Submissions from 2007
Modeling and Analysis of Bandwidth Competition in 802.11 Networks, Qijun GU, Chao-Hsien CHU, and Peng LIU Journal Article
Modeling Internet firm survival using Bayesian dynamic models with time-varying coefficients, Sudipto BANERJEE, Robert J. Kauffman, and Bin WANG Journal Article
Monte Carlo Spreadsheet Simulation using Resampling, Thin Yin LEONG Journal Article
National culture and its effects on knowledge communication in online virtual communities, Keng SIAU, Fiona Fui-hoon NAH, and Min LING Journal Article
PASTA: Deriving Rich Presence for Converged Telecommunications Network Applications, Eran BELINSKY, Natalia MARMASSE, Eyal SONSINO, Maria EBLING, William JEROME, Archan MISRA, Daby SOW, and Sune JAKOBSSON Conference Proceeding Article
Preserving Privacy in Association Rule Mining with Bloom Filters, Ling QIU, Yingjiu LI, and Xintao Wu Journal Article
Preserving privacy in on-line analytical processing (OLAP), Lingyu WANG, Sushil JAJODIA, and Duminda WIJESEKERA Book
Quality of service in mobile ad hoc networks: Myth or reality?, W.K.G. SEAH and Hwee Xian TAN Encyclopaedia
Real-Time Supply Chain Control via Multi-Agent Adjustable Autonomy, Hoong Chuin LAU, Lucas Agussurja, and Ramesh Thangarajoo Journal Article
Searching and Tagging: Two Sides of the Same Coin?, Qiaozhu MEI, Jing JIANG, Hang SU, and ChengXiang ZHAI Report
Simpler Spreadsheet Simulation of Multi-Server Queues, Thin Yin LEONG Journal Article
Solving the teacher assignment-course scheduling problem by a hybrid Algorithm, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Journal Article
Technique for hiding mobile node's location movement information in mobile IP, Robert H. DENG, Ying QIU, Jianying Zhou, and Feng Bao Journal Article
The philosophy of special relativity: A comparison between Indian and Western interpretations, Manoj THULASIDAS Journal Article
The Unreal Universe: A Study in Applied Spirituality, Manoj THULASIDAS Book
Towards Efficient Computation of Quality Bounded Solutions in POMDPs: Expected Value Approximation and Dynamic Disjunctive Beliefs, Pradeep Reddy VARAKANTHAM, Rajiv Maheswaran, Tapana GUPTA, and Milind Tambe Conference Proceeding Article
Value-at-Risk in IT Services Contracts, Robert J. KAUFFMAN and Ryan SOUGSTAD Conference Proceeding Article
Wireless Network Design: A Space-Filling Curve Approach, T. Y. Leong and Chao-Hsien CHU Journal Article
Submissions from 2006
Anomaly Based Webphishing Page Detection, Y. PAN and Xuhua DING Conference Proceeding Article
A Set-based Hybrid Approach (SHA) for MRI segmentation, Liu Jiang, Tze-Yun LEONG, Kin Ban Chee, Boon Pin Tan, B. Shuter, and Shih-chang Wang Conference Proceeding Article
An experimental study on U-commerce adoption: Impact of personalization and privacy concerns, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Clique percolation for finding naturally cohesive and overlapping document clusters, Wei GAO, Kam-Fai WONG, Yunqing XIA, and Ruifeng XU Conference Proceeding Article
Context-Based Service Discovery for Enhanced Learning Objects in P2P Networks, Qianhui (Althea) LIANG and Z. WU Conference Proceeding Article
Continuous monitoring of kNN queries in wireless sensor networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Conference Proceeding Article
CoSIGN: A parallel algorithm for coordinated traffic signal control, Shih-Fen CHENG, Marina A. EPELMAN, and Robert L. SMITH Journal Article
Designing web sites for customer loyalty across business domains: A multilevel analysis, S. Mithas, Narayanasamy Ramasubbu, M. S. Krishnan, and C. Fornell Journal Article
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract), Haibing LU, Yingjiu LI, and Xintao Wu Conference Proceeding Article
Dynamic multi-linked negotiations in multi-echelon production scheduling networks, Hoong Chuin LAU, Guan Li SOH, and Wee Chong WAN Conference Proceeding Article
Effect of Web Design Characteristics on Customer Loyalty: A Multilevel Analysis, Sunil MITHAS, Narayan RAMASUBBU, M. S. Krishnan, and Fornell Claes Journal Article
Feature-Based Similarity Search in Graph Structures, Xifeng YAN, Feida ZHU, Philip S. YU, and Jiawei HAN Journal Article
Finding a length-constrained maximum-sum or maximum-density subtree and its application to logistics, Hoong Chuin LAU, Trung Hieu NGO, and Bao Nguyen Nguyen Journal Article
Formal analysis and systematic construction of two-factor authentication scheme, Guomin YANG, Duncan S. WONG, Huaxiong WANG, and Xiaotie DENG Conference Proceeding Article
