The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2007

PDF

Mining Colossal Frequent Patterns by Core Pattern Fusion, Feida ZHU, Xifeng YAN, Jiawei HAN, Philip S. YU, and Hong CHENG Conference Proceeding Article

PDF

Social network structures in open source software development teams, Y. LONG and Keng SIAU Journal Article

PDF

Summarizing Review Scores of "Unequal" Reviewers, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article

PDF

Vulnerability analysis of EMAP: An efficient RFID mutual authentication protocol, Tieyan LI and Robert H. DENG Conference Proceeding Article

Link

A software framework for fast prototyping of meta-heuristics hybridization, Hoong Chuin LAU, W. C. Wan, S. Halim, and K. Y. Toh Journal Article

PDF

Efficient algorithms for machine scheduling problems with earliness and tardiness penalties, Guang FENG and Hoong Chuin LAU Journal Article

PDF

Experiences with tracking the effects of changing requirements on Morphbank: A web-based bioinformatics application, Subhajit DATTA, Robert van Engelen, David GAITROS, and Neelima JAMMIGUMPULA Conference Proceeding Article

PDF

Malicious KGC attacks in certificateless cryptography, Man Ho AU, Jing CHEN, Joseph K. LIU, Yi MU, Duncan S. WONG, Guomin YANG, and Guomin YANG Conference Proceeding Article

PDF

Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article

PDF

TUBE (Text-cUBE) for discovering documentary evidence of associations among entities, Hady LAUW, Ee Peng LIM, and Hwee Hwa PANG Conference Proceeding Article

PDF

Valuing Information Technology Infrastructures: A Growth Options Approach, Qizhi Dai, Robert J. KAUFFMAN, and Salvatore T. March Journal Article

Link

Access control protocols with two-layer architecture for wireless networks, Zhiguo WAN, Robert H. DENG, Feng Bao, and A. L. Ananda Journal Article

PDF

Clustering and combinatorial optimization in recursive supervised learning, Kiruthika RAMANATHAN and Sheng Uei GUAN Journal Article

Link

Equipping "Smart Devices" With Public Key Signatures, Xuhua DING, D. Mozzacchi, and Gene Tsudik Journal Article

PDF

Lecture video enhancement and editing by integrating posture, gesture, and text, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Journal Article

PDF

Logistics Network Design with Supplier Consolidation Hubs and Multiple Shipment Options, Michelle L. F. Cheong, Rohit Bhatnagar, and Stephen C. Graves Journal Article

PDF

Mining generalized associations of semantic relations from textual web content, Tao JIANG, Ah-hwee TAN, and We WANG Journal Article

PDF

Moving-object detection, association, and selection in home videos, Zailiang PAN and Chong-wah NGO Journal Article

PDF

Quality of service routing strategy using supervised genetic algorithm, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, and Huayu SHEN Journal Article

Link

Temporal classification of multichannel near-infrared spectroscopy signals of motor imagery for developing a brain-computer interface, R. Sitaram, H. Zhang, C. Guan, Manoj THULASIDAS, Y. Hoshi, A. Ishikawa, K. Shimizu, and N. Birbaumer Journal Article

PDF

Towards efficient planning for real world partially observable domains, Pradeep R. VARAKANTHAM PhD Dissertation

Hybrid outcome prediction model for severe traumatic brain injury, Boon Chuan Pang, Vellaisamy Kuralmani, Rohit Joshi, Hongli Yin, Kah Keow Lee, Beng Ti Ang, Jinyan Li, Tze-Yun LEONG, and Ivan Ng Journal Article

PDF

A Growth Theory Perspective on the International Diffusion of Electronic Commerce., S.C Ho, Robert John KAUFFMAN, and T.P. Liang Journal Article

An Empirical Study of Query Effectiveness Improvement via Multiple Visual Feature Integration, Jialie SHEN, John Shepherd, and Anne H. H. Ngu Journal Article

Link

An Improved Fuzzy Clustering Method for Cellular Manufacturing , J. LI, Chao-Hsien CHU, Y. WANG, and W. YAN Journal Article

PDF

An improvement heuristic for the timetabling problem, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Journal Article

