Submissions from 2008
Adoption of Service Oriented Computing from the IT Professionals’ Perspective: An e-Government Case Study , Ilse BAUMGARTNER and Peter GREEN Conference Proceeding Article
A heuristic method for job-shop scheduling with an infinite wait buffer: From one-machine to multi-machine problems, Z. J. ZHAO, J. KIM, M. LUO, Hoong Chuin LAU, and S. S. GE Conference Proceeding Article
An Efficient PIR Construction using Trusted Hardware, Yanjiang YANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article
Cascade RSVM in Peer-to-Peer Network, Hock Hee ANG, Vivekanand Gopalkrishnan, Steven C. H. HOI, and Wee Keong NG Conference Proceeding Article
Disclosure Analysis and Control in Statistical Databases, Yingjiu LI and Haibing LU Conference Proceeding Article
Distinguishing between FE and DDoS using Randomness Check, Hyundo PARK, Peng LI, Debin GAO, Heejo LEE, and Robert H. DENG Conference Proceeding Article
Do Online Reviews Affect Product Sales? The Role of Reviewer Characteristics and Temporal Effects, Nan HU, Ling LIU, and Jennifer ZHANG Journal Article
Generating robust schedules subject to resource and duration uncertainties, Na FU, Hoong Chuin LAU, and Fei XIAO Conference Proceeding Article
Network Effects and Embedded Options: Decision-Making under Uncertainty for Network Technology Investments., Robert John KAUFFMAN and A. Kumar Journal Article
Relative Importance, Specific Investment and Ownership in Interorganizational Systems., Kunsoo Han, Robert J. KAUFFMAN, and Barrie R. Nault Journal Article
Software nightmares, Manoj THULASIDAS Magazine Article
Tagnsearch: Searching and navigating geo-referenced collections of photographs, Quang Minh NGUYEN, Thi Nhu Quynh KIM, Dion Hoe-Lian GOH, Yin-Leng THENG, Ee Peng LIM, Aixin SUN, Chew-Hung CHANG, and Kalyani CHATTERJEA Conference Proceeding Article
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence, Ivan P. L. PNG, Chen-Yu WANG, and QIU-HONG WANG Journal Article
Tuning into the Digital Channel: Evaluating Business Model Fit for Internet Firm Survival, Robert J. KAUFFMAN and Bin WANG Journal Article
A Lightweight Buyer-Seller Watermarking Protocol, Yongdong WU and Hwee Hwa PANG Journal Article
A Rule-Based Approach for Availability of Web Service, Qianhui (Althea) LIANG, Herman LAM, L. Narupiyakul, and P. Hung Conference Proceeding Article
Authenticating the Query Results of Text Search Engines, Hwee Hwa PANG and Kyriakos MOURATIDIS Conference Proceeding Article
Business Modeling with Spreadsheets : Problems, Principles, and Practice, Thin Yin LEONG and Michelle Lee Fong CHEONG Book
Classification in P2P Networks by Bagging Cascade RSVMs, Hock Hee ANG, Vikvekanand GOPALKRISHNAN, Steven C. H. HOI, Wee Keong NG, and Anwitaman DATTA Conference Proceeding Article
Critical success factors in SOA implementation, J. ERICKSON and Keng SIAU Conference Proceeding Article
Hierarchical Inter-object Traces for Specification Mining, David LO and Shahar Maoz Conference Proceeding Article
Integrating lightweight systems analysis into the unified process by using service responsibility tables, X. TAN, S. ALTER, and Keng SIAU Conference Proceeding Article
Knowledge Transfer Via Multiple Model Local Structure Mapping, Jing GAO, Wei FAN, Jing JIANG, and Jiawei HAN Conference Proceeding Article
Learning Outcomes for a Business Information Systems Undergraduate Program, Joelle ELMALEH, Steven MILLER, and Paul S. GOODMAN Journal Article
Mining Patterns and Rules for Software Specification Discovery, David LO and Siau-Cheng KHOO Conference Proceeding Article
