461305. Data structures and algorithms


Title461305. Data structures and algorithms
Parent4613. Theory of computation

Latest research outputs

Sort by Date Title
Manufacturing big data ecosystem: A systematic literature review
Cui, Yesheng, Kara, Sami and Chan, Ka C.. 2020. "Manufacturing big data ecosystem: A systematic literature review." Robotics and Computer Integrated Manufacturing. 62, pp. 1-20. https://doi.org/10.1016/j.rcim.2019.101861

Article

PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490

Article

Cost modelling and validation in network optimization
Addie, Ronald G., Peng, Yu, Albdair, Mostfa, Xing, Chang, Fatseas, David and Zukerman, Moshe. 2015. "Cost modelling and validation in network optimization." 25th International Telecommunication Networks and Applications Conference (ITNAC 2015). Sydney, Australia 18 - 20 Nov 2015 United States. https://doi.org/10.1109/ATNAC.2015.7366782

Paper

Explore interregional EEG correlations changed by sport training using feature selection
Gao, Jia, Wang, Wei and Zhang, Ji. 2016. "Explore interregional EEG correlations changed by sport training using feature selection." Computational Intelligence and Neuroscience. 2016. https://doi.org/10.1155/2016/6184823

Article

Efficient Algorithms for Distance-Based Representative Skyline Computation in 2D Space
Cai, Taotao, Li, Rong-Hua, Yu, Jeffrey Xu, Mao, Rui and Cai, Yadi. 2015. "Efficient Algorithms for Distance-Based Representative Skyline Computation in 2D Space ." 17th Asia-Pacific Web Conference (APWeb2015). Guangzhou, China 18 - 20 Sep 2015 Switzerland . Springer. https://doi.org/10.1007/978-3-319-25255-1_10

Presentation

Effective pattern taxonomy mining in text documents
Li, Yuefeng, Wu, Sheng-Tang and Tao, Xiaohui. 2008. "Effective pattern taxonomy mining in text documents." Shanahan, James G., Amer-Yahia, Sihem, Zhang, Yi and Kolcz, Alek (ed.) CIKM 2008: ACM 17th Conference on Information and Knowledge Management. Napa Valley, United States 26 - 30 Oct 2008 New York, NY. USA. https://doi.org/10.1145/1458082.1458360

Poster

Discovering indicators of successful collaboration using tense: automated extraction of patterns in discourse
Thompson, Kate, Kennedy-Clark, Shannon, Wheeler, Penny and Kelly, Nick. 2014. "Discovering indicators of successful collaboration using tense: automated extraction of patterns in discourse." British Journal of Educational Technology. 45 (3), pp. 461-470. https://doi.org/10.1111/bjet.12151

Article

Data and knowledge engineering: Third International Conference, ICDKE 2012 Wuyishan, Fujian, China, November 21-23, 2012 Proceedings
Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wang, Hua (ed.) 2012. Data and knowledge engineering: Third International Conference, ICDKE 2012 Wuyishan, Fujian, China, November 21-23, 2012 Proceedings. Berlin, Germany. Springer.

Edited book

Two-symbol FPGA architecture for fast arithmetic encoding in JPEG 2000
Ramesh Kumar, Nandini, Xiang, Wei and Wang, Yafeng. 2012. "Two-symbol FPGA architecture for fast arithmetic encoding in JPEG 2000." Journal of Signal Processing Systems. 69 (2), pp. 213-224. https://doi.org/10.1007/s11265-011-0655-1

Article

EEG data compression to monitor DoA in telemedicine
Palendeng, Mario E., Zhang, Qing, Pang, Chaoyi and Li, Yan. 2012. "EEG data compression to monitor DoA in telemedicine." Studies in Health Technology and Informatics. 178, pp. 163-8. https://doi.org/10.3233/978-1-61499-078-9-163

Article

A light weight approach for ontology generation and change synchronization between ontologies and source relational databases
Ahmed, Waqas, Aslam, Muhammad Ahtisham, Shen, Jun and Yong, Jianming. 2011. "A light weight approach for ontology generation and change synchronization between ontologies and source relational databases." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel and Yong, Jianming (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960076

Paper

Achieving k-Anonymity by clustering in attribute hierarchical structures
Li, Jiuyong, Wong, Raymond Chi-Wing, Fu, Ada Wai-Chee and Pei, Jian. 2006. "Achieving k-Anonymity by clustering in attribute hierarchical structures." Tjoa, A. Min and Trujillo, Juan (ed.) 8th International Conference on Data Warehousing and Knowledge Discovery. Krakow, Poland 04 - 08 Sep 2006 Germany. Springer. https://doi.org/10.1007/11823728

Paper

A methodology to assure measurement data quality for key engineering materials
Su, Ying, Huang, Jinghua and Al-Hakim, Latif. 2010. "A methodology to assure measurement data quality for key engineering materials." Advanced Materials Research. 108-111 (1), pp. 972-978. https://doi.org/10.4028/www.scientific.net/AMR.108-111.972

Article

SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638

Paper

(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Wong, Raymond Chi-Wing, Li, Jiuyong, Fu, Ada Wai-Chee and Wang, Ke. 2006. "(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing." Eliassi-Rad, Tina, Ungar, Lyle H., Craven, Mark and Gunopulos, Dimitrios (ed.) 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'06). Philadelphia, USA 20 - 23 Aug 2006 New York, USA.

Poster

DTD level authorization in XML documents with usage control
Sun, Lili and Li, Yan. 2006. "DTD level authorization in XML documents with usage control." International Journal of Computer Science and Network Security. 6 (11), pp. 244-250.

Article

Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks
Leis, John W.. 2004. Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks. Toowoomba, Australia. University of Southern Queensland.

Technical report

People