PDF

Anticipatory event detection via classification, He QI, Kuiyu CHANG, and Ee Peng LIM Journal Article

Applying Information Economics to Corporate Strategy., E.K. Clemons, R.D. Dewan, and Robert John KAUFFMAN Journal Article

PDF

BusinessFinder: Harnessing presence to enable live Yellow Pages for small, medium and micro mobile businesses, D. CHAKRABORTY, K. Dasgupta, S. Mittal, Archan MISRA, C. OBERLE, A. GUPTA, and E. NEWMARK Magazine Article

Link

Chaining Watermarks for Detecting Malicious Modifications to Streaming Data, Huiping GUO, Yingjiu LI, and Sushil Jajodia Journal Article

Claim: An Efficient Method for Relaxed Frequent Closed Itemsets Mining over Stream Data, Guojie SONG, Dongqing YANG, Bin Cui, Baihua ZHENG, and Tengjiao WANG Conference Proceeding Article

Link

Defense Against Packet Injection in Ad Hoc Networks, Qijun GU, Peng LIU, Chao-Hsien CHU, and Sencun ZHU Journal Article

PDF

Direct code access in self-organizing neural networks for reinforcement learning, Ah-hwee TAN Conference Proceeding Article

Link

Dispatching Vehicles in a Mega Container Terminal, Ebru K. Bish, Frank Y Chen, Thin Yin LEONG, Barry L Nelson, Jonathan W. C. Ng, and David Simchi-Levi Book Chapter

Link

ECTracker - An Efficient Algorithm for Haplotype Analysis and Classification, Li Lin, Limsoon Wong, Tze-Yun LEONG, and Lai Pohsan Conference Proceeding Article

PDF

Editors' Introduction, Robert John KAUFFMAN, Jae Kyu LEE, and Norman M. SADEH Editorial

Editors' Introduction: ECRA Vol. 6, No. 3, Patrick Y. K. Chau, Robert J. KAUFFMAN, Norman M. Sadeh, and J. Christopher Westland Editorial

Editors' Introduction: ECRA Vol. 6, No. 4, Patrick Y. K. Chau, Robert J. KAUFFMAN, Norman M. Sadeh, and J. Christopher Westland Editorial

PDF

Editors' Introduction: ECRA Vol. 6, No. 4, Patrick Y. K. CHAU, Robert J. KAUFFMAN, Norman M. SADEH, and J. Christopher WESTLAND Journal Article

Global Sourcing of IT Services: Necessary Evil or Blessing in Disguise?, J. Cederlund, Robert John KAUFFMAN, R. Kohli, M. L. Markus, N. Melville, and P. A. Pavlou Journal Article

PDF

Image segmentation using multi-coloured active illumination, Tze Ki (XU Shuqi) KOH, Nicholas MILES, and Barrie HAYES-GILL Journal Article

PDF

Integrating semantic templates with decision tree for image semantic learning, Ying LIU, Dengsheng ZHANG, Guojun LU, and Ah-hwee TAN Conference Proceeding Article

PDF

Introduction: special issue for the selected papers in the fourth international conference on Intelligent Multimedia Computing and Networking (IMMCN) 2005, Chong-wah NGO and Hong-Va LEONG Journal Article

Link

IT-Enabled Transparent Electronic Markets: The Case of the Air Travel Industry, N. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article

PDF

Iterated Weaker-than-Weak Dominance, Shih-Fen CHENG and Michael P. WELLMAN Conference Proceeding Article

Link

Letting loose a SPIDER on a network of POMDPs: Generating quality guranteed policies, Pradeep Reddy VARAKANTHAM, Janusz Marecki, Makoto Yokoo, and Milind Tambe Conference Proceeding Article

PDF

Mining multiple visual appearances of semantics for image annotation, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article

Link

Modeling and Analysis of Bandwidth Competition in 802.11 Networks, Qijun GU, Chao-Hsien CHU, and Peng LIU Journal Article

Link

Modeling Internet firm survival using Bayesian dynamic models with time-varying coefficients, Sudipto BANERJEE, Robert J. Kauffman, and Bin WANG Journal Article

Link

Monte Carlo Spreadsheet Simulation using Resampling, Thin Yin LEONG Journal Article

