Research Output

Filter
Conference Paper
Conference Paper

A location-aware, service-based audio system

Kirk, R. L. & Newmarch, J., 2005, Enabling Pervasive Consumer Communications: Proceedings of the 2005 2nd IEEE Consumer Communications and Networking Conference. Boutaba, R. (ed.). New Jersey USA: IEEE, Institute of Electrical and Electronics Engineers, p. 343 - 347 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

A logic for secure stratified systems and its application to containerized systems

Lauer, H., Sakzad, A., Rudolph, C. & Nepal, S., 2019, Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering. Chen, L., Ko, R. & Zhu, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 562-569 8 p. 8887372

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A longitudinal cohort study on the retainment of test-driven development

Fucci, D., Romano, S., Baldassarre, M. T., Caivano, D., Scanniello, G., Turhan, B. & Juristo, N., 2018, Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2018: October 11-12, 2018, Oulu, Finland. Méndez, D. & Mockus, A. (eds.). New York NY USA : Association for Computing Machinery (ACM), 10 p. 18

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

A low cost omnidirectional relative localization sensor for swarm applications

Kohlbacher, A., Eliasson, J., Acres, K., Chung, H. & Barca, J. C., 2018, IEEE World Forum on Internet of Things, WF-IoT 2018 - Proceedings: Proceedings . Mueller, H. A., Rongshan, Y. & Skarmeta, A. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 694-699 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

A Low-Dimensional Hybrid Model for Content-Based Image Retrieval

Kulkarni, S., Srinivasan, B. & Ray, S., 2000, Proceedings of the IASTED International Conference, Signal and Image Processing (SIP 2000). CA USA: IASTED/ACTA Press, p. 18 - 21 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Alternative strategies for decision list construction

Newlands, D. A. & Webb, G. I., 2004, Proceedings of the Fourth International Conference on Data Mining Including Building Applications for CRM & Competitive Intelligence. Ebecken, N. F. F., Brebbia, C. A. & Zanasi, A. (eds.). Southampton UK: WIT Press, p. 265 - 273 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

ALVIS - Superpeer semantic search engine - ECDL 2006 demo submission

Pedersen, G. S., Ardö, A., Cromme, M., Taylor, M. & Buntine, W., 1 Jan 2006, 2nd International Workshop on Parameterized and Exact Computation, IWPEC 2006. Springer-Verlag London Ltd., p. 461-462 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4172 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A machine learning approach to link prediction for interlinked documents

Kc, M., Chau, R., Hagenbuchner, M., Tsoi, A. C. & Lee, V., 2010, Focused Retrieval and Evaluation - 8th International Workshop of the Initiative for the Evaluation of XML Retrieval, INEX 2009, Revised and Selected Papers. Springer, p. 342-354 13 p. (Lecture Notes in Computer Science; vol. 6203 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

5 Citations (Scopus)

A Mandatory Access Control Policy Model for Information Security Requirements

Zheng, Y., Leiwo, J. & Gamage, C., 1998, Australian Computer Science Communications: Proceedings of the 21st Australasian Computer Science Conf. (ACSC '98). Singapore: Springer-Verlag London Ltd., p. 527 - 538 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A mapreduce based technique for mining behavioral patterns from sensor data

Rashid, M. M., Gondal, I. & Kamruzzaman, J., 2015, Neural Information Processing: 22nd International Conference (ICONIP 2015), Proceedings, Part IV. Arik, S., Huang, T., Lai, W. K. & Liu, Q. (eds.). Cham Switzerland: Springer, Vol. 9492. p. 145 - 153 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

"Amazon.edu": creating interactive distance education

Butler, M. & Blashki, K. M., 2003, Proceedings of the 14th Australasian Conference on Information Systems 2003 : Delivering IT and e-Business Value in Networked Environments. Lethbridge, N. & Croft, L. (eds.). Joondalup WA Australia: Edith Cowan University, p. 1 - 7 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Ambient kitchen: Designing situated services using a high fidelity prototyping environment

Olivier, P., Xu, G., Monk, A. & Hoey, J., 30 Nov 2009, Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2009. 47

