The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2005

PDF

A generic object-oriented Tabu Search Framework, Hoong Chuin LAU, Xiaomin JIA, and Wee Chong WAN Book Chapter

PDF

An Efficient and Robust Computational Framework for Studying Lifetime and Information Capacity in Sensor Networks, Enrique J. DUARTE-MELO, Mingyan LIU, and Archan MISRA Journal Article

PDF

Authenticating Query Results in Data Publishing, Di MA, Robert H. DENG, Hwee Hwa PANG, and Jianying ZHOU Conference Proceeding Article

Challenges in an adapttive modeling framework for systems biology, Joshi R. and Tze-Yun LEONG Conference Proceeding Article

PDF

Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security, Shuhong WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

Giving Users the Steering Wheel for Guiding Resource-Adaptive Systems, Joao SOUSA, Rajesh Krishna BALAN, Vahe Poladian, David Garlan, and Mahadev Satyanarayanan Report

PDF

Improving the quality of conceptual modeling using cognitive mapping techniques, Keng SIAU and X. TAN Journal Article

PDF

Integration of Probabilistic Graphic Models for Decision Support, Jiang C., Poh K., and Tze-Yun LEONG Conference Proceeding Article

Key Trends in Supply Chain Management, Jae Kyu LEE Conference Paper

Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper

Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper

PDF

Matrix: Adaptive Middleware for Distributed Multiplayer Games, Rajesh Krishna BALAN, Maria Ebling, Paul Castro, and Archan MISRA Conference Proceeding Article

Link

Multiplex Encryption a Practical Approach to Encrypting Multi-Recipient Emails, Xuhua DING, Wei Wei, and Kefei CHEN Conference Proceeding Article

PDF

New efficient MDS array codes for RAID part II: Rabin-like codes for tolerating multiple (>=4) disk failures, Gui-Liang FENG, Robert H. DENG, and Feng Bao Journal Article

PDF

Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei ZHU, Feng Bao, and Robert H. DENG Conference Proceeding Article

PDF

Tailored watermarking schemes for authentication of electronic clinical atlases, Feng BAO, Robert H. DENG, Beng-Chin OOI, and Yanjiang YANG Journal Article

PDF

WebArc: Website Archival using a structured approach, Ee Peng LIM and Maria MARISSA Conference Proceeding Article

The Learning Curve of Knowledge Workers in a Computing Call Center, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Presentation

Integrating the FURPS+ model with use cases - A metrics driven approach, Subhajit DATTA Conference Proceeding Article

Organisational knowledge systems: An action-oriented perspective on organisation and information systems, Siu Loon HOE Book Review

PDF

Accurately Extracting Coherent Relevant Passages Using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article

PDF

Anonymous DoS-Resistant Access Control Protocol using Passwords for Wireless Networks, Zhiguo WAN, Robert H. DENG, Feng BAO, and Akkihebbal L. ANANDA Conference Proceeding Article

Link

ASPs versus MOTS software solutions, Dan MA and Abrahamm Seidmann Conference Proceeding Article

PDF

A Threshold-Based Algorithm for Continuous Monitoring of K Nearest Neighbors, Kyriakos MOURATIDIS, Dimitris Papadias, Spiridon Bakiras, and Yufei TAO Journal Article

Balancing Performance and Confidentiality in Air Index, Qingzhao TAN, Wang-chien LEE, Baihua ZHENG, Peng LIU, and Dik Lun LEE Conference Proceeding Article

Link

Defending against Packet Injection Attacks in Unreliable Ad Hoc Networks, Qijun GU, Peng LIU, Sencun ZHU, and Chao-Hsien CHU Conference Proceeding Article

Does Online Review Reveal a Product's True Quality, Nan HU and Jennifer ZHANG Conference Proceeding Article

PDF

Exploiting self-adaptive posture-based focus estimation for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article

Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper

Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper

PDF

Mining ontological knowledge from domain-specific text documents, Xing JIANG and Ah-hwee TAN Conference Proceeding Article

PDF

Motion-based approach for BBC rushes structuring and characterization, Chong-wah NGO and Zailiang PAN Conference Paper

PDF

On Security Notions of Steganographic Systems, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, and Hyungjun KIM Conference Proceeding Article

PDF

Query Processing in Spatial Databases Containing Obstacles, Jun ZHANG, Dimitris Papadias, Kyriakos Mouratidis, and Manli ZHU Journal Article

Link

Scalable trusted online dissemination of JPEG2000 images, Robert H. DENG, Di MA, Weizhong Shao, and Yongdong Wu Journal Article

PDF

Selective object stabilization for home video consumers, Zailiang PAN and Chong-wah NGO Journal Article

Link

Slander Resistant Attacker Isolation in Ad Hoc Networks, Q. GU, Chao-Hsien CHU, Peng LIU, and S. ZHU Conference Proceeding Article

PGMC: a framework for probabilistic graphic model combination, Chang-an Jiang, Tze-Yun LEONG, and Kim-Leng Poh Conference Proceeding Article

