Submissions from 2006
Modeling local interest points for semantic detection and video search at TRECVID 2006, Yu-Gang JIANG, Xiaoyong WEI, Chong-wah NGO, Hung-Khoon TAN, Wanlei ZHAO, and Xiao WU Conference Paper
New Paradigm of Inference Control with Trusted Computing, Yanjiang YANG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Robust Controllability in Temporal Constraint Networks under Uncertainty, Hoong Chuin LAU, Jia LI, and Roland H. C. YAP Conference Proceeding Article
SMArTIC: Towards Building an Accurate, Robust and Scalable Specification Miner, David LO and Siau-Cheng KHOO Conference Proceeding Article
Understanding user perceptions on usefulness and usability of an integrated Wiki-G-Portal, Yin-Leng THENG, Yuanyuan LI, Ee Peng LIM, Zhe WANG, Dion Hoe-Lian GOH, Chew-Hung CHANG, Kalyani CHATTERJEA, and Jun ZHANG Conference Proceeding Article
Efficient Benchmarking of Content-based Image Retrieval via Resampling, Jialie SHEN and John Shepherd Conference Proceeding Article
Exploring Composite Acoustic Features for Efficient Music Similarity Query, Bin CUI, Jialie SHEN, Gao CONG, Heng Tao SHEN, and Cui YU Conference Proceeding Article
Optimal Topology Design for Wireless Local Area Networks, T. YANG and Chao-Hsien CHU Conference Paper
Anticipatory Event Detection via Sentence Classification, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article
Audio similarity measure by graph modeling and matching, Yuxin PENG, Chong-wah NGO, Cuihua FANG, Xiaoou CHEN, and Jianguo XIAO Conference Proceeding Article
Design and analysis of a class-aware recursive loop scheduler for class-based scheduling, Raphael ROM, Moshe SIDI, and Hwee-Pink TAN Journal Article
Economic Performance Analysis of the Tycoon Market-Based Resource Allocation System for Grid Computing, Danny OH and Steven M. MILLER Conference Proceeding Article
Extracting link chains of relationship instances from a website, Myo-Myo NAING, Ee Peng LIM, and Roger Hsiang-Li CHIANG Journal Article
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Chong-wah NGO, Wan-Lei ZHAO, and Yu-Gang JIANG Conference Proceeding Article
Natural document clustering by clique percolation in random graphs, Wei GAO and Kam-Fai WONG Conference Proceeding Article
Privacy Enhanced Superdistribution of Layered Content with Trusted Access Control, Daniel J. T. CHONG and Robert H. DENG Conference Proceeding Article
QUARK : Empirical Assessment of Automaton-based Specification Miners, David LO and Siau-Cheng KHOO Conference Proceeding Article
Research on predicting network traffic using neural networks, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, T. Hao, X. Sun, J. Qin, and Huayu SHEN Journal Article
Service Pattern Discovery of Web Service Mining in Web Service Registry-Repository, Qianhui Althea LIANG, Jen-Yao CHUNG, Steven M. MILLER, and Yang OUYANG Conference Proceeding Article
Two-Instant Reallocation in Two-Echelon Spare Parts Inventory Systems, Huawei SONG and Hoong Chuin LAU Conference Proceeding Article
Viz: A visual analysis suite for explaining local search behavior, Steven HALIM, Roland H. C. YAP, and Hoong Chuin LAU Conference Proceeding Article
Will existing CS, IT and IS departments really deliver the service science, management and engineering vision?, Steven M. MILLER Conference Proceeding Article
Randomized Local Extrema for Heuristic Selection in TSP, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article
A Secure Extension of the Kwak-Moon Group Signcryption Scheme, D. KWAK, S. J. Moon, Guilin WANG, and Robert H. DENG Journal Article
A Space-Filling Curve Heuristic for Wireless Networks Design, Thin Yin LEONG and Chao-Hsien CHU Conference Paper
Behavioral Distance Measurement using Hidden Markov Models, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
Collective Outsourcing in an Information Supply Chain, Fang FANG, Zhiling GUO, and Andrew B. WHINSTON Conference Paper
Continuous Nearest Neighbor Monitoring in Road Networks, Kyriakos MOURATIDIS, Man Lung YIU, Dimitris PAPADIAS, and Nikos MAMOULIS Conference Proceeding Article
CUHK at ImageCLEF 2005: Cross-language and cross media image retrieval, Steven HOI, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Disclosure Analysis for Two-Way Contingency Tables, Haibing LU, Yingjiu LI, and Xintao WU Conference Proceeding Article
