The University of Wollongong Faculty of Engineering and Information Sciences was formed in 2013 following an organisational restructure. It comprised an amalgamation of the former Faculty of Engineering and Faculty of Informatics. Related series: Faculty of Engineering and Information Sciences - Papers.

Follow

Papers from 2007

PDF

A discussion about the importance of laws and policies for data sharing for public health in the People's Republic of China, Xiue Fan and Ping Yu

PDF

Empirical modelling of human gaits for bipedal robots, Matthew Field, David A. Stirling, Fazel Naghdy, and Zengxi Pan

PDF

The power and influence in some Youden squares and secret sharing, Lakoa Fitina, Kenneth G. Russell, and Jennifer Seberry

PDF

Analyzing the key variables in the adoption process of HL7, Alejandro E. Flores Zuniga and Khin Than Win

Genetic evaluation of crossbred lamb production. 5. Age of puberty and lambing performance of yearling crossbred ewes, N. M. Fogarty, V. M. Ingham, Arthur R. Gilmour, R. A. Afolayan, L. J. Cummins, J. E. Hocking Edwards, and G. M. Gaunt

PDF

Online versus traditional grocery shopping stressors, Mark B. Freeman

PDF

Viability of Concurrent Transmission and Reception for UWB Radios over Multipath Channels, Ricardo Gandia Sanchez, Xiaojing Huang, and K. Chin

PDF

Generalized Bhaskar Rao Designs with Block Size 3 over Finite Abelian Groups, G. Ge, M. Grieg, Jennifer Seberry, and R. Seberry

PDF

Actor eco-systems: from high-level agent models to executable processes via semantic annotations, Aditya K. Ghose and George Koliadis

PDF

Auditing business process compliance, Aditya K. Ghose and George Koliadis

PDF

Process discovery from model and text artefacts, Aditya K. Ghose, George Koliadis, and Arthur Cheung

Rapid business process discovery (R-BPD), Aditya K. Ghose, George Koliadis, and Arthur Chueng

Mixed model regression mapping for QTL detection in experimental crosses, Arthur Gilmour

PDF

Subquadratic binary field multiplier in double polynomial system, Pascal Giorgi, Christophe Negre, and Thomas Plantard

Draw-Talk-Write: experiences and learning with Indigenous Australians that are driving the evolution of word recognition technology, Russell Gluck and John Fulcher

Compatibility and generalised conditional symmetries, Joanna M. Goard

Using utility functions to model risky bonds, Joanna M. Goard

Secure and efficient trust negotiation, Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, and Shengyuan Zhang

Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key, Fuchun Guo, Yi Mu, and Zhide Chen

Mutative identity-based signatures or dynamic credentials without random oracles, Fuchun Guo, Yi Mu, and Zhide Chen

Multi-identity single-key decryption without random oracles, Fuchun Guo, Yi Mu, Zhide Chen, and Li Xu

Insider attacks on multi-proxy multi-signature schemes, Lifeng Guo and Guilin Wang

PDF

New method vulnerability assessment of power system, Ahmed M. Haidar, Azah Mohamed, and Aini Hussain

PDF

Vulnerability assessment of a large sized power system considering a new index based on power system loss, Ahmed M. Haidar, Azah Mohamed, and Aini Hussain

PDF

Improving Inventory Control in a Small-to-Medium Retailer Using RFID., D. Hamilton

Support-Based Distributed Search: A New Approach for Multiagent Constraint Processing, Peter Harvey, Chee Fon Chang, and Aditya K. Ghose

The perception of barriers to e-commerce in Australian SMEs: relationships to small business cluster membership, Charles Harvie, Lejla Vrazalic, and Robert Macgregor

PDF

Anisotropic matern correlation and spatial prediction using REML, K A. Haskard, Brian R. Cullis, and A P. Verbyla

Identifying mutual information transfer in the brain with differential-algebraic modeling: Evidence for fast oscillatory coupling between cortical somatosensory areas 3b and 1, Jens Haueisen, Lutz Leistritz, Thomas F. Suesse, Gabriel Curio, and Herbert Witte

PDF

An agent-based framework for service level agreement management, Qiang He, Jun Yan, Ryszard Kowalczyk, Hai Jin, and Yun Yang

PDF

Towards collaborative service level agreement negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, and Hai Jin

PDF

Oscillating carbon nanotori along carbon nanotubes, Tamsyn A. Hilder and James M. Hill

Continuous versus discrete for interacting carbon nanostructures, Tamsyn Hilder and James M. Hill

