Submissions from 2009
Bridging Academic and Industry Innovation Networks, Arcot Desai NARASIMHALU Conference Paper
Fair model checking with process counter abstraction, Jun SUN, Yang LIU, Abhik ROYCHOUDHURY, Shanshan LIU, and Jin Song DONG Conference Proceeding Article
Model checking linearizability via refinement, Yang LIU, Wei CHEN, Yanhong A. LIU, and Jun SUN Conference Proceeding Article
Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks, Sharanya ESWARAN, Matthew JOHNSON, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection, Kar Way TAN and Robert H. DENG Conference Proceeding Article
Architectural Dualities in Complex Systems: Components, Interfaces, Technologies and Organizations, C. Jason WOODARD and Joel West Conference Paper
A revisit of generative model for automatic image annotation using markov random fields, Yu XIANG, Xiangdong ZHOU, Tat-Seng CHUA, and Chong-wah NGO Conference Proceeding Article
Buzzspace: Virtual World Based Game for Youth Engagement, Ori SASSON and Shamim Akhtar Conference Paper
Conceptual framework of a dynamic resource allocation test bed and its practical realization with ProModel, I. R. WIOR, Z. J. ZHAO, M. LUO, J. B. ZHANG, S. S. GE, and Hoong Chuin LAU Conference Proceeding Article
Control-theoretic optimization of utility over mission lifetimes in multi-hop wireless networks, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article
Cyber attacks: Cross-country interdependence and enforcement, QIU-HONG WANG and Seung Hyun KIM Conference Proceeding Article
Goldenspear Hls: Wargame for Peacekeeping and Homeland Security, Ori SASSON and Hajindar Singh Conference Paper
Information sharing and strategic signaling in supply chains, Robert J. KAUFFMAN and Hamid MOHTADI Journal Article
Intentional learning agent architecture, Budhitama SUBAGDJA, Liz SONENBERG, and Iyad RAHWAN Journal Article
Interference-aware routing protocol in multi-radio wireless mesh networks, Byoungheon SHIN, Yangwoo KO, Jisun AN, and Dongman LEE Conference Proceeding Article
mFerio: The design and evaluation of a peer-to-peer mobile payment system, Rajesh Krishna BALAN, Narayanasamy RAMASUBBU, Komsit Prakobphol, Nicolas Christin, and Jason Hong Conference Proceeding Article
Non-Redundant Sequential Rules - Theory and Algorithm, David LO, Siau-Cheng KHOO, and Limsoon WONG Journal Article
Nonrigid Shape Recovery by Gaussian Process Regression, Jianke ZHU, Steven C. H. HOI, and Michael R. LIU Conference Proceeding Article
SimpleNPKL: Simple Non-Parametric Kernel Learning, Jinfeng ZHUANG, Ivor TSANG, and Steven C. H. HOI Conference Proceeding Article
The Influence of Online Word-of-Mouth of Long Tail Formation in Online Book Sale: An Empirical Analysis, Qian TANG, Bin GU, and Andrew WHINSTON Presentation
A formal framework for modeling and validating Simulink diagrams, Chunqing CHEN, Jin Song DONG, and Jun SUN Journal Article
An Agent-based Commodity Trading Simulation, Shih-Fen CHENG, Yee Pin LIM, and Chao-Chi LIU Conference Proceeding Article
A Novel Framework for Efficient Automated Singer Identification in Large Music Databases, Jialie SHEN, John Shepherd, Bin CUI, and Kian-Lee TAN Journal Article
Are Online Auction Markets Efficient? An Empirical Study of Market Liquidity and Abnormal Returns., Robert J. KAUFFMAN, Trent J Spaulding, and Charles A. Wood Journal Article
A self-organizing neural network architecture for intentional planning agents, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article
Automatic mining of functionally equivalent code fragments via random testing, Lingxiao JIANG and Zhendong SU Conference Proceeding Article
Classification of Software Behaviors for Failure Detection: A Discriminative Pattern Mining Approach, David LO, Hong CHENG, Jiawei Han, Siau-Cheng KHOO, and Chengnian SUN Conference Proceeding Article
ConcernLines: A timeline view of co-occurring concerns, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article
Constraint-Based Dynamic Programming for Decentralized POMDPs with Structured Interactions, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
Distributed Constraint Optimization with Structured Resource Constraints, Akshat KUMAR, Boi FALTINGS, and Adrian PETCU Conference Proceeding Article
Dynamic Programming Approximations for Partially Observable Stochastic Games, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article
How tagging helps bridge the gap between social and technical aspects in software development, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article
On Mining Rating Dependencies in Online Collaborative Rating Networks, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Predicting outcome for collaborative featured article nomination in Wikipedia, Meiqun HU, Ee Peng LIM, and Ramayya KRISHNAN Conference Paper
