Filter
Chapter

Search results

  • Chapter

    Abduction without minimality

    Nayak, A. C. & Foo, N. Y., 1999, Advanced Topics in Artificial Intelligence: 12th Australian Joint Conference on Artificial Intelligence, AI’99 Sydney, Australia, December 6–10, 1999 Proceedings. Foo, N. (ed.). Berlin: Springer, Springer Nature, p. 365-377 13 p. (Lecture Notes in Computer Science; vol. 1747).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • A case-classification-conclusion 3Cs approach to knowledge acquisition: Applying a classification logic wiki to the problem solving process

    Richards, D. & Vazey, M., 2008, Current issues in knowledge management. Jennex, M. E. (ed.). Hershey, PA: Information Science Reference, p. 163-180 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • A comparative study of platforms for multi-user virtual environments

    Tezcan, A. & Richards, D., 2011, Multi-Agent Systems for Education and Interactive Entertainment: Design, Use and Experience. Beer, M., Fasli, M. & Richards, D. (eds.). Hershey, PA: IGI Global, p. 137-170 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A Comparison of LAMS and Moodle as learning design technologies - teacher education students' perspective

    Bower, M. & Wittmann, M., 2011, LAMS and learning design. Alexander, C., Dalziel, J., Krajka, J. & Kiely, R. (eds.). Cyprus: University of Nicosia Press, Vol. 2. p. 65-80 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Active security in multiparty computation over black-box groups

    Desmedt, Y., Pieprzyk, J. & Steinfeld, R., 2012, Security and Cryptography for Networks - 8th International Conference, SCN 2012, Proceedings. Visconti, I. & De Prisco, R. (eds.). Berlin: Springer, Springer Nature, p. 503-521 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7485 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • A customised dataset to assist legal and ethical governance of seaports

    Echeverry, A. X. H. & Richards, D., 2015, Human Rights and Ethics: Concepts, Methodologies, Tools, and Applications. Information Resources Management Association (ed.). Hershey, PA: IGI Global, Vol. 4. p. 2049-2067 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A customised dataset to assist legal and ethical governance of seaports

    Echeverry, A. X. H. & Richards, D., 31 May 2013, Ethical Data Mining Applications for Socio-Economic Development. Rahman, H. & Ramos, I. (eds.). Hershey, PA: IGI Global, p. 182-200 19 p. (Advances in Data Mining and Database Management).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Adaptive development and management of business collaborations

    Orriens, B. & Yang, J., 2009, Handbook of Research on Complex Dynamic Process Management: Techniques for Adaptability in Turbulent Environments. Wang, M. & Sun, Z. (eds.). Hershey, PA: IGI Global, p. 272-296 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Ad-hoc and personal ontologies: a prototyping approach to ontology engineering

    Richards, D., 2006, Advances in knowledge acquisition and management: Pacific Rim Knowledge Acquisition Workshop, PKAW 2006, Guilin, China, August 7-8, 2006 : revised selected papers. Berlin, Germany: Springer, Springer Nature, Vol. 4303 LNAI. p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4303 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • A framework for the local information dynamics of distributed computation in complex systems

    Lizier, J. T., Prokopenko, M. & Zomaya, A. Y., 2014, Guided self-organization: inception. Prokopenko, M. (ed.). Berlin Heidelberg: Springer, Springer Nature, p. 115-158 44 p. (Emergence Complexity and Computation; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Algebraic background

    Doche, C. & Lubicz, D., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boco Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 19-37 19 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Algorithms

    Doche, C., 1 Jan 2013, Handbook of finite fields. Mullen, G. L. & Panario, D. (eds.). CRC Press, Taylor & Francis Group, p. 345-404 60 p. (Discrete mathematics and its applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Alignment-Based Learning versus Data-Oriented Parsing

    van Zaanen, M., 2003, Data-Oriented Parsing. Chicago, USA: University of Chicago Press, p. 385-403 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • ALOPA: authorization logic for property attestation in trusted platforms

