4613. Theory of computation


Title4613. Theory of computation
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
A context model for ubiquitous computing applications
Bashar, Md. Rezaul, Young, Nam Mi and Rhee, Phill Kyu. 2006. "A context model for ubiquitous computing applications." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11893011_15

Paper

Iterative source-channel decoding for robust image transmission
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Iterative source-channel decoding for robust image transmission." Kennedy, Rodney Andrew and Grant, Alex J. (ed.) 4th Australian Communications Theory Workshop (AusCTW 2003). Melbourne, Australia 05 - 07 Feb 2003 Canberra, ACT .

Paper

Enhancing the IMS QTI to better support computer assisted marking
Clark, Damien and Baillie-de Byl, Penny. 2007. "Enhancing the IMS QTI to better support computer assisted marking." International Journal of Distance Education Technologies. 5 (3), pp. 8-23. https://doi.org/10.4018/ijdet.2007070102

Article

Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.

Paper

Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782

Article

An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925

Article

Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.

Article

Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.

Article

Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.

Paper

Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.

Paper

SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638

Paper

Using association rules to make rule-based classifiers robust
Hu, Hong and Li, Jiuyong. 2005. "Using association rules to make rule-based classifiers robust." Williams, Hugh E. and Dobbie, Gillian (ed.) ADC 2005: 16th Australasian Database Conference. Newcastle, Australia 31 Jan - 03 Feb 2005 Sydney, Australia.

Paper

A meshless modeling of dynamic strain localization in quasi-brittle materials using radial basis function networks
Le, P., Mai-Duy, N., Tran-Cong, T. and Baker, G.. 2008. "A meshless modeling of dynamic strain localization in quasi-brittle materials using radial basis function networks." CMES Computer Modeling in Engineering and Sciences. 25 (1), pp. 43-67. https://doi.org/10.3970/cmes.2008.025.043

Article

Evaluation of Tweedie exponential dispersion model densities by Fourier inversion
Dunn, Peter K. and Smyth, Gordon K.. 2008. "Evaluation of Tweedie exponential dispersion model densities by Fourier inversion." Statistics and Computing. 18 (1), pp. 73-86. https://doi.org/10.1007/s11222-007-9039-6

Article

The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Zhou, Hong, Lu, Jie, Zhang, Guangquan and Zhang, Zhongwei. 2007. "The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers." Applied Mathematics and Computation. 188 (2), pp. 1686-1698. https://doi.org/10.1016/j.amc.2006.11.176

Article

On asymptotic accuracy in queueing theory - the tale of the misleading tail
Addie, Ronald G., Neame, Timothy D. and Zukerman, Moshe. 2003. "On asymptotic accuracy in queueing theory - the tale of the misleading tail." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Melbourne, Australia.

Paper

A hybrid clough-tocher radial basis function method for modelling leaf surfaces
Oqielat, M. N., Belward, J. A., Turner, I. W. and Loch, B. I.. 2007. "A hybrid clough-tocher radial basis function method for modelling leaf surfaces." Oxley, Les and Kulasiri, Don (ed.) 17th International Congress on Modelling and Simulation (MODSIM07). Christchurch, New Zealand 10 - 13 Dec 2007 Canberra, Australia.

Paper

MR brain image segmentation based on self-organizing map network
Li, Yan and Chi, Zheru. 2005. "MR brain image segmentation based on self-organizing map network." International Journal of Information Technology. 11 (8), pp. 45-53.

Article

Boundary integral-based domain decomposition technique for solution of Navier Stokes equations
Mai-Duy, N. and Tran-Cong, T.. 2004. "Boundary integral-based domain decomposition technique for solution of Navier Stokes equations." CMES Computer Modeling in Engineering and Sciences. 6 (1), pp. 59-75. https://doi.org/10.3970/cmes.2004.006.059

Article

Indirect RBFN method with thin plate splines for numerical solution of differential equations
Mai-Duy, N. and Tran-Cong, T.. 2003. "Indirect RBFN method with thin plate splines for numerical solution of differential equations." CMES Computer Modeling in Engineering and Sciences. 4 (1), pp. 85-102. https://doi.org/10.3970/cmes.2003.004.085

Article

An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2005. "An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers." Johnson, M. and Chen, P. (ed.) IEEE International Conference on Systems, Man and Cybernetics (SMC) (2005). Hawaii, United States 12 Oct 2005 Hawaii, USA. https://doi.org/10.1109/ICSMC.2005.1571663

Paper

Throughput and fairness performance of multiple STT-Vegas connections
Zhang, Zhongwei, Zhou, Hong and Leis, John. 2005. "Throughput and fairness performance of multiple STT-Vegas connections." Sanadidi, M. Y. (ed.) 3rd IASTED International Conference on Communications and Computer Networks. Marina del Rey, United States 24 - 26 Oct 2005 Marina del Rey, USA.

Paper

Mining risk patterns in medical data
Li, Jiuyong, Fu, Ada Wai-Chee, He, Hongxing, Chen, Jie, Jin, Huidong, McAullay, Damien, Williams, Graham, Sparks, Ross and Kelman, Chris. 2005. "Mining risk patterns in medical data." Grossman, R., Bayardo, R., Bennett, K. and Vaidya, J. (ed.) 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005). Chicago, United States 21 - 24 Aug 2005 United States. https://doi.org/10.1145/1081870.1081971

Paper

A framework of filtering, clustering and dynamic layout graphs for visualization
Lai, Wei, Huang, Xiaodi and Eades, Peter. 2005. "A framework of filtering, clustering and dynamic layout graphs for visualization." Estivill-Castro, V. (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Australia.

