Papers from 2013
Two families of Exel-Larsen crossed products, Nathan D. Brownlowe and Iain F. Raeburn
A novel approach to data deduplication over the engineering-oriented cloud systems, Zhe Sun, Jun Shen, and Jianming Young
An inverse finite element method for pricing American options, Song-Ping Zhu and Wenting Chen
Papers from 2012
Fault analysis of the KATAN family of block ciphers, Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry
Business Value of RFID-Enabled Healthcare Transformation Projects, Anand Abijith and S. F. Wamba
Enhancing multimedia search using human motion, Kevin Adistambha, Stephen Davis, Christian Ritz, Ian S. Burnett, and David A. Stirling
A comprehensive assessment tool for solar PV impacts on low voltage three phase distribution networks, M J E Alam, K M. Muttaqi, and Danny Sutanto
A short length window-based method for islanding detection in distributed generation, Mollah Alam, Kashem Muttaqi, and Abdesselam Bouzerdoum
A study of information security awareness and practices in Saudi Arabia, Abdulaziz ALArifi, Holly Tootell, and Peter N. Hyland
Generalised diffusive delay logistic equations: Semi-analytical solutions, H Y. Alfifi, Timothy R. Marchant, and M I. Nelson
Modelling and simulation of an adaptive neuro-fuzzy inference system (ANFIS) for mobile learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, and Jun Yan
Testing equality of variances for multiple univariate normal populations, David Allingham and J. C. W Rayner
A fundamental analysis of continuous flow bioreactor models with recycle around each reactor governed by Contois kinetics. III. Two and three reactor cascades, Rubayyi T. Alqahtani, Mark I. Nelson, and Annette L. Worthy
Determinants of RFID Technology Adoption Intention in the Saudi Retail Industry: an Empirical Study, Salem Alqahtani and S. F. Wamba
Implementing vertical and horizontal engineering students' integration and assessment of consequence academic achievement, Sarim Al-Zubaidy, Nidhal Abdulaziz, and Reza Dashtpour
Convex hypersurfaces with pinched principal curvatures and flow of convex hypersurfaces by high powers of curvature, Ben Andrews and James McCoy
BLACR: TTP-free blacklistable anonymous credentials with reputation, Man Ho Au, Apu Kapadia, and Willy Susilo
An improved template-based approach to keyword spotting applied to the spoken content of user generated video blogs, Mohamed Barakat, Christian H. Ritz, and David A. Stirling
Child's addition in the Stern-Brocot tree, Bruce Bates, Martin Bunder, and Keith Tognetti
Distrust, fear and emotional learning: an online auction perspective, Glenn R. Bewsell
When central finite differencing gives complex values for a real solution!, P Broadbridge and J Goard
Effects of otter boards on catches of an Australian penaeid trawl, Matt K. Broadhurst, David J. Sterling, and Brian R. Cullis
Resilience of inshore, juvenile snapper Pagrus auratus to angling and release, M K. Broadhurst, P A. Butcher, K C. Hall, B R. Cullis, and S P. McGrath
Human rights, regulation, and national security (introduction), Simon Bronitt and Katina Michael
Wilson confidence intervals for the two-sample log-odds-ratio in stratified 2 x 2 contingency tables, Barbara Brown, Thomas F. Suesse, and Vonbing Yap
Boundary quotients of the Toeplitz algebra of the affine semigroup over the natural numbers, Nathan Brownlowe, Astrid An Huef, Marcelo Laca, and Iain Raeburn
Assessing barotrauma among angled snapper (Pagrus auratus) and the utility of release methods, Paul A. Butcher, Matt K. Broadhurst, Karina C. Hall, Brian R. Cullis, and Shane R. Raidal
Integration on locally compact noncommutative spaces, A L. Carey, V Gayral, Adam C. Rennie, and F A. Sukochev
Small area estimation of proportions in business surveys, Hukum Chandra, Ray Chambers, and Nicola Salvati
Small area estimation under spatial nonstationarity, Hukum Chandra, Nicola Salvati, Ra Chambers, and Nikos Tzavidis
The role of social media in disaster evacuations: a case study of Queensland Police during the 2011 Queensland floods, Akemi Chatfield
Interactive effects of networked publics and social media on transforming the public sphere: a survey of Iran's leaderless 'social media revolution', Akemi T. Chatfield, Hans J. Scholl, Reza Akbari, and Nima Mirzayi
Fast quality-guided phase unwrapping algorithm for 3D profilometry based on object image edge detection, Ke Chen, Jiangtao Xi, and Yanguang Yu
