Department of Mathematics and Computing


Latest research outputs

682 results found
Sort by Date Title
An ontology-based mining approach for user search intent discovery
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen and Tao, Xiaohui. 2011. "An ontology-based mining approach for user search intent discovery." Cunningham, Sally Jo, Scholer, Falk and Thomas, Paul (ed.) 16th Australasian Document Computing Symposium (ADCS 2011). Canberra, Australia 02 Dec 2011 Melbourne, Australia.

Paper

Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9

Paper

Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748

Article

Fractional cable equation models for anomalous electrodiffusion in nerve cells: finite domain solutions
Langlands, T. A. M., Henry, B. I. and Wearne, S. L.. 2011. "Fractional cable equation models for anomalous electrodiffusion in nerve cells: finite domain solutions." SIAM Journal on Applied Mathematics. 71 (4), pp. 1168-1203. https://doi.org/10.1137/090775920

Article

Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4

Article

A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057

Article

Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929

Paper

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005

Article

Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020

Article

Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6

Article

A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007

Article

On meteorological droughts in tropical Pacific Islands: time-series analysis of observed rainfall using Fiji as a case study
Deo, Ravinesh C.. 2011. "On meteorological droughts in tropical Pacific Islands: time-series analysis of observed rainfall using Fiji as a case study." Meteorological Applications. 18 (2), pp. 171-180. https://doi.org/10.1002/met.216

Article

Early versus traditional postoperative feeding in patients undergoing resectional gastrointestinal surgery: a meta-analysis
Osland, Emma, Yunus, Rossita Mohamad, Khan, Shahjahan and Memon, Muhammed Ashraf. 2011. "Early versus traditional postoperative feeding in patients undergoing resectional gastrointestinal surgery: a meta-analysis." Journal of Parenteral and Enteral Nutrition. 35 (4), pp. 473-487. https://doi.org/10.1177/0148607110385698

Article

Link dimensioning for fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2011. "Link dimensioning for fractional Brownian input." 2011 IEEE 12th International Conference on High Performance Switching and Routing, HPSR. Cartagena, Spain 04 - 06 Jul 2011 Piscataway, United States. https://doi.org/10.1109/HPSR.2011.5986019

Paper

WIN algorithm for discrete online TSP
Wu, Yonghua, Zhu, Guohun, Chen, Huaying and Qin, Jucun. 2011. "WIN algorithm for discrete online TSP ." Journal of Advanced Computational Intelligence and Intelligent Informatics. 15 (9), pp. 1199-1202.

Article

Stationary gravity waves with the zero mean vorticity in stratified fluid
Clamond, D. and Stepanyants, Y.. 2012. "Stationary gravity waves with the zero mean vorticity in stratified fluid." Studies in Applied Mathematics. 128 (1), pp. 59-85. https://doi.org/10.1111/j.1467-9590.2011.00530.x

Article

Clustering technique-based least square support vector machine for EEG signal classification
Siuly, S., Li, Yan and Wen, Peng (Paul). 2011. "Clustering technique-based least square support vector machine for EEG signal classification." Computer Methods and Programs in Biomedicine. 104 (3), pp. 358-372. https://doi.org/10.1016/j.cmpb.2010.11.014

Article

A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928

Paper

Twin rotor system modelling de-coupling and optimal control
Wen, Peng and Li, Yan. 2011. "Twin rotor system modelling de-coupling and optimal control." ICMA 2011: IEEE International Conference on Mechatronics and Automation. Beijing, China 07 - 10 Aug 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICMA.2011.5986259

Paper

Bridging a discipline divide through the lens of community of inquiry
Redmond, Petrea and McDonald, Christine. 2011. "Bridging a discipline divide through the lens of community of inquiry." Abawi, Lindy, Conway, Joan M. and Henderson, Robyn (ed.) Creating connections in teaching and learning. Charlotte, NC, United States. Information Age Publishing. pp. 249-263

Edited book (chapter)

Building a distributed authenticating CDN
Moffatt, Sam. 2011. "Building a distributed authenticating CDN ." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053930

Paper

A process provenance service system for scientific data analysis and sharing
Liu, Qing, Zhang, Ji, Forbes, James, Xu, Kai and Nair, Dinesh. 2011. "A process provenance service system for scientific data analysis and sharing." Zhang, Ji and Livraga, Gionvanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053921

Paper

Improving the performance of translation wavelet transform using BMICA
Walters-Williams, Janett and Li, Yan. 2011. "Improving the performance of translation wavelet transform using BMICA." International Journal of Computer Science and Information Security. 9 (6), pp. 48-56.

Article

My students don't learn the way I do
de Raadt, Michael. 2011. "My students don't learn the way I do." Hamer, Jack and de Raadt, Michael (ed.) ACE 2011: 13th Australasian Computing Education Conference. Perth, Australia 17 - 20 Jan 2011 Sydney, Australia.

