The University of Wollongong Faculty of Engineering and Information Sciences was formed in 2013 following an organisational restructure. It comprised an amalgamation of the former Faculty of Engineering and Faculty of Informatics. Related series: Faculty of Engineering and Information Sciences - Papers.


Papers from 2011

Server-aided signatures verification secure against collusion attack, Willy Susilo, Sherman S. M. Chow, and Man Ho Allen Au

Preserving transparency and accountability in optimistic fair exchange of digital signatures, Willy Susilo, Yi Mu, Wei Wu, Robert H. Deng, Xinyi Huang, and J Zhou


Improving BDD cryptosystems in general lattices, Willy Susilo, Thomas V. Plantard, and Michael Rose

Interactive conditional proxy re-encryption with fine grain policy, Willy Susilo, Jiandong Wang, Liming Fang, and Chunpeng Ge


Understanding the conducting states of active and passive switches in an inverter circuit used for power system applications, Danny Sutanto, B.P. Divakar, and K.W.E. Cheng


Modelling awareness of agents using policies, Amir Talaei-khoei, Pradeep Ray, Nandan Parameswaran, and Ghassan Beydoun

Modelling peptide nanotubes for artificial ion channels, Ngamta Thamwattana, Barry J. Cox, and Fainida Rahmat

What are you trying to say? Format-independent semantic-aware streaming and delivery, Joseph Thomas-Kerr, Ian Burnett, and Christian Ritz

Smoke detection in videos using non-redundant local binary pattern-based features, Hongda Tian, Wanqing Li, Philip Ogunbona, Duc Thanh Nguyen, and Ce Zhan


Towards greater systemisation in CI research: an exploration of social development as a framework for comparison and understanding, William Tibben

Wall clutter mitigation based on eigen-analysis in through-the-wall radar imaging, Fok Hing Chi Tivive, Moeness G. Amin, and Abdesselam Bouzerdoum

An SVD-based approach for mitigating wall reflections in through-the-wall radar imaging, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, and Moeness G Amin


Real-time haptic modeling and simulation for prosthetic insertion, Catherine A. Todd and Fazel Naghdy

Breaking and repairing an approximate message authentication scheme, Dongvu Tonien, Reihaneh Safavi-Naini, and Peter Nickolas

Modeling encapsulation of acetylene molecules into carbon nanotubes, Thien Tran-Duc and Ngamta Thamwattana


Modelling carbon nanostructures for filtering and adsorbing polycyclic aromatic hydrocarbons, Thien Tran-Duc and Ngamta Thamwattana

Modelling encapsulation of acetylene molecules in carbon nanotubes, Thien Tran-Duc and Ngamta Thamwattana

Encapsulation of a benzene molecule into a carbon nanotube, Thien Tran-Duc, Ngamta Thamwattana, Barry Cox, and James M. Hill

Orientation of a benzene molecule inside a carbon nanotube, Thien Tran-Duc, Ngamta Thamwattana, and James M. Hill

Modelling the passage of food through an animal stomach: A chemical reactor engineering approach, Rodney van Bentum and Mark Ian Nelson


Positioning RFID technology into the innovation theory landscape: a multidimensional perspective integrating case study approach, Samuel Fosso Wamba


Guest editorial for the special issue on RFID-enabled healthcare: applications, issues and benefits, S. F. Wamba

Asymptotics for general multivariate kernel density derivative estimators, Matthew P. Wand, Tarn Duong, and Joes Chacon

Research of unsupervised posture modeling and action recognition based on spatial-temporal interesting points, Chuan-xu Wang, Yun Liu, and Wanqing Li


Threshold anonymous announcement in VANETs, Guilin Wang, L Chen, and S. L. Ng

Designated confirmer signatures with unified verification, Guilin Wang, Fubiao Xia, and Y. Zhao

Green strategic alignment: Aligning business strategies with sustainability objectives, Hui-Ling Wang and Aditya K. Ghose

On the optimality of sequential forward feature selection using class separability measure, Lei Wang, Chunhua Shen, and Richard Hartley

Quality of nursing documentation and approaches to its evaluation: a mixed-method systematic review, Ning Wang, David Hailey, and Ping Yu


Developing measurements of the quality of electronic versus paper-based nursing documentation in Australian aged care homes, Ning Wang, Ping Yu, David Hailey, and Deborah Oxlade

Ranking social emotions by learning listwise preference, Qishen Wang, Ou Wu, Weiming Hu, Jinfeng Yang, and Wanqing Li

