The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2005

PDF

Walverine: A walrasian trading agent, Shih-Fen CHENG, Evan LEUNG, Kevin M. LOCHNER, Kevin O'MALLEY, Daniel M. REEVES, Julian L. SCHVARTZMAN, and Michael P. WELLMAN Journal Article

Link

An Attribute-Based Access Matrix Mode, Xinwen ZHANG, Yingjiu LI, and Divya Nalla Conference Proceeding Article

Link

CORE: A search and browsing tool for semantic instances of web sites, Myo-Myo NAING, Ee Peng LIM, and Robert CHIANG Conference Proceeding Article

Link

Deque: Querying the deep web, Denis SHESTAKOV, Sourav S. BHOWMICK, and Ee Peng LIM Journal Article

Link

DoS-resistant access control protocol with identity confidentiality for wireless networks, Zhiguo WAN, Bo ZHU, Robert H. DENG, Feng BAO, and A. L. ANANDA Conference Proceeding Article

PDF

Effect of training datasets on support vector machine prediction of protein-protein interactions, Siaw Ling LO, Cong Zhong CAI, Maxey CHUNG, and Yu Zong CHEN Journal Article

PDF

Evaluation of MPEG-4 IPMP Extension, Hwee Hwa PANG and Yongdong WU Conference Proceeding Article

PDF

Fingerprinting relational databases: Schemes and specialities, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Journal Article

PDF

MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality Constraints, Inseok HWANG, Qi HAN, and Archan MISRA Conference Proceeding Article

Link

Rational Expectations, Optimal Control and Information Technology Adoption, Yoris A. AU and Robert J. KAUFFMAN Journal Article

Rational Expectations, Optimal Control and Information Technology Adoption., Y. Au and Robert John KAUFFMAN Journal Article

PDF

Scheduling queries to improve the freshness of a website, Haifeng LIU, Wee-Keong NG, and Ee Peng LIM Journal Article

PDF

Video text detection and segmentation for optical character recognition, Chong-wah NGO and Chi-Kwong CHAN Journal Article

PDF

Video summarization and scene detection by graph modeling, Chong-wah NGO, Yu-Fei MA, and Hong-Jiang ZHANG Journal Article

Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article

A Genetic Algorithm for Layered Multi-Source Video Distribution, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper

PDF

A Multi-Agent Approach for Solving Optimization Problems involving Expensive Resources, Hoong Chuin LAU and H. WANG Conference Proceeding Article

Link

An Effective Customization Procedure with Configurable Standard Models, Hyun Jung LEE and Jae Kyu LEE Journal Article

PDF

Applying scenario-based design and claim analysis to the design of a digital library of geography examination resources, Yin-Leng THENG, Dion Hoe-Lian GOH, Ee Peng LIM, Zehua LIU, Ming YIN, Natalie Lee-San PANG, and Patricia Bao-Bao WONG Journal Article

Association Rule Mining, Yew-Kwong WOON, Wee-Keong NG, and Ee Peng LIM Encyclopaedia

Beyond the Hype of Frictionless Markets: Evidence of Heterogeneity in Price Rigidity on the Internet, M. Bergen, Robert John KAUFFMAN, and D.W. Lee Journal Article

Link

Conflicts in teamwork: Hybrids to the rescue, Milind TAMBE, Emma Bowring, H. Jung, G. Kaminka, Rajiv Maheswaran, Janusz Marecki, P. J. Modi, Ranjit Nair, Jonathan Pearce, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article

Link

Discovery of concept entities from web sites using web unit mining, Ming YIN, Dion Hoe-Lian GOH, and Ee Peng LIM Journal Article

Elements of Financial Risk Management for Grid and Utility Computing, Giorgos CHELIOTIS and C. KENYON Book Chapter

PDF

Exploring bit-difference for approximate KNN search in high-dimensional databases, Bin Cui, Heng Tao Shen, Jialie SHEN, and Kian-Lee Tan Conference Paper

Link

Finding and Classifying Web Units in Web Sites, Ee Peng LIM and Aixin SUN Journal Article

Implementation of next generation Digital Libraries, Ee Peng LIM and San-Yih HWANG Book Chapter

Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article

Learning plans with patterns of actions in bounded-rational agents, Subagdja B. and Sonenberg L. Book

PDF

Linear correlation discovery in databases: A data mining approach, Cecil CHUA, Roger Hsiang-Li CHIANG, and Ee Peng LIM Journal Article

Link

Location estimation techniques (determination and prediction) techniques in smart environments, Archan MISRA and Sajal K. DAS Book Chapter

Mobile Cache Management, Jianliang XU, Haibo Hu, Xueyan TANG, and Baihua ZHENG Book Chapter

