Department of Mathematics and Computing


Latest research outputs

682 results found
Sort by Date Title
Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Accurate macroscale modelling of spatial dynamics in multiple dimensions
Roberts, A. J., MacKenzie, Tony and Bunder, J. E.. 2012. Accurate macroscale modelling of spatial dynamics in multiple dimensions. Adelaide, Australia. University of Adelaide.

Technical report

Accurately model the Kuramoto-Sivashinsky dynamics with holistic discretisation
MacKenzie, T. and Roberts, A. J.. 2006. "Accurately model the Kuramoto-Sivashinsky dynamics with holistic discretisation." SIAM Journal on Applied Dynamical Systems. 5 (3), pp. 365-402. https://doi.org/10.1137/050627733

Article

Achieving k-Anonymity by clustering in attribute hierarchical structures
Li, Jiuyong, Wong, Raymond Chi-Wing, Fu, Ada Wai-Chee and Pei, Jian. 2006. "Achieving k-Anonymity by clustering in attribute hierarchical structures." Tjoa, A. Min and Trujillo, Juan (ed.) 8th International Conference on Data Warehousing and Knowledge Discovery. Krakow, Poland 04 - 08 Sep 2006 Germany. Springer. https://doi.org/10.1007/11823728

Paper

Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34

Paper

Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917

Article

Achieving secure service sharing over IP networks
Lai, David, Zhang, Zhongwei and Shen, Chong. 2006. "Achieving secure service sharing over IP networks." Li, Hong (ed.) ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006). New York, United States 28 - 29 Apr 2006 New York, USA.

Paper

Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks
Zhou, Hong and Zhang, Zhongwei. 2009. "Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks." Martini, Maria and Politis, Christos (ed.) 5th International ICST Mobile Multimedia Communications Conference (MobiMedia'09). London, United Kingdom 07 - 09 Sep 2009 Brussels, Belgium. https://doi.org/10.4108/ICST.MOBIMEDIA2009.7438

Paper

Adequacy of support for new graduates during their transition into the workplace: a Queensland, Australia study
Parker, Victoria, Plank, Ashley and Hegney, Desley. 2003. "Adequacy of support for new graduates during their transition into the workplace: a Queensland, Australia study." International Journal of Nursing Practice. 9 (5), pp. 300-305.

Article

Adjusting the community of inquiry approach to a synchronous mathematical context
McDonald, Christine and Loch, Birgit. 2008. "Adjusting the community of inquiry approach to a synchronous mathematical context." Atkinson, Roger J. and McBeath, Clare (ed.) 25th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2008). Melbourne, Australia 30 Nov - 03 Dec 2008 Melbourne, Australia.

Paper

Admission control schemes for bursty multimedia traffic
Lee, Teck Kiong, Zukerman, Moshe and Addie, Ronald G.. 2001. "Admission control schemes for bursty multimedia traffic." Cruz, R. and Pacifici, G. (ed.) 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2001). Anchorage, United States 22 - 26 Apr 2001 Piscataway, NJ. United States. https://doi.org/10.1109/INFCOM.2001.916739

Paper

Adults returning to study mathematics
Galligan, Linda and Taylor, Janet A.. 2008. "Adults returning to study mathematics." Forgasz, Helen, Barkatsas, Anastasios, Bishop, Alan, Clarke, Barbara, Keast, Stephen, Seah, Wee Tiong and Sullivan, Peter (ed.) Research in mathematics education in Australasia 2004-2007. Rotterdam, Netherlands. Sense Publishers. pp. 99-118

Edited book (chapter)

Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29

Paper

Advancements of outlier detection: a survey
Zhang, Ji. 2013. "Advancements of outlier detection: a survey." ICST Transactions on Scalable Information Systems. 13 (1), pp. 1-26. https://doi.org/10.4108/trans.sis.2013.01-03.e2

Article

Advection-dispersion in symmetric field-flow fractionation channels
Suslov, Sergey A. and Roberts, A. J.. 1998. Advection-dispersion in symmetric field-flow fractionation channels. Toowoomba, Australia. University of Southern Queensland.

Working paper

Aged care nursing in Queensland - the nurses' view
Eley, Robert, Hegney, Desley, Buikstra, Elizabeth, Fallon, Anthony Bruce, Plank, Ashley and Parker, Victoria. 2007. "Aged care nursing in Queensland - the nurses' view ." Journal of Clinical Nursing. 16 (5), pp. 860-872. https://doi.org/10.1111/j.1365-2702.2006.01696.x

Article

Agents with attitude
Ray, Penny, Lukose, Dickson and Toleman, Mark. 2000. "Agents with attitude." 6th International Conference on the Simulation of Adaptive Behaviour SAB 2000): From Animals to Animats 6. Paris, France 11 - 15 Sep 2000 Massachusetts, United States.

Paper

Aggregate flows: for efficient management of large flows in the internet
Addie, Ron, Braithwaite, Stephen, Das Gupta, Jishu and Leis, John W.. 2006. "Aggregate flows: for efficient management of large flows in the internet." WITSP 2006: 5th Workshop on the Internet, Telecommunications and Signal Processing. Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.

