Papers from 2006
Realized Applications of Positioning Technologies in Defense Intelligence, Katina Michael and Amelia Masters
The advancement of positioning technologies in defense intelligence, Katina Michael and Amelia Masters
The emerging ethics of humancentric GPS tracking and monitoring, Katina Michael, Andrew McNamee, and M G. Michael
The emerging ethics of humancentric GPS tracking and monitoring, Katina Michael, Andrew McNamee, and M G. Michael
Location-Based Intelligence – Modeling Behavior in Humans using GPS, Katina Michael, Andrew McNamee, M G. Michael, and Holly Tootell
Historical lessons on ID technology and the consequences of an unchecked trajectory, Katina Michael and M G. Michael
The proliferation of identification techniques for citizens throughout the ages, Katina Michael and M G. Michael
Towards chipification: the multifunctional body art of the Net Generation, Katina Michael and M G. Michael
The hybridization of automatic identification techniques in mass market applications: towards a model of coexistence, Katina Michael, M. G. Michael, Holly Tootell, and V. Baker
Location-Based Services and the Privacy-Security Dichotomy, Katina Michael, L. Perusco, and M G. Michael
The AVIAN Flu Tracker - a Location Service Proof of Concept, Katina Michael, B. Stroh, O. Berry, A. Muhlbauer, and T. Nicholls
National Security: The Social Implications of the Politics of Transparency, M G. Michael and Katina Michael
Milk yield and milk composition from grazing primiparous non-dairy crossbred ewes, J. Morgan, N. Fogarty, S. Nielsen, and Arthur R. Gilmour
Using the end to define the means: Enabling student learning of statistics, Maureen Morris, Anne Porter, and David Griffiths
Trawling for deeper learning: achieving an optimum catch, Maureen Morris and Colleen Puttee
Evaluating the performance of a cascade of two bioreactors, Mark Nelson and Harvinder Sidhu
An identity-based Broadcast Encryption Scheme for mobile ad-hoc networks, Ching Yu Ng, Yi Mu, and Willy Susilo
Designated group credentials, Ching Yu Ng, Willy Susilo, and Yi Mu
Optimal assignment of distributed servers to virtual partitions for the provision of immersive voice communication in massively multiplayer games, Cong Duc Nguyen, Farzad Safaei, and P. Boustead
Skin segmentation using neighborhood contextual information, Giang Nguyen and Abdesselam Bouzerdoum
The influence of site physical characteristics on power quality performance, Glenn Nicholson, Victor J. Gosbell, and Ashok Parsotam
An application of elementary functions to a resource allocation problem, R. Nillsen
An application of quadratic functions to Australian Government policy on funding schools, R. Nillsen
Community websites and what makes them sustainable: evidence from Australia, Alison Norris and Mark B. Freeman
Joint modeling of additive and non-additive genetic line effects in single field trials, H Oakey, A P. Verbyla, Brian R. Cullis, W. S. Pitchford, and H. Kuchel
Testing for activation in data from FMRI experiments, Martina Pavlicova, Noel A. Cressie, and Thomas J. Santner
Exploring a relationship between aggregate and individual levels spatial data through semivariogram models, Gandhi Pawitan and David G. Steel
Future MPEG developments, Fernando Pereira and I. Burnett
Synchronized flicker measurement for flicker transfer evaluation in power systems, S. Perera, Duane Robinson, S. Elphick, D. Geddey, N. Browne, V. Smith, and V. J. Gosbell
Using scenario planning in the evaluation of information security applications, Laura Perusco
The Importance of Scenarios in Evaluating the Socio-ethical Implications of Location-based Services, L. Perusco and Katina Michael
Scarcely populated UWB-IR systems with interleaved coding-modulation on multipath fading channels, Michal M. Pietrzyk, Keni Popovski, Tadeusz A. Wysocki, Beata J. Wysocki, and Jos H. Weber
Performance Comparison of UWB Hopping Codes in a Multi-User Rich Scattering Environment, K. Popovski, Beata J. Wysocki, and Tadeusz A. Wysocki
