Submissions from 2010
Effective Music Tagging through Advanced Statistical Modeling, Jialie SHEN, Meng WANG, Shuicheng YAN, Hwee Hwa PANG, and Xian-Sheng HUA Conference Proceeding Article
Evaluation of Protein Backbone Alphabets: Using Predicted Local Structure for Fold Recognition, Kyong Jin SHIM Report
Extracting common emotions from blogs based on fine-grained sentiment clustering, Shi FENG, Daling WANG, Ge YU, Wei GAO, and Kam-Fai WONG Journal Article
Faceted topic retrieval of news video using joint topic modeling of visual features and speech transcripts, Kong-Wah WAN, Ah-hwee TAN, Joo-Hwee LIM, and Liang-Tien CHIA Conference Proceeding Article
Generating Templates of Entity Summaries with an Entity-Aspect Model and Pattern Mining, Peng LI, Jing JIANG, and Yinglin WANG Conference Proceeding Article
Hybrid time-frequency domain analysis for inverter-fed induction motor fault detection, T. W. Chua, W. W. Tan, Zhaoxia WANG, and C. S. Chang Conference Proceeding Article
Hybrid time-frequency domain analysis for inverter-fed induction motor fault detection, T. W. CHUA, W. W. TAN, Zhaoxia WANG, and C. S. CHANG Conference Proceeding Article
Learning to rank only using training data from related domain, Wei GAO, Peng CAI, Kam-Fai WONG, and Aoying ZHOU Conference Proceeding Article
Mental development and representation building through motivated learning, Janusz STARZYK, Pawel RAIF, and Ah-hwee TAN Conference Proceeding Article
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption, Junzuo LAI, Wen Tao ZHU, Robert H. DENG, Shengli LIU, and Weidong KOU Journal Article
Non-parametric Kernel Ranking Approach for Social Image Retrieval, Jinfeng ZHUANG and Steven C. H. HOI Conference Proceeding Article
On the sampling of web images for learning visual concept classifiers, Shiai ZHU, Gang WANG, Chong-wah NGO, and Yu-Gang JIANG Conference Proceeding Article
Self-organizing agents for reinforcement learning in virtual worlds, Yilin KANG and Ah-hwee TAN Conference Proceeding Article
Self-organizing neural networks for behavior modeling in games, Shu FENG and Ah-hwee TAN Conference Proceeding Article
Semantics-Preserving Bag-of-Words Models and Applications, Lei WU, Steven C. H. HOI, and Nenghai YU Journal Article
Show Me the Numbers: Visual Analytics for Insights, Tin Seong KAM Presentation
Technology timing and pricing in the presence of an installed base: A study on the industrial organization of information goods industries, QIU-HONG WANG Book
Towards probabilistic memetic algorithm: An initial study on capacitated arc routing problem, Liang FENG, Yew-Soon ONG, Quang Huy NGUYEN, and Ah-hwee TAN Conference Proceeding Article
The Dynamics of the Buzz: How do online reviews change over time?, Youngsoo KIM, Nan Hu, and Noi Sian KOH Presentation
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising, Xuhua DING Conference Proceeding Article
Anytime Planning for Decentralized POMDPs using Expectation Maximization, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
A social transitivity-based data dissemination scheme for opportunistic networks, Jaesung KU, Yangwoo KO, Jisun AN, and Dongman LEE Conference Proceeding Article
Designing the dynamics of service innovations, Arcot Desai Narasimhalu Conference Paper
Do Wikipedians follow domain experts? A domain-specific study on Wikipedia contribution, Yi ZHANG, Aixin SUN, Anwitaman DATTA, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article
Efficient Mutual Nearest Neighbor Query Processing for Moving Object Trajectories, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Qing LI, Chun CHEN, and Gang CHEN Journal Article