Orbiting nanosectors inside carbon nanotori, Tamsyn Hilder and James M. Hill

Solving Ramanujan's differential equations for Eisenstein series via a first order Riccati equation, James Hill, Bruce Berndt, and Tim Huber

Laplace transforms and the Riemann zeta function, James M. Hill

Force distribution for double-walled carbon nanotubes and gigahertz oscillators, James M. Hill and Duangkamon Baowan

Modelling the encapsulation of the anticancer drug cisplatin into carbon nanotubes, James M. Hill and Tamsyn A. Hilder

PDF

Newtonian flow with nonlinear Navier boundary condition, James M. Hill and Miccal T. Matthews

Asymptotic axially symmetric deformations for perfectly elastic Neo-Hookean and Mooney materials, James M. Hill, Himanshuki Padukka, and Hui-Hui Dai

PDF

Continuum modelling for carbon and boron nitride nanostructures, James M. Hill and Ngamta Thamwattana

Genotype and age effects on sheep meat production. 3. Meat quality, D. L. Hopkins, D. F. Stanley, L. C. Martin, E. S. Toohey, and Arthur R. Gilmour

Genotype and age effects on sheep meat production. 1. Production and growth, D. Hopkins, D. Stanley, L. Martin, and Arthur R. Gilmour

Variance components due to direct genetic, maternal genetic and permanent environmental effect for growth and feed-efficiency traits in young male Japanese Black cattle, M. A. Hoque, P. F. Arthur, K. Hiramoto, Arthur R. Gilmour, and T. Oikawa

Solitary wave interaction for a higher-order nonlinear Schrodinger equation, Sayed Hoseini and Timothy R. Marchant

PDF

Diversity Performance of Precoded OFDM with MMSE Equalization, Xiaojing Huang

Certificateless signature revisited, Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, and Wei Wu

A generic construction for universally-convertible undeniable signatures, Xinyi Huang, Yi Mu, Willy Susilo, and Wei Wu

Provably secure pairing-based convertible undeniable signature with short signature length, Xinyi Huang, Yi Mu, Willy Susilo, and Wei Wu

Breaking and Repairing Trapdoor-free Group Signature, Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang

PDF

Barriers to RFID Adoption in the Supply Chain, Nick Huber, Katina Michael, and Luke McCathie

PDF

Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer, N. Huber and Katina Michael

PDF

Vendor Perceptions of How RFID can Minimize Product Shrinkage in the Retail Supply Chain, N. Huber and Katina Michael

PDF

Blind colour isolation for colour-channel-based fringe pattern profilometry using digital projection, Y. Hu, Jiangtao Xi, Joe F. Chicharo, and Zongkai Yang

Genetic evaluation of crossbred lamb production. 4. Genetic parameters for first-cross animal performance, V. M. Ingham, N. M. Fogarty, Arthur R. Gilmour, R. A. Afolayan, L. J. Cummins, G. M. Gaunt, J. Stafford, and J. E. Hocking Edwards

PDF

RFID-based anti-theft auto security system with an immobilizer, Geeth Jayendra, Sisil kumarawadu, and Lasantha Meegahapola

An approach to achieve scalability through a structured peer-to-peer network for massively multiplayer online role playing games, Xinbo Jiang, Farzad Safaei, and P. Boustead

PDF

Enhancing the multicast performance of structured P2P overlay in supporting Massively Multiplayer Online Games, Xinbo Jiang, Farzad Safaei, and P. Boustead

Dynamic multi-resolution spatial models, Gardar Johannesson, Noel A. Cressie, and Hsin-Cheng Huang

Ontology Revision, Seung Hwan Kang and Sim Kim Lau

Direct-contact heat transfer coefficient for condensing vapour bubble in stagnant liquid pool, Saptarshi Kar, Xiao Dong Chen, and Mark Nelson

Electronic Commerce Adoption Barriers in Small to Medium-Sized Enterprises (SMEs) in Developed and Developing Countries: A Cross-Country Comparison, Mira Kartiwi and Robert Macgregor

Energy Requirement for Distributed Energy Resources with Battery Energy Storage for Voltage Support in Three-Phase Distribution lines, M A. Kashem and Gerard Ledwich

PDF

Parsimonious classification via generalised linear mixed models, G Kauermann, J. T. Ormerod, and M P. Wand

The accuracy of varietal selection using factor analytic models for multi-environment plant breeding trials, Alison M. Kelly, A. B. Smith, J. A. Eccleston, and Brian R. Cullis