Using Infer.NET for statistical analyses, Shen Wang and M. Wand

Policy-based authentication for mobile agents, Yikai Wang, Yi Mu, and Minjie Zhang

DAIM: A distributed algorithm for isolating malfunctioning nodes in wireless sensor networks, Mohamed Watfa and Rawad Abou Assi

An intelligent RFID system, Mohamed Watfa, Manprabhjot Kaur, and Rashida Firoz Daruwala


The path space of a higher-rank graph, Samuel B. Webster


Pedestrian sensing using time-of-flight range camera, Xue Wei, Son Lam Phung, and Abdesselam Bouzerdoum


Lifespan Theorem for simple constrained surface diffusion flows, Glen Wheeler


A mathematical model for the biological treatment of industrial wastewaters in a cascade of four reactors, Annette L. Worthy, Mark I. Nelson, and Rubayyi Turki Alqahtani


Concepts and collections: a case study using objects from the Brooklyn museum, Timothy Wray and Peter Eklund


A method for evaluating bias in global measurements of CO2 total columns from space, D Wunch, P O. Wennberg, G C. Toon, B J. Connor, B Fisher, G B. Osterman, C Frankenberg, L Mandrake, C O'Dell, P Ahonen, S C. Biraud, R Castano, Noel Cressie, D Crisp, N M. Deutscher, A Eldering, M L. Fisher, David W. Griffith, M Gunson, P Heikkinen, G Keppel-Aleks, E Kyro, R Lindemaier, Ronald Macatangay, J Mendonca, J Messerschmidt, C E. Miller, I Morino, J Notholt, F A. Oyafuso, M Rettinger, J Robinson, C M. Roehl, R J. Salawitch, V Sherlock, K Strong, R Sussmann, T Tanaka, D R. Thompson, O Uchino, Thorsten Warneke, and Steven C. Wofsy

Provably secure server-aided verification signatures, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang

On the invisibility of designated confirmer signatures, Fubiao Xia, Guilin Wang, and Rui Xue

Fundus blood vessels detection based on phase congruency, Zhitao Xiao, Jun Wu, Chunyan Shan, and Jiangtao Xi

Interesting targets detection in natural image based on phase information, Zhitao Xiao, Jun Wu, Fang Zhang, and Jiangtao Xi

Diabetic retinopathy fundus image processing based on phase information, Zhitao Xiao, Jun Wu, Q. Zhao, and Jiangtao Xi

Performance comparison of hierarchical coding and multiple description coding over lossy networks, Minyi Xie and Farzad Safaei

Outbound logistics exception monitoring: a multi-perspective ontologies' approach with intelligent agents, Dongming Xu, Chinthake Wijesooriya, Yong-Gui Wang, and Ghassan Beydoun

Block transform OFDM: A robust power and bandwidth efficient system with improved frequency diversity performance, Xiaoliang Xue and Xiaojing Huang

A cloud based information integration platform for smart cars, Yi Xu and Jun Yan

Ontology-driven accounting information system: case study of the stock exchange of Thailand, Jira Yammeesri, Seung Hwan Kang, and S K. Lau

Multiple-measurement vector model and its application to through-the-wall radar imaging, Jie Yang, Abdesselam Bouzerdoum, Fok Hing Chi Tivive, and Moeness G. Amin

Profiling directed NUMA optimization on linux systems: a case study of the Gaussian computational chemistry code, Rui Yang, Joseph Antony, Alistair P. Rendell, Danny Robson, and Peter Strazdins

First-principles study of water confined in single-walled silicon carbide nanotubes, Rui Yang, Tamsyn Hilder, Shin-Ho Chung, and Alistair Rendell

A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks, Rehana Yasmin, Eike Ritter, and Guilin Wang

A composite self-organisation mechanism in an agent network, Dayong Ye, Minjie Zhang, and Q. Bai

A hybrid multiagent framework with Q-learning for power grid systems restoration, Dayong Ye, Minjie Zhang, and Danny Sutanto


Controlling for method bias: a critique and reconceptualization of the marker variable technique, Philip Yetton, Rajeev Sharma, and Jeff Crawford

Coordinated learning for loosely coupled agents with sparse interactions, Chao Yu, Minjie Zhang, and Fenghui Ren


Threshold ring signature without random oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Allen Au, Willy Susilo, and Jianying Zhou

Concurrent Signatures with Fully Negotiable Binding Control, Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, and Qiong Huang

Methods to evaluate health information systems, Ping Yu, Hui Yu, and Jeffrey Soar