Relationship preserving auction for repeated e-procurement, Park J., Lee J., and Lau H. Conference Proceeding Article
Relationship-Preserving E-Procurement Auction, Hoong Chuin LAU, Jong Han PARK, and Jae Kyu LEE Conference Proceeding Article
Simulating a smartboard by real-time gesture detection in lecture videos, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Journal Article
The Pricing Strategy Analysis for the Software-as-a-Service Business Model, Dan MA and Abraham SEIDMANN Conference Proceeding Article
Three dimensional image reconstruction for time-resolved diffuse optical tomography, H. J. Zhao, Zhaoxia WANG, Y. T. Jiang, F. Gao, Y. Tanikawa, and Y. Yamada Journal Article
Utility Pricing Auction for Multi-Period Resource Allocation in Multi-Machine Flow Shop Problems, Hoong Chuin LAU, Zhengyi ZHAO, Shuzhi Sam Ge, and T. H. LEE Conference Proceeding Article
When ‘good good’ can be bad, M. THULASIDAS News Article
Management of Technology Deployed in Service Innovations, Arcot Desai NARASIMHALU Conference Paper
Active Kernel Learning, Steven C. H. HOI and Rong JIN Conference Proceeding Article
Adoption of Service Oriented Computing from the IT Professionals' Perspective: An e-Government Case Study, Ilse BAUMGARTNER and Peter GREEN Conference Proceeding Article
Aggregated Force Attrition with a Dynamics Composition of Models, Ori SASSON Conference Paper
A hybrid approach to convoy movement planning in an urban city, Ramesh Thangarajoo, Lucas Agussurja, and Hoong Chuin LAU Conference Proceeding Article
A Real-Time Tele-Ophalmology System Based on Secure Video-Conferencing and White-Board, Shengsheng YU, Zhuo WEI, Robert H. DENG, Haixia YAO, Zhigang ZHAO, Lek Heng NGOH, and Yongdong WU Conference Proceeding Article
A self-organizing neural model for multimedia information fusion, Luong-Dong NGUYEN, Kia-Yan WOON, and Ah-hwee TAN Conference Proceeding Article
Bag-of-visual-words expansion using visual relatedness for video indexing, Yu-Gang JIANG and Chong-wah NGO Conference Proceeding Article
Bounded model checking of compositional processes, Jun SUN, Yang LIU, Jin Song DONG, and Jing SUN Conference Proceeding Article
Comments-oriented document summarization: Understanding documents with readers' feedback, Meishan HU, Aixin SUN, and Ee Peng LIM Conference Proceeding Article
Empirical analysis of certificate revocation lists, Daryl WALLECK, Yingjiu LI, and Shouhuai Xu Conference Proceeding Article
Estimating local optimums in EM algorithm over Gaussian mixture model, Zhenjie ZHANG, Bing Tian DAI, and Anthony K.H. TUNG Conference Proceeding Article
H-DPOP: Using Hard Constraints for Search Space Pruning in DCOP, Akshat KUMAR, Adrian PETCU, and Boi FALTINGS Conference Proceeding Article
Issues and procedures in adopting structural equation modelling technique, Siu Loon HOE Journal Article
Linear Relaxation Techniques for Task Management in Uncertain Settings, Pradeep VARAKANTHAM and Stephen F. SMITH Conference Proceeding Article
Mapping the Multi-Tiered Impacts of the Growth of IT Industries in India: A Combined Scale-and-Scope Externalities Perspective, Robert J. KAUFFMAN and Ajay Kumar Journal Article
Mining Past-Time Temporal Rules from Execution Traces, David LO, Siau-Cheng KHOO, and Chao LIU Conference Proceeding Article
Mining temporal rules for software maintenance, David LO, Siau-Cheng Khoo, and Chao LIU Journal Article
Modeling Civil Defense Operations for Training, Amnon GONEN and Ori SASSON Conference Paper
