*Students' names are highlighted in blue
Query-oriented Keyphrase Extraction
Minghui QIU, Yaliang LI, and Jing JIANG
Paper presented at the 8th Asian Information Retrieval Societies Conference (AIRS) 2012, 17-19 December 2012, Tianjin, China.
A Survey of Recommender Systems in Twitter (click to view paper)
Mon Kywe SU, Ee-Peng LIM, and Feida ZHU
Paper presented at the 4th International Conference on Social Informatics (SocInfo) 2012, 5-7 December 2012, Lausanne, Switzerland.
On Recommending Hashtags in Twitter Networks (click to view paper)
Mon Kywe SU, Tuan Anh HOANG, Ee-Peng LIM, and Feida ZHU
Paper presented at the 4th International Conference on Social Informatics (SocInfo) 2012, 5-7 December 2012, Lausanne, Switzerland.
An Empirical Study of Bugs in Machine Learning Systems
Ferdian THUNG, Shaowei WANG, David LO, and Lingxiao JIANG
Paper presented at the 23rd IEEE International Symposium on Software Reliability Engineering (ISSRE) 2012, 27-30 November 2012, Dallas (TX), U.S.A.
An Improved Authentication Scheme for H.264/SVC and its Performance Evaluation over Non-Stationary Wireless Mobile Networks
Swee Won LO, Yifan ZHAO, Robert H.DENG, and Xuhua DING
Paper presented at the 6th International Conference on Network and System Security (NSS) 2012, 21-23 November 2012, Wu Yi Shan, Fujian, China.
Information Retrieval Based Nearest Neighbour for Fine-grained Bug Severity Prediction
Tian YUAN, David LO, and Chengnian SUN
Paper presented at the 9th Working Conference on Reverse Engineering (WCRE) 2012, 15-18 October 2012, Kingston (ON), Canada.
Automatic Classification of Software Related Microblogs (click to view paper)
Tian YUAN, Philips Kokoh PRASETYO, David LO, Palakorn ACHANANUPARP, and Ee-Ping LIM
Paper presented at the 28th International Conference on Software Maintenance (ICSM) 2012, 23-30 September 2012, Riva del Garda, Trento, Italy.
Inferring Semantically Related Software Terms and Their Taxonomy By Leveraging Collaborative Tagging (click to view paper)
Shaowei WANG, David LO, and Lingxiao JIANG
Paper presented at the 28th International Conference on Software Maintenance (ICSM) 2012, 23-30 September 2012, Riva del Garda, Trento, Italy.
In-Game Action List Segmentation and Labelling in Real-Time Strategy Games (click to view paper)
Wei GONG, Ee-Peng LIM, Palakorn ACHANANUPARP, Feida ZHU, David LO, and Freddy Chong Tat CHUA
Paper presented at the IEEE Conference on Computational Intelligence and Games (CIG) 2012, 11-14 September 2012, Granada, Spain.
kbe-Anonymity: Test Data Anonymisation for Evolving Programmes (click to view paper)
LUCIA, David LO, Lingxiao JIANG, and Aditya BUDI
Paper presented at the 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2012, 3-7 September 2012, Essen, Germany.
To What Extent Could We Detect Field Defects? An Empirical Study of False Negatives in Static Bug Finding Tools (click to view paper)
Ferdian THUNG, Lucia, David LO, Lingxiao JIANG, Foyzur RAHMAN, and Premkumar DEVANBU
Paper presented at the 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2012, 3-7 September 2012, Essen, Germany.
The Case for Cloud-Enabled Mobile Sensing Services (click to view paper)
Sougata SEN, Archan MISRA, Rajesh BALAN, and Lipyeow LIM
Paper presented at the ACM SIGCOMM 2012 MCC Workshop on Mobile Cloud Computing, 13-17 August 2012, Helsinki, Finland.
Improving Patient Flow in Emergency Department through Dynamic Priority Queue
Kar Way TAN, Chao WANG, and Hoong Chuin LAU
Paper presented at the 8th IEEE International Conference on Automation Science and Engineering (CASE), 20-24 August 2012, Seoul, Korea.
Investment Timing for Mobile Payment Systems (click to view paper)
Robert J. KAUFFMAN, Jun LIU, and Dan MA
Paper presented at the 14th International Conference on Electronic Commerce, 7-8 August 2012, Singapore Management University, Singapore.
Adaptive Display Power Management for OLED Displays (click to view paper)
Kiat Wee TAN, and Rajesh Krishna BALAN
Paper presented at the ACM SIGCOMM 2012 Workshop on Mobile Gaming, 13 August 2012, Helsinki, Finland.
