Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Selected Works

2009

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 178

Full-Text Articles in Entire DC Network

The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield Feb 2013

The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield

Clive Harfield

In England and Wales, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two different contexts …


Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael Dec 2009

Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael

Professor Katina Michael

No abstract provided.


Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff Dec 2009

Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff

Matthias Bärwolff

The core insight to the history of the dynamics of limitations, restrictions, and discriminations on the Internet is that they are largely a corollary to the futility of obtaining an entirely 'neutral' design of the Internet that is both robust and scalable. The question then is how to arrange the necessary volume of discriminations so as to obtain a design as value free as possible, for only such a design can be in line with the premise of stipulating no values other than (1) good order at large, and (2) the appreciation of the pursuit of local purposes by individuals. …


Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie Dec 2009

Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie

Bruce Vanstone

The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract future growth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.


With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael Dec 2009

With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael

M. G. Michael

No abstract provided.


With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael Dec 2009

With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael

Professor Katina Michael

No abstract provided.


Memory Reconsolidation For Natural Language Processing, Kum Tu, David Cooper, Hava Siegelmann Dec 2009

Memory Reconsolidation For Natural Language Processing, Kum Tu, David Cooper, Hava Siegelmann

Hava Siegelmann

We propose a model of memory reconsolidation that can output new sentences with additional meaning after refining information from input sentences and integrating them with related prior experience. Our model uses available technology to first disambiguate the meanings of words and extracts information from the sentences into a structure that is an extension to semantic networks. Within our long-term memory we introduce an action relationships database reminiscent of the way symbols are associated in brain, and propose an adaptive mechanism for linking these actions with the different scenarios. The model then fills in the implicit context of the input and …


Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya Dec 2009

Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya

Dr. Huanjing Wang

A large system often goes through multiple software project development cycles, in part due to changes in operation and development environments. For example, rapid turnover of the development team between releases can influence software quality, making it important to mine software project data over multiple system releases when building defect predictors. Data collection of software attributes are often conducted independent of the quality improvement goals, leading to the availability of a large number of attributes for analysis. Given the problems associated with variations in development process, data collection, and quality goals from one release to another emphasizes the importance of …


Short-Wavelength Technology And The Potential For Distributed Networks Of Small Radar Systems, David Mclaughlin, David Pepyne, Brenda Philips, James Kurose, Michael Zink, David Westbrook, Eric Lyons, Eric Knapp, Anthony Hopf, Alfred Defonzo, Robert Contreras, Theodore Djaferis, Edin Insanic, Stephen Frasier, V. Chandrasekar, Francesc Junyent, Nitin Bharadwaj, Yanting Wang, Yuxiang Liu, Brenda Dolan, Kelvin Droegemeier, Jerald Brotzge, Ming Xue, Kevin Kloesel, Keith Brewster, Frederick Carr, Sandra Cruz-Pol, Kurt Hondl, Pavlos Kollias Dec 2009

Short-Wavelength Technology And The Potential For Distributed Networks Of Small Radar Systems, David Mclaughlin, David Pepyne, Brenda Philips, James Kurose, Michael Zink, David Westbrook, Eric Lyons, Eric Knapp, Anthony Hopf, Alfred Defonzo, Robert Contreras, Theodore Djaferis, Edin Insanic, Stephen Frasier, V. Chandrasekar, Francesc Junyent, Nitin Bharadwaj, Yanting Wang, Yuxiang Liu, Brenda Dolan, Kelvin Droegemeier, Jerald Brotzge, Ming Xue, Kevin Kloesel, Keith Brewster, Frederick Carr, Sandra Cruz-Pol, Kurt Hondl, Pavlos Kollias

James Kurose

Dense networks of short-range radars capable of mapping storms and detecting atmospheric hazards are described. Composed of small X-band (9.4 GHz) radars spaced tens of kilometers apart, these networks defeat the Earth curvature blockage that limits today's long-range weather radars and enables observing capabilities fundamentally beyond the operational state-of-the-art radars. These capabilities include multiple Doppler observations for mapping horizontal wind vectors, subkilometer spatial resolution, and rapid-update (tens of seconds) observations extending from the boundary layer up to the tops of storms. The small physical size and low-power design of these radars permits the consideration of commercial electronic manufacturing approaches and …


Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie Nov 2009

Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie

Tobias Hahn

The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract futuregrowth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.


النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University Nov 2009

النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao Nov 2009

High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao

Dr. Huanjing Wang

Software metrics collected during project development play a critical role in software quality assurance. A software practitioner is very keen on learning which software metrics to focus on for software quality prediction. While a concise set of software metrics is often desired, a typical project collects a very large number of metrics. Minimal attention has been devoted to finding the minimum set of software metrics that have the same predictive capability as a larger set of metrics – we strive to answer that question in this paper. We present a comprehensive comparison between seven commonly-used filter-based feature ranking techniques (FRT) …


M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael Oct 2009

M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael

Professor Katina Michael

No abstract provided.


Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn Oct 2009

Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn

Tobias Hahn

There is a long established history of applying Artificial Neural Networks (ANNs) to financial data sets. In this paper, the authors demonstrate the use of this methodology to develop a financially viable, short-term trading system. When developing short-term systems, the authors typically site the neural network within an already existing non-neural trading system. This paper briefly reviews an existing medium-term long-only trading system, and then works through the Vanstone and Finnie methodology to create a short-term focused ANN which will enhance this trading strategy. The initial trading strategy and the ANN enhanced trading strategy are comprehensively benchmarked both in-sample and …


An Ontology For Autonomic License Management, Qian Zhao, Mark Perry Oct 2009

An Ontology For Autonomic License Management, Qian Zhao, Mark Perry

Mark Perry

The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …


A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry Oct 2009

A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry

Mark Perry

Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.


Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry Oct 2009

Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry

Mark Perry

Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of off-the-shelf, packaged, consumer software. However, as component-based software gradually becomes mainstream in software development, new component-oriented licensing systems are required. This paper proposes an enterprise component licensing model for the management of software component licenses. The model provides a comprehensive license management framework allowing for extensibility and flexibility. Furthermore, we identify differences between stand-alone …


One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael Oct 2009

One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael

Michael Organ

No abstract provided.


Hybridisation Of Evolutionary Algorithms For Solving Multi-Objective Simulation Optimisation Problems, Liana Napalkova Oct 2009

Hybridisation Of Evolutionary Algorithms For Solving Multi-Objective Simulation Optimisation Problems, Liana Napalkova

Liana Napalkova

No abstract provided.


An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang Sep 2009

An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


Open & Mobile Equipment, Timothy J. Rowley Sep 2009

Open & Mobile Equipment, Timothy J. Rowley

Timothy J Rowley

This was a "Lightning Presentation" about making cutting edge technology available to university students.


Student Staff: A Village Philosophy, Lisa Caughron Sep 2009

Student Staff: A Village Philosophy, Lisa Caughron

Lisa Caughron

No abstract provided.


Controlling Technology, K. Michael, M. Michael Sep 2009

Controlling Technology, K. Michael, M. Michael

Associate Professor Katina Michael

No abstract provided.


Controlling Technology, K. Michael, M. G. Michael Sep 2009

Controlling Technology, K. Michael, M. G. Michael

M. G. Michael

No abstract provided.


Digital Audio In The Library, Richard Griscom Sep 2009

Digital Audio In The Library, Richard Griscom

Richard Griscom

An incomplete draft of a book intended to serve as a guide and reference for librarians who are responsible for implementing digital audio services in their libraries. The book is divided into two parts. Part 1, "Digital Audio Technology," covers the fundamentals of recorded sound and digital audio, including a description of digital audio formats, how digital audio is delivered to the listener, and how digital audio is created. Part 2, "Digital Audio in the Library," covers digitizing local collections, providing streaming audio reserves, and using digital audio to preserve analog recordings.


Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang Aug 2009

Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang

Jia Zhang

No abstract provided.


Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang Aug 2009

Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang

Jia Zhang

Service Oriented Architecture (SOA) is one central technical foundation supporting the rapidly emerging Cloud Computing paradigm. To date, however, its application practice is not always successful. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a variationoriented analysis method of performing architectural building blocks (ABB)-based SOA solution design for enabling cloud application design. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables eventbased variation notification and propagation analysis. We report a prototype tool and describe how we extend the …


The Prüm Treaty And The Implications Of The European Court Of Human Rights’ Ruling Against The Uk’S Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects, K. Michael Aug 2009

The Prüm Treaty And The Implications Of The European Court Of Human Rights’ Ruling Against The Uk’S Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects, K. Michael

Associate Professor Katina Michael

See CTCP release at http://ctcp.uow.edu.au/news/UOW065026.html


Decision Making, Philadelphia University Aug 2009

Decision Making, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


End User As Application Developer For Decision Support, Shah Jahan Miah Aug 2009

End User As Application Developer For Decision Support, Shah Jahan Miah

Dr Shah Jahan Miah

This paper discusses a new generation end-user centred information service view, for developing decision support applications. The tailorable solution allows specific applications to be designed by end-users, where integrity is assured by the architecture’s control in knowledge-based systems. In the development approach, the end-users at different level engage in interaction for secondary application creation. This initiative reinforces a shift from the traditional IS development process to a new provision where end-users can actively participate for a secondary application design. A secondary application design can be seen as a secondary activity for tailoring applications by the end users so that it …