Submissions from 2010
Understanding the values of mobile technology in education: A value-focused thinking approach, H. SHENG, Keng SIAU, and F. NAH Journal Article
Web2SE: First workshop on web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN Conference Proceeding Article
A²-MAC: An Adaptive, Anycast MAC protocol for wireless sensor networks, Hwee-Xian TAN and Mun Choon CHAN Conference Proceeding Article
Methods Extends Free Access to Papers and offers Optional Open Access Model: New Services and Opportunities for Authors and Readers, R. Haux, D. Aronsky, Tze Yun LEONG, and A. T. McCray Editorial
Adaptive Ensemble Classification in P2P Networks, Hock Hee ANG, Vivekanand GOPALKRISHNAN, Steven C. H. HOI, and Wee Keong NG Conference Proceeding Article
Algorithms for Constrained k-Nearest Neighbor Queries over Moving Object Trajectories, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Qing LI, and Chun CHEN Journal Article
A social network based study of software team dynamics, Subhajit DATTA, Vikrant S. KAULGOUD, Vibhu Saujanya SHARMA, and Nishant KUMAR Conference Proceeding Article
A verification system for interval-based specification languages, Chunqing CHEN, Jin Song DONG, Jun SUN, and Andrew P. MARTIN Journal Article
Continuous Spatial Assignment of Moving Users, Hou U LEONG, Kyriakos MOURATIDIS, and Nikos MAMOULIS Journal Article
Cryptanalysis of a Hierarchical Identity-based Encryption Scheme, Jian WENG, Min-Rong CHEN, Kefei CHEN, and Robert H. DENG Journal Article
Data Mining Based Predictive Models for Overall Health Indices, Ridhima RAJKUMAR, Kyong Jin SHIM, and Jaideep SRIVASTAVA Report
Do you trust to get trust? A study of trust reciprocity behaviors and reciprocal trust prediction, Viet-An NGUYEN, Ee Peng LIM, Hwee Hoon TAN, Jing JIANG, and Aixin SUN Conference Proceeding Article
Efficient skyline maintenance for streaming data with partially-ordered domains, Yuan FANG and Chee-Yong CHAN Conference Proceeding Article
Finding influentials based on the temporal order of information adoption in twitter, Changhyun LEE, Haewoon KWAK, Hosung PARK, and Sue MOON Conference Proceeding Article
Generating synonyms based on query log data, Stelios PAPARIZOS, Tao CHENG, and Hady W. LAUW Patent
Managing media rich geo-spatial annotations for a map-based mobile application using clustering, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Ee Peng LIM, Aixin SUN, Yin-Leng THENG, Thi Nhu Quynh KIM, Kalyani CHATTERJEA, and Chew-Hung CHANG Conference Proceeding Article
Mashup environments in software engineering, Lars GRAMMEL, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article
Mining Diversity on Networks, Lu LIU, Feida ZHU, Chen CHEN, Xifeng YAN, Jiawei HAN, Philip YU, and Shiqiang YANG Conference Proceeding Article
Optimal Matching between Spatial Datasets under Capacity Constraints, Hou U LEONG, Kyriakos MOURATIDIS, Man Lung YIU, and Nikos MAMOULIS Journal Article
PageSense: Style-wise web page advertising, Lusong LI, Tao MEI, Xiang NIU, and Chong-wah NGO Conference Proceeding Article
Playing with Recognizers: A Call for an Extensible Editor, Richard C. DAVIS Conference Paper
Playing with Recognizers: A Call for an Extensible Editor, Richard Christopher DAVIS
Policy-Driven Distributed and Collaborative Demand Response in Multi-Domain Commercial Buildings, Archan MISRA and Henning SCHULZRINNE Conference Proceeding Article
Practical ID-based encryption for wireless sensor network, Cheng-Kang CHU, Joseph K. LIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Shifting inference control to user side: Architecture and protocol, Yanjiang YANG, Yingjiu LI, Robert H. DENG, and Feng BAO Journal Article
