461399. Theory of computation not elsewhere classified


Title461399. Theory of computation not elsewhere classified
Parent4613. Theory of computation

Latest research outputs

Sort by Date Title
What are smart meters?
Aravinthan, Vasantha, Ho, Goen, Gray, Julian, Butler, Reid and Connell, Damien. 2012. "What are smart meters?" Current. 39 (2), pp. 80-84.

Article

A novel image compressive sensing method based on complex measurements
Ramesh Kumar, Nandini, Xiang, Wei and Soar, Jeffrey. 2011. "A novel image compressive sensing method based on complex measurements." 2011 International Conference on Digital Image Computing: Techniques and Application (DICTA 2011). Noosa, Australia 06 - 08 Dec 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/DICTA.2011.36

Paper

Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685

Paper

Test of hypotheses for linear regression models with non-sample prior information
Pratikno, Budi. 2012. Test of hypotheses for linear regression models with non-sample prior information. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Optimisation of test signals for channel identification
Braithwaite, Stephen Clive. 2011. Optimisation of test signals for channel identification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Optimal choice of test signals for channel estimation
Braithwaite, Stephen and Addie, Ron. 2010. "Optimal choice of test signals for channel estimation." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558839

Paper

A commit scheduler for XML databases
Dekeyser, Stijn and Hidders, Jan. 2003. "A commit scheduler for XML databases." Xiaofang, Zhou, Zhang, Yanchun and Orlowska, Maria E. (ed.) 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications. Xian, China 23 - 25 Apr 2003 China. Springer. https://doi.org/10.1007/3-540-36901-5_8

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49

Paper

Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53

Paper

Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715

Paper

A case study using neural networks algorithms: horse racing predictions in Jamaica
Williams, Janett and Li, Yan. 2008. "A case study using neural networks algorithms: horse racing predictions in Jamaica." Arabnia, Hamid R. and Mun, Yougsong (ed.) ICAI 2008: International Conference on Artificial Intelligence. Las Vegas, United States 14 - 17 Jul 2008 Las Vegas, NV. USA.

Paper

On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30

Paper

An improved error estimation algorithm for stereophonic acoustic echo cancellation systems
Nguyen-Ky, Tai, Leis, John W. and Xiang, Wei. 2007. "An improved error estimation algorithm for stereophonic acoustic echo cancellation systems." Wysocki, Beata J. and Wysocki, Tadeusz A. (ed.) ICSPCS 2007: 1st International Conference on Signal Processing and Communication Systems. Gold Coast, Australia 17 - 19 Dec 2007 Tarrawanna, NSW, Australia.

Paper

SIP message overflow routing scheme (SMORS)
Kist, Alexander A. and Harris, Richard J.. 2003. "SIP message overflow routing scheme (SMORS)." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Australia.

Paper

Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117

Paper

Implementation of AQMs on Linux made easy
Braithwaite, Stephen. 2006. "Implementation of AQMs on Linux made easy." OSDC 2006: Open Source Developers' Conference. Melbourne, Australia 06 - 08 Dec 2006 Brisbane, Australia.

Paper

Analyzing workflows implied by instance-dependent access rules
Calders, Toon, Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2006. "Analyzing workflows implied by instance-dependent access rules." 2006 ACM SIGMOD/PODS Conference. Chicago, United States of America 26 - 29 Jun 2006 United States. https://doi.org/10.1145/1142351.1142365

Paper

Finding nucleolus of flow game
Deng, Xiaotie, Fang, Qizhi and Sun, Xiaoxun. 2009. "Finding nucleolus of flow game ." Journal of Combinatorial Optimization. 18 (1), pp. 64-86. https://doi.org/10.1007/s10878-008-9138-0

Article

A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory
Ma, Guangzhi, Lu, Yansheng, Wen, Peng and Song, Engmin. 2010. "A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558832

Paper

Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).

Article

A coupled fuzzy logic control for routers' queue management over TCP/AQM networks
Li, Zhi and Zhang, Zhongwei. 2005. "A coupled fuzzy logic control for routers' queue management over TCP/AQM networks." Khosla, Rajiv, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005). Melbourne, Australia 14 - 16 Sep 2005 Berlin, Germany.