Efficient Processing of Exact Top-k Queries over Disk-Resident Sorted Lists, Hwee Hwa PANG, Xuhua DING, and Baihua ZHENG Journal Article
Income, Endogenous Market Structure and Innovation, Mei LIN, Shaojin LI, and Andrew B. Whinston Working Paper
Mining antagonistic communities from social networks, Kuan ZHANG, David LO, and Ee Peng LIM Conference Proceeding Article
On Trustworthiness of CPU Usage Metering and Accounting, Mei LIU and Xuhua DING Conference Proceeding Article
OTL: A framework of Online Transfer Learning, Peilin ZHAO and Steven C. H. HOI Conference Proceeding Article
Player performance prediction in massively multiplayer online role-playing games (MMORPGs), Kyong Jin SHIM, Richa SHARAN, and Jaideep SRIVASTAVA Conference Proceeding Article
Prediction of Protein Subcellular Localization: A Machine Learning Approach, Kyong Jin SHIM Report
Revisiting unpredictability-based RFID privacy models, Junzuo LAI, Robert Huijie DENG, and Yingjiu LI Conference Proceeding Article
Satrap: Data and Network Heterogeneity Aware P2P Data-mining, Hock Kee ANG, Vivekanand Gopalkrishnan, Anwitaman DATTA, Wee Keong NG, and Steven C. H. HOI Conference Proceeding Article
Semantic context modeling with maximal margin conditional random fields for automatic image annotation, Yu XIANG, Xiangdong ZHOU, Zuotao LIU, Tat-Seng CHUA, and Chong-wah NGO Conference Proceeding Article
STEvent: Spatio-Temporal Event Model for Social Network Discovery, Hady W. LAUW, Ee Peng LIM, Hwee Hwa PANG, and Teck-Tim TAN Journal Article
Using Hadoop and Cassandra for taxi data analytics: A feasibility study, Alvin Jun Yong KOH, Xuan Khoa NGUYEN, and C. Jason WOODARD Working Paper
Visualizing and exploring evolving information networks in Wikipedia, Ee Peng LIM, Agus Trisnajaya KWEE, Nelman Lubis IBRAHIM, Aixin SUN, Anwitaman DATTA, Kuiyu CHANG, and Maureen MAUREEN Conference Proceeding Article
Weakly-Supervised Hashing in Kernel Space, Yadong MU, Jialie SHEN, and Shuicheng YAN Conference Proceeding Article
Z-SKY: An Efficient Skyline Query Processing Framework Based on Z-Order, Ken C. K. LEE, Wang-chien LEE, Baihua ZHENG, Huajing LI, and Yuan TIAN Journal Article
A comparative exploration of FreeBSD bug lifetimes, Gargi BOUGIE, Christoph TREUDE, Daniel M. GERMÁN, and Margaret-Anne STOREY Conference Proceeding Article
A discriminative model approach for accurate duplicate bug report retrieval, Chengnian SUN, David LO, Xiaoyin WANG, and Siau-Cheng KHOO Conference Proceeding Article
Analyzing the Impact of Human Bias on Human-Agent Teams in Resource Allocation, Praveen PARUCHURI, Pradeep Reddy VARAKANTHAM, Katia Sycara, and Paul Scerri Conference Paper
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks, Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki LEE, Souneil Park, and Junehwa Song Journal Article
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks, Seungwoo KANG, Jinwon LEE, Hyukjae JANG, Youngki LEE, Souneil PARK, and Junehwa SONG Journal Article
Awareness 2.0: Staying aware of projects, developers and tasks using dashboards and feeds, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article
Bridging lightweight and heavyweight task organization: The role of tags in adopting new task categories, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article
ECRA co-editors introduction for volume 9, issue 3, May, June 2010, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Efficient unidirectional proxy re-encryption, Sherman CHOW, Weng JIAN, Yanjiang YANG, and Robert H. DENG Conference Proceeding Article
Exclusive Lasso for Multi-task Feature Selection, Yang ZHOU, Rong JIN, and Steven C. H. HOI Conference Proceeding Article
