The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2006

PDF

Modeling local interest points for semantic detection and video search at TRECVID 2006, Yu-Gang JIANG, Xiaoyong WEI, Chong-wah NGO, Hung-Khoon TAN, Wanlei ZHAO, and Xiao WU Conference Paper

PDF

New Paradigm of Inference Control with Trusted Computing, Yanjiang YANG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

Robust Controllability in Temporal Constraint Networks under Uncertainty, Hoong Chuin LAU, Jia LI, and Roland H. C. YAP Conference Proceeding Article

PDF

SMArTIC: Towards Building an Accurate, Robust and Scalable Specification Miner, David LO and Siau-Cheng KHOO Conference Proceeding Article

PDF

Understanding user perceptions on usefulness and usability of an integrated Wiki-G-Portal, Yin-Leng THENG, Yuanyuan LI, Ee Peng LIM, Zhe WANG, Dion Hoe-Lian GOH, Chew-Hung CHANG, Kalyani CHATTERJEA, and Jun ZHANG Conference Proceeding Article

Link

Efficient Benchmarking of Content-based Image Retrieval via Resampling, Jialie SHEN and John Shepherd Conference Proceeding Article

Link

Exploring Composite Acoustic Features for Efficient Music Similarity Query, Bin CUI, Jialie SHEN, Gao CONG, Heng Tao SHEN, and Cui YU Conference Proceeding Article

Optimal Topology Design for Wireless Local Area Networks, T. YANG and Chao-Hsien CHU Conference Paper

Anticipatory Event Detection via Sentence Classification, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article

PDF

Audio similarity measure by graph modeling and matching, Yuxin PENG, Chong-wah NGO, Cuihua FANG, Xiaoou CHEN, and Jianguo XIAO Conference Proceeding Article

PDF

Design and analysis of a class-aware recursive loop scheduler for class-based scheduling, Raphael ROM, Moshe SIDI, and Hwee-Pink TAN Journal Article

Economic Performance Analysis of the Tycoon Market-Based Resource Allocation System for Grid Computing, Danny OH and Steven M. MILLER Conference Proceeding Article

PDF

Extracting link chains of relationship instances from a website, Myo-Myo NAING, Ee Peng LIM, and Roger Hsiang-Li CHIANG Journal Article

PDF

Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Chong-wah NGO, Wan-Lei ZHAO, and Yu-Gang JIANG Conference Proceeding Article

PDF

Natural document clustering by clique percolation in random graphs, Wei GAO and Kam-Fai WONG Conference Proceeding Article

PDF

Privacy Enhanced Superdistribution of Layered Content with Trusted Access Control, Daniel J. T. CHONG and Robert H. DENG Conference Proceeding Article

Link

QUARK : Empirical Assessment of Automaton-based Specification Miners, David LO and Siau-Cheng KHOO Conference Proceeding Article

Research on predicting network traffic using neural networks, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, T. Hao, X. Sun, J. Qin, and Huayu SHEN Journal Article

PDF

Service Pattern Discovery of Web Service Mining in Web Service Registry-Repository, Qianhui Althea LIANG, Jen-Yao CHUNG, Steven M. MILLER, and Yang OUYANG Conference Proceeding Article

PDF

Two-Instant Reallocation in Two-Echelon Spare Parts Inventory Systems, Huawei SONG and Hoong Chuin LAU Conference Proceeding Article

PDF

Viz: A visual analysis suite for explaining local search behavior, Steven HALIM, Roland H. C. YAP, and Hoong Chuin LAU Conference Proceeding Article

Link

Will existing CS, IT and IS departments really deliver the service science, management and engineering vision?, Steven M. MILLER Conference Proceeding Article

Link

Randomized Local Extrema for Heuristic Selection in TSP, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article

Link

A Secure Extension of the Kwak-Moon Group Signcryption Scheme, D. KWAK, S. J. Moon, Guilin WANG, and Robert H. DENG Journal Article

A Space-Filling Curve Heuristic for Wireless Networks Design, Thin Yin LEONG and Chao-Hsien CHU Conference Paper

Link

Behavioral Distance Measurement using Hidden Markov Models, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

Collective Outsourcing in an Information Supply Chain, Fang FANG, Zhiling GUO, and Andrew B. WHINSTON Conference Paper

PDF

Continuous Nearest Neighbor Monitoring in Road Networks, Kyriakos MOURATIDIS, Man Lung YIU, Dimitris PAPADIAS, and Nikos MAMOULIS Conference Proceeding Article

PDF

CUHK at ImageCLEF 2005: Cross-language and cross media image retrieval, Steven HOI, Jianke ZHU, and Michael R. LYU Conference Proceeding Article

