Submissions from 2005
A generic object-oriented Tabu Search Framework, Hoong Chuin LAU, Xiaomin JIA, and Wee Chong WAN Book Chapter
An Efficient and Robust Computational Framework for Studying Lifetime and Information Capacity in Sensor Networks, Enrique J. DUARTE-MELO, Mingyan LIU, and Archan MISRA Journal Article
Authenticating Query Results in Data Publishing, Di MA, Robert H. DENG, Hwee Hwa PANG, and Jianying ZHOU Conference Proceeding Article
Challenges in an adapttive modeling framework for systems biology, Joshi R. and Tze-Yun LEONG Conference Proceeding Article
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security, Shuhong WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article
Giving Users the Steering Wheel for Guiding Resource-Adaptive Systems, Joao SOUSA, Rajesh Krishna BALAN, Vahe Poladian, David Garlan, and Mahadev Satyanarayanan Report
Improving the quality of conceptual modeling using cognitive mapping techniques, Keng SIAU and X. TAN Journal Article
Integration of Probabilistic Graphic Models for Decision Support, Jiang C., Poh K., and Tze-Yun LEONG Conference Proceeding Article
Key Trends in Supply Chain Management, Jae Kyu LEE Conference Paper
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Matrix: Adaptive Middleware for Distributed Multiplayer Games, Rajesh Krishna BALAN, Maria Ebling, Paul Castro, and Archan MISRA Conference Proceeding Article
Multiplex Encryption a Practical Approach to Encrypting Multi-Recipient Emails, Xuhua DING, Wei Wei, and Kefei CHEN Conference Proceeding Article
New efficient MDS array codes for RAID part II: Rabin-like codes for tolerating multiple (>=4) disk failures, Gui-Liang FENG, Robert H. DENG, and Feng Bao Journal Article
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei ZHU, Feng Bao, and Robert H. DENG Conference Proceeding Article
Tailored watermarking schemes for authentication of electronic clinical atlases, Feng BAO, Robert H. DENG, Beng-Chin OOI, and Yanjiang YANG Journal Article
WebArc: Website Archival using a structured approach, Ee Peng LIM and Maria MARISSA Conference Proceeding Article
The Learning Curve of Knowledge Workers in a Computing Call Center, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Presentation
Integrating the FURPS+ model with use cases - A metrics driven approach, Subhajit DATTA Conference Proceeding Article
Organisational knowledge systems: An action-oriented perspective on organisation and information systems, Siu Loon HOE Book Review
Accurately Extracting Coherent Relevant Passages Using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Anonymous DoS-Resistant Access Control Protocol using Passwords for Wireless Networks, Zhiguo WAN, Robert H. DENG, Feng BAO, and Akkihebbal L. ANANDA Conference Proceeding Article
ASPs versus MOTS software solutions, Dan MA and Abrahamm Seidmann Conference Proceeding Article
A Threshold-Based Algorithm for Continuous Monitoring of K Nearest Neighbors, Kyriakos MOURATIDIS, Dimitris Papadias, Spiridon Bakiras, and Yufei TAO Journal Article
Balancing Performance and Confidentiality in Air Index, Qingzhao TAN, Wang-chien LEE, Baihua ZHENG, Peng LIU, and Dik Lun LEE Conference Proceeding Article
Defending against Packet Injection Attacks in Unreliable Ad Hoc Networks, Qijun GU, Peng LIU, Sencun ZHU, and Chao-Hsien CHU Conference Proceeding Article
Does Online Review Reveal a Product's True Quality, Nan HU and Jennifer ZHANG Conference Proceeding Article
Exploiting self-adaptive posture-based focus estimation for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Mining ontological knowledge from domain-specific text documents, Xing JIANG and Ah-hwee TAN Conference Proceeding Article
Motion-based approach for BBC rushes structuring and characterization, Chong-wah NGO and Zailiang PAN Conference Paper
On Security Notions of Steganographic Systems, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, and Hyungjun KIM Conference Proceeding Article
Query Processing in Spatial Databases Containing Obstacles, Jun ZHANG, Dimitris Papadias, Kyriakos Mouratidis, and Manli ZHU Journal Article
Scalable trusted online dissemination of JPEG2000 images, Robert H. DENG, Di MA, Weizhong Shao, and Yongdong Wu Journal Article
Selective object stabilization for home video consumers, Zailiang PAN and Chong-wah NGO Journal Article
Slander Resistant Attacker Isolation in Ad Hoc Networks, Q. GU, Chao-Hsien CHU, Peng LIU, and S. ZHU Conference Proceeding Article
