Submissions from 2006
Factors Influencing the Adoption of Wireless Technologies on Campus, Chao-Hsien CHU and H. H LIN Journal Article
Functional Annotation Prediction: All for One and One for All, Ori SASSON, Noam Kaplan, and Michal Linial Journal Article
Grid-Partition Index: A Hybrid Approach to Nearest-Neighbor Queries in Wireless Location-Based Services, Baihua ZHENG, Jianliang XU, Wang-Chien LEE, and Dik Lun LEE Journal Article
HSI: A Novel Framework for Efficient Automated Singer Identification in Large Music Databases, Jialie SHEN, John Shepherd, Bin Cui, and Kian-Lee TAN Conference Proceeding Article
Implementation Techniques for Solving POMDPs in Personal Assistant Domains, Pradeep Reddy VARAKANTHAM, Rajiv Maheswaran, and Milind Tambe Conference Proceeding Article
InMAF: Indexing Music Databases via Multiple Acoustic Features, Jialie SHEN, John Shepherd, and AHH Ngu Conference Proceeding Article
In-network join processing for sensor networks, Hai YU, Ee Peng LIM, and Jun ZHANG Conference Proceeding Article
Learning as abductive deliberations, Budhitama SUBAGDJA, Rahwan I., and Sonenberg L. Book
Looking into the Seeds of Time: Discovering Temporal Patterns in Large Transaction Sets, Yingjiu LI, Sencun ZHU, X. Sean WANG, and Sushil Jajodia Journal Article
Minimizing TTP's involvement in signature validation, Jianying ZHOU, Feng Bao, and Robert H. DENG Journal Article
Modeling of Pollution in P2P File Sharing Systems, Q. GU, K. BAI, H. WANG, Peng LIU, and Chao-Hsien CHU Conference Proceeding Article
Multiagent Teamwork: Hybrid Approaches, Praveen PARUCHURI, Emma Bowring, Ranjit Nair, Jonathan Pearce, Nathan Schurr, Milind Tambe, and Pradeep VARAKANTHAM Magazine Article
Performance modeling of MANET interconnectivity, Winston Khoon-Guan SEAH, Lu-Yee YEO, Zhi-Ang EU, Hwee Xian TAN, and Kean-Soon TAN Journal Article
Predicting Uncertain Outcomes Using Information Markets, Yiling CHEN, Chao-Hsien CHU, and Tracy Mullen Journal Article
Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and Its Applications, Rajiv MAHESWARAN, Jonathan Pearce, Emma Bowring, Pradeep Reddy Varakantham, and Milind Tambe Journal Article
Protecting Location Information of Mobile Nodes in Mobile IPv6, Robert H. DENG, Ying QIU, Jianying ZHOU, and Feng BAO Conference Proceeding Article
Routing optimization security in mobile IPv6, Kui REN, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, and Robert H. DENG Journal Article
Spatial Data on the Move, Wee Hyong TOK, Stephane Bressan, Panagiotis Kalnis, and Baihua ZHENG Book Chapter
Splice Site Prediction Using Support Vector Machines with a Bayes Kernel, Ya ZHANG, Chao-Hsien CHU, Yixin CHEN, Hongyuan ZHA, and Xiang JI Journal Article
System Design, Process Performance and Economic Outcomes: An Empirical Study of Letter of Credit Systems Integration in International Banking., P. Davamanirajan, Robert John KAUFFMAN, C.H. Kriebel, and T. Mukhopadhyay Journal Article
Systems analysis & design: An essential part of IS education, Albert L. HARRIS, Michael LANG, Briony J. OATES, and Keng SIAU Journal Article
The Impact of Financial Market and Resale Market on Firm Strategies, Zhiling GUO and Andrew B. WHINSTON Conference Proceeding Article
The Impact of IT on Market Information and Transparency: A Unified Theoretical Framework, N. GRANADOS, A. GUPTA, and Robert J. Kauffman Journal Article
The Move to Artist-Led Music Distribution: Explaining Market Structure Changes in the Digital Music Market., J. Bockstedt, Robert John KAUFFMAN, and F.J. Riggins Journal Article
The roles of Digital Libraries in teaching and learning Geography, Chew-Hung CHANG, John Hedberg, Tiong-Sa Teh, and Ee Peng LIM Book Chapter
To Be or Not to B2B? An Evaluative Model for E-Procurement Channel Adoption, Q. DAI and Robert J. Kauffman Journal Article
Towards Better Quality Specification Miners, David LO and Siau-Cheng KHOO Report
Towards Efficient Automated Singer Identification in Large Music Databases, Jialie SHEN, Cui Bin, Shepherd John, and TAN Kian-Lee Conference Proceeding Article
Using cognitive mapping techniques to supplement UML and UP in information requirements determination, Keng SIAU and TAN Xin Journal Article
Using social development lenses to understand e-government development, Keng SIAU and Y. LONG Journal Article
Visualization for analyzing trajectory-based metaheuristic search algorithms, Steven HALIM, Roland H. C. YAP, and Hoong Chuin LAU Conference Proceeding Article
Submissions from 2005
Toward a greater understanding of end-users’ acceptance of ERP systems, Fiona Fui-hoon NAH, X. TAN, and S. H. TEH Book Chapter
