The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2008

PDF

Multi-view ear recognition based on B-Spline pose manifold construction, Zhiyuan ZHANG and Heng LIU Conference Proceeding Article

PDF

Predicting trusts among users of online communities: an Epinions case study, Haifeng LIU, Ee Peng LIM, Hady W. LAUW, Minh-Tam LE, Aixin SUN, Jaideep SRIVASTAVA, and Young Ae KIM Conference Proceeding Article

PDF

Probabilistically Reliable On-Demand Multicast in Wireless Mesh Networks, Xin ZHAO, Chun Tung CHOU, Jun GUO, Sanjay JHA, and Archan MISRA Conference Proceeding Article

Rule Randomization for Propositional Logic-Based Workflow Verification, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article

SeeMon: Scalable and Energy-efficient Context Monitoring Framework for Sensor-rich Mobile Environments, Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Hyonik Lee, Youngki Lee, Souneil Park, Taiwoo Park, and Junehwa Song Conference Paper

PDF

SeeMon: Scalable and Energy-efficient Context Monitoring Framework for Sensor-rich Mobile Environments, Seungwoo KANG, Jinwon LEE, Hyukjae JANG, Hyonik LEE, Youngki LEE, Souneil PARK, Taiwoo PARK, and Junehwa SONG Conference Proceeding Article

PDF

Self-organizing neural models integrating rules and reinforcement learning, Teck-Hou TENG, Zhong-Ming TAN, and Ah-hwee TAN Conference Proceeding Article

Semi-supervised classification using bridging, Jason Yuk Hin CHAN, Irena KOPRINSKA, and Josiah POON Conference Proceeding Article

PDF

Semi-supervised distance metric learning for collaborative image retrieval, Steven HOI, Wei LIU, and Shih-Fu CHANG Conference Proceeding Article

PDF

Semi-supervised SVM batch mode active learning for image retrieval, Steven HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article

PDF

Traceable and retrievable identity-based encryption, Man Ho AU, Qiong HUANG, Joseph K. LIU, Willy SUSILO, Duncan S. WONG, and Guomin YANG Conference Proceeding Article

PDF

Use of cognitive mapping techniques in information systems development, Keng SIAU and X. TAN Journal Article

PDF

Utility-based Adaptation in Mission-oriented Wireless Sensor Networks, Sharanya ESWARAN, Archan MISRA, and Thomas LA PORTA Conference Proceeding Article

PDF

Visual analytics for supporting entity relationship discovery on text data, Hanbo DAI, Ee Peng LIM, Hady W. LAUW, and Hwee Hwa PANG Conference Proceeding Article

Link

Web Service Matching by Ontology Instance Categorization, Qianhui (Althea) LIANG and Herman LAM Conference Proceeding Article

PDF

WikiNetViz: Visualizing friends and adversaries in implicit social networks, Minh-Tam LE, Hoang-Vu DANG, Ee Peng LIM, and Anwitaman DATTA Conference Proceeding Article

PDF

Work Dispersion, Process-Based Learning and Offshore Software Development Performance, Narayanasamy RAMASUBBU, Sunil Mithas, M. S. Krishnan, and Chris Kemerer Journal Article

PDF

Platform Competition in Digital Systems: Architectural Control and Value Migration, C. Jason WOODARD Working Paper

Link

Verification of Unstructured Workflows Via Propositional Logic, Qianhui (Althea) LIANG and L. ZHAO Conference Proceeding Article

A Combinatorial Auction Framework for Solving Decentralized Scheduling Problems, Hoong Chuin LAU, Kong Wei Lye, and Viet Bang NGUYEN Conference Proceeding Article

PDF

A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks, Xuhua DING, Wei YU, and Ying PAN Conference Proceeding Article

PDF

Architectural Control Points, C. Jason WOODARD Conference Proceeding Article

PDF

A verification system for timed interval calculus, Chunqing CHEN, Jin Song DONG, and Jun SUN Conference Proceeding Article

Link

Bayesian Tensor Analysis, Dacheng TAO, Jimeng SUN, Jialie SHEN, Xindong WU, Xuelong LI, Stephen J. Maybank, and Christos Faloutsos Conference Proceeding Article