Paper

Algorithms for core stability, core largeness, exactness, and extendability of flow games
Fang, Qizhi, Fleischer, Rudolf, Li, Jian and Sun, Xiaoxun. 2010. "Algorithms for core stability, core largeness, exactness, and extendability of flow games ." Frontiers of Mathematics in China. 5 (1), pp. 47-63. https://doi.org/10.1007/s11464-009-0048-y

Article

Modeling of transmission distortion for multi-view video in packet lossy networks
Zhou, Yuan, Hou, Chunping and Xiang, Wei. 2010. "Modeling of transmission distortion for multi-view video in packet lossy networks." GLOBECOM 2010: IEEE Global Telecommunications Conference. Miami, United States 06 - 10 Dec 2010 United States. https://doi.org/10.1109/GLOCOM.2010.5683774

Paper

An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation
Nguyen-Ky, T., Leis, J. and Xiang, W.. 2010. "An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation." Computers and Electrical Engineering. 36 (4), pp. 664-675. https://doi.org/10.1016/jcompeleceng.2008.11.012

Article

Comparison of extended and unscented Kalman filters applied to EEG signals
Walters-Williams, Janett and Li, Yan. 2010. "Comparison of extended and unscented Kalman filters applied to EEG signals." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558873

Paper

Performance of user cooperation and clustering scheme in cellular networks
Li, Chang, Wang, Yafeng, Xiang, Wei and Yang, Dacheng. 2010. "Performance of user cooperation and clustering scheme in cellular networks." 2010 IEEE International Conference on Communications: Communications: Accelerating Growth and Development (ICC 2010). Capetown, South Africa 23 - 27 May 2010 Piscataway, United States. https://doi.org/10.1109/ICCW.2010.5503906

Paper

A passive approach to detection of traffic shaping
Norman, Mark and Leis, John. 2010. "A passive approach to detection of traffic shaping." Rahardja, Susanto and Wah, Benjamin (ed.) APSIPA 2010: 2nd Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. Biopolis, Singapore 14 - 17 Dec 2010 Singapore. https://doi.org/10.0107730776

Paper

Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2010. "Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks." Raoof, Kosai (ed.) 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2010). Chengdu, China 23 - 25 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/WICOM.2010.5601439

Paper

A general purpose inverse kinematics algorithm for all manipulators
Cubero, Samuel Nacion. 2004. "A general purpose inverse kinematics algorithm for all manipulators." Billingsley, John (ed.) 11th Annual Conference on Mechatronics and Machine Vision in Practice. Macau, China 28 Nov - 03 Dec 2004 Hertfordshire, England.

Paper

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Development status of indigenous computational fluid dynamics software for arbitrary complex geometry
Ng, K. C., Yusoff, M. Z., Yusaf, T. F. and Hussein, I.. 2005. "Development status of indigenous computational fluid dynamics software for arbitrary complex geometry." Institution of Engineers, Malaysia. Journal. 66 (4), pp. 15-22.

Article

Guided weapon danger area generation: implementing a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2006. "Guided weapon danger area generation: implementing a probabilistic approach." 24th AIAA Atmospheric Flight Mechanics Conference and Exhibit. Keystone, United States 21 - 24 Aug 2006 Reston, VA, United States .

Paper

Guided weapon template generation: a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2005. "Guided weapon template generation: a probabilistic approach." Lindsay, P. A. (ed.) 2005 Systems Engineering/Test and Evaluation Conference (SETE 2005). Brisbane, Australia 07 - 09 Nov 2005 [Bruce, A.C.T.].

Paper

Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131

Paper

An ensemble learning algorithm for blind signal separation problem
Li, Yan and Wen, Peng. 2005. "An ensemble learning algorithm for blind signal separation problem." 2005 International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA 2005). Vienna, Austria 28 - 30 Nov 2005 Washington, DC, united States.

Paper

A context model for ubiquitous computing applications
Bashar, Md. Rezaul, Young, Nam Mi and Rhee, Phill Kyu. 2006. "A context model for ubiquitous computing applications." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11893011_15

Paper

Enhancing the IMS QTI to better support computer assisted marking
Clark, Damien and Baillie-de Byl, Penny. 2007. "Enhancing the IMS QTI to better support computer assisted marking." International Journal of Distance Education Technologies. 5 (3), pp. 8-23. https://doi.org/10.4018/ijdet.2007070102

Article

Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.

Paper

People