Papers from 2009
Recognition of semantic basketball events based on optical flow patterns, Li Li, Ying Chen, Weiming Hu, Wanqing Li, and Xiaoqing Zhang
Ruderman-Kittel-Kasuya-Yosida interactions on a bipartite lattice, Hsiu-Hau Lin and J. E. Bunder
Fair and secure mobile billing systems, Shiqun Li, Guilin Wang, Jianying Zhou, and Kefel Chen
Graphical diagnostics to check model misspecification for the proportional odds regression model, Ivy Liu, Bhramar Mukherjee, Thomas F. Suesse, David Sparrow, and Sung Kyun Park
Online/offline ring signature scheme, Joseph K. Liu, Man Ho Allen Au, Willy Susilo, and Jianying Zhou
Towards method engineering for multi agent systems: a validation of a generic MAS metamodel, Graham Low, Ghassan Beydoun, Brian Henderson-Sellers, and Cesar Gonzalez-Perez
A survey of PDA use in PBL-medical curricula, Rattiporn Luanrattana and Khin Than Win
The deployment of PDA accessible clinical-log for medical education in PBL-approach, Rattiporn Luanrattana and Khin Than Win
Ranking attack graphs with graph neural networks, Liang Lu, Rei Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Yong, and Ah Chung Tsoi
E-Commerce adoption barriers in small businesses and the differential effects of gender, Robert C. Macgregor and Lejla Vrazalic
Genetic control of wheat quality: interactions between chromosomal regions determining protein content and composition, dough rheology, and sponge and dough baking properties, Gulay Mann, Simon Diffey, Brian R. Cullis, Fermin Azanza, David Martin, Alison Kelly, Lynne McIntyre, Adele Schmidt, Wujun Ma, Zena Nath, Ibrahim Kutty, P Emmet Leyne, Lynette Rampling, Ken J. Quail, and Matthew K. Morell
When does QP yield the exact solution to constrained NMPC?, José Mare, Jose A. de Dona, María Seron, Hernan Haimovich, and Jacqueline Ramagge
Proper actions which are not saturated, Damian Marelli and Iain F. Raeburn
Asymptotic analysis of the viscous micro/nano pump at low Reynolds number, Miccal Matthews and James M. Hill
On three simple experiments to determine slip lengths, Miccal T. Matthews and James M. Hill
A new class of fully nonlinear curvature flows, James A. McCoy
Micro/nanoparticle melting with spherical symmetry and surface tension, Scott McCue, Bisheng Wu, and James M. Hill
Face recognition using a time-of-flight camera, Simon Meers and Koren Ward
Voltage quality behaviour of a wind turbine based remote area power system, Nishad Mendis, Kashem Muttaqi, and Sarath Perera
Differential space-time-frequency codes for MB-OFDM UWB with dual carrier modulation, Alfred Mertins and Le Chung Tran
Space-time-frequency code implementation in MB-OFDM UWB communications: design criteria and performance, Alfred Mertins and Le Chung Tran
Uberveillance: microchipping people and the assault on privacy, M. G. Michael and Katina Michael
Dealing With Imprecise Compliance Requirements, Evan D. Morrison, Aditya K. Ghose, and George Koliadis
Business Process Integration: Method and Analysis, Evan D. Morrison, Alex Menzies, George Koliadis, and Aditya K. Ghose
Making simulation an institutionalized business tool to understand and manage functional service quality data for internet service providers (ISPs) in Australia, Karthik Vilapakkam Nagarajan, Peter James Vial, and Srivalli Vilapakkam Nagarajan
A computer-based, interactive tool for semi-automatic extraction, visualization and pre-operative assessment of the inner ear, Fazel Naghdy, Catherine Todd, Muaaz Tarabichi, and M. Kirilloy
Automation in high-content flow cytometry screening, U Naumann and M P. Wand
A fundamental analysis of continuous flow bioreactor models governed by Contois kinetics. II. Reactor cascades, Mark Nelson and Andrew Holder
A fundamental analysis of continuous flow bioreactor and membrane reactor models with noncompetitive product inhibition, Mark Nelson, Joshua Quigley, and Xiao Dong Chen
Analysis of a chemostat model with variable yield coefficient: Tessier kinetics, Mark Nelson and Harvinder Sidhu
Analysis of the activated sludge model (number 1), Mark Nelson and Harvinder Sidhu
Analysis of an immobilised enzyme reactor with catalysts activation, Mark Nelson, Harvinder Sidhu, and Soji Adesina
