The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2008

PDF

Privacy Engine for Context-Aware Enterprise Application Services, Marion BLOUNT, John DAVIS, Maria EBLING, William JEROME, Barry LEIBA, Xuan LIU, and Archan MISRA Conference Proceeding Article

PDF

Robust regularized Kernel regression, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Journal Article

PDF

Scaling up multi-agent reinforcement learning in complex domains, Dan XIAO and Ah-hwee TAN Conference Proceeding Article

PDF

Text Cube: Computing IR Measures for Multidimensional Text Database Analysis, Cindy Xinde LIN, Bolin DING, Jiawei HAN, Feida ZHU, and Bo ZHAO Conference Proceeding Article

Link

Value-at-Risk in Services-Oriented Systems and Technology Investments: A Framework for Managing Project Portfolio Uncertainties, Robert J. KAUFFMAN and Ryan Sougstad Journal Article

Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer, Pedro PERIS-LOPEZ, Julio Hernandez-Castro, Juan Estevez-Tapiador, Tieyan LI, and Yingjiu LI Conference Paper

Writing for publication in biomedical informatics., D. Aronsky, Tze-Yun LEONG, J. Talmon, R. Haux, Safran, and C. Conference Proceeding Article

PDF

A neural network model for a hierarchical spatio-temporal memory, Kiruthika RAMANATHAN, Luping SHI, Jianming LI, Kian Guan LIM, Zhi Ping ANG, and Chong Chong TOW Conference Proceeding Article

PDF

A new framework for the design and analysis of identity-based identification schemes, Guomin YANG, Jing CHEN, Duncan S. WONG, Xiaotie DENG, and Dongsheng WANG Journal Article

PDF

Beyond semantic search: What you observe may not be what you think, Chong-wah NGO, Yu-Gang JIANG, Xiaoyong WEI, Wanlei ZHAO, Feng WANG, Xiao WU, and Hung-Khoon TAN Conference Paper

PDF

Bias and Controversy in Evaluation Systems, Hady Wirawan LAUW, Ee Peng LIM, and Ke WANG Journal Article

Link

Determining Error Bounds for Spectral Filtering Based Reconstruction Methods in Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Journal Article

PDF

Market Liquidity Provision for On-Demand Computing, Zhiling GUO Conference Proceeding Article

PDF

Modality Mixture Projections for Semantic Video Event Detection, Jialie SHEN, Dacheng TAO, and Xuelong LI Journal Article

PDF

Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect, Liang GU, Xuhua DING, Robert H. DENG, Yanzhen ZOU, Bing XIE, Weizhong SHAO, and Hong MEI Conference Proceeding Article

Ontology-Based Compatibility Checking for Web Service Configuration Management, Qianhui (Althea) LIANG and M. N. Huhns Conference Proceeding Article

PDF

Profile-guided program simplification for effective testing and analysis, Lingxiao JIANG and Zhendong SU Conference Proceeding Article

PDF

Two-factor mutual authentication based on smart cards and passwords, Guomin YANG, Duncan S. WONG, Huaxiong WANG, and Xiaotie DENG Journal Article

PDF

Virtual world affordances: Enhancing brand value, S. PARK, Fiona Fui-hoon NAH, D. DEWESTER, B. ESCHENBRENNER, and S. JEON Journal Article

Link

Distribution-Based Similarity Measures for Multi-Dimensional Point Set Retrieval Applications, Jie SHAO, Zi HUANG, Heng Tao SHEN, Jialie SHEN, and Xiaofang ZHOU Conference Proceeding Article

Link

A Federated UDDI System for Concurrent Access to Service Data, Qianhui (Althea) LIANG and J. Chung Conference Proceeding Article

Link

A Service-Oriented Development Platform with Precise Service Discovery, G. LIU, Xindong WU, E. TANG, Qianhui (Althea) LIANG, and Y. LI Conference Proceeding Article

Link

Robust Application Level QoS Management in Service-Oriented Systems, Qianhui (Althea) LIANG, Hoong Chuin LAU, and Xindong WU Conference Proceeding Article

Optimal Routing Policy for Taxi Queuing, Shih-Fen CHENG, Darshan Santani, and C. Jason WOODARD Presentation

