461399. Theory of computation not elsewhere classified


Title461399. Theory of computation not elsewhere classified
Parent4613. Theory of computation

Latest research outputs

Sort by Date Title
Computer algebra derives the slow manifold of patch or element dynamics on lattices in two dimensions
MacKenzie, Tony and Roberts, A. J.. 2014. Computer algebra derives the slow manifold of patch or element dynamics on lattices in two dimensions. Adelaide, Australia. University of Adelaide.

Technical report

Continuous-time random walks on networks with vertex- and time-dependent forcing
Angstmann, C. N., Donnelly, I. C., Henry, B. I. and Langlands, T. A. M.. 2013. "Continuous-time random walks on networks with vertex- and time-dependent forcing." Physical Review E. 88 (2). https://doi.org/10.1103/PhysRevE.88.022811

Article

Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena
Melnik, R. V. N., Roberts, A. J. and Thomas, K. A.. 2001. "Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena." Mechanics Research Communications. 28 (6), pp. 637-651. https://doi.org/10.1016/S0093-6413(02)00216-1

Article

Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53

Paper

Detection of EEG K-Complexes Using Fractal Dimension of Time Frequency Images Technique Coupled With Undirected Graph Features
Al-Salman, Wessam, Li, Yan and Wen, Paul. 2019. "Detection of EEG K-Complexes Using Fractal Dimension of Time Frequency Images Technique Coupled With Undirected Graph Features ." Frontiers in Neuroinformatics. 13 (45), pp. 1-19. https://doi.org/10.3389/fninf.2019.00045

Article

Developing a logistic regression model with cross-correlation for motor imagery signal recognition
Li, Yan, Wu, Jinglong and Yang, Jingjing. 2011. "Developing a logistic regression model with cross-correlation for motor imagery signal recognition." 2011 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2011). Harbin, China 22 - 25 May 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICCME.2011.5876793

Paper

Developing a tunable Q-factor wavelet transform based algorithm for epileptic EEG feature extraction
Al Ghayab, Hadi Ratham, Li, Yan, Siuly, Siuly, Abdulla, Shahab and Wen, Paul. 2017. "Developing a tunable Q-factor wavelet transform based algorithm for epileptic EEG feature extraction." Siuly, Siuly, Huang, Zhisheng, Aickelin, Uwe, Zhou, Rui, Wang, Hua, Zhang, Yanchun and Klimenko, Stanislav (ed.) 6th International Conference on Health Information Science (HIS 2017). Moscow, Russian Federation 07 - 09 Oct 2017 Germany. https://doi.org/10.1007/978-3-319-69182-4_6

Paper

Development status of indigenous computational fluid dynamics software for arbitrary complex geometry
Ng, K. C., Yusoff, M. Z., Yusaf, T. F. and Hussein, I.. 2005. "Development status of indigenous computational fluid dynamics software for arbitrary complex geometry." Institution of Engineers, Malaysia. Journal. 66 (4), pp. 15-22.

Article

Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2010. "Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks." Raoof, Kosai (ed.) 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2010). Chengdu, China 23 - 25 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/WICOM.2010.5601439

Paper

Discretisation of the velocity-pressure formulation with integrated radial-basis-function networks
Thai-Quang, N., Le-Cao, K., Mai-Duy, N. and Tran-Cong, T.. 2011. "Discretisation of the velocity-pressure formulation with integrated radial-basis-function networks." Structural Longevity. 6 (2), pp. 77-91. https://doi.org/10.3970/sl.2011.006.077

Article

Dynamic interval valued neutrosophic set: Modeling decision making in dynamic environments
Thong, Nguyen Tho, Dat, Luu Quoc, Son, Le Hoang, Hoa, Nguyen Dinh, Ali, Mumtaz and Smarandache, Florentin. 2019. "Dynamic interval valued neutrosophic set: Modeling decision making in dynamic environments." Computers in Industry. 108, pp. 45-52. https://doi.org/10.1016/j.compind.2019.02.009

Article

Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.

Article

Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.

Article

Enhancing the IMS QTI to better support computer assisted marking
Clark, Damien and Baillie-de Byl, Penny. 2007. "Enhancing the IMS QTI to better support computer assisted marking." International Journal of Distance Education Technologies. 5 (3), pp. 8-23. https://doi.org/10.4018/ijdet.2007070102

Article

Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks
Leis, John W.. 2004. Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks. Toowoomba, Australia. University of Southern Queensland.

Technical report

Epileptic seizure detection in EEGs signals using a fast weighted horizontal visibility algorithm
Zhu, Guohun, Li, Yan and Wen, Peng (Paul). 2014. "Epileptic seizure detection in EEGs signals using a fast weighted horizontal visibility algorithm." Computer Methods and Programs in Biomedicine. 115 (2), pp. 64-75. https://doi.org/10.1016/j.cmpb.2014.04.001

Article

Epileptic seizures detection in EEGs blending frequency domain with information gain technique
Al Ghayab, Hadi Ratham, Li, Yan, Siuly, Siuly and Abdulla, Shahab. 2019. "Epileptic seizures detection in EEGs blending frequency domain with information gain technique." Soft Computing. 23 (1), pp. 227-239. https://doi.org/10.1007/s00500-018-3487-0

Article

Evaluation of Tweedie exponential dispersion model densities by Fourier inversion
Dunn, Peter K. and Smyth, Gordon K.. 2008. "Evaluation of Tweedie exponential dispersion model densities by Fourier inversion." Statistics and Computing. 18 (1), pp. 73-86. https://doi.org/10.1007/s11222-007-9039-6