Optimisation and Simulation Tools for Yard Operations at the Port of Piraeus Container Terminal, Nang Laik MA Conference Paper

PDF

Reading between the lines, M. THULASIDAS News Article

PDF

Scalable detection of semantic clones, Mark GABEL, Lingxiao JIANG, and Zhendong SU Conference Proceeding Article

PDF

Stress test, M. THULASIDAS Magazine Article

The Development of Recommender System Based On Trajectory Analysis, Young Soo KIM and Ramayya Krishnan Presentation

Link

Towards Governance Schemes for Distributed Software, Narayanasamy RAMASUBBU and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Verifying Completeness of Relational Query Answers from Online Servers, Hwee Hwa PANG and Kian-Lee TAN Journal Article

Link

How to Influence My Customers? The Impact of Electronic Market Design, Nan HU, Ling LIU, Bing CHEN, and Jialie SHEN Conference Proceeding Article

PDF

A formal model of semantic Web Service Ontology (WSMO) execution, Hai H. WANG, Nick GIBBINS, Terry R. PAYNE, Ahmed SALEH, and Jun SUN Conference Proceeding Article

PDF

A scalable approach to multi-style architectural modeling and verification, Stephen WONG, Jing SUN, Ian WARREN, and Jun SUN Conference Proceeding Article

PDF

Benefiting from customer and competitor knowledge: A market-based approach to organisational learning, Siu Loon HOE Journal Article

PDF

Building a web of trust without explicit trust ratings, Young Ae KIM, Minh-Tam LE, Hady W. LAUW, Ee Peng LIM, Haifeng LIU, and Jaideep SRIVASTAVA Conference Proceeding Article

PDF

COMP-REF: A technique to guide the delegation of responsibilities to components in software systems, Subhajit DATTA and Robert van Engelen Conference Proceeding Article

PDF

Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles, Qiong HUANG, Guomin YANG, Duncan S. WONG, and Willy SUSILO Conference Proceeding Article

PDF

E-government implementation: A macro analysis of Singapore's e-government initiatives, Calvin M.L. CHAN, Yi Meng LAU, and Shan L. PAN Journal Article

PDF

K-Sketch: A 'kinetic' sketch pad for novice animators, Richard C. DAVIS, Brien Colwell, and James A. Landay Conference Proceeding Article

PDF

Measurement and Estimation of Network QoS among Peer Xbox 360 Game Players, Youngki LEE, Sharad Agarwal, Chris Butcher, and Jitu Padhye Conference Proceeding Article

Measurement and Estimation of Network QoS among Peer Xbox 360 Game Players, Youngki Lee, Sharad Agarwal, Chris Butcher, and Jitu Padhye Conference Paper

Link

Mining and Ranking Generators of Sequential Pattern, David LO, Siau-Cheng KHOO, and Jinyan LI Conference Proceeding Article

Processing Mutual Nearest Neighbor Queries for Moving Object Trajectories, Yunjun GAO, Gencai CHEN, Qing LI, Baihua ZHENG, and Chun LI Conference Proceeding Article

PDF

Rate-Diversity and Resource-Aware Broadcast and Multicast in Multi-rate Wireless Mesh Networks, Bao Hua LIU, Chun Tung CHOU, Archan MISRA, and Sanjay JHA Journal Article

Link

Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks, Huafei ZHU, Feng BAO, and Robert H. DENG Conference Proceeding Article

Link

The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol, Tieyan LI, Robert H. DENG, and Guilin WANG Journal Article

PDF

Validating multi-column schema matchings by type, Bing Tian DAI, Nick KOUDAS, Divesh SRIVASTAVA, Anthony K.H. TUNG, and Suresh VENKATASUBRAMANIAN Conference Proceeding Article

Link

Efficient Mining of Recurrent Rules from a Sequence Database, David LO, Siau-Cheng KHOO, and Chao LIU Conference Proceeding Article

Electronic Commerce Research and Applications Co-Editors’ Introduction for Volume 7, Issue 1, Robert J. Kauffman, Patrick Y. K. Chau, and J. Christopher Westland Editorial

