Papers from 2006
Formalization and assessment of regulatory requirements for safety-critical software, Sergiy Vilkomir, Jonathan Bowen, and Aditya K. Ghose
E-commerce adoption barriers in small businesses and the differential effects of gender, Lejla Vrazalic and Robert C. Macgregor
Implementation of a quasi-digital ADC on PLD, Fu-yuan Wang, Yong-liang Li, Jiangto Xi, and Joe F. Chicharo
Generic non-repudiation protocols supporting transparent off-line TTP, Guilin Wang
Cryptanalysis of timestamp-based password authentication schemes using smart cards, Guilin Wang and Feng Bao
The fairness of perfect concurrent signatures, Guilin Wang, Feng Bao, and Jianying Zhou
Analysis and improvement of a multisecret sharing authenticating scheme, Guilin Wang and Si-Han Qing
An energy efficient MAC-PHY approach to support distributed source coding in wireless sensor network, Wei Wang, Dongming Peng, Honggang Wang, Hamid Sharif, Tadeusz A. Wysocki, and Beata J. Wysocki
Fitness evaluation for structural optimisation genetic algorithms using neural networks, Koren Ward and Timothy J. McCarthy
Analysis of a model for the treatment of wastewater by the activated sludge process, Simon D. Watt, Harvinder S. Sidhu, and Mark I. Nelson
Using the method of lines to determine critical conditions for thermal ignition, Rodney Weber, Harvinder Sidhu, D. Sawade, Geoff Mercer, and Mark Nelson
Phase Unwrapping of Self-mixing Signals Observed in Optical Feedback Interferometry for Displacement Measurement, Lu Wei, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo
The analysis of longitudinal data using mixed model L-splines, S. J. Welham, Brian R. Cullis, M. J. Kenward, and R Thompson
Web-based personal health record systems evaluation, Khin Than Win
Information security and privacy of health data, Khin Than Win and Willy Susilo
Personal health records and their security protection, Khin Than Win, Willy Susilo, and Yi Mu
Enhancing information quality through semantic approach in health information retrieval, Khin Than Win and Minjie Zhang
Designs for generalized linear models with several variables and model uncertainty, David Woods, Susan Lewis, John Eccleston, and Ken Russell
Challenges and opportunities facing Australian universities caused by internationalisation of Chinese higher education, Mingxuan Wu and Ping Yu
Efficient signcryption without random oracles, Qianhong Wu, Yi Mu, Willy Susilo, and Fangguo Zhang
Privately retrieve data from large databases, Qianhong Wu, Yi Mu, Willy Susilo, and Fangguo Zhang
Ad hoc group signatures, Qianhong Wu, Willy Susilo, Yi Mu, and Fangguo Zhang
Efficient partially blind signatures with provable security, Qianhong Wu, Willy Susilo, Yi Mu, and Fangguo Zhang
Modeling dual polarization wireless fading channels using quaternions, Beata J. Wysocki, Tadeusz A. Wysocki, and Jennifer Seberry
New Constructing of regular Hadamard matrices, Tianbing Xia, Jennifer Seberry, and M. Xia
Hadamard matrices constructed by circulant and negacyclic matrices, Tianbing Xia, Mingyuan Xia, Jennifer Seberry, and Jing Wu
A study of the status and future of superconducting magnetic energy storage in power systems, X D. Xue, Eric KW Cheng, and Danny Sutanto
Unified mathematical modelling of steady-state and dynamic voltage-current characteristics for PEM fuel cells, X D. Xue, Eric KW Cheng, and Danny Sutanto
Authenticated AODV Routing Protocol using one-time signature and transitive signature schemes, Shidi Xu, Yi Mu, and Willy Susilo
Online/offline signatures and multisignatures for AODV and DSR routing security, Shidi Xu, Yi Mu, and Willy Susilo
Improving the performance of IWDM FBG sensing system using Tabu-gradient search algorithm, Xingyuan Xu, Joe F. Chicharo, and Jiangtao Xi
Improving the measurement accuracy of FBG sensor using adaptive filters, Xingyuan Xu, Jiangtao Xi, and Joe F. Chicharo
A study and testbed for the Australian Standard AS7799 Compliance and Management, Suwanna Yamsiri, Jennifer Seberry, and Willy Susilo
