Papers from 2011
Server-aided signatures verification secure against collusion attack, Willy Susilo, Sherman S. M. Chow, and Man Ho Allen Au
Preserving transparency and accountability in optimistic fair exchange of digital signatures, Willy Susilo, Yi Mu, Wei Wu, Robert H. Deng, Xinyi Huang, and J Zhou
Improving BDD cryptosystems in general lattices, Willy Susilo, Thomas V. Plantard, and Michael Rose
Interactive conditional proxy re-encryption with fine grain policy, Willy Susilo, Jiandong Wang, Liming Fang, and Chunpeng Ge
Understanding the conducting states of active and passive switches in an inverter circuit used for power system applications, Danny Sutanto, B.P. Divakar, and K.W.E. Cheng
Modelling awareness of agents using policies, Amir Talaei-khoei, Pradeep Ray, Nandan Parameswaran, and Ghassan Beydoun
Modelling peptide nanotubes for artificial ion channels, Ngamta Thamwattana, Barry J. Cox, and Fainida Rahmat
What are you trying to say? Format-independent semantic-aware streaming and delivery, Joseph Thomas-Kerr, Ian Burnett, and Christian Ritz
Smoke detection in videos using non-redundant local binary pattern-based features, Hongda Tian, Wanqing Li, Philip Ogunbona, Duc Thanh Nguyen, and Ce Zhan
Towards greater systemisation in CI research: an exploration of social development as a framework for comparison and understanding, William Tibben
Wall clutter mitigation based on eigen-analysis in through-the-wall radar imaging, Fok Hing Chi Tivive, Moeness G. Amin, and Abdesselam Bouzerdoum
An SVD-based approach for mitigating wall reflections in through-the-wall radar imaging, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, and Moeness G Amin
Real-time haptic modeling and simulation for prosthetic insertion, Catherine A. Todd and Fazel Naghdy
Breaking and repairing an approximate message authentication scheme, Dongvu Tonien, Reihaneh Safavi-Naini, and Peter Nickolas
Modeling encapsulation of acetylene molecules into carbon nanotubes, Thien Tran-Duc and Ngamta Thamwattana
Modelling carbon nanostructures for filtering and adsorbing polycyclic aromatic hydrocarbons, Thien Tran-Duc and Ngamta Thamwattana
Modelling encapsulation of acetylene molecules in carbon nanotubes, Thien Tran-Duc and Ngamta Thamwattana
Encapsulation of a benzene molecule into a carbon nanotube, Thien Tran-Duc, Ngamta Thamwattana, Barry Cox, and James M. Hill
Orientation of a benzene molecule inside a carbon nanotube, Thien Tran-Duc, Ngamta Thamwattana, and James M. Hill
Modelling the passage of food through an animal stomach: A chemical reactor engineering approach, Rodney van Bentum and Mark Ian Nelson
Positioning RFID technology into the innovation theory landscape: a multidimensional perspective integrating case study approach, Samuel Fosso Wamba
Guest editorial for the special issue on RFID-enabled healthcare: applications, issues and benefits, S. F. Wamba
Asymptotics for general multivariate kernel density derivative estimators, Matthew P. Wand, Tarn Duong, and Joes Chacon
Research of unsupervised posture modeling and action recognition based on spatial-temporal interesting points, Chuan-xu Wang, Yun Liu, and Wanqing Li
Threshold anonymous announcement in VANETs, Guilin Wang, L Chen, and S. L. Ng
Designated confirmer signatures with unified verification, Guilin Wang, Fubiao Xia, and Y. Zhao
Green strategic alignment: Aligning business strategies with sustainability objectives, Hui-Ling Wang and Aditya K. Ghose
On the optimality of sequential forward feature selection using class separability measure, Lei Wang, Chunhua Shen, and Richard Hartley
Quality of nursing documentation and approaches to its evaluation: a mixed-method systematic review, Ning Wang, David Hailey, and Ping Yu
Developing measurements of the quality of electronic versus paper-based nursing documentation in Australian aged care homes, Ning Wang, Ping Yu, David Hailey, and Deborah Oxlade
Ranking social emotions by learning listwise preference, Qishen Wang, Ou Wu, Weiming Hu, Jinfeng Yang, and Wanqing Li
Using Infer.NET for statistical analyses, Shen Wang and M. Wand
Policy-based authentication for mobile agents, Yikai Wang, Yi Mu, and Minjie Zhang
DAIM: A distributed algorithm for isolating malfunctioning nodes in wireless sensor networks, Mohamed Watfa and Rawad Abou Assi
