Submissions from 2012
Multiview semi-supervised learning with consensus, Guangxia LI, Kuiyu CHANG, and Steven C. H. HOI Journal Article
Poster Abstract: Towards crowd-aware sensing platform for metropolitan environments, Saumay PUSHP, Chulhong MIN, Youngki LEE, Chi Harold LIU, and Junehwa SONG Conference Proceeding Article
Predicting domain adaptivity: Redo or recycle?, Ting YAO, Chong-wah NGO, and Shiai ZHU Conference Proceeding Article
Science and Technology Parks as an Open Innovation catalyst for Valorization, Arcot Desai NARASIMHALU Conference Paper
Searching Connected API Subgraph via Text Phrases, Wing-Kwan CHAN, Hong CHENG, and David LO Conference Proceeding Article
Snap-and-ask: Answering multimodal question by naming visual instance, Wei ZHANG, Lei PANG, and Chong-wah NGO Conference Proceeding Article
(Strong) multidesignated verifiers signatures secure against rogue key attack, Yunmei ZHANG, Man Ho AU, Guomin YANG, and Willy SUSILO Conference Proceeding Article
SymPhoney: A Coordinated Sensing Flow Execution Engine for Concurrent Mobile Sensing Applications, Younghyun JU, Youngki LEE, Jihyun YU, Chulhong MIN, Insik SHIN, and Junehwa SONG Conference Proceeding Article
SymPhoney: A Coordinated Sensing Flow Execution Engine for Concurrent Mobile Sensing Applications, Younghyun Ju, Youngki Lee, Jihyun Yu, Chulhong Min, Insik Shin, and Junehwa Song Conference Paper
Tournament-based Teaching, Shannon Christopher BOESCH and Sandra BOESCH Conference Proceeding Article
US Presidential election 2012 prediction using census corrected Twitter model, Junyu CHOY, Michelle L. F. CHEONG, Nang Laik MA, and Ping Shung KOO Report
Video hyperlinking: Libraries and tools for threading and visualizing large video collection, Lei PANG, Wei ZHANG, Hung-Khoon TAN, and Chong-wah NGO Conference Proceeding Article
VIREO@TRECVID 2012: Searching with topology, recounting will small concepts, learning with free examples, Wei ZHANG, Chun-Chet TAN, Shi-Ai ZHU, Ting YAO, Lei PANG, and Chong-Wah NGO Conference Paper
QoS-aware revenue-cost optimization for latency-sensitive services in IaaS clouds, Nguyen Binh Duong TA, Xiaorong LI, Rick Siow Mong GOH, Xueyan TANG, and Wentong CAI Conference Proceeding Article
MedInfo2013: Join the International Biomedical and Health Informatics Community in Copenhagen., Aronsky D. and Tze-Yun LEONG Editorial
Bootstrapping Monte Carlo tree search with an imperfect heuristic, Nguyen T., Lee W., and Tze-Yun LEONG Conference Proceeding Article
Improved spin images for 3D surface matching using signed angles, Zhiyuan ZHANG, Sim Heng ONG, and Kelvin FOONG Conference Proceeding Article
A feasibility study of crowdsourcing and Google street view to determine sidewalk accessibility, Kotaro HARA, Victoria LE, and Jon FROEHLICH Conference Proceeding Article
A flexible mixed integer programming framework for nurse scheduling, Murphy CHOY and Michelle L. F. CHEONG Working Paper
A Generic Approach for Providing Revocation Support in Secret Handshake, Yanjiang YANG, Haibing LU, Jian WENG, Xuhua DING, and Jianying ZHOU Conference Proceeding Article
A Probabilistic Graphical Model for Topic and Preference Discovery on Social Media, Lu LIU, Feida ZHU, Lei ZHANG, and Shiqiang YANG Journal Article
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams, Zhuo WEI, Yongdong Wu, Xuhua DING, and Robert H. DENG Journal Article
Automatic defect categorization, Ferdian THUNG, David LO, and Lingxiao JIANG Conference Proceeding Article
Content Contribution for Revenue Sharing and Reputation: A Dynamic Structural Model, Qian TANG, Bin GU, and Andrew B. Whinston Journal Article
Credit card program value maximization with promotion density for product discounts in shopping malls, Rae M. CHANG, Robert John KAUFFMAN, and Kwansoo KIM Conference Paper