Paper

A novel secure routing protocol for MANETs
Zhang, Zhongwei. 2011. "A novel secure routing protocol for MANETs." Wang, Xin (ed.) Mobile ad-hoc networks: protocol design. Rijeka, Croatia. In-Tech. pp. 455-466

Edited book (chapter)

Meta-analysis of D1 versus D2 gastrectomy for gastric adenocarcinoma
Memon, Muhammed Ashraf, Subramanya, Manjunath S., Khan, Shahjahan, Hossain, Md. Belal, Osland, Emma and Memon, Breda. 2011. "Meta-analysis of D1 versus D2 gastrectomy for gastric adenocarcinoma." Annals of Surgery. 253 (5), pp. 900-911. https://doi.org/10.1097/SLA.0b013e318212bff6

Article

Five criteria for web-services security architecture
Addie, R. G. and Colman, Alan. 2010. "Five criteria for web-services security architecture." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 https://doi.org/10.1109/NSS.2010.100

Paper

A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains
Zhang, Zhongwei and Zhou, Hong. 2011. "A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains." Chowdhury, Morshed, Ray, Sid and Lee, Roger (ed.) 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011). Sydney, Australia 06 - 08 Jul 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2011.32

Paper

Evaluating functional connectivity in alcoholics based on maximal weight matching
Zhu, Guohun, Li, Yan and Wen, Peng. 2011. "Evaluating functional connectivity in alcoholics based on maximal weight matching." Journal of Advanced Computational Intelligence and Intelligent Informatics. 15 (9), pp. 1221-1227.

Article

Performance comparison of known ICA algorithms to a wavelet-ICA merger
Walters-Williams, Janett and Li, Yan. 2011. "Performance comparison of known ICA algorithms to a wavelet-ICA merger." Signal Processing: An International Journal. 5 (3), pp. 80-92.

Article

A new approach to denoising EEG signals - merger of translation invariant wavelet and ICA
Walters-Williams, Janett and Li, Yan. 2011. "A new approach to denoising EEG signals - merger of translation invariant wavelet and ICA." International Journal of Biometrics and Bioinformatics (IJBB). 5 (2), pp. 130-148.

Article

Learner-centred mathematics and statistics education using netbook tablet PCs
Loch, Birgit, Galligan, Linda, Hobohm, Carola and McDonald, Christine. 2011. "Learner-centred mathematics and statistics education using netbook tablet PCs." International Journal of Mathematical Education in Science and Technology. 42 (7), pp. 939-949. https://doi.org/10.1080/0020739X.2011.611910

Article

A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.

Paper

Long-term refractive outcomes and stability after excimer laser surgery for myopia
Dirani, Mohamed, Couper, Terry, Yau, Joanne, Ang, Enk K., Islam, F. M. Amirul, Snibson, Grant R., Vajpayee, Rasik B. and Baird, Paul N.. 2010. "Long-term refractive outcomes and stability after excimer laser surgery for myopia ." Journal of Cataract and Refractive Surgery. 36 (10), pp. 1709-1717. https://doi.org/10.1016/j.jcrs.2010.04.041

Article

Triamcinolone-induced cataract in eyes with diabetic macular oedema: 3-year prospective data from a randomized clinical trial
Gillies, Mark C., Islam, Fakir M. A., Larsson, Jorgen, Pasadhika, Sirichai, Gaston, Chris, Zhu, Meidong and Wong, Tien Y.. 2010. "Triamcinolone-induced cataract in eyes with diabetic macular oedema: 3-year prospective data from a randomized clinical trial ." Clinical and Experimental Opthalmology. 38 (6), pp. 605-612. https://doi.org/10.1111/j.1442-9071.2010.02341.x

Article

Retinal microvascular abnormalities and subclinical magnetic resonance imaging brain infarct: a prospective study
Cheung, Ning, Mosley, Thomas, Islam, Amirul, Kawasaki, Ryo, Sharrett, A. Richey, Klein, Ronald, Coker, Laura H., Knopman, David S., Shibata, Dean K., Catellier, Diane and Wong, Tien Y.. 2010. "Retinal microvascular abnormalities and subclinical magnetic resonance imaging brain infarct: a prospective study ." Brain. 133 (7), pp. 1987-1993. https://doi.org/10.1093/brain/awq127

Article

Analysis of arsenic concentrations and correlation in water, soil and aurum by neutron activation analysis technique: a case study in Bagerhat, Bangladesh
Abdullah, S. M. A., Islam, M. T., Islam, S. Z., Hossain, Iqbal, Samsuzzoha, M., Hossain, M. D., Latif, S. A. and Islam, F. M. A.. 2010. "Analysis of arsenic concentrations and correlation in water, soil and aurum by neutron activation analysis technique: a case study in Bagerhat, Bangladesh." Bulletin of Environmental Contamination and Toxicology. 85 (3), pp. 301-306. https://doi.org/10.1007/s00128-010-0075-0

Article

EEG signal classification based on simple random sampling technique with least square support vector machine
Li, Yan and Wen, Peng. 2011. "EEG signal classification based on simple random sampling technique with least square support vector machine." International Journal of Biomedical Engineering and Technology. 7 (4), pp. 390-409. https://doi.org/10.1504/IJBET.2011.044417

Article

Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8

Article

Statistical methodology for ordinal data in meta-analysis
Hossain, Md. Belal. 2011. Statistical methodology for ordinal data in meta-analysis. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

  • 0
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month