    Nagarajan, A., Varadharajan, V. & Hitchens, M., 2009, Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings. González Nieto, J., Reif, W., Wang, G. & Indulska, J. (eds.). Berlin: Springer, Springer Nature, p. 134-148 15 p. (Lecture Notes in Computer Science; vol. 5586).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • An approach to managing identity fraud

    Jamieson, R., Smith, S., Stephens, G. & Winchester, D., 2009, Cyber security and global information assurance: Threat Analysis and Response Solutions. Knapp, K. J. (ed.). Hershey, PA: Information Science Reference, p. 233-248 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • An efficient rational secret sharing scheme based on the Chinese remainder theorem

    Zhang, Y., Tartary, C. & Wang, H., 2011, Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings. Parampalli, U. & Hawkes, P. (eds.). Heidelberg: Springer, Springer Nature, p. 259-275 17 p. (Lecture Notes in Computer Science; vol. 6812).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • An evaluation of a pure embedded domain-specific language for strategic term rewriting

    Premaratne, S., Sloane, A. M. & Hamey, L. G. C., 2013, Formal and Practical Aspects of Domain-Specific Languages: Recent Developments. Mernik, M. (ed.). Hershey, PA: IGI Global, p. 81-108 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • An illustrated mathematical foundation for ERA

    Johnson, M., Dampney, C. & Monro, G. P., 1992, The unified computation laboratory: modelling, specifications, and tools. Rattray, C. & Clark, R. G. (eds.). Oxford University Press, p. 77-84

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A novel deep learning model to secure internet of things in healthcare

    Ahmad, U., Song, H., Bilal, A., Mahmood, S., Alazab, M., Jolfaei, A., Ullah, A. & Saeed, U., 2021, Machine intelligence and big data analytics for cybersecurity applications. Maleh, Y., Shojafar, M., Alazab, M. & Baddi, Y. (eds.). Cham, Switzerland: Springer, Springer Nature, p. 341-353 13 p. (Studies in Computational Intelligence; vol. 919).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • A pattern enforcing compiler (PEC) for Java: a practical way to formally specify patterns

    Lovatt, H., Sloane, A. M. & Verity, D. R., 2007, Design pattern formalization techniques. Taibi, T. (ed.). Hershey, PA; London: IGI Publishing, p. 324-356 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Applied hidden periodicity analysis for mining discrete-valued time series databases

    Lin, W. & Orgun, M., 2000, Intensional Programming II: Based on the Papers at ISLIP'99. Gergatsoulis, M. & Rondogiannis, P. (eds.). Singapore: World Scientific Publishing, p. 182-196 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Approximate polynomial gcd: Small degree and small height perturbations

    Von Zur Gathen, J. & Shparlinski, I. E., 2008, LATIN 2008: Theoretical Informatics: 8th Latin American Symposium, Búzios, Brazil, April 7-11, 2008. Proceedings. Laber, E. S., Bornstein, C., Nogueira, L. T. & Faria, L. (eds.). Berlin: Springer, Springer Nature, p. 276-283 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4957).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • Arithmetic of elliptic curves

    Doche, C. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 267-302 36 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    13 Citations (Scopus)
  • Arithmetic of special curves

    Doche, C. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 355-387 33 p. (Discrete mathematics and its applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • A secure elliptic curve based RFID ownership transfer scheme with controlled delegation

    Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W., 2013, Radio Frequency Identification System Security: RFIDsec'13 Asia Workshop Proceedings. Ma, C. & Weng, J. (eds.). Amsterdam: IOS Press, Vol. 11. p. 31-43 13 p. (Cryptology and Information Security Series; vol. 11).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • A trust management framework for secure cloud data storage using cryptographic role-based access control

