Submissions from 2006
Two-Instant Reallocation in Two-Echelon Spare Parts Inventory Systems, Huawei SONG and Hoong Chuin LAU Conference Proceeding Article
Viz: A visual analysis suite for explaining local search behavior, Steven HALIM, Roland H. C. YAP, and Hoong Chuin LAU Conference Proceeding Article
Will existing CS, IT and IS departments really deliver the service science, management and engineering vision?, Steven M. MILLER Conference Proceeding Article
Randomized Local Extrema for Heuristic Selection in TSP, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article
A Secure Extension of the Kwak-Moon Group Signcryption Scheme, D. KWAK, S. J. Moon, Guilin WANG, and Robert H. DENG Journal Article
A Space-Filling Curve Heuristic for Wireless Networks Design, Thin Yin LEONG and Chao-Hsien CHU Conference Paper
Behavioral Distance Measurement using Hidden Markov Models, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
Collective Outsourcing in an Information Supply Chain, Fang FANG, Zhiling GUO, and Andrew B. WHINSTON Conference Paper
Continuous Nearest Neighbor Monitoring in Road Networks, Kyriakos MOURATIDIS, Man Lung YIU, Dimitris PAPADIAS, and Nikos MAMOULIS Conference Proceeding Article
CUHK at ImageCLEF 2005: Cross-language and cross media image retrieval, Steven HOI, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Disclosure Analysis for Two-Way Contingency Tables, Haibing LU, Yingjiu LI, and Xintao WU Conference Proceeding Article
Discovering image-text associations for cross-media web information fusion, Tao JIANG and Ah-Hwee TAN Conference Proceeding Article
Doing their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions, Robert J. KAUFFMAN and Charles A. WOOD Journal Article
Doing Their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions., Robert John KAUFFMAN and C.A. Wood Journal Article
Efficient Algorithms for Mining Maximal Valid Groups, Yida WANG, Ee Peng LIM, and San-Yih HWANG Journal Article
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Journal Article
Minimum Latency Broadcasting in Multi-Radio Multi-Channel Multi-Rate Wireless Meshes, Junaid QADIR, Archan MISRA, and Chun Tung CHOU Conference Proceeding Article
Mining RDF metadata for generalized association rules, Tao JIANG and Ah-hwee TAN Conference Proceeding Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Conference Proceeding Article
Practical Private Data Matching Deterrent to Spoofing Attacks, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article
Rights Protection for Data Cubes, Jie GUO, Yingjiu LI, Robert H. DENG, and Kefei CHEN Conference Proceeding Article
The boundary spanner’s role in organisational learning: Unleashing untapped potential, Siu Loon HOE Journal Article
Three Architectures for Trusted Data Dissemination in Edge Computing, Shen-Tat GOH, Hwee Hwa PANG, Robert H. DENG, and Feng BAO Journal Article
Wireless indoor positioning system with enhanced nearest neighbors in signal space algorithm, Quang TRAN, Juki Wirawan TANTRA, Ah-hwee TAN, Ah-Hwee TAN, Kin-Choong YOW, and Dongyu QIU Conference Proceeding Article
Premier e-Business cases from Asia, Jae Kyu LEE, Benjamin GAN, and Vijay SETHI Edited Book
A mobile lecture slide organization tool for students, K.O. CHOW, Chong-wah NGO, IP H.H.S., and K.S. CHEUNG Conference Proceeding Article
Quantitative retrieval of suspended solid concentration in Lake Taihu based on BP neural net, Heng LYU, Xingguo LI, and Kai CAO Journal Article
A hybrid architecture combining reactive plan execution and reactive learning, Samin KARIM, Liz SONENBERG, and Ah-Hwee TAN Conference Proceeding Article
An energy-efficient and access latency optimized indexing scheme for wireless data broadcast, Yuxia YAO, Xueyan TANG, Ee Peng LIM, and Aixin SUN Journal Article
An experimental study on U-commerce adoption: The impact of personalization and privacy concerns, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Architectural Control and Value Migration in Platform Industries, C. Jason WOODARD Conference Paper
Bias and Controversy: Beyond the Statistical Deviation, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Collaborative Image Retrieval via Regularized Metric Learning, Luo SI, Rong JIN, Steven C. H. HOI, and Michael R. LYU Journal Article
