Department of Mathematics and Computing


Latest research outputs

682 results found
Sort by Date Title
Optimizing multi-layered networks towards a transparently optical internet
Addie, Ronald G., Fatseas, David and Zukerman, Moshe. 2010. "Optimizing multi-layered networks towards a transparently optical internet." Jaworski, Marek and Marciniak, Marian (ed.) ICTON 2010: 12th International Conference on Transparent Optical Networks. Munich, Germany 27 Jun - 01 Jul 2010 Warsaw, Poland. https://doi.org/10.1109/ICTON.2010.5549023

Paper

Optimisation of test signals for channel identification
Braithwaite, Stephen Clive. 2011. Optimisation of test signals for channel identification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Tissue conductivity based human head model study for EEG
Bashar, Md. Rezaul. 2011. Tissue conductivity based human head model study for EEG . PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Increasing power of M-test through pre-testing
Yunus, Rossita M.. 2010. Increasing power of M-test through pre-testing. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Privacy preserving data sharing in data mining environment
Sun, Xiaoxun. 2010. Privacy preserving data sharing in data mining environment. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

XML documents and access control management
Sun, Lili. 2010. XML documents and access control management. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Protecting information sharing in distributed collaborative environment
Li, Min. 2010. Protecting information sharing in distributed collaborative environment. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Supporting secure services on dynamic aggregation of heterogeneous networks
Lai, David Tai Wai. 2010. Supporting secure services on dynamic aggregation of heterogeneous networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Access control management and privacy-preserving
Kabir, Md Enamul. 2010. Access control management and privacy-preserving. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

The effect of canine hyperimmune plasma on inflammation in a rat pouch model
Essien, Bryan E.. 2009. The effect of canine hyperimmune plasma on inflammation in a rat pouch model. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Fractional diffusion in force fields, fractional electro-diffusion and fractional chemotaxis diffusion
Langlands, Trevor, Henry, Bruce and Straka, Peter. 2010. "Fractional diffusion in force fields, fractional electro-diffusion and fractional chemotaxis diffusion." Henry, Bruce and Roberts, John (ed.) Dynamics Days Asia Pacific 6 Conference (DDAP6). Sydney, Australia 12 - 14 Jul 2010 Sydney, Australia.

Paper

DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54

Paper

Optimal choice of test signals for channel estimation
Braithwaite, Stephen and Addie, Ron. 2010. "Optimal choice of test signals for channel estimation." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558839

Paper

On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14

Paper

A transaction model for XML databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2004. "A transaction model for XML databases." World Wide Web. 7 (1), pp. 29-57. https://doi.org/10.1023/B:WWWJ.0000015864.75561.98

Article

M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180

Paper

A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.

Article

A simple time-management tool for students' online learning activities
de Raadt, Michael and Dekeyser, Stijn. 2009. "A simple time-management tool for students' online learning activities." Atkinson, Roger J. and McBeath, Clare (ed.) 26th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2009). Auckland, New Zealand 06 - 09 Dec 2009 Auckland, New Zealand.

Paper

Early enteral nutrition within 24 h of intestinal surgery versus later commencement of feeding: a systematic review and meta-analysis [Letter to the Editor]
Osland, Emma, Yunus, Rossita M., Khan, Shahjahan and Memon, Muhammed Ashraf. 2009. "Early enteral nutrition within 24 h of intestinal surgery versus later commencement of feeding: a systematic review and meta-analysis [Letter to the Editor]." Journal of Gastrointestinal Surgery. 13 (6), pp. 1163-1165. https://doi.org/10.1007/s11605-009-0846-2

Letter

Classification of EEG signals using sampling techniques and least square support vector machines
Li, Yan and Wen, Peng. 2009. "Classification of EEG signals using sampling techniques and least square support vector machines." Wen, Peng (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_47

Paper

EEG analysis on skull conductivity perturbations using realistic head model
Bashar, Md. Rezaul, Li, Yan and Wen, Peng. 2009. "EEG analysis on skull conductivity perturbations using realistic head model." Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_26

Paper

Improvement of the Accuracy of InSAR Image Co-Registration Based On Tie Points - A Review
Zou, Weibao, Li, Yan, Li, Zhilin and Ding, Xiaoli. 2009. "Improvement of the Accuracy of InSAR Image Co-Registration Based On Tie Points - A Review." Sensors. 9 (2), pp. 1259-1281. https://doi.org/10.3390/s90201259

Article

Minimum packet drop sequences based networked control system model with embedded Markov chain
Wen, Peng and Li, Yan. 2009. "Minimum packet drop sequences based networked control system model with embedded Markov chain." Simulation Modelling Practice and Theory. 17 (10), pp. 1635-1641. https://doi.org/10.1016/j.simpat.2009.07.003

Article

Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66

Paper

Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136

Paper

Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132

Article

Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49

Paper

Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48

Paper

L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47

Paper

Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994

Paper

Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39

Paper

Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715

Paper

Theoretical basis for identification of different anesthetic states based on routinely recorded EEG during operation
Nguyen-Ky, T., Wen, Peng and Li, Yan. 2009. "Theoretical basis for identification of different anesthetic states based on routinely recorded EEG during operation." Computers in Biology and Medicine. 39 (1), pp. 40-45. https://doi.org/10.1016/j.compbiomed.2008.10.007

Article

Effects of white matter on EEG of multi-layered spherical head models
Bashar, Md. Rezaul, Li, Yan and Wen, Peng. 2008. "Effects of white matter on EEG of multi-layered spherical head models." Hoque, Aminul and Choudhury, Mohammad (ed.) 5th International Conference on Electrical and Computer Engineering (ICECE 2008). Dhaka, Bangladesh 20 - 22 Dec 2008 Bangladesh. https://doi.org/10.1109/ICECE.2008.4769173

Paper

A study of white matter and skull inhomogeneous anisotropic tissue conductivities on EEG forward head modeling
Bashar, Md. Rezaul, Li, Yan and Wen, Peng. 2008. "A study of white matter and skull inhomogeneous anisotropic tissue conductivities on EEG forward head modeling." Karim, Mohammad (ed.) DMAI 2008: 1st IEEE International Workshop on Data Mining and Artificial Intelligence. Khulna, Bangladesh 24 - 27 Dec 2008 Bangladesh. https://doi.org/10.1109/ICCITECHN.2008.4803103

Paper

Tension control of a winding machine for rectangular coils
Wen, Peng, Stapleton, Cary and Li, Yan. 2008. "Tension control of a winding machine for rectangular coils." Wen, Changyun and Pham, Thuong Cat (ed.) 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008). Hanoi, Vietnam 17 - 20 Dec 2008 United States. https://doi.org/10.1109/ICARCV.2008.4795843

Paper

  • 0
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month