Submissions from 2006
The boundary spanner’s role in organisational learning: Unleashing untapped potential, Siu Loon HOE Journal Article
Three Architectures for Trusted Data Dissemination in Edge Computing, Shen-Tat GOH, Hwee Hwa PANG, Robert H. DENG, and Feng BAO Journal Article
Wireless indoor positioning system with enhanced nearest neighbors in signal space algorithm, Quang TRAN, Juki Wirawan TANTRA, Ah-hwee TAN, Ah-Hwee TAN, Kin-Choong YOW, and Dongyu QIU Conference Proceeding Article
Premier e-Business cases from Asia, Jae Kyu LEE, Benjamin GAN, and Vijay SETHI Edited Book
A mobile lecture slide organization tool for students, K.O. CHOW, Chong-wah NGO, IP H.H.S., and K.S. CHEUNG Conference Proceeding Article
Quantitative retrieval of suspended solid concentration in Lake Taihu based on BP neural net, Heng LYU, Xingguo LI, and Kai CAO Journal Article
A hybrid architecture combining reactive plan execution and reactive learning, Samin KARIM, Liz SONENBERG, and Ah-Hwee TAN Conference Proceeding Article
An energy-efficient and access latency optimized indexing scheme for wireless data broadcast, Yuxia YAO, Xueyan TANG, Ee Peng LIM, and Aixin SUN Journal Article
An experimental study on U-commerce adoption: The impact of personalization and privacy concerns, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Architectural Control and Value Migration in Platform Industries, C. Jason WOODARD Conference Paper
Bias and Controversy: Beyond the Statistical Deviation, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Collaborative Image Retrieval via Regularized Metric Learning, Luo SI, Rong JIN, Steven C. H. HOI, and Michael R. LYU Journal Article
Learning the unified Kernel machines for classification, Steven C. H. HOI, Michael R. LYU, and Edward Y. CHANG Conference Proceeding Article
Secure Real-Time User Preference Collection for Broadcast Scheduling, Xuhua DING, Shuhong WANG, and Baihua ZHENG Conference Proceeding Article
Slander-Resistant Forwarding Isolation in Ad Hoc Networks, Qijun GU, Chao-Hsien CHU, Peng LIU, and Sencun ZHU Journal Article
Social network dynamics for open source software projects, Y. LONG and Keng SIAU Conference Proceeding Article
Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework: Improved Results, Hoong Chuin LAU and B. VIET Conference Paper
Understanding intrinsic factors influencing benefit maximization of IS usage, Brenda ESCHENBRENNER and Fiona Fui-hoon NAH Conference Proceeding Article
Use of a classroom response system to enhance classroom interactivity, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Journal Article
Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU Conference Proceeding Article
A Research Capability on Management of Engineering and Technology, Arcot Desai NARASIMHALU Conference Paper
RECAMM: A Research Capability Maturity Model for Managing Technological Innovations, Arcot Desai NARASIMHALU Conference Paper
A Framework for Technology Transfer, Arcot Desai NARASIMHALU Conference Proceeding Article
An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks, Bo ZHU, Sushil JAJODIA, Mohan S. KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, K. REN, Wenjing Lou, K. KIM, and Robert H. DENG Journal Article
Authenticating Multi-Dimensional Query Results in Data Publishing, Weiwei CHENG, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Crossing the Chasm: The XID Technologies Story, Arcot Desai NARASIMHALU and Roberto MARIANI Conference Proceeding Article
Empirical Analysis of the Value of Code Inspections for Project Management, Narayanasamy RAMASUBBU, Subramanyam Ramanath, Sunil Mithas, and M. S. Krishnan Conference Proceeding Article
Extraction of Coherent Relevant Passages using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Journal Article
Generalized on-demand service architecture for interactive applications [US 2006/0168107 A1], Rajesh K. BALAN, Paul C. CASTRO, Maria R. EBLING, and Archan MISRA Patent
Hierarchical Hidden Markov Model for rushes structuring and indexing, Chong-Wah NGO, Zailiang PAN, and Xiaoyong WEI Conference Proceeding Article
Keyframe retrieval by keypoints: Can point-to-point matching help?, Wanlei ZHAO, Yu-Gang JIANG, and Chong-Wah NGO Conference Proceeding Article
Mobile healthcare informatics, Keng SIAU and Zixing SHEN Journal Article
OntoSearch: A full-text search engine for the semantic web, Xing JIANG and Ah-hwee TAN Conference Proceeding Article
Optimal Crl Releasing Strategy in Public Key Infrastructure, Nan HU, Yingjiu LI, and Chengyu MA Conference Proceeding Article