Learning the unified Kernel machines for classification, Steven C. H. HOI, Michael R. LYU, and Edward Y. CHANG Conference Proceeding Article
Secure Real-Time User Preference Collection for Broadcast Scheduling, Xuhua DING, Shuhong WANG, and Baihua ZHENG Conference Proceeding Article
Slander-Resistant Forwarding Isolation in Ad Hoc Networks, Qijun GU, Chao-Hsien CHU, Peng LIU, and Sencun ZHU Journal Article
Social network dynamics for open source software projects, Y. LONG and Keng SIAU Conference Proceeding Article
Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework: Improved Results, Hoong Chuin LAU and B. VIET Conference Paper
Understanding intrinsic factors influencing benefit maximization of IS usage, Brenda ESCHENBRENNER and Fiona Fui-hoon NAH Conference Proceeding Article
Use of a classroom response system to enhance classroom interactivity, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Journal Article
Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU Conference Proceeding Article
A Research Capability on Management of Engineering and Technology, Arcot Desai NARASIMHALU Conference Paper
RECAMM: A Research Capability Maturity Model for Managing Technological Innovations, Arcot Desai NARASIMHALU Conference Paper
A Framework for Technology Transfer, Arcot Desai NARASIMHALU Conference Proceeding Article
An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks, Bo ZHU, Sushil JAJODIA, Mohan S. KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, K. REN, Wenjing Lou, K. KIM, and Robert H. DENG Journal Article
Authenticating Multi-Dimensional Query Results in Data Publishing, Weiwei CHENG, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Crossing the Chasm: The XID Technologies Story, Arcot Desai NARASIMHALU and Roberto MARIANI Conference Proceeding Article
Empirical Analysis of the Value of Code Inspections for Project Management, Narayanasamy RAMASUBBU, Subramanyam Ramanath, Sunil Mithas, and M. S. Krishnan Conference Proceeding Article
Extraction of Coherent Relevant Passages using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Journal Article
Hierarchical Hidden Markov Model for rushes structuring and indexing, Chong-Wah NGO, Zailiang PAN, and Xiaoyong WEI Conference Proceeding Article
Keyframe retrieval by keypoints: Can point-to-point matching help?, Wanlei ZHAO, Yu-Gang JIANG, and Chong-Wah NGO Conference Proceeding Article
Mobile healthcare informatics, Keng SIAU and Zixing SHEN Journal Article
OntoSearch: A full-text search engine for the semantic web, Xing JIANG and Ah-hwee TAN Conference Proceeding Article
Optimal Crl Releasing Strategy in Public Key Infrastructure, Nan HU, Yingjiu LI, and Chengyu MA Conference Proceeding Article
Prediction-based gesture detection in lecture videos by combining visual, speech and electronic slides, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Private Information Retrieval Using Trusted Hardware, Shuhong WANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article
Reflections on: When Internet Companies Morph, Robert J. KAUFFMAN, T. Miller, and B. WANG Journal Article
Recursive self organizing maps with hybrid clustering, Kiruthika RAMANATHAN and Sheng Uei GUAN Conference Proceeding Article
A Close Look at Privacy Preserving Data Mining Methods, Xindong WU, Yunfeng WANG, Chao-Hsien CHU, Fengli LIU, Ping CHEN, and Dianmin YUE Conference Proceeding Article
Airfreight Pricing and Discounts for Dense and Volumetric Cargoes, Michelle Lee Fong CHEONG, R. Bhatnagar, and S. C. Graves Conference Paper
Batch Mode Active Learning and its Applications to Medical Image Classification, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Can online reviews reveal a product's true quality? Empirical findings analytical modeling of online word-of-mouth communication, Nan HU, Paul Pavlou, and Jennifer ZHANG Conference Proceeding Article
Cognitive mapping techniques for user-database interaction, Keng SIAU and X. TAN Journal Article
CS Cache Engine: Data Access Accelerator for Location-Based Service in Mobile Environments (demo), Ken C. K. LEE, Wang-chien LEE, Julian Winter, Baihua ZHENG, and JianLiang Xu Conference Paper
Exploiting Domain Structure for Named Entity Recognition, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Fuzzy cognitive goal net for interactive storytelling plot design, Yundong CAI, Chunyan MIAO, Ah-hwee TAN, and Zhiqi SHEN Conference Proceeding Article