Low Frequency Component-Based Watermarking Scheme using 2D Datamatrix, Prashan Premaratne, Liyanage DeSilva, and I. Burnett
Moment invariant based control system using hand gestures, Prashan Premaratne, Farzad Safaei, and Quang Nguyen
Zero-knowledge proof of generalized compact knapsacks (or a novel identification/signature scheme), Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, and Yumin Wang
A comparison of nurses' satisfaction with online help or hardcopy user manuals to facilitate their mastering an e-health application, Yiyu Qiu, Ping Yu, and Richard Flemming
Trading off computation for error in providing immersive voice communications for mobile gaming, Ying Peng Que, Paul A. Boustead, and Farzad Safaei
Minimising the computational cost of providing a mobile immersive communication environment (MICE), Ying Peng Que, Paul Boustead, and Farzad Safaei
Scalable delivery of immersive communication environment (ICE) using peer-to-peer (P2P) architecture, Ying Peng Que, P. Boustead, and Farzad Safaei
Exploiting time diversity to improve block spread OFDM, Ibrahim S. Raad and Xiaojing Huang
Exploiting Time Diversity to Improve Block Spread OFDM in a Multipath Environment, Ibrahim S. Raad and Xiaojing Huang
Study of spread codes with block spread OFDM, Ibrahim S. Raad, Xiaojing Huang, and Darryn Lowe
A new spreading matrix for Block Spread OFDM, Ibrahim S. Raad, Xiaojing Huang, and Raad Raad
Telecommunications network management applications in an educational environment, Ibrahim Raad, Peter James Vial, W. Raad, and Keni Popovski
Neuro-Fuzzy admission control in cellular networks, Raad Raad and Ibrahim Raad
A variable length linear array for smart antenna systems, Walid Raad, Ian S. Burnett, and Ibrahim Raad
A variable length linear array for smart antenna systems using partial optimization, W. Raad and Ian S. Burnett
Adaptive resource replication in a ubiquitous peertopeer based multimedia distribution environment, L. Rong and I. Burnett
Facilitating Universal Multimedia Adaptation (UMA) in a Heterogeneous Peer-to-Peer Network, L. Rong and I. Burnett
Solution of a certain class of network flow problems with cascaded demand aggregation and capacity allocation, Farzad Safaei and I. Ouveysi
Sensitivity of response of multi-trait index selection to changes in genetic correlations between production traits in sheep, E. Safari, N. Fogarty, and Arthur Gilmour
Feature selection for complex patterns, Peter Schenkel, Wanqing Li, and Wanquan Liu
Some common attacks against certified email protocols and the countermeasures, Min-Hua Shao, Guilin Wang, and Jianying Zhou
Analysis of Business Process Integration in Web Service Context, J. Shen, G. Grossmann, Y. Yang, M. Stumptner, M. Schrefl, and T. Reiter
SwinDeW-S: Extending P2P Workflow Systems for Adaptive Composite Web Services, Jun Shen, Jun Yan, and Yun Yang
A P2P based Service Flow System with Advanced Ontology-based Service Profiles, J. Shen, Y. Yang, and Jun Yan
Sharing Digital Rights with Domain Licensing, N. P. Sheppard and R. Safavi-Naini
Protecting Privacy with the MPEG-21 IPMP Framework, N. P. Sheppard and R. Safavi-Naini
Improving mobile station energy efficiency in IEEE 802.16e WMAN by burst scheduling, Jinglin Shi, Gengfa Fang, Yi Sun, Jihua Zhou, Zhongcheng Li, and Eryk Dutkiewicz
Mathematical analysis of self-heating in compost piles, Harvinder S. Sidhu, Mark I. Nelson, Nadeem Ansari, and Xiao Dong Chen
Activated sludge wastewater treatment process: performance comparison between a two-reactor cascade and a single tank, Harvinder S. Sidhu, Simon D. Watt, and Mark I. Nelson
Relative Cuntz-Krieger algebras of finitely aligned higher-rank graphs, Aidan Sims
The design and analysis of multi-phase plant breeding experiments, A B. Smith, P Lim, and Brian R. Cullis
Blind separation of speech with a switched sparsity and temporal criteria, Daniel Smith and Ian Burnett