PDF

AND/OR Graph and Search Algorithm for Discovering Composite Web Services, Qianhui (Althea) LIANG and Stanley Y. W. SU Journal Article

PDF

Automatic 3D Face Modeling Using 2D Active Appearance Models, Jianke ZHU, Steven HOI, and Michael R. LYU Conference Proceeding Article

PDF

Common pattern discovery using earth mover's distance and local flow maximization, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article

PDF

DSIM: A Distance-Based Indexing Method for Genomic Sequences, Xia CAO, Beng-Chin OOI, Hwee Hwa PANG, Kian-Lee TAN, and Anthony K. H. TUNG Conference Proceeding Article

PDF

Informal Animation Sketching with K-Sketch, Richard C. DAVIS Conference Paper

PDF

Informal Animation Sketching with K-Sketch, Richard Christopher DAVIS

Information Systems in Competitive Strategies: Offshoring, Risk Management, Strategic Pricing, E-Sourcing, and Standards., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article

PDF

Managerial assessments of E-business investment opportunities: A field study, Anandhi S. BHARADWAJ and Amrit Tiwana Journal Article

PDF

NIL is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, WONG, Wei GAO, and Wei GAO Conference Proceeding Article

PDF

NIL Is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, Kam-Fai WONG, and Wei GAO Conference Proceeding Article

PDF

Towards Semantic Service Request of Web Service Composition, Qianhui Althea LIANG, Jen-Yao CHUNG, and Steven M. MILLER Conference Proceeding Article

Link

A Generic Protocol for Controlling Access to Mobile Services, Shuhong WANG, Yingjiu LI, Bo ZHU, and Nan Hu Conference Proceeding Article

Link

An Efficient Certified E-Mail Scheme Suitable for Wireless Mobile Environments, Guilin WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article

Applied public key infrastructure: 4th International Workshop on Applied Public Key Infrastructure, Jianying ZHOU, Meng-Chow Kang, Feng Bao, and Hwee Hwa PANG Edited Conference Proceeding

Link

Behavioral Distance for Intrusion Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

PDF

CUHK at imageCLEF 2005: cross-language and cross-media image retrieval, Steven C. H. HOI, J. ZHU, and M. LYU Conference Proceeding Article

PDF

Forms of Expression for Designing Visual Languages for Animation, Richard Christopher DAVIS and James A. Landay

PDF

Forms of Expression for Designing Visual Languages for Animation, Richard C. DAVIS and James A. Landay Conference Proceeding Article

PDF

Low Latency Multimedia Broadcast in Multi-rate Wireless Meshes, Chun-Tong CHOU and Archan MISRA Conference Paper

PDF

Managing geography learning objects using personalized project spaces in G-Portal, Dion Hoe-Lian GOH, Aixin SUN, Wenbo ZONG, Dan WU, Ee Peng LIM, Yin-Leng THENG, John HEDBERG, and Chew-Hung CHANG Conference Proceeding Article

PDF

New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-like Codes for Tolerating Three Disk Failures, Gui-Liang FENG, Robert H. DENG, Feng Bao, and Jia-Chen SHEN Journal Article

PDF

On organizing and accessing geospatial and georeferenced web resources using the g-portal system, Zehua LIU, Ee Peng LIM, Yin-Leng THENG, Dion Hoe-Lian GOH, and Wee-Keong NG Journal Article

Link

Optimization of BCI speller based on P300 potential, Manoj THULASIDAS and Cuntai GUAN Conference Proceeding Article

PDF

Partial Adjustable Autonomy in Multi-Agent Environment and Its Application to Military Logistics, Hoong Chuin LAU, Lucas AGUSSURJA, and Ramesh THANGARAJOO Conference Proceeding Article

Link

Protocol for Hiding Movement of Mobile Nodes in Mobile IPv6, Ying QIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

Security Analysis and Improvement of Return Routability Protocol, Ying QIU, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article

PDF

Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework, Hoong Chuin LAU, Lei ZHANG, and Chang LIU Conference Proceeding Article

PDF

Strategic implications of mobile technology: A case study using value-focused thinking, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Journal Article

A unified learning paradigm for large-scale personalized information management, Edward Y. CHANG, Steven C. H. HOI, Xinjing WANG, Wei-Ying MA, and Michael R. LYU Conference Proceeding Article

PDF

Constrained Shortest Path Computation, Manolis TERROVITIS, Spiridon BAKIRAS, Dimitris PAPADIAS, and Kyriakos MOURATIDIS Conference Proceeding Article

PDF

Dispatching Vehicles in a Mega Container Terminal, Ebru K. BISH, Frank Y. CHEN, Thin Yin LEONG, Barry L. Nelson, Jonathan W. C. NG, and David SIMCHI-LEVI Journal Article

PDF

Evaluation of Time-Varying Availability in Multi-Echelon Inventory System with Combat Damage, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article

PDF

GeogDL: A web-based approach to geography examination, Ee Peng LIM, Dion Hoe-Lian GOH, and Yin-Leng THENG Journal Article