Identifying difficulties in learning UML, Keng SIAU and Poi-Peng LOO Journal Article
Measuring Qualities of Articles Contributed by Online Communities, Ee Peng LIM, Ba-Quy VUONG, Hady W. LAUW, and Aixin SUN Conference Proceeding Article
Online advertising by the comparison challenge approach, Jae Wong LEE and Jae Kyu LEE Journal Article
On the lower bound of local optimums in k-means algorithms, Zhenjie ZHANG, Bing Tian DAI, and Anthony K.H. TUNG Conference Proceeding Article
Plans as products of learning, Samin KARIM, Budhitama SUBAGDJA, and Liz SONENBERG Conference Proceeding Article
Protecting RFID Communications in Supply Chains, Yingjiu LI and Xuhua DING Conference Proceeding Article
Query-Based Watermarking for XML Data, Xuan ZHOU, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Rapid identification of column heterogeneity, Bing Tian DAI, Nick KOUDAS, Beng Chin OOI, Divesh SRIVASTAVA, and Suresh VENKATASUBRAMANIAN Conference Proceeding Article
Reputation Stretching in Online Auctions, Jianqing CHEN, Mei LIN, and Andrew B. WHINSTON Conference Proceeding Article
Set-based Cascading Approaches for Magnetic Resonance (MR) Image Segmentation (SCAMIS), Jiang Liu, Tze-Yun LEONG, Kin Ban Chee, Boon Pin Tan, Borys Shuter, and Shih Chang Wang Conference Proceeding Article
Supply Chain Information Sharing in a Macro Prediction Market, Zhiling GUO, Fang FANG, and Andrew B. WHINSTON Journal Article
Towards effective content-based music retrieval with multiple acoustic feature combination, Jialie SHEN, John Shepherd, and Ann H. H. NGU Journal Article
Towards effective content-based music retrieval with multiple acoustic feature composition, Jialie SHEN, John Shepherd, and Ngu Ahh Journal Article
Towards Practical Private Information Retrieval, Robert H. DENG Conference Proceeding Article
Impacts of the Feedback Systems on Consumer Learning and Reputation-Based Market Competition, Zhiling GUO Conference Proceeding Article
Patient-specific inference and situation-dependent classification using Context-Sensitive Networks., Rohit Joshi and Tze-Yun LEONG Conference Proceeding Article
A Hybrid Mip/Heuristic Model for Experience Based Driver Assignment, Hoong Chuin LAU, K. M. NG, and Ramesh Thangarajoo Conference Proceeding Article
A model for Anticipatory Event Detection, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article
An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy, Ling QU, Yingjiu LI, and Xintao Wu Conference Proceeding Article
DCMA: A Label-Switching MAC for efficient packet forwarding in multi-hop wireless networks, Arup ACHARYA, Sachin GANU, and Archan MISRA Journal Article
Impacts of the Feedback Systems on Consumer Learning and Reputation - Based Market Competition, Zhiling GUO Conference Proceeding Article
Integration of Wikipedia and a Geography Digital Library, Ee Peng LIM, Zhe WANG, Darwin Sadeli, Yuanyuan LI, Chew-Hung CHANG, Kalyani CHATTERJEA, Dion Hoe-Lian GOH, Yin-Leng THENG, Jun ZHANG, and Aixin SUN Conference Proceeding Article
Low-Latency Broadcast in Multirate Wireless Mesh Networks, Chun Tung CHOU, Archan MISRA, and Junaid QADIR Journal Article
Modeling local interest points for semantic detection and video search at TRECVID 2006, Yu-Gang JIANG, Xiaoyong WEI, Chong-wah NGO, Hung-Khoon TAN, Wanlei ZHAO, and Xiao WU Conference Paper
New Paradigm of Inference Control with Trusted Computing, Yanjiang YANG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Robust Controllability in Temporal Constraint Networks under Uncertainty, Hoong Chuin LAU, Jia LI, and Roland H. C. YAP Conference Proceeding Article
SMArTIC: Towards Building an Accurate, Robust and Scalable Specification Miner, David LO and Siau-Cheng KHOO Conference Proceeding Article
Understanding user perceptions on usefulness and usability of an integrated Wiki-G-Portal, Yin-Leng THENG, Yuanyuan LI, Ee Peng LIM, Zhe WANG, Dion Hoe-Lian GOH, Chew-Hung CHANG, Kalyani CHATTERJEA, and Jun ZHANG Conference Proceeding Article
Efficient Benchmarking of Content-based Image Retrieval via Resampling, Jialie SHEN and John Shepherd Conference Proceeding Article
Exploring Composite Acoustic Features for Efficient Music Similarity Query, Bin CUI, Jialie SHEN, Gao CONG, Heng Tao SHEN, and Cui YU Conference Proceeding Article
Optimal Topology Design for Wireless Local Area Networks, T. YANG and Chao-Hsien CHU Conference Paper
