Submissions from 2011
Mining Closed Discriminative Dyadic Sequential Patterns, David LO, Hong CHENG, and - Lucia Conference Proceeding Article
Modeling link formation behaviors in dynamic social networks, Viet-An NGUYEN, Cane Wing-Ki LEUNG, and Ee Peng LIM Conference Proceeding Article
Multi-objective zone mapping in large-scale distributed virtual environments, Nguyen Binh Duong TA, Suiping ZHOU, Wentong CAI, Xueyan TANG, and Rassul AVANI Journal Article
Secure Mobile Subscription of Sensor-encrypted Data, Cheng-Kang CHU, Wen-Tao ZHU, Sherman S. M. CHOW, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Strongly secure certificateless key exchange without pairing, Guomin YANG and Chik How TAN Conference Proceeding Article
AdNext: A Visit-Pattern-Aware Mobile Advertising System for Urban Commercial Complexes, Byoungjip KIM, Jin-Young HA, SangJeong LEE, Seungwoo KANG, Youngki LEE, Yunseok RHEE, Lama Nachman, and Junehwa SONG Conference Proceeding Article
AdNext: A Visit-Pattern-Aware Mobile Advertising System for Urban Commercial Complexes, Byoungjip Kim, Jin-Young Ha, SangJeong Lee, Seungwoo Kang, Youngki Lee, Yunseok Rhee, Lama Nachman, and Junehwa Song Conference Paper
Artificial cognitive memory - Changing from density driven to functionality driven, Luping SHI, Kaijun YI, Kiruthika RAMANATHAN, Rong ZHAO, Ning NING, Ding DING, and Tow Chong CHONG Journal Article
A Two-View Learning Approach for Image Tag Ranking, Jinfeng ZHUANG and Steven C. H. HOI Conference Proceeding Article
Cryptanalysis of a certificateless signcryption scheme in the standard model, Jian WENG, Guoxiang YAO, Robert H. DENG, Min-Rong CHEN, and Xianxue LI Journal Article
Database access pattern protection without full-shuffles, Xuhua DING, Yanjiang YANG, and Robert H. DENG Journal Article
Distance Metric Learning from Uncertain Side Information for Automated Photo Tagging, Lei WU, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Nenghai YU Journal Article
Evolution of developer collaboration on the Jazz platform: A study of a large scale agile project, Subhajit DATTA, Renuka SINDHGATTA, and Bikram SENGUPTA Conference Proceeding Article
Fraud detection in online consumer reviews, Nan HU, Ling LIU, and Vallabh SAMBAMURTHY Journal Article
Fraud detection in online consumer reviews, Nan HU, Ling LIU, and Vallbh SAMBAMURTHY Journal Article
Manipulation in digital word-of-mouth: A reality check for book reviews, Nan HU, Indranil BOSE, Yunjun GAO, and Ling LIU Journal Article
Mining iterative generators and representative rules for software specification discovery, David LO, Jinyan LI, Limsoon WONG, and Siau-Cheng KHOO Journal Article
Mining Social Images with Distance Metric Learning for Automated Image Tagging, Pengcheng WU, Steven C. H. HOI, Peilin ZHAO, and Ying HE Conference Proceeding Article
PGTP: Power aware game transport protocol for multi-player mobile games, Bhojan ANAND, Jeena SEBASTIAN, Soh Yu MING, Akhihebbal L. ANANDA, Mun Choon CHAN, and Rajesh Krishna BALAN Conference Proceeding Article
Searching patterns for relation extraction over the Web: Rediscovering the pattern-relation duality, Yuan FANG and Kevin Chen-Chuan CHANG Conference Proceeding Article
Active Multiple Kernel Learning for Interactive Intelligent 3D Object Retrieval Systems, Steven HOI and Rong Jin Journal Article
A Framework for Producer-Intermediary Relationships for the Long Tail, Robert John KAUFFMAN, S. Raghu, and M. Sopha Book Chapter
An Effective Approach to Pose Invariant 3D Face Recognition, Dayong WANG, Steven C. H. HOI, and Ying HE Conference Proceeding Article
A Public Procurement Combinatorial Auction Mechanism with Quality Assignment, J. CHEN, H. Huang, and Robert J. Kauffman Journal Article