New privacy results on synchronized RFID authentication protocols against tag tracing, Ching Yu Ng, Willy Susilo, Yi Mu, and Reihaneh Safavi-Naini
A novel template matching method for human detection, Duc Thanh Nguyen, Wanqing Li, and Philip Ogunbona
A part-based template matching method for multi-view human detection, Duc Thanh Nguyen, Wanqing Li, and Philip Ogunbona
Human detection based on weighted template matching, Duc Thanh Nguyen, Philip Ogunbona, and Wanqing Li
Distance geometry in quasihypermetric spaces. I, Peter Nickolas and Reinhard Wolf
Finite quasihypermetric spaces, Peter Nickolas and Reinhard Wolf
On a generalization of the Laplace approximation, David Nott, Mark Fielding, and Daniela Leonte
Strategies for implementing a converged ICT regulator in Indonesia, Yudhistra Nughara and William Tibben
A means to an end: a web-based client management system in palliative care, Margaret O'Connor, Trudi Erwin, and Linda L. Dawson
Discussion on the paper by Rue, Martino and Chopin: Approximate Bayesian inference for latent Gaussian models by using integrated nested Laplace approximations, J T. Ormerod and M. P. Wand
Synchronous objects for one flat thing, reproduced, Maria Palazzi, Norah Shaw, William Forsythe, Matthew Lewis, Beth Albright, Michael Andereck, Sucheta Bhatawadekar, Hyowon Ban, Andrew Calhoun, Jane Drozd, Joshua Fry, Melissa Quintanilha, A Reed, Benjamin Schroeder, Lily Skove, Ashley Thorndike, Mary Twohig, Ola Ahlqvist, Peter Chan, Noel Cressie, Stephen Turk, Jill Johnson, Christopher Roman, Elizabeth Waterhouse, Scott Delahunta, Patrick Haggard, and Alva Noe
Coverings of skew products and crossed products by coactions, David A. Pask, John Quigg, and Aidan Sims
Noncommutative manifolds from Graph and k-Graph C*-algebras, David A. Pask, Adam Rennie, and Aidan Sims
A family of 2-graphs arising from two-dimensional subshifts, David Pask, Iain Raeburn, and Natasha A. Weaver
Explicit connections between longitudinal data analysis and kernel machines, N D. Pearce and M. P. Wand
Learning pattern classification tasks with imbalanced data sets, Son Lam Phung, Abdesselam Bouzerdoum, and Giang Hoang Nguyen
How to compare image watermarking algorithms, Angela Piper and Reihaneh Safavi-Naini
Application of microsimulation to the modelling of terrorist attacks, Ian Piper, Daniel Keep, Tony Green, and Ivy Zhang
Improvement of lattice-based cryptography using CRT, Thomas Plantard, Michael Rose, and W. Susilo
Broadcast attacks against lattice-based cryptosystems, Thomas Plantard and Willy Susilo
The use of technology to support student learning, Anne L. Porter and Norhayati Baharun
Ship classification by superstructure moment invariants, Prashan Premaratne and Farzad Safaei
A hospital based dynamic platform workflow management, Nantika Prinyapol, Joshua P. Fan, and S. Lau
A dynamic platform for business process management (BPM) using service-oriented enterprise (SOE), Nantika Prinyapol, Joshua P. Fan, and Sim K. Lau
Provenance of sedimentary rocks, Geoffrey Pritchard, Paul Moloney, Ken Russell, and Bill Whiten
Publicly verifiable privacy-preserving group decryption, Bo Qin, Qianhong Wu, Willy Susilo, and Yi Mu
From filters to wavelets via direct limits II: Wavelet-packet bases, Iain F. Raeburn
Generalized multiresolution analyses with given multiplicity functions, Iain F. Raeburn, Judith A. Packer, Nadia S. Larsen, Kathy D. Merrill, and Lawrence W. Baggett
The isometric representation theory of a perforated semigroup, Iain F. Raeburn and Sean T. Vittadello
Preliminary development of an inexpensive and portable network monitoring probe using an internet embedded microprocessor, Karthic Rajaram, Montse Ros, and Peter James Vial
Towards a better understanding of correlation, J. C. W Rayner and Eric J. Beh
Generalised smooth tests of goodness of fit, J. C. W Rayner, Donald John Best, and Olivier Thas
Partially parametric testing, J. C. W Rayner and A. M. Carolan
The privacy-value-control harmonization for RFID adoption in retail, B. D. Renegar and Katina Michael
The prediction of partners' behaviors in self-interested agents, Fenghui Ren and Minjie Zhang
