Zhaoxia WANG, Ming BAI, Quan WANG, and Zhen SUN Conference Proceeding Article
Automobile exhaust gas detection based on fuzzy temperature compensation system, Zhiyong WANG, Hao DING, Fufei HAO, Zhaoxia WANG, Zhen SUN, and Shujin LI Conference Proceeding Article
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Jian Weng; Huijie, Robert DENG; Shengli Liu; and Kefei Chen Journal Article
Customer heterogeneity and tariff biases in Cloud computing, Philip KOEHLER, Dan MA, Arun Anandasivam, and Christof Weinhardt Conference Proceeding Article
Dynamic group key exchange revisited, Guomin YANG and Chik How TAN Conference Proceeding Article
Efficient mining of haplotype patterns for linkage disequilibrium mapping, Lin L., Wong L., Tze-Yun LEONG, and Lai P. Journal Article
Evaluation of Protein Backbone Alphabets : Using Predicted Local Structure for Fold Recognition, Kyong Jin SHIM Conference Proceeding Article
Exploiting intensity inhomogeneity to extract textured objects from natural scenes, Jundi DING, Jialie SHEN, Hwee Hwa PANG, Songcan CHEN, and Jingyu YANG Conference Proceeding Article
IBM power systems and service oriented architecture at Bank of America’s foreign items systems office, Keng SIAU and D. DEWESTER Conference Proceeding Article
Internet Inequality: The Relationship between High School Students' Internet Use in Different Locations and their Internet Self-efficacy, Ling ZHAO, Yaobin LU, Wayne N. HUANG, and QIU-HONG WANG Journal Article
MAP Estimation for Graphical Models by Likelihood Maximization, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
Micro-blogging Sentiment Detection by Collaborative Online Learning, Guangxia LI, Steven C. H. HOI, Kuiyu CHANG, and Ramesh JAIN Conference Proceeding Article
Opportunistic Routing in Wireless Sensor Networks Powered by Ambient Energy Harvesting, Zhi Ang EU, Hwee-Pink TAN, and Winston K. G. SEAH Journal Article
Optimized algorithms for predictive range and KNN queries on moving objects, Rui ZHANG, H.V. JAGADISH, Bing Tian DAI, and Kotagiri RAMAMOHANARAO Journal Article
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains, Shaoying CAI, Chunhua SU, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Reveal User Search Patterns in B2B Marketplace - Towards Optimized Advertising Services, Y. YU, Mei LIN, and Z. LIN Conference Proceeding Article
Revisiting Address Space Randomization, Zhi WANG, Renquan CHENG, and Debin GAO Conference Proceeding Article
Sequence Alignment Based Analysis of Player Behavior in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM and Jaideep SRIVASTAVA Conference Proceeding Article
Special Section: Competitive Strategy, Economics, and Information Systems, E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article
Time cost evaluation for executing RFID authentication protocols, Kevin CHIEW, Yingjiu LI, Tieyan LI, Robert H. DENG, and Manfred AIGNER Conference Proceeding Article
Topical summarization of web videos by visual-text time-dependent alignment, Song TAN, Hung-Khoon TAN, and Chong-wah NGO Conference Proceeding Article
Toward effective concept representation in decision support to improve patient safety, Tze-Yun LEONG Editorial
Bundle Auction Market Design and Implementation, Zhiling GUO Presentation
An Analytic Characterization of Model Minimization in Factored Markov Decision Processes, Guo W. and Tze-Yun LEONG Conference Proceeding Article
ARIVU: Power-Aware Middleware for Multiplayer Mobile Games, Bhojan ANAND, Karthik THIRUGNANAM, Thanh Long LE, Duc-Dung PHAM, Akhihebbal L. ANANDA, Rajesh Krishna BALAN, and Mun Choon CHAN Conference Proceeding Article
ECRA Co-Editors Introduction for Volume 9, Issue 6, November - December 2010, Robert J. KAUFFMAN, P.Y.K. Chau, T.R. Payne, and J.C. Westland Editorial
Efficient mining of multiple partial near-duplicate alignments by temporal network, Hung-Khoon TAN, Chong-wah NGO, and Tat-Seng CHUA Journal Article
Electronic commerce research and applications: ECRA Co-Editors’ Introduction for Volume 9, Issue 6, November–December 2010, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Evolution of a Bluetooth Test Application Product Line: A Case Study, Narayanasamy RAMASUBBU and Rajesh Krishna BALAN Conference Paper
Model checking a model checker: A code contract combined approach, Jun SUN, Yang LIU, and Bin CHENG Conference Proceeding Article