Anticipatory Event Detection via Sentence Classification, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article
Audio similarity measure by graph modeling and matching, Yuxin PENG, Chong-wah NGO, Cuihua FANG, Xiaoou CHEN, and Jianguo XIAO Conference Proceeding Article
Design and analysis of a class-aware recursive loop scheduler for class-based scheduling, Raphael ROM, Moshe SIDI, and Hwee-Pink TAN Journal Article
Economic Performance Analysis of the Tycoon Market-Based Resource Allocation System for Grid Computing, Danny OH and Steven M. MILLER Conference Proceeding Article
Extracting link chains of relationship instances from a website, Myo-Myo NAING, Ee Peng LIM, and Roger Hsiang-Li CHIANG Journal Article
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Chong-wah NGO, Wan-Lei ZHAO, and Yu-Gang JIANG Conference Proceeding Article
Implications of wireless technology for mobile and ubiquitous commerce: A synopsis, Keng SIAU, Fiona Fui-hoon NAH, and Hong SHENG Journal Article
Natural document clustering by clique percolation in random graphs, Wei GAO and Kam-Fai WONG Conference Proceeding Article
Privacy Enhanced Superdistribution of Layered Content with Trusted Access Control, Daniel J. T. CHONG and Robert H. DENG Conference Proceeding Article
QUARK : Empirical Assessment of Automaton-based Specification Miners, David LO and Siau-Cheng KHOO Conference Proceeding Article
Research on predicting network traffic using neural networks, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, T. Hao, X. Sun, J. Qin, and Huayu SHEN Journal Article
Service Pattern Discovery of Web Service Mining in Web Service Registry-Repository, Qianhui Althea LIANG, Jen-Yao CHUNG, Steven M. MILLER, and Yang OUYANG Conference Proceeding Article
Two-Instant Reallocation in Two-Echelon Spare Parts Inventory Systems, Huawei SONG and Hoong Chuin LAU Conference Proceeding Article
Viz: A visual analysis suite for explaining local search behavior, Steven HALIM, Roland H. C. YAP, and Hoong Chuin LAU Conference Proceeding Article
Will existing CS, IT and IS departments really deliver the service science, management and engineering vision?, Steven M. MILLER Conference Proceeding Article
Randomized Local Extrema for Heuristic Selection in TSP, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article
A Secure Extension of the Kwak-Moon Group Signcryption Scheme, D. KWAK, S. J. Moon, Guilin WANG, and Robert H. DENG Journal Article
A Space-Filling Curve Heuristic for Wireless Networks Design, Thin Yin LEONG and Chao-Hsien CHU Conference Paper
Behavioral Distance Measurement using Hidden Markov Models, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
Collective Outsourcing in an Information Supply Chain, Fang FANG, Zhiling GUO, and Andrew B. WHINSTON Conference Paper
Continuous Nearest Neighbor Monitoring in Road Networks, Kyriakos MOURATIDIS, Man Lung YIU, Dimitris PAPADIAS, and Nikos MAMOULIS Conference Proceeding Article
CUHK at ImageCLEF 2005: Cross-language and cross media image retrieval, Steven HOI, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Disclosure Analysis for Two-Way Contingency Tables, Haibing LU, Yingjiu LI, and Xintao WU Conference Proceeding Article
Discovering image-text associations for cross-media web information fusion, Tao JIANG and Ah-Hwee TAN Conference Proceeding Article
Doing their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions, Robert J. KAUFFMAN and Charles A. WOOD Journal Article
Doing Their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions., Robert John KAUFFMAN and C.A. Wood Journal Article
Efficient Algorithms for Mining Maximal Valid Groups, Yida WANG, Ee Peng LIM, and San-Yih HWANG Journal Article
Human-computer interaction research in the management information systems discipline, Fiona Fui-hoon NAH, Ping ZHANG, Scott MCCOY, and Munyong YI Journal Article
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Journal Article
Minimum Latency Broadcasting in Multi-Radio Multi-Channel Multi-Rate Wireless Meshes, Junaid QADIR, Archan MISRA, and Chun Tung CHOU Conference Proceeding Article
Mining RDF metadata for generalized association rules, Tao JIANG and Ah-hwee TAN Conference Proceeding Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Conference Proceeding Article
Practical Private Data Matching Deterrent to Spoofing Attacks, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article
Rights Protection for Data Cubes, Jie GUO, Yingjiu LI, Robert H. DENG, and Kefei CHEN Conference Proceeding Article