The University of Wollongong Faculty of Engineering and Information Sciences was formed in 2013 following an organisational restructure. It comprised an amalgamation of the former Faculty of Engineering and Faculty of Informatics. Related series: Faculty of Engineering and Information Sciences - Papers.

Follow

Papers from 2008

PDF

Efficient Supervised Learning with Reduced Training Exemplars, Giang H. Nguyen, A. Bouzerdoum, and Son Lam Phung

PDF

The importance of community engagement in policy development: an Australian case study, Alison Norris and Mark Freeman

Variational approximations for logistic mixed models, J T. Ormerod and M. P. Wand

Mixed model-based additive models for sample extremes, S A. Padoan and M. P. Wand

PDF

Robotic machining from programming to process control, Zengxi Pan and H. Zhang

PDF

Robotic machining from programming to process control: a complete solution by force control, Zengxi Pan and Hui Zhang

PDF

The noncommutative geometry of k-graph C*-algebras, David A. Pask, Adam Rennie, and Aidan Sims

Detecting signals in FMRI data using powerful FDR procedures, M Pavlicova, T Santner, and Noel A. Cressie

A Digital Signature Scheme based on CVP, Thomas Plantard, Willy Susilo, and Khin Than Win

Efficient Lattice-based Signature Scheme, Thomas Plantard, Willy Susilo, Khin Than Win, and Qiong Huang

PDF

An ontology-based sentiment classification methodology for online consumer reviews, Jantima Polpinij and Aditya K. Ghose

PDF

Combined user multiplexing and data modulation through non-binary turbo codes for UWB, Keni Popovski, Tadeusz A. Wysocki, and Beata J. Wysocki

Estimation of maternal variance components considering cow-calf contacts under extensive pastoral systems, K. Prayaga, J. Henshall, D. Swain, and Arthur R. Gilmour

PDF

Feature based stereo correspondence using moment invariant, Prashan Premaratne and Farzad Safaei

PDF

Analytical study of the rotation spreading matrix of block spread OFDM with MMSE equalization, Ibrahim S. Raad and Xiaojing Huang

PDF

The RFID value proposition, Benjamin D. Renegar and Katina Michael

PDF

Privacy, Value and Control Issues in Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, and M G. Michael

Optimal multi-issue negotiation in open and dynamic environments, Fenghui Ren and Minjie Zhang

Prediction of partners' behaviours in agent negotiation under open and dynamic environments, Fenghui Ren and Minjie Zhang

PDF

Mitigating phishing with ID-based online/offline authentication, Qiong Ren, Yi Mu, and W. Susilo

PDF

Enhanced laboratory diagnosis of human Chlamydia pneumoniae infection through pattern recognition derived from pathology database analysis, Alice Richardson, Simon Hawkins, Fariba Shadabi, Dhamendra Sharma, John Fulcher, and B. Lidbury

A new representation of the local volatility surface, Marianito R. Rodrigo and Rogemar S. Mamon

PDF

Wireless interactive system for patient healthcare monitoring using mobile computing devices, Montserrat Ros, Matthew D'Souza, and Adam Postula

PDF

Calculation of a risk measure for the net system load profile, Ken Russell, Pietro Cerone, and Vivien Challis

PDF

Information theoretic bounds on authentication systems in query model, Reihaneh Safavi-Naini and Peter R. Wild

PDF

The Theory of Quaternion Orthogonal Designs, Jennifer Seberry, K. Finlayson, S. Spense Adams, Tadeusz A. Wysocki, Tianbing Xia, and Beata J. Wysocki

Implementation Costs of IS-Enabled Organizational Change, Rajeev Sharma, Philip Yetton, and Robert Zmud

PDF

A pragmatic GIS-oriented ontology for location based services, Jun Shen, Aneesh Krishna, Shuai Yuan, Ke Cai, and Yuemin Qin

PDF

Adaptive task allocation for P2P-based e-services composition, Jun Shen and Shuai Yuan

PDF

Modelling Quality and Spatial Characteristics for Autonomous e-Service Peers, Jun Shen and Shuai Yuan

PDF

Modelling social networks as authorised domains with decay, Nicholas Sheppard and Reihaneh Safavi-Naini

PDF

3D geometric modelling of hand-woven textile, Hooman Shidanshidi, Fazel Naghdy, Golshah Naghdy, and Diana Wood Conroy

PDF

Performance evaluation of ethanol production through continuous fermentation, Harvinder S. Sidhu, John M. Kavanagh, Simon D. Watt, and Mark I. Nelson

