Submissions from 2006
Clique percolation for finding naturally cohesive and overlapping document clusters, Wei GAO, Kam-Fai WONG, Yunqing XIA, and Ruifeng XU Conference Proceeding Article
Context-Based Service Discovery for Enhanced Learning Objects in P2P Networks, Qianhui (Althea) LIANG and Z. WU Conference Proceeding Article
Continuous monitoring of kNN queries in wireless sensor networks, Yuxia YAO, Xueyan TANG, and Ee Peng LIM Conference Proceeding Article
CoSIGN: A parallel algorithm for coordinated traffic signal control, Shih-Fen CHENG, Marina A. EPELMAN, and Robert L. SMITH Journal Article
Designing web sites for customer loyalty across business domains: A multilevel analysis, S. Mithas, Narayanasamy Ramasubbu, M. S. Krishnan, and C. Fornell Journal Article
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract), Haibing LU, Yingjiu LI, and Xintao Wu Conference Proceeding Article
Dynamic multi-linked negotiations in multi-echelon production scheduling networks, Hoong Chuin LAU, Guan Li SOH, and Wee Chong WAN Conference Proceeding Article
Effect of Web Design Characteristics on Customer Loyalty: A Multilevel Analysis, Sunil MITHAS, Narayan RAMASUBBU, M. S. Krishnan, and Fornell Claes Journal Article
Feature-Based Similarity Search in Graph Structures, Xifeng YAN, Feida ZHU, Philip S. YU, and Jiawei HAN Journal Article
Finding a length-constrained maximum-sum or maximum-density subtree and its application to logistics, Hoong Chuin LAU, Trung Hieu NGO, and Bao Nguyen Nguyen Journal Article
Formal analysis and systematic construction of two-factor authentication scheme, Guomin YANG, Duncan S. WONG, Huaxiong WANG, and Xiaotie DENG Conference Proceeding Article
Identifying difficulties in learning UML, Keng SIAU and Poi-Peng LOO Journal Article
Measuring Qualities of Articles Contributed by Online Communities, Ee Peng LIM, Ba-Quy VUONG, Hady W. LAUW, and Aixin SUN Conference Proceeding Article
Online advertising by the comparison challenge approach, Jae Wong LEE and Jae Kyu LEE Journal Article
On the lower bound of local optimums in k-means algorithms, Zhenjie ZHANG, Bing Tian DAI, and Anthony K.H. TUNG Conference Proceeding Article
Plans as products of learning, Samin KARIM, Budhitama SUBAGDJA, and Liz SONENBERG Conference Proceeding Article
Protecting RFID Communications in Supply Chains, Yingjiu LI and Xuhua DING Conference Proceeding Article
Query-Based Watermarking for XML Data, Xuan ZHOU, Hwee Hwa PANG, and Kian-Lee TAN Conference Proceeding Article
Rapid identification of column heterogeneity, Bing Tian DAI, Nick KOUDAS, Beng Chin OOI, Divesh SRIVASTAVA, and Suresh VENKATASUBRAMANIAN Conference Proceeding Article
Reputation Stretching in Online Auctions, Jianqing CHEN, Mei LIN, and Andrew B. WHINSTON Conference Proceeding Article
Set-based Cascading Approaches for Magnetic Resonance (MR) Image Segmentation (SCAMIS), Jiang Liu, Tze-Yun LEONG, Kin Ban Chee, Boon Pin Tan, Borys Shuter, and Shih Chang Wang Conference Proceeding Article
Supply Chain Information Sharing in a Macro Prediction Market, Zhiling GUO, Fang FANG, and Andrew B. WHINSTON Journal Article
Towards effective content-based music retrieval with multiple acoustic feature combination, Jialie SHEN, John Shepherd, and Ann H. H. NGU Journal Article
Towards effective content-based music retrieval with multiple acoustic feature composition, Jialie SHEN, John Shepherd, and Ngu Ahh Journal Article
Towards Practical Private Information Retrieval, Robert H. DENG Conference Proceeding Article