Are There Contagion Effects in IT and Business Process Outsourcing?, A. MANN, Robert J. Kauffman, K. Han, and B.R. Nault Journal Article
A usability study of a mobile content sharing system, Alton Yeow-Kuan CHUA, Dion Hoe-Lian GOH, Khasfariyati RAZIKIN, and Ee Peng LIM Journal Article
A zero-knowledge based framework for RFID privacy, Robert H. DENG, Yingjiu LI, Moti Yung, and Yunlei ZHAO Journal Article
BeeSpace Navigator: Exploratory Analysis of gene function using semantic indexing of biological literature, Moushumi Sen Sarma, David Arcoleo, Radhika S. Khetani, Brant Chee, Xu Ling, Xin He, Jing JIANG, Qiaozhu MEI, ChengXiang ZHAI, and Bruce Schatz Journal Article
Business modeling with spreadsheets: Problems, principles and practice, Thin Yin LEONG and Michelle L. F. CHEONG Book
Concept-driven multi-modality fusion for video search, Xiao-Yong WEI, Yu-Gang JIANG, and Chong-wah NGO Journal Article
Cryptanalysis of Hsiang-Shih's Authentication Scheme for Multi-Server Architecture, Kuo-Hui Yeh, Nai-Wei Lo, and Yingjiu LI Journal Article
Data Analysis and Monte Carlo Simulation of Airport Check-In Process, Nang Laik MA, Michelle Lee Fong CHEONG, and Junyu CHOY Report
Decommoditization, Resonance Marketing, and Information Technology: An Empirical Study of Air Travel Services amid Channel Conflict, N. F. GRANADOS, Robert J. Kauffman, H. C. Lai, and H. C. Lin Journal Article
Dynamic Innovation in a Two-Sided Platform, Mei LIN, Shaojin LI, and Andrew WHINSTON Conference Paper
ECRA co-editors introduction for volume 10, issue 1, January - February 2011, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
ECRA Co-Editors’ introduction for Volume 10, Issue 1, January–February 2011, Robert J. Kauffman, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Editorial: Special issue on ubiquitous electronic commerce systems, Robert H. DENG, Jari Veijalainen, Shiguo LIAN, and Dimitris Kanellopoulos Editorial
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article
Efficient Topological OLAP on Information Networks, Qiang QU, Feida ZHU, Xifeng YAN, Jiawei HAN, Philip YU, and Hongyan LI Conference Paper
Enhancing Bag-of-Words Models by Efficient Semantics-Preserving Metric Learning, Lei WU and Steven C. H. HOI Journal Article
Fine-tuning algorithm parameters using the design of experiments approach, Aldy GUNAWAN, Hoong Chuin LAU, and Linda Lindawati Conference Proceeding Article
Identity-based strong designated verifier signature revisited, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Journal Article
Improving Service through Just-in-Time Concept in a Dynamic Operational Environment, Kar Way TAN, Hoong Chuin LAU, and Na FU Conference Proceeding Article
Inkjet Printer Pricing, Thin Yin LEONG and Nang Laik MA Journal Article
Innovation and Price Competition in a Two-Sided Market, Mei LIN, Shaojin LI, and Andrew B. Whinston Journal Article
Instance-based parameter tuning via search trajectory similarity clustering, Linda LINDAWATI, Hoong Chuin LAU, and David LO Conference Proceeding Article
Introduction to the Special Section: Economics of Electronic Commerce, E. K. CLEMONS, Robert J. Kauffman, and T. Weber Journal Article
Lightweight Delegated Subset Test with Privacy Protection, Xuhua ZHOU, Xuhua DING, and Kefei CHEN Conference Proceeding Article
Mechanism Design for E- Procurement Auctions: On the Efficacy of Post-Auction Negotiation and Quality Effort Incentives, He HUANG, Robert J. Kauffman, Hongyan XU, and Lan ZHAO Journal Article
Mechanism Design for E-Procurement Auctions: On the Efficacy of Post-Auction Negotiation and Quality Effort Incentives, H. Huang, Robert John Kauffman, H. Xu, and L. Zhao Journal Article