Eating alone, together: New forms of commensality, Catherine GREVET, Anthony TANG, and Elizabeth MYNATT Conference Proceeding Article
Entity Synonyms for Structured Web Search, Tao CHENG, Hady W. LAUW, and Stelios PAPARIZOS Journal Article
Handling interpretation and representation in multilingual research: A meta-study of pragmatic issues resulting from the use of multiple languages in a qualitative Information Systems research work, Ilse BAUMGARTNER Journal Article
Influentials, novelty, and social contagion: The viral power of average friends, close communities, and old news, Nicholas HARRIGAN, Palakorn ACHANANUPARP, and Ee Peng LIM Journal Article
Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction, Yuan TIAN, David LO, and Chengnian SUN Conference Proceeding Article
Knowledge Discovery from Multi-sources Healthcare Informatics, Tin Seong KAM, Juhi SHARMA, Michael Tack Keong WONG, and Asokan LAVANYA Conference Paper
Model checking software architecture design, Jiexin ZHANG, Yang LIU, Jing SUN, Jin Song DONG, and Jun SUN Conference Proceeding Article
Multimedia Recommendation, Jialie SHEN, Meng WANG, Shuicheng YAN, and Peng CUI Presentation
Neural modeling of episodic memory: Encoding, retrieval, and forgetting, Wenwen WANG, Budhitama SUBAGDJA, Ah-hwee TAN, and Janusz A. STARZYK Journal Article
OTO: Online Trust Oracle for User-Centric Trust Establishment, Tiffany Hyun-Jin KIM, Payas GUPTA, Jun HAN, Emmanuel Owusu, Jason Hong, Adrian Perrig, and Debin GAO Conference Proceeding Article
Self-regulating action exploration in reinforcement learning, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article
Sensor OpenFlow: Enabling Software-Defined Wireless Sensor Networks, Tie LUO, Hwee-Pink TAN, and Tony Q. S. QUEK Journal Article
Talk versus work: Characteristics of developer collaboration on the Jazz platform, Subhajit DATTA, Renuka SINDHGATTA, and Bikram SENGUPTA Conference Proceeding Article
The shanghai-hongkong team at mediaeval2012: Violent scene detection using trajectory-based features, Yu-Gang JIANG, Qi DAI, Chun Chet TAN, Xiangyang XUE, and Chong-wah NGO Conference Paper
Trajectory-based modeling of human actions with motion reference points, Yu-Gang JIANG, Qi DAI, Xiangyang XUE, Wei LIU, and Chong-wah NGO Conference Proceeding Article
Understanding engagement in educational computer games, Fiona Fui-hoon NAH, Yunjie ZHOU, Adeline BOEY, and Hanji LI Conference Proceeding Article
Social Media Analytics: Discovering insights from a connected world, Tin Seong KAM Presentation
Predicting common web application vulnerabilities from input validation and sanitization code patterns, Lwin Khin SHAR and Hee Beng Kuan TAN Conference Proceeding Article
A Computational Analysis of Bundle Trading Markets Design for Distributed Resource Allocation, Zhiling GUO, Gary J. KOEHLER, and Andrew B. WHINSTON Journal Article
Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks, Sharanya ESWARAN, James EDWARDS, Archan MISRA, and Thomas LA PORTA Journal Article
Automatic classification of software related microblogs, Philips Kokoh PRASETYO, David LO, Achananuparp PALAKORN, Yuan TIAN, and Ee Peng LIM Conference Proceeding Article
BDUOL: Double Updating Online Learning on a Fixed Budget, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article
Combining Multiple Sensor Features For Stress Detection using Combinatorial Fusion, Yong DENG, D. F. HSU, Z. Wu, and Chao-Hsien CHU Journal Article
Detecting Similar Applications with Collaborative Tagging, Ferdian THUNG, David LO, and Lingxiao JIANG Conference Proceeding Article
Diversity maximization speedup for fault localization, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article
Diversity Maximization Speedup for Fault Localization, Liang Gong, David LO, Lingxiao JIANG, and Hongyu Zhang Conference Paper
