Submissions from 2005
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises, Yanjiang YANG, Feng BAO, and Robert H. Deng Conference Proceeding Article
Dynamically Optimized Context in Recommender Systems, Ghim-Eng YAP, Ah-Hwee TAN, and Hwee Hwa PANG Conference Proceeding Article
Dynamically-optimized context in recommender systems, Ghim-Eng YAP, Ah-hwee TAN, and Hwee-Hwa PANG Conference Proceeding Article
Event-driven document selection for terrorism, Zhen SUN, Ee Peng LIM, Kuiyu CHANG, Teng-Kwee ONG, and Rohan Kumar Gunaratna Conference Proceeding Article
Feature selection for the prediction of translation initiation sites, Li G. and Tze-Yun LEONG Journal Article
Information Dissemination via Wireless Broadcast, Baihua ZHENG and Dik Lun LEE Journal Article
Information Systems Leadership and Future Firm Performance, Rajiv BANKER, Mark Anderson, and Nan HU Conference Paper
Leveraging global resources: A distributed process maturity framework for software product development, Narayan RAMASUBBU, M. S. Krishnan, and Prasad Kompalli Journal Article
Live Data Views: Programming Pervasive Applications that Use “Timely” and “Dynamic” Data, Jay BLACK, Paul CASTRO, Archan MISRA, and Jerome WHITE Conference Proceeding Article
Minimum Energy Reliable Paths using Unreliable Wireless Links, Qunfeng DONG, Suman BANERJEE, Micah ADLER, and Archan MISRA Conference Proceeding Article
Mining mobile group patterns: A trajectory-based approach, San-Yih HWANG, Ying-Han LIU, Jeng-Kuen CHIU, and Ee Peng LIM Conference Proceeding Article
On discovering concept entities from web sites, Ming YIN, Dion Hoe-Lian GOH, and Ee Peng LIM Conference Proceeding Article
Protecting Group Dynamic Information in Large Scale Multicast Groups, Yongdong WU, Tieyan LI, and Robert H. DENG Conference Proceeding Article
Secure Human Communications Based on Biometrics Signals, Yongdong WU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Synthesizing e-government stage models – A meta-synthesis based on meta-ethnography approach, Keng SIAU and Y. LONG Journal Article
TOSA: A Near-Optimal Scheduling Algorithm for Multi-Channel Data Broadcast, Baihua ZHENG, Xia XU, Xing JIN, and Dik Lun LEE Conference Proceeding Article
A Fully Distributed Spatial Index for Wireless Data Broadcast, Wang-chien LEE and Baihua ZHENG Conference Proceeding Article
AMOD: a morpholino oligonucleotide selection tool, Eric W. KLEE, Kyong Jin SHIM, Michael A. Pickart, Stephen C. Ekker, and Lynda B. M. Ellis Journal Article
GRACE: Introducción a la Ingeniería, Rafael J. BARROS, Gerardo DUQUE, John A. ROJAS, Luz Marina SÁNCHEZ, and José Divitt VELOSA Book
Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14: Proceedings, Robert Huijie DENG, Feng Bao, Hwee Hwa PANG, and Jianying ZHOU Edited Book
Integrating user feedback log into relevance feedback by coupled SVM for content-based image retrieval, Steven C. H. HOI, Michael R. LYU, and Rong JIN Conference Proceeding Article
Mining social network from spatio-temporal events, Hady Wirawan LAUW, Ee Peng LIM, Teck Tim TAN, and Hwee Hwa PANG Conference Proceeding Article
Predicting Fold Novelty Based on ProtoNet Hierarchical Classification, Ilona KIFER, Ori SASSON, and Michal Linial Journal Article
Predictive neural networks for gene expression data analysis, Ah-hwee TAN and Hong PAN Journal Article
Privacy and Ownership Preserving of Outsourced Medical Data, Elisa BERTINO, Beng Chin OOI, Yanjiang YANG, and Robert H. DENG Conference Proceeding Article
Privacy Aware Market Basket Data Set Generation: A Feasible Approach for Inverse Frequent Set Mining, Xintao WU, Ying WU, Yongge WANG, and Yingjiu LI Conference Proceeding Article
Proactive Caching for Spatial Queries in Mobile Environments, Haibo HU, Jianliang XU, Wing Sing WONG, Baihua ZHENG, Dik Lun LEE, and Wang-Chien LEE Conference Proceeding Article
Providing Efficient Certification Services against Active Attacks in Ad Hoc Networks, Bo ZHU, Guilin WANG, Zhiguo WAN, Mohan S. Kankanhalli, Feng BAO, and Robert H. DENG Conference Proceeding Article
Walverine: A walrasian trading agent, Shih-Fen CHENG, Evan LEUNG, Kevin M. LOCHNER, Kevin O'MALLEY, Daniel M. REEVES, Julian L. SCHVARTZMAN, and Michael P. WELLMAN Journal Article
An Attribute-Based Access Matrix Mode, Xinwen ZHANG, Yingjiu LI, and Divya Nalla Conference Proceeding Article
CORE: A search and browsing tool for semantic instances of web sites, Myo-Myo NAING, Ee Peng LIM, and Robert CHIANG Conference Proceeding Article
Deque: Querying the deep web, Denis SHESTAKOV, Sourav S. BHOWMICK, and Ee Peng LIM Journal Article