PDF

Medoid Queries in Large Spatial Databases, Kyriakos MOURATIDIS, Dimitris Papadias, and Spiros Papadimitriou Conference Proceeding Article

Semantic Web for EC: How to Overcome the Hurdles and Create the Future?, Jae Kyu LEE Conference Paper

Link

Service Mining for Web Service Composition, Qianhui (Althea) LIANG, Steven Miller, and J. Chung Conference Proceeding Article

PDF

Translation initiation sites prediction with mixture Gaussian models in human cDNA sequences, G. Li, Tze-Yun LEONG, and Louxin Zhang Journal Article

PDF

Tuning Tabu Search strategies via visual diagnosis, Steven HALIM, Wee Chong WAN, and Hoong Chuin LAU Conference Proceeding Article

PDF

Web Mining - The Ontology Approach, Ee Peng LIM and Aixin SUN Conference Paper

PDF

WmXML: A System for Watermarking XML Data, Xuan ZHOU, Hwee Hwa PANG, Kian-Lee TAN, and Dhruv MANGLA Conference Proceeding Article

PDF

An informatization of society approach to e-government: Analyzing Singapore’s e-government efforts, Calvin M. L. CHAN and Yi Meng LAU Conference Proceeding Article

PDF

Approximate strategic reasoning through hierarchical reduction of large symmetric games, Michael P. WELLMAN, Daniel M. REEVES, Kevin M. LOCHNER, Shih-Fen CHENG, and Rahul SURI Conference Proceeding Article

Bridging Units and Business Incubation in a Technology Research Lab, Arcot Desai NARASIMHALU Conference Paper

PDF

Co-clustering of time-evolving news story with transcript and keyframe, Xiao WU, Chong-wah NGO, and Qing LI Conference Proceeding Article

PDF

Deposit-case attack against secure roaming, Guomin YANG, Duncan S. WONG, and Xiaotie DENG Conference Proceeding Article

PDF

Descriptive Naming of Context Data Providers, Norman H. COHEN, Paul CASTRO, and Archan MISRA Conference Proceeding Article

Link

Efficient and Robust Key Management for Large Mobile Ad-Hoc Networks, Bo ZHU, Feng BAO, Robert H. DENG, Mohan S. KANKANHALLI, and Guilin WANG Journal Article

PDF

EMD-based video clip retrieval by many-to-many matching, Yuxin PENG and Chong-wah NGO Conference Proceeding Article

PDF

Exploiting Belief Bounds: Practical POMDPs for Personal Assistant Agents, Pradeep VARAKANTHAM, Rajiv Maheswaran, and Milind Tambe Conference Proceeding Article

PDF

Hot event detection and summarization by graph modeling and matching, Yuxin PENG and Chong-Wah NGO Conference Proceeding Article

PDF

How Much You Watch, How Much You Pay, Yongdong WU, Hwee Hwa PANG, and Robert H. DENG Conference Proceeding Article

PDF

Middleware Architecture for Evaluation and Selection of 3rd Party Web Services for Service Providers, Dipanjan CHAKRABORTY, Suraj K. JAISWAL, Archan MISRA, and Amit A. NANAVATI Conference Proceeding Article

PDF

Multibiometrics based on palmprint and handgeometry, Xiao-Yong WEI, Dan XU, and Chong-wah NGO Conference Proceeding Article

Link

Protocols that hide user's preferences in electronic transactions, Feng BAO and Robert H. DENG Journal Article

PDF

Social Network Discovery by Mining Spatio-Temporal Events, Hady LAUW, Ee Peng LIM, Hwee Hwa PANG, and Teck-Tim TAN Journal Article

PDF

Strategic Assessment of Information Security Maturity, Arcot Desai NARASIMHALU, Dayasindhu NAGARAJAN, and Raghavan SUBRAMANIAN Report

PDF

Synthesis of distributed processes from scenario-based specifications, Jun SUN and Jin Song DONG Conference Proceeding Article

PDF

Valuations of Possible States (VPS): A Unifying Quantitative Framework for Evaluating Privacy in Collaboration, Rajiv T. MAHESWARAN, Jonathan Pearce, Pradeep VARAKANTHAM, Emma Bowring, and Milind Tambe Conference Proceeding Article

PDF

Aggregate Nearest Neighbor Queries in Spatial Databases, Dimitris PAPADIAS, Yufei TAO, Kyriakos MOURATIDIS, and Chun Kit HUI Journal Article

PDF

A Semi-Supervised Active Learning Framework for Image Retrieval, Steven HOI and Michael R. LYU Conference Proceeding Article

PDF

Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, Feng BAO, Robert H. DENG, Y. HAN, A. JENG, Arcot Desai NARASIMHALU, and T. NGAIR Conference Proceeding Article

PDF

Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring, Kyriakos MOURATIDIS, Marios Hadjieleftheriou, and Dimitris Papadias Conference Proceeding Article