The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2004

PDF

High performance P300 speller for brain-computer interface, Cuntai GUAN, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article

Information Security Health Rating for Enterprises, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Conference Paper

IT Orientation, CIO reporting structure and Firm Performance: To Whom Should the CIO Report?, Rajiv BANKER, Nan HU, Jerry Luftman, and Paul Pavlou Conference Paper

PDF

Method for identifying individuals, Manoj THULASIDAS Patent

Link

New efficient user identification and key distribution scheme providing enhanced security, Yanjiang YANG, Shuhong WANG, Feng BAO, Jie WANG, and Robert H. DENG Journal Article

PDF

On Security Notions for Steganalysis, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, Hyungjun KIM, and Jongin LIM Conference Proceeding Article

Operations Research Approach Towards Layered Multi-Source Video Delivery, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper

PDF

Supporting field study with personalized project spaces in a geographical digital library, Ee Peng LIM, Aixin SUN, Zehua LIU, John HEDBERG, Chew-Hung CHANG, Tiong-Sa TEH, Dion Hoe-Lian GOH, and Yin-Leng THENG Conference Proceeding Article

Translation initiation sites prediction with mixture gaussian models, Guoliang Li, Tze-Yun LEONG, and Louxin Zhang Book Chapter

PDF

Vertical sensitivity for the information security health rating of enterprises, Arcot Desai NARASIMHALU, Nagarajan DAYASINDHU, and Raghavan SUBRAMANIAN Conference Paper

Leading and managing people in the dynamic organisation, Siu Loon HOE Book Review

Organisational behaviour: The state of the science, Siu Loon HOE Book Review

PDF

Accommodating Instance Heterogeneities in Database Integration, Ee Peng LIM and Roger Hsiang-Li CHIANG Journal Article

PDF

Anonymous Secure Routing in Mobile Ad-Hoc Networks, Bo ZHU, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

A periodic-review inventory model with application to the continuous-review obsolescence problem, Yuyue SONG and Hoong Chuin LAU Journal Article

PDF

Corrective Maintenance Optimization in an Air Force, Hoong Chuin LAU, K. Y. Neo, and W. C. Wan Conference Proceeding Article

PDF

Finding Constrained Frequent Episodes Using Minimal Occurrences, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article

PDF

Job Scheduling with Unfixed Availability Constraints, Hoong Chuin LAU and C. ZHANG Conference Proceeding Article

PDF

Logistics Network Design with Differentiated Delivery Lead Time: A Chemical Industry Case Study, Michelle Lee Fong CHEONG, Rohit Bhatnagar, and Stephen C. Graves Working Paper

PDF

On Semantic Caching and Query Scheduling for Mobile Nearest-Neighbor Search, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article

PDF

Spatial Queries in Wireless Broadcast Systems, Baihua ZHENG, Wang-Chien LEE, and Dik Lun LEE Journal Article

PDF

The D-tree: An index structure for planar point queries location-based wireless services, Jianliang XU, Baihua ZHENG, Wang-chien LEE, and Dik Lun LEE Journal Article

PDF

Two-Echelon Repairable Item Inventory System with Limited Repair Capacity under Nonstationary Demands, Hoong Chuin LAU and Huawei SONG Conference Proceeding Article

A robust method for recovering geometric proxy from multiple panoramic images, Ada S. K. WAN, Angus M. K. SIU, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article

Link

Gray-Box Extraction of Execution Graphs for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

PDF

airConn: A framework for tiered services in public wireless LAN hot spots, A. ACHARYA, C. Bisdikian, Archan MISRA, and Y. Ko Magazine Article

Link

An Entrepreneur's Dilemma: To SWOT or not to SWOT, A. Desai CHAANAKYA and Arcot Desai NARASIMHALU Conference Proceeding Article

PDF

A Novel Log-based Relevance Feedback Technique in Content-based Image Retrieval, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article

PDF

A survey of online e-banking retail initiatives, P. SOUTHARD and Keng SIAU Journal Article

PDF

Blocking reduction strategies in hierarchical text classification, Ee Peng LIM, Aixin SUN, Wee-Keong NG, and Jaideep SRIVASTAVA Journal Article

PDF

Clip-based similarity measure for hierarchical video retrieval, Yuxin PENG and Chong-wah NGO Conference Proceeding Article

PDF

Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem", Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Journal Article

Competitive Strategy, Economics and Information Systems., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article

PDF

Compliant Encryption of JPEG2000 Codestreams, Yongdong WU and Robert H. DENG Conference Proceeding Article

PDF

Deformable object model matching by topological and geometric similarity, Kwok-Leung TAN, Rynson W. H. LAU, and Chong-wah NGO Conference Proceeding Article

PDF

Design and Analysis of a Cooperative Medium Access Scheme for Wireless Mesh Networks, Arup ACHARYA, Archan MISRA, and Sorav BANSAL Conference Proceeding Article