The implications of how we tag software artifacts: Exploring different schemata and metadata for tags, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article
What is Twitter, a social network or a news media?, Haewoon KWAK, Changhyun LEE, and Hosung: MOON PARK Conference Proceeding Article
Model-based methods for linking web service choreography and orchestration, Jun SUN, Yang LIU, Jin Song DONG, Geguang PU, and Tian Huat TAN Conference Proceeding Article
TBIdoc: 3D Content-based CT Image Retrieval System for Traumatic Brain Injury, Shimiao Li, Tianxia Gong, Jie Wang, Ruizhe Liu, Chew Lim Tan, Tze-Yun LEONG, Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang Lee, Qi Tian, and Zhuo Zhang Conference Proceeding Article
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Jian WENG, Minrong CHEN, Yanjiang YANG, Robert H. DENG, and Kefei CHEN Journal Article
A Multi-key Pirate Decoder against Traitor Tracing Schemes, Yongdong WU and Robert H. DENG Journal Article
An Exploratory Study of RFID Adoption in the Retail Sector, Mithu BHATTACHARYA, Chao-Hsien CHU, Jack Hayya, and Tracy Mullen Journal Article
A self-organizing neural architecture integrating desire, intention and reinforcement learning, Ah-hwee TAN, Yu-Hong FENG, and Yew-Soon ONG Journal Article
Creating an immersive game world with evolutionary fuzzy cognitive maps, Yundong CAI, Ah-hwee TAN, Zhiqi SHEN, and Boyang LI Journal Article
Differentiating knowledge processes in organisational learning: A case of “two solitudes”, Siu Loon HOE and Steven MCSHANE Journal Article
ECRA co-editors' introduction for volume 9, issue 2, March-April 2010, Robert John KAUFFMAN, P.Y.K. Chau, A. Mann, T.R. Payne, and J.C. Westland Journal Article
Efficient CCA-Secure PKE from Identity-Based Techniques, Junzuo LAI, Robert H. DENG, Shengli LIU, and Weidong KOU Conference Proceeding Article
Efficient Verification of Shortest Path Search Via Authenticated Hints, Man Lung YIU, Yimin LIN, and Kyriakos MOURATIDIS Conference Proceeding Article
Fuzzy Matching of Web Queries to Structured Data, Tao CHENG, Hady W. LAUW, and Stelios PAPARIZOS Conference Proceeding Article
Homophily in the Digital World: A LiveJournal Case Study, Hady W. LAUW, John C. SHAFER, Rakesh AGRAWAL, and Alexandros NTOULAS Journal Article
Information-quality aware routing in event-driven sensor networks, Hwee Xian TAN, Mun-Choon CHAN, Wendong XIAO, Peng-Yong KONG, and Chen-Khong THAM Conference Proceeding Article
IT Project Portfolio Optimization: A Risk Management Approach to Software Development Governance., I. Bardhan, Robert John KAUFFMAN, and S. Naranpanawe Journal Article
k-Anonymity in the Presence of External Databases, Dimitris SACHARIDIS, Kyriakos MOURATIDIS, and Dimitris Papadias Journal Article
Local coordination under bounded rationality: Coase meets Simon, finds Hayek, C. Jason WOODARD Working Paper
MediAlly: A Provenance-Aware Remote Health Monitoring Middleware, Atanu ROY CHOWDHURY, Ben FALCHUK, and Archan MISRA Conference Proceeding Article
Orchestrator: An Active Resource Orchestration Framework for Mobile Context Monitoring in Sensor-rich Mobile Environments, Seungwoo KANG, Youngki LEE, Chulhong MIN, Younghyun JU, Taiwoo PARK, Jinwon LEE, Yunseok RHEE, and Junehwa SONG Conference Proceeding Article
Orchestrator: An Active Resource Orchestration Framework for Mobile Context Monitoring in Sensor-rich Mobile Environments, Seungwoo Kang, Youngki Lee, Chulhong Min, Younghyun Ju, Taiwoo Park, Jinwon Lee, Yunseok Rhee, and Junehwa Song Conference Paper
Preference Queries in Large Multi-Cost Transportation Networks, Kyriakos MOURATIDIS, Yimin LIN, and Man Lung YIU Conference Proceeding Article
