Submissions from 2009
Electronic commerce research and applications ECRA co-editors' introduction for volume 8, issue 2, March - April 2009, Robert J. KAUFFMAN, Patrick Y. K. CHAU, Terry R. PAYNE, and J. Christopher WESTLAND Editorial
Fast Object Search on Road Networks, Ken C. K. LEE, Wang-Chien LEE, and Baihua ZHENG Conference Proceeding Article
House of cards, M. THULASIDAS Magazine Article
Parameter Estimation in Semi-Random Decision Tree Ensembling on Streaming Data, Peipei LI, Qianhui (Althea) LIANG, Xindong WU, and X. Hu Conference Proceeding Article
Privacy-preserving Rental Services using One-show Anonymous Credentials, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article
Programmable Presence Virtualization for Next-Generation Context-based Applications, Arup ACHARYA, Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv Dasgupta, Archan MISRA, Shachi SHARMA, Xiping WANG, and Charles P. WRIGHT Conference Proceeding Article
Server-assisted Context-Dependent Pervasive Wellness Monitoring, Archan MISRA, Ben FALCHUK, and Shoshana LOEB Conference Proceeding Article
Visual word proximity and linguistics for semantic video indexing and near-duplicate retrieval, Yu-Gang JIANG and Chong-wah NGO Journal Article
Web query recommendation via sequential query prediction, Qi HE, Daxin JIANG, Zhen LIAO, Steven C. H. HOI, Kuiyu CHANG, Ee Peng LIM, and Hang LI Conference Proceeding Article
PAT: Towards flexible verification under fairness, Jun SUN, Yang LIU, Jin Song DONG, and Jun PANG Conference Proceeding Article
An examination of perceptions of male and female avatars, D. DEWESTER, Fiona Fui-hoon NAH, S. GERVAIS, and Keng SIAU Conference Proceeding Article
BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon Lee, Seungwoo Kang, Youngki Lee, SangJeong Lee, and Junehwa Song Journal Article
BMQ-Processor: A High-Performance Border Crossing Event Detection Framework for Large-scale Monitoring Applications, Jinwon LEE, Seungwoo KANG, Youngki LEE, SangJeong LEE, and Junehwa SONG Journal Article
Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks, Jian Weng, Robert H. DENG, Xuhua DING, Cheng-Kang CHU, and Junzuo LAI Conference Proceeding Article
Integrated cognitive architectures: A survey, Hui-Qing CHONG, Ah-hwee TAN, and Gee-Wah NG Journal Article
Learning image‐text associations, Tao JIANG and Ah-hwee TAN Journal Article
Real-time near-duplicate elimination for web video search with content and context, Xiao WU, Chong-wah NGO, and Alexander G. HAUPTMANN Journal Article
Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection, Wan-Lei ZHAO and Chong-wah NGO Journal Article
Stochastic Modeling Western Paintings for Effective Classification, Jialie SHEN Journal Article
A Comprehensive Study for RFID Malwares on Mobile Devices, Qiang Yan, Yingjiu Li, Tieyan Li, and Robert Huijie DENG Conference Paper
Air Indexes for Spatial Databases, Baihua ZHENG Encyclopaedia
An E-Commerce Performance Assessment Model: Its Development and an Initial Test on E-Commerce Applications in the Retail Sector of China, Jinghua HUANG, Ximin JIANG, and Qian TANG Journal Article
An Efficient Online Auditing Approach to Limit Private Data Disclosure, Haibing LU, Yingjiu LI, Jaideep Vaidya, and Vijay Atluri Conference Proceeding Article
An examination of the effects of offshore and outsourced development on the delegation of responsibilities to software components, Subhajit DATTA and Robert VAN ENGELEN Conference Proceeding Article