PDF

HARMONI: Context-aware filtering of sensor data for continuous remote health monitoring, Iqbal MOHOMED, Archan MISRA, Maria EBLING, and William JEROME Conference Proceeding Article

PDF

How friendly is too friendly?, M. THULASIDAS News Article

Location-Dependent Skyline Queries, Baihua ZHENG, Ken C. K. LEE, and Wang-Chien LEE Conference Proceeding Article

PDF

On-Line Discovery of Hot Motion Paths, Dimitris SACHARIDIS, Kostas Patroumpas, Manolis Terrovitis, Verena Kantere, Michalis Potamias, Kyriakos MOURATIDIS, and Timos Sellis Conference Proceeding Article

PDF

Processing transitive nearest-neighbor queries in multi-channel access environments, Xiao ZHANG, Wang-Chien LEE, Prasnjit MITRA, and Baihua ZHENG Conference Proceeding Article

PDF

QuantTalent management, M. THULASIDAS Magazine Article

Link

Security analysis on a family of ultra-lightweight RFID authentication protocols, Tieyan LI, Guilin WANG, and Robert H. DENG Journal Article

Squeezing Long Sequence Data for Efficient Similarity Search, Guojie SONG, Bin Cui, Baihua ZHENG, Kunqing Xie, and Dongqing YANG Conference Proceeding Article

PDF

Integrating temporal difference methods and self‐organizing neural networks for reinforcement learning with delayed evaluative feedback, Ah-hwee TAN, Ning LU, and Dan XIAO Journal Article

PDF

Multimodal news story clustering with pairwise visual near-duplicate constraint, Xiao WU, Chong-wah NGO, and Alexander G. HAUPTMANN Journal Article

PDF

On Ranking Controversies in Wikipedia: Models and Evaluation, Ba-Quy VUONG, Ee Peng LIM, Aixin SUN, Minh-Tam LE, Hady Wirawan LAUW, and Kuiyu CHANG Conference Proceeding Article

PDF

Perceptions becoming reality: Bridging the market knowledge gap, Siu Loon HOE Journal Article

Advances of computational intelligence in industrial systems publisher, Ying LIU, Aixin SUN, Han Tong LOH, Wen Feng LU, and Ee Peng LIM Edited Book

PDF

A Growth-Theoretic Empirical Analysis of Simultaneity in Cross-National E-Commerce Development, Shu-Chun HO, Robert J. KAUFFMAN, and Ting-Peng LIANG Conference Proceeding Article

Link

A Journey into the IT Jungle, Benjamin GAN, Yeow Leong LEE, and Lian Chee KOH Book

Link

A Multiple Bits Watermark for Relational Data, Yingjiu LI, Huiping GUO, and Shuhong WANG Journal Article

PDF

Benford and your taxes, Manoj THULASIDAS Magazine Article

PDF

Collective Outsourcing to Market (COM): A Market-Based Framework for Information Supply Chain Outsourcing, Fang FANG, Zhiling GUO, and Andrew B. WHINSTON Journal Article

PDF

Columbia University/VIREO-cityU/IRIT TRECVID2008 high-level feature extraction and interactive video search, Shih-Fu CHANG, Junfeng HE, Yu-Gang JIANG, Elie EL KHOURY, Chong-wah NGO, Akira YANAGAWA, and Eric ZAVESKY Conference Paper

Computer Worms, Detection and Defense, R. COLE and Chao-Hsien CHU Encyclopaedia

PDF

Concept detection: Convergence to local features and opportunities beyond, Shih-Fu CHANG, Junfeng HE, Yu-Gang JIANG, Elie EL KHOURY, Chong-wah NGO, Akira YANAGAWA, and Eric ZAVESKY Conference Paper

Link

Container Assignment and Yard Crane Deployment in a Contain Terminal: A Case Study, Nang Laik MA and Eleni Hadjiconstantinou Journal Article

Database Watermarking: A Systematic View, Yingjiu LI Book Chapter

Link

Designing Online Selling Mechanisms: Transparency Levels and Prices, N. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article

Link

Developing Rich Insights on Public Internet Firm Entry and Exit Based on Survival Analysis and Data Visualization, Robert J. KAUFFMAN and Bin WANG Book Chapter