Finding Bursty Topics from Microblogs (click to view paper)
Qiming DIAO, Jing JIANG, Feida ZHU, and Ee-Peng LIM
Paper presented at the 50th Annual Meeting of the Association for Computational Linguistics, 8-14 July 2012, Jeju, Korea.
Identifying Linux Bug Fixing Patches (click to view paper)
Yuan TIAN, Julia LAWALL, and David LO
Paper presented at the International Conference on Software Engineering (ICSE) 2012, 2-9 June 2012, Zurich, Switzerland.
When a Friend in Twitter is a Friend in Life (click to view paper)
Wei XIE, Cheng LI, Feida ZHU, Ee-Peng LIM, and Xueqing GONG
Paper presented at the ACM Web Science (WebSci) Conference 2012, 22-24 June 2012, Evanston (IL), USA.
What Does Software Engineering Community Microblog About? (click to view paper)
Yuan TIAN, Palakorn ACHANANUPARP, Ibrahim Nelman LUBIS, David LO, and Ee-Peng LIM
Paper presented at the 9th Working Conference on Mining Software Repositories (MSR) 2012, 2-3 June 2012, Zurich, Switzerland.
Virality and Susceptibility in Information Diffusions (click to view paper)
Tuan-Anh HOANG and Ee-Peng LIM
Paper presented at the the 6th International AAAI Conference on Weblogs and Social Media (ICWSM-12), 4-7 June 2012, Dublin, Ireland.
Are Faults Localizable? (click to view paper)
LUCIA, Ferdian THUNG, David LO, and Lingxiao JIANG
Paper presented at the 9th Working Conference on Mining Software Repositories (MSR), 2–3 June 2012. Zurich, Switzerland.
Active Refinement Clone Anomaly Reports (click to view paper)
LUCIA, David LO, Lingxiao JIANG, and Aditya BUDI
Paper presented at the 34th International Conference of Software Engineering (ICSE), 2-9 June 2012, Zurich, Switzerland.
A New Framework for Privacy of RFID Path Authentication (click to view paper)
Shaoying CAI, Robert H. DENG, Yingjiu LI, and Yunlei ZHAO
Paper presented at the 10th International Conference on Applied Cryptography and Network Security, 26-29 June 2012, Singapore.
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains (click to view paper)
Shaoying CAI, Yingjiu LI, and Yunlei ZHAO
Paper presented at the International Information Security and Privacy Conference, 4-6 June 2012, Crete, Greece.
Modeling Diffusion in Social Networks Using Network Properties (click to view paper)
Minh-Duc LUU, Ee-Peng LIM, Tuan-Anh HOANG, and Freddy Chong Tat CHUA
Paper presented at the 6th International AAAI Conference on Weblogs and Social Media, 4-7 June 2012, Dublin, Ireland.
Evaluation of Different Electronic Product Code Discovery Service Models (click to view paper)
Su Mon KYWE, Jie SHI, Yingjiu LI, and Raghuwanshi KAILASH
Paper published in Advances in Internet of Things (AIT), Vol. 2(2), pp. 37-46.
Mining Social Dependencies in Dynamic Interaction Networks (click to view paper)
Freddy Chong Tat CHUA, Hady W. LAUW, and Ee-Peng LIM
Paper presented at the SIAM International Conference on Data Mining, 26-28 April 2012, Anaheim (CA), USA.
Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems (click to view paper)
Qiang YAN, Yingjiu LI, and Robert H. DENG
Paper published in International Journal of RFID Security and Cryptography (IJRFIDSC), Vol. 1 Issue. (1/2) (2012), pp. 25-35.
Improved Duplicate Bug Report Identification
Yuan TIAN, Chengnian SUN and David LO
Paper presented at the 16th European Conference on Software Maintenance and Reengineering (CSMR) 2012, 27-30 March 2012, Szeged, Hungary.
HuMan: Creating Memorable Fingerprints of Mobile Users (click to view paper)
Payas GUPTA, Kiat Wee TAN, Narayan RAMASUBBU, David LO, Debin Gao, and Rajesh Krishna BALAN
Paper presented at the IEEE International Conference on Pervasive Computing and Communications, 19-23 March 2012, Lugano, Switzerland.
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principles and Usability (click to view paper)
Qiang YAN, Jin HAN, Yingjiu LI, and Robert H. DENG
Paper presented at the 19th Annual Network & Distributed System Security Symposium, 5-8 February 2012, San Diego (CA), USA.