Papers from 2005
On an infinite integral arising in the numerical integration of stochastic differential equations, David M. Stump and James M. Hill
Personal firewall for Pocket PC 2003: design & implementation, Willy Susilo, R. J. Ang, C. A. McDonald, and J. Huang
On the security of nominative signatures, Willy Susilo and Yi Mu
Provably secure fail-stop signature schemes based on RSA, Willy Susilo and Yi Mu
Tripartite concurrent signatures, Willy Susilo and Yi Mu
Secure key extraction in computer networks, Willy Susilo, Yi Mu, and Xinyi Huang
Privacy-enhanced Internet storage, Willy Susilo, Fangguo Zhang, and Yi Mu
Privacy-enhanced Internet storage: Non-interactive publicly verifiable 1-out-of-n encryption schemes, Willy Susilo, Fangguo Zhang, and Yi Mu
Effects of polyethylene bags, ethylene absorbent and 1-methylcyclopropene on the storage of Japanese pears, M. J. Szczerbanik, K. J. Scott, J. E. Paton, and D J. Best
Knowledge-based semantic image segmentation and global precedence effect, Fardin Akhlaghian Tab and Golshah Naghdy
An agent-based grid computing infrastructure, Jia Tang and Minjie Zhang
An agent-based peer-to-peer grid computing architecture, J. Tang and Minjie Zhang
Response of Mains Connected Induction Motors to Low Frequency Voltage Fluctuations from a Flicker Perspective, Sankika Tennakoon, Sarath Perera, and D A. Robinson
Mathematical modelling in nanotechnology, Ngamta Thamwattana and James M. Hill
Perturbation solutions for highly frictional granular media, Ngamta Thamwattana and James M. Hill
Bitstream Binding Language – Mapping XML Multimedia Containers into Streams, Joseph Thomas-Kerr, I. Burnett, and Philip Ciufo
A theoretical justification for partnerships in Community Technology Centre projects, William Tibben
A Fast Neural-Based Eye Detection System, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
An eye feature detector based on convolutional neural network, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Efficient training algorithms for a class of shunting inhibitory convolutional neural networks, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Handwritten digit recognition based on shunting inhibitory convolutional neural networks, Fok Hing Chi Tivive and Abdesselam Bouzerdoum
Virtual cochlear implant insertion for medical education, C. Todd and F. Naghdy
Investigating the relationship between Location-Based Services and National Security, Holly Tootell
A generalized algorithm for the generation of correlated Rayleigh fading envelopes in wireless channels, Le Chung Tran, Tadeusz A. Wysocki, Alfred Mertins, and Jennifer R. Seberry
A generalized algorithm for the generation of correlated Rayleigh fading envelopes, Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, and Alfred Mertins
A generalized algorithm for the generation of correlated Rayleigh fading envelopes in radio channels, Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, and Alfred Mertins
Generalized Williamson and Wallis-Whiteman constructions for improved square order-8 CO STBCs, Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, A. Mertins, and Sarah A. Spence
The case for small area microdata, Mark Tranmer, A. Pickles, Ed Fieldhouse, M. Elliot, A. Dale, Mark Brown, D. Martin, David G. Steel, and C. Gardiner
The Importance of Utilising Electronic Identification for Total Farm Management: A Case Study of Dairy Farms on the South Coast of NSW, A. Trevarthen
Bias adjusted small area estimation with M-quantile models, Nikos Tzavidis and Ray Chambers
A fast, optimal spatial-prediction method for massive datasets, ShengLi Tzeng, Hsin-Cheng Huang, and Noel A. Cressie
On the performance of turbo codes with convolutional interleavers, Sina Vafi and Tadeusz A. Wysocki
Performance of convolutional interleavers with different spacing parameters in turbo codes, Sina Vafi and Tadeusz A. Wysocki
An ultra wide band simulator using MATLAB/Simulink, Peter James Vial, Beata J. Wysocki, and Tad Wysocki
