Department of Mathematics and Computing
Latest research outputs
682 results found
Sort by Date Title
Developing a logistic regression model with cross-correlation for motor imagery signal recognition
Li, Yan, Wu, Jinglong and Yang, Jingjing. 2011. "Developing a logistic regression model with cross-correlation for motor imagery signal recognition." 2011 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2011). Harbin, China 22 - 25 May 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICCME.2011.5876793Paper
An ontology-based mining approach for user search intent discovery
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen and Tao, Xiaohui. 2011. "An ontology-based mining approach for user search intent discovery." Cunningham, Sally Jo, Scholer, Falk and Thomas, Paul (ed.) 16th Australasian Document Computing Symposium (ADCS 2011). Canberra, Australia 02 Dec 2011 Melbourne, Australia.Paper
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9Paper
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748Article
Fractional cable equation models for anomalous electrodiffusion in nerve cells: finite domain solutions
Langlands, T. A. M., Henry, B. I. and Wearne, S. L.. 2011. "Fractional cable equation models for anomalous electrodiffusion in nerve cells: finite domain solutions." SIAM Journal on Applied Mathematics. 71 (4), pp. 1168-1203. https://doi.org/10.1137/090775920Article
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4Article
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057Article
Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929Paper
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005Article
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020Article
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6Article
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007Article
On meteorological droughts in tropical Pacific Islands: time-series analysis of observed rainfall using Fiji as a case study
Deo, Ravinesh C.. 2011. "On meteorological droughts in tropical Pacific Islands: time-series analysis of observed rainfall using Fiji as a case study." Meteorological Applications. 18 (2), pp. 171-180. https://doi.org/10.1002/met.216Article
Early versus traditional postoperative feeding in patients undergoing resectional gastrointestinal surgery: a meta-analysis
Osland, Emma, Yunus, Rossita Mohamad, Khan, Shahjahan and Memon, Muhammed Ashraf. 2011. "Early versus traditional postoperative feeding in patients undergoing resectional gastrointestinal surgery: a meta-analysis." Journal of Parenteral and Enteral Nutrition. 35 (4), pp. 473-487. https://doi.org/10.1177/0148607110385698Article
Link dimensioning for fractional Brownian input
Chen, Jiongze, Addie, Ronald G. and Zukerman, Moshe. 2011. "Link dimensioning for fractional Brownian input." 2011 IEEE 12th International Conference on High Performance Switching and Routing, HPSR. Cartagena, Spain 04 - 06 Jul 2011 Piscataway, United States. https://doi.org/10.1109/HPSR.2011.5986019Paper
WIN algorithm for discrete online TSP
Wu, Yonghua, Zhu, Guohun, Chen, Huaying and Qin, Jucun. 2011. "WIN algorithm for discrete online TSP ." Journal of Advanced Computational Intelligence and Intelligent Informatics. 15 (9), pp. 1199-1202.Article
Stationary gravity waves with the zero mean vorticity in stratified fluid
Clamond, D. and Stepanyants, Y.. 2012. "Stationary gravity waves with the zero mean vorticity in stratified fluid." Studies in Applied Mathematics. 128 (1), pp. 59-85. https://doi.org/10.1111/j.1467-9590.2011.00530.xArticle
Clustering technique-based least square support vector machine for EEG signal classification
Siuly, S., Li, Yan and Wen, Peng (Paul). 2011. "Clustering technique-based least square support vector machine for EEG signal classification." Computer Methods and Programs in Biomedicine. 104 (3), pp. 358-372. https://doi.org/10.1016/j.cmpb.2010.11.014Article
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928Paper
Twin rotor system modelling de-coupling and optimal control
Wen, Peng and Li, Yan. 2011. "Twin rotor system modelling de-coupling and optimal control." ICMA 2011: IEEE International Conference on Mechatronics and Automation. Beijing, China 07 - 10 Aug 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICMA.2011.5986259Paper
Bridging a discipline divide through the lens of community of inquiry
Redmond, Petrea and McDonald, Christine. 2011. "Bridging a discipline divide through the lens of community of inquiry." Abawi, Lindy, Conway, Joan M. and Henderson, Robyn (ed.) Creating connections in teaching and learning. Charlotte, NC, United States. Information Age Publishing. pp. 249-263Edited book (chapter)
Building a distributed authenticating CDN
Moffatt, Sam. 2011. "Building a distributed authenticating CDN ." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053930Paper
A process provenance service system for scientific data analysis and sharing
Liu, Qing, Zhang, Ji, Forbes, James, Xu, Kai and Nair, Dinesh. 2011. "A process provenance service system for scientific data analysis and sharing." Zhang, Ji and Livraga, Gionvanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053921Paper
Improving the performance of translation wavelet transform using BMICA
Walters-Williams, Janett and Li, Yan. 2011. "Improving the performance of translation wavelet transform using BMICA." International Journal of Computer Science and Information Security. 9 (6), pp. 48-56.Article