An intelligent RFID system, Mohamed Watfa, Manprabhjot Kaur, and Rashida Firoz Daruwala
The path space of a higher-rank graph, Samuel B. Webster
Pedestrian sensing using time-of-flight range camera, Xue Wei, Son Lam Phung, and Abdesselam Bouzerdoum
Lifespan Theorem for simple constrained surface diffusion flows, Glen Wheeler
A mathematical model for the biological treatment of industrial wastewaters in a cascade of four reactors, Annette L. Worthy, Mark I. Nelson, and Rubayyi Turki Alqahtani
Concepts and collections: a case study using objects from the Brooklyn museum, Timothy Wray and Peter Eklund
A method for evaluating bias in global measurements of CO2 total columns from space, D Wunch, P O. Wennberg, G C. Toon, B J. Connor, B Fisher, G B. Osterman, C Frankenberg, L Mandrake, C O'Dell, P Ahonen, S C. Biraud, R Castano, Noel Cressie, D Crisp, N M. Deutscher, A Eldering, M L. Fisher, David W. Griffith, M Gunson, P Heikkinen, G Keppel-Aleks, E Kyro, R Lindemaier, Ronald Macatangay, J Mendonca, J Messerschmidt, C E. Miller, I Morino, J Notholt, F A. Oyafuso, M Rettinger, J Robinson, C M. Roehl, R J. Salawitch, V Sherlock, K Strong, R Sussmann, T Tanaka, D R. Thompson, O Uchino, Thorsten Warneke, and Steven C. Wofsy
Provably secure server-aided verification signatures, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang
On the invisibility of designated confirmer signatures, Fubiao Xia, Guilin Wang, and Rui Xue
Fundus blood vessels detection based on phase congruency, Zhitao Xiao, Jun Wu, Chunyan Shan, and Jiangtao Xi
Interesting targets detection in natural image based on phase information, Zhitao Xiao, Jun Wu, Fang Zhang, and Jiangtao Xi
Diabetic retinopathy fundus image processing based on phase information, Zhitao Xiao, Jun Wu, Q. Zhao, and Jiangtao Xi
Performance comparison of hierarchical coding and multiple description coding over lossy networks, Minyi Xie and Farzad Safaei
Outbound logistics exception monitoring: a multi-perspective ontologies' approach with intelligent agents, Dongming Xu, Chinthake Wijesooriya, Yong-Gui Wang, and Ghassan Beydoun
Block transform OFDM: A robust power and bandwidth efficient system with improved frequency diversity performance, Xiaoliang Xue and Xiaojing Huang
A cloud based information integration platform for smart cars, Yi Xu and Jun Yan
Ontology-driven accounting information system: case study of the stock exchange of Thailand, Jira Yammeesri, Seung Hwan Kang, and S K. Lau
Multiple-measurement vector model and its application to through-the-wall radar imaging, Jie Yang, Abdesselam Bouzerdoum, Fok Hing Chi Tivive, and Moeness G. Amin
Profiling directed NUMA optimization on linux systems: a case study of the Gaussian computational chemistry code, Rui Yang, Joseph Antony, Alistair P. Rendell, Danny Robson, and Peter Strazdins
First-principles study of water confined in single-walled silicon carbide nanotubes, Rui Yang, Tamsyn Hilder, Shin-Ho Chung, and Alistair Rendell
A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks, Rehana Yasmin, Eike Ritter, and Guilin Wang
A composite self-organisation mechanism in an agent network, Dayong Ye, Minjie Zhang, and Q. Bai
A hybrid multiagent framework with Q-learning for power grid systems restoration, Dayong Ye, Minjie Zhang, and Danny Sutanto
Controlling for method bias: a critique and reconceptualization of the marker variable technique, Philip Yetton, Rajeev Sharma, and Jeff Crawford
Coordinated learning for loosely coupled agents with sparse interactions, Chao Yu, Minjie Zhang, and Fenghui Ren
Threshold ring signature without random oracles, Tsz Hon Yuen, Joseph K. Liu, Man Ho Allen Au, Willy Susilo, and Jianying Zhou
Concurrent Signatures with Fully Negotiable Binding Control, Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, and Qiong Huang
Methods to evaluate health information systems, Ping Yu, Hui Yu, and Jeffrey Soar
Research on human body temperature measurement models of intelligent clothing based on optical fiber Bragg grating, Xiaogang Yu, Changyun Miao, Hongqiang Li, Hongda Chen, Jiangtao Xi, Haijiang Yang, and Cheng Zhang
Measuring the feedback parameter of a semiconductor laser with external optical feedback, Yanguang Yu, Jiangtao Xi, and Joe F. Chicharo
