Filter
Chapter

Search results

  • 2009

    Sensorized garment augmented 3D pervasive virtual reality system

    Gulrez, T., Tognetti, A. & De Rossi, D., 2009, Pervasive computing: innovations in intelligent multimedia and applications. Hassanien, A-E., Abawajy, J. H., Abraham, A. & Hagras, H. (eds.). London, UK: Springer, Springer Nature, p. 97-115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Solving fuzzy linear regression with hybrid optimization

    Mashinchi, M. H., Orgun, M. A. & Mashinchi, M., 2009, Neural Information Processing: 16th International Conference, ICONIP 2009, Bangkok, Thailand, December 1-5, 2009, Proceedings, Part II. Leung, C. S., Lee, M. & Chan, J. H. (eds.). PART 2 ed. Berlin: Springer, Springer Nature, p. 336-343 8 p. (Lecture Notes in Computer Science; vol. 5864).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Theories of trust for communication protocols

    Ma, J., Orgun, M. A. & Sattar, A., 2009, Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings. Nieto, J. G., Reif, W., Wang, G. & Indulska, J. (eds.). Berlin: Springer, Springer Nature, p. 236-248 13 p. (Lecture Notes in Computer Science; vol. 5586).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Trust Management in Mobile Ad Hoc Networks

    Balakrishnan, V., Varadharajan, V. & Tupakula, U., 2009, Guide to wireless ad hoc networks. Misra, S., Woungang, I. & Misra, S. C. (eds.). London: Springer, Springer Nature, p. 473-502 30 p. (Computer Communications and Networks Series).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Two approaches to iterated belief contraction

    Ramachandran, R., Nayak, A. C. & Orgun, M. A., 2009, Knowledge Science, Engineering and Management: Third International Conference, KSEM 2009, Vienna, Austria, November 25-27, 2009. Proceedings. Karagiannis, D. & Jin, Z. (eds.). Berlin: Institute of Electrical and Electronics Engineers (IEEE), p. 78-89 12 p. (Lecture Notes in Computer Science; vol. 5914).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2008

    A case-classification-conclusion 3Cs approach to knowledge acquisition: Applying a classification logic wiki to the problem solving process

    Richards, D. & Vazey, M., 2008, Current issues in knowledge management. Jennex, M. E. (ed.). Hershey, PA: Information Science Reference, p. 163-180 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • Approximate polynomial gcd: Small degree and small height perturbations

    Von Zur Gathen, J. & Shparlinski, I. E., 2008, LATIN 2008: Theoretical Informatics: 8th Latin American Symposium, Búzios, Brazil, April 7-11, 2008. Proceedings. Laber, E. S., Bornstein, C., Nogueira, L. T. & Faria, L. (eds.). Berlin: Springer, Springer Nature, p. 276-283 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4957).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    3 Citations (Scopus)
  • BPEL4RBAC: An authorisation specification for WS-BPEL

    Wang, X., Zhang, Y., Shi, H. & Yang, J., 2008, Web Information Systems Engineering - WISE 2008: 9th International Conference, Auckland, New Zealand, September 1-3, 2008. Proceedings. Bailey, J., Maier, D., Schewe, K-D., Thalheim, B. & Wang, X. S. (eds.). Berlin: Springer, Springer Nature, p. 381-395 15 p. (Lecture Notes in Computer Science; vol. 5175).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • Cognitive modelling applied to aspects of schizophrenia and autonomic computing

    Flax, L., 2008, Novel Approaches in Cognitive Informatics and Natural Intelligence. Wang, Y. (ed.). Hershey, PA: IGI Global, p. 220-234 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Distributed denial of service attacks in networks

    Tupakula, U. K. & Varadharajan, V., 2008, Handbook of research on information security and assurance. Gupta, J. N. D. & Sharma, S. K. (eds.). USA, London UK: IGI Global, p. 85-97 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Efficient disjointness tests for private datasets

    Ye, Q., Wang, H., Pieprzyk, J. & Zhang, X. M., 2008, Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Mu, Y., Susilo, W. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, p. 155-169 15 p. (Lecture Notes in Computer Science; vol. 5107).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Citations (Scopus)
  • Finding and growing innovators: Keeping ahead of the competition

    Richards, D. & Busch, P., 2008, Information Technology Entrepreneurship and Innovation. Zhao, F. (ed.). Hershey, PA, USA: IGI Global, p. 396-414 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Mining multidimensional data through element oriented analysis

    Zhang, Y., Orgun, M. A., Lin, W. & Baxter, R., 2008, PRICAI 2008: Trends in Artificial Intelligence - 10th Pacific Rim International Conference on Artificial Intelligence, Proceedings. Ho, T-B. & Zhou, Z-H. (eds.). Berlin: Springer, Springer Nature, p. 556-567 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5351 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • Robotics and virtual reality: A marriage of two diverse streams of science