    Zhou, L., Varadharajan, V. & Hitchens, M., 2014, E-Business and Telecommunications: International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013 Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 226-251 26 p. (Communications in Computer and Information Science; vol. 456).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A unified taxonomy framework of trust

    Zhao, W., Varadharajan, V. & Bryan, G., 2007, Trust in e-services: technologies, practices and challenges. Song, R., Korba, L. & Yee, G. (eds.). Hershey, PA; London: IGI Global, p. 29-50 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Authenticated key exchange under bad randomness

    Yang, G., Duan, S., Wong, D. S., Tan, C. H. & Wang, H., 2012, Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Danezis, G. (ed.). Berlin: Springer, Springer Nature, p. 113-126 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    8 Citations (Scopus)
  • Biometric analysis for finger vein data: two-dimensional kernel principal component analysis

    Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging Trends in Image Processing, Computer Vision and Pattern Recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 393-405 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • BPEL4RBAC: An authorisation specification for WS-BPEL

    Wang, X., Zhang, Y., Shi, H. & Yang, J., 2008, Web Information Systems Engineering - WISE 2008: 9th International Conference, Auckland, New Zealand, September 1-3, 2008. Proceedings. Bailey, J., Maier, D., Schewe, K-D., Thalheim, B. & Wang, X. S. (eds.). Berlin: Springer, Springer Nature, p. 381-395 15 p. (Lecture Notes in Computer Science; vol. 5175).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • Broadcast authentication in group communication

    Safavi-Naini, R. & Wang, H., 1999, Advances in Cryptology - ASIACRYPT’99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999. Proceedings. Lam, K-Y., Okamoto, E. & Xing, C. (eds.). Berlin: Springer, Springer Nature, Vol. 1716. p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1716).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    6 Citations (Scopus)
  • Building Entity Graphs for the Web of Things Management

    Yao, L., Sheng, Q. Z., Ngu, A. H. H., Li, X., Benatallah, B. & Wang, X., 8 Feb 2017, Managing the Web of Things: linking the real world to the web. Sheng, Q. Z., Qin, Y., Yao, L. & Benatallah, B. (eds.). Cambridge, MA: Morgan Kaufmann Publishers, p. 275-303 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Capturing and reusing rationale associated with requirements engineering process improvement: A case study

    Palyagar, B. & Richards, D., 2006, Rationale Management in Software Engineering. Dutoit, A. H., McCall, R., Mistrik, I. & Paech, B. (eds.). Berlin: Springer, Springer Nature, p. 391-408 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Case study: the AusTalk corpus

    Cassidy, S., Estival, D. & Cox, F., 2017, Handbook of linguistic annotation. Ide, N. & Pustejovsky, J. (eds.). Dordrecht: Springer, Springer Nature, p. 1287-1301 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Categorical information flow

    Rabehaja, T., McIver, A., Morgan, C. & Struth, G., 2019, The art of modelling computational systems: a journey from logic and concurrency to security and privacy. Alvim, M. S., Chatzikokolakis, K., Olarte, C. & Valencia, F. (eds.). Cham, Switzerland: Springer, Springer Nature, p. 329-343 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11760 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • Causal propagation semantics—a study

    Prokopenko, M., Pagnucco, M., Peppas, P. & Nayak, A., 1999, Advanced Topics in Artificial Intelligence: 12th Australian Joint Conference on Artificial Intelligence, AI’99 Sydney, Australia, December 6–10, 1999 Proceedings. Foo, N. (ed.). Berlin: Springer, Springer Nature, p. 378-392 15 p. (Lecture Notes in Computer Science; vol. 1747).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy: 4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 177-191 15 p. (Lecture Notes in Computer Science; vol. 1587).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    30 Citations (Scopus)
  • Character sums with Beatty sequences on Burgess-type intervals

    Banks, W. D. & Shparlinski, I. E., 2009, Analytic number theory: essays in honour of Klaus Roth. Chen, W. W. L., Gowers, W. T., Halberstam, H., Schmidt, W. M. & Vaughan, R. C. (eds.). Cambridge, UK: Cambridge University Press, p. 15-21 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Classical approaches to natural language processing

    Dale, R., 2010, Handbook of natural language processing, second edition. Indurkhya, N. & Damerau, F. J. (eds.). Boca Raton, Florida: CRC Press, Taylor & Francis Group, p. 3-7 5 p. (Chapman & Hall: CRC machine learning & pattern recognition series).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    9 Citations (Scopus)
  • CNLER: a controlled natural language for specifying and verbalising entity relationship models.