Prediction-based gesture detection in lecture videos by combining visual, speech and electronic slides, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Private Information Retrieval Using Trusted Hardware, Shuhong WANG, Xuhua DING, Robert H. DENG, and Feng BAO Conference Proceeding Article
Reflections on: When Internet Companies Morph, Robert J. KAUFFMAN, T. Miller, and B. WANG Journal Article
Recursive self organizing maps with hybrid clustering, Kiruthika RAMANATHAN and Sheng Uei GUAN Conference Proceeding Article
A Close Look at Privacy Preserving Data Mining Methods, Xindong WU, Yunfeng WANG, Chao-Hsien CHU, Fengli LIU, Ping CHEN, and Dianmin YUE Conference Proceeding Article
Airfreight Pricing and Discounts for Dense and Volumetric Cargoes, Michelle Lee Fong CHEONG, R. Bhatnagar, and S. C. Graves Conference Paper
Batch Mode Active Learning and its Applications to Medical Image Classification, Steven C. H. HOI, Rong JIN, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Can online reviews reveal a product's true quality? Empirical findings analytical modeling of online word-of-mouth communication, Nan HU, Paul Pavlou, and Jennifer ZHANG Conference Proceeding Article
Cognitive mapping techniques for user-database interaction, Keng SIAU and X. TAN Journal Article
CS Cache Engine: Data Access Accelerator for Location-Based Service in Mobile Environments (demo), Ken C. K. LEE, Wang-chien LEE, Julian Winter, Baihua ZHENG, and JianLiang Xu Conference Paper
Exploiting Domain Structure for Named Entity Recognition, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Fuzzy cognitive goal net for interactive storytelling plot design, Yundong CAI, Chunyan MIAO, Ah-hwee TAN, and Zhiqi SHEN Conference Proceeding Article
Learning Distance Metrics with Contextual Constraints for Image Retrieval, Steven C. H. HOI, Wei LIU, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article
MultiLearner based recursive supervised training, Kiruthika RAMANATHAN, Sheng Uei GUAN, and Laxmi R. IYER Conference Proceeding Article
On the Release of Crls in Public Key Infrastructure, Chengyu Ma, Nan Hu, and Yingjiu Li Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Personalized Information Aggregator and Filter: An Application of RSS Technology in the Web, Dan MA and Yanjie ZHAO Conference Paper
Security analysis on a conference scheme for mobile communications, Zhiguo WAN, Feng BAO, Robert H. DENG, and A. L. ANANDA Journal Article
Tracking Nearest Surrounders in Moving Object Environments, Ken C. K. LEE, Josh Schiffman, Baihua ZHENG, and Wang-chien LEE Conference Proceeding Article
Self-organizing neural architecture for reinforcement learning, Ah-hwee TAN Conference Proceeding Article
An Evolutionary Fuzzy Multi-Objective Approach to Cell Formation, C. C. TSAI, Chao-Hsien CHU, and Xindong Wu Conference Proceeding Article
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon LEE, Youngki LEE, Seungwoo KANG, SangJeong LEE, Hyunju JIN, Byoungjip KIM, and Junehwa SONG Conference Proceeding Article
BMQ-Index: Shared and Incremental Processing of Border Monitoring Queries over Data Streams, Jinwon Lee, Youngki Lee, Seungwoo Kang, SangJeong Lee, Hyunju Jin, Byoungjip Kim, and Junehwa Song Conference Paper
Clip-based similarity measure for query-dependent clip retrieval and video summarization, Yuxin PENG and Chong-wah NGO Journal Article
Data Access Techniques in Location-Based Services, Jianliang XU, Baihua ZHENG, and Wang-Chien LEE Conference Proceeding Article
Discovering Causal Dependencies in Mobile Context-Aware Recommenders, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article
Efficient Key Tree Construction for Group Key Agreement in Ad Hoc Networks, Zhiguo WAN, B. ZHU, Robert H. DENG, Feng Bao, and A. L. Ananda Conference Proceeding Article
Efficient querying and resource management using distributed presence information in converged networks, Dipanjan CHAKRABORTY, Koustuv DASGUPTA, and Archan MISRA Conference Proceeding Article
GECON 2006: Proceedings of the 3rd International Workshop on Grid Economics and Business Models, Hing-Yan LEE and Steven M. MILLER Edited Conference Proceeding
Gestalt-based feature similarity measure in trademark database, Hui JIANG, Chong-wah NGO, and Hung-Khoon TAN Journal Article
Guest editorial: Mobile technology in education, Keng SIAU and Fiona Fui-hoon NAH Journal Article
Large-Scale Text Categorization by Batch Mode Active Learning, Steven C. H. HOI, Rong JIN, and Michael R. LYU Conference Proceeding Article
Mining RDF metadata for generalized association rules: Knowledge discovery in the semantic web era, Tao JIANG and Ah-hwee TAN Conference Proceeding Article
