Papers from 2010
Planetary-scale RFID services in an age of uberveillance, Katina Michael, George Roussos, George Q. Huang, Arunabh Chattopadhyay, Rajit Gadh, B S. Prabhu, and Peter Chu
Toward a state of Überveillance, M G. Michael and Katina Michael
A model for incomplete mixing in a bioreactor, Ahmed Hussein Msmali and Mark I. Nelson
Development and testing of a work measurement tool to assess caregivers' activities in Residential Aged Care Facilities, Esther Munyisia, Ping Yu, and David Hailey
Sentence extraction by graph neural networks, Donatella Muratore, Markus Hagenbuchner, Franco Scarselli, and Ah Chung Tsoi
Dynamic modelling, validating and fine-tuning of engineering curriculum, Fazel Naghdy
The curvHDR method for gating flow cytometry samples, Ulrike Naumann, George Luta, and Matthew P. Wand
Motion estimation with adaptive regularization and neighborhood dependent constraint, Muhammad Wasim Nawaz, Abdesselam Bouzerdoum, and Son Lam Phung
Do empirical models of robot-environment interaction have a meaning?, Ulrich Nehmzow, Phillip J. McKerrow, and Steve Billings
An improved template matching method for object detection, Duc Thanh Nguyen, Wanqing Li, and Philip Ogunbona
Human detection using local shape and non-redundant binary patterns, Duc Thanh Nguyen, Wanqing Li, and Philip Ogunbona
Object detection using non-redundant local Binary Patterns, Duc Thanh Nguyen, zhimin Zong, Philip Ogunbona, and Wanqing Li
A family of asymmetric Ellis-type theorems, Peter Nickolas, Susan Andima, Ralph Kopperman, and S Popvassilev
Low complexity interference aware distributed resource allocation for multi-cell OFDMA cooperative relay networks, Nidhal Odeh, Mehran Abolhasan, and Farzad Safaei
Message from the Dean of the Faculty, Philip Ogunbona
Explaining variational approximations, J T. Ormerod and M P. Wand
Metamodelling approach towards a disaster management decision support system, Siti Othman and Ghassan Beydoun
A disaster management metamodel (DMM) validated, Siti Hajar Othman and Ghassan Beydoun
Metamodel-based Decision Support System For Disaster Management, Siti Hajar Othman and Ghassan Beydoun
Metamodelling approach to support disaster management knowledge sharing, Siti Hajar Othman and Ghassan Beydoun
A review of recent investigations with reference to IEC/TR 61000-3-13 on voltage unbalance emission allocation, Prabodha Paranavithana, Upuli Jayatunga, Sarath Perera, and Philip Ciufo
Periodic 2-graphs arising from subshifts, David Pask, Iain Raeburn, and Natasha A. Weaver
Markov random fields for abnormal behavior detection on highways, Son Lam Phung, Philippe L. Bouttefroy, Abdesselam Bouzerdoum, and Azeddine Beghdadi
Efficient SVM training with reduced weighted samples, Son Lam Phung, Giang Hoang Nguyen, and Abdesselam Bouzerdoum
Dimensionality reduction using compressed sensing and its application to a large-scale visual recognition task, Son Lam Phung, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, and Jie Yang
A network-aware virtual machine placement and migration approach in cloud computing, Jingtai Piao and Jun Yan
Application of microsimulation to the modelling of epidemics and terrorist attacks, Ian Piper, Daniel Keep, Tony Green, and Ivy Zhang
Recursive lattice reduction, Thomas Plantard and Willy Susilo
Business rules discovery from process design repositories, Jantima Polpinij, Aditya K. Ghose, and Hoa Khanh Dam
A closed-form derivation of self and multi-user interference for time-reversed UWB communications, Keni Popovski, Tadeusz A. Wysocki, and Beata J. Wysocki
Human computer interaction using hand gestures, Prashan Premaratne, Quang Nguyen, and Malin Premaratne
A dynamic nursing workflow management system: A Thailand hospital scenario, Nantika Prinyapol, Joshua P. Fan, and Sim K. Lau
Fast digital optical flow estimation based on EMD, Mickael Quelin, Abdesselam Bouzerdoum, and Son Lam Phung
Classification cervical cancer using histology images, Rahmadwati, Golshah Naghdy, Montserrat Ros, Catherine Todd, and E. Norachmawati
