4613. Theory of computation
Title | 4613. Theory of computation |
---|---|
Parent | 46. Information and Computing Sciences |
Latest research outputs
Sort by Date Title
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6Article
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49Paper
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47Paper
Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53Paper
Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715Paper
A case study using neural networks algorithms: horse racing predictions in Jamaica
Williams, Janett and Li, Yan. 2008. "A case study using neural networks algorithms: horse racing predictions in Jamaica." Arabnia, Hamid R. and Mun, Yougsong (ed.) ICAI 2008: International Conference on Artificial Intelligence. Las Vegas, United States 14 - 17 Jul 2008 Las Vegas, NV. USA.Paper
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30Paper
A hybrid clough-tocher radial basis function method for modelling leaf surfaces
Oqielat, M. N., Belward, J. A., Turner, I. W. and Loch, B. I.. 2007. "A hybrid clough-tocher radial basis function method for modelling leaf surfaces." Oxley, Les and Kulasiri, Don (ed.) 17th International Congress on Modelling and Simulation (MODSIM07). Christchurch, New Zealand 10 - 13 Dec 2007 Canberra, Australia. Modelling and Simulation Society of Australia and New Zealand .Paper
An improved error estimation algorithm for stereophonic acoustic echo cancellation systems
Nguyen-Ky, Tai, Leis, John W. and Xiang, Wei. 2007. "An improved error estimation algorithm for stereophonic acoustic echo cancellation systems." Wysocki, Beata J. and Wysocki, Tadeusz A. (ed.) 2007 1st International Conference on Signal Processing and Communication Systems (ICSPCS 2007). Gold Coast, Australia 17 - 19 Dec 2007 Tarrawanna, NSW, Australia.Paper
Joint source-channel decoding of JPEG images using error resilient source codes
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Joint source-channel decoding of JPEG images using error resilient source codes." 2003 IEEE International Symposium on Information Theory. Yokohama, Japan 29 Jun - 04 Jul 2003 Japan. https://doi.org/10.1109/ISIT.2003.1228493Paper
On the capacity and normalisation of ISI channels
Xiang, Wei and Pietrobon, Steven S.. 2003. "On the capacity and normalisation of ISI channels." IEEE Transactions on Information Theory. 49 (9), pp. 2263-2268. https://doi.org/10.1109/TIT.2003.815809Article
SIP message overflow routing scheme (SMORS)
Kist, Alexander A. and Harris, Richard J.. 2003. "SIP message overflow routing scheme (SMORS)." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Australia.Paper
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117Paper
Achieving k-Anonymity by clustering in attribute hierarchical structures
Li, Jiuyong, Wong, Raymond Chi-Wing, Fu, Ada Wai-Chee and Pei, Jian. 2006. "Achieving k-Anonymity by clustering in attribute hierarchical structures." Tjoa, A. Min and Trujillo, Juan (ed.) 8th International Conference on Data Warehousing and Knowledge Discovery. Krakow, Poland 04 - 08 Sep 2006 Germany. Springer. https://doi.org/10.1007/11823728Paper
Implementation of AQMs on Linux made easy
Braithwaite, Stephen. 2006. "Implementation of AQMs on Linux made easy." OSDC 2006: Open Source Developers' Conference. Melbourne, Australia 06 - 08 Dec 2006 Brisbane, Australia.Paper
Analyzing workflows implied by instance-dependent access rules
Calders, Toon, Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2006. "Analyzing workflows implied by instance-dependent access rules." 2006 ACM SIGMOD/PODS Conference. Chicago, United States of America 26 - 29 Jun 2006 United States. https://doi.org/10.1145/1142351.1142365Paper
Estimation of the intercept parameter for linear regression model with uncertain non-sample prior information
Khan, Shahjahan, Hoque, Zahirul and Saleh, A. K. Md. E.. 2005. "Estimation of the intercept parameter for linear regression model with uncertain non-sample prior information." Statistical Papers. 46 (3), pp. 379-395. https://doi.org/10.1007/bf02762840Article
Finding nucleolus of flow game
Deng, Xiaotie, Fang, Qizhi and Sun, Xiaoxun. 2009. "Finding nucleolus of flow game ." Journal of Combinatorial Optimization. 18 (1), pp. 64-86. https://doi.org/10.1007/s10878-008-9138-0Article
A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory
Ma, Guangzhi, Lu, Yansheng, Wen, Peng and Song, Engmin. 2010. "A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558832Paper
Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).Article
Error-resilient video transmission for 3-D signal over cooperative-MIMO system
Salim, Omar Hazim, Xiang, Wei and Leis, John. 2011. "Error-resilient video transmission for 3-D signal over cooperative-MIMO system." Pascual, Antonio and Fernandez, Carles (ed.) EUSIPCO 2011: 19th European Signal Processing Conference. Barcelona, Spain 29 Aug - 02 Sep 2011 Barcelona, Spain.Paper
A coupled fuzzy logic control for routers' queue management over TCP/AQM networks
Li, Zhi and Zhang, Zhongwei. 2005. "A coupled fuzzy logic control for routers' queue management over TCP/AQM networks." Khosla, Rajiv, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005). Melbourne, Australia 14 - 16 Sep 2005 Berlin, Germany.Paper
Algorithms for core stability, core largeness, exactness, and extendability of flow games