Probabilistic public key encryption with equality test, Guomin YANG, Chik How TAN, Qiong HUANG, and Duncan S. WONG Conference Proceeding Article
Symphony: A Platform for Search-Driven Applications, John C. SHAFER, Rakesh AGRAWAL, and Hady W. LAUW Conference Proceeding Article
Top-K Aggregation Queries over Large Networks, Xifeng Yan, Bin He, Feida ZHU, and Jiawei Han Conference Paper
Methods Extends Free Access to Papers and Offers Optional Open Access Model: New services and opportunities for authors and readers, R. Haux, D. Aronsky, Tze-Yun LEONG, and A. McCray Editorial
Content-based Image Authentification: Current Status, Issues, and Challenges, Shui-Hua HAN and Chao-Hsien CHU Journal Article
An Analysis of Extreme Price Shocks and Illiquidity among Trend Followers, Bernard LEE, Shih-Fen CHENG, and Annie KOH Conference Paper
An Analysis of Extreme Price Shocks and Illiquidity among Trend Followers, Bernard LEE, Shih-Fen CHENG, and Annie KOH Presentation
Efficient discrete logarithm based multi-signature scheme in the plain public key model, Changshe MA, Jian Weng, Yingjiu LI, and Robert H. DENG Journal Article
Efficient Valid Scope for Location-Dependent Spatial Queries in Mobile Environments, Ken C. K. LEE, Wang-Chien LEE, Hong Va LEONG, Brandon UNGER, and Baihua ZHENG Journal Article
Estimating the Quality of Postings in the Real-time Web, Hady W. LAUW, Alexandros NTOULAS, and Krishnaram KENTHAPADI Conference Paper
Further exploration on relationship between crisp sets and fuzzy sets, Zhaoxia WANG, Quan WANG, Ming BAI, CHEN Zeng-qiang, and Zhen SUN Conference Proceeding Article
Player Performance Prediction in Massively Multiplayer Online Role-Playing Games (MMORPGs), Kyong Jin SHIM, Richa SHARAN, and Jaideep SRIVASTAVA Report
Privacy-Preserving Similarity-Based Text Retrieval, Hwee Hwa PANG, Jialie SHEN, and Ramayya Krishnan Journal Article
Twitterrank: Finding topic-sensitive influential Twitterers, Jianshu WENG, Ee Peng LIM, Jing JIANG, and Qi HE Conference Proceeding Article
War Gaming in Logistics, Ori SASSON Conference Paper
ECRA co-editors' introduction for Vol. 9, Issue 4, July-August 2010, Robert John KAUFFMAN, P.Y.K. Chau, T.R. Payne, and C.J. Westland Journal Article
A boosting framework for visuality-preserving distance metric learning and its application to medical image retrieval, Yang LIU, Rong JIN, Lily Mummert, Rahul Sukthankar, Adam Goode, Bin ZHENG, Steven C. H. HOI, and Mahadev Satyanarayanan Journal Article
Achieving high security and efficiency in RFID-tagged supply chains, Shaoying CAI, Yingjiu LI, Tieyan LI, Robert H. DENG, and Haixia Yao Journal Article
A Multi-Level Theory Approach to Understanding Price Rigidity in Internet Retailing, Robert J. KAUFFMAN and D. LEE Journal Article
An Adaptive N-Resolution Anti-Collision Algorithm for Rfid Tag Identification, Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu LI, and Enrico Winata Conference Paper
An Empirical Analysis of Mobile Voice Service and SMS: A Structural Model, Youngsoo KIM, Rahul Telang, William B. Vogt, and Ramayya Krishnan Journal Article
An Intrusion Response Decision-Making Model Based on Hierarchical Task Network Planning, Chengpo MU and Yingjiu LI Journal Article
An Investigation of Online Review Manipulation, Nan HU, Ling LIU, and Noi Sian KOH Conference Paper
Anonymous Query Processing in Road Networks, Kyriakos MOURATIDIS and Man Lung YIU Journal Article
Applying soft cluster analysis techniques to customer interaction information, Randall E. DURAN, Li ZHANG, and Tom HAYHURST Book Chapter
Are They Valued by the Board?, Nan HU, Ling LIU, and Jianhui HUANG Conference Paper
