The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2007

Link

Modeling and Analysis of Bandwidth Competition in 802.11 Networks, Qijun GU, Chao-Hsien CHU, and Peng LIU Journal Article

Link

Modeling Internet firm survival using Bayesian dynamic models with time-varying coefficients, Sudipto BANERJEE, Robert J. Kauffman, and Bin WANG Journal Article

Link

Monte Carlo Spreadsheet Simulation using Resampling, Thin Yin LEONG Journal Article

PDF

National culture and its effects on knowledge communication in online virtual communities, Keng SIAU, Fiona Fui-hoon NAH, and Min LING Journal Article

Link

PASTA: Deriving Rich Presence for Converged Telecommunications Network Applications, Eran BELINSKY, Natalia MARMASSE, Eyal SONSINO, Maria EBLING, William JEROME, Archan MISRA, Daby SOW, and Sune JAKOBSSON Conference Proceeding Article

Link

Preserving Privacy in Association Rule Mining with Bloom Filters, Ling QIU, Yingjiu LI, and Xintao Wu Journal Article

Link

Preserving privacy in on-line analytical processing (OLAP), Lingyu WANG, Sushil JAJODIA, and Duminda WIJESEKERA Book

Link

Quality of service in mobile ad hoc networks: Myth or reality?, W.K.G. SEAH and Hwee Xian TAN Encyclopaedia

PDF

Real-Time Supply Chain Control via Multi-Agent Adjustable Autonomy, Hoong Chuin LAU, Lucas Agussurja, and Ramesh Thangarajoo Journal Article

PDF

Searching and Tagging: Two Sides of the Same Coin?, Qiaozhu MEI, Jing JIANG, Hang SU, and ChengXiang ZHAI Report

Link

Simpler Spreadsheet Simulation of Multi-Server Queues, Thin Yin LEONG Journal Article

Link

Singapore's e-Payment venture into Asia: eNETS. In Lee, Jae Kyu; Gan, Benjamin; Sethi, Vijay (Eds.) Premier e-Business cases from Asia, Chapter 15. Singapore: Pearson Prentice Hall., GAN, Benjamin Case

PDF

Solving the teacher assignment-course scheduling problem by a hybrid Algorithm, Aldy GUNAWAN, Kien Ming NG, and Kim Leng POH Journal Article

Technique for hiding mobile node's location movement information in mobile IP, Robert H. DENG, Ying QIU, Jianying Zhou, and Feng Bao Journal Article

PDF

The philosophy of special relativity: A comparison between Indian and Western interpretations, Manoj THULASIDAS Journal Article

Link

The Unreal Universe: A Study in Applied Spirituality, Manoj THULASIDAS Book

PDF

Towards Efficient Computation of Quality Bounded Solutions in POMDPs: Expected Value Approximation and Dynamic Disjunctive Beliefs, Pradeep Reddy VARAKANTHAM, Rajiv Maheswaran, Tapana GUPTA, and Milind Tambe Conference Proceeding Article

PDF

Value-at-Risk in IT Services Contracts, Robert J. KAUFFMAN and Ryan SOUGSTAD Conference Proceeding Article

Wireless Network Design: A Space-Filling Curve Approach, T. Y. Leong and Chao-Hsien CHU Journal Article

Submissions from 2006

Link

Anomaly Based Webphishing Page Detection, Y. PAN and Xuhua DING Conference Proceeding Article

A Set-based Hybrid Approach (SHA) for MRI segmentation, Liu Jiang, Tze-Yun LEONG, Kin Ban Chee, Boon Pin Tan, B. Shuter, and Shih-chang Wang Conference Proceeding Article

PDF

An experimental study on U-commerce adoption: Impact of personalization and privacy concerns, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article

PDF

Clique percolation for finding naturally cohesive and overlapping document clusters, Wei GAO, Kam-Fai WONG, Yunqing XIA, and Ruifeng XU Conference Proceeding Article

