Submissions from 2011
Solving the teacher assignment problem by two Metaheuristics, Aldy GUNAWAN and Kien Ming NG Journal Article
Specification Mining: A Concise Introduction, David LO, Siau-Cheng Khoo, Chao LIU, and Jiawei Han Book Chapter
Starting up the School of Information Systems at Singapore Management University: Critical Success Factors and Questions of Balance, Paul S. GOODMAN and Steven M. MILLER Book Chapter
The effects of heterogeneous information combination on large scale social image search., Zhiyong CHENG, Jing Ren, Jialie SHEN, and Haiyan MIAO Conference Proceeding Article
The Impact of Internet-Based Selling Technology: A Hybrid Growth Theory Perspective with Cross-Model Inference, S. C. HO, Robert J. Kauffman, and T. P. LIANG Journal Article
The Value of IT-Enabled Business Process Standardization from the Real Options Perspective., Q. Dai, Robert John KAUFFMAN, and B. Wang Book Chapter
Toward Service Innovation: An Investigation of the Business Potential of Mobile Video Services in China, Rong CHEN, Zang LI, and Chao-Hsien CHU Journal Article
Trends and controversies: AI, virtual worlds, and massively multiplayer online games, Hsinchun CHEN, Yulei ZHANG, W. S. Bainbridge, Kyong Jin SHIM, N. Pathak, M. A. Ahmad, C. DeLong, Z. Borbora, A. Mahapatra, and J. Srivastava Journal Article
Visualizing and querying semantic social network, Aixin SUN, Anwitaman DATTA, Ee Peng LIM, and Kuiyu CHANG Conference Proceeding Article
What Drives ICT Global Adoption? Analysis and Research Directions, David M. WEBER and Robert J. Kauffman Journal Article
Workshop report from Web2SE 2011: 2nd International Workshop on Web 2.0 for Software Engineering, Christoph TREUDE, Margaret-Anne STOREY, Arie VAN DEURSEN, Andrew BEGEL, and Sue BLACK Journal Article
Would price limits have made any difference to the 'Flash Crash' on May 6, 2010, Wing Bernard LEE, Shih-Fen CHENG, and Annie KOH Journal Article
Submissions from 2010
A Model Driven Approach to Imbalanced Data Sampling in Medical Decision Making, Yin H. and Tze-Yun LEONG Conference Proceeding Article
A Multi-User Steganographic File System on Untrusted Shared Storage, Jin HAN, Meng PAN, Debin GAO, and Hwee Hwa PANG Conference Proceeding Article
A structure first image inpainting approach based on self-organizing map (SOM), Bo CHEN, Zhaoxia WANG, Ming BAI, Quan WANG, and Zhen SUN Conference Proceeding Article
Automobile exhaust gas detection based on fuzzy temperature compensation system, Zhiyong WANG, Hao DING, Fufei HAO, Zhaoxia WANG, Zhen SUN, and Shujin LI Conference Proceeding Article
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Jian Weng; Huijie, Robert DENG; Shengli Liu; and Kefei Chen Journal Article
Customer heterogeneity and tariff biases in Cloud computing, Philip KOEHLER, Dan MA, Arun Anandasivam, and Christof Weinhardt Conference Proceeding Article
Dynamic group key exchange revisited, Guomin YANG and Chik How TAN Conference Proceeding Article
Efficient mining of haplotype patterns for linkage disequilibrium mapping, Lin L., Wong L., Tze-Yun LEONG, and Lai P. Journal Article
Enhancing brand equity through flow: Comparison of 2D versus 3D virtual world, Fiona Fui-hoon NAH, Brenda ESCHENBRENNER, and David DEWESTER Journal Article
Evaluation of Protein Backbone Alphabets : Using Predicted Local Structure for Fold Recognition, Kyong Jin SHIM Conference Proceeding Article
Exploiting intensity inhomogeneity to extract textured objects from natural scenes, Jundi DING, Jialie SHEN, Hwee Hwa PANG, Songcan CHEN, and Jingyu YANG Conference Proceeding Article
IBM power systems and service oriented architecture at Bank of America’s foreign items systems office, Keng SIAU and D. DEWESTER Conference Proceeding Article
