The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2010

PDF

Visualizing and exploring evolving information networks in Wikipedia, Ee Peng LIM, Agus Trisnajaya KWEE, Nelman Lubis IBRAHIM, Aixin SUN, Anwitaman DATTA, Kuiyu CHANG, and Maureen MAUREEN Conference Proceeding Article

PDF

Weakly-Supervised Hashing in Kernel Space, Yadong MU, Jialie SHEN, and Shuicheng YAN Conference Proceeding Article

PDF

Z-SKY: An Efficient Skyline Query Processing Framework Based on Z-Order, Ken C. K. LEE, Wang-chien LEE, Baihua ZHENG, Huajing LI, and Yuan TIAN Journal Article

PDF

A comparative exploration of FreeBSD bug lifetimes, Gargi BOUGIE, Christoph TREUDE, Daniel M. GERMÁN, and Margaret-Anne STOREY Conference Proceeding Article

PDF

A discriminative model approach for accurate duplicate bug report retrieval, Chengnian SUN, David LO, Xiaoyin WANG, and Siau-Cheng KHOO Conference Proceeding Article

Analyzing the Impact of Human Bias on Human-Agent Teams in Resource Allocation, Praveen PARUCHURI, Pradeep Reddy VARAKANTHAM, Katia Sycara, and Paul Scerri Conference Paper

A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks, Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki LEE, Souneil Park, and Junehwa Song Journal Article

PDF

A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks, Seungwoo KANG, Jinwon LEE, Hyukjae JANG, Youngki LEE, Souneil PARK, and Junehwa SONG Journal Article

PDF

Awareness 2.0: Staying aware of projects, developers and tasks using dashboards and feeds, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

Bridging lightweight and heavyweight task organization: The role of tags in adopting new task categories, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

ECRA co-editors introduction for volume 9, issue 3, May, June 2010, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

PDF

Efficient unidirectional proxy re-encryption, Sherman CHOW, Weng JIAN, Yanjiang YANG, and Robert H. DENG Conference Proceeding Article

PDF

Exclusive Lasso for Multi-task Feature Selection, Yang ZHOU, Rong JIN, and Steven C. H. HOI Conference Proceeding Article

PDF

Exploiting query logs for cross-lingual query suggestions., Wei GAO, Cheng NIU, Jian-Yun NIE, Ming ZHOU, Kam-Fai WONG, and Hsiao-Wuen HON Journal Article

PDF

Global Project Management: Pedagogy For Distributed Teams, Benjamin Kok Siew GAN, Randy WEINBERG, and Selma Limam MANSAR Conference Proceeding Article

PDF

Innovative Entrepreneurs Workbook, Arcot Desai NARASIMHALU Book

PDF

Learning user profiles for personalized information dissemination, Ah-hwee TAN and Christine TEO Conference Proceeding Article

Link

LM: A Miner for Scenario-Based Specifications, Tuan Anh DOAN, David LO, Shahar Maoz, and Siau-Cheng KHOO Conference Proceeding Article

PDF

Open innovation in platform competition, Mei LIN Conference Paper

PDF

Point-Based Backup for Decentralized POMPDs: Complexity and New Algorithms, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Structural and informal knowledge acquisition and dissemination in organisational learning: An exploratory analysis, Siu Loon HOE Journal Article

PDF

The role of emergent knowledge structures in collaborative software development, Christoph TREUDE Conference Proceeding Article

PDF

Time-bound Hierarchical Key Assignment: An Overview, Wen Tao ZHU, Robert H. DENG, Jianying Zhou, and Feng Bao Journal Article

PDF

Towards finding robust execution strategies for RCPSP/max with durational uncertainty, Na FU, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article

PDF

Two-view Transductive Support Vector Machines, Guangxia LI, Steven C. H. HOI, and Kuiyu CHANG Conference Proceeding Article

PDF

Understanding the values of mobile technology in education: A value-focused thinking approach, H. SHENG, Keng SIAU, and F. NAH Journal Article

PDF

Web2SE: First workshop on web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN Conference Proceeding Article

A²-MAC: An Adaptive, Anycast MAC protocol for wireless sensor networks, Hwee-Xian TAN and Mun Choon CHAN Conference Proceeding Article