Discovering image-text associations for cross-media web information fusion, Tao JIANG and Ah-Hwee TAN Conference Proceeding Article
Doing their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions, Robert J. KAUFFMAN and Charles A. WOOD Journal Article
Doing Their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions., Robert John KAUFFMAN and C.A. Wood Journal Article
Efficient Algorithms for Mining Maximal Valid Groups, Yida WANG, Ee Peng LIM, and San-Yih HWANG Journal Article
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Journal Article
Minimum Latency Broadcasting in Multi-Radio Multi-Channel Multi-Rate Wireless Meshes, Junaid QADIR, Archan MISRA, and Chun Tung CHOU Conference Proceeding Article
Mining RDF metadata for generalized association rules, Tao JIANG and Ah-hwee TAN Conference Proceeding Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Conference Proceeding Article
Practical Private Data Matching Deterrent to Spoofing Attacks, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article
Rights Protection for Data Cubes, Jie GUO, Yingjiu LI, Robert H. DENG, and Kefei CHEN Conference Proceeding Article
The boundary spanner’s role in organisational learning: Unleashing untapped potential, Siu Loon HOE Journal Article
Three Architectures for Trusted Data Dissemination in Edge Computing, Shen-Tat GOH, Hwee Hwa PANG, Robert H. DENG, and Feng BAO Journal Article
Wireless indoor positioning system with enhanced nearest neighbors in signal space algorithm, Quang TRAN, Juki Wirawan TANTRA, Ah-hwee TAN, Ah-Hwee TAN, Kin-Choong YOW, and Dongyu QIU Conference Proceeding Article
Premier e-Business cases from Asia, Jae Kyu LEE, Benjamin GAN, and Vijay SETHI Edited Book
A mobile lecture slide organization tool for students, K.O. CHOW, Chong-wah NGO, IP H.H.S., and K.S. CHEUNG Conference Proceeding Article
Quantitative retrieval of suspended solid concentration in Lake Taihu based on BP neural net, Heng LYU, Xingguo LI, and Kai CAO Journal Article
A hybrid architecture combining reactive plan execution and reactive learning, Samin KARIM, Liz SONENBERG, and Ah-Hwee TAN Conference Proceeding Article
An energy-efficient and access latency optimized indexing scheme for wireless data broadcast, Yuxia YAO, Xueyan TANG, Ee Peng LIM, and Aixin SUN Journal Article
Architectural Control and Value Migration in Platform Industries, C. Jason WOODARD Conference Paper
Bias and Controversy: Beyond the Statistical Deviation, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Collaborative Image Retrieval via Regularized Metric Learning, Luo SI, Rong JIN, Steven C. H. HOI, and Michael R. LYU Journal Article
Learning the unified Kernel machines for classification, Steven C. H. HOI, Michael R. LYU, and Edward Y. CHANG Conference Proceeding Article
Secure Real-Time User Preference Collection for Broadcast Scheduling, Xuhua DING, Shuhong WANG, and Baihua ZHENG Conference Proceeding Article
Slander-Resistant Forwarding Isolation in Ad Hoc Networks, Qijun GU, Chao-Hsien CHU, Peng LIU, and Sencun ZHU Journal Article
Social network dynamics for open source software projects, Y. LONG and Keng SIAU Conference Proceeding Article
Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework: Improved Results, Hoong Chuin LAU and B. VIET Conference Paper
Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU Conference Proceeding Article
A Research Capability on Management of Engineering and Technology, Arcot Desai NARASIMHALU Conference Paper
RECAMM: A Research Capability Maturity Model for Managing Technological Innovations, Arcot Desai NARASIMHALU Conference Paper
A Framework for Technology Transfer, Arcot Desai NARASIMHALU Conference Proceeding Article
An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks, Bo ZHU, Sushil JAJODIA, Mohan S. KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, K. REN, Wenjing Lou, K. KIM, and Robert H. DENG Journal Article
Authenticating Multi-Dimensional Query Results in Data Publishing, Weiwei CHENG, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Crossing the Chasm: The XID Technologies Story, Arcot Desai NARASIMHALU and Roberto MARIANI Conference Proceeding Article
Empirical Analysis of the Value of Code Inspections for Project Management, Narayanasamy RAMASUBBU, Subramanyam Ramanath, Sunil Mithas, and M. S. Krishnan Conference Proceeding Article