A Review of the Professionalization of the Software Industry: Has it Made Software Engineering a Real Profession?, Heng Ngee MOK Journal Article
Countervailing Forces and Effects of Process Standardization, Robert J. KAUFFMAN and Juliana Y. TSAI Journal Article
CRCTOL: A semantic based domain ontology learning system, Xing JIANG and Ah-hwee TAN Journal Article
Does Co-opetition Change the Game? A Bayesian Analysis of Participation Strategy in an Industry Standard-Setting Organization, Robert J. KAUFFMAN, Benjamin B. M. SHAO, and Juliana Y. TSAI Conference Proceeding Article
Do online reviews reflect a product's true perceived quality? An investigation of online movie reviews across cultures, Noi Sian KOH, Nan Hu, and Eric K. Clemons Conference Proceeding Article
Dual Phase Learning for Large Scale Video Gait Recognition, Jialie SHEN, Hwee Hwa PANG, Dacheng TAO, and Xuelong LI Conference Proceeding Article
ECRA co-editors' introduction for volume 9, issue 1, January-February 2010, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Incentive Mechanisms, Fairness and Participation in Group-Buying Auctions, Robert J. KAUFFMAN, Hsiangchu LAI, and Chao-Tsung HO Journal Article
InfoNetOLAP: OLAP and Mining of Information Networks, CHEN CHEN, Feida ZHU, Xifeng YAN, Jiawei HAN, Yu Philip S., and Raghu Ramacrishnan Book Chapter
Information integration for graph databases, Ee Peng LIM, Aixin SUN, Anwitaman DATTA, and CHANG KUIYU Book Chapter
Information Technology Diffusion with Influentials, Imitators, and Opponents: Model and Preliminary Evidence, Hasan Cavusoglu, Nan HU, Yingjiu LI, and Dan MA Journal Article
Information Transparency in Business-to-Consumer Markets: Concepts, Framework and Research Agenda., N. F. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article
Introducing Communication in Dis-POMDPs with Locality of Interaction, Makoto TASAKI, Yuichi Yabu, Yuki Iwanari, Makoto Yokoo, Janusz Marecki, Pradeep Reddy VARAKANTHAM, and Milind Tambe Journal Article
Introduction to the Special Issue: Information Systems in Services, Indranil B. BARDHAN, Haluk Demirkan, P. K. Kannan, and Robert J. Kauffman Journal Article
Introduction to the Special Section: Service Science in Electronic Commerce, Indranil B. BARDHAN, Haluk Demirkan, P. K. Kannan, and Robert J. Kauffman Journal Article
Keep it simple with time: A reexamination of probabilistic topic detection models, Qi HE, Kuiyu CHANG, Ee Peng LIM, and Arindam Banerjee Journal Article
Modeling Anticipatory Event Transitions, He QI, Kuiyu CHANG, and Ee Peng LIM Book Chapter
Motivated learning as an extension of reinforcement learning, Janusz STARZYK, Pawel RAIF, and Ah-hwee TAN Conference Proceeding Article
Multipath Virtual Sink Architecture for Underwater Sensor Networks, Winston K. G. SEAH, Hwee-Pink TAN, and Pius W. Q. LEE Book Chapter
New Theoretical Perspectives on Technology Adoption, Robert J. KAUFFMAN and A. Techatassanasoontorn Journal Article
On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones, Qiang YAN, Robert H. DENG, Yingjiu LI, and Tieyan LI Journal Article
Operational risk in trading platforms, M. THULASIDAS Magazine Article
Periodic Resource Reallocation in Two-Echelon Repairable Item Inventory Systems, Hoong Chuin LAU, Jie Pan, and Huawei SONG Journal Article
Redefining Medical Tourism, Arcot Desai NARASIMHALU Book Chapter
Regulatory Policies for Demand-Driven Innovation by Heterogeneous Firms, Mei LIN, Shaojin LI, and Andrew WHINSTON Conference Paper
Remote Attestation on Function Execution, Liang GU, Yueqiang CHENG, Xuhua DING, Robert H. DENG, Yao GUO, and Weizhong SHAO Conference Proceeding Article