Papers from 2007
A simple spatial model for self-heating compost piles, Harvinder Sidhu, Mark Nelson, and Xiao Dong Chen
Mathematical modelling of the self-heating process in compost piles, Harvinder Sidhu, Mark Nelson, Thiansiri Luangwilai, and Xiao Dong Chen
Mathematical analysis of the activated aludge process for domestic wastewater treatment, Harvinder S. Sidhu and Mark I. Nelson
Performance improvement and dynamical behaviour analysis of a cascade of two CSTRs, Harvinder S. Sidhu, Simon D. Watt, Mark I. Nelson, and Ajay K. Ray
Quasi-Monte Carlo for Highly Structured Generalised Response Models, I. H. Sloan, F. Y. Kuo, W. T. Dunsmuir, M. Wand, and R. S. Womersley
Varietal selection for perennial crops where data relate to multiple harvests from a series of field trials, A B. Smith, J. K. Stringer, X. Wei, and Brian R. Cullis
Comparative analysis of resource reservation cost for different rsvp extension schemes in mobile environments, Yilin Song, Yi Sun, Min Liu, and E. Dutkiewicz
Implementing Trusted Terminals with a TPM and SITDRM, S. Stamm, N. P. Sheppard, and R. Safavi-Naini
Person-level and household-level regression estimation in household surveys, David G. Steel and Robert Graham Clark
Fast RSVP: a cross layer resource reservation scheme for mobile IPv6 networks, Yi Sun, Bin Feng, Yucheng Zhang, Gengfa Fang, Jinglin Shi, and E. Dutkiewicz
Research on bandwidth reservation in IEEE 802.16 (WiMAX) networks, Yi Sun, Yilin Song, Jinglin Shi, and Eryk Dutkiewicz
Location-based DRM using WiFi Access Points, Martin Jan Surminen, Nicholas Paul Sheppard, and Reihaneh Safavi-Naini
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner, Willy Susilo and Hiroaki Kikuchi
Securing personal health information access in mobile healthcare environment through short signature schemes, Willy Susilo and Khin Than Win
Security and Access of Health Research Data, Willy Susilo and Khin Than Win
The development of Taiwanese electronic medical record systems evaluation instrument, Yung-Yu Su, Khin Than Win, and Herng-Chia Chiu
Flicker Propagation in Interconnected Power Systems, S. Tennakoon, S. Perera, and Danny Sutanto
Intelligent Multimedia Delivery? It’s a question of semantics, Joseph Thomas-Kerr, I. Burnett, and C. Ritz
Is That a Fish in Your Ear? A Universal Metalanguage for Multimedia, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz, S. Devillers, D. de Schrijever, and R. Van de Walle
Reconfigurable Media Coding: self-describing multimedia bitstreams, Joseph Thomas-Kerr, J. Janneck, M. Mattavelli, I. Burnett, and C. Ritz
How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis, Pairat Thorncharoensri, Tianbing Xia, and Yi Mu
Energy efficient integrated scheduling of unicast and multicast traffic in 802.16e WMANs, Lin Tian, Yubo Yang, Jinglin Shi, E. Dutkiewicz, and Gengfa Fang
A communications policy perspective on CTC sustainability in regional Australia: commercial viability and social good, William Tibben
Re-conceptualizing the digital divide: a knowledge-based approach, William Tibben
Innovation strategy for the Pacific islands in the new millennium: mixing science with tradition, William Tibben and Apelu Tielu
Citation Analysis using Formal Concept Analysis: A case study in Software Engineering, T. Tilley and P Eklund
A Nonlinear Feature Extractor for Texture Segmentation, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Force Application During Cochlear Implant Insertion: An Analysis for Improvement of Surgeon Technique, C. Todd, F. Naghdy, and M. J. Svehla
A comparison of media response to recent national security events, Holly Tootell
Auto-ID and location-based services in national security: Social implications, Holly Tootell
Design of a P2P information sharing MAS using MOBMAS, Numi Tran, Ghassan Beydoun, and Graham C. Low
Beyond Mere Compliance of RFID Regulations by the Farming Community: A Case Study of the Cochrane Dairy Farm, A. Trevarthen and Katina Michael
Blacklistable anonymous credentials: blocking misbehaving users without ttps, Patrick P. Tsang, Man Ho Allen Au, Apu Kapadia, and Sean W. Smith
Diversity Performance of Interleaved Spread Spectrum OFDM Signals over Frequency Selective Multipath Fading Channels, P. Tu, Xiaojing Huang, and E. Dutkiewicz