PDF

Accelerating near-duplicate video matching by combining visual similarity and alignment distortion, Hung-Khoon TAN, Xiao WU, Chong-wah NGO, and Wan-Lei ZHAO Conference Proceeding Article

PDF

An effective approach to 3D deformable surface tracking, Jianke ZHU, Steven C. H. HOI, Zenglin XU, and Michael R. LYU Conference Proceeding Article

Link

A Secure and Synthesis Tele-Ophthalmology System, Zhuo WEI, Yongdong Wu, Robert H. DENG, Shengsheng YU, Haixia YAO, Zhigang ZHAO, Lek Heng NGOH, Tock Han LIM, and Eugenie POH Journal Article

PDF

A study of early stage game design and prototyping, Brien COLWELL, Richard C. DAVIS, and James A. Landay Report

PDF

Bayesian Tensor Approach for 3-D Face Modeling, Dacheng TAO, Mingli SONG, Xuelong LI, Jialie SHEN, Jimeng SUN, Xindong WU, Christos Faloutsos, and Stephen J. Maybank Journal Article

Link

Binhunt: Automatically Finding Semantic Differences in Binary Programs, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection, Peng LI, Hyundo PARK, Debin GAO, and Jianming Fu Conference Proceeding Article

PDF

Comparison of online social relations in volume vs interaction: A case study of Cyworld, Hyunwoo CHUN, Haewoon KWAK, Young-Ho EOM, Yong-Yeol AHN, Sue MOON, and Hawoong. JEONG Conference Proceeding Article

PDF

Determining the number of BP neural network hidden layer units, Huayu SHEN, Zhaoxia WANG, Chengyao GAO, Juan QIN, Fubin YAO, and Wei XU Journal Article

Link

Evaluation of operational plans in container terminal yards using Discrete-Event Simulation, Nang Laik MA and Eleni Hadjiconstantinou Journal Article

PDF

Event detection with common user interests, Meishan HU, Aixin SUN, and Ee Peng LIM Conference Proceeding Article

PDF

Fusing semantics, observability, reliability and diversity of concept detectors for video search, Xiao-Yong WEI and Chong-wah NGO Conference Proceeding Article

Hierarchical Inter-Object Traces for Specification Mining, David LO and Shahar Maoz Conference Proceeding Article

PDF

Impacts of Information and Communication Technologies on Country Development: Accounting for Area Interrelationships, Robert J. KAUFFMAN and Ajay Kumar Journal Article

PDF

Leveraging Social Context for Searching Social Media, Marc SMITH, Vladimir BARASH, Lise GETOOR, and Hady W. LAUW Conference Proceeding Article

PDF

Link layer multicast using smart antennas: No client left behind, Souvik SEN, Jie XIONG, Rahul GHOSH, and Romit Roy CHOUDHURY Conference Proceeding Article

Link

Mining Specifications in Diversified Formats from Execution Traces, David LO Conference Proceeding Article

PDF

Model checking CSP revisited: Introducing a process analysis toolkit, Jun SUN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Modeling video hyperlinks with hypergraph for web video reranking, Hung-Khoon TAN, Chong-wah NGO, and Xiao WU Conference Proceeding Article

PDF

Near-Duplicate Keyframe Retrieval by Nonrigid Image Matching, Jianke ZHU, Steven C. H. HOI, Michael R. LYU, and Shuicheng YAN Conference Proceeding Article

Offering RSS Feeds: Will it Increase Website Profitability?, Dan MA Conference Paper

PDF

Ontology-based visual word matching for near-duplicate retrieval, Yu-Gang JIANG and Chong-wah NGO Conference Proceeding Article

PDF

Ontology enhanced web image retrieval: Aided by Wikipedia and spreading activation theory, Huan WANG, Xing JIANG, Liang-Tien CHIA, and Ah-hwee TAN Conference Proceeding Article

PDF

Output regularized metric learning with side information, Wei LIU, Steven C. H. HOI, and Jianzhuang LIU Conference Proceeding Article

PDF

Recursive pattern based hybrid supervised training, Kiruthika RAMANATHAN and Sheng Uei GUAN Book Chapter