Semisupervised SVM batch mode active learning with applications to image retrieval, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Journal Article
Service Innovation Opportunity Identification, Arcot Desai NARASIMHALU Conference Paper
Sharing hierarchical mobile multimedia content using the MobiTOP system, Quang Minh NGUYEN, Thi Nhu Quynh KIM, Dion Hoe-Lian GOH, Ee-peng LIM, Yin-Leng THENG, Kalyani CHATTERJEA, Chew-Hung CHANG, Aixin SUN, and Khasfariyati RAZIKIN Conference Proceeding Article
SS-IDS: Statistical Signature based IDS, Payas GUPTA, Chedy RAISSI, Gerard DRAY, Pascal PONCELET, and Johan BRISSAUD Conference Proceeding Article
The Impact of Process Choice in High Maturity Environments: An Empirical Analysis, Narayanasamy RAMASUBBU and Rajesh Krishna BALAN Conference Proceeding Article
Zeros and ones, M. THULASIDAS Magazine Article
Joint ranking for multilingual web search, Wei GAO, Cheng NIU, Ming ZHOU, and Kam-Fai WONG Conference Proceeding Article
On Technology Innovation: A Community Succession Model for Software Enterprise, Qianhui (Althea) LIANG and W. H. DAI Conference Paper
Achieving better privacy protection in wireless sensor networks using trusted computing, Yanjiang YANG, Robert H. DENG, Jianying ZHOU, and Ying QIU Conference Proceeding Article
An Incremental Threshold Method for Continuous Text Search Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article
Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance, Debin GAO, Michael K. Reiter, and Dawn SONG Journal Article
Describing fuzzy sets using a new concept: Fuzzify functor, Kexin WEI, Zhaoxia WANG, and Quan WANG Journal Article
Efficient Evaluation of Multiple Preference Queries, Hou U LEONG, Nikos MAMAOULIS, and Kyriakos MOURATIDIS Conference Proceeding Article
Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database, Bolin DING, David LO, Jiawei Han, and Siau-Cheng KHOO Conference Proceeding Article
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems, Shaoying CAI, Tieyan LI, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Exploring hierarchically organized georeferenced multimedia annotations in the MobiTOP system, Thi Nhu Quynh KIM, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Yin Leng THENG, Quang Minh NGUYEN, Ee-peng LIM, Aixin SUN, Chew Hung CHANG, and Kalyani CHATTERJEA Conference Proceeding Article
OPAQUE: Protecting Path Privacy in Directions Search, Ken C. K. LEE, Wang-Chien LEE, Hong Va LEONG, and Baihua ZHENG Conference Proceeding Article
Optimal Digital Content Distribution Strategy in the Presence of Consumer-to-Consumer Channel, Yunfang FENG, Zhiling GUO, and Wei-Yu Kevin CHIANG Journal Article
Optimizing service systems based on application-level QoS, Qianhui LIANG, Xindong WU, and Hoong Chuin LAU Journal Article
RSA-based certificateless public key encryption, Junzuo LAI, Robert H. DENG, Shengli LIU, and Weidong KOU Conference Proceeding Article
The Digital Wallet: Opportunities and Prototypes, Rajesh Krishna BALAN and Narayanasamy RAMASUBBU Journal Article
Visible Reverse K-Nearest Neighbor Queries, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Wang-chien LEE, Ken C. K. LEE, and Qing LI Conference Proceeding Article
A social relation aware routing protocol for mobile ad hoc networks, Jisun AN, Yangwoo KO, and Dongman LEE Conference Proceeding Article
Attacks and Improvements to an RFID Mutual Authentication Protocol, Shaoying CAI, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Certificate Revocation Release Policies, Nan HU, Giri Kumar Tayi, Chengyu MA, and Yingjiu LI Journal Article
Continuous Visible Nearest Neighbour Queries, Yunjun GAO, Baihua ZHENG, Wang-Chien LEE, and Gencai CHEN Conference Proceeding Article
Electronic commerce research and applications ECRA co-editors' introduction for volume 8, issue 2, March - April 2009, Robert J. KAUFFMAN, Patrick Y. K. CHAU, Terry R. PAYNE, and J. Christopher WESTLAND Editorial
Fast Object Search on Road Networks, Ken C. K. LEE, Wang-Chien LEE, and Baihua ZHENG Conference Proceeding Article
House of cards, M. THULASIDAS Magazine Article
Parameter Estimation in Semi-Random Decision Tree Ensembling on Streaming Data, Peipei LI, Qianhui (Althea) LIANG, Xindong WU, and X. Hu Conference Proceeding Article
Privacy-preserving Rental Services using One-show Anonymous Credentials, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article
Programmable Presence Virtualization for Next-Generation Context-based Applications, Arup ACHARYA, Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv Dasgupta, Archan MISRA, Shachi SHARMA, Xiping WANG, and Charles P. WRIGHT Conference Proceeding Article