DoS-resistant access control protocol with identity confidentiality for wireless networks, Zhiguo WAN, Bo ZHU, Robert H. DENG, Feng BAO, and A. L. ANANDA Conference Proceeding Article
Effect of training datasets on support vector machine prediction of protein-protein interactions, Siaw Ling LO, Cong Zhong CAI, Maxey CHUNG, and Yu Zong CHEN Journal Article
Evaluation of MPEG-4 IPMP Extension, Hwee Hwa PANG and Yongdong WU Conference Proceeding Article
Fingerprinting relational databases: Schemes and specialities, Yingjiu LI, Vipin Swarup, and Sushil Jajodia Journal Article
MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality Constraints, Inseok HWANG, Qi HAN, and Archan MISRA Conference Proceeding Article
Rational Expectations, Optimal Control and Information Technology Adoption, Yoris A. AU and Robert J. KAUFFMAN Journal Article
Rational Expectations, Optimal Control and Information Technology Adoption., Y. Au and Robert John KAUFFMAN Journal Article
Scheduling queries to improve the freshness of a website, Haifeng LIU, Wee-Keong NG, and Ee Peng LIM Journal Article
Video text detection and segmentation for optical character recognition, Chong-wah NGO and Chi-Kwong CHAN Journal Article
Video summarization and scene detection by graph modeling, Chong-wah NGO, Yu-Fei MA, and Hong-Jiang ZHANG Journal Article
Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article
A Genetic Algorithm for Layered Multi-Source Video Distribution, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper
A Multi-Agent Approach for Solving Optimization Problems involving Expensive Resources, Hoong Chuin LAU and H. WANG Conference Proceeding Article
An Effective Customization Procedure with Configurable Standard Models, Hyun Jung LEE and Jae Kyu LEE Journal Article
Applying scenario-based design and claim analysis to the design of a digital library of geography examination resources, Yin-Leng THENG, Dion Hoe-Lian GOH, Ee Peng LIM, Zehua LIU, Ming YIN, Natalie Lee-San PANG, and Patricia Bao-Bao WONG Journal Article
Association Rule Mining, Yew-Kwong WOON, Wee-Keong NG, and Ee Peng LIM Encyclopaedia
Beyond the Hype of Frictionless Markets: Evidence of Heterogeneity in Price Rigidity on the Internet, M. Bergen, Robert John KAUFFMAN, and D.W. Lee Journal Article
Conflicts in teamwork: Hybrids to the rescue, Milind TAMBE, Emma Bowring, H. Jung, G. Kaminka, Rajiv Maheswaran, Janusz Marecki, P. J. Modi, Ranjit Nair, Jonathan Pearce, and Pradeep Reddy VARAKANTHAM Conference Proceeding Article
Discovery of concept entities from web sites using web unit mining, Ming YIN, Dion Hoe-Lian GOH, and Ee Peng LIM Journal Article
Elements of Financial Risk Management for Grid and Utility Computing, Giorgos CHELIOTIS and C. KENYON Book Chapter
Exploring bit-difference for approximate KNN search in high-dimensional databases, Bin Cui, Heng Tao Shen, Jialie SHEN, and Kian-Lee Tan Conference Paper
Finding and Classifying Web Units in Web Sites, Ee Peng LIM and Aixin SUN Journal Article
Implementation of next generation Digital Libraries, Ee Peng LIM and San-Yih HWANG Book Chapter
Is There a Global Digital Divide for Digital Wireless Phone Technologies?, Robert John KAUFFMAN and A.A. Techatassanasoontorn Journal Article
Learning plans with patterns of actions in bounded-rational agents, Subagdja B. and Sonenberg L. Book
Linear correlation discovery in databases: A data mining approach, Cecil CHUA, Roger Hsiang-Li CHIANG, and Ee Peng LIM Journal Article
Location estimation techniques (determination and prediction) techniques in smart environments, Archan MISRA and Sajal K. DAS Book Chapter
Mobile Cache Management, Jianliang XU, Haibo Hu, Xueyan TANG, and Baihua ZHENG Book Chapter
Networked Distributed POMDPs: A Synthesis of Distributed Constraint Optimization and POMDPs, Ranjit NAIR, Pradeep Reddy VARAKANTHAM, Milind Tambe, and Makoto Yokoo Conference Proceeding Article
New Directions in E-Business Management Research: Exploring Competitive Strategy, Economics and IT Issues: Guest Editors’ Introduction, Robert John KAUFFMAN and Rahul TELANG Editorial
On Efficient Music Genre Classification, Jialie SHEN, Shepherd John, and Ngu Ahh Conference Proceeding Article
Ontology-assisted mining of RDF documents, Tao JIANG and Ah-hwee TAN Book Chapter
oPlexus - A Distributed Platform for IS Research and Education, Y. HUANG, Mei LIN, Andrew B. WHINSTON, and A. GUPTA Conference Proceeding Article
Partnering for perfection: An economics perspective on B2B electronic market strategic alliances, Qizhi DAI and Robert J. KAUFFMAN Book Chapter