Impacts of the Feedback Systems on Consumer Learning and Reputation-Based Market Competition, Zhiling GUO Conference Proceeding Article
Patient-specific inference and situation-dependent classification using Context-Sensitive Networks., Rohit Joshi and Tze-Yun LEONG Conference Proceeding Article
A Hybrid Mip/Heuristic Model for Experience Based Driver Assignment, Hoong Chuin LAU, K. M. NG, and Ramesh Thangarajoo Conference Proceeding Article
A model for Anticipatory Event Detection, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article
An Approach to Outsourcing Data Mining Tasks While Protecting Business Intelligence and Customer Privacy, Ling QU, Yingjiu LI, and Xintao Wu Conference Proceeding Article
DCMA: A Label-Switching MAC for efficient packet forwarding in multi-hop wireless networks, Arup ACHARYA, Sachin GANU, and Archan MISRA Journal Article
Impacts of the Feedback Systems on Consumer Learning and Reputation - Based Market Competition, Zhiling GUO Conference Proceeding Article
Integration of Wikipedia and a Geography Digital Library, Ee Peng LIM, Zhe WANG, Darwin Sadeli, Yuanyuan LI, Chew-Hung CHANG, Kalyani CHATTERJEA, Dion Hoe-Lian GOH, Yin-Leng THENG, Jun ZHANG, and Aixin SUN Conference Proceeding Article
Low-Latency Broadcast in Multirate Wireless Mesh Networks, Chun Tung CHOU, Archan MISRA, and Junaid QADIR Journal Article
Modeling local interest points for semantic detection and video search at TRECVID 2006, Yu-Gang JIANG, Xiaoyong WEI, Chong-wah NGO, Hung-Khoon TAN, Wanlei ZHAO, and Xiao WU Conference Paper
New Paradigm of Inference Control with Trusted Computing, Yanjiang YANG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Robust Controllability in Temporal Constraint Networks under Uncertainty, Hoong Chuin LAU, Jia LI, and Roland H. C. YAP Conference Proceeding Article
SMArTIC: Towards Building an Accurate, Robust and Scalable Specification Miner, David LO and Siau-Cheng KHOO Conference Proceeding Article
Understanding user perceptions on usefulness and usability of an integrated Wiki-G-Portal, Yin-Leng THENG, Yuanyuan LI, Ee Peng LIM, Zhe WANG, Dion Hoe-Lian GOH, Chew-Hung CHANG, Kalyani CHATTERJEA, and Jun ZHANG Conference Proceeding Article
Efficient Benchmarking of Content-based Image Retrieval via Resampling, Jialie SHEN and John Shepherd Conference Proceeding Article
Exploring Composite Acoustic Features for Efficient Music Similarity Query, Bin CUI, Jialie SHEN, Gao CONG, Heng Tao SHEN, and Cui YU Conference Proceeding Article
Optimal Topology Design for Wireless Local Area Networks, T. YANG and Chao-Hsien CHU Conference Paper
Anticipatory Event Detection via Sentence Classification, Qi HE, Kuiyu CHANG, and Ee Peng LIM Conference Proceeding Article
Audio similarity measure by graph modeling and matching, Yuxin PENG, Chong-wah NGO, Cuihua FANG, Xiaoou CHEN, and Jianguo XIAO Conference Proceeding Article
Critical success factors for ERP implementation and upgrade, Fiona Fui-hoon NAH and Santiago DELGADO Journal Article
Design and analysis of a class-aware recursive loop scheduler for class-based scheduling, Raphael ROM, Moshe SIDI, and Hwee-Pink TAN Journal Article
Economic Performance Analysis of the Tycoon Market-Based Resource Allocation System for Grid Computing, Danny OH and Steven M. MILLER Conference Proceeding Article
Extracting link chains of relationship instances from a website, Myo-Myo NAING, Ee Peng LIM, and Roger Hsiang-Li CHIANG Journal Article