Exploiting query logs for cross-lingual query suggestions., Wei GAO, Cheng NIU, Jian-Yun NIE, Ming ZHOU, Kam-Fai WONG, and Hsiao-Wuen HON Journal Article
Global Project Management: Pedagogy For Distributed Teams, Benjamin Kok Siew GAN, Randy WEINBERG, and Selma Limam MANSAR Conference Proceeding Article
Innovative Entrepreneurs Workbook, Arcot Desai NARASIMHALU Book
Learning user profiles for personalized information dissemination, Ah-hwee TAN and Christine TEO Conference Proceeding Article
LM: A Miner for Scenario-Based Specifications, Tuan Anh DOAN, David LO, Shahar Maoz, and Siau-Cheng KHOO Conference Proceeding Article
Open innovation in platform competition, Mei LIN Conference Paper
Point-Based Backup for Decentralized POMPDs: Complexity and New Algorithms, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
Structural and informal knowledge acquisition and dissemination in organisational learning: An exploratory analysis, Siu Loon HOE Journal Article
The role of emergent knowledge structures in collaborative software development, Christoph TREUDE Conference Proceeding Article
Time-bound Hierarchical Key Assignment: An Overview, Wen Tao ZHU, Robert H. DENG, Jianying Zhou, and Feng Bao Journal Article
Towards finding robust execution strategies for RCPSP/max with durational uncertainty, Na FU, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article
Two-view Transductive Support Vector Machines, Guangxia LI, Steven C. H. HOI, and Kuiyu CHANG Conference Proceeding Article
Understanding the values of mobile technology in education: A value-focused thinking approach, H. SHENG, Keng SIAU, and F. NAH Journal Article
Web2SE: First workshop on web 2.0 for software engineering, Christoph TREUDE, Margaret-Anne STOREY, Kate EHRLICH, and Arie VAN DEURSEN Conference Proceeding Article
A²-MAC: An Adaptive, Anycast MAC protocol for wireless sensor networks, Hwee-Xian TAN and Mun Choon CHAN Conference Proceeding Article
Methods Extends Free Access to Papers and offers Optional Open Access Model: New Services and Opportunities for Authors and Readers, R. Haux, D. Aronsky, Tze Yun LEONG, and A. T. McCray Editorial
Adaptive Ensemble Classification in P2P Networks, Hock Hee ANG, Vivekanand GOPALKRISHNAN, Steven C. H. HOI, and Wee Keong NG Conference Proceeding Article
Algorithms for Constrained k-Nearest Neighbor Queries over Moving Object Trajectories, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Qing LI, and Chun CHEN Journal Article
A social network based study of software team dynamics, Subhajit DATTA, Vikrant S. KAULGOUD, Vibhu Saujanya SHARMA, and Nishant KUMAR Conference Proceeding Article
A verification system for interval-based specification languages, Chunqing CHEN, Jin Song DONG, Jun SUN, and Andrew P. MARTIN Journal Article
Continuous Spatial Assignment of Moving Users, Hou U LEONG, Kyriakos MOURATIDIS, and Nikos MAMOULIS Journal Article
Cryptanalysis of a Hierarchical Identity-based Encryption Scheme, Jian WENG, Min-Rong CHEN, Kefei CHEN, and Robert H. DENG Journal Article
Data Mining Based Predictive Models for Overall Health Indices, Ridhima RAJKUMAR, Kyong Jin SHIM, and Jaideep SRIVASTAVA Report
Do you trust to get trust? A study of trust reciprocity behaviors and reciprocal trust prediction, Viet-An NGUYEN, Ee Peng LIM, Hwee Hoon TAN, Jing JIANG, and Aixin SUN Conference Proceeding Article
Efficient skyline maintenance for streaming data with partially-ordered domains, Yuan FANG and Chee-Yong CHAN Conference Proceeding Article
Finding influentials based on the temporal order of information adoption in twitter, Changhyun LEE, Haewoon KWAK, Hosung PARK, and Sue MOON Conference Proceeding Article
