4613. Theory of computation


Title4613. Theory of computation
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.

Article

Enhancing the IMS QTI to better support computer assisted marking
Clark, Damien and Baillie-de Byl, Penny. 2007. "Enhancing the IMS QTI to better support computer assisted marking." International Journal of Distance Education Technologies. 5 (3), pp. 8-23. https://doi.org/10.4018/ijdet.2007070102

Article

Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks
Leis, John W.. 2004. Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks. Toowoomba, Australia. University of Southern Queensland.

Technical report

Epileptic seizure detection in EEGs signals using a fast weighted horizontal visibility algorithm
Zhu, Guohun, Li, Yan and Wen, Peng (Paul). 2014. "Epileptic seizure detection in EEGs signals using a fast weighted horizontal visibility algorithm." Computer Methods and Programs in Biomedicine. 115 (2), pp. 64-75. https://doi.org/10.1016/j.cmpb.2014.04.001

Article

Epileptic seizures detection in EEGs blending frequency domain with information gain technique
Al Ghayab, Hadi Ratham, Li, Yan, Siuly, Siuly and Abdulla, Shahab. 2019. "Epileptic seizures detection in EEGs blending frequency domain with information gain technique." Soft Computing. 23 (1), pp. 227-239. https://doi.org/10.1007/s00500-018-3487-0

Article

Error-resilient multi-view video coding using Wyner-Ziv techniques
Gao, Pan, Peng, Qiang and Xiang, Wei. 2015. "Error-resilient multi-view video coding using Wyner-Ziv techniques." Multimedia Tools and Applications. 74 (18), pp. 7957-7982. https://doi.org/10.1007/s11042-014-2033-z

Article

Error-resilient video transmission for 3-D signal over cooperative-MIMO system
Salim, Omar Hazim, Xiang, Wei and Leis, John. 2011. "Error-resilient video transmission for 3-D signal over cooperative-MIMO system." Pascual, Antonio and Fernandez, Carles (ed.) EUSIPCO 2011: 19th European Signal Processing Conference. Barcelona, Spain 29 Aug - 02 Sep 2011 Barcelona, Spain.

Paper

Estimation of the intercept parameter for linear regression model with uncertain non-sample prior information
Khan, Shahjahan, Hoque, Zahirul and Saleh, A. K. Md. E.. 2005. "Estimation of the intercept parameter for linear regression model with uncertain non-sample prior information." Statistical Papers. 46 (3), pp. 379-395. https://doi.org/10.1007/bf02762840

Article

Evaluation of Tweedie exponential dispersion model densities by Fourier inversion
Dunn, Peter K. and Smyth, Gordon K.. 2008. "Evaluation of Tweedie exponential dispersion model densities by Fourier inversion." Statistics and Computing. 18 (1), pp. 73-86. https://doi.org/10.1007/s11222-007-9039-6

Article

Experiments and proofs in web-service security
Sheniar, Dawood, Hadaad, Nabeel, Martin, David, Addie, Ron and Abdulla, Shahab. 2018. "Experiments and proofs in web-service security." Harris, Richard, Gregory, Mark, Tran-Gia, Phuoc and Pawlikowski, Krys (ed.) 28th International Telecommunication Networks and Application Conference: Experiments and Proofs in Web-service Security (ITNAC 2018). Sydney, Australia 21 - 23 Nov 2018 New York, United States. https://doi.org/10.1109/ATNAC.2018.8615367

Paper

Explore interregional EEG correlations changed by sport training using feature selection
Gao, Jia, Wang, Wei and Zhang, Ji. 2016. "Explore interregional EEG correlations changed by sport training using feature selection." Computational Intelligence and Neuroscience. 2016. https://doi.org/10.1155/2016/6184823

Article

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020

Article

Finding nucleolus of flow game
Deng, Xiaotie, Fang, Qizhi and Sun, Xiaoxun. 2009. "Finding nucleolus of flow game ." Journal of Combinatorial Optimization. 18 (1), pp. 64-86. https://doi.org/10.1007/s10878-008-9138-0

Article

Fuzzy and neutrosophic modeling for link prediction in social networks
Tuan, Tran Manh, Chuan, Pham Minh, Ali, Mumtaz, Ngan, Tran Thi, Mittal, Mamta and Son, Le Hoang. 2019. "Fuzzy and neutrosophic modeling for link prediction in social networks." Evolving Systems. 10, pp. 629-634. https://doi.org/10.1007/s12530-018-9251-y

Article

Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685

Paper

Generation of synthetic manufacturing datasets for machine learning using discrete-event simulation
Chan, K. C., Rabaev, Marsel and Pratama, Handy. 2022. "Generation of synthetic manufacturing datasets for machine learning using discrete-event simulation." Production and Manufacturing Research. 10 (1), pp. 337-353. https://doi.org/10.1080/21693277.2022.2086642

Article

Guided weapon danger area generation: implementing a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2006. "Guided weapon danger area generation: implementing a probabilistic approach." 24th AIAA Atmospheric Flight Mechanics Conference and Exhibit. Keystone, United States 21 - 24 Aug 2006 Reston, VA, United States .

Paper

Guided weapon template generation: a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2005. "Guided weapon template generation: a probabilistic approach." Lindsay, P. A. (ed.) 2005 Systems Engineering/Test and Evaluation Conference (SETE 2005). Brisbane, Australia 07 - 09 Nov 2005 [Bruce, A.C.T.].