PDF

Dynamic Access Control for Multi-Privileged Group Communications, Di MA, Robert H. DENG, Yongdong WU, and Tieyan LI Conference Proceeding Article

Exploring Stickiness of Information Technology Employee, Nan HU, Jenny Zhong, and ling LIU Conference Proceeding Article

PDF

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN, Tieyan LI, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article

PDF

Improving transliteration with precise alignment of phoneme chunks and using contextual features, Wei GAO, Kam-Fai WONG, and Wai LAM Conference Proceeding Article

PDF

Indexing and matching of polyphonic songs for query-by-singing system, Tat-Wan LEUNG and Chong-wah NGO Conference Proceeding Article

PDF

Informal animation sketching: Requirements and design, Richard C. DAVIS and James A. Landay Conference Proceeding Article

Information Exploitation and Interorganizational Systems Ownership., K. Han, Robert John KAUFFMAN, and B.R. Nault Journal Article

Link

Progressive Protection of JPEG2000 Codestreams, Yongdong WU, Di MA, and Robert H. DENG Conference Proceeding Article

PDF

Structuring home video by snippet detection and pattern parsing, Zailiang PAN and Chong-wah NGO Conference Proceeding Article

Study of predicting combined chaotic time series using neural networks, Zhaoxia WANG, Z.Q. Chen, Z.Z. Yuan, T.Z. Hao, and B.H. Yang Journal Article

Link

Tamper Detection and Localization for Categorical Data Using Fragile Watermarks, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Conference Proceeding Article

PDF

Trust Establishment in Large Scale Grid Settings, Bo ZHU, Tieyan LI, Huafei ZHU, Mohan S . KANKANHALLI, Feng BAO, and Robert H. DENG Conference Proceeding Article

PDF

A Development Framework for Rapid Metaheuristics Hybridization, Hoong Chuin LAU, M. K. LIM, W. C. Wan, and S. Halim Conference Proceeding Article

PDF

A spectroscopy of texts for effective clustering, Wenyuan LI, Wee-Keong NG, Kok-Leong ONG, and Ee Peng LIM Conference Proceeding Article

PDF

A Two-level Framework for Coalition Formation via Optimization and Agent Negotiation, Hoong Chuin LAU and Lei ZHANG Conference Proceeding Article

PDF

A Visual Language for Animating Sketches, Richard C. DAVIS and James A. Landay Conference Proceeding Article

Link

Classify Encrypted Data in Wireless Sensor Networks, Yongdong WU, Di MA, Tieyan LI, and Robert H. DENG Conference Proceeding Article

Link

Computing of Trust in Wireless Networks, Huafei ZHU, Feng BAO, and Robert H. DENG Conference Proceeding Article

Link

Effect of ocular artifact removal in brain computer interface accuracy, Manoj THULASIDAS, Sitaram RANGANATHA, Jiankang WU, and Wenjie XU Conference Proceeding Article

PDF

On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes, Guilin WANG, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article

PDF

Proxy Signature Scheme with Multiple Original Signers for Wireless E-Commerce Applications, Guilin WANG, Feng BAO, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article

PDF

Robust classification of event-related potential for brain-computer interface, Manoj THULASIDAS Conference Paper

PDF

SCLOPE: An algorithm for clustering data streams of categorical attributes, Kok-Leong ONG, Wenyuan LI, Wee-Keong NG, and Ee Peng LIM Conference Proceeding Article

Link

Securing Return Routability Protocol against Active Attacks, Huafei ZHU, Feng Bao, and Robert H. DENG Conference Proceeding Article

PDF

Security Analysis of Two Signcryption Schemes, Guilin WANG, Robert H. DENG, DongJin KWAK, and Sangjae MOON Conference Proceeding Article

PDF

Shared-Storage Auction Ensures Data Availability, Hady W. LAUW, Siu-Cheung HUI, and Edmund M. K. LAI Journal Article

PDF

Towards personalised web intelligence, Ah-hwee TAN, Hwee-Leng ONG, Hong PAN, Jamie NG, and Qiu-Xiang LI Journal Article

The Pricing and Profitability of Modular Clusters, Carliss Y. BALDWIN, Kim B. Clark, and C. Jason WOODARD Presentation

PDF

Deformable geometry model matching by topological and geometric signatures, Kwok-Leung TAM, Rynson W.H. LAW, and Chong-wah NGO Conference Proceeding Article

PDF

Exploiting information theory for adaptive mobility and resource management in future cellular networks, Abhishek ROY, Sajal K. DAS, and Archan MISRA Magazine Article

PDF

Gesture tracking and recognition for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article

PDF

Graph based image matching, Hui JIANG and Chong-wah NGO Conference Proceeding Article

