The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2009

PDF

Automatic mining of functionally equivalent code fragments via random testing, Lingxiao JIANG and Zhendong SU Conference Proceeding Article

PDF

Classification of Software Behaviors for Failure Detection: A Discriminative Pattern Mining Approach, David LO, Hong CHENG, Jiawei Han, Siau-Cheng KHOO, and Chengnian SUN Conference Proceeding Article

PDF

ConcernLines: A timeline view of co-occurring concerns, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

Constraint-Based Dynamic Programming for Decentralized POMDPs with Structured Interactions, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Distributed Constraint Optimization with Structured Resource Constraints, Akshat KUMAR, Boi FALTINGS, and Adrian PETCU Conference Proceeding Article

PDF

Dynamic Programming Approximations for Partially Observable Stochastic Games, Akshat KUMAR and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

How tagging helps bridge the gap between social and technical aspects in software development, Christoph TREUDE and Margaret-Anne STOREY Conference Proceeding Article

PDF

On Mining Rating Dependencies in Online Collaborative Rating Networks, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article

PDF

Predicting outcome for collaborative featured article nomination in Wikipedia, Meiqun HU, Ee Peng LIM, and Ramayya KRISHNAN Conference Paper

PDF

Semisupervised SVM batch mode active learning with applications to image retrieval, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Journal Article

Service Innovation Opportunity Identification, Arcot Desai NARASIMHALU Conference Paper

PDF

Sharing hierarchical mobile multimedia content using the MobiTOP system, Quang Minh NGUYEN, Thi Nhu Quynh KIM, Dion Hoe-Lian GOH, Ee-peng LIM, Yin-Leng THENG, Kalyani CHATTERJEA, Chew-Hung CHANG, Aixin SUN, and Khasfariyati RAZIKIN Conference Proceeding Article

PDF

SS-IDS: Statistical Signature based IDS, Payas GUPTA, Chedy RAISSI, Gerard DRAY, Pascal PONCELET, and Johan BRISSAUD Conference Proceeding Article

PDF

The Impact of Process Choice in High Maturity Environments: An Empirical Analysis, Narayanasamy RAMASUBBU and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Zeros and ones, M. THULASIDAS Magazine Article

PDF

Joint ranking for multilingual web search, Wei GAO, Cheng NIU, Ming ZHOU, and Kam-Fai WONG Conference Proceeding Article

On Technology Innovation: A Community Succession Model for Software Enterprise, Qianhui (Althea) LIANG and W. H. DAI Conference Paper

PDF

Achieving better privacy protection in wireless sensor networks using trusted computing, Yanjiang YANG, Robert H. DENG, Jianying ZHOU, and Ying QIU Conference Proceeding Article

PDF

An Incremental Threshold Method for Continuous Text Search Queries, Kyriakos MOURATIDIS and Hwee Hwa PANG Conference Proceeding Article

PDF

Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance, Debin GAO, Michael K. Reiter, and Dawn SONG Journal Article

PDF

Describing fuzzy sets using a new concept: Fuzzify functor, Kexin WEI, Zhaoxia WANG, and Quan WANG Journal Article

PDF

Efficient Evaluation of Multiple Preference Queries, Hou U LEONG, Nikos MAMAOULIS, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database, Bolin DING, David LO, Jiawei Han, and Siau-Cheng KHOO Conference Proceeding Article

PDF

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems, Shaoying CAI, Tieyan LI, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

Exploring hierarchically organized georeferenced multimedia annotations in the MobiTOP system, Thi Nhu Quynh KIM, Khasfariyati RAZIKIN, Dion Hoe-Lian GOH, Yin Leng THENG, Quang Minh NGUYEN, Ee-peng LIM, Aixin SUN, Chew Hung CHANG, and Kalyani CHATTERJEA Conference Proceeding Article

PDF

OPAQUE: Protecting Path Privacy in Directions Search, Ken C. K. LEE, Wang-Chien LEE, Hong Va LEONG, and Baihua ZHENG Conference Proceeding Article