A Block Oriented Fingerprinting Scheme in Relational Database, Siyuan LIU, Shuhong WANG, Robert H. DENG, and Weizhong SHAO Conference Proceeding Article
A Framework for Designing the Balanced Supply Chain Scorecard, Jong Han PARK, Jae Kyu LEE, and Yoo Jung S. Journal Article
A Framework to Learn Bayesian Network from Changing, Multiple-Source Biomedical Data, Li G. and Tze-Yun LEONG Conference Proceeding Article
A generic object-oriented Tabu Search Framework, Hoong Chuin LAU, Xiaomin JIA, and Wee Chong WAN Book Chapter
An Efficient and Robust Computational Framework for Studying Lifetime and Information Capacity in Sensor Networks, Enrique J. DUARTE-MELO, Mingyan LIU, and Archan MISRA Journal Article
Authenticating Query Results in Data Publishing, Di MA, Robert H. DENG, Hwee Hwa PANG, and Jianying ZHOU Conference Proceeding Article
Challenges in an adapttive modeling framework for systems biology, Joshi R. and Tze-Yun LEONG Conference Proceeding Article
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security, Shuhong WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article
Giving Users the Steering Wheel for Guiding Resource-Adaptive Systems, Joao SOUSA, Rajesh Krishna BALAN, Vahe Poladian, David Garlan, and Mahadev Satyanarayanan Report
Improving the quality of conceptual modeling using cognitive mapping techniques, Keng SIAU and X. TAN Journal Article
Integration of Probabilistic Graphic Models for Decision Support, Jiang C., Poh K., and Tze-Yun LEONG Conference Proceeding Article
Key Trends in Supply Chain Management, Jae Kyu LEE Conference Paper
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Matrix: Adaptive Middleware for Distributed Multiplayer Games, Rajesh Krishna BALAN, Maria Ebling, Paul Castro, and Archan MISRA Conference Proceeding Article
Multiplex Encryption a Practical Approach to Encrypting Multi-Recipient Emails, Xuhua DING, Wei Wei, and Kefei CHEN Conference Proceeding Article
New efficient MDS array codes for RAID part II: Rabin-like codes for tolerating multiple (>=4) disk failures, Gui-Liang FENG, Robert H. DENG, and Feng Bao Journal Article
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains, Huafei ZHU, Feng Bao, and Robert H. DENG Conference Proceeding Article
Tailored watermarking schemes for authentication of electronic clinical atlases, Feng BAO, Robert H. DENG, Beng-Chin OOI, and Yanjiang YANG Journal Article
WebArc: Website Archival using a structured approach, Ee Peng LIM and Maria MARISSA Conference Proceeding Article
The Learning Curve of Knowledge Workers in a Computing Call Center, Youngsoo KIM, Ramayya Krishnan, and Linda Argote Presentation
Integrating the FURPS+ model with use cases - A metrics driven approach, Subhajit DATTA Conference Proceeding Article
Organisational knowledge systems: An action-oriented perspective on organisation and information systems, Siu Loon HOE Book Review
Accurately Extracting Coherent Relevant Passages Using Hidden Markov Models, Jing JIANG and ChengXiang ZHAI Conference Proceeding Article
Anonymous DoS-Resistant Access Control Protocol using Passwords for Wireless Networks, Zhiguo WAN, Robert H. DENG, Feng BAO, and Akkihebbal L. ANANDA Conference Proceeding Article
ASPs versus MOTS software solutions, Dan MA and Abrahamm Seidmann Conference Proceeding Article
A Threshold-Based Algorithm for Continuous Monitoring of K Nearest Neighbors, Kyriakos MOURATIDIS, Dimitris Papadias, Spiridon Bakiras, and Yufei TAO Journal Article
Balancing Performance and Confidentiality in Air Index, Qingzhao TAN, Wang-chien LEE, Baihua ZHENG, Peng LIU, and Dik Lun LEE Conference Proceeding Article
Defending against Packet Injection Attacks in Unreliable Ad Hoc Networks, Qijun GU, Peng LIU, Sencun ZHU, and Chao-Hsien CHU Conference Proceeding Article
Does Online Review Reveal a Product's True Quality, Nan HU and Jennifer ZHANG Conference Proceeding Article
Exploiting self-adaptive posture-based focus estimation for lecture video editing, Feng WANG, Chong-wah NGO, and Ting-Chuen PONG Conference Proceeding Article
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Manage Customer Lock-in in the ASP Market, Dan MA and Abraham SEIDMANN Conference Paper
Mining ontological knowledge from domain-specific text documents, Xing JIANG and Ah-hwee TAN Conference Proceeding Article
Motion-based approach for BBC rushes structuring and characterization, Chong-wah NGO and Zailiang PAN Conference Paper
On Security Notions of Steganographic Systems, Kisik CHANG, Robert H. DENG, Feng BAO, Sangjin LEE, and Hyungjun KIM Conference Proceeding Article