Peak-to-Average Power Ratio Performance of Interleaved Spread Spectrum OFDM Signals, P. Tu, Xiaojing Huang, and E. Dutkiewicz
The analysis of QTL by simultaneous use of the full linkage map, A. P. Verbyla, Brian R. Cullis, and R Thompson
Design and simulation of a DS-TH-UWB system using Simulink/MATLAB for first arriving rays in a non line of sight wireless scenario, Peter James Vial
Soccer robot toy within an educational environment, Peter James Vial, G. Serafini, and I. Raad
Optimal receiver for Space Time Spreading across a Time Hopping PPM over Ultra Wideband Saleh-Valenzuela MIMO Channel, Peter James Vial, Beata J. Wysocki, and Tadeusz A. Wysocki
On the generic and efficient constructions of secure designated confirmer signatures, Guilin Wang, Joonsang Baek, Duncan Wong, and Feng bao
On Separating Route Control and Data Flows in Multi-radio Multi-hop Ad Hoc Network, Jerry Chun-Ping Wang, Mehran Abolhasan, D. Franklin, Farzad Safaei, and Justin Lipman
A Survey on Control Separation Techniques in Multi-Radio Multi-channel MAC Protocols, Jerry Chun-Ping Wang, Mehran Abolhasan, Farzad Safaei, and D. Franklin
Improving ethanol production through continuous fermentation, Simon D. Watt, Harvinder S. Sidhu, Mark I. Nelson, and Ajay K. Ray
Analysis of a model for ethanol production through continuous fermentation, Simon Watt, Harvinder Sidhu, Mark Nelson, and Ajay Ray
An example of a hierarchical system model using SEAM and its formalization in Alloy, Alain Wegmann, Lam-Son Le, Jose Diego de la Cruz, Irina Rychkova, and Gil Regev
Enterprise modeling using the foundation concepts of the RM-ODP ISO/ITU standard, Alain Wegmann, Lam-Son Le, Gil Regev, and Bryan Wood
Business and IT alignment with SEAM for enterprise architecture, Alain Wegmann, Gil Regev, Irina Rychkova, Lam-Son Le, Jose Diego de la Cruz, and Philippe Julia
Pre-Processing of Signals Observed from Laser Diode Self-mixing Intereferometries using Neural Networks, L. Wei, Joe F. Chicharo, Yanguang Yu, and Jiangtao Xi
Displacement Estimation Based on Model Calibration in Weak Feedback Optical Self-Mixing System, L. Wei, Jiangtao Xi, and J. Chicharo
Transition Analysis for Moderate Feedback Self-Mixing Interferometry, L. Wei, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo
A comparison of mixed model splines for curve fitting, S J. Welham, Brian R. Cullis, M G. Kenward, and R Thompson
Achieving mobility and anonymity in IP-based networks, Rungrat Wiangsripanawan, Willy Susilo, and Reihaneh Safavi-Naini
Design principles for low latency anonymous network systems secure against timing attacks, Rungrat Wiangsripanawan, Willy Susilo, and Reihaneh Safavi-Naini
Consent mechanisms for electronic medical record system: simple yet unresolved issue, Khin Than Win and John Fulcher
Consent Mechanisms for Electronic Health Record Systems: A Simple Yet Unresolved Issue, Khin Than Win and John A. Fulcher
Temporal Authorizations Scheme for XML Documents, Jing Wu, Jennifer Seberry, and Y. Mu
Cryptanalysis of BGW broadcast encryption schemes for DVD content protection, Qianhong Wu, Willy Susilo, Yi Mu, and Bo Qin
Convertible undeniable proxy signatures: security models and efficient construction, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang
Provably secure identity-based undeniable signatures with selective and universal convertibility, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang
Identity-based proxy signature from pairings, Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, and Xinyi Huang
A finite element method for granular flow through a frictional boundary, Yong-Hong Wu, James M. Hill, and Aibing Yu
A simple orthogonal space-time-polarization block code, Beata J. Wysocki, Tadeusz A. Wysocki, Jennifer R. Seberry, Sarah S. Adams, and Hamid Sharif
Dynamic Zone Topology Routing Protocol for Mobile Ad Hoc Networks, Tadeusz A. Wysocki and Mehran Abolhasan
Space-Time-Polarization Block Codes from Quaternionic Orthogonal Designs, Tadeusz A. Wysocki, Beata J. Wysocki, and Jennifer Seberry
Some new results of regular Hadamard matrices and SBIBD II, Tianbing Xia, Mingyuan Xia, and Jennifer Seberry