PGMC: a framework for probabilistic graphic model combination, Chang-an Jiang, Tze-Yun LEONG, and Kim-Leng Poh Conference Proceeding Article
AND/OR Graph and Search Algorithm for Discovering Composite Web Services, Qianhui (Althea) LIANG and Stanley Y. W. SU Journal Article
Automatic 3D Face Modeling Using 2D Active Appearance Models, Jianke ZHU, Steven HOI, and Michael R. LYU Conference Proceeding Article
Common pattern discovery using earth mover's distance and local flow maximization, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article
DSIM: A Distance-Based Indexing Method for Genomic Sequences, Xia CAO, Beng-Chin OOI, Hwee Hwa PANG, Kian-Lee TAN, and Anthony K. H. TUNG Conference Proceeding Article
Informal Animation Sketching with K-Sketch, Richard C. DAVIS Conference Paper
Informal Animation Sketching with K-Sketch, Richard Christopher DAVIS
Information Systems in Competitive Strategies: Offshoring, Risk Management, Strategic Pricing, E-Sourcing, and Standards., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article
Managerial assessments of E-business investment opportunities: A field study, Anandhi S. BHARADWAJ and Amrit Tiwana Journal Article
NIL is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, WONG, Wei GAO, and Wei GAO Conference Proceeding Article
NIL Is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, Kam-Fai WONG, and Wei GAO Conference Proceeding Article
Towards Semantic Service Request of Web Service Composition, Qianhui Althea LIANG, Jen-Yao CHUNG, and Steven M. MILLER Conference Proceeding Article
A Generic Protocol for Controlling Access to Mobile Services, Shuhong WANG, Yingjiu LI, Bo ZHU, and Nan Hu Conference Proceeding Article
An Efficient Certified E-Mail Scheme Suitable for Wireless Mobile Environments, Guilin WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article
Applied public key infrastructure: 4th International Workshop on Applied Public Key Infrastructure, Jianying ZHOU, Meng-Chow Kang, Feng Bao, and Hwee Hwa PANG Edited Conference Proceeding
Behavioral Distance for Intrusion Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
CUHK at imageCLEF 2005: cross-language and cross-media image retrieval, Steven C. H. HOI, J. ZHU, and M. LYU Conference Proceeding Article
Forms of Expression for Designing Visual Languages for Animation, Richard Christopher DAVIS and James A. Landay
Forms of Expression for Designing Visual Languages for Animation, Richard C. DAVIS and James A. Landay Conference Proceeding Article
Low Latency Multimedia Broadcast in Multi-rate Wireless Meshes, Chun-Tong CHOU and Archan MISRA Conference Paper
Managing geography learning objects using personalized project spaces in G-Portal, Dion Hoe-Lian GOH, Aixin SUN, Wenbo ZONG, Dan WU, Ee Peng LIM, Yin-Leng THENG, John HEDBERG, and Chew-Hung CHANG Conference Proceeding Article
New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-like Codes for Tolerating Three Disk Failures, Gui-Liang FENG, Robert H. DENG, Feng Bao, and Jia-Chen SHEN Journal Article
On organizing and accessing geospatial and georeferenced web resources using the g-portal system, Zehua LIU, Ee Peng LIM, Yin-Leng THENG, Dion Hoe-Lian GOH, and Wee-Keong NG Journal Article
Optimization of BCI speller based on P300 potential, Manoj THULASIDAS and Cuntai GUAN Conference Proceeding Article
Partial Adjustable Autonomy in Multi-Agent Environment and Its Application to Military Logistics, Hoong Chuin LAU, Lucas AGUSSURJA, and Ramesh THANGARAJOO Conference Proceeding Article
Protocol for Hiding Movement of Mobile Nodes in Mobile IPv6, Ying QIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Security Analysis and Improvement of Return Routability Protocol, Ying QIU, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article
Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework, Hoong Chuin LAU, Lei ZHANG, and Chang LIU Conference Proceeding Article
Strategic implications of mobile technology: A case study using value-focused thinking, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Journal Article
A unified learning paradigm for large-scale personalized information management, Edward Y. CHANG, Steven C. H. HOI, Xinjing WANG, Wei-Ying MA, and Michael R. LYU Conference Proceeding Article
Constrained Shortest Path Computation, Manolis TERROVITIS, Spiridon BAKIRAS, Dimitris PAPADIAS, and Kyriakos MOURATIDIS Conference Proceeding Article