Model checking hierarchical probabilistic systems, Jun SUN, Songzheng SONG, and Yang LIU Conference Proceeding Article
Semi-autonomous virtual valet parking, Arne SUPPE, Luis NAVARRO-SERMENT, and Aaron STEINFELD Conference Proceeding Article
SMU-SIS at TAC 2010 - KBP Track Entity Linking, Swapna GOTTIPATI and Jing JIANG Conference Paper
The impact of social media on software engineering practices and tools, Margaret-Anne STOREY, Christoph TREUDE, Arie VAN DEURSEN, and Li-Te CHENG Conference Proceeding Article
VIREO at TRECVID 2010: Semantic indexing, known-item search, and content-based copy detection, Chong-wah NGO, Shi-Ai ZHU, Hung-Khoon TAN, and Wan-Lei ZHAO Conference Paper
Would Position Limits Have Made any Difference to the 'Flash Crash' on May 6, 2010, Wing Bernard LEE, Shih-Fen CHENG, and Annie KOH Conference Paper
Agent-augmented Co-Space: Toward merging of real world and cyberspace, Ah-hwee TAN and Yilin KANG Conference Proceeding Article
Software engineering: Concepts and applications, Subhajit DATTA Book
Attracting the community's many eyes: An exploration of user involvement in issue tracking, Lars GRAMMEL, Holger SCHACKMANN, Adrian SCHRÖTER, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article
Business network-based value creation in electronic commerce, Robert John KAUFFMAN, Ting Li, and Eric Van Heck Journal Article
Cast2Face: Character identification in movie with actor-character correspondence, Mengdi XU, Xiaotong YUAN, Jialie SHEN, and Shuicheng YAN Conference Proceeding Article
Co-creation and collaboration in a virtual world: A 3D visualization design project in Second Life, Keng SIAU, Fiona Fui-hoon NAH, B. MENNECKE, and S. SCHILLER Journal Article
Context Modeling for Ranking and Tagging Bursty Features in Text Streams, Xin ZHAO, Jing JIANG, Jing HE, Xiaoming LI, Hongfei YAN, and Dongdong Shan Conference Proceeding Article
Data-driven approaches to community-contributed video applications, Xiao WU, Chong-wah NGO, and Wan-Lei ZHAO Journal Article
Detecting Product Review Spammers using Rating Behaviors, Ee Peng LIM, Viet-An NGUYEN, Nitin JINDAL, Bing LIU, and Hady Wirawan LAUW Conference Proceeding Article
Effects of national culture on types of knowledge sharing in virtual communities, Keng SIAU, J. ERICKSON, and Fiona Fui-hoon NAH Journal Article
Finding unusual review patterns using unexpected rules, Nitin JINDAL, Bing LIU, and Ee Peng LIM Conference Proceeding Article
Intelligent Query: Open Another Door to 3D Object Retrieval, Yue GAO, Meng WANG, Jialie SHEN, Qionghai DAI, and Naiyao ZHANG Conference Proceeding Article
Jointly Modeling Aspects and Opinions with a MaxEnt-LDA Hybrid, Xin ZHAO, Jing JIANG, Hongfei YAN, and Xiaoming LI Conference Proceeding Article
Mining collaboration patterns from a large developer network, Didi SURIAN, David LO, and Ee Peng LIM Conference Proceeding Article
Mining interesting link formation rules in social networks, Cane Wing-Ki LEUNG, Ee Peng LIM, David LO, and Jianshu WENG Conference Proceeding Article
Modeling 3D Facial Expressions using Geometry Videos, Jiazhi XIA, Ying HE, Dao T. P. QUYNH, Xiaoming CHEN, and Steven C. H. HOI Conference Proceeding Article
Online Multiple Kernel Learning: Algorithms and Mistake Bounds, Rong JIN, Steven C. H. HOI, and Tianbao YANG Conference Proceeding Article
Rich Internet GeoWeb for Spatial data Infrastructure, Tin Seong KAM Presentation
SecureAngle: Improving wireless security using angle-of-arrival information, Jie XIONG and Kyle JAMIESON Conference Proceeding Article
SecureAngle: Improving wireless security using angle-of-arrival information, Jie XIONG and Kyle JAMIESON Magazine Article
The E-Recall Environment for Cloud based Mobile Rich Media Data Management, Jialie SHEN, Shuicheng YAN, and Xian-Sheng Hua Conference Proceeding Article
Trajectory-based visualization of web video topics, Juan CAO, Chong-wah NGO, Yong-Dong ZHANG, Dong-Ming ZHANG, and Liang MA Conference Proceeding Article
Wireless Sensing without Sensors: An Experimental Study of Motion/Intrusion Detection using RF Irregularity, Wei Qi LEE, Winston K. G. SEAH, Hwee-Pink TAN, and Zexi YAO Journal Article
WSM '10: Proceedings of the 2nd ACM SIGMM Workshop on Social Media, co-located with ACM Multimedia: Firenze, Italy, October 25-29, Susanne BOLL, Steven C. H. HOI, Jiebo LUO, and Roelof VAN ZWOL Edited Conference Proceeding