Are Online Reviews Just Noise? The Truth, the Whole Truth, or Only the Partial Truth?, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper
A semiotic analysis of unified modeling language graphical notations, Keng SIAU and Yuhong TIAN Journal Article
Better Security Enforcement in Trusted Computing Enabled Heterogeneous Wireless Sensor Networks, Yanjiang YANG, Jianying Zhou, Robert H. DENG, and Feng Bao Journal Article
Caching Schemes for DCOP Search Algorithms, William YEOH, Pradeep Reddy VARAKANTHAM, and Sven Koenig Conference Proceeding Article
Chaos and uncertainty, M. THULASIDAS Magazine Article
Comparison-Shopping Channel Selection by Small Online Vendors: An Exploratory Study, Nan HU and Wan Yun Book Chapter
Compositemap: A Novel Music Similarity Measure for Personalized Multimodal Music Search, Bingjun ZHANG, Qiaoliang XIANG, Ye WANG, and Jialie SHEN Conference Proceeding Article
Computing Medoids in Large Spatial Datasets, Kyriakos MOURATIDIS, Dimitris PAPADIAS, and Spiros PAPADIMITRIOU Book Chapter
Continuous Monitoring of Spatial Queries, Kyriakos MOURATIDIS Encyclopaedia
Control-Theoretic, Mission-Driven, Optimization Techniques for Wireless Sensor Networks, Archan MISRA, Sharanya ESWARAN, and Thomas LA PORTA Conference Proceeding Article
Developing a Collaborative Supply Chain Reference Model for a Regional Manufacturing Industry in China, Shui-Hua HAN and Chao-Hsien CHU Journal Article
Distributed Utility-Based Rate Adaptation Protocols for Prioritized, Quasi-Elastic Flows, Sharanya ESWARAN, Matthew P. JOHNSON, Archan MISRA, and Thomas LA PORTA Journal Article
Double Learning or Double Blinding: An Investigation of Vendor Private Information Acquisition and Consumer Learning, Nan HU, Ling LIU, Vallabh Sambamurthy, and Bin CHEN Conference Paper
Dynamic web service selection for reliable web service composition, San-Yih HWANG, Ee Peng LIM, Chien-Hsiang LEE, and Cheng-Hung CHEN Journal Article
Economics, Information Systems, and Electronic Commerce: Empirical Research, Robert J. KAUFFMAN and Paul P. TALLON Edited Book
ECRA Co-editors' introduction for volume 8, issue 1, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Efficient Valid Scope Computation for Location-Dependent Spatial Queries in Mobile and Wireless Environments, Ken C. K. LEE, Wang-chien LEE, Hong Va LEONG, Brandon UNGER, and Baihua ZHENG Conference Proceeding Article
Electronic commerce research and applications (ECRA) Co-Editors' Introduction for Volume 8, Issue 3, May - June 2009, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial
Empirical Design of Incentive Mechanisms in Group-Buying Auctions: Chapter 8, Her-Sen DOONG, Robert J. KAUFFMAN, Hsiangchu LAI, and Ya-Ting ZHUANG Book Chapter
Event-Detecting Multi-Agent MDPs: Complexity and Constant-Factor Approximation, Akshat KUMAR and S. Zilberstein Conference Proceeding Article
Feature-based Substructure Similarity Search, Feida ZHU, Xifeng YAN, Philip S. YU, and Jiawei HAN Book Chapter
Finding the same source programs based on the structural fingerprint distance of call graph, Zhiyi YIN, Fuxi ZHU, Jianming FU, and Debin GAO Journal Article
Image Effects and Rational Inattention in Internet-Based Selling., D. W. Lee, Robert John KAUFFMAN, and M. Bergen Journal Article
Integrated Resource Allocation and Scheduling in Bidirectional Flow Shop with Multi-Machine and COS Constraints, Hoong Chuin LAU, Zhengyi ZHAO, and Shuzhi Sam Ge Journal Article
Introduction to the Special Issue: Competitive Strategy, Economics, and Information Systems, E. K. CLEMONS, Robert J. Kauffman, and T. Weber Journal Article