Cryptanalysis of an off-line electronic cash scheme based on proxy blind signature, Yong Yu, Yi Mu, Guilin Wang, and Sun Ying
Development of Ontology Information Retrieval System for Novice Researchers in Malaysia, Norasykin Mohd Zaid and Sim Kim Lau
Improving knowledge sharing behaviour within organizations: towards a model, Marion Zalk, Rachelle Bosua, and Rajeev Sharma
A hybrid decomposition procedure for scheduling projects under multiple resource constraints, Reza R. Zamani
Age estimation based on extended non-negative matrix factorization, Ce Zhan, Wanqing Li, and Philip Ogunbona
Overview of the partial differential equation filter method for the electronic speckle pattern interferometry fringes, Fang Zhang, Zhitao Xiao, Jun Wu, and Jiangtao Xi
Secure image retrieval based on visual content and watermarking rrotocol, Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, and Yi Mu
MPEG-7 visual descriptors and discriminant analysis, Jun Zhang, Lei Ye, and Jianhua Ma
Trust-based service provider selection in service-oriented environments, Minjie Zhang, Yi Mu, and Q. Bai
GTrust: an innovated trust model for group service selection in web-based service-oriented environments, Minjie Zhang, Yi Mu, Quan Bai, and Xing Su
Attribute-based authentication for multi-agent systems with dynamic groups, Qi Zhang, Yi Mu, and Minjie Zhang
Secure mobile agents with controlled resources, Qi Zhang, Yi Mu, Minjie Zhang, and Robert H. Deng
Online/offline verification of short signatures, Yilian Zhang, Zhide Chen, and Fuchun Guo
3D face recognition based on a modified ICP method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo
Hybrid FEC and MDC models for low-delay packet-loss recovery, Xiguang Zheng and Christian Ritz
Compression of navigable speech soundfield zones, Xiguang Zheng and Christian H. Ritz
Privacy-preserved access control for cloud computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, and Jun Yan
On adaptive random testing through iterative partitioning, Zhiquan Zhou, Tsong Yueh Chen, and De Hao Huang
A simple approximation formula for calculating the optimal exercise boundary of American puts, Song-Ping Zhu
On various quantitative approaches for pricing American options, Song-Ping Zhu
A predictor-corrector scheme based on ADI method for pricing American puts with stochastic volatility, Song-Ping Zhu and Wenting Chen
A spectral-collocation method for pricing perpetual American puts with stochastic volatility, Song-Ping Zhu and Wenting Chen
Pricing perpetual American options under a stochastic-volatility model with fast mean reversion, Song-Ping Zhu and Wenting Chen
Should an American option be exercised earlier or later if volatility is not assumed to be a constant?, Song-Ping Zhu and Wenting Chen
A closed-form exact solution approach for pricing variance swaps with stochastic volatility, Song-Ping Zhu and Guang-Hua Lian
Combined diffraction and radiation of ocean waves around an OWC device, Song-Ping Zhu and Lewis Mitchell
A new predictor-corrector scheme for valuing American puts, Song-Ping Zhu and Jin Zhang
Secure exchange of electronic health records, Alejandro Flores Zuniga, Khin Win, and Willy Susilo
Papers from 2010
An approach to studying location-based Services regulation in Australia, Roba Abbas
Location-based services: An examination of user attitudes and socio-ethical scenarios, Roba Abbas
Demonstrating the potential for covert policing in the community: five stakeholder scenarios, Roba Abbas, Katina Michael, and M G. Michael
On the security of NOEKEON against side channel cube attacks, Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, and Jennifer Seberry
Fuzzy tracking control design using observer-based stabilizing compensator for nonlinear systems, Trihastuti Agustinah, Achmad Jazidie, Mohammad Nuh, and Haiping Du
Statistical counterpoint: knowledge discovery of choreographic information using spatio-temporal analysis and visualization, Ola Ahlqvist, Hyowon Ban, Noel Cressie, and Norah Zuniga Shaw
On optimising route discovery for multi-interface and power-aware nodes in heterogeneous MANETs, Huda AlAamri, Mehran Abolhasan, Tadeusz A. Wysocki, and Justin Lipman
Novel algorithm for enhancing database access in interactive applications: performance evaluation, Nawar Al Hakeem and Mohamed Salem