Link

PASTA: Deriving Rich Presence for Converged Telecommunications Network Applications, Eran BELINSKY, Natalia MARMASSE, Eyal SONSINO, Maria EBLING, William JEROME, Archan MISRA, Daby SOW, and Sune JAKOBSSON Conference Proceeding Article

Link

Preserving Privacy in Association Rule Mining with Bloom Filters, Ling QIU, Yingjiu LI, and Xintao Wu Journal Article

Link

Preserving privacy in on-line analytical processing (OLAP), Lingyu WANG, Sushil JAJODIA, and Duminda WIJESEKERA Book

Link

Quality of service in mobile ad hoc networks: Myth or reality?, W.K.G. SEAH and Hwee Xian TAN Encyclopaedia

PDF

Real-Time Supply Chain Control via Multi-Agent Adjustable Autonomy, Hoong Chuin LAU, Lucas Agussurja, and Ramesh Thangarajoo Journal Article

PDF

Searching and Tagging: Two Sides of the Same Coin?, Qiaozhu MEI, Jing JIANG, Hang SU, and ChengXiang ZHAI Report

Link

Simpler Spreadsheet Simulation of Multi-Server Queues, Thin Yin LEONG Journal Article

Link

Singapore's e-Payment venture into Asia: eNETS. In Lee, Jae Kyu; Gan, Benjamin; Sethi, Vijay (Eds.) Premier e-Business cases from Asia, Chapter 15. Singapore: Pearson Prentice Hall., GAN, Benjamin Case

PDF

Solving the teacher assignment-course scheduling problem by a hybrid Algorithm, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Journal Article

Technique for hiding mobile node's location movement information in mobile IP, Robert H. DENG, Ying QIU, Jianying Zhou, and Feng Bao Journal Article

PDF

The philosophy of special relativity: A comparison between Indian and Western interpretations, Manoj THULASIDAS Journal Article

Link

The Unreal Universe: A Study in Applied Spirituality, Manoj THULASIDAS Book

PDF

Towards Efficient Computation of Quality Bounded Solutions in POMDPs: Expected Value Approximation and Dynamic Disjunctive Beliefs, Pradeep Reddy VARAKANTHAM, Rajiv Maheswaran, Tapana GUPTA, and Milind Tambe Conference Proceeding Article

PDF

Value-at-Risk in IT Services Contracts, Robert J. KAUFFMAN and Ryan SOUGSTAD Conference Proceeding Article

Wireless Network Design: A Space-Filling Curve Approach, T. Y. Leong and Chao-Hsien CHU Journal Article

Submissions from 2006

Link

Anomaly Based Webphishing Page Detection, Y. PAN and Xuhua DING Conference Proceeding Article

A Set-based Hybrid Approach (SHA) for MRI segmentation, Liu Jiang, Tze-Yun LEONG, Kin Ban Chee, Boon Pin Tan, B. Shuter, and Shih-chang Wang Conference Proceeding Article

PDF

Clique percolation for finding naturally cohesive and overlapping document clusters, Wei GAO, Kam-Fai WONG, Yunqing XIA, and Ruifeng XU Conference Proceeding Article

Context-Based Service Discovery for Enhanced Learning Objects in P2P Networks, Qianhui (Althea) LIANG and Z. WU Conference Proceeding Article

PDF

Continuous monitoring of kNN queries in wireless sensor networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Conference Proceeding Article

PDF

CoSIGN: A parallel algorithm for coordinated traffic signal control, Shih-Fen CHENG, Marina A. EPELMAN, and Robert L. SMITH Journal Article

PDF

Designing web sites for customer loyalty across business domains: A multilevel analysis, S. Mithas, Narayanasamy Ramasubbu, M. S. Krishnan, and C. Fornell Journal Article

Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract), Haibing LU, Yingjiu LI, and Xintao Wu Conference Proceeding Article

PDF

Dynamic multi-linked negotiations in multi-echelon production scheduling networks, Hoong Chuin LAU, Guan Li SOH, and Wee Chong WAN Conference Proceeding Article

Link

Effect of Web Design Characteristics on Customer Loyalty: A Multilevel Analysis, Sunil MITHAS, Narayan RAMASUBBU, M. S. Krishnan, and Fornell Claes Journal Article