Generating synonyms based on query log data, Stelios PAPARIZOS, Tao CHENG, and Hady W. LAUW Patent
Managing media rich geo-spatial annotations for a map-based mobile application using clustering, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Ee Peng LIM, Aixin SUN, Yin-Leng THENG, Thi Nhu Quynh KIM, Kalyani CHATTERJEA, and Chew-Hung CHANG Conference Proceeding Article
Mashup environments in software engineering, Lars GRAMMEL, Christoph TREUDE, and Margaret-Anne STOREY Conference Proceeding Article
Mining Diversity on Networks, Lu LIU, Feida ZHU, Chen CHEN, Xifeng YAN, Jiawei HAN, Philip YU, and Shiqiang YANG Conference Proceeding Article
Optimal Matching between Spatial Datasets under Capacity Constraints, Hou U LEONG, Kyriakos MOURATIDIS, Man Lung YIU, and Nikos MAMOULIS Journal Article
PageSense: Style-wise web page advertising, Lusong LI, Tao MEI, Xiang NIU, and Chong-wah NGO Conference Proceeding Article
Playing with Recognizers: A Call for an Extensible Editor, Richard C. DAVIS Conference Paper
Playing with Recognizers: A Call for an Extensible Editor, Richard Christopher DAVIS
Policy-Driven Distributed and Collaborative Demand Response in Multi-Domain Commercial Buildings, Archan MISRA and Henning SCHULZRINNE Conference Proceeding Article
Practical ID-based encryption for wireless sensor network, Cheng-Kang CHU, Joseph K. LIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Shifting inference control to user side: Architecture and protocol, Yanjiang YANG, Yingjiu LI, Robert H. DENG, and Feng BAO Journal Article
The implications of how we tag software artifacts: Exploring different schemata and metadata for tags, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article
What is Twitter, a social network or a news media?, Haewoon KWAK, Changhyun LEE, and Hosung: MOON PARK Conference Proceeding Article
Model-based methods for linking web service choreography and orchestration, Jun SUN, Yang LIU, Jin Song DONG, Geguang PU, and Tian Huat TAN Conference Proceeding Article
TBIdoc: 3D Content-based CT Image Retrieval System for Traumatic Brain Injury, Shimiao Li, Tianxia Gong, Jie Wang, Ruizhe Liu, Chew Lim Tan, Tze-Yun LEONG, Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang Lee, Qi Tian, and Zhuo Zhang Conference Proceeding Article
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Jian WENG, Minrong CHEN, Yanjiang YANG, Robert H. DENG, and Kefei CHEN Journal Article
A Multi-key Pirate Decoder against Traitor Tracing Schemes, Yongdong WU and Robert H. DENG Journal Article
An Exploratory Study of RFID Adoption in the Retail Sector, Mithu BHATTACHARYA, Chao-Hsien CHU, Jack Hayya, and Tracy Mullen Journal Article
A self-organizing neural architecture integrating desire, intention and reinforcement learning, Ah-hwee TAN, Yu-Hong FENG, and Yew-Soon ONG Journal Article
Creating an immersive game world with evolutionary fuzzy cognitive maps, Yundong CAI, Ah-hwee TAN, Zhiqi SHEN, and Boyang LI Journal Article
Differentiating knowledge processes in organisational learning: A case of “two solitudes”, Siu Loon HOE and Steven MCSHANE Journal Article
ECRA co-editors' introduction for volume 9, issue 2, March-April 2010, Robert John KAUFFMAN, P.Y.K. Chau, A. Mann, T.R. Payne, and J.C. Westland Journal Article
Efficient CCA-Secure PKE from Identity-Based Techniques, Junzuo LAI, Robert H. DENG, Shengli LIU, and Weidong KOU Conference Proceeding Article
Efficient Verification of Shortest Path Search Via Authenticated Hints, Man Lung YIU, Yimin LIN, and Kyriakos MOURATIDIS Conference Proceeding Article