Context-Based Service Discovery for Enhanced Learning Objects in P2P Networks, Qianhui (Althea) LIANG and Z. WU Conference Proceeding Article

PDF

Continuous monitoring of kNN queries in wireless sensor networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Conference Proceeding Article

PDF

CoSIGN: A parallel algorithm for coordinated traffic signal control, Shih-Fen CHENG, Marina A. EPELMAN, and Robert L. SMITH Journal Article

PDF

Designing web sites for customer loyalty across business domains: A multilevel analysis, S. Mithas, Narayanasamy Ramasubbu, M. S. Krishnan, and C. Fornell Journal Article

Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract), Haibing LU, Yingjiu LI, and Xintao Wu Conference Proceeding Article

PDF

Dynamic multi-linked negotiations in multi-echelon production scheduling networks, Hoong Chuin LAU, Guan Li SOH, and Wee Chong WAN Conference Proceeding Article

Link

Effect of Web Design Characteristics on Customer Loyalty: A Multilevel Analysis, Sunil MITHAS, Narayan RAMASUBBU, M. S. Krishnan, and Fornell Claes Journal Article

Link

Feature-Based Similarity Search in Graph Structures, Xifeng YAN, Feida ZHU, Philip S. YU, and Jiawei HAN Journal Article

PDF

Finding a length-constrained maximum-sum or maximum-density subtree and its application to logistics, Hoong Chuin LAU, Trung Hieu NGO, and Bao Nguyen Nguyen Journal Article

PDF

Formal analysis and systematic construction of two-factor authentication scheme, Guomin YANG, Duncan S. WONG, Huaxiong WANG, and Xiaotie DENG Conference Proceeding Article

PDF

Identifying difficulties in learning UML, Keng SIAU and Poi-Peng LOO Journal Article

PDF

Measuring Qualities of Articles Contributed by Online Communities, Ee Peng LIM, Ba-Quy VUONG, Hady W. LAUW, and Aixin SUN Conference Proceeding Article

PDF

Online advertising by the comparison challenge approach, Jae Wong LEE and Jae Kyu LEE Journal Article

PDF

On the lower bound of local optimums in k-means algorithms, Zhenjie ZHANG, Bing Tian DAI, and Anthony K.H. TUNG Conference Proceeding Article

PDF

Plans as products of learning, Samin KARIM, Budhitama SUBAGDJA, and Liz SONENBERG Conference Proceeding Article

Link

Protecting RFID Communications in Supply Chains, Yingjiu LI and Xuhua DING Conference Proceeding Article

PDF

Query-Based Watermarking for XML Data, Xuan ZHOU, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article

PDF

Rapid identification of column heterogeneity, Bing Tian DAI, Nick KOUDAS, Beng Chin OOI, Divesh SRIVASTAVA, and Suresh VENKATASUBRAMANIAN Conference Proceeding Article

PDF

Reputation Stretching in Online Auctions, Jianqing CHEN, Mei LIN, and Andrew B. WHINSTON Conference Proceeding Article

PDF

Set-based Cascading Approaches for Magnetic Resonance (MR) Image Segmentation (SCAMIS), Jiang Liu, Tze-Yun LEONG, Kin Ban Chee, Boon Pin Tan, Borys Shuter, and Shih Chang Wang Conference Proceeding Article

PDF

Supply Chain Information Sharing in a Macro Prediction Market, Zhiling GUO, Fang FANG, and Andrew B. WHINSTON Journal Article

PDF

Towards effective content-based music retrieval with multiple acoustic feature combination, Jialie SHEN, John Shepherd, and Ann H. H. NGU Journal Article

PDF

Towards effective content-based music retrieval with multiple acoustic feature composition, Jialie SHEN, John Shepherd, and Ngu Ahh Journal Article

Link

Towards Practical Private Information Retrieval, Robert H. DENG Conference Proceeding Article