Link

Feature-Based Similarity Search in Graph Structures, Xifeng YAN, Feida ZHU, Philip S. YU, and Jiawei HAN Journal Article

PDF

Finding a length-constrained maximum-sum or maximum-density subtree and its application to logistics, Hoong Chuin LAU, Trung Hieu NGO, and Bao Nguyen Nguyen Journal Article

PDF

Formal analysis and systematic construction of two-factor authentication scheme, Guomin YANG, Duncan S. WONG, Huaxiong WANG, and Xiaotie DENG Conference Proceeding Article

PDF

Measuring Qualities of Articles Contributed by Online Communities, Ee Peng LIM, Ba-Quy VUONG, Hady W. LAUW, and Aixin SUN Conference Proceeding Article

PDF

Online advertising by the comparison challenge approach, Jae Wong LEE and Jae Kyu LEE Journal Article

PDF

On the lower bound of local optimums in k-means algorithms, Zhenjie ZHANG, Bing Tian DAI, and Anthony K.H. TUNG Conference Proceeding Article

PDF

Plans as products of learning, Samin KARIM, Budhitama SUBAGDJA, and Liz SONENBERG Conference Proceeding Article

Link

Protecting RFID Communications in Supply Chains, Yingjiu LI and Xuhua DING Conference Proceeding Article

PDF

Query-Based Watermarking for XML Data, Xuan ZHOU, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article

PDF

Rapid identification of column heterogeneity, Bing Tian DAI, Nick KOUDAS, Beng Chin OOI, Divesh SRIVASTAVA, and Suresh VENKATASUBRAMANIAN Conference Proceeding Article

PDF

Reputation Stretching in Online Auctions, Jianqing CHEN, Mei LIN, and Andrew B. WHINSTON Conference Proceeding Article

PDF

Set-based Cascading Approaches for Magnetic Resonance (MR) Image Segmentation (SCAMIS), Jiang Liu, Tze-Yun LEONG, Kin Ban Chee, Boon Pin Tan, Borys Shuter, and Shih Chang Wang Conference Proceeding Article

PDF

Supply Chain Information Sharing in a Macro Prediction Market, Zhiling GUO, Fang FANG, and Andrew B. WHINSTON Journal Article

PDF

Towards effective content-based music retrieval with multiple acoustic feature combination, Jialie SHEN, John Shepherd, and Ann H. H. NGU Journal Article

PDF

Towards effective content-based music retrieval with multiple acoustic feature composition, Jialie SHEN, John Shepherd, and Ngu Ahh Journal Article

Link

Towards Practical Private Information Retrieval, Robert H. DENG Conference Proceeding Article

Impacts of the Feedback Systems on Consumer Learning and Reputation-Based Market Competition, Zhiling GUO Conference Proceeding Article

Patient-specific inference and situation-dependent classification using Context-Sensitive Networks., Rohit Joshi and Tze-Yun LEONG Conference Proceeding Article

Link

A Hybrid Mip/Heuristic Model for Experience Based Driver Assignment, Hoong Chuin LAU, K. M. NG, and Ramesh Thangarajoo Conference Proceeding Article

PDF

A model for Anticipatory Event Detection, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article

Link

An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy, Ling QU, Yingjiu LI, and Xintao Wu Conference Proceeding Article

PDF

DCMA: A Label-Switching MAC for efficient packet forwarding in multi-hop wireless networks, Arup ACHARYA, Sachin GANU, and Archan MISRA Journal Article

Impacts of the Feedback Systems on Consumer Learning and Reputation - Based Market Competition, Zhiling GUO Conference Proceeding Article

PDF

Integration of Wikipedia and a Geography Digital Library, Ee Peng LIM, Zhe WANG, Darwin Sadeli, Yuanyuan LI, Chew-Hung CHANG, Kalyani CHATTERJEA, Dion Hoe-Lian GOH, Yin-Leng THENG, Jun ZHANG, and Aixin SUN Conference Proceeding Article

PDF

Low-Latency Broadcast in Multirate Wireless Mesh Networks, Chun Tung CHOU, Archan MISRA, and Junaid QADIR Journal Article