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation, Chong-wah NGO, Wan-Lei ZHAO, and Yu-Gang JIANG Conference Proceeding Article
Implications of wireless technology for mobile and ubiquitous commerce: A synopsis, Keng SIAU, Fiona Fui-hoon NAH, and Hong SHENG Journal Article
Natural document clustering by clique percolation in random graphs, Wei GAO and Kam-Fai WONG Conference Proceeding Article
Privacy Enhanced Superdistribution of Layered Content with Trusted Access Control, Daniel J. T. CHONG and Robert H. DENG Conference Proceeding Article
QUARK : Empirical Assessment of Automaton-based Specification Miners, David LO and Siau-Cheng KHOO Conference Proceeding Article
Research on predicting network traffic using neural networks, Zhaoxia WANG, Yugeng SUN, Zhiyong WANG, T. Hao, X. Sun, J. Qin, and Huayu SHEN Journal Article
Service Pattern Discovery of Web Service Mining in Web Service Registry-Repository, Qianhui Althea LIANG, Jen-Yao CHUNG, Steven M. MILLER, and Yang OUYANG Conference Proceeding Article
Two-Instant Reallocation in Two-Echelon Spare Parts Inventory Systems, Huawei SONG and Hoong Chuin LAU Conference Proceeding Article
Viz: A visual analysis suite for explaining local search behavior, Steven HALIM, Roland H. C. YAP, and Hoong Chuin LAU Conference Proceeding Article
Will existing CS, IT and IS departments really deliver the service science, management and engineering vision?, Steven M. MILLER Conference Proceeding Article
Randomized Local Extrema for Heuristic Selection in TSP, Qianhui (Althea) LIANG and S. Rubin Conference Proceeding Article
A Secure Extension of the Kwak-Moon Group Signcryption Scheme, D. KWAK, S. J. Moon, Guilin WANG, and Robert H. DENG Journal Article
A Space-Filling Curve Heuristic for Wireless Networks Design, Thin Yin LEONG and Chao-Hsien CHU Conference Paper
Behavioral Distance Measurement using Hidden Markov Models, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
Collective Outsourcing in an Information Supply Chain, Fang FANG, Zhiling GUO, and Andrew B. WHINSTON Conference Paper
Continuous Nearest Neighbor Monitoring in Road Networks, Kyriakos MOURATIDIS, Man Lung YIU, Dimitris PAPADIAS, and Nikos MAMOULIS Conference Proceeding Article
CUHK at ImageCLEF 2005: Cross-language and cross media image retrieval, Steven HOI, Jianke ZHU, and Michael R. LYU Conference Proceeding Article
Disclosure Analysis for Two-Way Contingency Tables, Haibing LU, Yingjiu LI, and Xintao WU Conference Proceeding Article
Discovering image-text associations for cross-media web information fusion, Tao JIANG and Ah-Hwee TAN Conference Proceeding Article
Doing their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions, Robert J. KAUFFMAN and Charles A. WOOD Journal Article
Doing Their Bidding: An Empirical Examination of Factors that Affect a Buyer’s Utility in Internet Auctions., Robert John KAUFFMAN and C.A. Wood Journal Article
Efficient Algorithms for Mining Maximal Valid Groups, Yida WANG, Ee Peng LIM, and San-Yih HWANG Journal Article
Human-computer interaction research in the management information systems discipline, Fiona Fui-hoon NAH, Ping ZHANG, Scott MCCOY, and Munyong YI Journal Article
Masking Page Reference Patterns in Encryption Databases on Untrusted Storage, Xi MA, Hwee Hwa PANG, and Kian-Lee TAN Journal Article
Minimum Latency Broadcasting in Multi-Radio Multi-Channel Multi-Rate Wireless Meshes, Junaid QADIR, Archan MISRA, and Chun Tung CHOU Conference Proceeding Article