Impacts of the Feedback Systems on Consumer Learning and Reputation-Based Market Competition, Zhiling GUO Conference Proceeding Article

Patient-specific inference and situation-dependent classification using Context-Sensitive Networks., Rohit Joshi and Tze-Yun LEONG Conference Proceeding Article

Link

A Hybrid Mip/Heuristic Model for Experience Based Driver Assignment, Hoong Chuin LAU, K. M. NG, and Ramesh Thangarajoo Conference Proceeding Article

PDF

A model for Anticipatory Event Detection, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article

Link

An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy, Ling QU, Yingjiu LI, and Xintao Wu Conference Proceeding Article

PDF

DCMA: A Label-Switching MAC for efficient packet forwarding in multi-hop wireless networks, Arup ACHARYA, Sachin GANU, and Archan MISRA Journal Article

Impacts of the Feedback Systems on Consumer Learning and Reputation - Based Market Competition, Zhiling GUO Conference Proceeding Article

PDF

Integration of Wikipedia and a Geography Digital Library, Ee Peng LIM, Zhe WANG, Darwin Sadeli, Yuanyuan LI, Chew-Hung CHANG, Kalyani CHATTERJEA, Dion Hoe-Lian GOH, Yin-Leng THENG, Jun ZHANG, and Aixin SUN Conference Proceeding Article

PDF

Low-Latency Broadcast in Multirate Wireless Mesh Networks, Chun Tung CHOU, Archan MISRA, and Junaid QADIR Journal Article

PDF

Modeling local interest points for semantic detection and video search at TRECVID 2006, Yu-Gang JIANG, Xiaoyong WEI, Chong-wah NGO, Hung-Khoon TAN, Wanlei ZHAO, and Xiao WU Conference Paper

PDF

New Paradigm of Inference Control with Trusted Computing, Yanjiang YANG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

Robust Controllability in Temporal Constraint Networks under Uncertainty, Hoong Chuin LAU, Jia LI, and Roland H. C. YAP Conference Proceeding Article

PDF

SMArTIC: Towards Building an Accurate, Robust and Scalable Specification Miner, David LO and Siau-Cheng KHOO Conference Proceeding Article

PDF

Understanding user perceptions on usefulness and usability of an integrated Wiki-G-Portal, Yin-Leng THENG, Yuanyuan LI, Ee Peng LIM, Zhe WANG, Dion Hoe-Lian GOH, Chew-Hung CHANG, Kalyani CHATTERJEA, and Jun ZHANG Conference Proceeding Article

Link

Efficient Benchmarking of Content-based Image Retrieval via Resampling, Jialie SHEN and John Shepherd Conference Proceeding Article

Link

Exploring Composite Acoustic Features for Efficient Music Similarity Query, Bin CUI, Jialie SHEN, Gao CONG, Heng Tao SHEN, and Cui YU Conference Proceeding Article

Optimal Topology Design for Wireless Local Area Networks, T. YANG and Chao-Hsien CHU Conference Paper

Anticipatory Event Detection via Sentence Classification, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article

PDF

Audio similarity measure by graph modeling and matching, Yuxin PENG, Chong-wah NGO, Cuihua FANG, Xiaoou CHEN, and Jianguo XIAO Conference Proceeding Article

PDF

Design and analysis of a class-aware recursive loop scheduler for class-based scheduling, Raphael ROM, Moshe SIDI, and Hwee-Pink TAN Journal Article

Economic Performance Analysis of the Tycoon Market-Based Resource Allocation System for Grid Computing, Danny OH and Steven M. MILLER Conference Proceeding Article

PDF

Extracting link chains of relationship instances from a website, Myo-Myo NAING, Ee Peng LIM, and Roger Hsiang-Li CHIANG Journal Article

PDF

Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Chong-wah NGO, Wan-Lei ZHAO, and Yu-Gang JIANG Conference Proceeding Article

Implications of wireless technology for mobile and ubiquitous commerce: A synopsis, Keng SIAU, Fiona Fui-hoon NAH, and Hong SHENG Journal Article