Dispatching Vehicles in a Mega Container Terminal, Ebru K. BISH, Frank Y. CHEN, Thin Yin LEONG, Barry L. Nelson, Jonathan W. C. NG, and David SIMCHI-LEVI Journal Article
Evaluation of Time-Varying Availability in Multi-Echelon Inventory System with Combat Damage, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article
GeogDL: A web-based approach to geography examination, Ee Peng LIM, Dion Hoe-Lian GOH, and Yin-Leng THENG Journal Article
Medoid Queries in Large Spatial Databases, Kyriakos MOURATIDIS, Dimitris Papadias, and Spiros Papadimitriou Conference Proceeding Article
Semantic Web for EC: How to Overcome the Hurdles and Create the Future?, Jae Kyu LEE Conference Paper
Service Mining for Web Service Composition, Qianhui (Althea) LIANG, Steven Miller, and J. Chung Conference Proceeding Article
Translation initiation sites prediction with mixture Gaussian models in human cDNA sequences, G. Li, Tze-Yun LEONG, and Louxin Zhang Journal Article
Tuning Tabu Search strategies via visual diagnosis, Steven HALIM, Wee Chong WAN, and Hoong Chuin LAU Conference Proceeding Article
Web Mining - The Ontology Approach, Ee Peng LIM and Aixin SUN Conference Paper
WmXML: A System for Watermarking XML Data, Xuan ZHOU, Hwee Hwa PANG, Kian-Lee TAN, and Dhruv MANGLA Conference Proceeding Article
An informatization of society approach to e-government: Analyzing Singapore’s e-government efforts, Calvin M. L. CHAN and Yi Meng LAU Conference Proceeding Article
Approximate strategic reasoning through hierarchical reduction of large symmetric games, Michael P. WELLMAN, Daniel M. REEVES, Kevin M. LOCHNER, Shih-Fen CHENG, and Rahul SURI Conference Proceeding Article
Bridging Units and Business Incubation in a Technology Research Lab, Arcot Desai NARASIMHALU Conference Paper
Co-clustering of time-evolving news story with transcript and keyframe, Xiao WU, Chong-wah NGO, and Qing LI Conference Proceeding Article
Deposit-case attack against secure roaming, Guomin YANG, Duncan S. WONG, and Xiaotie DENG Conference Proceeding Article
Descriptive Naming of Context Data Providers, Norman H. COHEN, Paul CASTRO, and Archan MISRA Conference Proceeding Article
Efficient and Robust Key Management for Large Mobile Ad-Hoc Networks, Bo ZHU, Feng BAO, Robert H. DENG, Mohan S. KANKANHALLI, and Guilin WANG Journal Article
EMD-based video clip retrieval by many-to-many matching, Yuxin PENG and Chong-wah NGO Conference Proceeding Article
Exploiting Belief Bounds: Practical POMDPs for Personal Assistant Agents, Pradeep VARAKANTHAM, Rajiv Maheswaran, and Milind Tambe Conference Proceeding Article
Hot event detection and summarization by graph modeling and matching, Yuxin PENG and Chong-Wah NGO Conference Proceeding Article
How Much You Watch, How Much You Pay, Yongdong WU, Hwee Hwa PANG, and Robert H. DENG Conference Proceeding Article
Middleware Architecture for Evaluation and Selection of 3rd Party Web Services for Service Providers, Dipanjan CHAKRABORTY, Suraj K. JAISWAL, Archan MISRA, and Amit A. NANAVATI Conference Proceeding Article
Multibiometrics based on palmprint and handgeometry, Xiao-Yong WEI, Dan XU, and Chong-wah NGO Conference Proceeding Article
Protocols that hide user's preferences in electronic transactions, Feng BAO and Robert H. DENG Journal Article
Social Network Discovery by Mining Spatio-Temporal Events, Hady LAUW, Ee Peng LIM, Hwee Hwa PANG, and Teck-Tim TAN Journal Article
Strategic Assessment of Information Security Maturity, Arcot Desai NARASIMHALU, Dayasindhu NAGARAJAN, and Raghavan SUBRAMANIAN Report
Synthesis of distributed processes from scenario-based specifications, Jun SUN and Jin Song DONG Conference Proceeding Article
Valuations of Possible States (VPS): A Unifying Quantitative Framework for Evaluating Privacy in Collaboration, Rajiv T. MAHESWARAN, Jonathan Pearce, Pradeep VARAKANTHAM, Emma Bowring, and Milind Tambe Conference Proceeding Article
Aggregate Nearest Neighbor Queries in Spatial Databases, Dimitris PAPADIAS, Yufei TAO, Kyriakos MOURATIDIS, and Chun Kit HUI Journal Article
A Semi-Supervised Active Learning Framework for Image Retrieval, Steven HOI and Michael R. LYU Conference Proceeding Article
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, Feng BAO, Robert H. DENG, Y. HAN, A. JENG, Arcot Desai NARASIMHALU, and T. NGAIR Conference Proceeding Article
Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring, Kyriakos MOURATIDIS, Marios Hadjieleftheriou, and Dimitris Papadias Conference Proceeding Article