    Gulrez, T., Kavakli, M. & Tognetti, A., 2008, Computational Intelligence in Multimedia Processing: Recent Advances. Hassanien, A-E., Abraham, A. & Kacprzyk, J. (eds.). Berlin: Springer, Springer Nature, Vol. 96. p. 99-118 20 p. (Studies in Computational Intelligence; vol. 96).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Secure computation of the vector dominance problem

    Yuan, J., Ye, Q., Wang, H. & Pieprzyk, J., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. Chen, L., Mu, Y. & Susilo, W. (eds.). Berlin: Springer, Springer Nature, p. 319-333 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Service Componentization: Toward Service Reuse and Specialization

    Orriens, B. & Yang, J., 2008, SERVICE-ORIENTED COMPUTING. Georgakopoulos, D. & papazoglou, MP. (eds.). Chinese Journal of Integrated Traditional and Western Medicine Press, p. 295-329 35 p. (Cooperative Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Strongly multiplicative and 3-multiplicative linear secret sharing schemes

    Zhang, Z., Liu, M., Chee, Y. M., Ling, S. & Wang, H., 2008, Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings. Pieprzyk, J. (ed.). Berlin: Springer, Springer Nature, p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5350 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Threshold privacy preserving keyword searches

    Wang, P., Wang, H. & Pieprzyk, J., 2008, SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings. Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P. & Bieliková, M. (eds.). Berlin: Springer, Springer Nature, p. 646-658 13 p. (Lecture Notes in Computer Science; vol. 4910).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    33 Citations (Scopus)
  • 2007

    A pattern enforcing compiler (PEC) for Java: a practical way to formally specify patterns

    Lovatt, H., Sloane, A. M. & Verity, D. R., 2007, Design pattern formalization techniques. Taibi, T. (ed.). Hershey, PA; London: IGI Publishing, p. 324-356 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • A unified taxonomy framework of trust

    Zhao, W., Varadharajan, V. & Bryan, G., 2007, Trust in e-services: technologies, practices and challenges. Song, R., Korba, L. & Yee, G. (eds.). Hershey, PA; London: IGI Global, p. 29-50 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Function fields over finite fields and their applications to cryptography

    Niederreiter, H., Wang, H. & Xing, C., 2007, Topics in geometry, coding theory and cryptography. Garcia, A. & Stichtenoth, H. (eds.). Dordrecht: Springer, Springer Nature, p. 59-104 46 p. (Algebra and Applications; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Group structure of elliptic curves over finite fields and applications

    Murty, R. & Shparlinski, I., 2007, Topics in geometry, coding theory and cryptography. Garcia, A. & Stichtenoth, H. (eds.). Netherlands: Springer, Springer Nature, Vol. 6. p. 167-194 28 p. (Algebra and Applications; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
  • RiskMan: a multi-agent system for risk management

    Kavakli, M., Szilas, N., Porte, J. & Kartiko, I., 2007, Architectural design of multi-agent systems: technologies and techniques. Lin, H. (ed.). Hershey, PA; London: IGI Global, p. 356-376 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • 2006

    Ad-hoc and personal ontologies: a prototyping approach to ontology engineering

    Richards, D., 2006, Advances in knowledge acquisition and management: Pacific Rim Knowledge Acquisition Workshop, PKAW 2006, Guilin, China, August 7-8, 2006 : revised selected papers. Berlin, Germany: Springer, Springer Nature, Vol. 4303 LNAI. p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4303 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Algebraic background

    Doche, C. & Lubicz, D., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boco Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 19-37 19 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Arithmetic of elliptic curves

    Doche, C. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 267-302 36 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    13 Citations (Scopus)
  • Arithmetic of special curves

    Doche, C. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 355-387 33 p. (Discrete mathematics and its applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Capturing and reusing rationale associated with requirements engineering process improvement: A case study

    Palyagar, B. & Richards, D., 2006, Rationale Management in Software Engineering. Dutoit, A. H., McCall, R., Mistrik, I. & Paech, B. (eds.). Berlin: Springer, Springer Nature, p. 391-408 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Computational grammatical inference

    Adriaans, P. W. & van Zaanen, M. M., 2006, Innovations in machine learning: theory and applications. Berlin, Germany: Springer, Springer Nature, p. 187-203 17 p. (Studies in fuzziness and soft computing; vol. 194).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • Exponentiation

    Doche, C., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 145-168 24 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Finite field arithmetic

    Doche, C., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 201-237 37 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    5 Citations (Scopus)
  • From hubs via holons to an adaptive meta-architecture - The "AD-HOC" approach

    Maciaszek, L. A., 2006, Software Engineering Techniques: Design for Quality. Sacha, K. (ed.). New York, Vol. 227. p. 1-13 13 p. (IFIP International Federation for Information Processing; vol. 227).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Integer arithmetic

    Doche, C., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, Florida, USA: CRC Press, Taylor & Francis Group, p. 169-199 31 p. (Discrete mathematics and its applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Routing in extremely mobile networks

