461399. Theory of computation not elsewhere classified
Title | 461399. Theory of computation not elsewhere classified |
---|---|
Parent | 4613. Theory of computation |
Latest research outputs
Sort by Date Title
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.Paper
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782Article
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925Article
Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.Article
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.Article
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.Paper
SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638Paper
Using association rules to make rule-based classifiers robust
Hu, Hong and Li, Jiuyong. 2005. "Using association rules to make rule-based classifiers robust." Williams, Hugh E. and Dobbie, Gillian (ed.) ADC 2005: 16th Australasian Database Conference. Newcastle, Australia 31 Jan - 03 Feb 2005 Sydney, Australia.Paper
A meshless modeling of dynamic strain localization in quasi-brittle materials using radial basis function networks
Le, P., Mai-Duy, N., Tran-Cong, T. and Baker, G.. 2008. "A meshless modeling of dynamic strain localization in quasi-brittle materials using radial basis function networks." CMES Computer Modeling in Engineering and Sciences. 25 (1), pp. 43-67. https://doi.org/10.3970/cmes.2008.025.043Article
Evaluation of Tweedie exponential dispersion model densities by Fourier inversion
Dunn, Peter K. and Smyth, Gordon K.. 2008. "Evaluation of Tweedie exponential dispersion model densities by Fourier inversion." Statistics and Computing. 18 (1), pp. 73-86. https://doi.org/10.1007/s11222-007-9039-6Article
The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Zhou, Hong, Lu, Jie, Zhang, Guangquan and Zhang, Zhongwei. 2007. "The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers." Applied Mathematics and Computation. 188 (2), pp. 1686-1698. https://doi.org/10.1016/j.amc.2006.11.176Article
On asymptotic accuracy in queueing theory - the tale of the misleading tail
Addie, Ronald G., Neame, Timothy D. and Zukerman, Moshe. 2003. "On asymptotic accuracy in queueing theory - the tale of the misleading tail." Australian Telecommunications Networks and Applications Conference (ATNAC 2003). Melbourne, Australia 08 - 10 Dec 2003 Melbourne, Australia.Paper
MR brain image segmentation based on self-organizing map network
Li, Yan and Chi, Zheru. 2005. "MR brain image segmentation based on self-organizing map network." International Journal of Information Technology. 11 (8), pp. 45-53.Article
Boundary integral-based domain decomposition technique for solution of Navier Stokes equations
Mai-Duy, N. and Tran-Cong, T.. 2004. "Boundary integral-based domain decomposition technique for solution of Navier Stokes equations." CMES Computer Modeling in Engineering and Sciences. 6 (1), pp. 59-75. https://doi.org/10.3970/cmes.2004.006.059Article
Indirect RBFN method with thin plate splines for numerical solution of differential equations
Mai-Duy, N. and Tran-Cong, T.. 2003. "Indirect RBFN method with thin plate splines for numerical solution of differential equations." CMES Computer Modeling in Engineering and Sciences. 4 (1), pp. 85-102. https://doi.org/10.3970/cmes.2003.004.085Article
An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2005. "An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers." Johnson, M. and Chen, P. (ed.) IEEE International Conference on Systems, Man and Cybernetics (SMC) (2005). Hawaii, United States 12 Oct 2005 Hawaii, USA. https://doi.org/10.1109/ICSMC.2005.1571663Paper
Throughput and fairness performance of multiple STT-Vegas connections
Zhang, Zhongwei, Zhou, Hong and Leis, John. 2005. "Throughput and fairness performance of multiple STT-Vegas connections." Sanadidi, M. Y. (ed.) 3rd IASTED International Conference on Communications and Computer Networks. Marina del Rey, United States 24 - 26 Oct 2005 Marina del Rey, USA.Paper
Mining risk patterns in medical data
Li, Jiuyong, Fu, Ada Wai-Chee, He, Hongxing, Chen, Jie, Jin, Huidong, McAullay, Damien, Williams, Graham, Sparks, Ross and Kelman, Chris. 2005. "Mining risk patterns in medical data." Grossman, R., Bayardo, R., Bennett, K. and Vaidya, J. (ed.) 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005). Chicago, United States 21 - 24 Aug 2005 United States. https://doi.org/10.1145/1081870.1081971Paper
A framework of filtering, clustering and dynamic layout graphs for visualization
Lai, Wei, Huang, Xiaodi and Eades, Peter. 2005. "A framework of filtering, clustering and dynamic layout graphs for visualization." Estivill-Castro, V. (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Australia.Paper
Quantitative analysis of queue management schemes in TCP/IP network routers
Li, Zhenquan, Zhang, Zhongwei and Zhou, Hong. 2004. "Quantitative analysis of queue management schemes in TCP/IP network routers." Safaei, F. (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2004). Sydney, Australia 08 - 10 Dec 2004 Canberra, Australia.Paper
High precision GPS guidance of mobile robots
Willgoss, Richard, Rosenfeld, Vivian and Billingsley, John. 2003. "High precision GPS guidance of mobile robots." Roberts, Jonathan and Wyeth, Gordon (ed.) 2003 Australasian Conference on Robotics and Automation (ACRA 2003). Brisbane, Australia 01 - 03 Dec 2003 Brisbane, Australia.Paper
Comparison of blind source separation algorithms
Li, Yan, Powers, David and Peach, James. 2001. "Comparison of blind source separation algorithms." Mastorakis, Nikos E. (ed.) WSES International Conference on Neural Networks and Applications 2001. Tenerife, Spain 11 - 15 Feb 2001 Greece.Paper
Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena
Melnik, R. V. N., Roberts, A. J. and Thomas, K. A.. 2001. "Coupled thermomechanical dynamics of phase transitions in shape memory alloys and related hysteresis phenomena." Mechanics Research Communications. 28 (6), pp. 637-651. https://doi.org/10.1016/S0093-6413(02)00216-1Article
Holistic discretisation ensures fidelity to Burger's equation
Roberts, A. J.. 2001. "Holistic discretisation ensures fidelity to Burger's equation." Applied Numerical Mathematics. 37 (3), pp. 371-396. https://doi.org/10.1016/S0168-9274(00)00053-2Article
Assessing and assuring trust in e-Commerce systems
Zhang, Zhongwei and Wang, Zhen. 2006. "Assessing and assuring trust in e-Commerce systems." Mohammadian, Masoud (ed.) 2006 International Conference on Intelligent Agents, Web Technologies & Internet Commerce (IAWTIC'06). Sydney, Australia 29 Nov - 01 Dec 2006 Piscataway, NJ, USA.Paper
An extended branch and bound algorithm for linear bilevel programming
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2006. "An extended branch and bound algorithm for linear bilevel programming." Applied Mathematics and Computation. 180 (2), pp. 529-537.Article
Attractors and centre manifolds in nonlinear diffusion
Strunin, Dmitry V.. 2005. "Attractors and centre manifolds in nonlinear diffusion." 2nd International Conference on Scientific Computing and Partial Differential Equations & The First East Asian SIAM Symposium. Hong Kong, China 12 - 16 Dec 2005 Hong Kong.Paper
An innovative learning model for computation in first year mathematics
Tonkes, E. J., Loch, B. I. and Stace, A. W.. 2005. "An innovative learning model for computation in first year mathematics." International Journal of Mathematical Education in Science and Technology. 36 (7), pp. 751-759. https://doi.org/10.1080/00207390500271677Article
Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks
Leis, John W.. 2004. Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks. Toowoomba, Australia. University of Southern Queensland.Technical report