Methods Extends Free Access to Papers and offers Optional Open Access Model: New Services and Opportunities for Authors and Readers, R. Haux, D. Aronsky, Tze Yun LEONG, and A. T. McCray Editorial

PDF

Adaptive Ensemble Classification in P2P Networks, Hock Hee ANG, Vivekanand GOPALKRISHNAN, Steven C. H. HOI, and Wee Keong NG Conference Proceeding Article

PDF

Algorithms for Constrained k-Nearest Neighbor Queries over Moving Object Trajectories, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Qing LI, and Chun CHEN Journal Article

PDF

A social network based study of software team dynamics, Subhajit DATTA, Vikrant S. KAULGOUD, Vibhu Saujanya SHARMA, and Nishant KUMAR Conference Proceeding Article

PDF

A verification system for interval-based specification languages, Chunqing CHEN, Jin Song DONG, Jun SUN, and Andrew P. MARTIN Journal Article

PDF

Continuous Spatial Assignment of Moving Users, Hou U LEONG, Kyriakos MOURATIDIS, and Nikos MAMOULIS Journal Article

Link

Cryptanalysis of a Hierarchical Identity-based Encryption Scheme, Jian WENG, Min-Rong CHEN, Kefei CHEN, and Robert H. DENG Journal Article

PDF

Data Mining Based Predictive Models for Overall Health Indices, Ridhima RAJKUMAR, Kyong Jin SHIM, and Jaideep SRIVASTAVA Report

PDF

Do you trust to get trust? A study of trust reciprocity behaviors and reciprocal trust prediction, Viet-An NGUYEN, Ee Peng LIM, Hwee Hoon TAN, Jing JIANG, and Aixin SUN Conference Proceeding Article

PDF

Efficient skyline maintenance for streaming data with partially-ordered domains, Yuan FANG and Chee-Yong CHAN Conference Proceeding Article

PDF

Finding influentials based on the temporal order of information adoption in twitter, Changhyun LEE, Haewoon KWAK, Hosung PARK, and Sue MOON Conference Proceeding Article

PDF

Generating synonyms based on query log data, Stelios PAPARIZOS, Tao CHENG, and Hady W. LAUW Patent

PDF

Managing media rich geo-spatial annotations for a map-based mobile application using clustering, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Ee Peng LIM, Aixin SUN, Yin-Leng THENG, Thi Nhu Quynh KIM, Kalyani CHATTERJEA, and Chew-Hung CHANG Conference Proceeding Article

PDF

Mashup environments in software engineering, Lars GRAMMEL, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article

PDF

Mining Diversity on Networks, Lu LIU, Feida ZHU, Chen CHEN, Xifeng YAN, Jiawei HAN, Philip YU, and Shiqiang YANG Conference Proceeding Article

PDF

Optimal Matching between Spatial Datasets under Capacity Constraints, Hou U LEONG, Kyriakos MOURATIDIS, Man Lung YIU, and Nikos MAMOULIS Journal Article

PDF

PageSense: Style-wise web page advertising, Lusong LI, Tao MEI, Xiang NIU, and Chong-wah NGO Conference Proceeding Article

PDF

Playing with Recognizers: A Call for an Extensible Editor, Richard C. DAVIS Conference Paper

PDF

Playing with Recognizers: A Call for an Extensible Editor, Richard Christopher DAVIS

PDF

Policy-Driven Distributed and Collaborative Demand Response in Multi-Domain Commercial Buildings, Archan MISRA and Henning SCHULZRINNE Conference Proceeding Article

PDF

Practical ID-based encryption for wireless sensor network, Cheng-Kang CHU, Joseph K. LIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

Shifting inference control to user side: Architecture and protocol, Yanjiang YANG, Yingjiu LI, Robert H. DENG, and Feng BAO Journal Article

PDF

The implications of how we tag software artifacts: Exploring different schemata and metadata for tags, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

What is Twitter, a social network or a news media?, Haewoon KWAK, Changhyun LEE, and Hosung: MOON PARK Conference Proceeding Article

PDF

Model-based methods for linking web service choreography and orchestration, Jun SUN, Yang LIU, Jin Song DONG, Geguang PU, and Tian Huat TAN Conference Proceeding Article