Query Processing in Spatial Databases Containing Obstacles, Jun ZHANG, Dimitris Papadias, Kyriakos Mouratidis, and Manli ZHU Journal Article
Scalable trusted online dissemination of JPEG2000 images, Robert H. DENG, Di MA, Weizhong Shao, and Yongdong Wu Journal Article
Selective object stabilization for home video consumers, Zailiang PAN and Chong-wah NGO Journal Article
Slander Resistant Attacker Isolation in Ad Hoc Networks, Q. GU, Chao-Hsien CHU, Peng LIU, and S. ZHU Conference Proceeding Article
PGMC: a framework for probabilistic graphic model combination, Chang-an Jiang, Tze-Yun LEONG, and Kim-Leng Poh Conference Proceeding Article
Agile modeling, agile software development, and extreme programming: The state of research, John ERICKSON, Kalle LYYTINEN, and Keng SIAU Journal Article
AND/OR Graph and Search Algorithm for Discovering Composite Web Services, Qianhui (Althea) LIANG and Stanley Y. W. SU Journal Article
Automatic 3D Face Modeling Using 2D Active Appearance Models, Jianke ZHU, Steven HOI, and Michael R. LYU Conference Proceeding Article
Common pattern discovery using earth mover's distance and local flow maximization, Hung-Khoon TAN and Chong-wah NGO Conference Proceeding Article
DSIM: A Distance-Based Indexing Method for Genomic Sequences, Xia CAO, Beng-Chin OOI, Hwee Hwa PANG, Kian-Lee TAN, and Anthony K. H. TUNG Conference Proceeding Article
Informal Animation Sketching with K-Sketch, Richard C. DAVIS Conference Paper
Informal Animation Sketching with K-Sketch, Richard Christopher DAVIS
Information Systems in Competitive Strategies: Offshoring, Risk Management, Strategic Pricing, E-Sourcing, and Standards., E.K. Clemons, R.D Dewan, and Robert John KAUFFMAN Journal Article
Managerial assessments of E-business investment opportunities: A field study, Anandhi S. BHARADWAJ and Amrit Tiwana Journal Article
NIL is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, WONG, Wei GAO, and Wei GAO Conference Proceeding Article
NIL Is not nothing: Recognition of Chinese network informal language expressions, Yunqing XIA, Kam-Fai WONG, and Wei GAO Conference Proceeding Article
Towards Semantic Service Request of Web Service Composition, Qianhui Althea LIANG, Jen-Yao CHUNG, and Steven M. MILLER Conference Proceeding Article
A Generic Protocol for Controlling Access to Mobile Services, Shuhong WANG, Yingjiu LI, Bo ZHU, and Nan Hu Conference Proceeding Article
An Efficient Certified E-Mail Scheme Suitable for Wireless Mobile Environments, Guilin WANG, Feng BAO, and Robert H. DENG Conference Proceeding Article
Applied public key infrastructure: 4th International Workshop on Applied Public Key Infrastructure, Jianying ZHOU, Meng-Chow Kang, Feng Bao, and Hwee Hwa PANG Edited Conference Proceeding
Behavioral Distance for Intrusion Detection, Debin GAO, Michael K. Reiter, and Dawn SONG Conference Proceeding Article
CUHK at imageCLEF 2005: cross-language and cross-media image retrieval, Steven C. H. HOI, J. ZHU, and M. LYU Conference Proceeding Article
Forms of Expression for Designing Visual Languages for Animation, Richard Christopher DAVIS and James A. Landay
Forms of Expression for Designing Visual Languages for Animation, Richard C. DAVIS and James A. Landay Conference Proceeding Article
Low Latency Multimedia Broadcast in Multi-rate Wireless Meshes, Chun-Tong CHOU and Archan MISRA Conference Paper
Managing geography learning objects using personalized project spaces in G-Portal, Dion Hoe-Lian GOH, Aixin SUN, Wenbo ZONG, Dan WU, Ee Peng LIM, Yin-Leng THENG, John HEDBERG, and Chew-Hung CHANG Conference Proceeding Article
New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-like Codes for Tolerating Three Disk Failures, Gui-Liang FENG, Robert H. DENG, Feng Bao, and Jia-Chen SHEN Journal Article
On organizing and accessing geospatial and georeferenced web resources using the g-portal system, Zehua LIU, Ee Peng LIM, Yin-Leng THENG, Dion Hoe-Lian GOH, and Wee-Keong NG Journal Article
Optimization of BCI speller based on P300 potential, Manoj THULASIDAS and Cuntai GUAN Conference Proceeding Article
Partial Adjustable Autonomy in Multi-Agent Environment and Its Application to Military Logistics, Hoong Chuin LAU, Lucas AGUSSURJA, and Ramesh THANGARAJOO Conference Proceeding Article
Protocol for Hiding Movement of Mobile Nodes in Mobile IPv6, Ying QIU, Jianying ZHOU, Feng BAO, and Robert H. DENG Conference Proceeding Article
Security Analysis and Improvement of Return Routability Protocol, Ying QIU, Jianying ZHOU, and Robert H. DENG Conference Proceeding Article