The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2011

PDF

Solving the teacher assignment problem by two Metaheuristics, Aldy GUNAWAN and Kien Ming NG Journal Article

Specification Mining: A Concise Introduction, David LO, Siau-Cheng Khoo, Chao LIU, and Jiawei Han Book Chapter

Starting up the School of Information Systems at Singapore Management University: Critical Success Factors and Questions of Balance, Paul S. GOODMAN and Steven M. MILLER Book Chapter

The effects of heterogeneous information combination on large scale social image search., Zhiyong CHENG, Jing Ren, Jialie SHEN, and Haiyan MIAO Conference Proceeding Article

Link

The Impact of Internet-Based Selling Technology: A Hybrid Growth Theory Perspective with Cross-Model Inference, S. C. HO, Robert J. Kauffman, and T. P. LIANG Journal Article

The Value of IT-Enabled Business Process Standardization from the Real Options Perspective., Q. Dai, Robert John KAUFFMAN, and B. Wang Book Chapter

Link

Toward Service Innovation: An Investigation of the Business Potential of Mobile Video Services in China, Rong CHEN, Zang LI, and Chao-Hsien CHU Journal Article

PDF

Trends and controversies: AI, virtual worlds, and massively multiplayer online games, Hsinchun CHEN, Yulei ZHANG, W. S. Bainbridge, Kyong Jin SHIM, N. Pathak, M. A. Ahmad, C. DeLong, Z. Borbora, A. Mahapatra, and J. Srivastava Journal Article

Visualizing and querying semantic social network, Aixin SUN, Anwitaman DATTA, Ee Peng LIM, and Kuiyu CHANG Conference Proceeding Article

Link

What Drives ICT Global Adoption? Analysis and Research Directions, David M. WEBER and Robert J. Kauffman Journal Article

PDF

Workshop report from Web2SE 2011: 2nd International Workshop on Web 2.0 for Software Engineering, Christoph TREUDE, Margaret-Anne STOREY, Arie VAN DEURSEN, Andrew BEGEL, and Sue BLACK Journal Article

PDF

Would price limits have made any difference to the 'Flash Crash' on May 6, 2010, Wing Bernard LEE, Shih-Fen CHENG, and Annie KOH Journal Article

Submissions from 2010

Link

A Model Driven Approach to Imbalanced Data Sampling in Medical Decision Making, Yin H. and Tze-Yun LEONG Conference Proceeding Article

PDF

A Multi-User Steganographic File System on Untrusted Shared Storage, Jin HAN, Meng PAN, Debin GAO, and Hwee Hwa PANG Conference Proceeding Article

PDF

A structure first image inpainting approach based on self-organizing map (SOM), Bo CHEN, Zhaoxia WANG, Ming BAI, Quan WANG, and Zhen SUN Conference Proceeding Article

PDF

Automobile exhaust gas detection based on fuzzy temperature compensation system, Zhiyong WANG, Hao DING, Fufei HAO, Zhaoxia WANG, Zhen SUN, and Shujin LI Conference Proceeding Article

PDF

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Jian Weng; Huijie, Robert DENG; Shengli Liu; and Kefei Chen Journal Article

Link

Customer heterogeneity and tariff biases in Cloud computing, Philip KOEHLER, Dan MA, Arun Anandasivam, and Christof Weinhardt Conference Proceeding Article

PDF

Dynamic group key exchange revisited, Guomin YANG and Chik How TAN Conference Proceeding Article

Efficient mining of haplotype patterns for linkage disequilibrium mapping, Lin L., Wong L., Tze-Yun LEONG, and Lai P. Journal Article

PDF

Enhancing brand equity through flow: Comparison of 2D versus 3D virtual world, Fiona Fui-hoon NAH, Brenda ESCHENBRENNER, and David DEWESTER Journal Article

PDF

Evaluation of Protein Backbone Alphabets : Using Predicted Local Structure for Fold Recognition, Kyong Jin SHIM Conference Proceeding Article

PDF

Exploiting intensity inhomogeneity to extract textured objects from natural scenes, Jundi DING, Jialie SHEN, Hwee Hwa PANG, Songcan CHEN, and Jingyu YANG Conference Proceeding Article

PDF

IBM power systems and service oriented architecture at Bank of America’s foreign items systems office, Keng SIAU and D. DEWESTER Conference Proceeding Article