Generic, optimistic, and efficient schemes for fair certified email delivery, Guilin Wang, Feng Bao, Kenji Imamoto, and Kouichi Sakurai
An efficient certified e-mail scheme suitable for wireless mobile environments, Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
Security notes on two cheat-proof secret sharing schemes, Guilin Wang and Si-Han Qing
Security flaws in several group signatures proposed by Popescu, Guilin Wang and Sihan Qing
Cryptanalysis of a proxy blind signature scheme based on DLP, Shu-Hong Wang, Guilin Wang, Bao Feng, and Jie Wang
An exposure property of block designs, Y. Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, L. C. Tran, Y. Zhao, and Tianbing Xia
Novel color processing architecture for digital cameras with CMOS image sensors, Chaminda Weerasinghe, Wanqing Li, Igor Kharitonenko, Magnus Nilsson, and Sue Twelves
SQL structure rebuilder: preventing SQL injection attacks, Jian Wen, Yi Mu, and Willy Susilo
Location privacy in mobile IP, Rungrat Wiangsripanawan, R. Safavi-Naini, and Willy Susilo
A Review of security of electronic health records, Khin Than Win
Engineering Dependable Health Informations Systems, Khin Than Win and Peter Croll
An ontology based approach for health information discovery, Khin T. Win and Minjie Zhang
A variational approach to the stability of an embedded NLS soliton at the edge of the continuum, Annette L. Worthy, Antonmaria A. Minzoni, and Noel F. Smyth
Access Policy Sheet for access control in fine-grained XML, Jing Wu, Yi Mu, Jennifer Seberry, and Chun Ruan
Delegatable access control for fine-grained XML, Jing Wu, Jennifer Seberry, Y. Mu, and Chun Ruan
An infinite family of Goethals-Seidel arrays, M. Xia, Tianbing Xia, and Jennifer Seberry
A new method for constructing T-matrices, M. Xia, Tianbing Xia, Jennifer Seberry, and G. Zuo
A New Method for Constructing Williamson Matrices, Tianbing Xia, Jennifer Seberry, and Xia Mingyuan
Some new results of regular Hadamard matrices and SBIBD II, Tianbing Xia, M. Xia, and Jennifer Seberry
Estimating the parameters of semiconductor lasers based on weak optical feedback self-mixing interferometry, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo, and T. Bosch
Estimating the parameters of semiconductor lasers based on weak optical feedback interferometry, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo, and Thierry Bosch
An improved dynamic model for optical feedback self-mixing interferometry-based measurement and instrumentation, Jiangtao Xi, Yuanguang Yu, Enbang Li, and Joe F. Chicharo
A short proxy signature scheme: efficient authentication in the ubiquitous world, Huang Xinyi, Yi Mu, Willy Susilo, Fangguo Zhang, and Xiaofeng Chen
Power system applications of superconducting magnetic energy storage systems, X D. Xue, Eric KW Cheng, and Danny Sutanto
Efficient authentication scheme for routing in mobile ad hoc networks, Shidi Xu, Yi Mu, and Willy Susilo
Secure AODV routing protocol using one-time signature, Shidi Xu, Yi Mu, and Willy Susilo
Signal processing methods implemented in a novel FBG sensing system for vibration/dynamic strain measurement, Xingyuan Xu, Enbang Li, Jiangtao Xi, and Joe F. Chicharo
Ontology-based resource descriptions for distributed information sources, Hui Yang and Minjie Zhang
Decision aided joint compensation of clipping noise and nonlinearity for MIMO-OFDM systems, Shouyi Yang, Jiangtao Xi, and Xiaomin Mu
Decision aided compensation of residual frequency offset for MIMO-OFDM systems with nonlinear channel, Shouyi Yang, Jiangtao Xi, Fang Wang, Xiaomin Mu, and Hideo Kobayashi
Face recognition with CTFM sonar, Kok Kai Yoong and Phillip J. McKerrow
A collaborative approach to health informatics capacity building - learning from Canadian practice in fostering research and education, Ping Yu, Marilynne Herbert, and Francis Lau
Work practice changes caused by the introduction of a picture archiving and communication system, Ping Yu and Paul Hilton