Mining event structures from web videos, Xiao WU, Yi-Jie LU, Qiang PENG, and Chong-wah NGO Journal Article
Modeling bipartite graphs using hierarchical structures, Freddy Chong-Tat CHUA and Ee Peng LIM Conference Proceeding Article
Modeling socialness in dynamic social networks, Tuan Anh HOANG, Ee Peng LIM, Palakorn ACHANANUPARP, Jing JIANG, and Loo-Nin TEOW Conference Proceeding Article
Near-duplicate keyframe retrieval by semi-supervised learning and nonrigid image matching, Jianke ZHU, Steven C. H. HOI, Michael R. LYU, and Shuicheng YAN Journal Article
Privacy Risk Assessment with Bounds Deduced from Bounds, Yingjiu LI and Haibing LU Journal Article
Project Management Spreadsheet Gaming Application, Wee Leong LEE Book Chapter
Randomly Projected KD-Trees with Distance Metric Learning for Image Retrieval, Pengcheng WU, Steven HOI, Duc Dung NGUYEN, and Ying HE Conference Proceeding Article
Returns to Information Technology Outsourcing, K. HAN, Robert J. Kauffman, and B. R. Nault Journal Article
SAUCeR: A QoS-aware slotted-aloha UWB MAC with cooperative retransmissions, Hwee Xian TAN, Mun Choon CHAN, Peng-Yong KONG, and Chen khong THAM Journal Article
Secure Mobile Agents with Controlled Resources, Qi ZHANG, Yi Mu, Minjie ZHANG, and Robert H. DENG Journal Article
Social Media Modeling and Computing, Steven C. H. HOI, Jiebo LUO, Susanne BOLL, Dong XU, Rong JIN, and Irwin KING Edited Book
Solving the quadratic assignment problem by a Hybrid Algorithm, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Conference Proceeding Article
Solving the teacher assignment problem by two Metaheuristics, Aldy GUNAWAN and Kien Ming NG Journal Article
Specification Mining: A Concise Introduction, David LO, Siau-Cheng Khoo, Chao LIU, and Jiawei Han Book Chapter
Starting up the School of Information Systems at Singapore Management University: Critical Success Factors and Questions of Balance, Paul S. GOODMAN and Steven M. MILLER Book Chapter
The effects of heterogeneous information combination on large scale social image search., Zhiyong CHENG, Jing Ren, Jialie SHEN, and Haiyan MIAO Conference Proceeding Article
The Impact of Internet-Based Selling Technology: A Hybrid Growth Theory Perspective with Cross-Model Inference, S. C. HO, Robert J. Kauffman, and T. P. LIANG Journal Article
The Value of IT-Enabled Business Process Standardization from the Real Options Perspective., Q. Dai, Robert John KAUFFMAN, and B. Wang Book Chapter
Toward Service Innovation: An Investigation of the Business Potential of Mobile Video Services in China, Rong CHEN, Zang LI, and Chao-Hsien CHU Journal Article
Trends and controversies: AI, virtual worlds, and massively multiplayer online games, Hsinchun CHEN, Yulei ZHANG, W. S. Bainbridge, Kyong Jin SHIM, N. Pathak, M. A. Ahmad, C. DeLong, Z. Borbora, A. Mahapatra, and J. Srivastava Journal Article
Visualizing and querying semantic social network, Aixin SUN, Anwitaman DATTA, Ee Peng LIM, and Kuiyu CHANG Conference Proceeding Article
What Drives ICT Global Adoption? Analysis and Research Directions, David M. WEBER and Robert J. Kauffman Journal Article
Workshop report from Web2SE 2011: 2nd International Workshop on Web 2.0 for Software Engineering, Christoph TREUDE, Margaret-Anne STOREY, Arie VAN DEURSEN, Andrew BEGEL, and Sue BLACK Journal Article
Would price limits have made any difference to the 'Flash Crash' on May 6, 2010, Wing Bernard LEE, Shih-Fen CHENG, and Annie KOH Journal Article
Submissions from 2010
A Model Driven Approach to Imbalanced Data Sampling in Medical Decision Making, Yin H. and Tze-Yun LEONG Conference Proceeding Article