PDF

Optimal Digital Content Distribution Strategy in the Presence of Consumer-to-Consumer Channel, Yunfang FENG, Zhiling GUO, and Wei-Yu Kevin CHIANG Journal Article

PDF

Optimizing service systems based on application-level QoS, Qianhui LIANG, Xindong WU, and Hoong Chuin LAU Journal Article

PDF

RSA-based certificateless public key encryption, Junzuo LAI, Robert H. DENG, Shengli LIU, and Weidong KOU Conference Proceeding Article

PDF

The Digital Wallet: Opportunities and Prototypes, Rajesh Krishna BALAN and Narayanasamy RAMASUBBU Journal Article

Link

Visible Reverse K-Nearest Neighbor Queries, Yunjun GAO, Baihua ZHENG, Gencai CHEN, Wang-chien LEE, Ken C. K. LEE, and Qing LI Conference Proceeding Article

PDF

A social relation aware routing protocol for mobile ad hoc networks, Jisun AN, Yangwoo KO, and Dongman LEE Conference Proceeding Article

Link

Attacks and Improvements to an RFID Mutual Authentication Protocol, Shaoying CAI, Yingjiu LI, Tieyan LI, and Robert H. DENG Conference Proceeding Article

Link

Certificate Revocation Release Policies, Nan HU, Giri Kumar Tayi, Chengyu MA, and Yingjiu LI Journal Article

PDF

Continuous Visible Nearest Neighbour Queries, Yunjun GAO, Baihua ZHENG, Wang-Chien LEE, and Gencai CHEN Conference Proceeding Article

PDF

Electronic commerce research and applications ECRA co-editors' introduction for volume 8, issue 2, March - April 2009, Robert J. KAUFFMAN, Patrick Y. K. CHAU, Terry R. PAYNE, and J. Christopher WESTLAND Editorial

PDF

Fast Object Search on Road Networks, Ken C. K. LEE, Wang-Chien LEE, and Baihua ZHENG Conference Proceeding Article

PDF

House of cards, M. THULASIDAS Magazine Article

Link

Parameter Estimation in Semi-Random Decision Tree Ensembling on Streaming Data, Peipei LI, Qianhui (Althea) LIANG, Xindong WU, and X. Hu Conference Proceeding Article

Link

Privacy-preserving Rental Services using One-show Anonymous Credentials, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article

PDF

Programmable Presence Virtualization for Next-Generation Context-based Applications, Arup ACHARYA, Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv Dasgupta, Archan MISRA, Shachi SHARMA, Xiping WANG, and Charles P. WRIGHT Conference Proceeding Article

PDF

Server-assisted Context-Dependent Pervasive Wellness Monitoring, Archan MISRA, Ben FALCHUK, and Shoshana LOEB Conference Proceeding Article

PDF

Visual word proximity and linguistics for semantic video indexing and near-duplicate retrieval, Yu-Gang JIANG and Chong-wah NGO Journal Article

PDF

Web query recommendation via sequential query prediction, Qi HE, Daxin JIANG, Zhen LIAO, Steven C. H. HOI, Kuiyu CHANG, Ee Peng LIM, and Hang LI Conference Proceeding Article

PDF

PAT: Towards flexible verification under fairness, Jun SUN, Yang LIU, Jin Song DONG, and Jun PANG Conference Proceeding Article

PDF

An examination of perceptions of male and female avatars, D. DEWESTER, Fiona Fui-hoon NAH, S. GERVAIS, and Keng SIAU Conference Proceeding Article

PDF

BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon LEE, Seungwoo KANG, Youngki LEE, SangJeong LEE, and Junehwa SONG Journal Article

BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon Lee, Seungwoo Kang, Youngki Lee, SangJeong Lee, and Junehwa Song Journal Article

Link

Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks, Jian Weng, Robert H. DENG, Xuhua DING, Cheng-Kang CHU, and Junzuo LAI Conference Proceeding Article