Carbon nanotube oscillators for applications as nanothermometers, Fainida Rahmat, Ngamta Thamwattana, and James M. Hill
Enhanced security notions for dedicated-key hash functions: Definitions and relationships, Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu
Trapdoor security in a searchable public-key encryption scheme with a designated tester, Hyun Sook Rhee, J. H. Park, Willy Susilo, and D. H. Lee
Generalised score and Wald tests, Paul Rippon and J. C. W Rayner
Ontology modeling of UBL process diagrams using OWL, Suman Roy, Kiran Prakash Sawant, and Aditya K. Ghose
Macro-economic equilibrium and price signal accuracy in non-scalar economy, Farzad Safaei
An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed, Asem A. Salah, Borhanunddin Mohd. Ali, Ahmad Saqer, and Nidhal Odeh
Fair data flows scheduling schema for multihop wireless ad hoc networks, Hamidreza Salarian and Pejman Khadivi
Asymptotics and optimal bandwidth selection for highest density region estimation, R. Samworth and M. Wand
A knowledge-based risk advisor model for chronic complications of diabetes, Mohsen Sangi, Khin Than Win, and John Fulcher
Enhanced reactive power support of a PMSG based wind turbine for a remote area power system, Saad Sayeef, Nishad Mendis, Kashem Muttaqi, and Sarath Perera
Rotor position and speed estimation of a variable structure direct-torque-controlled IPM synchronous motor drive at very low speeds including standstill, Saad M. Sayeef, Gilbert Foo, and Muhammad F. Rahman
Some remarks on Hadamard matrices, Jennifer Seberry and Marilena Mitrouli
Fuzzy logic-based image fusion for multi-view through-the-wall radar, Cher Hau Seng, Abdesselam Bouzerdoum, Fok Hing Chi Tivive, and Moeness G. Amin
An unequal clustering protocol for wireless sensor networks, Fengjun Shang, A. Xiong, Mehran Abolhasan, and Tadeusz A. Wysocki
Automatic classification of GPR signals, W Shao, A Bouzerdoum, S L. Phung, L Su, B Indraratna, and C Rujikiatkamjorn
3D Geometric and Haptic Modeling of Hand-Woven Textile Artifacts, Hooman Shidanshidi, Fazel Naghdy, Golshah Naghdy, and Diana Wood Conroy
Speech enhancement via separation of sources from co-located microphone recordings, Muawiyath Shujau, Christian Ritz, and I. Burnett
Using in-air acoustic vector sensors for tracking moving speakers, Muawiyath Shujau, Christian H. Ritz, and I. Burnett
Integrating keyword search with multiple dimension tree views over a summary corpus data cube, Mark Sifer, Jian Lin, Yutaka Watanobe, and Subhash Bhalla
The co-universal C*-algebra of a row-finite graph, Aidan Sims
A direct approach to co-universal algebras associated to directed graphs, Aidan Sims and S B. Webster
C*-algebras associated to product systems of hilbert bimodules, Aidan Sims and Trent Yeend
Desired and received customer value models in logistics service outsourcing, Yeni Sumantri and Sim Kim Lau
The mainstream themes of logistics service provider (LSP) research: A classification for identifying research gaps and opportunities, Yeni Sumantri and Sim Kim Lau
The research gaps and opportunities in the logistics service provider (LSP) research development, Yeni Sumantri and Sim Kim Lau
STE3D-CAP: stereoscopic 3D CAPTCHA, Willy Susilo, Yang-Wai Chow, and Huayu Zhou
Proof-of-knowledge of representation of committed value and its applications, Willy Susilo, Yi Mu, and Man Ho Allen Au
Practical RFID ownership transfer scheme, Willy Susilo, Yi Mu, Ching Yu Ng, and Rei Safavi-Naini
Certificateless threshold signature scheme from bilinear maps, Willy Susilo, Yi Mu, F Zhang, Lei Zhang, Xinyi Huang, and H Yuan
Clustering of harmonic monitoring data using data mining, Danny Sutanto, A. Asheibi, and David A. Stirling
PBTrust: A Priority-Based Trust model for service selection in general service-oriented environments, Xing Su, Minjie Zhang, Yi Mu, and Kwang Mong Sim
Applying the modified delphi method to identify the Taiwanese electronic health record systems evaluation framework and instrument, Yung-Yu Su, Khin Than Win, and Tieh-Chi Chung