PDF

Disclosure Analysis for Two-Way Contingency Tables, Haibing LU, Yingjiu LI, and Xintao WU Conference Proceeding Article

PDF

Discovering image-text associations for cross-media web information fusion, Tao JIANG and Ah-Hwee TAN Conference Proceeding Article

Link

Doing their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions, Robert J. KAUFFMAN and Charles A. WOOD Journal Article

Doing Their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions., Robert John KAUFFMAN and C.A. Wood Journal Article

Link

Efficient Algorithms for Mining Maximal Valid Groups, Yida WANG, Ee Peng LIM, and San-Yih HWANG Journal Article

PDF

Masking Page Reference Patterns in Encryption Databases on Untrusted Storage, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Journal Article

PDF

Minimum Latency Broadcasting in Multi-Radio Multi-Channel Multi-Rate Wireless Meshes, Junaid QADIR, Archan MISRA, and Chun Tung CHOU Conference Proceeding Article

PDF

Mining RDF metadata for generalized association rules, Tao JIANG and Ah-hwee TAN Conference Proceeding Article

PDF

Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article

PDF

Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article

Link

On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Conference Proceeding Article

PDF

Practical Private Data Matching Deterrent to Spoofing Attacks, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article

PDF

Rights Protection for Data Cubes, Jie GUO, Yingjiu LI, Robert H. DENG, and Kefei CHEN Conference Proceeding Article

PDF

The boundary spanner’s role in organisational learning: Unleashing untapped potential, Siu Loon HOE Journal Article

PDF

Three Architectures for Trusted Data Dissemination in Edge Computing, Shen-Tat GOH, Hwee Hwa PANG, Robert H. DENG, and Feng BAO Journal Article

PDF

Wireless indoor positioning system with enhanced nearest neighbors in signal space algorithm, Quang TRAN, Juki Wirawan TANTRA, Ah-hwee TAN, Ah-Hwee TAN, Kin-Choong YOW, and Dongyu QIU Conference Proceeding Article

Premier e-Business cases from Asia, Jae Kyu LEE, Benjamin GAN, and Vijay SETHI Edited Book

A mobile lecture slide organization tool for students, K.O. CHOW, Chong-wah NGO, IP H.H.S., and K.S. CHEUNG Conference Proceeding Article

Quantitative retrieval of suspended solid concentration in Lake Taihu based on BP neural net, Heng LYU, Xingguo LI, and Kai CAO Journal Article

PDF

A hybrid architecture combining reactive plan execution and reactive learning, Samin KARIM, Liz SONENBERG, and Ah-Hwee TAN Conference Proceeding Article

PDF

An energy-efficient and access latency optimized indexing scheme for wireless data broadcast, Yuxia YAO, Xueyan TANG, Ee Peng LIM, and Aixin SUN Journal Article

PDF

Architectural Control and Value Migration in Platform Industries, C. Jason WOODARD Conference Paper

PDF

Bias and Controversy: Beyond the Statistical Deviation, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article

PDF

Collaborative Image Retrieval via Regularized Metric Learning, Luo SI, Rong JIN, Steven C. H. HOI, and Michael R. LYU Journal Article

PDF

Learning the unified Kernel machines for classification, Steven C. H. HOI, Michael R. LYU, and Edward Y. CHANG Conference Proceeding Article

Link

Secure Real-Time User Preference Collection for Broadcast Scheduling, Xuhua DING, Shuhong WANG, and Baihua ZHENG Conference Proceeding Article

Link

Slander-Resistant Forwarding Isolation in Ad Hoc Networks, Qijun GU, Chao-Hsien CHU, Peng LIU, and Sencun ZHU Journal Article

PDF

Social network dynamics for open source software projects, Y. LONG and Keng SIAU Conference Proceeding Article

Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework: Improved Results, Hoong Chuin LAU and B. VIET Conference Paper

PDF

Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU Conference Proceeding Article

A Research Capability on Management of Engineering and Technology, Arcot Desai NARASIMHALU Conference Paper

Link

RECAMM: A Research Capability Maturity Model for Managing Technological Innovations, Arcot Desai NARASIMHALU Conference Paper

Link

A Framework for Technology Transfer, Arcot Desai NARASIMHALU Conference Proceeding Article

Link

An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks, Bo ZHU, Sushil JAJODIA, Mohan S. KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, K. REN, Wenjing Lou, K. KIM, and Robert H. DENG Journal Article

PDF

Authenticating Multi-Dimensional Query Results in Data Publishing, Weiwei CHENG, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article

PDF

Crossing the Chasm: The XID Technologies Story, Arcot Desai NARASIMHALU and Roberto MARIANI Conference Proceeding Article