Efficient Authentication Schemes for AODV and DSR, Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen, and Fangguo Zhang
Dynamic Service Composition Contracting based on Agent Coalition, Jun Yan
Autonomous service level agreement negotiation for service composition provisions, Jun Yan, Ryszard Kowalczyk, Jian Lin, Mohan Chhetri, Suk Goh, and Jianying Zhang
An agent-based decentralised process management framework for web service composition, Jun Yan, Phillip Pidgeon, A. Krishna, and Jianming Yong
A mobile Agent Based Peer-to-Peer framework for Distributed Intributed Detections, Dayong Ye, Q. Bai, and Minjie Zhang
QoS-Aware Service Selection in P2P-Based Business Process Frameworks, S. Yuan and J. Shen
(Convertible) undeniable signatures without random oracles, Tsz Hon Yuen, Man Ho Allen Au, Joseph K. Liu, and Willy Susilo
The acceptance of a clinical IT innovation by the care givers in residential aged care 11-weeks after the software implementation in Australia, Ping Yu, Hui Yu, and Yi Mu
Improving the Performance in an Optical feedback Self-mixing Interferometry System using Digital Signal Pre-processing, Yanguang Yu, Jiangtao Xi, and Joe F. Chicharo
Toward automatic measurement of the linewidth-enhancement factor using optical feedback self-mixing interferometry with weak optical feedback, Yanguang Yu, Jiangtao Xi, Joe F. Chicharo, and Thierry Bosch
Efficient identity-based signcryption scheme for multiple receivers, Yong Yu, Bo Yang, Xinyi Huang, and Mingwu Zhang
Real-time facial feature point extraction, Ce Zhan, Wanqing Li, Philip Ogunbona, and Farzad Safaei
Emotional states control for on-line game avatars, Ce Zhan, Wanqing Li, Farzad Safaei, and Philip Ogunbona
Face to face communications in multiplayer online games: a real-time system, Ce Zhan, Wanqing Li, Farzad Safaei, and Philip Ogunbona
Anser: Adaptive neuron Artificial Neural Network System for Estimating Rainfall, Ming Zhang, Shuxiang Xu, and John Fulcher
Expert Discovery and Knowledge Mining in Complex Multi-agent Systems, Minjie Zhang, Xijin Tang, Jifa Gu, and Quan Bai
An Extended Dual Concern Model for Partner Selection in Multi-Agent Systems, Minjie Zhang, Jun Yan, and Fenghui Ren
The quality indicators of delivering e-learning for dementia care to nurses, Zhengyu Zhang and Ping Yu
Dynamic Bandwidth MCIDS - A Cognitive Solution for MCIDS based UWB Communications, J. Zhao, Xiaojing Huang, and E. Dutkiewicz
Human motion simulation and action corpus, Gang Zheng, Wanqing Li, Philip Ogunbona, Liju Dong, and Igor Kharitonenko
First price sealed bid auction without auctioneers, Shuo Zheng, Luke McAven, and Yi Mu
Perceived similarity and visual descriptions in content-based image retrieval, Yuan Zhong, Lei Ye, Wanqing Li, and Philip Ogunbona
Optimizing initial ranging region allocation in IEEE 802.16 OFDMA systems, Jihua Zhou, E. Dutkiewicz, Di Pang, Jinlong Hu, and Jinglin Shi
New construction of group secret handshakes based on pairings, Lan Zhou, Willy Susilo, and Yi Mu
On Favourable Conditions for Adaptive Random Testing, Zhiquan Zhou, Fei-Ching Kuo, and T.Y Chen
Automated Software Testing and Analysis: Techniques, Practices and Tools, Z. Q. Zhou, B. Scholz, and G. Denaro
Multi-party stand-alone and setup-free verifiably committed signatures, Huafei Zhu, Willy Susilo, and Yi Mu
A Numerical Model for Multiphase Flow Based on the GMPPS formulation, Part I Kinematics, Song-Ping Zhu and Frank Bierbrauer
Calculating The Early Exercise Boundary of American Put Options with an Approximation Formula, Song-Ping Zhu and ZhiWei He
A comparative study of the direct boundary element method and the dual reciprocity boundary element method in solving the Helmholtz equation, Song-Ping Zhu and Yinglong Zhang
Saidi minimization of a remote distribution feeder, Kai Zou, Wickramaarachchi W. Keerthipala, and Sarath Perera
Papers from 2006
The risk of public data availability on critical infrastructure protection, Roba Abbas
Simulation of HTS saturable core-type FCLs for MV distribution systems, S B. Abbott, Duane Robinson, S Perera, F A. Darmann, C J. Hawley, and T P. Beales
Self-selecting route discovery strategies for reactive routing in ad hoc networks, Mehran Abolhasan and Justin Lipman