|Up a level|
Wang, Guangyuan and Wang, Hua and Tao, Xiaohui and Zhang, Ji and Zhang, Jinhua (2013) Minimising k-dominating set in arbitrary network graphs. In: 9th International Conference on Advanced Data Mining and Applications (ADMA 2013), 14-16 Dec 2013, Hangzhou, China.
Zhu, Guohun and Li, Yan and Wen, Peng (Paul) (2012) Analysing epileptic EEGs with a visibility graph algorithm. In: 5th International Conference on Biomedical Engineering and Informatics (BMEI 2012), 16-18 Oct 2012, Chongqing, China.
Liu, Fei and Xiang, Wei and Zhao, Hui and Zheng, Kan and Long, Hang (2012) A novel scheduling scheme for finite buffer service in time-varying channels. In: 14th IEEE International Conference on Communication Technology (ICCT 2012), 9-11 Nov 2012, Chengdu; China.
Ramesh Kumar, Nandini and Xiang, Wei and Soar, Jeffrey (2011) A novel image compressive sensing method based on complex measurements. In: DICTA 2011: International Conference on Digital Image Computing: Techniques and Application, 6-8 Dec 2011 , Noosa, Australia.
Qin, Yongrui and Wang, Hua and Sun, Lili (2011) Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments. In: 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011), 22-25 Mar 2011, Biopolis, Singapore.
Siuly, and Li, Yan and Wu, Jinglong and Yang, Jingjing (2011) Developing a logistic regression model with cross-correlation for motor imagery signal recognition. In: IEEE/ICME International Conference on Complex Medical Engineering (ICME 2011), 22-25 May 2011, Harbin, China.
Sun, Xiaoxun and Sun, Lili and Wang, Hua (2011) Extended k-anonymity models against sensitive attribute disclosure. Computer Communications , 34 (4). pp. 526-535. ISSN 0140-3664
Zhou, Xiaokang and Chen, Hong and Jin, Qun and Yong, Jianming (2011) Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone. In: ICUIMC 2011: 5th International Conference on Ubiquitous Information Management and Communication , 21-23 Feb 2011, Seoul, Korea.
Norman, Mark and Leis, John (2010) A passive approach to detection of traffic shaping. In: APSIPA 2010: 2nd Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 14-17 Dec 2010, Biopolis, Singapore.
Zhou, Hong and Zhang, Zhongwei (2010) Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks. In: 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2010), 23-25 Sep 2010, Chengdu, China.
Walters-Williams, Janett and Li, Yan (2010) Comparison of extended and unscented Kalman filters applied to EEG signals. In: 2010 IEEE/ICME International Conference on Complex Medical Engineering (CME 2010), 13-15 July 2010, Gold Coast, Australia.
Nguyen-Ky, T. and Leis, J. and Xiang, W. (2010) An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation. Computers and Electrical Engineering, 36 (4). pp. 664-675. ISSN 0045-7906
Li, Chang and Wang, Yafeng and Xiang, Wei and Yang, Dacheng (2010) Performance of user cooperation and clustering scheme in cellular networks. In: 2010 IEEE International Conference on Communications: Communications: Accelerating Growth and Development (ICC 2010), 23-27 May 2010, Capetown, South Africa.
Wei, Jingxuan and Wang, Yuping and Wang, Hua (2010) A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization. Computing and Informatics, 29 (5). pp. 701-708. ISSN 1511-9491
Ma, Guangzhi and Lu, Yansheng and Wen, Peng and Song, Engmin (2010) A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory. In: 2010 IEEE/ICME International Conference on Complex Medical Engineering (CME 2010), 13-15 July 2010, Gold Coast, Australia.
Wang, Hua and Cao, Jinli and Zhang, Yanchun (2009) Delegating revocations and authorizations in collaborative business environments. Information Systems Frontiers, 11 (3). pp. 293-305. ISSN 1387-3326
Deng, Xiaotie and Fang, Qizhi and Sun, Xiaoxun (2009) Finding nucleolus of flow game. Journal of Combinatorial Optimization , 18 (1). pp. 64-86. ISSN 1382-6905
Braithwaite, Stephen and Addie, Ron (2009) Non-linear echo cancellation - a Bayesian approach. In: 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008), 15-17 Dec 2008, Gold Coast, Australia.
Khalil, Faten and Li, Jiuyong and Wang, Hua (2009) An integrated model for next page access prediction. International Journal of Knowledge and Web Intelligence, 1 (1/2). pp. 48-80. ISSN 1755-8255
Sun, Lili and Wang, Hua and Yong, Jianming (2009) Authorization algorithms for permission-role assignments. Journal of Universal Computer Science, 15 (9). pp. 1782-1796. ISSN 0948-695X
Zhang, Ji and Gao, Qigang and Wang, Hai and Liu, Qing and Xu, Kai (2009) Detecting projected outliers in high-dimensional data streams. In: DEXA 2009: 20th International Conference on Database and Expert Systems Applications, 31 Aug- 4Sep 2009, Linz, Austria.