On Profiling Blogs with Representative Entries, Jinfeng ZHUANG, Steven C. H. HOI, and Aixin SUN Conference Proceeding Article
Predicting Trusts among Users of Online Communities - An Epinions Case Study, Haifeng LIU, Ee-Peng LIM, Hady Wirawan LAUW, Minh-Tam LE, Aixin SUN, Jaideep SRIVASTAVA, and Young Ae KIM Conference Proceeding Article
Ranked Reverse Nearest Neighbor Search, Ken C. K. LEE, Baihua ZHENG, and Wang-Chien LEE Journal Article
Scalable RFID Authentication and Discovery in Epcglobal Network, Tieyan LI and Robert H. DENG Conference Proceeding Article
Searching blogs and news: A study on popular queries, Aixin SUN, Meishan HU, and Ee Peng LIM Conference Paper
Searching correlated objects in a long sequence, Ken C. K. LEE, Wang-chien LEE, Donna Peuquet, and Baihua ZHENG Conference Proceeding Article
Semi-supervised ensemble ranking, Steven C. H. HOI and Rong JIN Conference Proceeding Article
Spreadsheet Modeling of Equipment Acquisition Plan, Thin Yin LEONG and Michelle L. F. CHEONG Journal Article
Timeline prediction framework for iterative software engineering projects with changes, Kay BERKLING, Georgios KIRAGIANNIS, Armin ZUNDEL, and Subhajit DATTA Conference Proceeding Article
Tree-based Partition Querying: A Methodology for Computing Medoids in Large Spatial Datasets, Kyriakos MOURATIDIS, Dimitris Papadias, and Spiros Papadimitriou Journal Article
User Guidance Of Resource-Adaptive Systems, João Pedro SOUSA, Rajesh Krishna BALAN, Vahe Poladian, David Garlan, and Mahadev Satyanarayanan Conference Proceeding Article
Timed automata patterns, Jin Song DONG, Ping HAO, Shengchao QIN, Jun SUN, and Wang YI Journal Article
Advances and Challenges for Scalable Provenance in Stream Processing Systems, Archan MISRA, Marion BLOUNT, Anastasios KEMENTSIETSIDIS, Daby SOW, and Min WANG Conference Proceeding Article
A Maturity Model for Innovation Management, Arcot Desai NARASIMHALU Conference Paper
A multimodal and multilevel ranking scheme for large-scale video retrieval, Steven C. H. HOI and Michael R. LYU Journal Article
An experimental study on U-commerce adoption: Impact of personalization and privacy concerns, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Journal Article
An office survival guide, M. THULASIDAS News Article
Capacity Constrained Assignment in Spatial Databases, Hou U LEONG, Man Lung YIU, Kyriakos MOURATIDIS, and Nikos MAMOULIS Conference Proceeding Article
Co-editors' introduction, Robert John KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Journal Article
Computer-based decision support for critical and emergency care, Tze-Yun LEONG, Aronsky D., and Michael Shabot M. Editorial
Context-Aware and Personalized Event Filtering for Low-Overhead Continuous Remote Health Monitoring, Iqbal MOHOMED, Archan MISRA, Mario EBLING, and William JEROME Conference Proceeding Article
Context modeling with evolutionary fuzzy cognitive map in interactive storytelling, Yundong CAI, Chunyan MIAO, Ah-hwee TAN, and Zhiqi SHEN Conference Proceeding Article
Electric Elves: What went wrong and why, Milind TAMBE, Emma Bowring, Jonathan Pearce, Pradeep Reddy VARAKANTHAM, Paul Scerri, and David V. Pynadath Magazine Article
Information-Theory Based Optimal Location Management Schemes for Integrated Multi-System Wireless Networks, Archan MISRA, Abhishek ROY, and Sajal K. DAS Journal Article
Localized Minimum-Latency Broadcasting in Multi-radio Multi-rate Wireless Mesh Networks, Junaid QADIR, Chun Tung CHOU, Archan MISRA, and Joo Ghee LIM Conference Proceeding Article