My students don't learn the way I do
de Raadt, Michael. 2011. "My students don't learn the way I do." Hamer, Jack and de Raadt, Michael (ed.) ACE 2011: 13th Australasian Computing Education Conference. Perth, Australia 17 - 20 Jan 2011 Sydney, Australia.Paper
A novel secure routing protocol for MANETs
Zhang, Zhongwei. 2011. "A novel secure routing protocol for MANETs." Wang, Xin (ed.) Mobile ad-hoc networks: protocol design. Rijeka, Croatia. In-Tech. pp. 455-466Edited book (chapter)
Meta-analysis of D1 versus D2 gastrectomy for gastric adenocarcinoma
Memon, Muhammed Ashraf, Subramanya, Manjunath S., Khan, Shahjahan, Hossain, Md. Belal, Osland, Emma and Memon, Breda. 2011. "Meta-analysis of D1 versus D2 gastrectomy for gastric adenocarcinoma." Annals of Surgery. 253 (5), pp. 900-911. https://doi.org/10.1097/SLA.0b013e318212bff6Article
Five criteria for web-services security architecture
Addie, R. G. and Colman, Alan. 2010. "Five criteria for web-services security architecture." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 https://doi.org/10.1109/NSS.2010.100Paper
A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains
Zhang, Zhongwei and Zhou, Hong. 2011. "A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains." Chowdhury, Morshed, Ray, Sid and Lee, Roger (ed.) 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011). Sydney, Australia 06 - 08 Jul 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2011.32Paper
Evaluating functional connectivity in alcoholics based on maximal weight matching
Zhu, Guohun, Li, Yan and Wen, Peng. 2011. "Evaluating functional connectivity in alcoholics based on maximal weight matching." Journal of Advanced Computational Intelligence and Intelligent Informatics. 15 (9), pp. 1221-1227.Article
Performance comparison of known ICA algorithms to a wavelet-ICA merger
Walters-Williams, Janett and Li, Yan. 2011. "Performance comparison of known ICA algorithms to a wavelet-ICA merger." Signal Processing: An International Journal. 5 (3), pp. 80-92.Article
A new approach to denoising EEG signals - merger of translation invariant wavelet and ICA
Walters-Williams, Janett and Li, Yan. 2011. "A new approach to denoising EEG signals - merger of translation invariant wavelet and ICA." International Journal of Biometrics and Bioinformatics (IJBB). 5 (2), pp. 130-148.Article
Learner-centred mathematics and statistics education using netbook tablet PCs
Loch, Birgit, Galligan, Linda, Hobohm, Carola and McDonald, Christine. 2011. "Learner-centred mathematics and statistics education using netbook tablet PCs." International Journal of Mathematical Education in Science and Technology. 42 (7), pp. 939-949. https://doi.org/10.1080/0020739X.2011.611910Article
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.Paper
Long-term refractive outcomes and stability after excimer laser surgery for myopia
Dirani, Mohamed, Couper, Terry, Yau, Joanne, Ang, Enk K., Islam, F. M. Amirul, Snibson, Grant R., Vajpayee, Rasik B. and Baird, Paul N.. 2010. "Long-term refractive outcomes and stability after excimer laser surgery for myopia ." Journal of Cataract and Refractive Surgery. 36 (10), pp. 1709-1717. https://doi.org/10.1016/j.jcrs.2010.04.041Article
Triamcinolone-induced cataract in eyes with diabetic macular oedema: 3-year prospective data from a randomized clinical trial
Gillies, Mark C., Islam, Fakir M. A., Larsson, Jorgen, Pasadhika, Sirichai, Gaston, Chris, Zhu, Meidong and Wong, Tien Y.. 2010. "Triamcinolone-induced cataract in eyes with diabetic macular oedema: 3-year prospective data from a randomized clinical trial ." Clinical and Experimental Opthalmology. 38 (6), pp. 605-612. https://doi.org/10.1111/j.1442-9071.2010.02341.xArticle
Retinal microvascular abnormalities and subclinical magnetic resonance imaging brain infarct: a prospective study
Cheung, Ning, Mosley, Thomas, Islam, Amirul, Kawasaki, Ryo, Sharrett, A. Richey, Klein, Ronald, Coker, Laura H., Knopman, David S., Shibata, Dean K., Catellier, Diane and Wong, Tien Y.. 2010. "Retinal microvascular abnormalities and subclinical magnetic resonance imaging brain infarct: a prospective study ." Brain. 133 (7), pp. 1987-1993. https://doi.org/10.1093/brain/awq127Article
Analysis of arsenic concentrations and correlation in water, soil and aurum by neutron activation analysis technique: a case study in Bagerhat, Bangladesh
Abdullah, S. M. A., Islam, M. T., Islam, S. Z., Hossain, Iqbal, Samsuzzoha, M., Hossain, M. D., Latif, S. A. and Islam, F. M. A.. 2010. "Analysis of arsenic concentrations and correlation in water, soil and aurum by neutron activation analysis technique: a case study in Bagerhat, Bangladesh." Bulletin of Environmental Contamination and Toxicology. 85 (3), pp. 301-306. https://doi.org/10.1007/s00128-010-0075-0Article
EEG signal classification based on simple random sampling technique with least square support vector machine
Li, Yan and Wen, Peng. 2011. "EEG signal classification based on simple random sampling technique with least square support vector machine." International Journal of Biomedical Engineering and Technology. 7 (4), pp. 390-409. https://doi.org/10.1504/IJBET.2011.044417Article
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8Article
0
total views0
total downloads0
views this month0
downloads this month