Paper

Netml - an XML-based language for describing networks
Zareer, A. and Addie, Ron. 2004. "Netml - an XML-based language for describing networks." 3rd International Information and Telecommunication Technologies Symposium (I2TS 2004). Sao Carlos, Brazil 06 - 09 Dec 2004 Sao Carlos, Brazil.

Paper

Quantitative analysis of queue management schemes in TCP/IP network routers
Li, Zhenquan, Zhang, Zhongwei and Zhou, Hong. 2004. "Quantitative analysis of queue management schemes in TCP/IP network routers." Safaei, F. (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2004). Sydney, Australia 08 - 10 Dec 2004 Canberra, Australia.

Paper

High precision GPS guidance of mobile robots
Willgoss, Richard, Rosenfeld, Vivian and Billingsley, John. 2003. "High precision GPS guidance of mobile robots." Roberts, Jonathan and Wyeth, Gordon (ed.) 2003 Australasian Conference on Robotics and Automation (ACRA 2003). Brisbane, Australia 01 - 03 Dec 2003 Brisbane, Australia.

Paper

A boolean algebra approach for class hierarchy normalization
Zhang, Yanchun and Xiao, Jitian. 1997. "A boolean algebra approach for class hierarchy normalization." Topor, R. and Tanaka, K. (ed.) 5th International Conference on Database Systems for Advanced Applications. Melbourne, Australia 01 - 04 Apr 1997 Singapore. https://doi.org/10.1142/9789812819536_0032

Paper

Comparison of blind source separation algorithms
Li, Yan, Powers, David and Peach, James. 2001. "Comparison of blind source separation algorithms." Mastorakis, Nikos E. (ed.) WSES International Conference on Neural Networks and Applications 2001. Tenerife, Spain 11 - 15 Feb 2001 Greece.

Paper

Unequal error protection applied to JPEG image transmission using turbo codes
Xiang, Wei, Barbulescu, Sorin Adrian and Pietrobon, Steven S.. 2001. "Unequal error protection applied to JPEG image transmission using turbo codes." 2001 IEEE Information Theory Workshop (ITW'01). Cairns, Australia 02 - 07 Sep 2001

Paper

Joint source-channel codec: a more power efficient technology for image transmission
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Steven. 2003. "Joint source-channel codec: a more power efficient technology for image transmission." Jago, C., Amis, K. and Berrou, C. (ed.) 3rd International Symposium on Turbo Codes. Brest, France 01 - 05 Sep 2003 Brest, France.

Paper

Iterative decoding of JPEG coded images with channel coding
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Iterative decoding of JPEG coded images with channel coding." 10th IEEE International Conference on Telecommunications. Papeete, Tahiti Feb 2003 https://doi.org/10.1109/ICTEL.2003.1191632

Paper

On the capacity and normalisation of ISI channels
Xiang, Wei and Pietrobon, Steven S.. 2003. "On the capacity and normalisation of ISI channels." 2003 IEEE International Conference on Communications (ICC2003). Alaska, United States of America 11 - 15 May 2003 United States.

Paper

Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena
Melnik, R. V. N., Roberts, A. J. and Thomas, K. A.. 2001. "Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena." Mechanics Research Communications. 28 (6), pp. 637-651. https://doi.org/10.1016/S0093-6413(02)00216-1

Article

Holistic discretisation ensures fidelity to Burger's equation
Roberts, A. J.. 2001. "Holistic discretisation ensures fidelity to Burger's equation." Applied Numerical Mathematics. 37 (3), pp. 371-396. https://doi.org/10.1016/S0168-9274(00)00053-2

Article

(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Wong, Raymond Chi-Wing, Li, Jiuyong, Fu, Ada Wai-Chee and Wang, Ke. 2006. "(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing." Eliassi-Rad, Tina, Ungar, Lyle H., Craven, Mark and Gunopulos, Dimitrios (ed.) 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'06). Philadelphia, USA 20 - 23 Aug 2006 New York, USA.

Poster

Netml: a language and website for collaborative work on networks and their algorithms
Addie, Ron, Braithwaite, Stephen and Zareer, Abdulla. 2006. "Netml: a language and website for collaborative work on networks and their algorithms." Ellershaw, John (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2006). Melbourne, Australia 04 - 06 Dec 2006 Melbourne Australia.

Paper

DTD level authorization in XML documents with usage control
Sun, Lili and Li, Yan. 2006. "DTD level authorization in XML documents with usage control." International Journal of Computer Science and Network Security. 6 (11), pp. 244-250.

Article

Assessing and assuring trust in e-Commerce systems
Zhang, Zhongwei and Wang, Zhen. 2006. "Assessing and assuring trust in e-Commerce systems." Mohammadian, Masoud (ed.) 2006 International Conference on Intelligent Agents, Web Technologies & Internet Commerce (IAWTIC'06). Sydney, Australia 29 Nov - 01 Dec 2006 Piscataway, NJ, USA.

Paper

An extended branch and bound algorithm for linear bilevel programming
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2006. "An extended branch and bound algorithm for linear bilevel programming." Applied Mathematics and Computation. 180 (2), pp. 529-537.

Article