Learning Distance Metrics with Contextual Constraints for Image Retrieval, Steven C. H. HOI, Wei LIU, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article
MultiLearner based recursive supervised training, Kiruthika RAMANATHAN, Sheng Uei GUAN, and Laxmi R. IYER Conference Proceeding Article
On the Release of Crls in Public Key Infrastructure, Chengyu Ma, Nan Hu, and Yingjiu Li Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Security analysis on a conference scheme for mobile communications, Zhiguo WAN, Feng BAO, Robert H. DENG, and A. L. ANANDA Journal Article
Tracking Nearest Surrounders in Moving Object Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article
Self-organizing neural architecture for reinforcement learning, Ah-hwee TAN Conference Proceeding Article
An Evolutionary Fuzzy Multi-Objective Approach to Cell Formation, C. C. TSAI, Chao-Hsien CHU, and Xindong Wu Conference Proceeding Article
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon LEE, Youngki LEE, Seungwoo KANG, SangJeong LEE, Hyunju JIN, Byoungjip KIM, and Junehwa SONG Conference Proceeding Article
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon Lee, Youngki Lee, Seungwoo Kang, SangJeong Lee, Hyunju Jin, Byoungjip Kim, and Junehwa Song Conference Paper
Clip-based similarity measure for query-dependent clip retrieval and video summarization, Yuxin PENG and Chong-wah NGO Journal Article
Data Access Techniques in Location-Based Services, Jianliang XU, Baihua ZHENG, and Wang-Chien LEE Conference Proceeding Article
Discovering Causal Dependencies in Mobile Context-Aware Recommenders, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article
Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks, Zhiguo WAN, B. ZHU, Robert H. DENG, Feng Bao, and A. L. Ananda Conference Proceeding Article
Efficient querying and resource management using distributed presence information in converged networks, Dipanjan CHAKRABORTY, Koustuv DASGUPTA, and Archan MISRA Conference Proceeding Article
GECON 2006: Proceedings of the 3rd International Workshop on Grid Economics and Business Models, Hing-Yan LEE and Steven M. MILLER Edited Conference Proceeding
Gestalt-based feature similarity measure in trademark database, Hui JIANG, Chong-wah NGO, and Hung-Khoon TAN Journal Article
Large-Scale Text Categorization by Batch Mode Active Learning, Steven C. H. HOI, Rong JIN, and Michael R. LYU Conference Proceeding Article
Mining RDF metadata for generalized association rules: Knowledge discovery in the semantic web era, Tao JIANG and Ah-hwee TAN Conference Proceeding Article
On in-network synopsis join processing for sensor networks, Hai YU, Ee Peng LIM, and Jun ZHANG Conference Proceeding Article
Osprey: A practical type system for validating dimensional unit correctness of C programs, Lingxiao JIANG and Zhendong SU Conference Proceeding Article
Real-Time Non-Rigid Shape Recovery via Active Appearance Models for Augmented Reality, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Conference Proceeding Article
Time-dependent semantic similarity measure of queries using historical click-through data, Qiankun ZHAO, Steven C. H. HOI, Tie-Yan LIU, Sourav S. BHOWMICK, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article
Towards Statistical Modeling Based Value Disclosure Analysis in General Databases, Xintao Wu, Songtao Guo, and Yingjiu LI Conference Paper
Winning back the CUP for Distributed POMDPs: Planning over continuous belief spaces, Pradeep VARAKANTHAM, Ranjit Nair, Milind Tambe, and Makoto Yokoo Conference Proceeding Article
A Fuzzy Multi-Objective Linear Programming Model for Manufacturing Cell Formation, C.C. TSAI and Chao-Hsien Chu Journal Article
Anonymous signature schemes, Guomin YANG, Duncan S. WONG, Xiaotie DENG, and Huaxiong WANG Conference Proceeding Article
A practical password-based two-server authentication and key exchange system, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article
A Unified Log-based Relevance Feedback Scheme for Image Retrieval, Steven HOI, Michael R. LYU, and Rong JIN Journal Article
Caching Complementary Space for Location-Based Services, Ken C. K. LEE, Wang-chien LEE, Baihua ZHENG, and Jianliang XU Conference Proceeding Article