Papers from 2007
A discussion about the importance of laws and policies for data sharing for public health in the People's Republic of China, Xiue Fan and Ping Yu
Empirical modelling of human gaits for bipedal robots, Matthew Field, David A. Stirling, Fazel Naghdy, and Zengxi Pan
The power and influence in some Youden squares and secret sharing, Lakoa Fitina, Kenneth G. Russell, and Jennifer Seberry
Analyzing the key variables in the adoption process of HL7, Alejandro E. Flores Zuniga and Khin Than Win
Genetic evaluation of crossbred lamb production. 5. Age of puberty and lambing performance of yearling crossbred ewes, N. M. Fogarty, V. M. Ingham, Arthur R. Gilmour, R. A. Afolayan, L. J. Cummins, J. E. Hocking Edwards, and G. M. Gaunt
Online versus traditional grocery shopping stressors, Mark B. Freeman
Viability of Concurrent Transmission and Reception for UWB Radios over Multipath Channels, Ricardo Gandia Sanchez, Xiaojing Huang, and K. Chin
Generalized Bhaskar Rao Designs with Block Size 3 over Finite Abelian Groups, G. Ge, M. Grieg, Jennifer Seberry, and R. Seberry
Actor eco-systems: from high-level agent models to executable processes via semantic annotations, Aditya K. Ghose and George Koliadis
Auditing business process compliance, Aditya K. Ghose and George Koliadis
Process discovery from model and text artefacts, Aditya K. Ghose, George Koliadis, and Arthur Cheung
Rapid business process discovery (R-BPD), Aditya K. Ghose, George Koliadis, and Arthur Chueng
Mixed model regression mapping for QTL detection in experimental crosses, Arthur Gilmour
Subquadratic binary field multiplier in double polynomial system, Pascal Giorgi, Christophe Negre, and Thomas Plantard
Draw-Talk-Write: experiences and learning with Indigenous Australians that are driving the evolution of word recognition technology, Russell Gluck and John Fulcher
Compatibility and generalised conditional symmetries, Joanna M. Goard
Using utility functions to model risky bonds, Joanna M. Goard
Secure and efficient trust negotiation, Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, and Shengyuan Zhang
Identity-based encryption: how to decrypt multiple ciphertexts using a single decryption key, Fuchun Guo, Yi Mu, and Zhide Chen
Mutative identity-based signatures or dynamic credentials without random oracles, Fuchun Guo, Yi Mu, and Zhide Chen
Multi-identity single-key decryption without random oracles, Fuchun Guo, Yi Mu, Zhide Chen, and Li Xu
Insider attacks on multi-proxy multi-signature schemes, Lifeng Guo and Guilin Wang
New method vulnerability assessment of power system, Ahmed M. Haidar, Azah Mohamed, and Aini Hussain
Vulnerability assessment of a large sized power system considering a new index based on power system loss, Ahmed M. Haidar, Azah Mohamed, and Aini Hussain
Improving Inventory Control in a Small-to-Medium Retailer Using RFID., D. Hamilton
Support-Based Distributed Search: A New Approach for Multiagent Constraint Processing, Peter Harvey, Chee Fon Chang, and Aditya K. Ghose
The perception of barriers to e-commerce in Australian SMEs: relationships to small business cluster membership, Charles Harvie, Lejla Vrazalic, and Robert Macgregor
Anisotropic matern correlation and spatial prediction using REML, K A. Haskard, Brian R. Cullis, and A P. Verbyla
Identifying mutual information transfer in the brain with differential-algebraic modeling: Evidence for fast oscillatory coupling between cortical somatosensory areas 3b and 1, Jens Haueisen, Lutz Leistritz, Thomas F. Suesse, Gabriel Curio, and Herbert Witte
An agent-based framework for service level agreement management, Qiang He, Jun Yan, Ryszard Kowalczyk, Hai Jin, and Yun Yang
Towards collaborative service level agreement negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, and Hai Jin
Oscillating carbon nanotori along carbon nanotubes, Tamsyn A. Hilder and James M. Hill
Continuous versus discrete for interacting carbon nanostructures, Tamsyn Hilder and James M. Hill
Orbiting nanosectors inside carbon nanotori, Tamsyn Hilder and James M. Hill