    Allard, G., Jacquet, P. & Mans, B., 2006, Challenges in ad hoc networking: Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Île de Porquerolles, France. Agha, K. AI., Lassous, I. G. & Pujolle, G. (eds.). New York: Springer, Springer Nature, p. 129-138 10 p. (IFIP International Federation for Information Processing; vol. 197).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 2004

    Composing web services using an agent factory

    Richards, D., van Splunter, S., Brazier, F. M. T. & Sabou, M., 2004, Extending Web services technologies: the use of multi-agent approaches. Cavedon, L. & Benatallah, B. (eds.). New York: Springer, Springer Nature, p. 229-251 23 p. (Multiagent systems, artificial societies, and simulated organizations; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Predicting subset sum pseudorandom generators

    Von Gathen, J. Z. & Shparlinski, I. E., 2004, Selected areas in cryptography: 11th InternationalWorkshop, SAC 2004 Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Handschuh, H. & Hasan, M. A. (eds.). Berlin: Springer, Springer Nature, p. 241-251 11 p. (Lecture notes in computer science; vol. 3357).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Citations (Scopus)
  • Question answering in terminology-rich technical domains

    Rinaldi, F., Hess, M., Dowdall, J., Mollá, D. & Schwitter, R., 2004, New directions in question answering. Menlo Park, CA: Association for the Advancement of Artificial Intelligence, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Structural pattern discovery in time series database

    Lin, W., Orgun, M. A. & Williams, G. J., 2004, Computational intelligence in economics and finance. Chen, S-H., Wang, P. P. & Kuo, T-W. (eds.). New York: Springer, Springer Nature, p. 262-287 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2003

    Alignment-Based Learning versus Data-Oriented Parsing

    van Zaanen, M., 2003, Data-Oriented Parsing. Chicago, USA: University of Chicago Press, p. 385-403 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Digital Cash

    Mu, Y., Varadharajan, V. & Nguyen, K. Q., 2003, Payment Technologies for E-Commerce. Weidong Kou (ed.). Heidelberg, Germany: Springer, Springer Nature, p. 171-194 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Role-based access control and the access control matrix

    Saunders, G., Hitchens, M. & Varadharajan, V., 2003, Information and communications security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Qing, S., Gollmann, D. & Zhou, J. (eds.). Heidelberg, Germany: Springer, Springer Nature, p. 145-157 13 p. (Lecture notes in computer science; vol. 2836).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Citation (Scopus)
  • 2002

    Distributed Authorization: principles and practice

    Varadharajan, V., 2002, Coding Theory and Cryptology. Niederreiter, H. (ed.). Singapore: Singapore University Press, p. 385-432 48 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Exponential sums in coding theory, cryptology and algorithms

    Shparlinski, I. E., 2002, Coding theory and cryptology. Niederreiter, H. (ed.). Singapore: World Scientific ; Singapore University Press, p. 323-384 62 p. (Lecture notes series, Institute for Mathematical Sciences, National University of Singapore).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Formal proofs for the security of signcryption

    Baek, J., Steinfeld, R. & Zheng, Y., 2002, Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems - Proceedings. Naccache, D. & Paillier, P. (eds.). Berlin; Heidelberg: Springer, Springer Nature, Vol. 2274. p. 80-98 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    174 Citations (Scopus)
  • Process Model for Round-Trip Engineering with Relational Database

    Maciaszek, L., 2002, Successful Software Reenigineering. S. Valenti (ed.). Hershey, USA: IRM Press, p. 76-91 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Ripple Down Rules: a technique for acquiring knowledge

    Richards, D., 2002, Decision Making Support Systems: achievements, trends and challenges for the new decade. Mora, M., Forgionne, G. A. & Gupta, J. N. D. (eds.). Hershey, USA: IDEA GROUP PUBLISHING, p. 207-226 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Selective forgery of rsa signatures with fixed-pattern padding

    Lenstra, A. K. & Shparlinski, I. E., 2002, Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings. Naccache, D. & Paillier, P. (eds.). Berlin: Springer, Springer Nature, Vol. 2274. p. 228-236 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Citations (Scopus)
  • Tacit knowledge acquisition and processing within the computing domain: An exploratory study

    Busch, P., 2002, Optimal Information Modelling Technique. van Slooten, K. (ed.). Hershey, PA: IRM Press, p. 121-127 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Visual Parallel Programming

    Zhang, K., Cai, W., Stankovic, N. & Orgun, M., 2002, Handbook of Software Engineering and Knowledge Engineering,: Vol.2 : Emerging Technologies. Chang, S. K. (ed.). Singapore: World Scientific Publishing, Vol. 2. p. 103-129 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    11 Citations (Scopus)
  • 2001

    Competitive Collaboration in Australia's Pharmaceutical Industry

    More, E. & McGrath, M., 2001, The Internet and Health Communication: Experiences and Expectations. Rice, R. E. & Katz, J. E. (eds.). Thousand Oaks, USA: SAGE Publications, p. 329-350 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review