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

42 Citations (Scopus)

Ambiguities in Napier88 Expressions

Lin, H-T. & Hurst, A. J., 1998, The Fifth IDEA International Workshop. Adelaide SA Australia: University of Adelaide, p. 98 - 105 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Ambiguity and deficiency of reversed Dickson permutations

Panario, D., Sakzad, A. & Thomson, D., 2015, Contemporary Mathematics: Topics in Finite Fields. Kyureghyan, G., Mullen, G. L. & Pott, A. (eds.). Providence RI USA: American Mathematical Society, Vol. 632. p. 347 - 358 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A Mean-Median Filter for X-ray image restoration

Guan, X., Qiu, B. & Gureyev, T. E., 2006, Proceedings of the 8th International Conference on Signal Processing 2006. Yuan, B., Ruan, Q. & Tang, X. (eds.). Beijing China: IEEE, Institute of Electrical and Electronics Engineers, Vol. II of IV. p. 848 - 852 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A measure for image quality

Dung, L. P., Bala, S., Salahadin, M., Santosh, K. & Campbell, W., 27 Feb 1998, Proceedings of the 1998 ACM Symposium on Applied Computing, SAC 1998. New York NY USA: Association for Computing Machinery (ACM), p. 513-519 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

A median based interpolation algorithm for deinterlacing

Phu, M. Q., Tischer, P. E. & Wu, H. R., 2004, Proceedings of the 2004 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2004). Ko, S. J. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 390 - 397 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

A membership oriented group key management for application services

Ngo, H. H. H., Wang, Y., Le, P. D., Srinivasan, B. & Malhotra, V. M., 2009, Proceedings of the 12th International Conference on Network-Based Information Systems. Durresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. & Takizawa, M. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 240 - 245 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A metadata schema registry for the registration and analysis of recordkeeping and preservation metadata

Gilliland-Swetland, A. & McKemmish, S., 2005, Archiving 2005 - Final Program and Proceedings. Korean Society for Imaging Science and Technology, p. 109-112 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A metaheuristic approach to fuzzy project scheduling

Pan, H. P. & Yeh, C-H., 2003, Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2003). Palade, V., Howlett, R. J. & Jain, L. C. (eds.). New York USA: Springer-Verlag London Ltd., Vol. 2773. p. 1081 - 1087 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

A meta-learning approach for selecting between response automation strategies in a help-desk domain

Marom, Y., Zukerman, I. & Japkowicz, N., 2007, Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence. Cohn, A. (ed.). Menlo Park California USA: AAAI Press, Vol. 1. p. 907 - 912 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

A meta-reasoner to rule them all: Automated selection of OWL reasoners based on efficiency

Kang, Y-B., Krishnaswamy, S. & Li, Y-F., 2014, Proceedings of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14). Garofalakis, M., Soboroff, I., Suel, T. & Wang, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 1935-1938 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

A method for authentication services in wireless networks

Ngo, H., Wu, X., Le, P. D. & Wilson, C. C., 2008, Proceedings of the 14th Americas Conference on Information Systems. Parsons, J. & Yuan, Y. (eds.). Toronto ON Canada: Association for Information Systems, p. 1 - 9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

A method for evaluating e-Business effectiveness: a study of eBusiness capability in mainland China

Chen, J., Mingins, C. A. & Deng, Y., 2006, Proceedings of the International Conference on e-Business. Filipe, J. & Greene, T. (eds.). Portugal: INSTICC Press, p. 157 - 163 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A method for fingerprint alignment and matching

Wang, L., Bhattacharjee, N. & Srinivasan, B., 2012, Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia. Khalil, I. (ed.). New York NY USA: Association for Computing Machinery (ACM), p. 297 - 301 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A methodology for deriving objective image comparison metrics

Le, M. V., Le, P. D. & Srinivasan, B., 2007, Proceedings of the Ninth IASTED International Conference Signal and Image Processing. de Figueiredo, R. J. P. (ed.). Anaheim CA USA: ACTA Press, p. 89 - 94 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

A method to implement a denial of service protection base

Leiwo, J. & Zheng, Y., 1997, Information security and privacy. Berlin Germany: Springer-Verlag London Ltd., p. 90 - 101 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