PDF

Document selection for extracting entity and relationship instances of terrorist events, Zhen SUN, Ee Peng LIM, Kuiyu CHANG, Maggy Anastasia Suryanto, and Rohan Kumar Gunaratna Book Chapter

Does IT Human Resource Matter? An Empirical Study on the Non-Linear Relations among Strategic IT Professionals, Investment Intensity, and Firm Performance, Nan HU, Ling LIU, and Daniel CHEN Conference Paper

ECRA co-editors' introduction for volume 7, issue 4, Robert J. KAUFFMAN, Patrick Y. K. Chau, Terry R. Payne, and J. Christopher Westland Editorial

Effective Video Event Detection Via Subspace Projection, Jialie SHEN, Dacheng Tao, and Xuelong LI Conference Proceeding Article

PDF

Enhancing recursive supervised learning using clustering and combinatorial optimization (RSL-CC), Kiruthika RAMANATHAN and Sheng Uei GUAN Book Chapter

PDF

Face Annotation using Transductive Kernel Fisher Discriminant, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Journal Article

PDF

Factors affecting the information quality of personal web portfolios, P. KATERATTANAKUL and Keng SIAU Journal Article

PDF

Flirting with a flourish, Manoj THULASIDAS News Article

Link

GIS Issues and Applications, Robert J. Kauffman Encyclopaedia

Link

High Tech, High Touch: The Effect of Employee Skills and Customer Heterogeneity on Customer Satisfaction with Enterprise System Support Services, Narayan RAMASUBBU, Sunil Mithas, and M. S. Krishnan Journal Article

Impact of IS on Market Structure and Function – Developing and Testing Theories., E.K. Clemons, R.D. Dewan, and Robert John KAUFFMAN Journal Article

Is Blog Value Relevant, Nan HU, Ling LIU, and Arindam Tripathy Conference Paper

Market Structure and Innovation in Dynamic Markets, Mei LIN, A. Yurko, and Andrew B. WHINSTON Conference Proceeding Article

PDF

Multi-Echelon Repairable Item Inventory System with Limited Repair Capacity under Nonstationary Demands, Hoong Chuin LAU and Huawei SONG Journal Article

Link

Not All Agents are Equal: Scaling up Distributed POMDPs for Agent Networks, Janusz MARECKI, Tapana GUPTA, Pradeep Reddy VARAKANTHAM, Milind Tambe, and Makoto Yokoo Conference Proceeding Article

Overcoming Self-Selection Biases in Online Product Reviews, Nan HU, Paul Pavlou, and Jennifer ZHANG Conference Paper

PDF

Private Query on Encrypted Data in Multi-User Setting, Feng BAO, Robert H. DENG, Xuhua DING, and Yanjiang YANG Conference Proceeding Article

PDF

Probabilistic sales forecasting for Small and Medium-Size Business Operations, Randall E. DURAN Book Chapter

Link

Protecting business intelligence and customer privacy while outsourcing data mining tasks, Ling QIU, Yingjiu LI, and Xintao Wu Journal Article

Risk Management of IT Services Portfolios: The Profit-at-Risk Approach., Robert John KAUFFMAN and R. Sougstad Journal Article

Link

Service-Oriented Technology and Management: Perspectives on Research and Practice for the Coming Decade, Haluk DEMIRKAN, Robert J. Kauffman, Jamshid A. Vayghan, Hans-Geog Fill, D. Karagiannis, and P. Maglio Journal Article

Single- and multi-order Neurons for recursive unsupervised learning, Kiruthika RAMANATHAN and Sheng Uei GUAN Book Chapter

Link

Teaching Business Modeling using Spreadsheets, Thin Yin LEONG and Michelle L. F. CHEONG Journal Article

Link

The Economics of Mobile Payments: Understanding Stakeholder Issues for an Emerging Financial Technology, Yoris A. AU and Robert J. Kauffman Journal Article

Link

The Emerging Role of Vertical Search Engines in Travel Distribution: A Newly Vulnerable Electronic Markets Perspective, N. F. Granados, Robert John KAUFFMAN, and B. King Conference Proceeding Article