On in-network synopsis join processing for sensor networks, Hai YU, Ee Peng LIM, and Jun ZHANG Conference Proceeding Article
Osprey: A practical type system for validating dimensional unit correctness of C programs, Lingxiao JIANG and Zhendong SU Conference Proceeding Article
Real-Time Non-Rigid Shape Recovery via Active Appearance Models for Augmented Reality, Jianke ZHU, Steven C. H. HOI, and Michael R. LYU Conference Proceeding Article
Time-dependent semantic similarity measure of queries using historical click-through data, Qiankun ZHAO, Steven C. H. HOI, Tie-Yan LIU, Sourav S. BHOWMICK, Michael R. LYU, and Wei-Ying MA Conference Proceeding Article
Towards Statistical Modeling Based Value Disclosure Analysis in General Databases, Xintao Wu, Songtao Guo, and Yingjiu LI Conference Paper
Winning back the CUP for Distributed POMDPs: Planning over continuous belief spaces, Pradeep VARAKANTHAM, Ranjit Nair, Milind Tambe, and Makoto Yokoo Conference Proceeding Article
A Fuzzy Multi-Objective Linear Programming Model for Manufacturing Cell Formation, C.C. TSAI and Chao-Hsien Chu Journal Article
Anonymous signature schemes, Guomin YANG, Duncan S. WONG, Xiaotie DENG, and Huaxiong WANG Conference Proceeding Article
A practical password-based two-server authentication and key exchange system, Yanjiang YANG, Robert H. DENG, and Feng Bao Journal Article
A Unified Log-based Relevance Feedback Scheme for Image Retrieval, Steven HOI, Michael R. LYU, and Rong JIN Journal Article
Caching Complementary Space for Location-Based Services, Ken C. K. LEE, Wang-chien LEE, Baihua ZHENG, and Jianliang XU Conference Proceeding Article
Deriving Private Information from Perturbed Data using IQR Based Approach, Songtao GUO, Xintao WU, and Yingjiu LI Conference Proceeding Article
Dimorphic Computing, H. Andreas LAGAR-CAVILLA, Niraj Tolia, Rajesh Krishna BALAN, Eyal De Lara, Mahadev Satyanarayanan, and David O'Halloran Report
Effect of changing requirements: A tracking mechanism for the analysis workflow, Subhajit DATTA and Robert van Engelen Conference Proceeding Article
Efficient client-to-server assignments for distributed virtual environments, Nguyen Binh Duong TA and Suiping ZHOU Conference Proceeding Article
Enterprise agility and the enabling role of information technology, Eric OVERBY, Anandhi S. Bharadwaj, and V. SAMBAMURTHY Journal Article
Evaluation of time-varying availability in multi-echelon spare parts systems with passivation, Hoong Chuin LAU, Huawei SONG, Chuen Teck SEE, and Siew Yen CHENG Journal Article
Experimental and Empirical Perspectives on Grid Resource Allocation for the Singapore Market, Danny OH, Steven MILLER, and Nan HU Conference Proceeding Article
FISA: Feature-based instance selection for imbalanced text classification, Aixin SUN, Ee Peng LIM, Boualem Benatallah, and Mahbub Hassan Conference Proceeding Article
INEXT: An Investigative Search Tool for Knowledge Extraction, Zhen SUN and Ee Peng LIM Conference Proceeding Article
In-network processing of nearest neigbor queries for wireless sensor networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Conference Proceeding Article
Searching Substructures with Superimposed Distance, Xifeng YAN, Feida ZHU, Jiawei HAN, and Philip S. YU Conference Proceeding Article
SGPM: Static Group Pattern Mining using apriori-like sliding window, John GOH, David Taniar, and Ee Peng LIM Conference Proceeding Article
To Be or Not to B2B? An Evaluative Model for E-Procurement Channel Adoption., Q. Dai and Robert John KAUFFMAN Journal Article
Towards Inferring Protein Interactions: Challenges and Solutions, Ya ZHANG, Hongyuan ZHA, Chao-Hsien CHU, Xiang JI, and X. W. CHEN Journal Article
Agility measurement index: A metric for the crossroads of software development methodologies, Subhajit DATTA Conference Proceeding Article
A Survey of Worm Detection and Defense, R. COLE and Chao-Hsien CHU Conference Paper
CAPS: Energy-Efficient Processing of Continuous Aggregate Queries in Sensor Networks, Wen HU, Archan MISRA, and Rajiv SHOREY Conference Proceeding Article
Crosscutting score: An indicator metric for aspect orientation, Subhajit DATTA Conference Proceeding Article
Enforcing Security in Mobile Networks: Challenges and Solutions, Robert H. DENG, Feng BAO, Ying QIU, and Jianying ZHOU Book Chapter
Fortifying Password Authentication in Integrated Healthcare Delivery Systems, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article
Practical Inference Control for Data Cubes, Yingjiu LI, Haibing LU, and Robert H. DENG Conference Proceeding Article