A minimum message length approach for argument interpretation

Zukerman, I. & George, S., 2002, Third SIGdial Workshop on Discourse and Dialogue: Proceedings of the Workshop. Jokinen, K. & McRoy, S. (eds.). New Brunswick USA: Association for Computational Linguistics (ACL), p. 211 - 220 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A minimum message length approach to inferring deterioration of pavements with family modelling

Byrne, M., Sanjayan, G., Kodikara, J. K. & Albrecht, D. W., 2006, Research into Practice: Proceedings of the 22nd ARRB Conference. Waldron, G. & et al (eds.). Vermont South Vic Australia: ARRB Group, p. 1 - 15 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A mission-based multiagent system for internet applications

Jayaputera, G. T., Zaslavsky, A. B. & Loke, S. W., 2003, Proceedings of the Fifth International Conference on Enterprise Information Systems. Camp, O., Filipe, J., Hammoudi, S. & Piattini, M. (eds.). Portugal: Escola Superior de Tecnologia de Setubal, Vol. 4. p. 232 - 237 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

5 Citations (Scopus)

A mobile emergency triage decision support system evaluation

Padmanabhan, N., Burstein, F. V., Churilov, L., Wassertheil, J., Hornblower, B. F. P. & Parker, N., 2006, Proceedings of the Thirty-Ninth Annual Hawaii International Conference on System Sciences. Sprague Jr, R. H. (ed.). Los Alamitos CA USA: IEEE Computer Society, p. 1 - 10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

23 Citations (Scopus)

A model-based approach for engineering pervasive services in SOAs

Abeywickrama, D. B. & Ramakrishnan, S., 2008, Proceedings of the 5th international conference on Pervasive services. Parashar, M., Lauria, M., McCann, J. A. & Cotroneo, D. (eds.). Danvers MA USA: Association for Computing Machinery (ACM), p. 57 - 60 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

A model driven exception management framework for developing reliable software systems

Entwisle, S. C., Schmidt, H., Peake, I. & Kendall, E. A., 2006, Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006). Hung, P. C. K. (ed.). Los Alamitos USA: IEEE Computer Society, p. 307 - 318 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

A Model for Assurance of External Properties of Information Security Requirement Bases

Zheng, Y., Gamage, C. & Leiwo, J., 1998, Proceedings of W'shop on Cryptology and Information Security. Taiwan Republic of China: National Cheng Kung University, p. 124 - 131 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A model for domain centered knowledge discovery in databases

Redpath, R. C. & Srinivasan, B., 2004, Proceedings of the IEEE 4th International Conference on Intelligent Systems Design and Application. Rudas, I. J. (ed.). Hungary: IEEE, Institute of Electrical and Electronics Engineers, p. 705 - 711 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A model of business intelligence systems use in Chinese Organizations

Song, Y., Arnott, D. R. & Gao, S., 2017, Australasian Conference on Information Systems 2017, Hobart, Australia. Riemer, K., Indulska, M. & Tuunainen, V. K. (eds.). Hobart Tas Australia: Australasian Conference on Information Systems, p. 1-11 11 p. 122

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File

A model of symmetry breaking in collective decision-making

Hamann, H., Meyer, B., Schmickl, T. & Crailsheim, K., 2010, Proceedings of the 11th International Conference on Simulation of Adaptive Behaviour: From Animals to Animats 11. Doncieux, S., Girard, B., Guillot, A., Hallam, J., Meyer, J-A. & Mouret, J-B. (eds.). Berlin Germany: Springer-Verlag London Ltd., Vol. 6226. p. 639 - 648 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

18 Citations (Scopus)

A model-oriented framework for runtime monitoring of nonfunctional properties

Chan, K., Poernomo, I., Schmidt, H. & Jayaputera, J. C., 2005, Proceedings of the First International Conference on the Quality of Software Architectures (QoSA). Reussner, R., Mayer, J., Stafford, J. A., Overhage, S., Becker, S. & Schroeder, P. J. (eds.). Berlin Germany: Springer-Verlag London Ltd., Vol. 3712. p. 38 - 52 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