Internet Inequality: The Relationship between High School Students' Internet Use in Different Locations and their Internet Self-efficacy, Ling ZHAO, Yaobin LU, Wayne N. HUANG, and QIU-HONG WANG Journal Article
MAP Estimation for Graphical Models by Likelihood Maximization, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
Micro-blogging Sentiment Detection by Collaborative Online Learning, Guangxia LI, Steven C. H. HOI, Kuiyu CHANG, and Ramesh JAIN Conference Proceeding Article
Opportunistic Routing in Wireless Sensor Networks Powered by Ambient Energy Harvesting, Zhi Ang EU, Hwee-Pink TAN, and Winston K. G. SEAH Journal Article
Optimized algorithms for predictive range and KNN queries on moving objects, Rui ZHANG, H.V. JAGADISH, Bing Tian DAI, and Kotagiri RAMAMOHANARAO Journal Article
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains, Shaoying CAI, Chunhua SU, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Reveal User Search Patterns in B2B Marketplace - Towards Optimized Advertising Services, Y. YU, Mei LIN, and Z. LIN Conference Proceeding Article
Revisiting Address Space Randomization, Zhi WANG, Renquan CHENG, and Debin GAO Conference Proceeding Article
Sequence Alignment Based Analysis of Player Behavior in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM and Jaideep SRIVASTAVA Conference Proceeding Article
Special Section: Competitive Strategy, Economics, and Information Systems, E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article
Time cost evaluation for executing RFID authentication protocols, Kevin CHIEW, Yingjiu LI, Tieyan LI, Robert H. DENG, and Manfred AIGNER Conference Proceeding Article
Topical summarization of web videos by visual-text time-dependent alignment, Song TAN, Hung-Khoon TAN, and Chong-wah NGO Conference Proceeding Article
Toward effective concept representation in decision support to improve patient safety, Tze-Yun LEONG Editorial
Bundle Auction Market Design and Implementation, Zhiling GUO Presentation
An Analytic Characterization of Model Minimization in Factored Markov Decision Processes, Guo W. and Tze-Yun LEONG Conference Proceeding Article
ARIVU: Power-Aware Middleware for Multiplayer Mobile Games, Bhojan ANAND, Karthik THIRUGNANAM, Thanh Long LE, Duc-Dung PHAM, Akhihebbal L. ANANDA, Rajesh Krishna BALAN, and Mun Choon CHAN Conference Proceeding Article
ECRA Co-Editors Introduction for Volume 9, Issue 6, November - December 2010, Robert J. KAUFFMAN, P.Y.K. Chau, T.R. Payne, and J.C. Westland Editorial
Efficient mining of multiple partial near-duplicate alignments by temporal network, Hung-Khoon TAN, Chong-wah NGO, and Tat-Seng CHUA Journal Article
Electronic commerce research and applications: ECRA Co-Editors’ Introduction for Volume 9, Issue 6, November–December 2010, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Evolution of a Bluetooth Test Application Product Line: A Case Study, Narayanasamy RAMASUBBU and Rajesh Krishna BALAN Conference Paper
Model checking a model checker: A code contract combined approach, Jun SUN, Yang LIU, and Bin CHENG Conference Proceeding Article
Model checking hierarchical probabilistic systems, Jun SUN, Songzheng SONG, and Yang LIU Conference Proceeding Article
Semi-autonomous virtual valet parking, Arne SUPPE, Luis NAVARRO-SERMENT, and Aaron STEINFELD Conference Proceeding Article
SMU-SIS at TAC 2010 - KBP Track Entity Linking, Swapna GOTTIPATI and Jing JIANG Conference Paper
The impact of social media on software engineering practices and tools, Margaret-Anne STOREY, Christoph TREUDE, Arie VAN DEURSEN, and Li-Te CHENG Conference Proceeding Article
VIREO at TRECVID 2010: Semantic indexing, known-item search, and content-based copy detection, Chong-wah NGO, Shi-Ai ZHU, Hung-Khoon TAN, and Wan-Lei ZHAO Conference Paper