Measuring novelty and redundancy with multiple modalities in cross-lingual broadcast news, Xiao WU, Alexander G. HAUPTMANN, and Chong-wah NGO Journal Article
Multi-view ear recognition based on B-Spline pose manifold construction, Zhiyuan ZHANG and Heng LIU Conference Proceeding Article
Predicting trusts among users of online communities: an Epinions case study, Haifeng LIU, Ee Peng LIM, Hady W. LAUW, Minh-Tam LE, Aixin SUN, Jaideep SRIVASTAVA, and Young Ae KIM Conference Proceeding Article
Probabilistically Reliable On-Demand Multicast in Wireless Mesh Networks, Xin ZHAO, Chun Tung CHOU, Jun GUO, Sanjay JHA, and Archan MISRA Conference Proceeding Article
Rule Randomization for Propositional Logic-Based Workflow Verification, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article
SeeMon: Scalable and Energy-efficient Context Monitoring Framework for Sensor-rich Mobile Environments, Seungwoo KANG, Jinwon LEE, Hyukjae JANG, Hyonik LEE, Youngki LEE, Souneil PARK, Taiwoo PARK, and Junehwa SONG Conference Proceeding Article
SeeMon: Scalable and Energy-efficient Context Monitoring Framework for Sensor-rich Mobile Environments, Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Lee, Youngki Lee, Souneil Park, Taiwoo Park, and Junehwa Song Conference Paper
Self-organizing neural models integrating rules and reinforcement learning, Teck-Hou TENG, Zhong-Ming TAN, and Ah-hwee TAN Conference Proceeding Article
Semi-supervised classification using bridging, Jason Yuk Hin CHAN, Irena KOPRINSKA, and Josiah POON Conference Proceeding Article
Semi-supervised distance metric learning for collaborative image retrieval, Steven HOI, Wei LIU, and Shih-Fu CHANG Conference Proceeding Article
Semi-supervised SVM batch mode active learning for image retrieval, Steven HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Traceable and retrievable identity-based encryption, Man Ho AU, Qiong HUANG, Joseph K. LIU, Willy SUSILO, Duncan S. WONG, and Guomin YANG Conference Proceeding Article
Use of cognitive mapping techniques in information systems development, Keng SIAU and X. TAN Journal Article
Utility-based Adaptation in Mission-oriented Wireless Sensor Networks, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article
Visual analytics for supporting entity relationship discovery on text data, Hanbo DAI, Ee Peng LIM, Hady W. LAUW, and Hwee Hwa PANG Conference Proceeding Article
Web Service Matching by Ontology Instance Categorization, Qianhui (Althea) LIANG and Herman LAM Conference Proceeding Article
WikiNetViz: Visualizing friends and adversaries in implicit social networks, Minh-Tam LE, Hoang-Vu DANG, Ee Peng LIM, and Anwitaman DATTA Conference Proceeding Article
Work Dispersion, Process-Based Learning and Offshore Software Development Performance, Narayanasamy RAMASUBBU, Sunil Mithas, M. S. Krishnan, and Chris Kemerer Journal Article
Platform Competition in Digital Systems: Architectural Control and Value Migration, C. Jason WOODARD Working Paper
Verification of Unstructured Workflows Via Propositional Logic, Qianhui (Althea) LIANG and L. ZHAO Conference Proceeding Article
A Combinatorial Auction Framework for Solving Decentralized Scheduling Problems, Hoong Chuin LAU, Kong Wei Lye, and Viet Bang NGUYEN Conference Proceeding Article
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks, Xuhua DING, Wei YU, and Ying PAN Conference Proceeding Article
Architectural Control Points, C. Jason WOODARD Conference Proceeding Article
A verification system for timed interval calculus, Chunqing CHEN, Jin Song DONG, and Jun SUN Conference Proceeding Article