PDF

Integrated cognitive architectures: A survey, Hui-Qing CHONG, Ah-hwee TAN, and Gee-Wah NG Journal Article

PDF

Learning image‐text associations, Tao JIANG and Ah-hwee TAN Journal Article

PDF

Real-time near-duplicate elimination for web video search with content and context, Xiao WU, Chong-wah NGO, and Alexander G. HAUPTMANN Journal Article

PDF

Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection, Wan-Lei ZHAO and Chong-wah NGO Journal Article

PDF

Stochastic Modeling Western Paintings for Effective Classification, Jialie SHEN Journal Article

PDF

A Comprehensive Study for RFID Malwares on Mobile Devices, Qiang Yan, Yingjiu Li, Tieyan Li, and Robert Huijie DENG Conference Paper

Link

Air Indexes for Spatial Databases, Baihua ZHENG Encyclopaedia

Link

An E-Commerce Performance Assessment Model: Its Development and an Initial Test on E-Commerce Applications in the Retail Sector of China, Jinghua HUANG, Ximin JIANG, and Qian TANG Journal Article

Link

An Efficient Online Auditing Approach to Limit Private Data Disclosure, Haibing LU, Yingjiu LI, Jaideep Vaidya, and Vijay Atluri Conference Proceeding Article

An examination of the effects of offshore and outsourced development on the delegation of responsibilities to software components, Subhajit DATTA and Robert VAN ENGELEN Conference Proceeding Article

Are Online Reviews Just Noise? The Truth, the Whole Truth, or Only the Partial Truth?, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper

Link

Better Security Enforcement in Trusted Computing Enabled Heterogeneous Wireless Sensor Networks, Yanjiang YANG, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article

Link

Caching Schemes for DCOP Search Algorithms, William YEOH, Pradeep Reddy VARAKANTHAM, and Sven Koenig Conference Proceeding Article

PDF

Chaos and uncertainty, M. THULASIDAS Magazine Article

Comparison-Shopping Channel Selection by Small Online Vendors: An Exploratory Study, Nan HU and Wan Yun Book Chapter

Link

Compositemap: A Novel Music Similarity Measure for Personalized Multimodal Music Search, Bingjun ZHANG, Qiaoliang XIANG, Ye WANG, and Jialie SHEN Conference Proceeding Article

PDF

Computing Medoids in Large Spatial Datasets, Kyriakos MOURATIDIS, Dimitris PAPADIAS, and Spiros PAPADIMITRIOU Book Chapter

PDF

Continuous Monitoring of Spatial Queries, Kyriakos MOURATIDIS Encyclopaedia

PDF

Control-Theoretic, Mission-Driven, Optimization Techniques for Wireless Sensor Networks, Archan MISRA, Sharanya ESWARAN, and Thomas LA PORTA Conference Proceeding Article

Link

Developing a Collaborative Supply Chain Reference Model for a Regional Manufacturing Industry in China, Shui-Hua HAN and Chao-Hsien CHU Journal Article

PDF

Distributed Utility-Based Rate Adaptation Protocols for Prioritized, Quasi-Elastic Flows, Sharanya ESWARAN, Matthew P. JOHNSON, Archan MISRA, and Thomas LA PORTA Journal Article

Double Learning or Double Blinding: An Investigation of Vendor Private Information Acquisition and Consumer Learning, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper

PDF

Dynamic web service selection for reliable web service composition, San-Yih HWANG, Ee Peng LIM, Chien-Hsiang LEE, and Cheng-Hung CHEN Journal Article

Link

Economics, Information Systems, and Electronic Commerce: Empirical Research, Robert J. KAUFFMAN and Paul P. TALLON Edited Book

ECRA Co-editors' introduction for volume 8, issue 1, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

PDF

Efficient Valid Scope Computation for Location-Dependent Spatial Queries in Mobile and Wireless Environments, Ken C. K. LEE, Wang-chien LEE, Hong Va LEONG, Brandon UNGER, and Baihua ZHENG Conference Proceeding Article