A Prototype of Intelligent Video Surveillance Cameras, Igor Kharitonenko, Wanqing Li, Chaminda Weerasinghe, and Xing Zhang

PDF

On the Accuracy of RFID Tag Estimation Functions, Dheeraj Klair, K. Chin, and R. Raad

PDF

On the Suitability of Framed Slotted Aloha based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs, Dheeraj Klair, K. Chin, and R. Raad

PDF

An Investigation into the Energy Efficiency of Pure and Slotted Aloha Based REID Anti-Collision Protocols, Dheeraj Klair, K. W. Chin, and R. Raad

Weakly mixing transformations and the Caratheodory definition of measurable sets, Amos Koeller, Rodney Nillsen, and Graham Williams

PDF

Verifying semantic business process models in inter-operation, George Koliadis and Aditya Ghose

PDF

Relating business process models to goal-oriented requirements models in KAOS, George Koliadis and Aditya K. Ghose

PDF

Verifying semantic business process models in inter-operation, George Koliadis and Aditya K. Ghose

PDF

Combining i* and BPMN for business process model lifecycle management, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, and Aditya K. Ghose

PDF

On the pivot structure for the weighing matrix W(12,11), C. Kravvaritis, M. Mitrouli, and Jennifer Seberry

PDF

Enhanced random testing for programs with high dimensional input domains, Fei-Ching Kuo, K. Y. Sim, Chang-ai Sun, S.-F. Tang, and Zhiquan Zhou

PDF

Sydney - Brisbane Land Transport, Philip G. Laird

PDF

Is RFID Safe and Secure?, E. Latham and K. Michael

PDF

Modeling and solving Semiring Constraint Satisfaction Problems by transformation to Weighted Semiring Max-SAT, Louise Leenen, Anbulagan Anbulagan, Thomas Meyer, and Aditya K. Ghose

Relaxations of semiring constraint satisfaction problems, Louise Leenen, Thomas Meyer, and Aditya K. Ghose

Coupled oscillators for modeling and analysis of EEG/MEG oscillations, Lutz Leistritz, Peter Putsche, Karin Schwab, Wolfram Hesse, Thomas Sube, Jens Haueisen, and Herbert Witte

Easing the Overloaded Help Desk: The Development of an User Self-help Knowledge Management System, Nelson K. Y. Leung

Information technology help desk survey: to identify the classification of simple and routine enquiries, Nelson K. Y. Leung and Sim Kim Lau

To ease the dilemma of help desk: the application of knowledge management techniques in manipulating help desk knowledge, Nelson K. Y. Leung and Sim Kim Lau

PDF

An ontology-based knowledge network to reuse inter-organizational knowledge, Nelson K. Y. Leung, Sim Kim Lau, and Joshua P. Fan

PDF

Towards More Flexible Internal Workflow Change: Weakly Equivalence Concept for Inter-organizational Workflow Design, G. Liang and Sim Kim Lau

Beyond Moran's I: Testing for spatial dependence based on the spatial autoregressive model, Hongfei Li, Catherine Calder, and Noel A. Cressie

Certificate-based signature: security model and efficient construction, Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu

Practical threshold signatures without random oracles, Jin Li, Tsz Hon Yuen, and Kwangjo Kim

An Alternative Derivation of the Kalman Filter Using the Quasi-likelihood Method, Yan-Xia Lin

Undeniable mobile billing schemes, Shiqun Li, Guilin Wang, Jianying Zhou, and Kefei Chen

Nominative signature from ring signature, Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, and Yi Mu

Revocable ring signature, Dennis Y.W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, and Duncan S. Wong

Formal definition and construction of nominative signature, Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, and Willy Susilo

Self-generated-certificate public key cryptography and certificateless signature / encryption scheme in the standard model, Joseph K. Liu, Man Ho Allen Au, and Willy Susilo

Designated verifier signature: definition, framework and new constructions, Yongqing Li, Willy Susilo, Yi Mu, and Dingyi Pei

PDF

Becoming multiliterate: Digital video news construction within a technology-supported learning environment, Lori Lockyer, Ian M. Brown, David Blackall, Barry M. Harper, and Phillip J. McKerrow

PDF

Adaptive Time-Frequency Codes for Ultra-Wideband, Darryn Lowe and Xiaojing Huang

PDF

Complementary Channel Estimation and Synchronization for OFDM, Darryn Lowe and Xiaojing Huang

PDF

Hybrid Automatic Repeat Requests for MB-OFDM Ultra-Wideband, Darryn Lowe and Xiaojing Huang