Internet Inequality: The Relationship between High School Students' Internet Use in Different Locations and their Internet Self-efficacy, Ling ZHAO, Yaobin LU, Wayne N. HUANG, and QIU-HONG WANG Journal Article

PDF

MAP Estimation for Graphical Models by Likelihood Maximization, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

Link

Micro-blogging Sentiment Detection by Collaborative Online Learning, Guangxia LI, Steven C. H. HOI, Kuiyu CHANG, and Ramesh JAIN Conference Proceeding Article

PDF

Opportunistic Routing in Wireless Sensor Networks Powered by Ambient Energy Harvesting, Zhi Ang EU, Hwee-Pink TAN, and Winston K. G. SEAH Journal Article

PDF

Optimized algorithms for predictive range and KNN queries on moving objects, Rui ZHANG, H.V. JAGADISH, Bing Tian DAI, and Kotagiri RAMAMOHANARAO Journal Article

PDF

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains, Shaoying CAI, Chunhua SU, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

Reveal User Search Patterns in B2B Marketplace - Towards Optimized Advertising Services, Y. YU, Mei LIN, and Z. LIN Conference Proceeding Article

PDF

Revisiting Address Space Randomization, Zhi WANG, Renquan CHENG, and Debin GAO Conference Proceeding Article

PDF

Sequence Alignment Based Analysis of Player Behavior in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM and Jaideep SRIVASTAVA Conference Proceeding Article

Special Section: Competitive Strategy, Economics, and Information Systems, E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article

PDF

Time cost evaluation for executing RFID authentication protocols, Kevin CHIEW, Yingjiu LI, Tieyan LI, Robert H. DENG, and Manfred AIGNER Conference Proceeding Article

PDF

Topical summarization of web videos by visual-text time-dependent alignment, Song TAN, Hung-Khoon TAN, and Chong-wah NGO Conference Proceeding Article

PDF

Toward effective concept representation in decision support to improve patient safety, Tze-Yun LEONG Editorial

Bundle Auction Market Design and Implementation, Zhiling GUO Presentation

PDF

An Analytic Characterization of Model Minimization in Factored Markov Decision Processes, Guo W. and Tze-Yun LEONG Conference Proceeding Article

PDF

ARIVU: Power-Aware Middleware for Multiplayer Mobile Games, Bhojan ANAND, Karthik THIRUGNANAM, Thanh Long LE, Duc-Dung PHAM, Akhihebbal L. ANANDA, Rajesh Krishna BALAN, and Mun Choon CHAN Conference Proceeding Article

Link

ECRA Co-Editors Introduction for Volume 9, Issue 6, November - December 2010, Robert J. KAUFFMAN, P.Y.K. Chau, T.R. Payne, and J.C. Westland Editorial

PDF

Efficient mining of multiple partial near-duplicate alignments by temporal network, Hung-Khoon TAN, Chong-wah NGO, and Tat-Seng CHUA Journal Article

Electronic commerce research and applications: ECRA Co-Editors’ Introduction for Volume 9, Issue 6, November–December 2010, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

PDF

Evolution of a Bluetooth Test Application Product Line: A Case Study, Narayanasamy RAMASUBBU and Rajesh Krishna BALAN Conference Paper

PDF

Model checking a model checker: A code contract combined approach, Jun SUN, Yang LIU, and Bin CHENG Conference Proceeding Article

PDF

Model checking hierarchical probabilistic systems, Jun SUN, Songzheng SONG, and Yang LIU Conference Proceeding Article

PDF

Semi-autonomous virtual valet parking, Arne SUPPE, Luis NAVARRO-SERMENT, and Aaron STEINFELD Conference Proceeding Article

PDF

SMU-SIS at TAC 2010 - KBP Track Entity Linking, Swapna GOTTIPATI and Jing JIANG Conference Paper

PDF

The impact of social media on software engineering practices and tools, Margaret-Anne STOREY, Christoph TREUDE, Arie VAN DEURSEN, and Li-Te CHENG Conference Proceeding Article

PDF

VIREO at TRECVID 2010: Semantic indexing, known-item search, and content-based copy detection, Chong-wah NGO, Shi-Ai ZHU, Hung-Khoon TAN, and Wan-Lei ZHAO Conference Paper

PDF

Would Position Limits Have Made any Difference to the 'Flash Crash' on May 6, 2010, Wing Bernard LEE, Shih-Fen CHENG, and Annie KOH Conference Paper