Introduction to the Special Section: Marketing and E-Commerce, Ming-Hui HUANG and Robert J. Kauffman Journal Article
Linear Regression, Jialie SHEN Encyclopaedia
Localized Monitoring of kNN Queries in Wireless Sensor Networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Journal Article
Log-Linear Regression, Jialie SHEN Encyclopaedia
Mining Past-Time Temporal Rules: A Dynamic Analysis Approach, David LO, Siau-Cheng KHOO, and Chao LIU Book Chapter
Mining Software Specifications, David LO and Siau-Cheng Khoo Encyclopaedia
Modelling situation awareness for context‐aware decision support, Yu-Hong FENG, Teck-Hou TENG, and Ah-hwee TAN Journal Article
Multistage Off-line Permutation Packet Routing on a Mesh: an Approach with Elementary Mathematics, Kevin CHIEW and Yingjiu LI Journal Article
Multiuser private queries over encrypted databases, Yanjiang YANG, Feng Bao, Xuhua DING, and Robert H. DENG Journal Article
Navigational Path Privacy Protection: Navigational Path Privacy Protection, Ken C. K. LEE, Wang-chien LEE, Hong Va LEONG, and Baihua ZHENG Conference Proceeding Article
n PAKE+: a tree-based group password-authenticated key exchange protocol using different passwords, Zhiguo WAN, Robert H. DENG, Feng Bao, Bart Preneel, and Ming GU Journal Article
Offering RSS Feeds: Does It Help to Gain Competitive Advantage?, Dan MA Conference Proceeding Article
Ontology-based business process customization for composite web services, Qianhui (Althea) LIANG, Xindong Wu, E. K. PARK, T. Khoshgoftaar, and C. Chi Journal Article
Open Innovation and Platform Pricing, Mei LIN, X. KE, and Andrew B. WHINSTON Conference Proceeding Article
Opportunities and challenges for information systems research: Beyond the bounds of statistical inference: An introduction: Chapter 1, Robert J. KAUFFMAN and Paul P. TALLON Book Chapter
Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases, Kyriakos MOURATIDIS, Dimitris SACHARIDIS, and Hwee Hwa PANG Journal Article
Planning Technology Investments for High Payoffs: A Rational Expectations Approach to Gauging Potential and Realized Value in a Changing Environment, Yoris A. AU, Kim Huat GOH, Robert J. KAUFFMAN, and Frederick J. RIGGINS Book Chapter
Privacy-Preserving Querying in Sensor Networks, Emiliano CRISTOFARO, Xuhua DING, and Gene Tsudik Conference Proceeding Article
Quality-aware collaborative Question Answering: Methods and evaluation, Maggy Anastasia SURYANTO, Ee Peng LIM, Aixin SUN, and Roger Hsiang-Li CHIANG Conference Proceeding Article
QUC-Tree: Integrating query context information for efficient music retrieval, Jialie SHEN, Dacheng Tao, and Xuelong LI Journal Article
Ratings Lead You to the Product, Reviews Help you Clinch it? The Dynamics and Impact of Online Review Sentiments on Product Sales, Nan HU, Noi Sian KOH, and Srinivas K. REDDY Working Paper
Rule randomisation and its application to logic-based workflow verification, Qianhui (Althea) LIANG and S. Rubin Journal Article
Should We Collude? Analyzing the Benefits of Bidder Cooperation in Group-Buying Auctions, J. CHEN, X. CHEN, Robert J. Kauffman, and X. SONG Journal Article
Should We Collude? Analyzing the Benefits of Bidder Cooperation in Group-Buying Auctions., J. Chen, X. Chen, Robert John KAUFFMAN, and X. Song Journal Article
Spreadsheet Modeling of Hotel Room Sales and Demand Distribution Estimation, Thin Yin LEONG and Michelle Lee Fong CHEONG Journal Article
The Architecture of Platforms: A Unified View, Carliss Y. BALDWIN and C. Jason Woodard Book Chapter