PDF

Natural document clustering by clique percolation in random graphs, Wei GAO and Kam-Fai WONG Conference Proceeding Article

PDF

Privacy Enhanced Superdistribution of Layered Content with Trusted Access Control, Daniel J. T. CHONG and Robert H. DENG Conference Proceeding Article

Link

QUARK : Empirical Assessment of Automaton-based Specification Miners, David LO and Siau-Cheng KHOO Conference Proceeding Article

Research on predicting network traffic using neural networks, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, T. Hao, X. Sun, J. Qin, and Huayu SHEN Journal Article

PDF

Service Pattern Discovery of Web Service Mining in Web Service Registry-Repository, Qianhui Althea LIANG, Jen-Yao CHUNG, Steven M. MILLER, and Yang OUYANG Conference Proceeding Article

PDF

Two-Instant Reallocation in Two-Echelon Spare Parts Inventory Systems, Huawei SONG and Hoong Chuin LAU Conference Proceeding Article

PDF

Viz: A visual analysis suite for explaining local search behavior, Steven HALIM, Roland H. C. YAP, and Hoong Chuin LAU Conference Proceeding Article

Link

Will existing CS, IT and IS departments really deliver the service science, management and engineering vision?, Steven M. MILLER Conference Proceeding Article

Link

Randomized Local Extrema for Heuristic Selection in TSP, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article

Link

A Secure Extension of the Kwak-Moon Group Signcryption Scheme, D. KWAK, S. J. Moon, Guilin WANG, and Robert H. DENG Journal Article

A Space-Filling Curve Heuristic for Wireless Networks Design, Thin Yin LEONG and Chao-Hsien CHU Conference Paper

Link

Behavioral Distance Measurement using Hidden Markov Models, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

Collective Outsourcing in an Information Supply Chain, Fang FANG, Zhiling GUO, and Andrew B. WHINSTON Conference Paper

PDF

Continuous Nearest Neighbor Monitoring in Road Networks, Kyriakos MOURATIDIS, Man Lung YIU, Dimitris PAPADIAS, and Nikos MAMOULIS Conference Proceeding Article

PDF

CUHK at ImageCLEF 2005: Cross-language and cross media image retrieval, Steven HOI, Jianke ZHU, and Michael R. LYU Conference Proceeding Article

PDF

Disclosure Analysis for Two-Way Contingency Tables, Haibing LU, Yingjiu LI, and Xintao WU Conference Proceeding Article

PDF

Discovering image-text associations for cross-media web information fusion, Tao JIANG and Ah-Hwee TAN Conference Proceeding Article

Link

Doing their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions, Robert J. KAUFFMAN and Charles A. WOOD Journal Article

Doing Their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions., Robert John KAUFFMAN and C.A. Wood Journal Article

Link

Efficient Algorithms for Mining Maximal Valid Groups, Yida WANG, Ee Peng LIM, and San-Yih HWANG Journal Article

PDF

Human-computer interaction research in the management information systems discipline, Fiona Fui-hoon NAH, Ping ZHANG, Scott MCCOY, and Munyong YI Journal Article

PDF

Masking Page Reference Patterns in Encryption Databases on Untrusted Storage, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Journal Article

PDF

Minimum Latency Broadcasting in Multi-Radio Multi-Channel Multi-Rate Wireless Meshes, Junaid QADIR, Archan MISRA, and Chun Tung CHOU Conference Proceeding Article

PDF

Mining RDF metadata for generalized association rules, Tao JIANG and Ah-hwee TAN Conference Proceeding Article

PDF

Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article

PDF

Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article

Link

On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Conference Proceeding Article

PDF

Practical Private Data Matching Deterrent to Spoofing Attacks, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article

PDF

Rights Protection for Data Cubes, Jie GUO, Yingjiu LI, Robert H. DENG, and Kefei CHEN Conference Proceeding Article