PDF

Group-based Relevance Feedback with Support Vector Machine Ensembles, Steven C. H. HOI and Michael R. LYU Conference Proceeding Article

PDF

High accuracy classification of EEG signal, Wenjie XU, Cuitai GUAN, Chng Eng SIONG, S. RANGANATHA, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article

PDF

ICA-FX features for classification of singing voice and instrumental sound, Tat-Wan LEUNG, Chong-wah NGO, and Rynson W. H LAU Conference Proceeding Article

Job Satisfaction of Information Technology Professionals, Nan HU, Simon Poon, and Wan Yun Conference Proceeding Article

PDF

LTAM: A Location-Temporal Authorization Model, Hai YU and Ee Peng LIM Conference Proceeding Article

PDF

Novel seed selection for multiple objects detection and tracking, Zailiang PAN and Chong-wah NGO Conference Proceeding Article

Link

On Gray-Box Program Tracking for Anomaly Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article

PDF

Packet-loss resilient coding scheme with only XOR operations, Gui Liang FENG, Robert H. DENG, and Feng BAO Conference Proceeding Article

PDF

Rating information security maturity, Arcot Desai Narasimhalu and Nagarajan DAYASINDHU Magazine Article

PDF

Rating Information Security Maturity, Arcot Desai Narasimhalu and Dayasindhu Nagarajan

Returns on Investment in Information Technology, Rajiv BANKER, Mark Anderson, and Nan Hu Conference Paper

Link

Search Continuous Nearest Neighbor on Air, Baihua ZHENG, Wang-chien LEE, and Dik Lun LEE Conference Proceeding Article

Tracking the Mindset of Open Source Participation, Nan HU, Simon Poon, and Wan Yun Conference Proceeding Article

We did the right thing: an intervention analysis approach to modeling intervened SARS propagation in Singapore., Bin Han Han and Tze-Yun LEONG Conference Proceeding Article

PDF

Transport Logistics Planning with Service-Level Constraints, Hoong Chuin LAU, K. M. NG, and Xintao WU Conference Proceeding Article

PDF

An Interactive Learning Environment for a Dynamic Educational Digital Library, Ee Peng LIM, Dion Hoe-Lian GOH, Yin-Leng THENG, and Eng-Kai SUEN Journal Article

Approach for shot retrieval by optimal matching in the bipartite graph, Yu-Xin PENG, Chong-wah NGO, and Jian-Guo XIAO Journal Article

PDF

A support-ordered trie for fast frequent itemset discovery, Ee Peng LIM, Yew-Kwong WOON, and Wee-Keong NG Journal Article

PDF

Biased Support Vector Machine for Relevance Feedback in Image Retrieval, Steven HOI, Chi-Hang CHAN, Kaizhu HUANG, Michael R. LYU, and Irwin KING Conference Proceeding Article

Link

Defending against Additive Attacks with Maximal Errors in Watermarking Relational Databases, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Conference Proceeding Article

Link

Effect of Quality Management Practices in Distributed Offshore Software Development: An Empirical Analysis, Narayan RAMASUBBU, Sunil Mithas, M. S. Krishnan, and Chris F. Kemerer Conference Proceeding Article

PDF

INFOSeMM: Infosys IT Security Maturity Model: A Report, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Report

PDF

Notes on Equilibria in Symmetric Games, Shih-Fen CHENG, Daniel M. REEVES, Yevgeniy VOROBEYCHIK, and Michael P. WELLMAN Conference Proceeding Article

PDF

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Event Scheduling, Rajiv MAHESWARAN, Milind Tambe, Emma Bowring, Jonathan Pearce, and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

A Rate-Distortion Framework for Information-Theoretic Mobility Management, Abhishek ROY, Archan MISRA, and Sajal K. DAS Conference Proceeding Article

PDF

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity, Bok-Min GOI, Raphael C. W. PHAN, Yanjiang YANG, Feng BAO, Robert H. DENG, and M. U. Siddiqi Conference Proceeding Article

PDF

Proprietary and Open Systems Adoption in E-Procurement: A Risk-Augmented Transactions Cost Perspective, Robert J. Kauffman and Hamid Mohtadi Journal Article

Link

Robust Face Recognition using Minimax Probability Machine, Steven HOI and Michael R. LYU Conference Proceeding Article

PDF

Steganographic Schemes for File System and B-Tree, Hwee Hwa PANG, Kian-Lee TAN, and Xuan ZHOU Journal Article

PDF

Tournament versus Fitness Uniform Selection, Shane LEGG, Marcus HUTTER, and Akshat KUMAR Conference Proceeding Article

Individuals and Institutions in Strategic Network Formation, C. Jason WOODARD Presentation

Mastering IBM Websphere Portal Server, Ben-Natan RON, Gornitsky Richard, Hanis Tim, and Ori SASSON Book