4613. Theory of computation


Title4613. Theory of computation
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49

Paper

L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47

Paper

Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53

Paper

Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715

Paper

A case study using neural networks algorithms: horse racing predictions in Jamaica
Williams, Janett and Li, Yan. 2008. "A case study using neural networks algorithms: horse racing predictions in Jamaica." Arabnia, Hamid R. and Mun, Yougsong (ed.) ICAI 2008: International Conference on Artificial Intelligence. Las Vegas, United States 14 - 17 Jul 2008 Las Vegas, NV. USA.

Paper

On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30

Paper

An improved error estimation algorithm for stereophonic acoustic echo cancellation systems
Nguyen-Ky, Tai, Leis, John W. and Xiang, Wei. 2007. "An improved error estimation algorithm for stereophonic acoustic echo cancellation systems." Wysocki, Beata J. and Wysocki, Tadeusz A. (ed.) ICSPCS 2007: 1st International Conference on Signal Processing and Communication Systems. Gold Coast, Australia 17 - 19 Dec 2007 Tarrawanna, NSW, Australia.

Paper

Joint source-channel decoding of JPEG images using error resilient source codes
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Joint source-channel decoding of JPEG images using error resilient source codes." 2003 IEEE International Symposium on Information Theory. Yokohama, Japan 29 Jun - 04 Jul 2003 Japan. https://doi.org/10.1109/ISIT.2003.1228493

Paper

On the capacity and normalisation of ISI channels
Xiang, Wei and Pietrobon, Steven S.. 2003. "On the capacity and normalisation of ISI channels." IEEE Transactions on Information Theory. 49 (9), pp. 2263-2268. https://doi.org/10.1109/TIT.2003.815809

Article

SIP message overflow routing scheme (SMORS)
Kist, Alexander A. and Harris, Richard J.. 2003. "SIP message overflow routing scheme (SMORS)." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Australia.

Paper

Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117

Paper

Achieving k-Anonymity by clustering in attribute hierarchical structures
Li, Jiuyong, Wong, Raymond Chi-Wing, Fu, Ada Wai-Chee and Pei, Jian. 2006. "Achieving k-Anonymity by clustering in attribute hierarchical structures." Tjoa, A. Min and Trujillo, Juan (ed.) 8th International Conference on Data Warehousing and Knowledge Discovery. Krakow, Poland 04 - 08 Sep 2006 Germany. Springer. https://doi.org/10.1007/11823728

Paper

Implementation of AQMs on Linux made easy
Braithwaite, Stephen. 2006. "Implementation of AQMs on Linux made easy." OSDC 2006: Open Source Developers' Conference. Melbourne, Australia 06 - 08 Dec 2006 Brisbane, Australia.

Paper

Analyzing workflows implied by instance-dependent access rules
Calders, Toon, Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2006. "Analyzing workflows implied by instance-dependent access rules." 2006 ACM SIGMOD/PODS Conference. Chicago, United States of America 26 - 29 Jun 2006 United States. https://doi.org/10.1145/1142351.1142365

Paper

Estimation of the intercept parameter for linear regression model with uncertain non-sample prior information
Khan, Shahjahan, Hoque, Zahirul and Saleh, A. K. Md. E.. 2005. "Estimation of the intercept parameter for linear regression model with uncertain non-sample prior information." Statistical Papers. 46 (3), pp. 379-395. https://doi.org/10.1007/bf02762840

Article

Finding nucleolus of flow game
Deng, Xiaotie, Fang, Qizhi and Sun, Xiaoxun. 2009. "Finding nucleolus of flow game ." Journal of Combinatorial Optimization. 18 (1), pp. 64-86. https://doi.org/10.1007/s10878-008-9138-0

Article

A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory
Ma, Guangzhi, Lu, Yansheng, Wen, Peng and Song, Engmin. 2010. "A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558832

Paper

Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).

Article

Error-resilient video transmission for 3-D signal over cooperative-MIMO system
Salim, Omar Hazim, Xiang, Wei and Leis, John. 2011. "Error-resilient video transmission for 3-D signal over cooperative-MIMO system." Pascual, Antonio and Fernandez, Carles (ed.) EUSIPCO 2011: 19th European Signal Processing Conference. Barcelona, Spain 29 Aug - 02 Sep 2011 Barcelona, Spain.

Paper

A coupled fuzzy logic control for routers' queue management over TCP/AQM networks
Li, Zhi and Zhang, Zhongwei. 2005. "A coupled fuzzy logic control for routers' queue management over TCP/AQM networks." Khosla, Rajiv, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005). Melbourne, Australia 14 - 16 Sep 2005 Berlin, Germany.