Fang, Qizhi, Fleischer, Rudolf, Li, Jian and Sun, Xiaoxun. 2010. "Algorithms for core stability, core largeness, exactness, and extendability of flow games ." Frontiers of Mathematics in China. 5 (1), pp. 47-63. https://doi.org/10.1007/s11464-009-0048-yArticle
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10Paper
Modeling of transmission distortion for multi-view video in packet lossy networks
Zhou, Yuan, Hou, Chunping and Xiang, Wei. 2010. "Modeling of transmission distortion for multi-view video in packet lossy networks." GLOBECOM 2010: IEEE Global Telecommunications Conference. Miami, United States 06 - 10 Dec 2010 United States. https://doi.org/10.1109/GLOCOM.2010.5683774Paper
An FPGA-based fast two-symbol processing architecture for JPEG 2000 arithmetic coding
Ramesh Kumar, Nandini, Xiang, Wei and Wang, Yafeng. 2010. "An FPGA-based fast two-symbol processing architecture for JPEG 2000 arithmetic coding." ICASSP 2010: 35th International Conference on Acoustics, Speech, and Signal Processing. Dallas, United States 14 - 19 Mar 2010 United States. https://doi.org/10.1109/ICASSP.2010.5495418Paper
Connecting users and items with weighted tags for personalized item recommendations
Liang, Huizhi, Xu, Yue, Li, Yuefeng, Nayak, Richi and Tao, Xiaohui. 2010. "Connecting users and items with weighted tags for personalized item recommendations." Chignell, Mark and Toms, Elaine (ed.) HT 2010: 21st ACM Conference on Hypertext and Hypermedia. Toronto, Canada 13 - 16 Jun 2010 New York, USA. https://doi.org/10.1145/1810617.1810628Paper
An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation
Nguyen-Ky, T., Leis, J. and Xiang, W.. 2010. "An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation." Computers and Electrical Engineering. 36 (4), pp. 664-675. https://doi.org/10.1016/jcompeleceng.2008.11.012Article
Comparison of extended and unscented Kalman filters applied to EEG signals
Walters-Williams, Janett and Li, Yan. 2010. "Comparison of extended and unscented Kalman filters applied to EEG signals." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558873Paper
Performance of user cooperation and clustering scheme in cellular networks
Li, Chang, Wang, Yafeng, Xiang, Wei and Yang, Dacheng. 2010. "Performance of user cooperation and clustering scheme in cellular networks." 2010 IEEE International Conference on Communications: Communications: Accelerating Growth and Development (ICC 2010). Capetown, South Africa 23 - 27 May 2010 Piscataway, United States. https://doi.org/10.1109/ICCW.2010.5503906Paper
2-D scalable multiple description coding for robust H.264/SVC video communications
Xiang, Wei, Zhu, Ce, Siew, Chee Kheong, Xu, Yuanyuan and Liu, Minglei. 2011. "2-D scalable multiple description coding for robust H.264/SVC video communications." Zhu, Ce, Li, Yuenan and Niu, Xiamu (ed.) Streaming media architectures, techniques, and applications: recent advances. Hershey, PA. United States. IGI Global. pp. 39-57Edited book (chapter)
A methodology to assure measurement data quality for key engineering materials
Su, Ying, Huang, Jinghua and Al-Hakim, Latif. 2010. "A methodology to assure measurement data quality for key engineering materials." Advanced Materials Research. 108-111 (1), pp. 972-978. https://doi.org/10.4028/www.scientific.net/AMR.108-111.972Article
A passive approach to detection of traffic shaping
Norman, Mark and Leis, John. 2010. "A passive approach to detection of traffic shaping." Rahardja, Susanto and Wah, Benjamin (ed.) APSIPA 2010: 2nd Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. Biopolis, Singapore 14 - 17 Dec 2010 Singapore. https://doi.org/10.0107730776Paper
Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2010. "Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks." Raoof, Kosai (ed.) 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2010). Chengdu, China 23 - 25 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/WICOM.2010.5601439Paper
A general purpose inverse kinematics algorithm for all manipulators
Cubero, Samuel Nacion. 2004. "A general purpose inverse kinematics algorithm for all manipulators." Billingsley, John (ed.) 11th Annual Conference on Mechatronics and Machine Vision in Practice. Macau, China 28 Nov - 03 Dec 2004 Hertfordshire, England.Paper
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166Poster
Development status of indigenous computational fluid dynamics software for arbitrary complex geometry
Ng, K. C., Yusoff, M. Z., Yusaf, T. F. and Hussein, I.. 2005. "Development status of indigenous computational fluid dynamics software for arbitrary complex geometry." Institution of Engineers, Malaysia. Journal. 66 (4), pp. 15-22.Article
Guided weapon danger area generation: implementing a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2006. "Guided weapon danger area generation: implementing a probabilistic approach." 24th AIAA Atmospheric Flight Mechanics Conference and Exhibit. Keystone, United States 21 - 24 Aug 2006 Reston, VA, United States .Paper
Guided weapon template generation: a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2005. "Guided weapon template generation: a probabilistic approach." Lindsay, P. A. (ed.) 2005 Systems Engineering/Test and Evaluation Conference (SETE 2005). Brisbane, Australia 07 - 09 Nov 2005 [Bruce, A.C.T.].Paper
Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131Paper