Agent-augmented Co-Space: Toward merging of real world and cyberspace, Ah-hwee TAN and Yilin KANG Conference Proceeding Article

Software engineering: Concepts and applications, Subhajit DATTA Book

PDF

Attracting the community's many eyes: An exploration of user involvement in issue tracking, Lars GRAMMEL, Holger SCHACKMANN, Adrian SCHRÖTER, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article

PDF

Business network-based value creation in electronic commerce, Robert John KAUFFMAN, Ting Li, and Eric Van Heck Journal Article

PDF

Cast2Face: Character identification in movie with actor-character correspondence, Mengdi XU, Xiaotong YUAN, Jialie SHEN, and Shuicheng YAN Conference Proceeding Article

PDF

Co-creation and collaboration in a virtual world: A 3D visualization design project in Second Life, Keng SIAU, Fiona Fui-hoon NAH, B. MENNECKE, and S. SCHILLER Journal Article

PDF

Context Modeling for Ranking and Tagging Bursty Features in Text Streams, Xin ZHAO, Jing JIANG, Jing HE, Xiaoming LI, Hongfei YAN, and Dongdong Shan Conference Proceeding Article

PDF

Data-driven approaches to community-contributed video applications, Xiao WU, Chong-wah NGO, and Wan-Lei ZHAO Journal Article

PDF

Detecting Product Review Spammers using Rating Behaviors, Ee Peng LIM, Viet-An NGUYEN, Nitin JINDAL, Bing LIU, and Hady Wirawan LAUW Conference Proceeding Article

PDF

Effects of national culture on types of knowledge sharing in virtual communities, Keng SIAU, J. ERICKSON, and Fiona Fui-hoon NAH Journal Article

PDF

Finding unusual review patterns using unexpected rules, Nitin JINDAL, Bing LIU, and Ee Peng LIM Conference Proceeding Article

Link

Intelligent Query: Open Another Door to 3D Object Retrieval, Yue GAO, Meng WANG, Jialie SHEN, Qionghai DAI, and Naiyao ZHANG Conference Proceeding Article

PDF

Jointly Modeling Aspects and Opinions with a MaxEnt-LDA Hybrid, Xin ZHAO, Jing JIANG, Hongfei YAN, and Xiaoming LI Conference Proceeding Article

PDF

Mining collaboration patterns from a large developer network, Didi SURIAN, David LO, and Ee Peng LIM Conference Proceeding Article

PDF

Mining interesting link formation rules in social networks, Cane Wing-Ki LEUNG, Ee Peng LIM, David LO, and Jianshu WENG Conference Proceeding Article

PDF

Modeling 3D Facial Expressions using Geometry Videos, Jiazhi XIA, Ying HE, Dao T. P. QUYNH, Xiaoming CHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

Online Multiple Kernel Learning: Algorithms and Mistake Bounds, Rong JIN, Steven C. H. HOI, and Tianbao YANG Conference Proceeding Article

PDF

Rich Internet GeoWeb for Spatial data Infrastructure, Tin Seong KAM Presentation

PDF

SecureAngle: Improving wireless security using angle-of-arrival information, Jie XIONG and Kyle JAMIESON Conference Proceeding Article

PDF

SecureAngle: Improving wireless security using angle-of-arrival information, Jie XIONG and Kyle JAMIESON Magazine Article

Link

The E-Recall Environment for Cloud based Mobile Rich Media Data Management, Jialie SHEN, Shuicheng YAN, and Xian-Sheng Hua Conference Proceeding Article

PDF

Trajectory-based visualization of web video topics, Juan CAO, Chong-wah NGO, Yong-Dong ZHANG, Dong-Ming ZHANG, and Liang MA Conference Proceeding Article

PDF

Wireless Sensing without Sensors: An Experimental Study of Motion/Intrusion Detection using RF Irregularity, Wei Qi LEE, Winston K. G. SEAH, Hwee-Pink TAN, and Zexi YAO Journal Article

Link

WSM '10: Proceedings of the 2nd ACM SIGMM Workshop on Social Media, co-located with ACM Multimedia: Firenze, Italy, October 25-29, Susanne BOLL, Steven C. H. HOI, Jiebo LUO, and Roelof VAN ZWOL Edited Conference Proceeding