A market-based multi-issue negotiation model considering multiple preference in dynamic e-marketplaces, Fenghui Ren, Minjie Zhang, Chunyan Miao, and Zhiqi Shen
Adaptive conceding strategies for automoted trading agents in dynamic, open markets, Fenghui Ren, Minjie Zhang, and Kwang Mong Sim
Analysis of property-preservation capabilities of the ROX and ESh hash domain extenders, Reza Reyhanitabar, Willy Susilo, and Yi Mu
Enhanced target collision resistant hash functions revisited, Reza Reyhanitabar, Willy Susilo, and Yi Mu
Improved Searchable Public Key Encryption with Designated Tester, Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, and Dong Hoon Lee
Secure searchable public key encryption scheme against keyword guessing attacks, Hyun Sook Rhee, Willy Susilo, and Hyun-Jeong Kim
Simplicity of C*-algebras associated to row-finite locally convex higher-rank graphs, David Robertson and Aidan Sims
Biometric monitoring of footstep and heart rate using wireless inertial sensors, Montserrat B. Ros, Matthew D'Souza, and Matthew Wallace
A simulation study on the energy efficiency of pure and slotted Aloha based RFID tag reading protocols, Alejandro Ruiz-Rivera, Dheeraj Klair, and Kwan-Wu Chin
Key predistribution schemes using block designs in wireless sensor networks, Sushmita Ruj, J. Seberry, and Bimal Roy
Semiparametric regression during 2003-2007, David Ruppert, M. P. Wand, and Raymond J. Carroll
Design considerations for small experiments and simple logistic regression, Kenneth G. Russell, David C. Woods, John A. Eccleston, and Susan M. Lewis
D-Optimal designs for poisson regression models, Kenneth G. Russell, David C. Woods, John A. Eccleston, and Susan M. Lewis
Spatial M-quantile models for small area estimation, N. Salvait, Monica Pratesi, Nikos Tzavidis, and Ray Chambers
Optimisation of component sizes for a hybrid remote area power supply system, Saad M. Sayeef, Nishad Mendis, and Kashem Muttaqi
Computational capabilities of graph neural networks, Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, and Gabriele Monfardini
The graph neural network model, Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, and Gabriele Monfardini
Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures, S. F. Shahandashti and R. Safavi-Naini
Threshold attribute-based signatures and their application to anonymous credential systems, Siamak F. Shahandashti and Reihaneh Safavi-Naini
Estimating the Effect of Common Method Variance: The Method-Method Pair Technique with an Illustration from TAM Research, Rajeev Sharma, Philip Yetton, and Jeff Crawford
Positive semidefinite metric learning with Boosting, Chunhua Shen, junae kim, Lei Wang, and Anton van den Hengel
Adaptive E-Services selection in P2P-based workflow with multiple property specifications, Jun Shen and Shuai Yuan
QoS-aware peer services selection using ant colony optimisation, Jun Shen and Shuai Yuan
Dynamic selection of service peers with multiple property specifications, Jun Shen, Shuai Yuan, and Aneesh Krishna
A generic approach to haptic modeling of textile artifacts, Hooman Shidanshidi, Fazel Naghdy, Golshah Naghdy, and Diana Wood Conroy
Designing Acoustic Vector Sensors for localisation of sound sources in air, Muawiyath Shujau, Christian Ritz, and Ian Burnett
Performance comparison between a two-reactor cascade and a single tank in an activated sludge wastewater treatment process, Harvinder Sidhu, Simon Watt, and Mark Nelson
Embedded partially replicated designs for grain quality testing, Alison B. Smith, Robin Thompson, and Brian R. Cullis
Identifying change-points in biological sequences via sequential importance sampling, G. Sofronov, Gareth Evans, Jonathan Keith, and Dirk Kroese
IS solution for the global environmental challenge: an Australian initiative, Trevor A. Spedding, Aditya K. Ghose, and Helen M. Hasan
Robustness for general design mixed models using mixed models using the t-distribution, John Staudenmayer, E. Lake, and M. Wand
Enhanced diagnostics for the spatial analysis of field trials, Katia T. Stefanova, Alison B. Smith, and Brian R. Cullis
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions, Willy Susilo