Efficient fair conditional payments for outsourcing computations, Xiaofeng Chen, Jin Li, and Willy Susilo
Novel association control strategies for multicasting in relay-enabled WLANs, Kwan-Wu Chin and Shinan Li
A novel scheduler for concurrent Tx/Rx wireless mesh networks with weighted links, Kwan-Wu Chin, Sieteng Soh, and Chen Meng
Enhanced STE3D-CAP: a novel 3D CAPTCHA family, Yang-Wai Chow and Willy Susilo
Enhancing the perceived visual quality of a size invariant visual cryptography scheme, Yang-Wai Chow, Willy Susilo, and Duncan S Wong
Application of multi-phase experiments in plant pathology to identify genetic resistance to Diaporthe toxica in Lupinus albus, R. B. Cowley, G. J. Ash, J. D. I. Harper, Alison B. Smith, Brian R. Cullis, and D. J. Luckett
Towards genomic selection in oilseed brassica, Wallace A. Cowling, Brian R. Cullis, Cameron P. Beeck, and Matthew N. Nelson
Spatio-temporal statistics in Earth sciences, Noel A. Cressie
Geographic Information Systems (GISs), spatial statistics in, Noel A. Cressie and Desheng Liu
Dynamical random-set modeling of concentrated precipitation in North America, Noel Cressie, Renato Assuncao, Scott H. Holan, Michael Levine, Orietta Nicolis, Jun Zhang, and Jian Zou
Statistical properties of the state obtained by solving a nonlinear multivariate inverse problem, Noel Cressie and Rui Wang
Ensuring quality of experience for markerless image recognition applied to print media content, Stephen J. Davis, Eva Cheng, Christian H. Ritz, and Ian S. Burnett
Biodiversity of freshwater diatom communities during 1000 years of metal mining, land use, and climate change in Central Sweden, F De Laender, D Verschuren, R Bindler, Olivier Thas, and C R. Janssen
Frequency selection in absolute phase maps recovery with two frequency projection fringes, Yi Ding, Jiangtao Xi, Yanguang Yu, Wengqing Cheng, Shu Wang, and Joe F. Chicharo
An effective data aggregation based adaptive long term CPU load predictions mechanism on computational grid, Fang Dong, Junzhou Luo, Aibo Song, Jiuxin Cao, and Jun Shen
Concept similarity and related categories in information retrieval using formal concept analysis, Peter W. Eklund, Jon R. Ducrou, and Frithjof Dau
Design, information organisation and the evaluation of the Virtual Museum of the Pacific digital ecosystem, Peter W. Eklund, Timothy Wray, Peter Goodall, and Amanda Lawson
An extended version of the fuzzy multicriteria group decision-making method in evaluation processes, Macarena Espinilla, Jie Lu, Jun Ma, and Luis Martinez
When is the Cuntz-Krieger algebra of a higher-rank graph approximately finite-dimensional?, D Gwion Evans and Aidan Sims
Hierarchical conditional proxy re-encryption, Liming Fang, Willy Susilo, Chunpeng Ge, and Jiandong Wang
Addressing the needs of a developing nation: electronic maps of mathematical learning resources accessible via the internet, Maman Fathurrohman and Anne Porter
A unified study of epidemic routing protocols and their enhancements, Zuyong Feng and Kwan-Wu Chin
Location-based social networking: impact on trust in relationships, Sarah J. Fusco, Roba Abbas, Katina Michael, and Anas Aloudat
Sharable electronic health records and conflicting moral orders in healthcare: A comparison of developments in England and Australia, Karin H. Garrety, Andrew Dalley, Ian McLoughlin, Robert G. Wilson, and Ping Yu
Exact Solutions for a strike reset put option and a shout call option, Joanna Goard
Analytical solution for electrolyte concentration distribution in lithium-ion batteries, Anupama Guduru, Paul W.C Northrop, Shruti Jain, Andrew C. Crothers, Timothy R. Marchant, and Venkat R. Subramanian
Efficient and secure stored-value cards with leakage resilience, Fuchun Guo, Yi Mu, and Willy Susilo
Identity-based traitor tracing with short private key and short ciphertext, Fuchun Guo, Yi Mu, and Willy Susilo
A pre-computable signature scheme with efficient verification for RFID, Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan
A provably secure authenticated key agreement protocol for wireless communications, Hua Guo, Chang Xu, Yi Mu, and Zhoujun Li
Electrical defect detection in thermal image, Ahmed M. Haidar, Geoffrey Asiegbu, Kamarul Hawari, and Faisal Ibrahim
Utilization of pico hydro generation in domestic and commercial loads, Ahmed M. Haidar, Mohod Senan, Abdulhakim Noman, and Taha Radman
Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan
Efficient oblivious transfers with access control, Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan
New constructions of OSBE schemes and their applications in oblivious access control, Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan
Privacy-preserving decentralized key-policy attribute-based encryption, Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan
Knee rotational laxity: an investigation of bilateral asymmetry for comparison with the contralateral uninjured knee, A Hemmerich, W Van Der Merwe, M Batterham, and C L. Vaughan
INSC: An iterative negotiation approach for service compositions, Q He, Yun Yang, Jun Yan, and Hai Jin
A new efficient optimistic fair exchange protocol without random oracles, Qiong Huang, Guomin Yang, Duncan S Wong, and Willy Susilo
Certificateless signatures: New schemes and security models, Xinyi Huang, Duncan S. Wong, Willy Susilo, Yi Mu, and Wei Wu
Voltage unbalance emission assessment in radial power systems, U Jayatunga, S Perera, and P Ciufo
Evaluating usage of WSMO and OWL-S in semantic web services, Lina Azleny Kamaruddin, Jun Shen, and Ghassan Beydoun
Bayesian hierarchical ANOVA of regional climate-change projections from NARCCAP Phase II, Emily L. Kang and Noel Cressie
Combining outputs from the North American Regional Climate Change Assessment Program by using a Bayesian hierarchical model, Emily L. Kang, Noel Cressie, and Stephan R. Sain
An eigenvalue approach to evaluating minors for weighing matrices W(n,n-1), Anna Karapiperi, Marilena Mitrouli, Michael G. Neubauer, and Jennifer Seberry
Bayesian hierarchical spatio-temporal smoothing for very large datasets, Matthias Katzfuss and Noel Cressie
Randomized controlled study of the urinary excretion of biophenols following acute and chronic intake of olive leaf supplements, Megan Kendall, Marijka Batterham, Damien L. Callahan, Daniel Jardine, Paul D. Prenzler, Kevin Robards, and Danielle Ryan
Wavelet-based resampling techniques, Richard D. Kenderdine
Intelligent load management in microgrids, J Kennedy, Philip Ciufo, and Ashish Agalgaonkar
Regression analysis under incomplete linkage, Gunky Kim and Raymond Chambers
Regression analysis under probabilistic multi-linkage, Gunky Kim and Raymond Chambers
Applicant attraction to foreign companies: the case of Japanese companies in Vietnam, Soyeon Kim, Fabian Jintae Froese, and Anne Cox
Generalized modulator for the seven-level flying capacitor based active neutral point clamped converter, Georgios S. Konstantinou, Sridhar R. Pulikanti, and Vassilios G. Agelidis
Perceptions of a gender-inclusive curriculum amongst Australian information and communications technology academics, Tony Koppi, Madeleine Roberts, and Golshah Naghdy
Evaluating the volatility forecasting performance of best fitting GARCH models in emerging Asian stock markets, Chaiwat Kosapattarapim, Yan-Xia Lin, and Michael McCrae
New weighing matrices constructed from two circulant submatrices, I S. Kotsireas, C Koukouvinos, and Jennifer Seberry
Homology for higher-rank graphs and twisted C*-algebras, Alex Kumjian, David Pask, and Aidan Sims
On formalizing inter-process relationships, Tri A. Kurniawan, Aditya K. Ghose, Lam-Son Le, and Hoa Khanh Dam
Design maintenance in process eco-systems, Tri Kurniawan, Aditya K. Ghose, Hoa K. Dam, Lam-Son Le, and Tiancheng Zhang
A regression-based approach for improving the association rule mining through predicting the number of rules on general datasets, Dien Tuan Le, Fenghui Ren, and Minjie Zhang
Contracts + goals = roles?, Lam-Son Le and Aditya K. Ghose
On elasticity and constrainedness of business services provisioning, Lam-Son Le, H Truong, Aditya K. Ghose, and S Dustdar
Space-Time-Frequency Trellis Coding for Multiband OFDM Ultra Wideband Wireless Systems, Phuc Ngoc Le, Le Chung Tran, and Farzad Safaei
A re-distributed knowledge management framework in help desk, Nelson K. Y. Leung
On crystal sets, Chun Li and Jennifer Seberry
User identification for opportunistic OFDM-based multiuser wireless communications, Hang Li, Qinghua Guo, Defeng (David) Huang, and YingJun (Angela) Zhang
One-step estimation of spatial dependence parameters: properties and extensions of the APLE statistic, Hongfei Li, Catherine Calder, and Noel Cressie