PDF

Remote Attestation on Program Execution, Liang GU, Xuhua DING, Robert H. DENG, Bing Xie, and Hong MEI Conference Proceeding Article

PDF

Representative entry selection for profiling blogs, Jinfeng ZHUANG, Steven C. H. HOI, Aixin SUN, and Rong JIN Conference Proceeding Article

PDF

Resource-aware Video Multicasting via Access Gateways in Wireless Mesh Networks, Wanqing TU, Cormac J. SREENAN, Chun Tung CHOU, and Archan MISRA Conference Proceeding Article

Link

ROAD: An Efficient Framework for Location De-pendent Spatial Queries on Road Networks, Ken C. K. LEE, Wang-chien LEE, and Baihua ZHENG Conference Proceeding Article

PDF

Selection of concept detectors for video search by ontology-enriched semantic spaces, Xiao-Yong WEI, Chong-wah NGO, and Yu-Gang JIANG Journal Article

PDF

Spatio-temporal efficiency in a taxi dispatch system, Darshan SANTANI, Rajesh Krishna BALAN, and C. Jason WOODARD Report

PDF

Specification Mining of Symbolic Scenario-Based Models, David LO and Shahar Maoz Conference Proceeding Article

PDF

Specifying and verifying event-based fairness enhanced systems, Jun SUN, Yang LIU, Jin Song DONG, and Hai H. WANG Conference Proceeding Article

PDF

Specifying and verifying sensor networks: An experiment of formal methods, Jin Song DONG, Jing SUN, Jun SUN, Kenji TAGUCHI, and Xian ZHANG Conference Proceeding Article

PDF

Spreadsheet Data Resampling for Monte-Carlo Simulation, Thin Yin LEONG and Wee Leong LEE Journal Article

PDF

Structuring low-quality videotaped lectures for cross-reference browsing by video text analysis, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Journal Article

The evaluation of situational transaction trust in e-service environments, Yan WANG and Ee Peng LIM Conference Proceeding Article

PDF

Understanding Evolution in Technology Ecosystems, Gediminas Adomavicius, Jesse Bockstedt, Alok Gupta, and Robert J. Kauffman Journal Article

PDF

Using English information in Non-English web search, Wei GAO, Wei GAO, and Ming ZHOU Conference Proceeding Article

PDF

Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks, Yanjiang YANG, Robert H. DENG, Feng BAO, and Jianying ZHOU Conference Proceeding Article

Valid Scope Computation for Location-Dependent Spatial Query in Mobile Broadcast Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article

PDF

Video event detection using motion relativity and visual relatedness, Feng WANG, Yu-Gang JIANG, and Chong-wah NGO Conference Proceeding Article

Link

Adoption of Service Oriented Computing from the IT Professionals’ Perspective: An e-Government Case Study , Ilse BAUMGARTNER and Peter GREEN Conference Proceeding Article

PDF

A heuristic method for job-shop scheduling with an infinite wait buffer: From one-machine to multi-machine problems, Z. J. ZHAO, J. KIM, M. LUO, Hoong Chuin LAU, and S. S. GE Conference Proceeding Article

PDF

An Efficient PIR Construction using Trusted Hardware, Yanjiang YANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article

PDF

Cascade RSVM in Peer-to-Peer Network, Hock Hee ANG, Vivekanand Gopalkrishnan, Steven C. H. HOI, and Wee Keong NG Conference Proceeding Article

Link

Disclosure Analysis and Control in Statistical Databases, Yingjiu LI and Haibing LU Conference Proceeding Article

PDF

Distinguishing between FE and DDoS using Randomness Check, Hyundo PARK, Peng LI, Debin GAO, Heejo LEE, and Robert H. DENG Conference Proceeding Article

PDF

Do Online Reviews Affect Product Sales? The Role of Reviewer Characteristics and Temporal Effects, Nan HU, Ling LIU, and Jennifer ZHANG Journal Article

PDF

Generating robust schedules subject to resource and duration uncertainties, Na FU, Hoong Chuin LAU, and Fei XIAO Conference Proceeding Article