TBIdoc: 3D Content-based CT Image Retrieval System for Traumatic Brain Injury, Shimiao Li, Tianxia Gong, Jie Wang, Ruizhe Liu, Chew Lim Tan, Tze-Yun LEONG, Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang Lee, Qi Tian, and Zhuo Zhang Conference Proceeding Article

PDF

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Jian WENG, Minrong CHEN, Yanjiang YANG, Robert H. DENG, and Kefei CHEN Journal Article

PDF

A Multi-key Pirate Decoder against Traitor Tracing Schemes, Yongdong WU and Robert H. DENG Journal Article

Link

An Exploratory Study of RFID Adoption in the Retail Sector, Mithu BHATTACHARYA, Chao-Hsien CHU, Jack Hayya, and Tracy Mullen Journal Article

PDF

A self-organizing neural architecture integrating desire, intention and reinforcement learning, Ah-hwee TAN, Yu-Hong FENG, and Yew-Soon ONG Journal Article

PDF

Creating an immersive game world with evolutionary fuzzy cognitive maps, Yundong CAI, Ah-hwee TAN, Zhiqi SHEN, and Boyang LI Journal Article

PDF

Differentiating knowledge processes in organisational learning: A case of “two solitudes”, Siu Loon HOE and Steven MCSHANE Journal Article

ECRA co-editors' introduction for volume 9, issue 2, March-April 2010, Robert John KAUFFMAN, P.Y.K. Chau, A. Mann, T.R. Payne, and J.C. Westland Journal Article

PDF

Efficient CCA-Secure PKE from Identity-Based Techniques, Junzuo LAI, Robert H. DENG, Shengli LIU, and Weidong KOU Conference Proceeding Article

PDF

Efficient Verification of Shortest Path Search Via Authenticated Hints, Man Lung YIU, Yimin LIN, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Fuzzy Matching of Web Queries to Structured Data, Tao CHENG, Hady W. LAUW, and Stelios PAPARIZOS Conference Proceeding Article

PDF

Homophily in the Digital World: A LiveJournal Case Study, Hady W. LAUW, John C. SHAFER, Rakesh AGRAWAL, and Alexandros NTOULAS Journal Article

PDF

Information-quality aware routing in event-driven sensor networks, Hwee Xian TAN, Mun-Choon CHAN, Wendong XIAO, Peng-Yong KONG, and Chen-Khong THAM Conference Proceeding Article

IT Project Portfolio Optimization: A Risk Management Approach to Software Development Governance., I. Bardhan, Robert John KAUFFMAN, and S. Naranpanawe Journal Article

PDF

k-Anonymity in the Presence of External Databases, Dimitris SACHARIDIS, Kyriakos MOURATIDIS, and Dimitris Papadias Journal Article

PDF

Local coordination under bounded rationality: Coase meets Simon, finds Hayek, C. Jason WOODARD Working Paper

PDF

MediAlly: A Provenance-Aware Remote Health Monitoring Middleware, Atanu ROY CHOWDHURY, Ben FALCHUK, and Archan MISRA Conference Proceeding Article

Link

Orchestrator: An Active Resource Orchestration Framework for Mobile Context Monitoring in Sensor-rich Mobile Environments, Seungwoo KANG, Youngki LEE, Chulhong MIN, Younghyun JU, Taiwoo PARK, Jinwon LEE, Yunseok RHEE, and Junehwa SONG Conference Proceeding Article

Orchestrator: An Active Resource Orchestration Framework for Mobile Context Monitoring in Sensor-rich Mobile Environments, Seungwoo Kang, Youngki Lee, Chulhong Min, Younghyun Ju, Taiwoo Park, Jinwon Lee, Yunseok Rhee, and Junehwa Song Conference Paper

PDF

Preference Queries in Large Multi-Cost Transportation Networks, Kyriakos MOURATIDIS, Yimin LIN, and Man Lung YIU Conference Proceeding Article

PDF

Probabilistic public key encryption with equality test, Guomin YANG, Chik How TAN, Qiong HUANG, and Duncan S. WONG Conference Proceeding Article

PDF

Symphony: A Platform for Search-Driven Applications, John C. SHAFER, Rakesh AGRAWAL, and Hady W. LAUW Conference Proceeding Article