Two-stage statistical language models for text database selection, Hui Yang and Minjie Zhang
Application of snapshot isolation protocol to concurrent processing of long transactions, Yang Yang and Janusz R. Getta
SwinDeW-a p2p-based decentralized workflow management system, Jun Yan, Y. Yang, and G. K. Raikundalia
Towards autonomous service level agreement negotiation for adaptive service composition, Jun Yan, J. Zhang, J. Lin, M. B. Chhetri, S. K. Goh, and R. Kowalczyk
Description of evolutional changes in image time sequences using MPEG-7 visual descriptors, Lei Ye, Lingzhi Cao, Philip Ogunbona, and Wanqing Li
Image content annotation based on visual features, Lei Ye, Philip Ogunbona, and J. Wang
WFMS-based data integration for e-Learning, Jianming Yong, Jun Yan, and Xiaodi Huang
X2BT trusted reputation system: a robust mechanism for P2P networks, Lan Yu, Willy Susilo, and Reihaneh Safavi-Naini
Electronic versus paper-based nursing documentation systems: the caregivers weigh in, Ping Yu
Computer-based nursing documentation in nursing homes: a feasibility study, Ping Yu, Yiyu Qiu, and Patrick A. Crookes
The Challenges for the Adoption of M-Health, Ping Yu, M. X. Wu, H. Yu, and G. C. Xiao
Facial expression recognition for multiplayer online games, Ce Zhan, Wanqing Li, Philip O. Ogunbona, and Farzad Safaei
A new signature scheme without random oracles from bilinear pairings, Fangguo Zhang, Xiaofeng Chen, Willy Susilo, and Yi Mu
Coordinating agent interactions under open environments, Minjie Zhang and Quan Bai
An ontology-based approach for expert and knowledge mining in complex multi-agent systems, Minjie Zhang, Xijin Tang, Quan Bai, and Jifa Gu
Application of CFD in ship engineering design practice and ship hydrodynamics, Zhi-Rong Zhang, Hui Liu, Song-Ping Zhu, and Feng Zhao
General design Bayesian generalized linear mixed models, Yihua Zhao, John Staudenmayer, Brent Coull, and M. Wand
Complex Orthogonal Spreading Sequences Using Mutually Orthogonal Complementary Sets, Y. Zhao, Jennifer Seberry, Beata J. Wysocki, and Tadeusz A. Wysocki
Amicable Orthogonal Designs of Order 8 for Complex Space-Time Block Codes, Y. Zhao, Jennifer Seberry, Tianbing Xia, Y. Wang, Beata J. Wysocki, Tadeusz A. Wysocki, and Le Chung Tran
On Amicable Orthogonal Designs of Order 8, Y. Zhao, Y. Wang, and Jennifer Seberry
Simulation of human motion for learning and recognition, Gang Zheng, Wanqing Li, Philip Ogunbona, Liju Dong, and Igor Kharitonenko
Cryptographic key generation from biometric data using lattice mapping, Gang Zheng, Wanqing Li, and Ce Zhan
Efficient id-based authenticated group key agreement from bilinear pairings, Lan Zhou, Willy Susilo, and Yi Mu
Three-round secret handshakes based on ElGamal and DSA, Lan Zhou, Willy Susilo, and Yi Mu
A Closed-form Analytical Solution for the Valuation of Convertible Bonds With Constant Dividend Yield, Song-Ping Zhu
A New Analytical-Approximation Formula for the Optimal Exercise Boundary of American Put Options, Song-Ping Zhu
An exact and explicit solution for the valuation of American put options, Song-Ping Zhu
Numerical valuation of American puts on a dividend paying asset, Song-Ping Zhu, Jin Zhang, and B Hon
Papers from 2005
Efficient and highly scalable route discovey for on-demand routing protocols in ad hoc networks, Mehran Abolhasan and Justin Lipman
Highly Scalable Routing Strategies: DZTR Routing Protocol, Mehran Abolhasan and Tadeusz A. Wysocki
A New Strategy to Improve Proactive Route Updates in Mobile Ad Hoc Networks, Mehran Abolhasan, Tadeusz A. Wysocki, and Justin Lipman
Performance investigation on three-classes of MANET routing protocols, Mehran Abolhasan, Tadeusz A. Wysocki, and Justin Lipman
Embedded lossless audio coding using linear prediction and cascade, Kevin Adistambha, Christian Ritz, and Jason Lukasiak
Distributed generation opportunity under availability based tariff and reliability considerations, Ashish Agalgaonkar, S. Khaparde, S. Kulkarni, and S. Soman
