461305. Data structures and algorithms
Title | 461305. Data structures and algorithms |
---|---|
Parent | 4613. Theory of computation |
Latest research outputs
Sort by Date Title
Manufacturing big data ecosystem: A systematic literature review
Cui, Yesheng, Kara, Sami and Chan, Ka C.. 2020. "Manufacturing big data ecosystem: A systematic literature review." Robotics and Computer Integrated Manufacturing. 62, pp. 1-20. https://doi.org/10.1016/j.rcim.2019.101861Article
PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490Article
Cost modelling and validation in network optimization
Addie, Ronald G., Peng, Yu, Albdair, Mostfa, Xing, Chang, Fatseas, David and Zukerman, Moshe. 2015. "Cost modelling and validation in network optimization." 25th International Telecommunication Networks and Applications Conference (ITNAC 2015). Sydney, Australia 18 - 20 Nov 2015 United States. https://doi.org/10.1109/ATNAC.2015.7366782Paper
Explore interregional EEG correlations changed by sport training using feature selection
Gao, Jia, Wang, Wei and Zhang, Ji. 2016. "Explore interregional EEG correlations changed by sport training using feature selection." Computational Intelligence and Neuroscience. 2016. https://doi.org/10.1155/2016/6184823Article
Efficient Algorithms for Distance-Based Representative Skyline Computation in 2D Space
Cai, Taotao, Li, Rong-Hua, Yu, Jeffrey Xu, Mao, Rui and Cai, Yadi. 2015. "Efficient Algorithms for Distance-Based Representative Skyline Computation in 2D Space ." 17th Asia-Pacific Web Conference (APWeb2015). Guangzhou, China 18 - 20 Sep 2015 Switzerland . Springer. https://doi.org/10.1007/978-3-319-25255-1_10Presentation
Effective pattern taxonomy mining in text documents
Li, Yuefeng, Wu, Sheng-Tang and Tao, Xiaohui. 2008. "Effective pattern taxonomy mining in text documents." Shanahan, James G., Amer-Yahia, Sihem, Zhang, Yi and Kolcz, Alek (ed.) CIKM 2008: ACM 17th Conference on Information and Knowledge Management. Napa Valley, United States 26 - 30 Oct 2008 New York, NY. USA. https://doi.org/10.1145/1458082.1458360Poster
Discovering indicators of successful collaboration using tense: automated extraction of patterns in discourse
Thompson, Kate, Kennedy-Clark, Shannon, Wheeler, Penny and Kelly, Nick. 2014. "Discovering indicators of successful collaboration using tense: automated extraction of patterns in discourse." British Journal of Educational Technology. 45 (3), pp. 461-470. https://doi.org/10.1111/bjet.12151Article
Data and knowledge engineering: Third International Conference, ICDKE 2012 Wuyishan, Fujian, China, November 21-23, 2012 Proceedings
Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wang, Hua (ed.) 2012. Data and knowledge engineering: Third International Conference, ICDKE 2012 Wuyishan, Fujian, China, November 21-23, 2012 Proceedings. Berlin, Germany. Springer.Edited book
Two-symbol FPGA architecture for fast arithmetic encoding in JPEG 2000
Ramesh Kumar, Nandini, Xiang, Wei and Wang, Yafeng. 2012. "Two-symbol FPGA architecture for fast arithmetic encoding in JPEG 2000." Journal of Signal Processing Systems. 69 (2), pp. 213-224. https://doi.org/10.1007/s11265-011-0655-1Article
EEG data compression to monitor DoA in telemedicine
Palendeng, Mario E., Zhang, Qing, Pang, Chaoyi and Li, Yan. 2012. "EEG data compression to monitor DoA in telemedicine." Studies in Health Technology and Informatics. 178, pp. 163-8. https://doi.org/10.3233/978-1-61499-078-9-163Article
A light weight approach for ontology generation and change synchronization between ontologies and source relational databases
Ahmed, Waqas, Aslam, Muhammad Ahtisham, Shen, Jun and Yong, Jianming. 2011. "A light weight approach for ontology generation and change synchronization between ontologies and source relational databases." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel and Yong, Jianming (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960076Paper
Achieving k-Anonymity by clustering in attribute hierarchical structures
Li, Jiuyong, Wong, Raymond Chi-Wing, Fu, Ada Wai-Chee and Pei, Jian. 2006. "Achieving k-Anonymity by clustering in attribute hierarchical structures." Tjoa, A. Min and Trujillo, Juan (ed.) 8th International Conference on Data Warehousing and Knowledge Discovery. Krakow, Poland 04 - 08 Sep 2006 Germany. Springer. https://doi.org/10.1007/11823728Paper
A methodology to assure measurement data quality for key engineering materials
Su, Ying, Huang, Jinghua and Al-Hakim, Latif. 2010. "A methodology to assure measurement data quality for key engineering materials." Advanced Materials Research. 108-111 (1), pp. 972-978. https://doi.org/10.4028/www.scientific.net/AMR.108-111.972Article
SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638Paper
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Wong, Raymond Chi-Wing, Li, Jiuyong, Fu, Ada Wai-Chee and Wang, Ke. 2006. "(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing." Eliassi-Rad, Tina, Ungar, Lyle H., Craven, Mark and Gunopulos, Dimitrios (ed.) 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'06). Philadelphia, USA 20 - 23 Aug 2006 New York, USA.Poster
DTD level authorization in XML documents with usage control
Sun, Lili and Li, Yan. 2006. "DTD level authorization in XML documents with usage control." International Journal of Computer Science and Network Security. 6 (11), pp. 244-250.Article
Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks
Leis, John W.. 2004. Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks. Toowoomba, Australia. University of Southern Queensland.Technical report