Diagnostics for Multiple Response Data, Thomas F. Suesse and Ivy Liu

PDF

A generic construction of identity-based online/offline signcryption, Dongdong Sun, Yi Mu, and Willy Susilo

Separable threshold decryption for ad-hoc wireless networks, Willy Susilo, Yi Mu, and Fangguo Zhang

Efficient generic on-line/off-line (threshold) signatures without key exposure, Willy Susilo, Yi Mu, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim, Haibo Tian, Hyunrok Lee, and Baodian Wei

PDF

Evaluating the implementation of EMR systems from the perspective of health professionals, Yung-Yu Su, John A. Fulcher, Khin Than Win, Herng-Chia Chiu, and Gui-Fen Chiu

Agent-based grid computing, Jia Tang, Minjie Zhang, and John A. Fulcher

PDF

Deafness in the developing world: the place of cochlear implantation., M B Tarabichi, C Todd, Z Khan, X Yang, B Shehzad, and M M Tarabichi

PDF

Flicker Attenuation—Part II: Transfer Coefficients for Regular Voltage Fluctuations in Radial Power Systems With Induction Motor Loads, S. Tennakoon, S. Perera, and D. Robinson

PDF

Flicker Attenuation—Part I: Response of Three-Phase Induction Motors to Regular Voltage Fluctuations, S. Tennakoon, S. Perera, and D. Robinson

PDF

Carbon molecules oscillating in carbon nanotube bundles, Ngamta Thamwattana, B. J. Cox, and James M. Hill

PDF

Comment on "General equilibrium shape equations of polymer chains", Ngamta Thamwattana and James M. Hill

Energy density functions for protein structures, Ngamta Thamwattana, James A. McCoy, and James M. Hill

PDF

Format-independent rich media delivery using the bitstream binding language, Joseph Thomas-Kerr, I. Burnett, and Christian Ritz

How to balance privacy with authenticity, Pairat Thorncharoensri, Willy Susilo, and Yi Mu

Semi-analytical solutions for a Gray-Scott reaction-diffusion cell with an applied electric field, Aaron Thornton and Timothy R. Marchant

PDF

A provable secure ID-based explicit authenticated key agreement protocol without random oracles, Haibo Tian, Willy Susilo, Yang Ming, and Yumin Wang

PDF

A Biologically Inspired Visual Pedestrian Detection System, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

A brain-inspired visual pattern recognition architecture and its applications, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

PDF

A hierarchical learning network for face detection with in-plane rotation, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

On self-matching within integer part sequences, Keith Tognetti

PDF

The social impact of national security technologies: ePassports, E911 and mobile alerts, Holly Tootell

PDF

On the use of Quasi-orthogonal space-time-frequency codes in MB-OFDM UWB, Le Chung Tran and Alfred Mertins

PDF

Cooperative communication in space-time-frequency coded MB-OFDM UWB, Le Chung Tran, Alfred Mertins, and Tadeusz A. Wysocki

Preliminary validation of MOBMAS (ontology-centric agent oriented methodology): Design of a peer-to-peer information sharing MAS, Numi Tran, Ghassan Beydoun, Graham Low, and Cesar Gonzalez-Perez

PDF

The RFID-enabled dairy farm: towards total farm management, Adam Trevarthen and Katina Michael

PEREA: towards practical TTP-free revocation in anonymous authentication, Patrick Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith

Efficient and short certificateless signature, Raylin Tso, Xun Yi, and Xinyi Huang

PDF

Adaptive subband selection in OFDM-based cognitive radios for better system coexistence, Pingzhou Tu, Xiaojing Huang, and Eryk Dutkiewicz

PDF

On the viability and performance of DNS tunneling, Tom van Leijenhorst, Kwan-Wu Chin, and Darryn Lowe

Localized indoor visual asset or person tracking system using ultrasound and radio frequency signals, John Vial, Peter James Vial, and Montserrat Ros

PDF

Non-optimal receiver for space time spreading across a time hopping over ultra wideband PPM, Peter James Vial, Beata J. Wysocki, and Tadeusz A. Wysocki

PDF

The 2003 Australian Breast Health Survey: survey design and preliminary results, Elmer V. Villanueva, Sandra C. Jones, Caroline Nehill, Simone K. Favelle, David G. Steel, Don Iverson, and Helen Zorbas

Gender and E-commerce Adoption Barriers: A Comparison of Small Businesses in Sweden and Australia, Lejla Vrazalic and Robert C. Macgregor

PDF

Understanding the Impact of Emerging Technologies on Process Optimization: The Case of RFID Technology, S. F. Wamba and Y. Bendavid