Sun, Xiaoxun and Wang, Hua and Sun, Lili (2009) Extended K-anonymity models against attribute disclosure. In: NSS 2009: 3rd International Conference on Network and System Security, 19-21 Oct 2009, Gold Coast, Australia.
Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2009) Injecting purpose and trust into data anonymisation. In: CIKM 2009: 18th ACM International Conference on Information and Knowledge Management , 2-6 Nov 2009, Hong Kong, China.
Williams, Janett and Li, Yan (2008) A case study using neural networks algorithms: horse racing predictions in Jamaica. In: ICAI 2008: International Conference on Artificial Intelligence , 14-17 Jul 2008, Las Vegas, NV. United States.
Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) On the complexity of restricted k-anonymity problem. In: APWeb 2008: 10th Asia-Pacific Web Conference, 26-28 Apr 2008, Shenyang, China.
Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Truta, Traian Marius (2008) Enhanced p-sensitive k-anonymity models for privacy preserving data publishing. Transactions on Data Privacy, 1 (2). pp. 53-66. ISSN 1888-5063
Zhang, Ji and Gao, Qigang and Wang, Hai (2008) SPOT: a system for detecting projected outliers from high-dimensional data streams. In: 24th IEEE International Conference on Data Engineering (ICDE 2008) , 7-12 Apr 2008, Cancun, Mexico .
Nguyen-Ky, Tai and Leis, John W. and Xiang, Wei (2007) An improved error estimation algorithm for stereophonic acoustic echo cancellation systems. In: ICSPCS 2007: 1st International Conference on Signal Processing and Communication Systems, 17-19 Dec 2007, Gold Coast, Australia.
Hu, Hong and Li, Jiuyong and Wang, Hua and Daggard, Grant (2006) Combined gene selection methods for microarray data analysis. In: 10th International Conference Knowledge-Based Intelligent Information and Engineering Systems, 9-11 Oct 2006, Bournemouth, UK.
Shi, Chenggen and Lu, Jie and Zhang, Guangquan and Zhou, Hong (2006) An extended branch and bound algorithm for linear bilevel programming. Applied Mathematics and Computation, 180 (2). pp. 529-537. ISSN 0096-3003
Bashar, Md. Rezaul and Young, Nam Mi and Rhee, Phill Kyu (2006) A context model for ubiquitous computing applications. In: KES 2006: 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, 9-11 Oct 2006, Bournemouth, United Kingdom.
Braithwaite, Stephen (2006) Implementation of AQMs on Linux made easy. In: OSDC 2006: Open Source Developers' Conference, 6-8 Dec 2006, Melbourne, Australia.
Li, Zhi and Zhang, Zhongwei (2005) A coupled fuzzy logic control for routers' queue management over TCP/AQM networks. In: 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), 14-16 Sep 2005, Melbourne, Australia.
Wang, Hua and Sun, Lili and Zhang, Yanchun and Cao, Jinli (2005) Authorization algorithms for the mobility of user-role relationship. In: ACSC 2005: 28th Australasian Computer Science Conference, 28 Jan-3 Feb 2005, Newcastle, Australia.
Li, Yan and Wen, Peng (2005) An ensemble learning algorithm for blind signal separation problem. In: 2005 International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA 2005), 28- 30 Nov 2005, Vienna, Austria .
Li, Yan and Chi, Zheru (2005) MR brain image segmentation based on self-organizing map network. International Journal of Information Technology, 11 (8). pp. 45-53. ISSN 0218-7957
Hu, Hong and Li, Jiuyong (2005) Using association rules to make rule-based classifiers robust. In: ADC 2005: 16th Australasian Database Conference, 31 Jan-3 Feb 2005, Newcastle, Australia.
Loh, Chew Ping (2004) Implementation of JPEG-2000 standard for the next generation image compression. [USQ Project] (Unpublished)
Leis, John W. (2004) Enhancing the performance of vector quantizers for data compression and pattern matching using sorted codebooks. Technical Report. University of Southern Queensland, Faculty of Engineering and Surveying, Toowoomba, Australia.
Cubero, Samuel Nacion (2004) A general purpose inverse kinematics algorithm for all manipulators. In: 11th Annual Conference on Mechatronics and Machine Vision in Practice, 28 Nov - 3 Dec 2004 , Macau, China.
Li, Yan and Wen, Peng and Powers, David (2003) Methods for the blind signal separation problem. In: ICNNSP 2003: International Conference on Neural Networks and Signal Processing , 14-17 Dec 2003 , Nanjing, China.