Link

Networked Distributed POMDPs: A Synthesis of Distributed Constraint Optimization and POMDPs, Ranjit NAIR, Pradeep Reddy VARAKANTHAM, Milind Tambe, and Makoto Yokoo Conference Proceeding Article

Link

New Directions in E-Business Management Research: Exploring Competitive Strategy, Economics and IT Issues: Guest Editors’ Introduction, Robert John KAUFFMAN and Rahul TELANG Editorial

Link

On Efficient Music Genre Classification, Jialie SHEN, Shepherd John, and Ngu Ahh Conference Proceeding Article

PDF

Ontology-assisted mining of RDF documents, Tao JIANG and Ah-hwee TAN Book Chapter

oPlexus - A Distributed Platform for IS Research and Education, Y. HUANG, Mei LIN, Andrew B. WHINSTON, and A. GUPTA Conference Proceeding Article

PDF

Partnering for perfection: An economics perspective on B2B electronic market strategic alliances, Qizhi DAI and Robert J. KAUFFMAN Book Chapter

Link

Protarget: Automatic Prediction of Protein Structure Novelty, Ori SASSON and Michal Linial Journal Article

Link

Protonet 4.0: A Hierarchical Classification of One Million Protein Sequences, Noam KAPLAN, Ori SASSON, Uri Inbar, Moriah Friedlich, Menachem Fromer, Hillel Fleischer, Elon Portugaly, Nathan Linial, and Michal Linial Journal Article

PDF

Robust Temporal Constraint Networks, Hoong Chuin LAU, Thomas Ou, and Melvyn Sim Conference Proceeding Article

Link

Rule Identification from Web Pages by the XRML Approach, Juyoung KANG and Jae Kyu LEE Journal Article

Link

Securing Credit Card Transactions with One-Time Payment Scheme, Yingjiu LI and Xinwen ZHANG Journal Article

Securing Jpeg2000 Code-Streams, Robert Huijie Deng, Yongdong Wu, and Di Ma Book Chapter

Link

Securing JPEG2000 code-streams, Robert H. DENG, Yongdong Wu, and Di MA Book Chapter

PDF

Security of an ill-posed operator based scheme for image authentication, Yongdong WU and Robert H. DENG Journal Article

Link

Semantic-Sensitive Classification for Large Image Library, Jialie SHEN, John Shepherd, and AHH Ngu Conference Proceeding Article

PDF

Technology competition and optimal investment timing: A real options perspective, Robert J. KAUFFMAN and X. LI Journal Article

Ten Lessons from Finance for Commercial Sharing of IT Resources, Giorgos CHELIOTIS, C. KENYON, and R. Buyya Book Chapter

PDF

The Effects of Shilling on Final Bid Prices in Online Auctions, Robert J. KAUFFMAN and Charles A. Wood Journal Article

Link

The International Diffusion of Mobile Commerce: A Coupled Hazard Approach, Robert J. KAUFFMAN and A. A. Techatassanasoontorn Journal Article

Link

The Learning Curve of Knowledge Workers in a Computing Call Cente, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Journal Article

Towards Inferring Protein Interactions: Challenges and Solutions, Y. Zhang, H. Zha, Chao-Hsien Chu, X. Ji, and X. W Chen Journal Article

Towards Semantically Meaningful Feature Spaces for Efficient Indexing in Large Image Databases, Anne H. H. NGU, Jialie SHEN, and John Shepherd Book Chapter

Submissions from 2004

Recursive percentage based hybrid pattern (RPHP) training for curve fitting, Sheng Uei GUAN and Kiruthika RAMANATHAN Conference Proceeding Article

ASPs versus MOTS Software Solutions, Dan MA and Abraham Seidmann Conference Paper

PDF

Automatic model structuring from text using biomedical ontology, Joshi R., Li X., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article

Classifying biomedical citations without labeled training examples, Li X., Joshi R., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article

Link

Correlating Summarization of Multi-source News with K-Way Graph Bi-clustering, Ya ZHANG, Chao-Hsien CHU, Xiang JI, and Hongyuan ZHA Journal Article

Cost-effectiveness analysis of colorectal cancer screening strategies in singapore: A dynamic decision analytic approach, Wong S., Leong A., and Tze-Yun LEONG Conference Proceeding Article

PDF

Design lessons on access features in PAPER, Yin-Leng THENG, Dion Hoe-Lian GOH, Ming YIN, Eng-Kai Suen, and Ee Peng LIM Conference Proceeding Article

PDF

High performance P300 speller for brain-computer interface, Cuntai GUAN, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article

Information Security Health Rating for Enterprises, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Conference Paper