The Price of Stability in Selfish Scheduling Games, Lucas AGUSSURJA and Hoong Chuin LAU Journal Article
Tuning On-Air Signatures for Balancing Performance and Confidentiality, Baihua ZHENG, Wang-chien LEE, Peng LIU, Dik Lun LEE, and Xuhua DING Journal Article
Two-Tier Air Indexing for on-Demand Xml Data Broadcast, Weiwei SUN, Ping YU, Yongrui Qin, Zhuoyao ZHANG, and Baihua ZHENG Conference Proceeding Article
Web Social Mining, Hady W. LAUW and Ee Peng LIM Encyclopaedia
When is it Beneficial for a Firm to Pursue a Unified Procurement Strategy for Enterprise Software Solutions?, Robert J. KAUFFMAN and Juliana Y. TSAI Conference Proceeding Article
Submissions from 2008
Text Mining in Radiology Reports, Tianxia GONG, Chew Lim TAN, Tze-Yun LEONG, Cheng Kiang LEE, Boon Chuan PANG, C. C. Tchoyoson LIM, Qi TIAN, Suisheng TANG, and Zhuo ZHANG Conference Proceeding Article
Adoption of 3-D virtual worlds for education, X. CHEN, Keng SIAU, and Fiona Fui-hoon NAH Conference Proceeding Article
A fast pruned‐extreme learning machine for classification problem, Hai-Jun RONG, Yew-Soon ONG, Ah-hwee TAN, and Zexuan ZHU Journal Article
Ambiguous optimistic fair exchange, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Conference Proceeding Article
Analysis and Improvements of a Secure E-Tender Submission, Shaoying CAI, Yingjiu LI, Yunlei ZHAO, and Yiming ZHAO Conference Paper
A Security and Performance Evaluation of Hash-Based Rfid Protocols, Tong-Lee Lim, Tieyan Li, and Yingjiu Li Conference Paper
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairing, Robert H. DENG, Jian Weng, Shengli LIU, and Kefei CHEN Conference Proceeding Article
Cognitive agents integrating rules and reinforcement learning for context-aware decision support, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article
Cultural Factors in Technological Innovation and Entrepreneurship: Israel Versus Singapore, Ori SASSON Conference Paper
Distributing complementary resources across multiple periods with stochastic demand, Shih-Fen CHENG, John TAJAN, and Hoong Chuin LAU Conference Proceeding Article
Efficient Client-to-Client Password Authenticated Key Exchange, Yanjiang YANG, Feng BAO, and Robert H. DENG Conference Proceeding Article
Explaining Inferences in Bayesian Networks, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Journal Article
Graph OLAP: Towards Online Analytical Processing on Graphs, CHEN CHEN, Xifeng YAN, Feida ZHU, Jiawei Han, and Philip S. YU Conference Proceeding Article
Hemorrhage slices detection in brain CT images, Liu R., Tan C., Tze-Yun LEONG, Lee C., Pang B., Lim C., Tian Q., Tang S., and Zhang Z. Conference Proceeding Article
Innovation in the programmable web: Characterizing the mashup ecosystem, C. Jason WOODARD and Shuli YU Conference Proceeding Article
Making Sense of Technology Trends in the Information Technology Landscape, Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta, and Robert J. KAUFFMAN Journal Article
Mobitop: Accessing hierarchically organized georeferenced multimedia annotations, Thi Nhu Quynh KIM, Khasfariyati Razikin, Dion Hoe-Lian GOH, Quang Minh NGUYEN, and Ee Peng LIM Conference Proceeding Article
On visualizing heterogeneous semantic networks from multiple data sources, Maureen Maureen, Aixin SUN, Ee Peng LIM, Anwitaman DATTA, and Kuiyu CHANG Conference Proceeding Article
Planning with iFALCON: Towards a neural-network-based BDI agent architecture, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article
Pricing on-Demand Software Competitively in a Dynamic Market, Dan MA Conference Paper