A Multi-User Steganographic File System on Untrusted Shared Storage, Jin HAN, Meng PAN, Debin GAO, and Hwee Hwa PANG Conference Proceeding Article
A structure first image inpainting approach based on self-organizing map (SOM), Bo CHEN, Zhaoxia WANG, Ming BAI, Quan WANG, and Zhen SUN Conference Proceeding Article
Automobile exhaust gas detection based on fuzzy temperature compensation system, Zhiyong WANG, Hao DING, Fufei HAO, Zhaoxia WANG, Zhen SUN, and Shujin LI Conference Proceeding Article
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings, Jian Weng; Huijie, Robert DENG; Shengli Liu; and Kefei Chen Journal Article
Customer heterogeneity and tariff biases in Cloud computing, Philip KOEHLER, Dan MA, Arun Anandasivam, and Christof Weinhardt Conference Proceeding Article
Dynamic group key exchange revisited, Guomin YANG and Chik How TAN Conference Proceeding Article
Efficient mining of haplotype patterns for linkage disequilibrium mapping, Lin L., Wong L., Tze-Yun LEONG, and Lai P. Journal Article
Enhancing brand equity through flow: Comparison of 2D versus 3D virtual world, Fiona Fui-hoon NAH, Brenda ESCHENBRENNER, and David DEWESTER Journal Article
Evaluation of Protein Backbone Alphabets : Using Predicted Local Structure for Fold Recognition, Kyong Jin SHIM Conference Proceeding Article
Exploiting intensity inhomogeneity to extract textured objects from natural scenes, Jundi DING, Jialie SHEN, Hwee Hwa PANG, Songcan CHEN, and Jingyu YANG Conference Proceeding Article
IBM power systems and service oriented architecture at Bank of America’s foreign items systems office, Keng SIAU and D. DEWESTER Conference Proceeding Article
Internet Inequality: The Relationship between High School Students' Internet Use in Different Locations and their Internet Self-efficacy, Ling ZHAO, Yaobin LU, Wayne N. HUANG, and QIU-HONG WANG Journal Article
MAP Estimation for Graphical Models by Likelihood Maximization, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
Micro-blogging Sentiment Detection by Collaborative Online Learning, Guangxia LI, Steven C. H. HOI, Kuiyu CHANG, and Ramesh JAIN Conference Proceeding Article
Opportunistic Routing in Wireless Sensor Networks Powered by Ambient Energy Harvesting, Zhi Ang EU, Hwee-Pink TAN, and Winston K. G. SEAH Journal Article
Optimized algorithms for predictive range and KNN queries on moving objects, Rui ZHANG, H.V. JAGADISH, Bing Tian DAI, and Kotagiri RAMAMOHANARAO Journal Article
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains, Shaoying CAI, Chunhua SU, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Reveal User Search Patterns in B2B Marketplace - Towards Optimized Advertising Services, Y. YU, Mei LIN, and Z. LIN Conference Proceeding Article
Revisiting Address Space Randomization, Zhi WANG, Renquan CHENG, and Debin GAO Conference Proceeding Article
Sequence Alignment Based Analysis of Player Behavior in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM and Jaideep SRIVASTAVA Conference Proceeding Article
Special Section: Competitive Strategy, Economics, and Information Systems, E.K. Clemons, Robert John KAUFFMAN, and T. Weber Journal Article
Time cost evaluation for executing RFID authentication protocols, Kevin CHIEW, Yingjiu LI, Tieyan LI, Robert H. DENG, and Manfred AIGNER Conference Proceeding Article
Topical summarization of web videos by visual-text time-dependent alignment, Song TAN, Hung-Khoon TAN, and Chong-wah NGO Conference Proceeding Article
Toward effective concept representation in decision support to improve patient safety, Tze-Yun LEONG Editorial
Bundle Auction Market Design and Implementation, Zhiling GUO Presentation