Genetics of late maturity - a-amylase in a doubled haploid wheat population, M K. Tan, A P. Verbyla, Brian R. Cullis, P. Martin, A w. Milgate, and J. Oliver
A review of mathematical and mechanical modelling in nanotechnology, Ngamta Thamwattana, Barry Cox, James M. Hill, and Duangkamon Baowan
Escrowed deniable identification schemes, Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Allen Au, Yi Mu, and Duncan Wong
A human gait classification method based on radar Doppler spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, and Moeness G. Amin
Automatic human motion classification from Doppler spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, and Moeness G. Amin
Adaptive hierarchical architecture for visual recognition, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Son Lam Phung, and Khan M. Iftekharuddin
Adsorption of polycyclic aromatic hydrocarbons on graphite surfaces, Thien Tran-Duc, Ngamta Thamwattana, Barry Cox, and James M. Hill
General model for molecular interactions in a benzene dimer, Thien Tran-Duc, Ngamta Thamwattana, Barry J. Cox, and James M. Hill
Modelling the interaction in a benzene dimer, Thien Tran-Duc, Ngamta Thamwattana, B. J. Cox, and James M. Hill
Quasi-orthogonal space-time-frequency codes in MB-OFDM UWB, Le Chung Tran, Alfred Mertins, and Tadeusz A. Wysocki
Recognition of sequences of graphical patterns, Edmondo Trentin, Shujia Zhang, and Markus Hagenbuchner
BLAC: revoking repeatedly misbehaving anonymous users without relying on TTPs, Patrick Tsang, Man Ho Allen Au, Apu Kapadia, and Sean W. Smith
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract), Patrick Tsang, Man Ho Allen Au, Joseph K. Liu, Willy Susilo, and Duncan S. Wong
Robust estimation of small-area means and quantiles, Nikos Tzavidis, Stefano Marchetti, and Ray Chambers
What's your contribution? An online system for assessing each member's participation in team based projects, Peter James Vial, Zhihao Zhang, Montserrat Ros, Christian Ritz, and Geoffrey W. Trott
RFID-enabled Warehouse Process Optimization in the TPL Industry, S. F. Wamba and A. T. Chatfield
Unveiling the potential of RFID-enabled intelligent patient management : results of a Delphi study, S. F. Wamba and E. W. T. Ngai
RFID Deployment and Use in the Dairy Value Chain: Applications, Current Issues and Future Research Directions, S. F. Wamba and Alison Wicks
An abuse-free fair contract-signing protocol based on the RSA signature, Guilin Wang
Experimental evaluation of IEEE 802.11s path selection protocols in a mesh testbed, Jerry Chun-Ping Wang, Brett Hagelstein, and Mehran Abolhasan
Inter-domain routing validator based spoofing defence system, Lei Wang, Tianbing Xia, and Jennifer Seberry
Afp computational secreted network construction and analysis between human hepatocellular carcinoma (hcc) and no-tumor hepatitis/cirrhotic liver tissues, Lin Wang, Juxiang Huang, Minghu Jiang, and Xiguang Zheng
A framework for privacy policy management in service aggregation, Peishun Wang, L. Dong, Yi Mu, Willy Susilo, and Jun Yan
Constructing an authentication token to access external services in service aggregation, Peishun Wang, Yi Mu, Willy Susilo, and Jun Yan
Human tracking: a state-of-art survey, Junzo Watada, Zalili Musa, Lakhmi C. Jain, and John Fulcher
Analysis of a model for ethanol production through continuous fermentation: ethanol productivity, Simon Watt, Harvinder Sidhu, Mark Nelson, and Ajay Ray
A comparison of analysis methods for late-stage variety evaluation trials, Sue J. Welham, Beverley J. Gogel, Alison B. Smith, Robin Thompson, and Brian R. Cullis
Improved learning in grid-to-grid neural network via clustering, William E. White, Khan M. Iftekharuddin, and Abdesselam Bouzerdoum
C*-algebras of tilings with infinite rotational symmetry, Michael F. Whittaker
Implementing patient accessible health information site for diabetes management, Khin Than Win
Social tagging for digital libraries using formal concept analysis, Timothy Wray and Peter W. Eklund
Modelling process for the development of learning content for tertiary education, Zhengui Wu and Parviz Doulai