PDF

WSM'10: Second ACM Workshop on Social Media, Susanne BOLL, Steven C. H. HOI, Roelof VAN ZWOL, and Jiebo LUO Conference Proceeding Article

PDF

Youth olympic village Co-Space, Zin-Yan CHUA, Yilin KANG, Xing JIANG, Kah-Hoe PANG, Andrew C. GREGORY, Chi-Yun TAN, Wai-Lun WONG, Ah-Hwee TAN, Yew-Soon ONG, and Chunyan MIAO Conference Proceeding Article

Meme selection, variation, and transmission in multi-agent system, Zheng-Xiang PAN, Liang FENG, Yew-Soon ONG, Yilin KANG, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article

Towards a multi-level game model for influenza epidemics, Qiongyu Chen and Tze-Yun LEONG Conference Proceeding Article

PDF

A biologically-inspired cognitive agent model integrating declarative knowledge and reinforcement learning, Ah-hwee TAN and Gee-Wah NG Conference Proceeding Article

PDF

A Hoare calculus for graph programs, Christopher M. POSKITT and Detlef PLUMP Conference Proceeding Article

PDF

An automated approach for finding variable-constant pairing bugs, Julia LAWALL and David LO Conference Proceeding Article

PDF

A new framework for RFID privacy, Robert H. DENG, Yingjiu LI, Moti YUNG, and Yunlei ZHAO Conference Proceeding Article

PDF

Comprehensive Evaluation of Association Measures for Fault Localization, Lucia LUCIA, David LO, Lingxiao JIANG, and Aditya Budi Conference Proceeding Article

PDF

Context-aware query recommendations, Alexandros NTOULAS, Heasoo HWANG, Lise GETOOR, Stelios PAPARIZOS, and Hady Wirawan LAUW Patent

PDF

Developing model checkers using PAT, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

DIRACT: Agent-based interactive storytelling, Yundong CAI, Zhiqi SHEN, Chunyan MIAO, and Ah-hwee TAN Conference Proceeding Article

Do online reviews reflect a product’s true perceived quality? An investigation of online movie reviews across cultures, Noi Sian KOH, Nan HU, and Eric K. CLEMONS Journal Article

PDF

Do online reviews reflect a product’s true perceived quality? An investigation of online movie reviews across cultures, Noi Sian KOH, Nan HU, and Eric K. CLEMONS Journal Article

Editors' introduction to the issue: Electronic commerce research and applications, volume 9, issue 5, September - October 2010, Robert John KAUFFMAN, P.Y.K. Chau, T.R. Payne, J.C. Tsai, and J.C. Westland Journal Article

Editors’ Introduction to the Issue: Electronic Commerce Research and Applications, Volume 9, Issue 5, September–October 2010, Robert J. KAUFFMAN, Patrick Y. K. CHAU, Terry R. Payne, and Juliana Y. TSAI Editorial

PDF

Embellishing Text Search Queries to Protect User Privacy, Hwee Hwa PANG, Xuhua DING, and Xiaokui XIAO Conference Proceeding Article

PDF

Event study method for validating agent-based trading simulations, Shih-Fen CHENG Conference Proceeding Article

Link

Large Scale Rich Media Information Search: Challenges and Opportunities, Zhiyong CHENG and Jialie SHEN Conference Proceeding Article

PDF

Matching dependence-related queries in the system dependence graph., Xiaoyin WANG, David LO, Jiefeng CHENG, Lu ZHANG, Hong MEI, and Jeffrey Xu YU Conference Proceeding Article

PDF

On Challenges in Evaluating Malware Clustering, Peng LI, Limin LIU, Debin GAO, and Michael K Reiter Conference Proceeding Article

Link

On Classifying Drifting Concepts in P2P Networks, Hock Hee ANG, Vivekanand Gopalkrishnan, Wee Keong NG, and Steven C. H. HOI Conference Proceeding Article

PDF

P2PDocTagger: Content management through automated P2P collaborative tagging, Hock Hee ANG, Vivekanand GOPALKRISHNAN, Wee Keong NG, and Steven C. H. HOI Conference Proceeding Article

Link

Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data, Bing LIANG, Kevin Chiew, Yingjiu LI, and Yanjiang YANG Conference Proceeding Article

PDF

Pseudonym-based RFID discovery service to mitigate unauthorized tracking in supply chain management, Qiang YAN, Robert H. DENG, Zheng YAN, Yingjiu LI, and Tieyan LI Conference Proceeding Article