Department of Mathematics and Computing
Latest research outputs
682 results found
Sort by Date Title
Statistical methodology for ordinal data in meta-analysis
Hossain, Md. Belal. 2011. Statistical methodology for ordinal data in meta-analysis. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Optimizing multi-layered networks towards a transparently optical internet
Addie, Ronald G., Fatseas, David and Zukerman, Moshe. 2010. "Optimizing multi-layered networks towards a transparently optical internet." Jaworski, Marek and Marciniak, Marian (ed.) ICTON 2010: 12th International Conference on Transparent Optical Networks. Munich, Germany 27 Jun - 01 Jul 2010 Warsaw, Poland. https://doi.org/10.1109/ICTON.2010.5549023Paper
Optimisation of test signals for channel identification
Braithwaite, Stephen Clive. 2011. Optimisation of test signals for channel identification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Tissue conductivity based human head model study for EEG
Bashar, Md. Rezaul. 2011. Tissue conductivity based human head model study for EEG . PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Increasing power of M-test through pre-testing
Yunus, Rossita M.. 2010. Increasing power of M-test through pre-testing. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Privacy preserving data sharing in data mining environment
Sun, Xiaoxun. 2010. Privacy preserving data sharing in data mining environment. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
XML documents and access control management
Sun, Lili. 2010. XML documents and access control management. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Protecting information sharing in distributed collaborative environment
Li, Min. 2010. Protecting information sharing in distributed collaborative environment. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Supporting secure services on dynamic aggregation of heterogeneous networks
Lai, David Tai Wai. 2010. Supporting secure services on dynamic aggregation of heterogeneous networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Access control management and privacy-preserving
Kabir, Md Enamul. 2010. Access control management and privacy-preserving. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
The effect of canine hyperimmune plasma on inflammation in a rat pouch model
Essien, Bryan E.. 2009. The effect of canine hyperimmune plasma on inflammation in a rat pouch model. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Fractional diffusion in force fields, fractional electro-diffusion and fractional chemotaxis diffusion
Langlands, Trevor, Henry, Bruce and Straka, Peter. 2010. "Fractional diffusion in force fields, fractional electro-diffusion and fractional chemotaxis diffusion." Henry, Bruce and Roberts, John (ed.) Dynamics Days Asia Pacific 6 Conference (DDAP6). Sydney, Australia 12 - 14 Jul 2010 Sydney, Australia.Paper
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54Paper
Branching behavior of standing waves - the signatures of resonance
Smith, D. H. and Roberts, A. J.. 1999. "Branching behavior of standing waves - the signatures of resonance." Physics of Fluids. 11 (5), pp. 1051-1064. https://doi.org/10.1063/1.869976Article
Optimal choice of test signals for channel estimation
Braithwaite, Stephen and Addie, Ron. 2010. "Optimal choice of test signals for channel estimation." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558839Paper
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14Paper
A transaction model for XML databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2004. "A transaction model for XML databases." World Wide Web. 7 (1), pp. 29-57. https://doi.org/10.1023/B:WWWJ.0000015864.75561.98Article
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180Paper
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.Article
A simple time-management tool for students' online learning activities
de Raadt, Michael and Dekeyser, Stijn. 2009. "A simple time-management tool for students' online learning activities." Atkinson, Roger J. and McBeath, Clare (ed.) 26th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2009). Auckland, New Zealand 06 - 09 Dec 2009 Auckland, New Zealand.Paper
Early enteral nutrition within 24 h of intestinal surgery versus later commencement of feeding: a systematic review and meta-analysis [Letter to the Editor]
Osland, Emma, Yunus, Rossita M., Khan, Shahjahan and Memon, Muhammed Ashraf. 2009. "Early enteral nutrition within 24 h of intestinal surgery versus later commencement of feeding: a systematic review and meta-analysis [Letter to the Editor]." Journal of Gastrointestinal Surgery. 13 (6), pp. 1163-1165. https://doi.org/10.1007/s11605-009-0846-2Letter
Classification of EEG signals using sampling techniques and least square support vector machines
Li, Yan and Wen, Peng. 2009. "Classification of EEG signals using sampling techniques and least square support vector machines." Wen, Peng (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_47Paper
EEG analysis on skull conductivity perturbations using realistic head model
Bashar, Md. Rezaul, Li, Yan and Wen, Peng. 2009. "EEG analysis on skull conductivity perturbations using realistic head model." Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_26Paper
Improvement of the Accuracy of InSAR Image Co-Registration Based On Tie Points - A Review
Zou, Weibao, Li, Yan, Li, Zhilin and Ding, Xiaoli. 2009. "Improvement of the Accuracy of InSAR Image Co-Registration Based On Tie Points - A Review." Sensors. 9 (2), pp. 1259-1281. https://doi.org/10.3390/s90201259Article
Minimum packet drop sequences based networked control system model with embedded Markov chain
Wen, Peng and Li, Yan. 2009. "Minimum packet drop sequences based networked control system model with embedded Markov chain." Simulation Modelling Practice and Theory. 17 (10), pp. 1635-1641. https://doi.org/10.1016/j.simpat.2009.07.003Article
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34Paper
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23Paper
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66Paper
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136Paper
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6Article
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132Article
Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49Paper
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48Paper
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47Paper
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994Paper
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39Paper
Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715Paper
Theoretical basis for identification of different anesthetic states based on routinely recorded EEG during operation
Nguyen-Ky, T., Wen, Peng and Li, Yan. 2009. "Theoretical basis for identification of different anesthetic states based on routinely recorded EEG during operation." Computers in Biology and Medicine. 39 (1), pp. 40-45. https://doi.org/10.1016/j.compbiomed.2008.10.007Article
Effects of white matter on EEG of multi-layered spherical head models
Bashar, Md. Rezaul, Li, Yan and Wen, Peng. 2008. "Effects of white matter on EEG of multi-layered spherical head models." Hoque, Aminul and Choudhury, Mohammad (ed.) 5th International Conference on Electrical and Computer Engineering (ICECE 2008). Dhaka, Bangladesh 20 - 22 Dec 2008 Bangladesh. https://doi.org/10.1109/ICECE.2008.4769173Paper
0
total views0
total downloads0
views this month0
downloads this month