Would Position Limits Have Made any Difference to the 'Flash Crash' on May 6, 2010, Wing Bernard LEE, Shih-Fen CHENG, and Annie KOH Conference Paper
Agent-augmented Co-Space: Toward merging of real world and cyberspace, Ah-hwee TAN and Yilin KANG Conference Proceeding Article
Software engineering: Concepts and applications, Subhajit DATTA Book
Attracting the community's many eyes: An exploration of user involvement in issue tracking, Lars GRAMMEL, Holger SCHACKMANN, Adrian SCHRÖTER, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article
Business network-based value creation in electronic commerce, Robert John KAUFFMAN, Ting Li, and Eric Van Heck Journal Article
Cast2Face: Character identification in movie with actor-character correspondence, Mengdi XU, Xiaotong YUAN, Jialie SHEN, and Shuicheng YAN Conference Proceeding Article
Co-creation and collaboration in a virtual world: A 3D visualization design project in Second Life, Keng SIAU, Fiona Fui-hoon NAH, B. MENNECKE, and S. SCHILLER Journal Article
Context Modeling for Ranking and Tagging Bursty Features in Text Streams, Xin ZHAO, Jing JIANG, Jing HE, Xiaoming LI, Hongfei YAN, and Dongdong Shan Conference Proceeding Article
Data-driven approaches to community-contributed video applications, Xiao WU, Chong-wah NGO, and Wan-Lei ZHAO Journal Article
Detecting Product Review Spammers using Rating Behaviors, Ee Peng LIM, Viet-An NGUYEN, Nitin JINDAL, Bing LIU, and Hady Wirawan LAUW Conference Proceeding Article
Effects of national culture on types of knowledge sharing in virtual communities, Keng SIAU, J. ERICKSON, and Fiona Fui-hoon NAH Journal Article
Finding unusual review patterns using unexpected rules, Nitin JINDAL, Bing LIU, and Ee Peng LIM Conference Proceeding Article
Intelligent Query: Open Another Door to 3D Object Retrieval, Yue GAO, Meng WANG, Jialie SHEN, Qionghai DAI, and Naiyao ZHANG Conference Proceeding Article
Jointly Modeling Aspects and Opinions with a MaxEnt-LDA Hybrid, Xin ZHAO, Jing JIANG, Hongfei YAN, and Xiaoming LI Conference Proceeding Article
Mining collaboration patterns from a large developer network, Didi SURIAN, David LO, and Ee Peng LIM Conference Proceeding Article
Mining interesting link formation rules in social networks, Cane Wing-Ki LEUNG, Ee Peng LIM, David LO, and Jianshu WENG Conference Proceeding Article
Modeling 3D Facial Expressions using Geometry Videos, Jiazhi XIA, Ying HE, Dao T. P. QUYNH, Xiaoming CHEN, and Steven C. H. HOI Conference Proceeding Article
Online Multiple Kernel Learning: Algorithms and Mistake Bounds, Rong JIN, Steven C. H. HOI, and Tianbao YANG Conference Proceeding Article
Rich Internet GeoWeb for Spatial data Infrastructure, Tin Seong KAM Presentation
SecureAngle: Improving wireless security using angle-of-arrival information, Jie XIONG and Kyle JAMIESON Conference Proceeding Article
SecureAngle: Improving wireless security using angle-of-arrival information, Jie XIONG and Kyle JAMIESON Magazine Article
The E-Recall Environment for Cloud based Mobile Rich Media Data Management, Jialie SHEN, Shuicheng YAN, and Xian-Sheng Hua Conference Proceeding Article
Trajectory-based visualization of web video topics, Juan CAO, Chong-wah NGO, Yong-Dong ZHANG, Dong-Ming ZHANG, and Liang MA Conference Proceeding Article
Wireless Sensing without Sensors: An Experimental Study of Motion/Intrusion Detection using RF Irregularity, Wei Qi LEE, Winston K. G. SEAH, Hwee-Pink TAN, and Zexi YAO Journal Article
WSM '10: Proceedings of the 2nd ACM SIGMM Workshop on Social Media, co-located with ACM Multimedia: Firenze, Italy, October 25-29, Susanne BOLL, Steven C. H. HOI, Jiebo LUO, and Roelof VAN ZWOL Edited Conference Proceeding