Research on human body temperature measurement models of intelligent clothing based on optical fiber Bragg grating, Xiaogang Yu, Changyun Miao, Hongqiang Li, Hongda Chen, Jiangtao Xi, Haijiang Yang, and Cheng Zhang


Measuring the feedback parameter of a semiconductor laser with external optical feedback, Yanguang Yu, Jiangtao Xi, and Joe F. Chicharo

Cryptanalysis of an off-line electronic cash scheme based on proxy blind signature, Yong Yu, Yi Mu, Guilin Wang, and Sun Ying

Development of Ontology Information Retrieval System for Novice Researchers in Malaysia, Norasykin Mohd Zaid and Sim Kim Lau


Improving knowledge sharing behaviour within organizations: towards a model, Marion Zalk, Rachelle Bosua, and Rajeev Sharma

A hybrid decomposition procedure for scheduling projects under multiple resource constraints, Reza R. Zamani


Age estimation based on extended non-negative matrix factorization, Ce Zhan, Wanqing Li, and Philip Ogunbona

Overview of the partial differential equation filter method for the electronic speckle pattern interferometry fringes, Fang Zhang, Zhitao Xiao, Jun Wu, and Jiangtao Xi

Secure image retrieval based on visual content and watermarking rrotocol, Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, and Yi Mu

MPEG-7 visual descriptors and discriminant analysis, Jun Zhang, Lei Ye, and Jianhua Ma


Trust-based service provider selection in service-oriented environments, Minjie Zhang, Yi Mu, and Q. Bai

GTrust: an innovated trust model for group service selection in web-based service-oriented environments, Minjie Zhang, Yi Mu, Quan Bai, and Xing Su

Attribute-based authentication for multi-agent systems with dynamic groups, Qi Zhang, Yi Mu, and Minjie Zhang

Secure mobile agents with controlled resources, Qi Zhang, Yi Mu, Minjie Zhang, and Robert H. Deng

Online/offline verification of short signatures, Yilian Zhang, Zhide Chen, and Fuchun Guo


3D face recognition based on a modified ICP method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo

Hybrid FEC and MDC models for low-delay packet-loss recovery, Xiguang Zheng and Christian Ritz

Compression of navigable speech soundfield zones, Xiguang Zheng and Christian H. Ritz

Privacy-preserved access control for cloud computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, and Jun Yan

On adaptive random testing through iterative partitioning, Zhiquan Zhou, Tsong Yueh Chen, and De Hao Huang

A simple approximation formula for calculating the optimal exercise boundary of American puts, Song-Ping Zhu

On various quantitative approaches for pricing American options, Song-Ping Zhu

A predictor-corrector scheme based on ADI method for pricing American puts with stochastic volatility, Song-Ping Zhu and Wenting Chen


A spectral-collocation method for pricing perpetual American puts with stochastic volatility, Song-Ping Zhu and Wenting Chen

Pricing perpetual American options under a stochastic-volatility model with fast mean reversion, Song-Ping Zhu and Wenting Chen

Should an American option be exercised earlier or later if volatility is not assumed to be a constant?, Song-Ping Zhu and Wenting Chen

A closed-form exact solution approach for pricing variance swaps with stochastic volatility, Song-Ping Zhu and Guang-Hua Lian

Combined diffraction and radiation of ocean waves around an OWC device, Song-Ping Zhu and Lewis Mitchell

A new predictor-corrector scheme for valuing American puts, Song-Ping Zhu and Jin Zhang

Secure exchange of electronic health records, Alejandro Flores Zuniga, Khin Win, and Willy Susilo

Papers from 2010


An approach to studying location-based Services regulation in Australia, Roba Abbas


Location-based services: An examination of user attitudes and socio-ethical scenarios, Roba Abbas


Demonstrating the potential for covert policing in the community: five stakeholder scenarios, Roba Abbas, Katina Michael, and M G. Michael

On the security of NOEKEON against side channel cube attacks, Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry


Fuzzy tracking control design using observer-based stabilizing compensator for nonlinear systems, Trihastuti Agustinah, Achmad Jazidie, Mohammad Nuh, and Haiping Du

Statistical counterpoint: knowledge discovery of choreographic information using spatio-temporal analysis and visualization, Ola Ahlqvist, Hyowon Ban, Noel Cressie, and Norah Zuniga Shaw


On optimising route discovery for multi-interface and power-aware nodes in heterogeneous MANETs, Huda AlAamri, Mehran Abolhasan, Tadeusz A. Wysocki, and Justin Lipman

Novel algorithm for enhancing database access in interactive applications: performance evaluation, Nawar Al Hakeem and Mohamed Salem