PDF

RFID-enabled warehouse optimization: lessons from early adopters in the 3PL industry, S. F. Wamba, T. R. Coltman, and Katina Michael

PDF

From Automatic Identification And Data Capture (Aidc) To “Smart Business Process”: Preparing For A Pilot Integrating Rfid, S. F. Wamba, E. Lefebvre, Y. Bendavid, and L.. A. Lefebvre

PDF

An information system design theory for and RFID university-based laboratory, S. F. Wamba and Katina Michael

On semiparametric regression with O'Sullivan penalized splines, M. Wand and J. T. Ormerod

PDF

Characterising the interactions between unicast and broadcast in IEEE 802.11 ad hoc networks, Jerry Chun-Ping Wang, D. Franklin, Mehran Abolhasan, and Farzad Safaei

Pilot study at Cowra of intra-town dynamics of Queensland Fruit Fly (Bactrocera tryoni (Froggatt)) populations based on trap catch data, Peter Worsley, Bernie Dominiak, Arthur Gilmour, and David James

Certificate-based signatures: new definitions and a generic construction from certificateless signatures, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang

Server-aided verification signatures: definitions and new constructions, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang

Towards QoS-based web services discovery, Jun Yan and Jingtai Piao

PDF

An energy-aware multilevel clustering algorithm for wireless sensor networks, Xinfang Yan, Jiangtao Xi, Joe F. Chicharo, and Yanguang Yu

PDF

Ontology-based knowledge representation for a P2P multi-agent distributed intrusion detection system, Dayong Ye, Quan Bai, and Minjie Zhang

PDF

P2P distributed intrusion detections by using mobile agents, Dayong Ye, Quan Bai, Minjie Zhang, and Zhen Ye

BDI agent-oriented design for distributed intrusion detections, Dayong Ye, Q. Bai, and Minjie Zhang

PDF

Ranking web pages using machine learning approaches, Sweah Liang Yong, Markus Hagenbuchner, and Ah Chung Tsoi

PDF

Mining e-services in P2P-based workflow enactments, Shuai Yuan and Jun Shen

PDF

A practical geographic ontology for spatial web services, Shuai Yuan, Jun Shen, and Jun Yan

Sanitizable Signatures Revisited, Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, and Yi Mu

Caregivers' acceptance of electronic documentation in nursing homes, Ping Yu, David Hailey, and Haocheng Li

PDF

A new approach for measuring the line-width enhancement factor, Yanguang Yu, Jiangtao Xi, Joe F. Chicharo, and Yan Zhao

PDF

Block spread OFDMA system with space-time coded MIMO over frequency selective fading channels, Yiwei Yu, Xiaojing Huang, and Eryk Dutkiewicz

Key issues in e-procurement adoption: toward new public-private partnerships in Malaysia, Suzana Zambri and Akemi Takeoka Chatfield

PDF

Key-frame extraction using dominant-set clustering, Xianglin Zeng, Weiming Hu, Wanqing Li, Xiaoqing Zhang, and Bo Xu

PDF

A real-time facial expression recognition system for online games, Ce Zhan, Wanqing Li, Philip Ogunbona, and Farzad Safaei

PDF

A new and efficient signature on commitment values, Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo

PDF

Robotic Machining: Material Removal Rate Control with a Flexible Manipulator, Hui Zhang and Zengxi Pan

Loss function approaches to predict a spatial quantile and its exceedance region, Jian Zhang, Peter F. Craigmile, and Noel A. Cressie

Partners Selection in Multi-Agent Systems by Using Linear and Non-linear Approaches, Minjie Zhang and Fenghui Ren

Investigation into untripped rollover of light vehicles in the modified fishhook and the sine maneuvers. Part I: Vehicle modelling, roll and yaw instability, Nong Zhang, Guang-Ming Dong, and Haiping Du

PDF

The fourier spectrum analysis of optical feedback self-mixing signal under weak and moderate feedback, Xiaojun Zhang, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo

PDF

A compact CMOS face detection architecture based on shunting inhibitory convolutional neural networks, XiaoXiao Zhang, Amine Bermak, Farid Boussaid, and Abdesselam Bouzerdoum

PDF

Mobile ad-hoc network key management with certificateless cryptography, Zhenfei Zhang, Willy Susilo, and Raad Raad

On the improvement of a numerical method for solving high-order non-linear ordinary differential equations, Song-Ping Zhu and Christian G. Hammel

PDF

Optimisation of distributed generation units and shunt capacitors for economic operation of distribution systems, Kai Zou, Sarath Perera, Kashem Muttaqi, and Ashish P. Agalgaonkar