WSM'10: Second ACM Workshop on Social Media, Susanne BOLL, Steven C. H. HOI, Roelof VAN ZWOL, and Jiebo LUO Conference Proceeding Article
Youth olympic village Co-Space, Zin-Yan CHUA, Yilin KANG, Xing JIANG, Kah-Hoe PANG, Andrew C. GREGORY, Chi-Yun TAN, Wai-Lun WONG, Ah-Hwee TAN, Yew-Soon ONG, and Chunyan MIAO Conference Proceeding Article
Meme selection, variation, and transmission in multi-agent system, Zheng-Xiang PAN, Liang FENG, Yew-Soon ONG, Yilin KANG, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article
Towards a multi-level game model for influenza epidemics, Qiongyu Chen and Tze-Yun LEONG Conference Proceeding Article
A biologically-inspired cognitive agent model integrating declarative knowledge and reinforcement learning, Ah-hwee TAN and Gee-Wah NG Conference Proceeding Article
A Hoare calculus for graph programs, Christopher M. POSKITT and Detlef PLUMP Conference Proceeding Article
An automated approach for finding variable-constant pairing bugs, Julia LAWALL and David LO Conference Proceeding Article
A new framework for RFID privacy, Robert H. DENG, Yingjiu LI, Moti YUNG, and Yunlei ZHAO Conference Proceeding Article
Comprehensive Evaluation of Association Measures for Fault Localization, Lucia LUCIA, David LO, Lingxiao JIANG, and Aditya Budi Conference Proceeding Article
Context-aware query recommendations, Alexandros NTOULAS, Heasoo HWANG, Lise GETOOR, Stelios PAPARIZOS, and Hady Wirawan LAUW Patent
Developing model checkers using PAT, Yang LIU, Jun SUN, and Jin Song DONG Conference Proceeding Article
DIRACT: Agent-based interactive storytelling, Yundong CAI, Zhiqi SHEN, Chunyan MIAO, and Ah-hwee TAN Conference Proceeding Article
Do online reviews reflect a product’s true perceived quality? An investigation of online movie reviews across cultures, Noi Sian KOH, Nan HU, and Eric K. CLEMONS Journal Article
Do online reviews reflect a product’s true perceived quality? An investigation of online movie reviews across cultures, Noi Sian KOH, Nan HU, and Eric K. CLEMONS Journal Article
Editors' introduction to the issue: Electronic commerce research and applications, volume 9, issue 5, September - October 2010, Robert John KAUFFMAN, P.Y.K. Chau, T.R. Payne, J.C. Tsai, and J.C. Westland Journal Article
Editors’ Introduction to the Issue: Electronic Commerce Research and Applications, Volume 9, Issue 5, September–October 2010, Robert J. KAUFFMAN, Patrick Y. K. CHAU, Terry R. Payne, and Juliana Y. TSAI Editorial
Embellishing Text Search Queries to Protect User Privacy, Hwee Hwa PANG, Xuhua DING, and Xiaokui XIAO Conference Proceeding Article
Event study method for validating agent-based trading simulations, Shih-Fen CHENG Conference Proceeding Article
Large Scale Rich Media Information Search: Challenges and Opportunities, Zhiyong CHENG and Jialie SHEN Conference Proceeding Article
Matching dependence-related queries in the system dependence graph., Xiaoyin WANG, David LO, Jiefeng CHENG, Lu ZHANG, Hong MEI, and Jeffrey Xu YU Conference Proceeding Article
On Challenges in Evaluating Malware Clustering, Peng LI, Limin LIU, Debin GAO, and Michael K Reiter Conference Proceeding Article
On Classifying Drifting Concepts in P2P Networks, Hock Hee ANG, Vivekanand Gopalkrishnan, Wee Keong NG, and Steven C. H. HOI Conference Proceeding Article
P2PDocTagger: Content management through automated P2P collaborative tagging, Hock Hee ANG, Vivekanand GOPALKRISHNAN, Wee Keong NG, and Steven C. H. HOI Conference Proceeding Article
Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data, Bing LIANG, Kevin Chiew, Yingjiu LI, and Yanjiang YANG Conference Proceeding Article
Pseudonym-based RFID discovery service to mitigate unauthorized tracking in supply chain management, Qiang YAN, Robert H. DENG, Zheng YAN, Yingjiu LI, and Tieyan LI Conference Proceeding Article