Paper

Algorithms for core stability, core largeness, exactness, and extendability of flow games
Fang, Qizhi, Fleischer, Rudolf, Li, Jian and Sun, Xiaoxun. 2007. "Algorithms for core stability, core largeness, exactness, and extendability of flow games ." Lin, G. (ed.) COCOON 2007: 13th Annual International Computing and Combinatorics Conference. Banff, Canada 16 - 19 Jul 2007 Berlin, Germany. https://doi.org/10.1007/978-3-540-73545-8_43

Paper

Algorithms for core stability, core largeness, exactness, and extendability of flow games
Fang, Qizhi, Fleischer, Rudolf, Li, Jian and Sun, Xiaoxun. 2010. "Algorithms for core stability, core largeness, exactness, and extendability of flow games ." Frontiers of Mathematics in China. 5 (1), pp. 47-63. https://doi.org/10.1007/s11464-009-0048-y

Article

An accurate and comprehensive model of thin fluid flows with inertia on curved substrates
Roberts, A. J. and Li, Zhenquan. 2006. "An accurate and comprehensive model of thin fluid flows with inertia on curved substrates." Journal of Fluid Mechanics. 553 (1), pp. 33-73. https://doi.org/10.1017/S0022112006008640

Article

An active approach to multimedia network management
Zhang, Zhongwei and Lai, David. 2005. "An active approach to multimedia network management." Mastorakis, Nikos and Passadis, Kostas (ed.) 9th WSEAS International Conference on Communications. Athens, Greece 11 - 16 Jul 2005 Athens, Greece.

Paper

An approach of context ontology for robust face recognition against illumination variations
Bashar, M. Rezaul, Li, Yan and Rhee, Phill Kyu. 2007. "An approach of context ontology for robust face recognition against illumination variations." Kabir, Lutful and Hasan, Kamrul (ed.) ICICT 2007: International Conference on Information and Communication Technology. Dhaka, Bangladesh 07 - 09 Mar 2007 Dhaka, Bangladesh. https://doi.org/10.1109/ICICT.2007.375351

Paper

An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223

Article

An averaged model of dispersion of pollutant in a channel: logarithmic flow
Strunin, Dmitry V.. 2010. "An averaged model of dispersion of pollutant in a channel: logarithmic flow." Hangos, K. (ed.) 29th IASTED International Conference on Modelling, Identification and Control (MIC 2010). Innsbruck, Austria 15 - 17 Feb 2010 Calgary, Canada.

Paper

An effective system for electronic peer review
de Raadt, Michael, Toleman, Mark and Watson, Richard. 2006. "An effective system for electronic peer review." International Journal of Business and Management Education. 13 (9), pp. 48-62.

Article

An efficient and effective duplication detection method in large database applications
Zhang, Ji. 2010. "An efficient and effective duplication detection method in large database applications." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.78

Paper

An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.

Paper

An efficient visibility graph similarity algorithm and its application for sleep stages classification
Zhu, Guohun, Li, Yan and Wen, Peng Paul. 2012. "An efficient visibility graph similarity algorithm and its application for sleep stages classification." Zanzotto, Fabio Massimo, Tsumoto, Shusaku, Taatgen, Niels and Yao, Yiyu (ed.) 2012 International Conference on Brain Informatics (BI 2012). Macau, China 04 - 07 Dec 2012 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-35139-6_18

Paper

An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194

Article

An emotion recognition system and method
de Byl, Penny-Anne Kaye and Mills, Christopher William. 2007. An emotion recognition system and method. WO/2007/098560

Patent

An empirical investigation of language-based editing paradigms
Toleman, Mark A. and Welsh, Jim. 1995. "An empirical investigation of language-based editing paradigms." Hasan, Helen and Nicastri, Cathy (ed.) 1995 Australasian Computer-Human Interaction Conference (OzCHI 1995): A Light Into The Future. Wollongong, Australia 27 - 30 Nov 1995 Canberra, Australia.

Paper

An ensemble learning algorithm for blind signal separation problem
Li, Yan and Wen, Peng. 2005. "An ensemble learning algorithm for blind signal separation problem." 2005 International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA 2005). Vienna, Austria 28 - 30 Nov 2005 Washington, DC, united States.

Paper

An evaluation of editing paradigms
Toleman, Mark A. and Welsh, Jim. 1994. "An evaluation of editing paradigms." Howard, Steve and Leung, Y. K. (ed.) Australasian Computer-Human Interaction Conference: Harmony Through Working Together (OzCHI 1994). Melbourne, Australia 28 Nov - 01 Dec 1994 Canberra, Australia.

Paper

An evaluation of electronic individual peer assessment in an introductory programming course
de Raadt, Michael, Lai, David and Watson, Richard. 2008. "An evaluation of electronic individual peer assessment in an introductory programming course." Lister, Raymond (ed.) 7th Baltic Sea Conference on Computing Education Research (Koli Calling 2007). Koli National Park, Finland 15 - 18 Nov 2007 Sydney, Australia.

Paper

An improved chaos method for monitoring the depth of anaesthesia
Nguyen-Ky, Tai, Wen, Peng and Li, Yan. 2013. "An improved chaos method for monitoring the depth of anaesthesia." Duc, Nguyen Minh and BenLetaief, Khaled (ed.) International Conference on Computing, Management and Telecommunications (ComManTel 2013). Ho Chi Minh City, Vietnam 21 - 24 Jan 2013 United States. https://doi.org/10.1109/ComManTel.2013.6482413

Paper

An improved detrended moving-average method for monitoring the depth of anesthesia
Nguyen-Ky, T., Wen, Peng and Li, Yan. 2010. "An improved detrended moving-average method for monitoring the depth of anesthesia." IEEE Transactions on Biomedical Engineering. 57 (10), pp. 2369-2378. https://doi.org/10.1109/TBME.2010.2053929

Article

An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks
Lai, David and Zhang, Zhongwei. 2005. "An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks." WSEAS Transactions on Communications. 4 (8), pp. 537-547.

Article

An innovative learning model for computation in first year mathematics
Tonkes, E. J., Loch, B. I. and Stace, A. W.. 2005. "An innovative learning model for computation in first year mathematics." International Journal of Mathematical Education in Science and Technology. 36 (7), pp. 751-759. https://doi.org/10.1080/00207390500271677

Article

An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925

Article

  • 0
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month