Mining RDF metadata for generalized association rules, Tao JIANG and Ah-hwee TAN Conference Proceeding Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
Multi-learner based recursive supervised training, Laxmi R. IYER, Kiruthika RAMANATHAN, and Sheng-Uei GUAN Journal Article
On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining, Songtao GUO, Xintao Wu, and Yingjiu LI Conference Proceeding Article
Practical Private Data Matching Deterrent to Spoofing Attacks, Yanjiang YANG, Robert H. DENG, and Feng BAO Conference Proceeding Article
Rights Protection for Data Cubes, Jie GUO, Yingjiu LI, Robert H. DENG, and Kefei CHEN Conference Proceeding Article
The boundary spanner’s role in organisational learning: Unleashing untapped potential, Siu Loon HOE Journal Article
Three Architectures for Trusted Data Dissemination in Edge Computing, Shen-Tat GOH, Hwee Hwa PANG, Robert H. DENG, and Feng BAO Journal Article
Wireless indoor positioning system with enhanced nearest neighbors in signal space algorithm, Quang TRAN, Juki Wirawan TANTRA, Ah-hwee TAN, Ah-Hwee TAN, Kin-Choong YOW, and Dongyu QIU Conference Proceeding Article
Premier e-Business cases from Asia, Jae Kyu LEE, Benjamin GAN, and Vijay SETHI Edited Book
A mobile lecture slide organization tool for students, K.O. CHOW, Chong-wah NGO, IP H.H.S., and K.S. CHEUNG Conference Proceeding Article
Quantitative retrieval of suspended solid concentration in Lake Taihu based on BP neural net, Heng LYU, Xingguo LI, and Kai CAO Journal Article
A hybrid architecture combining reactive plan execution and reactive learning, Samin KARIM, Liz SONENBERG, and Ah-Hwee TAN Conference Proceeding Article
An energy-efficient and access latency optimized indexing scheme for wireless data broadcast, Yuxia YAO, Xueyan TANG, Ee Peng LIM, and Aixin SUN Journal Article
An experimental study on U-commerce adoption: The impact of personalization and privacy concerns, H. SHENG, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article
Architectural Control and Value Migration in Platform Industries, C. Jason WOODARD Conference Paper
Bias and Controversy: Beyond the Statistical Deviation, Hady W. LAUW, Ee Peng LIM, and Ke WANG Conference Proceeding Article
Collaborative Image Retrieval via Regularized Metric Learning, Luo SI, Rong JIN, Steven C. H. HOI, and Michael R. LYU Journal Article
Learning the unified Kernel machines for classification, Steven C. H. HOI, Michael R. LYU, and Edward Y. CHANG Conference Proceeding Article
Secure Real-Time User Preference Collection for Broadcast Scheduling, Xuhua DING, Shuhong WANG, and Baihua ZHENG Conference Proceeding Article
Slander-Resistant Forwarding Isolation in Ad Hoc Networks, Qijun GU, Chao-Hsien CHU, Peng LIU, and Sencun ZHU Journal Article
Social network dynamics for open source software projects, Y. LONG and Keng SIAU Conference Proceeding Article
Solving Generalized Open Constraint Optimization Problem Using Two-Level Multi-Agent Framework: Improved Results, Hoong Chuin LAU and B. VIET Conference Paper
Understanding intrinsic factors influencing benefit maximization of IS usage, Brenda ESCHENBRENNER and Fiona Fui-hoon NAH Conference Proceeding Article
Use of a classroom response system to enhance classroom interactivity, Keng SIAU, H. SHENG, and Fiona Fui-hoon NAH Journal Article
Using mobile technology in education: Perspectives of students and instructors, H. SHENG, F. NAH, and Keng SIAU Conference Proceeding Article
A Research Capability on Management of Engineering and Technology, Arcot Desai NARASIMHALU Conference Paper