PDF

Top-K Aggregation Queries over Large Networks, Xifeng Yan, Bin He, Feida ZHU, and Jiawei Han Conference Paper

Methods Extends Free Access to Papers and Offers Optional Open Access Model: New services and opportunities for authors and readers, R. Haux, D. Aronsky, Tze-Yun LEONG, and A. McCray Editorial

Link

Content-based Image Authentification: Current Status, Issues, and Challenges, Shui-Hua HAN and Chao-Hsien CHU Journal Article

PDF

An Analysis of Extreme Price Shocks and Illiquidity among Trend Followers, Bernard LEE, Shih-Fen CHENG, and Annie KOH Conference Paper

An Analysis of Extreme Price Shocks and Illiquidity among Trend Followers, Bernard LEE, Shih-Fen CHENG, and Annie KOH Presentation

Link

Efficient discrete logarithm based multi-signature scheme in the plain public key model, Changshe MA, Jian Weng, Yingjiu LI, and Robert H. DENG Journal Article

PDF

Efficient Valid Scope for Location-Dependent Spatial Queries in Mobile Environments, Ken C. K. LEE, Wang-Chien LEE, Hong Va LEONG, Brandon UNGER, and Baihua ZHENG Journal Article

PDF

Estimating the Quality of Postings in the Real-time Web, Hady W. LAUW, Alexandros NTOULAS, and Krishnaram KENTHAPADI Conference Paper

PDF

Further exploration on relationship between crisp sets and fuzzy sets, Zhaoxia WANG, Quan WANG, Ming BAI, CHEN Zeng-qiang, and Zhen SUN Conference Proceeding Article

PDF

Player Performance Prediction in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM, Richa SHARAN, and Jaideep SRIVASTAVA Report

PDF

Privacy-Preserving Similarity-Based Text Retrieval, Hwee Hwa PANG, Jialie SHEN, and Ramayya Krishnan Journal Article

PDF

Twitterrank: Finding topic-sensitive influential Twitterers, Jianshu WENG, Ee Peng LIM, Jing JIANG, and Qi HE Conference Proceeding Article

War Gaming in Logistics, Ori SASSON Conference Paper

ECRA co-editors' introduction for Vol. 9, Issue 4, July-August 2010, Robert John KAUFFMAN, P.Y.K. Chau, T.R. Payne, and C.J. Westland Journal Article

PDF

A boosting framework for visuality-preserving distance metric learning and its application to medical image retrieval, Yang LIU, Rong JIN, Lily Mummert, Rahul Sukthankar, Adam Goode, Bin ZHENG, Steven C. H. HOI, and Mahadev Satyanarayanan Journal Article

Link

Achieving high security and efficiency in RFID-tagged supply chains, Shaoying CAI, Yingjiu LI, Tieyan LI, Robert H. DENG, and Haixia Yao Journal Article

Link

A Multi-Level Theory Approach to Understanding Price Rigidity in Internet Retailing, Robert J. KAUFFMAN and D. LEE Journal Article

Link

An Adaptive N-Resolution Anti-Collision Algorithm for Rfid Tag Identification, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu LI, and Enrico Winata Conference Paper

PDF

An Empirical Analysis of Mobile Voice Service and SMS: A Structural Model, Youngsoo KIM, Rahul Telang, William B. Vogt, and Ramayya Krishnan Journal Article

Link

An Intrusion Response Decision-Making Model Based on Hierarchical Task Network Planning, Chengpo MU and Yingjiu LI Journal Article

An Investigation of Online Review Manipulation, Nan HU, Ling LIU, and Noi Sian KOH Conference Paper

PDF

Anonymous Query Processing in Road Networks, Kyriakos MOURATIDIS and Man Lung YIU Journal Article

PDF

Applying soft cluster analysis techniques to customer interaction information, Randall E. DURAN, Li ZHANG, and Tom HAYHURST Book Chapter

Are They Valued by the Board?, Nan HU, Ling LIU, and Jianhui HUANG Conference Paper

PDF

A Review of the Professionalization of the Software Industry: Has it Made Software Engineering a Real Profession?, Heng Ngee MOK Journal Article