Solving Ramanujan's differential equations for Eisenstein series via a first order Riccati equation, James Hill, Bruce Berndt, and Tim Huber
Laplace transforms and the Riemann zeta function, James M. Hill
Force distribution for double-walled carbon nanotubes and gigahertz oscillators, James M. Hill and Duangkamon Baowan
Modelling the encapsulation of the anticancer drug cisplatin into carbon nanotubes, James M. Hill and Tamsyn A. Hilder
Newtonian flow with nonlinear Navier boundary condition, James M. Hill and Miccal T. Matthews
Asymptotic axially symmetric deformations for perfectly elastic Neo-Hookean and Mooney materials, James M. Hill, Himanshuki Padukka, and Hui-Hui Dai
Continuum modelling for carbon and boron nitride nanostructures, James M. Hill and Ngamta Thamwattana
Genotype and age effects on sheep meat production. 3. Meat quality, D. L. Hopkins, D. F. Stanley, L. C. Martin, E. S. Toohey, and Arthur R. Gilmour
Genotype and age effects on sheep meat production. 1. Production and growth, D. Hopkins, D. Stanley, L. Martin, and Arthur R. Gilmour
Variance components due to direct genetic, maternal genetic and permanent environmental effect for growth and feed-efficiency traits in young male Japanese Black cattle, M. A. Hoque, P. F. Arthur, K. Hiramoto, Arthur R. Gilmour, and T. Oikawa
Solitary wave interaction for a higher-order nonlinear Schrodinger equation, Sayed Hoseini and Timothy R. Marchant
Diversity Performance of Precoded OFDM with MMSE Equalization, Xiaojing Huang
Certificateless signature revisited, Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, and Wei Wu
A generic construction for universally-convertible undeniable signatures, Xinyi Huang, Yi Mu, Willy Susilo, and Wei Wu
Provably secure pairing-based convertible undeniable signature with short signature length, Xinyi Huang, Yi Mu, Willy Susilo, and Wei Wu
Breaking and Repairing Trapdoor-free Group Signature, Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang
Barriers to RFID Adoption in the Supply Chain, Nick Huber, Katina Michael, and Luke McCathie
Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer, N. Huber and Katina Michael
Vendor Perceptions of How RFID can Minimize Product Shrinkage in the Retail Supply Chain, N. Huber and Katina Michael
Blind colour isolation for colour-channel-based fringe pattern profilometry using digital projection, Y. Hu, Jiangtao Xi, Joe F. Chicharo, and Zongkai Yang
Genetic evaluation of crossbred lamb production. 4. Genetic parameters for first-cross animal performance, V. M. Ingham, N. M. Fogarty, Arthur R. Gilmour, R. A. Afolayan, L. J. Cummins, G. M. Gaunt, J. Stafford, and J. E. Hocking Edwards
RFID-based anti-theft auto security system with an immobilizer, Geeth Jayendra, Sisil kumarawadu, and Lasantha Meegahapola
An approach to achieve scalability through a structured peer-to-peer network for massively multiplayer online role playing games, Xinbo Jiang, Farzad Safaei, and P. Boustead
Enhancing the multicast performance of structured P2P overlay in supporting Massively Multiplayer Online Games, Xinbo Jiang, Farzad Safaei, and P. Boustead
Dynamic multi-resolution spatial models, Gardar Johannesson, Noel A. Cressie, and Hsin-Cheng Huang
Ontology Revision, Seung Hwan Kang and Sim Kim Lau
Direct-contact heat transfer coefficient for condensing vapour bubble in stagnant liquid pool, Saptarshi Kar, Xiao Dong Chen, and Mark Nelson
Electronic Commerce Adoption Barriers in Small to Medium-Sized Enterprises (SMEs) in Developed and Developing Countries: A Cross-Country Comparison, Mira Kartiwi and Robert Macgregor
Energy Requirement for Distributed Energy Resources with Battery Energy Storage for Voltage Support in Three-Phase Distribution lines, M A. Kashem and Gerard Ledwich
Parsimonious classification via generalised linear mixed models, G Kauermann, J. T. Ormerod, and M P. Wand
The accuracy of varietal selection using factor analytic models for multi-environment plant breeding trials, Alison M. Kelly, A. B. Smith, J. A. Eccleston, and Brian R. Cullis
A Prototype of Intelligent Video Surveillance Cameras, Igor Kharitonenko, Wanqing Li, Chaminda Weerasinghe, and Xing Zhang
