461399. Theory of computation not elsewhere classified


Title461399. Theory of computation not elsewhere classified
Parent4613. Theory of computation

Latest research outputs

Sort by Date Title
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.

Paper

Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782

Article

An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925

Article

Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.

Article

Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.

Article

Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.

Paper

SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638

Paper

Using association rules to make rule-based classifiers robust
Hu, Hong and Li, Jiuyong. 2005. "Using association rules to make rule-based classifiers robust." Williams, Hugh E. and Dobbie, Gillian (ed.) ADC 2005: 16th Australasian Database Conference. Newcastle, Australia 31 Jan - 03 Feb 2005 Sydney, Australia.

Paper

A meshless modeling of dynamic strain localization in quasi-brittle materials using radial basis function networks
Le, P., Mai-Duy, N., Tran-Cong, T. and Baker, G.. 2008. "A meshless modeling of dynamic strain localization in quasi-brittle materials using radial basis function networks." CMES Computer Modeling in Engineering and Sciences. 25 (1), pp. 43-67. https://doi.org/10.3970/cmes.2008.025.043

Article

Evaluation of Tweedie exponential dispersion model densities by Fourier inversion
Dunn, Peter K. and Smyth, Gordon K.. 2008. "Evaluation of Tweedie exponential dispersion model densities by Fourier inversion." Statistics and Computing. 18 (1), pp. 73-86. https://doi.org/10.1007/s11222-007-9039-6

Article

The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Zhou, Hong, Lu, Jie, Zhang, Guangquan and Zhang, Zhongwei. 2007. "The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers." Applied Mathematics and Computation. 188 (2), pp. 1686-1698. https://doi.org/10.1016/j.amc.2006.11.176

Article

On asymptotic accuracy in queueing theory - the tale of the misleading tail
Addie, Ronald G., Neame, Timothy D. and Zukerman, Moshe. 2003. "On asymptotic accuracy in queueing theory - the tale of the misleading tail." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Melbourne, Australia.

Paper

MR brain image segmentation based on self-organizing map network
Li, Yan and Chi, Zheru. 2005. "MR brain image segmentation based on self-organizing map network." International Journal of Information Technology. 11 (8), pp. 45-53.

Article

Boundary integral-based domain decomposition technique for solution of Navier Stokes equations
Mai-Duy, N. and Tran-Cong, T.. 2004. "Boundary integral-based domain decomposition technique for solution of Navier Stokes equations." CMES Computer Modeling in Engineering and Sciences. 6 (1), pp. 59-75. https://doi.org/10.3970/cmes.2004.006.059

Article

Indirect RBFN method with thin plate splines for numerical solution of differential equations
Mai-Duy, N. and Tran-Cong, T.. 2003. "Indirect RBFN method with thin plate splines for numerical solution of differential equations." CMES Computer Modeling in Engineering and Sciences. 4 (1), pp. 85-102. https://doi.org/10.3970/cmes.2003.004.085

Article

An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2005. "An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers." Johnson, M. and Chen, P. (ed.) IEEE International Conference on Systems, Man and Cybernetics (SMC) (2005). Hawaii, United States 12 Oct 2005 Hawaii, USA. https://doi.org/10.1109/ICSMC.2005.1571663

Paper

Throughput and fairness performance of multiple STT-Vegas connections
Zhang, Zhongwei, Zhou, Hong and Leis, John. 2005. "Throughput and fairness performance of multiple STT-Vegas connections." Sanadidi, M. Y. (ed.) 3rd IASTED International Conference on Communications and Computer Networks. Marina del Rey, United States 24 - 26 Oct 2005 Marina del Rey, USA.

Paper

Mining risk patterns in medical data
Li, Jiuyong, Fu, Ada Wai-Chee, He, Hongxing, Chen, Jie, Jin, Huidong, McAullay, Damien, Williams, Graham, Sparks, Ross and Kelman, Chris. 2005. "Mining risk patterns in medical data." Grossman, R., Bayardo, R., Bennett, K. and Vaidya, J. (ed.) 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005). Chicago, United States 21 - 24 Aug 2005 United States. https://doi.org/10.1145/1081870.1081971

Paper

A framework of filtering, clustering and dynamic layout graphs for visualization
Lai, Wei, Huang, Xiaodi and Eades, Peter. 2005. "A framework of filtering, clustering and dynamic layout graphs for visualization." Estivill-Castro, V. (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Australia.

Paper

Quantitative analysis of queue management schemes in TCP/IP network routers
Li, Zhenquan, Zhang, Zhongwei and Zhou, Hong. 2004. "Quantitative analysis of queue management schemes in TCP/IP network routers." Safaei, F. (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2004). Sydney, Australia 08 - 10 Dec 2004 Canberra, Australia.

Paper

High precision GPS guidance of mobile robots
Willgoss, Richard, Rosenfeld, Vivian and Billingsley, John. 2003. "High precision GPS guidance of mobile robots." Roberts, Jonathan and Wyeth, Gordon (ed.) 2003 Australasian Conference on Robotics and Automation (ACRA 2003). Brisbane, Australia 01 - 03 Dec 2003 Brisbane, Australia.

Paper

Comparison of blind source separation algorithms
Li, Yan, Powers, David and Peach, James. 2001. "Comparison of blind source separation algorithms." Mastorakis, Nikos E. (ed.) WSES International Conference on Neural Networks and Applications 2001. Tenerife, Spain 11 - 15 Feb 2001 Greece.

Paper

Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena
Melnik, R. V. N., Roberts, A. J. and Thomas, K. A.. 2001. "Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena." Mechanics Research Communications. 28 (6), pp. 637-651. https://doi.org/10.1016/S0093-6413(02)00216-1

Article

Holistic discretisation ensures fidelity to Burger's equation
Roberts, A. J.. 2001. "Holistic discretisation ensures fidelity to Burger's equation." Applied Numerical Mathematics. 37 (3), pp. 371-396. https://doi.org/10.1016/S0168-9274(00)00053-2

Article

Assessing and assuring trust in e-Commerce systems
Zhang, Zhongwei and Wang, Zhen. 2006. "Assessing and assuring trust in e-Commerce systems." Mohammadian, Masoud (ed.) 2006 International Conference on Intelligent Agents, Web Technologies & Internet Commerce (IAWTIC'06). Sydney, Australia 29 Nov - 01 Dec 2006 Piscataway, NJ, USA.

Paper

An extended branch and bound algorithm for linear bilevel programming
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2006. "An extended branch and bound algorithm for linear bilevel programming." Applied Mathematics and Computation. 180 (2), pp. 529-537.

Article

Attractors and centre manifolds in nonlinear diffusion
Strunin, Dmitry V.. 2005. "Attractors and centre manifolds in nonlinear diffusion." 2nd International Conference on Scientific Computing and Partial Differential Equations & The First East Asian SIAM Symposium. Hong Kong, China 12 - 16 Dec 2005 Hong Kong.

Paper

An innovative learning model for computation in first year mathematics
Tonkes, E. J., Loch, B. I. and Stace, A. W.. 2005. "An innovative learning model for computation in first year mathematics." International Journal of Mathematical Education in Science and Technology. 36 (7), pp. 751-759. https://doi.org/10.1080/00207390500271677

Article

Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks
Leis, John W.. 2004. Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks. Toowoomba, Australia. University of Southern Queensland.

Technical report

People