An analysis of the limitations of blind signal separation application with speech, Daniel Smith, Jason Lukasiak, and I. Burnett
A distributed branch-and-bound algorithm for computing optimal coalition structures, Chattrakul Sombattheera and Aditya K. Ghose
A pruning-based algorithm for computing optimal coalition structures in linear production domains, Chattrakul Sombattheera and Aditya K. Ghose
Supporting dynamic supply networks with agent-based coalitions, Chattrakul Sombattheera and Aditya K. Ghose
Accounting for the uncertainty of information on clustering in the design of a clustered sample, David G. Steel and Robert Graham Clark
Unravelling ecological analysis, David G. Steel, Mark Tranmer, and D Holt
Methods for parameter identification in oscillatory networks and application to cortical and thalamic 600 Hz activity, Thomas F. Suesse, Jens Haueisen, Lutz Leistritz, Herbert Witte, and Bernd Hilgenfeld
Application of MML to motor skills acquisition, Chao Sun, Fazel Naghdy, and David A. Stirling
Separable identity-based deniable authentication: cryptographic primitive for fighting phishing, Willy Susilo and Yi Mu
Securing electronic health records with broadcast encryption schemes, Willy Susilo and Khin Than Win
Securing mobile data computing in healthcare, Willy Susilo and Khin Than Win
Electronic health record system evaluation based on patient safety, Yung-Yu Su, Khin Than Win, and John A. Fulcher
An agent-based peer-to-peer grid computing architecture, Jia Tang and Minjie Zhang
Enhancing Interoperability via Generic Multimedia Syntax Translation, Joseph Thomas-Kerr, I. Burnett, and C. H. Ritz
Format-Independent Multimedia Streaming, Joseph Thomas-Kerr, I. Burnett, and C. H. Ritz
An efficient approach to generic multimedia adaptation, Joseph Thomas-Kerr, I. Burnett, and Christian Ritz
Generic, scalable multimedia streaming and delivery with example application for H.264/AVC, Joseph Thomas-Kerr, I. Burnett, and Christian Ritz
Communications breakdown: revisiting the question of information and its significance for community informatics projects, William Tibben
Unlocking the secrets of Amazon: understanding tacit knowledge and its implications for e-business, William Tibben, Kratika Sangal, and Soniya Gonsalves
A gender recognition system using shunting inhibitory convolutional neural networks, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
A shunting inhibitory convolutional neural network for Gender Classification, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Texture classification using convolutional neural networks, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Multi-party concurrent signatures, Dongvu Tonien, Willy Susilo, and Reihaneh Safavi-Naini
Location-based services and the price of security, Holly Tootell
The application of critical social theory to national security research, Holly Tootell
The application of critical social theory to national security research, Holly Tootell
Understanding human attitudes to location-based counter-terrorism measures, Holly Tootell
STC-MIMO block spread OFDM in frequency selective rayleigh fading channels, Le Chung Tran, Xiaojing Huang, E. Dutkiewicz, and Joe F. Chicharo
STC-MIMO block spread OFDM in frequency selective Rayleigh fading channels, Le Chung Tran, Xiaojing Huang, Eryk Dutkiewicz, and Joe F. Chicharo
The importance of utilising electronic identification for total farm management in Australia, Adam Trevarthen
An inversion of Freedman's 'image pulse' model in air, Janos Tsakiris and Phillip J. McKerrow
A novel approach of spreading spectrum in OFDM systems, Pingzhou Tu, Xiaojing Huang, and Eryk Dutkiewicz
Recovering DC coefficients in block-based DCT, Takeyuki Uehara, Reihaneh Safavi-Naini, and Philip Ogunbona
Distributed Management of OMA DRM Domains, Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, and Martin Jan Surminen
Direct sequence modified time hopping PPM over ultra wideband S-V channel, Peter James Vial, Beata J. Wysocki, and Tadeusz A. Wysocki