Electronic commerce research and applications (ECRA) Co-Editors' Introduction for Volume 8, Issue 3, May - June 2009, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

Link

Empirical Design of Incentive Mechanisms in Group-Buying Auctions: Chapter 8, Her-Sen DOONG, Robert J. KAUFFMAN, Hsiangchu LAI, and Ya-Ting ZHUANG Book Chapter

PDF

Event-Detecting Multi-Agent MDPs: Complexity and Constant-Factor Approximation, Akshat KUMAR and S. Zilberstein Conference Proceeding Article

Feature-based Substructure Similarity Search, Feida ZHU, Xifeng YAN, Philip S. YU, and Jiawei HAN Book Chapter

Finding the same source programs based on the structural fingerprint distance of call graph, Zhiyi YIN, Fuxi ZHU, Jianming FU, and Debin GAO Journal Article

Image Effects and Rational Inattention in Internet-Based Selling., D. W. Lee, Robert John KAUFFMAN, and M. Bergen Journal Article

PDF

Integrated Resource Allocation and Scheduling in Bidirectional Flow Shop with Multi-Machine and COS Constraints, Hoong Chuin LAU, Zhengyi ZHAO, and Shuzhi Sam Ge Journal Article

Link

Introduction to the Special Issue: Competitive Strategy, Economics, and Information Systems, E. K. CLEMONS, Robert J. Kauffman, and T. Weber Journal Article

Link

Introduction to the Special Section: Marketing and E-Commerce, Ming-Hui HUANG and Robert J. Kauffman Journal Article

Link

Linear Regression, Jialie SHEN Encyclopaedia

PDF

Localized Monitoring of kNN Queries in Wireless Sensor Networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Journal Article

Link

Log-Linear Regression, Jialie SHEN Encyclopaedia

Mining Past-Time Temporal Rules: A Dynamic Analysis Approach, David LO, Siau-Cheng KHOO, and Chao LIU Book Chapter

Mining Software Specifications, David LO and Siau-Cheng Khoo Encyclopaedia

PDF

Modelling situation awareness for context‐aware decision support, Yu-Hong FENG, Teck-Hou TENG, and Ah-hwee TAN Journal Article

Link

Multistage Off-line Permutation Packet Routing on a Mesh: an Approach with Elementary Mathematics, Kevin CHIEW and Yingjiu LI Journal Article

PDF

Multiuser private queries over encrypted databases, Yanjiang YANG, Feng Bao, Xuhua DING, and Robert H. DENG Journal Article

Link

Navigational Path Privacy Protection: Navigational Path Privacy Protection, Ken C. K. LEE, Wang-chien LEE, Hong Va LEONG, and Baihua ZHENG Conference Proceeding Article

Link

n PAKE+: a tree-based group password-authenticated key exchange protocol using different passwords, Zhiguo WAN, Robert H. DENG, Feng Bao, Bart Preneel, and Ming GU Journal Article

PDF

Offering RSS Feeds: Does It Help to Gain Competitive Advantage?, Dan MA Conference Proceeding Article

PDF

Ontology-based business process customization for composite web services, Qianhui (Althea) LIANG, Xindong Wu, E. K. PARK, T. Khoshgoftaar, and C. Chi Journal Article

Open Innovation and Platform Pricing, Mei LIN, X. KE, and Andrew B. WHINSTON Conference Proceeding Article

Link

Opportunities and challenges for information systems research: Beyond the bounds of statistical inference: An introduction: Chapter 1, Robert J. KAUFFMAN and Paul P. TALLON Book Chapter

PDF

Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases, Kyriakos MOURATIDIS, Dimitris SACHARIDIS, and Hwee Hwa PANG Journal Article

Link

Planning Technology Investments for High Payoffs: A Rational Expectations Approach to Gauging Potential and Realized Value in a Changing Environment, Yoris A. AU, Kim Huat GOH, Robert J. KAUFFMAN, and Frederick J. RIGGINS Book Chapter