Papers from 2006
Load-balanced route discovery strategy for mobile ad hoc networks, Mehran Abolhasan, Tadeusz A. Wysocki, and Justin Lipman
InPCM: a network caching technique for improving the performance of TCP in wireless ad-hoc networks, Andrew Adinegara, W. H. O. Lau, and Kwan-Wu Chin
A new exploratory neural network training method, Shamsuddin Admed, Jim Cross, and Abdesselam Bouzerdoum
Optimal sizing of distributed generators in MicroGrid, Ashish Agalgaonkar, C. V. Dobariya, M. G. Kanabar, S. A. Khaparde, and S. V. Kulkarni
Evaluation of configuration plans for DGs in developing countries using advanced planning techniques, Ashish Agalgaonkar, S. V. Kulkarni, and S. A. Khaparde
Evaluation of configuration plans for DGs in developing countries using tradeoff analysis and MADM, Ashish Agalgaonkar, S. V. Kulkarni, and S. A. Khaparde
Scalable Multiresolution Image Segmentation and Its Application in Video Object Extraction Algorithm, F. Akhlaghian Tab, G. Naghdy, and Alfred Mertins
ID-based ring signature scheme secure in the standard model, Man Ho Allen Au, Joseph K. Liu, Tsz Hon Yuen, and Duncan S. Wong
Towards a profound sense of professionalism - teaching ethics to IT and Business University students, Ghassan Al Qaimari, Stephen D. Samuel, and Zeenath Khan
Online solutions to mathematical problems: combining video, audio and stills on the web, Elahe Aminifar, Richard J. Caladine, Anne L. Porter, and Mark I. Nelson
Inequivalence of Nega-cyclic ±1 Matrices, R. Ang, Jennifer Seberry, and Tadeusz A. Wysocki
An open source approach to medium-term data archiving, Sherine M. Antoun, John Fulcher, and Carole Alcock
Landmark navigation with fuzzy logic, Sherine M. Antoun and Phillip J. McKerrow
Identification of Load Power Quality Characteristics using Data Mining, Ali Asheibi, David A. Stirling, and Duane Robinson
Analyzing harmonic monitoring data using data mining, Ali Asheibi, David A. Stirling, and Danny Sutanto
From BPEL4WS Process Model to Full OWL-S Ontology, M. A. Aslam, S. Auer, and J. Shen
Expressing Business Process Model as OWL-S Ontologies, M. A. Aslam, S. Auer, J. Shen, and M. Herrmann
Short linkable ring signatures revisited, Man Ho Allen Au, Sherman S. M. Chow, Willy Susilo, and Patrick P. Tsang
Constant-size ID-based linkable and revocable-iff-linked ring signature, Man Ho Allen Au, Joseph K. Liu, Willy Susilo, and Tsz Hon Yuen
Constant-size dynamic k-TAA, Man Ho Allen Au, Willy Susilo, and Yi Mu
Event-oriented k-times revocable-iff-linked group signatures, Man Ho Allen Au, Willy Susilo, and Siu-Ming Yiu
On the integration of public key data encryption and public key encryption with keyword search, Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo
Fringe calibration using neural network signal mapping for structured light profilometers, Matthew J. Baker, Jiangtao Xi, and Joe F. Chicharo
Understanding the ERP Investment Decision, V. Baker
Mindful IT adoption: making the right strategic decisions by knowing why and how to adopt enterprise systems?, Valerie A. Baker and Tim Coltman
Filter games and pathological subgroups of a countable product of lines, Taras Banakh, Peter Nickolas, and Manuel Sanchis
Force distribution for double-walled carbon nanotubes, Duangkamon Baowan and James M. Hill
ICT professionals’ perceptions of responsibility for breaches of computer security , M. Barrett, K. Garrety, and Jennifer Seberry
Linkages between the Gauss map and the Stern-Brocot tree, Bruce Bates, Martin Bunder, and Keith Tognetti
A compactly generated group whose Hecke algebras admit no bounds on their representations, Udo Baumgartner, Jacqueline Ramagge, and George A. Willis
Dissemination of dynamic multimedia content in networked virtual environments, Tolga Bektas, Osman Oguz, Farzad Safaei, and Iradj Ouveysi
Improved testing for the binomial distribution using chi-squared components with data-dependent cells, Donald John Best and J. C. W Rayner