Duplicate Bug Report Detection with a Combination of Information Retrieval and Topic Modeling, Anh Tuan NGUYEN, Tung NGUYEN, Tien NGUYEN, David LO, and Chengnian SUN Conference Proceeding Article
Ensuring Flexible Process Compliance with Semantic Constraints using Mixed-Integer Programming, Akhil KUMAR, Wen YAO, and Chao-Hsien CHU Journal Article
Extending a mobile device's interaction space through body-centric interaction, Xiang CHEN, Nicolai MARQUARDT, Anthony TANG, Sebastian BORING, and Saul GREENBERG Conference Proceeding Article
Guest editors’ introduction: Methods innovations for the empirical study of technology adoption and diffusion, Robert John KAUFFMAN and Angsana A. TECHATASSANASOONTORN Transcript
Guest editors’ introduction: Poverty, technology, microfinance and development, Robert J. KAUFFMAN and Frederick J. Riggins Editorial
Inferring Semantically Related Software Terms and their Taxonomy by Leveraging Collaborative Tagging, Shaowei WANG, David LO, and Lingxiao JIANG Conference Proceeding Article
Information and Communication Technology, and the Sustainability of Microfinance, Robert J. KAUFFMAN and Frederick J. Riggins Journal Article
In-game action list segmentation and labeling in real-time strategy games, Wei GONG, Ee-Peng LIM, Palakorn ACHANANUPARP, Feida ZHU, David LO, and Freddy Chong-Tat CHUA Conference Proceeding Article
In Search of Efficient Flexibility: Effects of Software Component Granularity on Development Effort, Defects, and Customization Effort, Ramanath SUBRAMANYAM, Narayanasamy RAMASUBBU, and M. S. Krishnan Journal Article
Interactive fault localization leveraging simple user feedback, Liang GONG, David LO, Lingxiao JIANG, and Hongyu ZHANG Conference Proceeding Article
kbe-Anonymity: Test Data Anonymization for Evolving Programs, - Lucia, David LO, Lingxiao JIANG, and Aditya Budi Conference Paper
kbe-anonymity: Test data anonymization for evolving programs, Lucia LUCIA, David LO, Lingxiao JIANG, and Aditya BUDI Conference Proceeding Article
Learning Fine-Grained Structured Input for Memory Corruption Detection, Lei ZHAO, Debin GAO, and Lina WANG Conference Proceeding Article
No tradeoff between confidentiality and performance: An analysis on H.264/SVC partial encryption, Zhuo WEI, Xuhua DING, Robert H. DENG, and Yongdong WU Conference Proceeding Article
Observatory of trends in software related microblogs, Achananuparp PALAKORN, Nelman Lubis IBRAHIM, Yuan TIAN, David LO, and Ee Peng LIM Conference Proceeding Article
Reputation as Public Policy for Internet Security, Leigh L. Linden, John S. Quarterman, Qian TANG, and Andrew B. Whinston Conference Proceeding Article
Scalable content authentication in H.264/SVC videos using perceptual hashing based on Dempster-Shafer theory, Dengpan YE, Zhuo Wei, Xuhua DING, and Robert H. DENG Journal Article
Semantic Patch Inference, Jesper ABDERSEN, Anh Cuong NGUYEN, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Proceeding Article
Semantic Patch Inference, Jesper Andersen, Anh Cuong Nguyen, David LO, Julia Lawall, and Siau-Cheng KHOO Conference Paper
The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Nicolai MARQUARDT, Anthony TANG, and Saul GREENBERG Conference Proceeding Article
The fat thumb: Using the thumb's contact size for single-handed mobile interaction, Sebastian BORING, David LEDO, Xiang ‘Anthony’ CHEN, Anthony TANG, Anthony TANG, and Saul GREENBERG Conference Paper
To What Extent Could We Detect Field Defects? —An Empirical Study of False Negatives in Static Bug Finding Tools, Ferdian Thung, - Lucia, David LO, Lingxiao JIANG, Premkumar Devanbu, and Foyzur Rahman Conference Paper
To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools, Ferdian THUNG, Lucia Lucia, David LO, Lingxiao JIANG, Premkumar DEVANBU, and Foyzur RAHMAN Conference Proceeding Article