IT Orientation, CIO reporting structure and Firm Performance: To Whom Should the CIO Report?, Rajiv BANKER, Nan HU, Jerry Luftman, and Paul Pavlou Conference Paper

PDF

Method for identifying individuals, Manoj THULASIDAS Patent

Link

New efficient user identification and key distribution scheme providing enhanced security, Yanjiang YANG, Shuhong WANG, Feng BAO, Jie WANG, and Robert H. DENG Journal Article

PDF

On Security Notions for Steganalysis, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, Hyungjun KIM, and Jongin LIM Conference Proceeding Article

Operations Research Approach Towards Layered Multi-Source Video Delivery, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper

PDF

Supporting field study with personalized project spaces in a geographical digital library, Ee Peng LIM, Aixin SUN, Zehua LIU, John HEDBERG, Chew-Hung CHANG, Tiong-Sa TEH, Dion Hoe-Lian GOH, and Yin-Leng THENG Conference Proceeding Article

Translation initiation sites prediction with mixture gaussian models, Guoliang Li, Tze-Yun LEONG, and Louxin Zhang Book Chapter

PDF

Vertical sensitivity for the information security health rating of enterprises, Arcot Desai NARASIMHALU, Nagarajan DAYASINDHU, and Raghavan SUBRAMANIAN Conference Paper

Leading and managing people in the dynamic organisation, Siu Loon HOE Book Review

Organisational behaviour: The state of the science, Siu Loon HOE Book Review

PDF

Accommodating Instance Heterogeneities in Database Integration, Ee Peng LIM and Roger Hsiang-Li CHIANG Journal Article

PDF

Anonymous Secure Routing in Mobile Ad-Hoc Networks, Bo ZHU, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

A periodic-review inventory model with application to the continuous-review obsolescence problem, Yuyue SONG and Hoong Chuin LAU Journal Article

PDF

Corrective Maintenance Optimization in an Air Force, Hoong Chuin LAU, K. Y. Neo, and W. C. Wan Conference Proceeding Article

PDF

Finding Constrained Frequent Episodes Using Minimal Occurrences, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article

PDF

Job Scheduling with Unfixed Availability Constraints, Hoong Chuin LAU and C. ZHANG Conference Proceeding Article

PDF

Logistics Network Design with Differentiated Delivery Lead Time: A Chemical Industry Case Study, Michelle Lee Fong CHEONG, Rohit Bhatnagar, and Stephen C. Graves Working Paper

PDF

On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article

PDF

Spatial Queries in Wireless Broadcast Systems, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article

PDF

The D-tree: An index structure for planar point queries location-based wireless services, Jianliang XU, Baihua ZHENG, Wang-chien LEE, and Dik Lun LEE Journal Article

PDF

Two-Echelon Repairable Item Inventory System with Limited Repair Capacity under Nonstationary Demands, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article

A robust method for recovering geometric proxy from multiple panoramic images, Ada S. K. WAN, Angus M. K. SIU, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article

Link

Gray-Box Extraction of Execution Graphs for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

PDF

airConn: A framework for tiered services in public wireless LAN hot spots, A. ACHARYA, C. Bisdikian, Archan MISRA, and Y. Ko Magazine Article

Link

An Entrepreneur's Dilemma: To SWOT or not to SWOT, A. Desai CHAANAKYA and Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

A Novel Log-based Relevance Feedback Technique in Content-based Image Retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article

PDF

Blocking reduction strategies in hierarchical text classification, Ee Peng LIM, Aixin SUN, Wee-Keong NG, and Jaideep SRIVASTAVA Journal Article

PDF

Clip-based similarity measure for hierarchical video retrieval, Yuxin PENG and Chong-wah NGO Conference Proceeding Article

PDF

Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem", Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Journal Article

Competitive Strategy, Economics and Information Systems., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article

PDF

Compliant Encryption of JPEG2000 Codestreams, Yongdong WU and Robert H. DENG Conference Proceeding Article

PDF

Deformable object model matching by topological and geometric similarity, Kwok-Leung TAN, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article

PDF

Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks, Arup ACHARYA, Archan MISRA, and Sorav BANSAL Conference Proceeding Article

PDF

Dynamic Access Control for Multi-Privileged Group Communications, Di MA, Robert H. DENG, Yongdong WU, and Tieyan LI Conference Proceeding Article

Exploring Stickiness of Information Technology Employee, Nan HU, Jenny Zhong, and ling LIU Conference Proceeding Article

PDF

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN, Tieyan LI, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article

PDF

Improving transliteration with precise alignment of phoneme chunks and using contextual features, Wei GAO, Kam-Fai WONG, and Wai LAM Conference Proceeding Article