Empirical Analysis of the Value of Code Inspections for Project Management, Narayanasamy RAMASUBBU, Subramanyam Ramanath, Sunil Mithas, and M. S. Krishnan Conference Proceeding Article

PDF

Extraction of Coherent Relevant Passages using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Journal Article

PDF

Hierarchical Hidden Markov Model for rushes structuring and indexing, Chong-Wah NGO, Zailiang PAN, and Xiaoyong WEI Conference Proceeding Article

PDF

Keyframe retrieval by keypoints: Can point-to-point matching help?, Wanlei ZHAO, Yu-Gang JIANG, and Chong-Wah NGO Conference Proceeding Article

PDF

OntoSearch: A full-text search engine for the semantic web, Xing JIANG and Ah-hwee TAN Conference Proceeding Article

Optimal Crl Releasing Strategy in Public Key Infrastructure, Nan HU, Yingjiu LI, and Chengyu MA Conference Proceeding Article

PDF

Prediction-based gesture detection in lecture videos by combining visual, speech and electronic slides, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article

PDF

Private Information Retrieval Using Trusted Hardware, Shuhong WANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article

Link

Reflections on: When Internet Companies Morph, Robert J. KAUFFMAN, T. Miller, and B. WANG Journal Article

Recursive self organizing maps with hybrid clustering, Kiruthika RAMANATHAN and Sheng Uei GUAN Conference Proceeding Article

Link

A Close Look at Privacy Preserving Data Mining Methods, Xindong WU, Yunfeng WANG, Chao-Hsien CHU, Fengli LIU, Ping CHEN, and Dianmin YUE Conference Proceeding Article

Airfreight Pricing and Discounts for Dense and Volumetric Cargoes, Michelle Lee Fong CHEONG, R. Bhatnagar, and S. C. Graves Conference Paper

PDF

Batch Mode Active Learning and its Applications to Medical Image Classification, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article

PDF

Can online reviews reveal a product's true quality? Empirical findings analytical modeling of online word-of-mouth communication, Nan HU, Paul Pavlou, and Jennifer ZHANG Conference Proceeding Article

PDF

Cognitive mapping techniques for user-database interaction, Keng SIAU and X. TAN Journal Article

CS Cache Engine: Data Access Accelerator for Location-Based Service in Mobile Environments (demo), Ken C. K. LEE, Wang-chien LEE, Julian Winter, Baihua ZHENG, and JianLiang Xu Conference Paper

PDF

Exploiting Domain Structure for Named Entity Recognition, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article

PDF

Fuzzy cognitive goal net for interactive storytelling plot design, Yundong CAI, Chunyan MIAO, Ah-hwee TAN, and Zhiqi SHEN Conference Proceeding Article

PDF

Learning Distance Metrics with Contextual Constraints for Image Retrieval, Steven C. H. HOI, Wei LIU, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article

PDF

MultiLearner based recursive supervised training, Kiruthika RAMANATHAN, Sheng Uei GUAN, and Laxmi R. IYER Conference Proceeding Article

PDF

On the Release of Crls in Public Key Infrastructure, Chengyu Ma, Nan Hu, and Yingjiu Li Conference Paper

Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper

Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper

PDF

Security analysis on a conference scheme for mobile communications, Zhiguo WAN, Feng BAO, Robert H. DENG, and A. L. ANANDA Journal Article

Link

Tracking Nearest Surrounders in Moving Object Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article

Self-organizing neural architecture for reinforcement learning, Ah-hwee TAN Conference Proceeding Article

Link

An Evolutionary Fuzzy Multi-Objective Approach to Cell Formation, C. C. TSAI, Chao-Hsien CHU, and Xindong Wu Conference Proceeding Article

BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon Lee, Youngki Lee, Seungwoo Kang, SangJeong Lee, Hyunju Jin, Byoungjip Kim, and Junehwa Song Conference Paper

Link

BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon LEE, Youngki LEE, Seungwoo KANG, SangJeong LEE, Hyunju JIN, Byoungjip KIM, and Junehwa SONG Conference Proceeding Article

PDF

Clip-based similarity measure for query-dependent clip retrieval and video summarization, Yuxin PENG and Chong-wah NGO Journal Article

Link

Data Access Techniques in Location-Based Services, Jianliang XU, Baihua ZHENG, and Wang-Chien LEE Conference Proceeding Article

PDF

Discovering Causal Dependencies in Mobile Context-Aware Recommenders, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article

Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks, Zhiguo WAN, B. ZHU, Robert H. DENG, Feng Bao, and A. L. Ananda Conference Proceeding Article

PDF

Efficient querying and resource management using distributed presence information in converged networks, Dipanjan CHAKRABORTY, Koustuv DASGUPTA, and Archan MISRA Conference Proceeding Article