Article

Experiments and proofs in web-service security
Sheniar, Dawood, Hadaad, Nabeel, Martin, David, Addie, Ron and Abdulla, Shahab. 2018. "Experiments and proofs in web-service security." Harris, Richard, Gregory, Mark, Tran-Gia, Phuoc and Pawlikowski, Krys (ed.) 28th International Telecommunication Networks and Application Conference: Experiments and Proofs in Web-service Security (ITNAC 2018). Sydney, Australia 21 - 23 Nov 2018 New York, United States. https://doi.org/10.1109/ATNAC.2018.8615367

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020

Article

Finding nucleolus of flow game
Deng, Xiaotie, Fang, Qizhi and Sun, Xiaoxun. 2009. "Finding nucleolus of flow game ." Journal of Combinatorial Optimization. 18 (1), pp. 64-86. https://doi.org/10.1007/s10878-008-9138-0

Article

Fuzzy and neutrosophic modeling for link prediction in social networks
Tuan, Tran Manh, Chuan, Pham Minh, Ali, Mumtaz, Ngan, Tran Thi, Mittal, Mamta and Son, Le Hoang. 2019. "Fuzzy and neutrosophic modeling for link prediction in social networks." Evolving Systems. 10, pp. 629-634. https://doi.org/10.1007/s12530-018-9251-y

Article

Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685

Paper

Generation of synthetic manufacturing datasets for machine learning using discrete-event simulation
Chan, K. C., Rabaev, Marsel and Pratama, Handy. 2022. "Generation of synthetic manufacturing datasets for machine learning using discrete-event simulation." Production and Manufacturing Research. 10 (1), pp. 337-353. https://doi.org/10.1080/21693277.2022.2086642

Article

Guided weapon danger area generation: implementing a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2006. "Guided weapon danger area generation: implementing a probabilistic approach." 24th AIAA Atmospheric Flight Mechanics Conference and Exhibit. Keystone, United States 21 - 24 Aug 2006 Reston, VA, United States .

Paper

Guided weapon template generation: a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2005. "Guided weapon template generation: a probabilistic approach." Lindsay, P. A. (ed.) 2005 Systems Engineering/Test and Evaluation Conference (SETE 2005). Brisbane, Australia 07 - 09 Nov 2005 [Bruce, A.C.T.].

Paper

H-max distance measure of intuitionistic fuzzy sets in decision making
Ngan, Roan Thi, Son, Le Hoang, Cuong, Bui Cong and Ali, Mumtaz. 2018. "H-max distance measure of intuitionistic fuzzy sets in decision making." Applied Soft Computing. 69, pp. 393-425. https://doi.org/10.1016/j.asoc.2018.04.036

Article

High precision GPS guidance of mobile robots
Willgoss, Richard, Rosenfeld, Vivian and Billingsley, John. 2003. "High precision GPS guidance of mobile robots." Roberts, Jonathan and Wyeth, Gordon (ed.) 2003 Australasian Conference on Robotics and Automation (ACRA 2003). Brisbane, Australia 01 - 03 Dec 2003 Brisbane, Australia.

Paper

Holistic discretisation ensures fidelity to Burger's equation
Roberts, A. J.. 2001. "Holistic discretisation ensures fidelity to Burger's equation." Applied Numerical Mathematics. 37 (3), pp. 371-396. https://doi.org/10.1016/S0168-9274(00)00053-2

Article

Implementation of AQMs on Linux made easy
Braithwaite, Stephen. 2006. "Implementation of AQMs on Linux made easy." OSDC 2006: Open Source Developers' Conference. Melbourne, Australia 06 - 08 Dec 2006 Brisbane, Australia.

Paper

Indirect RBFN method with thin plate splines for numerical solution of differential equations
Mai-Duy, N. and Tran-Cong, T.. 2003. "Indirect RBFN method with thin plate splines for numerical solution of differential equations." CMES Computer Modeling in Engineering and Sciences. 4 (1), pp. 85-102. https://doi.org/10.3970/cmes.2003.004.085

Article

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).

Article

K-complexes Detection in EEG Signals using Fractal and Frequency Features Coupled with an Ensemble Classification Model
Al-Salman, Wessam, Li, Yan and Wen, Peng. 2019. "K-complexes Detection in EEG Signals using Fractal and Frequency Features Coupled with an Ensemble Classification Model." Neuroscience. 422, pp. 119-133. https://doi.org/10.1016/j.neuroscience.2019.10.034

Article

Linguistic Approaches to Interval Complex Neutrosophic Sets in Decision Making
Dat, Luu Quoc, Thong, Nguyen Tho, Son, Le Hoang, Ali, Mumtaz, Smarandache, Florentin, Abdel-Basset, Mohamed and Long, Hoang Viet. 2019. "Linguistic Approaches to Interval Complex Neutrosophic Sets in Decision Making." IEEE Access. 7, pp. 38902-38917. https://doi.org/10.1109/ACCESS.2019.2902841

Article

Link dimensioning for fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2011. "Link dimensioning for fractional Brownian input." 2011 IEEE 12th International Conference on High Performance Switching and Routing, HPSR. Cartagena, Spain 04 - 06 Jul 2011 Piscataway, United States. https://doi.org/10.1109/HPSR.2011.5986019

Paper

Logic connectives of complex fuzzy sets
Ngan, Tran Thi, Lan, Luong Thi Hong, Ali, Mumtaz, Tamir, Dan, Son, Le Hoang, Tuan, Tran Manh, Rishe, Naphtali and Kandel, Abe. 2018. "Logic connectives of complex fuzzy sets." Romanian Journal of Information Science and Technology. 21 (4), pp. 344-357.

Article

Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131

Paper

People