Nonparametric analysis of blocked ordered categories data: some examples revisited, Donald John Best, J. C. W Rayner, and Olivier Thas
Co-evolution of agent oriented conceptual models and Use Case diagrams, Moshiur Bhuiyan, M. M. Zahidul Islam, Aneesh Krishna, and Aditya K. Ghose
An application of the 5-S activity theoretic requirements method, Robert B. K. Brown, Peter Hyland, and Ian C. Piper
Servers topology considerations in online games, Jeremy Brun, Farzad Safaei, and P. Boustead
Fairness and playability in online multiplayer games, Jeremy Brun, Farzad Safaei, and Paul Boustead
Managing latency and fairness in networked games, J. Brun, Farzad Safaei, and P. Boustead
Spin-wave relaxation in diluted magnetic semiconductors within the self-consistent Green's function approach, J E. Bunder, Shih-Jye Sun, and Hsiu-Hau Lin
An Introduction to MPEG-21, I. Burnett and Fernando Pereira
Modelling a wool scour bowl, James Caunce, Geoff Mercer, S. I. Barry, and Timothy R. Marchant
Combinatorial structures for design of wireless sensor networks, Dibyendu Chakrabarti and Jennifer Seberry
M-quantile models for small area estimation, Raymond L. Chambers and Nikos Tzavidis
Combining credibility in a source sensitive argumentation system, Chee Fon Chang, Peter Harvey, and Aditya K. Ghose
Corporate privacy policy as a source of competitive advantage in B2C e-Commerce, Akemi T. Chatfield
IT governance silo in the firm: an analysis of governance research literature, Akemi T. Chatfield and Padmaharsha Wanninayaka
Scaling of the energy for thin Martensitic films, Nirmalendu Chaudhuri and Stefan Muller
Squeezing the auditory space: a new approach to multi-channel audio coding, Bin Cheng, Christian Ritz, and I. Burnett
Using spatial audio cues from speech excitation for meeting speech segmentation, Eva Cheng, I. Burnett, and Christian Ritz
Varying microphone patterns for meeting speech segmentation using spatial audio cues, Eva Cheng, I. Burnett, and Christian Ritz
Statistical service bounds of regulated flows in a network, Jingwen Chen, Jiangtao Xi, and Zongkai Yang
An Overview on the Integrated IP Optical Data Control Plane in the Optical Transport Network, S. Chen
Evolution of Protection Technologies in Metro Core Optical Networks, S. Chen
Adaptive random testing through iterative partitioning, T. Y. Chen, De Hao Huang, and Zhi Quan Zhou
Efficient provably secure restrictive partially blind signatures from bilinear pairings, Xiaofeng Chen, Fangguo Zhang, Yi Mu, and Willy Susilo
Convertible identity-based anonymous designated ring signature, Yiqun Chen, Willy Susilo, and Yi Mu
Identity-based anonymous designated ring signatures, Yiqun Chen, Willy Susilo, and Yi Mu
Server-aided public key generation protocols on low-power devices for ad-hoc networks, Yun Chen, Weijian Chen, Yi Mu, Xin Chen, and Min Liu
A parallel key generation algorithm for efficient diffie-hellman key agreement, Yun Chen, Xin Chen, and Yi Mu
A coordinated architecture for the agent-based service level agreement negotiation of web service composition, Mohan Baruwal Chhetri, Jian Lin, SukKeong Goh, Jun Yan, Jian Ying Zhang, and Ryszard Kowalczyk
T2-Fair: a two-tiered time and throughput fair scheduler for multi-rate WLANs, Kwan-Wu Chin
ROAR: a multi-rate opportunistic AODV routing protocol for wireless ad-hoc networks, Kwan-Wu Chin and Darryn Lowe
A new technique for reducing MAC address overheads in sensor networks, Kwan-Wu Chin, Darryn Lowe, and Ricardo Gandia Sanchez
Rational and Heron tetrahedra, Catherine Chisholm and J. A. MacDougall
A class of hierarchical neural networks for visual pattern recognition, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Application of SICoNNets to handwritten digit recognition, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Rotation invariant face detection using convolutional neural networks, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Social choice theory, belief merging and strategy-proofness, Samir Chopra, Aditya K. Ghose, and Thomas Meyer