On the Accuracy of RFID Tag Estimation Functions, Dheeraj Klair, K. Chin, and R. Raad
On the Suitability of Framed Slotted Aloha based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs, Dheeraj Klair, K. Chin, and R. Raad
An Investigation into the Energy Efficiency of Pure and Slotted Aloha Based REID Anti-Collision Protocols, Dheeraj Klair, K. W. Chin, and R. Raad
Weakly mixing transformations and the Caratheodory definition of measurable sets, Amos Koeller, Rodney Nillsen, and Graham Williams
Verifying semantic business process models in inter-operation, George Koliadis and Aditya Ghose
Relating business process models to goal-oriented requirements models in KAOS, George Koliadis and Aditya K. Ghose
Verifying semantic business process models in inter-operation, George Koliadis and Aditya K. Ghose
Combining i* and BPMN for business process model lifecycle management, George Koliadis, Aleksander Vranesevic, Moshiur Bhuiyan, Aneesh Krishna, and Aditya K. Ghose
On the pivot structure for the weighing matrix W(12,11), C. Kravvaritis, M. Mitrouli, and Jennifer Seberry
Enhanced random testing for programs with high dimensional input domains, Fei-Ching Kuo, K. Y. Sim, Chang-ai Sun, S.-F. Tang, and Zhiquan Zhou
Sydney - Brisbane Land Transport, Philip G. Laird
Is RFID Safe and Secure?, E. Latham and K. Michael
Modeling and solving Semiring Constraint Satisfaction Problems by transformation to Weighted Semiring Max-SAT, Louise Leenen, Anbulagan Anbulagan, Thomas Meyer, and Aditya K. Ghose
Relaxations of semiring constraint satisfaction problems, Louise Leenen, Thomas Meyer, and Aditya K. Ghose
Coupled oscillators for modeling and analysis of EEG/MEG oscillations, Lutz Leistritz, Peter Putsche, Karin Schwab, Wolfram Hesse, Thomas Sube, Jens Haueisen, and Herbert Witte
Easing the Overloaded Help Desk: The Development of an User Self-help Knowledge Management System, Nelson K. Y. Leung
Information technology help desk survey: to identify the classification of simple and routine enquiries, Nelson K. Y. Leung and Sim Kim Lau
To ease the dilemma of help desk: the application of knowledge management techniques in manipulating help desk knowledge, Nelson K. Y. Leung and Sim Kim Lau
An ontology-based knowledge network to reuse inter-organizational knowledge, Nelson K. Y. Leung, Sim Kim Lau, and Joshua P. Fan
Towards More Flexible Internal Workflow Change: Weakly Equivalence Concept for Inter-organizational Workflow Design, G. Liang and Sim Kim Lau
Beyond Moran's I: Testing for spatial dependence based on the spatial autoregressive model, Hongfei Li, Catherine Calder, and Noel A. Cressie
Certificate-based signature: security model and efficient construction, Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu
Practical threshold signatures without random oracles, Jin Li, Tsz Hon Yuen, and Kwangjo Kim
An Alternative Derivation of the Kalman Filter Using the Quasi-likelihood Method, Yan-Xia Lin
Undeniable mobile billing schemes, Shiqun Li, Guilin Wang, Jianying Zhou, and Kefei Chen
Nominative signature from ring signature, Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, and Yi Mu
Revocable ring signature, Dennis Y.W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, and Duncan S. Wong
Formal definition and construction of nominative signature, Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, and Willy Susilo
Self-generated-certificate public key cryptography and certificateless signature / encryption scheme in the standard model, Joseph K. Liu, Man Ho Allen Au, and Willy Susilo
Designated verifier signature: definition, framework and new constructions, Yongqing Li, Willy Susilo, Yi Mu, and Dingyi Pei
Becoming multiliterate: Digital video news construction within a technology-supported learning environment, Lori Lockyer, Ian M. Brown, David Blackall, Barry M. Harper, and Phillip J. McKerrow
Adaptive Time-Frequency Codes for Ultra-Wideband, Darryn Lowe and Xiaojing Huang
Complementary Channel Estimation and Synchronization for OFDM, Darryn Lowe and Xiaojing Huang
Hybrid Automatic Repeat Requests for MB-OFDM Ultra-Wideband, Darryn Lowe and Xiaojing Huang