    Hossain, B. A., Rajan, G. & Schwitter, R., 4 Dec 2019, Proceedings of the The 17th Annual Workshop of the Australasian Language Technology Association. Melbourne, VIC: Australasian Language Technology Association, p. 126–135 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    File
    25 Downloads (Pure)
  • Cognitive augmentation in processes

    Barukh, M. C., Zamanirad, S., Baez, M., Beheshti, A., Benatallah, B., Casati, F., Yao, L., Sheng, Q. Z. & Schiliro, F., 2021, Next-gen digital services: a retrospective and roadmap for service computing of the future. Aiello, M., Bouguettaya, A., Tamburri, D. A. & van den Heuvel, W-J. (eds.). Cham, Switzerland: Springer, Springer Nature, p. 123-137 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12521 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Cognitive modelling applied to aspects of schizophrenia and autonomic computing

    Flax, L., 2008, Novel Approaches in Cognitive Informatics and Natural Intelligence. Wang, Y. (ed.). Hershey, PA: IGI Global, p. 220-234 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Collaborative knowledge management in the call center

    Richards, D., 2010, Computational advancements in end-user technologies: emerging models and frameworks. Clarke, S. (ed.). Hershey, PA: Information Science Reference, p. 78-92 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Competitive Collaboration in Australia's Pharmaceutical Industry

    More, E. & McGrath, M., 2001, The Internet and Health Communication: Experiences and Expectations. Rice, R. E. & Katz, J. E. (eds.). Thousand Oaks, USA: SAGE Publications, p. 329-350 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Composing web services using an agent factory

    Richards, D., van Splunter, S., Brazier, F. M. T. & Sabou, M., 2004, Extending Web services technologies: the use of multi-agent approaches. Cavedon, L. & Benatallah, B. (eds.). New York: Springer, Springer Nature, p. 229-251 23 p. (Multiagent systems, artificial societies, and simulated organizations; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Computational grammatical inference

    Adriaans, P. W. & van Zaanen, M. M., 2006, Innovations in machine learning: theory and applications. Berlin, Germany: Springer, Springer Nature, p. 187-203 17 p. (Studies in fuzziness and soft computing; vol. 194).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Computational techniques

    Doche, C., 2013, Handbook of finite fields. Mullen, G. L. & Panario, D. (eds.). Boca Raton: CRC Press, Taylor & Francis Group, p. 345-363 19 p. (Discrete mathematics and its applications).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Constructing elements of large order in finite fields

    Von Zur Gathen, J. & Shparlinski, I., 1999, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 13th International Symposium, AAECC-13 Honolulu, Hawaii, USA, November 15–19, 1999 Proceedings. Fossorier, M., Imai, H., Lin, S. & Poli, A. (eds.). Berlin: Springer, Springer Nature, Vol. 1719. p. 404-409 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1719).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • Controlled language

    Schwitter, R., 2015, The Routledge encyclopedia of translation technology. Sin-wai, C. (ed.). Oxfordshire, England: Routledge, Taylor and Francis Group, p. 450-464 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Cryptographic role-based access control for secure cloud data storage systems

    Zhou, L., Varadharajan, V. & Hitchens, M., 2014, Security, Privacy and Trust in Cloud Systems. Nepal, S. & Pathan, M. (eds.). Heidelberg: Springer, Springer Nature, p. 313-344 32 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)