Paper

H-max distance measure of intuitionistic fuzzy sets in decision making
Ngan, Roan Thi, Son, Le Hoang, Cuong, Bui Cong and Ali, Mumtaz. 2018. "H-max distance measure of intuitionistic fuzzy sets in decision making." Applied Soft Computing. 69, pp. 393-425. https://doi.org/10.1016/j.asoc.2018.04.036

Article

High precision GPS guidance of mobile robots
Willgoss, Richard, Rosenfeld, Vivian and Billingsley, John. 2003. "High precision GPS guidance of mobile robots." Roberts, Jonathan and Wyeth, Gordon (ed.) 2003 Australasian Conference on Robotics and Automation (ACRA 2003). Brisbane, Australia 01 - 03 Dec 2003 Brisbane, Australia.

Paper

Holistic discretisation ensures fidelity to Burger's equation
Roberts, A. J.. 2001. "Holistic discretisation ensures fidelity to Burger's equation." Applied Numerical Mathematics. 37 (3), pp. 371-396. https://doi.org/10.1016/S0168-9274(00)00053-2

Article

Identifying partial subroutines for instrument control based on regular expressions
Maiti, Ananda, Kist, Alexander A. and Maxwell, Andrew D.. 2017. "Identifying partial subroutines for instrument control based on regular expressions." Auer, Michael E. and Zutin, Danilo G. (ed.) 14th International Conference on Remote Engineering and Virtual Instrumentation (REV 2017): Online Engineering & Internet of Things. New York, USA 15 - 17 Mar 2017 Switzerland. https://doi.org/10.1007/978-3-319-64352-6_45

Paper

Implementation of AQMs on Linux made easy
Braithwaite, Stephen. 2006. "Implementation of AQMs on Linux made easy." OSDC 2006: Open Source Developers' Conference. Melbourne, Australia 06 - 08 Dec 2006 Brisbane, Australia.

Paper

Indirect RBFN method with thin plate splines for numerical solution of differential equations
Mai-Duy, N. and Tran-Cong, T.. 2003. "Indirect RBFN method with thin plate splines for numerical solution of differential equations." CMES Computer Modeling in Engineering and Sciences. 4 (1), pp. 85-102. https://doi.org/10.3970/cmes.2003.004.085

Article

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).

Article

Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.

Paper

Iterative decoding of JPEG coded images with channel coding
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Iterative decoding of JPEG coded images with channel coding." 10th IEEE International Conference on Telecommunications. Papeete, Tahiti Feb 2003 https://doi.org/10.1109/ICTEL.2003.1191632

Paper

Iterative source-channel decoding for robust image transmission
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Iterative source-channel decoding for robust image transmission." Kennedy, Rodney Andrew and Grant, Alex J. (ed.) 4th Australian Communications Theory Workshop (AusCTW 2003). Melbourne, Australia 05 - 07 Feb 2003 Canberra, ACT .

Paper

Joint source-channel codec: a more power efficient technology for image transmission
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Steven. 2003. "Joint source-channel codec: a more power efficient technology for image transmission." Jago, C., Amis, K. and Berrou, C. (ed.) 3rd International Symposium on Turbo Codes. Brest, France 01 - 05 Sep 2003 Brest, France.

Paper

Joint source-channel decoding of JPEG images using error resilient source codes
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Joint source-channel decoding of JPEG images using error resilient source codes." 2003 IEEE International Symposium on Information Theory. Yokohama, Japan 29 Jun - 04 Jul 2003 Japan. https://doi.org/10.1109/ISIT.2003.1228493

Paper

K-complexes Detection in EEG Signals using Fractal and Frequency Features Coupled with an Ensemble Classification Model
Al-Salman, Wessam, Li, Yan and Wen, Peng. 2019. "K-complexes Detection in EEG Signals using Fractal and Frequency Features Coupled with an Ensemble Classification Model." Neuroscience. 422, pp. 119-133. https://doi.org/10.1016/j.neuroscience.2019.10.034

Article

L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47

Paper

Linguistic Approaches to Interval Complex Neutrosophic Sets in Decision Making
Dat, Luu Quoc, Thong, Nguyen Tho, Son, Le Hoang, Ali, Mumtaz, Smarandache, Florentin, Abdel-Basset, Mohamed and Long, Hoang Viet. 2019. "Linguistic Approaches to Interval Complex Neutrosophic Sets in Decision Making." IEEE Access. 7, pp. 38902-38917. https://doi.org/10.1109/ACCESS.2019.2902841

Article

Link dimensioning for fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2011. "Link dimensioning for fractional Brownian input." 2011 IEEE 12th International Conference on High Performance Switching and Routing, HPSR. Cartagena, Spain 04 - 06 Jul 2011 Piscataway, United States. https://doi.org/10.1109/HPSR.2011.5986019

Paper

Logic connectives of complex fuzzy sets
Ngan, Tran Thi, Lan, Luong Thi Hong, Ali, Mumtaz, Tamir, Dan, Son, Le Hoang, Tuan, Tran Manh, Rishe, Naphtali and Kandel, Abe. 2018. "Logic connectives of complex fuzzy sets." Romanian Journal of Information Science and Technology. 21 (4), pp. 344-357.

Article

Manufacturing big data ecosystem: A systematic literature review
Cui, Yesheng, Kara, Sami and Chan, Ka C.. 2020. "Manufacturing big data ecosystem: A systematic literature review." Robotics and Computer Integrated Manufacturing. 62, pp. 1-20. https://doi.org/10.1016/j.rcim.2019.101861

Article

Metadata manipulation interface design
Dekeyser, Stijn and Watson, Richard. 2013. "Metadata manipulation interface design." Smith, Ross T. and Wunsche, Burkhard C. (ed.) 14th Australasian User Interface Conference (AUIC 2013): User Interfaces 2013. Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.

Paper

Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131

Paper