Escrowed linkability of ring signatures and its applications, Sherman S. M. Chow, Willy Susilo, and Tsz Hon Yuen
Human visual perception of region warping distortions, Yang-Wai Chow, Ronald Pose, Matthew Regan, and James Phillips
Comments on Sample Design for Proposed Australian Asthma Survey, Robert Graham Clark
Buyer preferences for outsourced logistics services (3PL), Tim R. Coltman, Kate Hughes, Timothy M. Devinney, and Stuart M. Whiting
Where are the benefits in CRM technology investment?, T. R. Coltman
Mathematical modelling for a C60 carbon nanotube oscillator, Barry J. Cox, Ngamta Thamwattana, and James M. Hill
Modelling the induced force of attraction in electrorheological nanofluids, Barry J. Cox, Ngamta Thamwattana, and James M. Hill
Maximising the electrorheological effect for bidisperse nanofluids from the electrostatic force between two particles, Barry Cox, Ngamta Thamwattana, and James M. Hill
Electric field-induced force between two identical uncharged spheres, B. J. Cox, N. Thamwattana, and James M. Hill
A survey of some mathematical results for highly frictional granular materials, Grant M. Cox, Ngamta Thamwattana, and James M. Hill
Block kriging for lognormal spatial processes, Noel A. Cressie
Spatial prediction on a river network, Noel A. Cressie, Jesse Frey, Bronwyn Harch, and Mick Smith
Doctors prescribing patterns in the Midi Pyrenees region of France: Point process aggregation, Noel A. Cressie, O Perrin, and C Thomas-Agnan
On the design of early generation variety trials with correlated data, Brian R. Cullis, A B. Smith, and N. E. Coombes
Modeling evaluation of continuous queries on sliding windows, Anita Dani and Janusz Getta
Co-evolution of agent-oriented conceptual models and CASO agent programs, A. Dasgupta, Aneesh Krishna, and Aditya K. Ghose
CASO: A framework for dealing with objectives in a constraint-based extension to AgentSpeak(L), Aniruddha Dasgupta and Aditya K. Ghose
On-demand partial schema delivery for multimedia metadata, S. J. Davis and I. S. Burnett
Digital item processing, Frederik De Keukelaere and Gerrard Drury
A fast algorithm for color image segmentation, L. Dong, P. Ogunbona, Wanqing Li, G. Yu, L. Fan, and G. Zheng
Mobility management for untethered immersive communications, Mehran Dowlatshahi and Farzad Safaei
Multipoint Interactive Communication for Peer to Peer Environments, Mehran Dowlatshahi and Farzad Safaei
Overlay multicasting of real-time streams in virtual environments, Mehran Dowlatshahi and Farzad Safaei
Active seismic response control of tall buildings based on reduced order model, Haiping Du, John Boffa, and Nong Zhang
Energy-to-peak performance controller design for building via static output feedback under consideration of actuator saturation, Haiping Du and James Lam
Modelling of a magneto-rheological damper by evolving radial basis function networks, Haiping Du, James Lam, and Nong Zhang
Spatial analysis enhances modelling of a wide variety of traits in forest genetic trials, Gregory W. Dutkowski, Joao Costa e Silva, Arthur R. Gilmour, Hubert Wellendorf, and Alexandre Aguiar
Application of lie group analysis to a core group model for sexually transmitted diseases, Maureen Edwards and Maria Nucci
Group invariant solutions for two dimensional solute transport under realistic water flows, Maureen P. Edwards, R Joel Moitsheki, and Philip Broadbridge
Generic scheduling framework and algorithm for time-varying wireless networks, Gengfa Fang, Yi Sun, Jihua Zhou, Jinglin Shi, and Eryk Dutkiewicz
Subcarrier allocation for OFDMA wireless channels using lagrangian relaxation methods, Gengfa Fang, Yi Sun, Jihua Zhou, Jinglin Shi, Zhongcheng Li, and E. Dutkiewicz
Genetic analysis of weight, fat and muscle depth in growing lambs using random regression models, T. Fischer, J. van der Werf, R. Banks, A. Ball, and Arthur R. Gilmour