Protarget: Automatic Prediction of Protein Structure Novelty, Ori SASSON and Michal Linial Journal Article
Protonet 4.0: A Hierarchical Classification of One Million Protein Sequences, Noam KAPLAN, Ori SASSON, Uri Inbar, Moriah Friedlich, Menachem Fromer, Hillel Fleischer, Elon Portugaly, Nathan Linial, and Michal Linial Journal Article
Robust Temporal Constraint Networks, Hoong Chuin LAU, Thomas Ou, and Melvyn Sim Conference Proceeding Article
Rule Identification from Web Pages by the XRML Approach, Juyoung KANG and Jae Kyu LEE Journal Article
Securing Credit Card Transactions with One-Time Payment Scheme, Yingjiu LI and Xinwen ZHANG Journal Article
Securing Jpeg2000 Code-Streams, Robert Huijie Deng, Yongdong Wu, and Di Ma Book Chapter
Securing JPEG2000 code-streams, Robert H. DENG, Yongdong Wu, and Di MA Book Chapter
Security of an ill-posed operator based scheme for image authentication, Yongdong WU and Robert H. DENG Journal Article
Semantic-Sensitive Classification for Large Image Library, Jialie SHEN, John Shepherd, and AHH Ngu Conference Proceeding Article
Systems analysis and design: Should we be researching what we teach?, A. BAJAJ, D. BATRA, A. HEVNER, J. PARSONS, and Keng SIAU Journal Article
Technology competition and optimal investment timing: A real options perspective, Robert J. KAUFFMAN and X. LI Journal Article
Ten Lessons from Finance for Commercial Sharing of IT Resources, Giorgos CHELIOTIS, C. KENYON, and R. Buyya Book Chapter
The Effects of Shilling on Final Bid Prices in Online Auctions, Robert J. KAUFFMAN and Charles A. Wood Journal Article
The International Diffusion of Mobile Commerce: A Coupled Hazard Approach, Robert J. KAUFFMAN and A. A. Techatassanasoontorn Journal Article
The Learning Curve of Knowledge Workers in a Computing Call Cente, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Journal Article
Towards Inferring Protein Interactions: Challenges and Solutions, Y. Zhang, H. Zha, Chao-Hsien Chu, X. Ji, and X. W Chen Journal Article
Towards Semantically Meaningful Feature Spaces for Efficient Indexing in Large Image Databases, Anne H. H. NGU, Jialie SHEN, and John Shepherd Book Chapter
Submissions from 2004
Recursive percentage based hybrid pattern (RPHP) training for curve fitting, Sheng Uei GUAN and Kiruthika RAMANATHAN Conference Proceeding Article
ASPs versus MOTS Software Solutions, Dan MA and Abraham Seidmann Conference Paper
Automatic model structuring from text using biomedical ontology, Joshi R., Li X., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article
Classifying biomedical citations without labeled training examples, Li X., Joshi R., Ramachandaran S., and Tze-Yun LEONG Conference Proceeding Article
Correlating Summarization of Multi-source News with K-Way Graph Bi-clustering, Ya ZHANG, Chao-Hsien CHU, Xiang JI, and Hongyuan ZHA Journal Article
Cost-effectiveness analysis of colorectal cancer screening strategies in singapore: A dynamic decision analytic approach, Wong S., Leong A., and Tze-Yun LEONG Conference Proceeding Article
Design lessons on access features in PAPER, Yin-Leng THENG, Dion Hoe-Lian GOH, Ming YIN, Eng-Kai Suen, and Ee Peng LIM Conference Proceeding Article
Factors impacting e-government development, Keng SIAU and Y. LONG Conference Proceeding Article
High performance P300 speller for brain-computer interface, Cuntai GUAN, Manoj THULASIDAS, and Jiankang WU Conference Proceeding Article
Information Security Health Rating for Enterprises, Arcot Desai NARASIMHALU, N. Dayasindhu, and Raghavan Subramanian Conference Paper
IT Orientation, CIO reporting structure and Firm Performance: To Whom Should the CIO Report?, Rajiv BANKER, Nan HU, Jerry Luftman, and Paul Pavlou Conference Paper
JustiLM: Few-shot justification generation for explainable fact-checking of real-world claims, Fengzhu ZENG and Wei GAO Journal Article
Method for identifying individuals, Manoj THULASIDAS Patent
New efficient user identification and key distribution scheme providing enhanced security, Yanjiang YANG, Shuhong WANG, Feng BAO, Jie WANG, and Robert H. DENG Journal Article
On Security Notions for Steganalysis, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, Hyungjun KIM, and Jongin LIM Conference Proceeding Article
Operations Research Approach Towards Layered Multi-Source Video Delivery, Lai-Tee CHEOK and Alexandros Eleftheriadis Conference Paper
Supporting field study with personalized project spaces in a geographical digital library, Ee Peng LIM, Aixin SUN, Zehua LIU, John HEDBERG, Chew-Hung CHANG, Tiong-Sa TEH, Dion Hoe-Lian GOH, and Yin-Leng THENG Conference Proceeding Article