26 Citations (Scopus)

A modified algorithm for the fast processing with the Growing Self-Organizing Map

Yu, Y. & Alahakoon, D., 2006, Proceedings of the 2nd International Conference on Information and Automation 2006. Munasinghe, R. & Halgamuge, S. (eds.). Colombo Sri Lanka: Faculty of Engineering, University of Moratuwa, p. 140 - 145 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A modified dynamic self-organizing map algorithm for efficient hardware implementation

Preethichandra, D. M. G., Hsu, A. L. C., Alahakoon, D. & Halgamuge, S. K., 2002, Proceedings of the 1st International Conference on Fuzzy Systems and Knowledge Discovery. Wang, L., Halgamuge, S. & Yao, X. (eds.). Singapore: Nanyang Technological University, Vol. 2. p. 646 - 650 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A modified K-means algorithm for noise reduction in optical motion capture data

Barca, J. C. & Rumantir, G. W., 2007, Proceedings of 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). Lee, R., Chowdhury, M. U., Ray, S. & Lee, T. (eds.). Los Alamitos CA USA: IEEE Computer Society, p. 118 - 122 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

A modular approach to decision support in disaster management within the framework of cyberinfrastructure

Asghar, S., Alahakoon, D. & Churilov, L., 2005, Proceedings of the 8th International Conference of the Association of Information Systems. Borenstein, D. (ed.). Porto Alegre Brazil: The Federal University of Rio Grande do Sul and the AIS, p. 1 - 10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A modular subroutine selection process based on needs classification scheme

Asghar, S., Alahakoon, D. & Churilov, L., 2006, Proceedings of the 11th Annual Conference of Asia Pacific Decision Sciences Institute. Zhao, X. & Liu, B. (eds.). Hong Kong China: Asia Pacific Decision Sciences Institute, p. 743 - 750 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A motivation based behavior in hybrid intelligent agents for intention reconsideration process in vessel berthing applications

Lokuge, P. & Alahakoon, D., 2005, Proceedings of the 4th International Conference on Hybrid Intelligent Systems. Ishikawa, M., Hashimoto, S., Paprzycki, M., Barakova, E., Yoshida, K., Koppen, M., Corne, D. W. & Abraham, A. (eds.). Los Alamitos CA USA: IEEE Computer Society, p. 124 - 129 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

AMP: A Multicast Routing Protocol for Ad Hoc Networks

Power, K., Qiu, B. & Breen, J. W., 1998, Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems. Piscataway USA: IEEE, Institute of Electrical and Electronics Engineers, p. 727 - 731 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Amsterdam communities' memories

Vos, V-J. & Ketelaar, E., 2006, Constructing and Sharing Memory: Community Informatics, Identity and Empowerment. Stillman, L. & Johanson, G. (eds.). Caulfield East Vic Australia: Centre for Community Networking Research, p. 1 - 20 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A Multicast Routing Protocol for Ad Hoc Networks

Power, K., Qiu, B., Breen, J. W. & Hassan, M., 1998, Proceedings of the 1998 IEEE Asia Pacific Conference on Communications / Singapore International Conference on Communication Systems. Singapore: IEEE, Institute of Electrical and Electronics Engineers, p. 186 - 190 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A multi-client DSSE scheme supporting range queries

Loh, R., Zuo, C., Liu, J. K. & Sun, S. F., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 289-307 19 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A multi-client dynamic searchable symmetric encryption system with physical deletion

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 2018, Information and Communications Security : 19th International Conference, ICICS 2017 Beijing, China, December 6–8, 2017 Proceedings. Qing, S., Mitchell, C., Chen, L. & Liu, D. (eds.). Cham Switzerland: Springer, p. 516-528 13 p. (Lecture Notes in Computer Science ; vol. 10631 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A multidisciplinary approach to assess readiness for change in enterprise system implementations

Foster, S. V. & Wilson-Evered, E., 2006, Proceedings of the 20th ANZAM Conference. Kennedy, J. & Di Milia, L. (eds.). Lindfield NSW Australia: Australian and New Zealand Academy of Management (ANZAM), p. 1 - 22 22 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review