Multi-attribute decision making approach for strategic planning of DGs, Ashish Agalgaonkar, S. V. Kulkarni, and S. A. Khaparde
Scalable multiresolution color image segmentation with smoothness constraint, F. Akhlaghian Tab, G. Naghdy, and Alfred Mertins
A novel model for enhancing database access in interactive applications, N. Al Hakeem and Denis Popel
The Rise and Fall of Digital Music Distribution Services: a Cross-Case Comparison of MP3.com, Napster and Kazaa, K. Alves and Katina Michael
Cancelable key-based fingerprint templates, Russell Ang, Reihaneh Safavi-Naini, and Luke F. McAven
Short E-Cash, Man Ho Au, Sherman S. M. Chow, and Willy Susilo
Certificateless public key encryption without pairing, Joonsang Baek, R. Safavi-Naini, and Willy Susilo
Efficient Multi-receiver identity-based encryption and its application to broadcast encryption, Joonsang Baek, R. Safavi-Naini, and Willy Susilo
Token-controlled public key encryption, Joonsang Baek, R. Safavi-Naini, and Willy Susilo
Universal Designated Verifier Signature proof (or how to efficiently prove knowledge of a signature), Joonsang Baek, R. Safavi-Naini, and Willy Susilo
Dynamic team forming in self-interested multi-agent systems, Quan Bai and Minjie Zhang
Flexible Agent Team Forming in Open Environments, Q. Bai and Minjie Zhang
A Coloured Petri Net Based Strategy for Multi-Agent Scheduling, Q. Bai, Minjie Zhang, and H. Zhang
Optimisation of triangulation based optical profilometers utilising digital video projection technology, Matthew J. Baker, Jiangtao Xi, Joe F. Chicharo, and Enbang Li
A novel voicing cut-off determination for low bit-rate harmonic speech coding, Changchun Bao, Jason Lukasiak, and Christian H. Ritz
Continued Fractions and The Gauss Map, Bruce Bates, Martin Bunder, and Keith Tognetti
Hecke Algebras of group extensions, Udo Baumgartner, James Foster, Jacqui Hicks, Helen Lindsay, Benjamin Maloney, Iain F. Raeburn, Jacqueline Ramagge, and Sarah Richardson
The use of canola oil coatings to extend the storage life of Nashi pears, D J. Best, M. J. Szczerbanik, K. J. Scott, and J. E. Paton
Improved Testing for the Poisson distribution Using Chisquared Components with Data Dependent Cells, Donald John Best and J. C. W Rayner
Test for balanced incomplete block ranked data with ties, Donald John Best, J. C. W Rayner, and P. B. Brockhoff
An investigation of dispute resolution mechanisms on power and trust: a domain study of online trust in e-auctions, Glenn Bewsell, Rodger Jamieson, Adrian Gardiner, and Deborah Bunker
Mangoes and chilli peppers: a domain study of online trust in eAuctions, Glenn R. Bewsell
Py (Roo): A Fast and Secure Stream Cipher, E. Biham and Jennifer Seberry
VLSI implementation of a skin detector based on a neural network, Farid Boussaid, Abdesselam Bouzerdoum, and Douglas Chai
Distributing Network Game Servers for improved geographical scalability, Paul A. Boustead, Farzad Safaei, and Jeremy Brun
DICE: Internet delivery of immersive voice communication for crowded virtual spaces, P. Boustead, Farzad Safaei, and M. Dowlatshahi
High-capacity steganography using a shared colour palette, G. Brisbane, R. Safavi-Naini, and P. Ogunbona
Harmonic allocation to aggregated regions within a transmission network, Timothy J. Browne, Victor J. Gosbell, and Sarath Perera
Equivalences between Pure Type Systems and systems of Illative Combinatory Logic, Martin Bunder and Willibrordus Dekkers
Spatio-temporal Analysis of Acute Admissions for Ischemic Heart Disease in NSW, Australia, Sandy Burden, Subharup Guha, Geoffrey Morgan, Louise Ryan, Ross Sparks, and Linda Young
A comparative analysis of the use of the Web for destination marketing by regional tourism organisations in Chile and the Asia Pacific, Lois Burgess, Joan Cooper, Narciso Cerpa, and Jason P. Sargent
MPEG-21 digital item declaration and Identification-principles and compression, I. S. Burnett, S. J. Davis, and G. M. Drury