Verification of graph programs, Christopher M. POSKITT Conference Proceeding Article
Verifying total correctness of graph programs, Christopher M. POSKITT and Detlef PLUMP Conference Proceeding Article
What's Public Feedback? Linking High Quality Feedback to Social Issues using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Proceeding Article
What's Public Feedback? Linking High Quality Feedback to Social Issues Using Social Media, Swapna GOTTIPATI and Jing JIANG Conference Paper
When would this bug get reported?, Ferdian THUNG, David LO, Lingxiao JIANG, Lucia Lucia, Foyzur Rahman, and Premkumar Devanbu Conference Proceeding Article
Auditing the XSS defence features implemented in web application programs, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article
Defeating SQL injection, Lwin Khin SHAR and Hee Beng Kuan TAN Journal Article
Niche-Seeking in Influence Maximization with Adversary, Long Foong LIOW, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article
A Context-aware Reminder System for Elders Based on Fuzzy Linguistic Approach, Shandan ZHOU, Chao-Hsien CHU, Zhiwen YU, and Jungyoon KIM Journal Article
Adapting Video Delivery Based on Motion Triggered Visual Attention, Hari KALVA, V. Adzic, and Lai-Tee Cheok Conference Paper
Adaptive Display Power Management for OLED Displays, Kiat Wee TAN and Rajesh Krishna BALAN Conference Proceeding Article
A non-parametric visual-sense model of images: Extending the cluster hypothesis beyond text, Kong-Wah WAN, Ah-hwee TAN, Joo-Hwee LIM, and Liang-Tien CHIA Journal Article
A secure and efficient discovery service system in EPCglobal network, Jie SHI, Yingjiu LI, and Robert H. DENG Journal Article
Automatic compositional verification of timed systems, Shang-Wei LIN, Yang LIU, Jun SUN, Jin Song DONG, and Étienne ANDRÉ Conference Proceeding Article
Bidder behaviors in repeated B2B procurement auctions, Jong Han PARK, Jae Kyu LEE, and Hoong Chuin LAU Conference Proceeding Article
Boosting multi-kernel Locality-Sensitive Hashing for scalable image retrieval, Hao XIA, Steven C. H. HOI, Pengcheng WU, and Rong JIN Conference Proceeding Article
Collective churn prediction in social network, Richard J. OENTARYO, Ee-peng LIM, David LO, Feida ZHU, and Philips K. PRASETYO Conference Proceeding Article
Confidence-aware graph regularization with heterogeneous pairwise features, Yuan FANG, Bo-June Paul HSU, and Kevin Chen-Chuan CHANG Conference Proceeding Article
Consumer Micro-behavior and TV Viewership Patterns: Data Analytics for the Two-way Set-top box, Ray M. CHANG, Robert J. KAUFFMAN, and Insoo SON Conference Proceeding Article
Control-theoretic Utility Maximization in Multihop Wireless Networks under Mission Dynamics, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Journal Article
Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper
Design Capital and Design Moves in Digital Architectures, C. Jason WOODARD, Narayan RAMASUBBU, F. Ted TSCHANG, and V. SAMBAMURTHY Conference Paper
Dynamic Stochastic Orienteering Problems for Risk-Aware Applications, Hoong Chuin LAU, William YEOH, Pradeep VARAKANTHAM, and Duc Thien NGUYEN Conference Proceeding Article
Follow Link Seeking Strategy: A pattern based approach, Agus Trisnajaya KWEE, Ee Peng LIM, Achananuparp PALAKORN, and Feida ZHU Conference Proceeding Article
Framing core and advanced competencies for undergraduate Information Systems program courses: does the nature, level, complexity and audience of a course matter?, Ilse BAUMGARTNER and Venky SHANKARAMAN Conference Proceeding Article
From Clickstreams to Searchstreams: Search Network Graph Evidence from a B2B E-Market, Mei LIN, M. F. LIN, and Robert J. KAUFFMAN Conference Proceeding Article