Paper

Algorithms for core stability, core largeness, exactness, and extendability of flow games
Fang, Qizhi, Fleischer, Rudolf, Li, Jian and Sun, Xiaoxun. 2010. "Algorithms for core stability, core largeness, exactness, and extendability of flow games ." Frontiers of Mathematics in China. 5 (1), pp. 47-63. https://doi.org/10.1007/s11464-009-0048-y

Article

Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10

Paper

Modeling of transmission distortion for multi-view video in packet lossy networks
Zhou, Yuan, Hou, Chunping and Xiang, Wei. 2010. "Modeling of transmission distortion for multi-view video in packet lossy networks." GLOBECOM 2010: IEEE Global Telecommunications Conference. Miami, United States 06 - 10 Dec 2010 United States. https://doi.org/10.1109/GLOCOM.2010.5683774

Paper

An FPGA-based fast two-symbol processing architecture for JPEG 2000 arithmetic coding
Ramesh Kumar, Nandini, Xiang, Wei and Wang, Yafeng. 2010. "An FPGA-based fast two-symbol processing architecture for JPEG 2000 arithmetic coding." ICASSP 2010: 35th International Conference on Acoustics, Speech, and Signal Processing. Dallas, United States 14 - 19 Mar 2010 United States. https://doi.org/10.1109/ICASSP.2010.5495418

Paper

Connecting users and items with weighted tags for personalized item recommendations
Liang, Huizhi, Xu, Yue, Li, Yuefeng, Nayak, Richi and Tao, Xiaohui. 2010. "Connecting users and items with weighted tags for personalized item recommendations." Chignell, Mark and Toms, Elaine (ed.) HT 2010: 21st ACM Conference on Hypertext and Hypermedia. Toronto, Canada 13 - 16 Jun 2010 New York, USA. https://doi.org/10.1145/1810617.1810628

Paper

An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation
Nguyen-Ky, T., Leis, J. and Xiang, W.. 2010. "An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation." Computers and Electrical Engineering. 36 (4), pp. 664-675. https://doi.org/10.1016/jcompeleceng.2008.11.012

Article

Comparison of extended and unscented Kalman filters applied to EEG signals
Walters-Williams, Janett and Li, Yan. 2010. "Comparison of extended and unscented Kalman filters applied to EEG signals." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558873

Paper

Performance of user cooperation and clustering scheme in cellular networks
Li, Chang, Wang, Yafeng, Xiang, Wei and Yang, Dacheng. 2010. "Performance of user cooperation and clustering scheme in cellular networks." 2010 IEEE International Conference on Communications: Communications: Accelerating Growth and Development (ICC 2010). Capetown, South Africa 23 - 27 May 2010 Piscataway, United States. https://doi.org/10.1109/ICCW.2010.5503906

Paper

2-D scalable multiple description coding for robust H.264/SVC video communications
Xiang, Wei, Zhu, Ce, Siew, Chee Kheong, Xu, Yuanyuan and Liu, Minglei. 2011. "2-D scalable multiple description coding for robust H.264/SVC video communications." Zhu, Ce, Li, Yuenan and Niu, Xiamu (ed.) Streaming media architectures, techniques, and applications: recent advances. Hershey, PA. United States. IGI Global. pp. 39-57

Edited book (chapter)

A methodology to assure measurement data quality for key engineering materials
Su, Ying, Huang, Jinghua and Al-Hakim, Latif. 2010. "A methodology to assure measurement data quality for key engineering materials." Advanced Materials Research. 108-111 (1), pp. 972-978. https://doi.org/10.4028/www.scientific.net/AMR.108-111.972

Article

A passive approach to detection of traffic shaping
Norman, Mark and Leis, John. 2010. "A passive approach to detection of traffic shaping." Rahardja, Susanto and Wah, Benjamin (ed.) APSIPA 2010: 2nd Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. Biopolis, Singapore 14 - 17 Dec 2010 Singapore. https://doi.org/10.0107730776

Paper

Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2010. "Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks." Raoof, Kosai (ed.) 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2010). Chengdu, China 23 - 25 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/WICOM.2010.5601439

Paper

A general purpose inverse kinematics algorithm for all manipulators
Cubero, Samuel Nacion. 2004. "A general purpose inverse kinematics algorithm for all manipulators." Billingsley, John (ed.) 11th Annual Conference on Mechatronics and Machine Vision in Practice. Macau, China 28 Nov - 03 Dec 2004 Hertfordshire, England.

Paper

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Development status of indigenous computational fluid dynamics software for arbitrary complex geometry
Ng, K. C., Yusoff, M. Z., Yusaf, T. F. and Hussein, I.. 2005. "Development status of indigenous computational fluid dynamics software for arbitrary complex geometry." Institution of Engineers, Malaysia. Journal. 66 (4), pp. 15-22.

Article

Guided weapon danger area generation: implementing a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2006. "Guided weapon danger area generation: implementing a probabilistic approach." 24th AIAA Atmospheric Flight Mechanics Conference and Exhibit. Keystone, United States 21 - 24 Aug 2006 Reston, VA, United States .

Paper

Guided weapon template generation: a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2005. "Guided weapon template generation: a probabilistic approach." Lindsay, P. A. (ed.) 2005 Systems Engineering/Test and Evaluation Conference (SETE 2005). Brisbane, Australia 07 - 09 Nov 2005 [Bruce, A.C.T.].

Paper

Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131

Paper

An ensemble learning algorithm for blind signal separation problem
Li, Yan and Wen, Peng. 2005. "An ensemble learning algorithm for blind signal separation problem." 2005 International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA 2005). Vienna, Austria 28 - 30 Nov 2005 Washington, DC, united States.

Paper