Extraction of Coherent Relevant Passages using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Journal Article
Hierarchical Hidden Markov Model for rushes structuring and indexing, Chong-Wah NGO, Zailiang PAN, and Xiaoyong WEI Conference Proceeding Article
Keyframe retrieval by keypoints: Can point-to-point matching help?, Wanlei ZHAO, Yu-Gang JIANG, and Chong-Wah NGO Conference Proceeding Article
OntoSearch: A full-text search engine for the semantic web, Xing JIANG and Ah-hwee TAN Conference Proceeding Article
Optimal Crl Releasing Strategy in Public Key Infrastructure, Nan HU, Yingjiu LI, and Chengyu MA Conference Proceeding Article
Prediction-based gesture detection in lecture videos by combining visual, speech and electronic slides, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Private Information Retrieval Using Trusted Hardware, Shuhong WANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article
Reflections on: When Internet Companies Morph, Robert J. KAUFFMAN, T. Miller, and B. WANG Journal Article
Recursive self organizing maps with hybrid clustering, Kiruthika RAMANATHAN and Sheng Uei GUAN Conference Proceeding Article
A Close Look at Privacy Preserving Data Mining Methods, Xindong WU, Yunfeng WANG, Chao-Hsien CHU, Fengli LIU, Ping CHEN, and Dianmin YUE Conference Proceeding Article
Airfreight Pricing and Discounts for Dense and Volumetric Cargoes, Michelle Lee Fong CHEONG, R. Bhatnagar, and S. C. Graves Conference Paper
Batch Mode Active Learning and its Applications to Medical Image Classification, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Can online reviews reveal a product's true quality? Empirical findings analytical modeling of online word-of-mouth communication, Nan HU, Paul Pavlou, and Jennifer ZHANG Conference Proceeding Article
Cognitive mapping techniques for user-database interaction, Keng SIAU and X. TAN Journal Article
CS Cache Engine: Data Access Accelerator for Location-Based Service in Mobile Environments (demo), Ken C. K. LEE, Wang-chien LEE, Julian Winter, Baihua ZHENG, and JianLiang Xu Conference Paper
Exploiting Domain Structure for Named Entity Recognition, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Fuzzy cognitive goal net for interactive storytelling plot design, Yundong CAI, Chunyan MIAO, Ah-hwee TAN, and Zhiqi SHEN Conference Proceeding Article
Learning Distance Metrics with Contextual Constraints for Image Retrieval, Steven C. H. HOI, Wei LIU, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article
MultiLearner based recursive supervised training, Kiruthika RAMANATHAN, Sheng Uei GUAN, and Laxmi R. IYER Conference Proceeding Article
On the Release of Crls in Public Key Infrastructure, Chengyu Ma, Nan Hu, and Yingjiu Li Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Security analysis on a conference scheme for mobile communications, Zhiguo WAN, Feng BAO, Robert H. DENG, and A. L. ANANDA Journal Article
Tracking Nearest Surrounders in Moving Object Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article
Self-organizing neural architecture for reinforcement learning, Ah-hwee TAN Conference Proceeding Article
An Evolutionary Fuzzy Multi-Objective Approach to Cell Formation, C. C. TSAI, Chao-Hsien CHU, and Xindong Wu Conference Proceeding Article
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon Lee, Youngki Lee, Seungwoo Kang, SangJeong Lee, Hyunju Jin, Byoungjip Kim, and Junehwa Song Conference Paper
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon LEE, Youngki LEE, Seungwoo KANG, SangJeong LEE, Hyunju JIN, Byoungjip KIM, and Junehwa SONG Conference Proceeding Article
Clip-based similarity measure for query-dependent clip retrieval and video summarization, Yuxin PENG and Chong-wah NGO Journal Article
Data Access Techniques in Location-Based Services, Jianliang XU, Baihua ZHENG, and Wang-Chien LEE Conference Proceeding Article
Discovering Causal Dependencies in Mobile Context-Aware Recommenders, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article
Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks, Zhiguo WAN, B. ZHU, Robert H. DENG, Feng Bao, and A. L. Ananda Conference Proceeding Article
Efficient querying and resource management using distributed presence information in converged networks, Dipanjan CHAKRABORTY, Koustuv DASGUPTA, and Archan MISRA Conference Proceeding Article