Network Effects and Embedded Options: Decision-Making under Uncertainty for Network Technology Investments., Robert John KAUFFMAN and A. Kumar Journal Article

PDF

Relative Importance, Specific Investment and Ownership in Interorganizational Systems., Kunsoo Han, Robert J. KAUFFMAN, and Barrie R. Nault Journal Article

PDF

Software nightmares, Manoj THULASIDAS Magazine Article

PDF

Special issue introduction: HCI studies in MIS, Fiona Fui-hoon NAH, Xiaowen FANG, Traci HESS, and Weiyin HONG Journal Article

PDF

Tagnsearch: Searching and navigating geo-referenced collections of photographs, Quang Minh NGUYEN, Thi Nhu Quynh KIM, Dion Hoe-Lian GOH, Yin-Leng THENG, Ee Peng LIM, Aixin SUN, Chew-Hung CHANG, and Kalyani CHATTERJEA Conference Proceeding Article

The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence, Ivan P. L. PNG, Chen-Yu WANG, and QIU-HONG WANG Journal Article

PDF

Tuning into the Digital Channel: Evaluating Business Model Fit for Internet Firm Survival, Robert J. KAUFFMAN and Bin WANG Journal Article

PDF

A Lightweight Buyer-Seller Watermarking Protocol, Yongdong WU and Hwee Hwa PANG Journal Article

Link

A Rule-Based Approach for Availability of Web Service, Qianhui (Althea) LIANG, Herman LAM, L. Narupiyakul, and P. Hung Conference Proceeding Article

PDF

Authenticating the Query Results of Text Search Engines, Hwee Hwa PANG and Kyriakos MOURATIDIS Conference Proceeding Article

Business Modeling with Spreadsheets : Problems, Principles, and Practice, Thin Yin LEONG and Michelle Lee Fong CHEONG Book

PDF

Classification in P2P Networks by Bagging Cascade RSVMs, Hock Hee ANG, Vikvekanand GOPALKRISHNAN, Steven C. H. HOI, Wee Keong NG, and Anwitaman DATTA Conference Proceeding Article

PDF

Critical success factors in SOA implementation, J. ERICKSON and Keng SIAU Conference Proceeding Article

PDF

Hierarchical Inter-object Traces for Specification Mining, David LO and Shahar Maoz Conference Proceeding Article

PDF

Impacts of social network structure on knowledge sharing in open source software development teams, Y. LONG and Keng SIAU Conference Proceeding Article

PDF

Integrating lightweight systems analysis into the unified process by using service responsibility tables, X. TAN, S. ALTER, and Keng SIAU Conference Proceeding Article

PDF

Knowledge Transfer Via Multiple Model Local Structure Mapping, Jing GAO, Wei FAN, Jing JIANG, and Jiawei HAN Conference Proceeding Article

PDF

Learning Outcomes for a Business Information Systems Undergraduate Program, Joelle ELMALEH, Steven MILLER, and Paul S. GOODMAN Journal Article

PDF

Mining Patterns and Rules for Software Specification Discovery, David LO and Siau-Cheng KHOO Conference Proceeding Article

PDF

Relationship preserving auction for repeated e-procurement, Park J., Lee J., and Lau H. Conference Proceeding Article

Relationship-Preserving E-Procurement Auction, Hoong Chuin LAU, Jong Han PARK, and Jae Kyu LEE Conference Proceeding Article

PDF

Simulating a smartboard by real-time gesture detection in lecture videos, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Journal Article

PDF

The Pricing Strategy Analysis for the Software-as-a-Service Business Model, Dan MA and Abraham SEIDMANN Conference Proceeding Article

Three dimensional image reconstruction for time-resolved diffuse optical tomography, H. J. Zhao, Zhaoxia WANG, Y. T. Jiang, F. Gao, Y. Tanikawa, and Y. Yamada Journal Article

Link

Utility Pricing Auction for Multi-Period Resource Allocation in Multi-Machine Flow Shop Problems, Hoong Chuin LAU, Zhengyi ZHAO, Shuzhi Sam Ge, and T. H. LEE Conference Proceeding Article

PDF

When ‘good good’ can be bad, M. THULASIDAS News Article