Server-assisted Context-Dependent Pervasive Wellness Monitoring, Archan MISRA, Ben FALCHUK, and Shoshana LOEB Conference Proceeding Article
Visual word proximity and linguistics for semantic video indexing and near-duplicate retrieval, Yu-Gang JIANG and Chong-wah NGO Journal Article
Web query recommendation via sequential query prediction, Qi HE, Daxin JIANG, Zhen LIAO, Steven C. H. HOI, Kuiyu CHANG, Ee Peng LIM, and Hang LI Conference Proceeding Article
PAT: Towards flexible verification under fairness, Jun SUN, Yang LIU, Jin Song DONG, and Jun PANG Conference Proceeding Article
An examination of perceptions of male and female avatars, D. DEWESTER, Fiona Fui-hoon NAH, S. GERVAIS, and Keng SIAU Conference Proceeding Article
BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon LEE, Seungwoo KANG, Youngki LEE, SangJeong LEE, and Junehwa SONG Journal Article
BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon Lee, Seungwoo Kang, Youngki Lee, SangJeong Lee, and Junehwa Song Journal Article
Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks, Jian Weng, Robert H. DENG, Xuhua DING, Cheng-Kang CHU, and Junzuo LAI Conference Proceeding Article
Integrated cognitive architectures: A survey, Hui-Qing CHONG, Ah-hwee TAN, and Gee-Wah NG Journal Article
Learning image‐text associations, Tao JIANG and Ah-hwee TAN Journal Article
Real-time near-duplicate elimination for web video search with content and context, Xiao WU, Chong-wah NGO, and Alexander G. HAUPTMANN Journal Article
Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection, Wan-Lei ZHAO and Chong-wah NGO Journal Article
Stochastic Modeling Western Paintings for Effective Classification, Jialie SHEN Journal Article
A Comprehensive Study for RFID Malwares on Mobile Devices, Qiang Yan, Yingjiu Li, Tieyan Li, and Robert Huijie DENG Conference Paper
Air Indexes for Spatial Databases, Baihua ZHENG Encyclopaedia
An E-Commerce Performance Assessment Model: Its Development and an Initial Test on E-Commerce Applications in the Retail Sector of China, Jinghua HUANG, Ximin JIANG, and Qian TANG Journal Article
An Efficient Online Auditing Approach to Limit Private Data Disclosure, Haibing LU, Yingjiu LI, Jaideep Vaidya, and Vijay Atluri Conference Proceeding Article
An examination of the effects of offshore and outsourced development on the delegation of responsibilities to software components, Subhajit DATTA and Robert VAN ENGELEN Conference Proceeding Article
Are Online Reviews Just Noise? The Truth, the Whole Truth, or Only the Partial Truth?, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper
Better Security Enforcement in Trusted Computing Enabled Heterogeneous Wireless Sensor Networks, Yanjiang YANG, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article
Caching Schemes for DCOP Search Algorithms, William YEOH, Pradeep Reddy VARAKANTHAM, and Sven Koenig Conference Proceeding Article
Chaos and uncertainty, M. THULASIDAS Magazine Article
Comparison-Shopping Channel Selection by Small Online Vendors: An Exploratory Study, Nan HU and Wan Yun Book Chapter
Compositemap: A Novel Music Similarity Measure for Personalized Multimodal Music Search, Bingjun ZHANG, Qiaoliang XIANG, Ye WANG, and Jialie SHEN Conference Proceeding Article
Computing Medoids in Large Spatial Datasets, Kyriakos MOURATIDIS, Dimitris PAPADIAS, and Spiros PAPADIMITRIOU Book Chapter
Continuous Monitoring of Spatial Queries, Kyriakos MOURATIDIS Encyclopaedia
Control-Theoretic, Mission-Driven, Optimization Techniques for Wireless Sensor Networks, Archan MISRA, Sharanya ESWARAN, and Thomas LA PORTA Conference Proceeding Article
Developing a Collaborative Supply Chain Reference Model for a Regional Manufacturing Industry in China, Shui-Hua HAN and Chao-Hsien CHU Journal Article
Distributed Utility-Based Rate Adaptation Protocols for Prioritized, Quasi-Elastic Flows, Sharanya ESWARAN, Matthew P. JOHNSON, Archan MISRA, and Thomas LA PORTA Journal Article
Double Learning or Double Blinding: An Investigation of Vendor Private Information Acquisition and Consumer Learning, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper
Dynamic web service selection for reliable web service composition, San-Yih HWANG, Ee Peng LIM, Chien-Hsiang LEE, and Cheng-Hung CHEN Journal Article
Economics, Information Systems, and Electronic Commerce: Empirical Research, Robert J. KAUFFMAN and Paul P. TALLON Edited Book
ECRA Co-editors' introduction for volume 8, issue 1, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Efficient Valid Scope Computation for Location-Dependent Spatial Queries in Mobile and Wireless Environments, Ken C. K. LEE, Wang-chien LEE, Hong Va LEONG, Brandon UNGER, and Baihua ZHENG Conference Proceeding Article