A recommended communicable disease surveillance and control network to secure a healthy and happy olympic game, Ping Yu and Hui Yu
Measuring the linewidth enhancement factor of semiconductor lasers based on weak optical feedback effect, Yanguang Yu, Jiangtao Xi, Enbang Li, and Joe F. Chicharo
Reducing security overhead for mobile networks, Fangguo Zhang, Yi Mu, and Willy Susilo
Identity-based partial message recovery signatures (or how to shorten ID-based signatures), Fangguo Zhang, Willy Susilo, and Yi Mu
Identity-based Universal Designated Verifier Signatures, Fangguo Zhang, Willy Susilo, Yi Mu, and Xiaofeng Chen
A secure multicast architecture and protocol for MOSPF, Junqi Zhang, Yi Mu, and Vijay Varadharajan
An ID-based Access Control Scheme for MOSPF, Junqi Zhang, Vijay Varadharajan, and Yi Mu
Constructing university timetable using constraint satisfaction programming approach, L. Zhang and Sim Kim Lau
Novel two-dimension FBG sensor based on rectangle cantiliver beam for simultaneous measurement of force and temperature, Weigang Zhang, Guiyan Kai, Shuzhong Yuan, Xiaoyi Dong, Enbang Li, Jiangtao Xi, and Joe F. Chicharo
Human Motion Recognition through Fuzzy Hidden Markov Model, X. Zhang and F. Naghdy
A data-fitting approach for displacements and vibration measurement using self-mixing interferometers, Yi Zhang, Jiangtao Xi, Joe F. Chicharo, and Yanguang Yu
Efficient and robust key management for large mobile ad hoc networks, Bo Zhu, Feng bao, Robert Deng, Mohan Kankanhalli, and Guilin Wang
A closed-form exact solution for the value of American put and its optimal exercise boundary, Song-Ping Zhu
Papers from 2004
A routing strategy for heterogeneous mobile ad hoc networks, Mehran Abolhasan, Justin Lipman, and Joe F. Chicharo
Load-Balanced Route Discovery for Mobile Ad hoc Networks, Mehran Abolhasan, Justin Lipman, and Tadeusz A. Wysocki
Power Quality Data Analysis Using Unsupervised Data Mining, Ali Asheibi, David A. Stirling, Sarath Perera, and D A. Robinson
Accuracy limitations introduced by digital projection sources in profilometric optical metrology systems, Matthew J. Baker, Joe F. Chicharo, Jiangtao Xi, and Enbang Li
Image quality assessment using a neural network approach, Abdesselam Bouzerdoum, A. Havstad, and A. Beghdadi
Power quality waveform generator based on the CSound software sound synthesizer, J. P. Braun, V. J. Gosbell, and S. Perera
Hierarchic decomposition in agent oriented conceptual modelling, R. B. Brown and Aditya K. Ghose
Nonlinear sigma model for odd-frequency triplet superconductivity in superconductor/ferromagnet structures, J E. Bunder and K B. Efetov
A longitudinal study of the use of the Web by regional tourism organisations in the Asia Pacific region, Lois Burgess, Joan Cooper, Carole Alcock, and Preeti Uppala
Edge image description using angular radial partitioning, A. Chalechale, Alfred Mertins, and G. Naghdy
Arabic/Persian cursive signature recognition and verification using line segment distribution, A. Chalechale, G. Naghdy, and Prashan Premaratne
Image analysis using line segments extraction by chain code differentiation, A. Chalechale, G. Naghdy, and Prashan Premaratne
Image database retrieval using sketched queries, A. Chalechale, G. Naghdy, and Prashan Premaratne
Document image analysis and verification using cursive signature, A. Chalechale, G. Naghdy, Prashan Premaratne, and Alfred Mertins
Chain-based extraction of line segments to describe images, A. Chalechale, G. Naghdy, Prashan Premaratne, and H. Moghaddasi
Asterism decoding for layered space-time systems, P. Conder and Tadeusz A. Wysocki
Asterism decoding for layered space-time systems using 8PSK, P. Conder and Tadeusz A. Wysocki
Extending Asterism decoding to QAM and its complexity in Rician fading MIMO systems, P. Conder and Tadeusz A. Wysocki
Ecological bias: use of maximum-entropy approximations, Noel A. Cressie, S Richardson, and I Jaussent