Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (16)
- Computer Science (9)
- Services Computing (7)
- Uberveillance (7)
- Bayesian Networks (5)
-
- Electrical Power Systems (4)
- Government (4)
- Social Implications (4)
- Arithmetic Circuits (3)
- Australia (3)
- Defect Prediction (3)
- Diagnosis (3)
- Emergency Management (3)
- Katina Michael (3)
- Net-Centric Collaboration (3)
- Privacy (3)
- RFID (3)
- Robotics (3)
- Service level agreements (3)
- Software Metrics (3)
- Aby filters (2)
- Adoption (2)
- Ajax (2)
- Anti-chipping (2)
- Artificial intelligence (2)
- Artificial neural network (2)
- Attitudes (2)
- Automatic Identification (2)
- Automatic identification (2)
- Bayesian networks (2)
- Publication
-
- Philadelphia University, Jordan (17)
- Andrew McCallum (11)
- Professor Katina Michael (11)
- Jia Zhang (10)
- Mark Perry (9)
-
- Associate Professor Katina Michael (7)
- William Osei-Poku (6)
- M. G. Michael (5)
- Michael J Rees (5)
- Ole J Mengshoel (5)
- Xiao-Jun Yang (4)
- Chien Hsun Chen (3)
- Dr. Huanjing Wang (3)
- Dr. Torstein Tengs (3)
- Erik G Learned-Miller (3)
- Eva Hudlicka (3)
- Hanna M. Wallach (3)
- Marcel Adam Just (3)
- Matthias Bärwolff (3)
- Rudolf Kaehr (3)
- Andrew Kae (2)
- Bruce Vanstone (2)
- Chunping Hu (2)
- Dr Shah Jahan Miah (2)
- Dr. Muhammad Zubair Asghar (2)
- Gabriel A. Moreno (2)
- John Mark Ockerbloom (2)
- Liana Napalkova (2)
- Neil Immerman (2)
- R. Manmatha (2)
- File Type
Articles 1 - 30 of 178
Full-Text Articles in Entire DC Network
The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield
The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield
Clive Harfield
In England and Wales, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two different contexts …
Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael
Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael
Professor Katina Michael
No abstract provided.
Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff
Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff
Matthias Bärwolff
The core insight to the history of the dynamics of limitations, restrictions, and discriminations on the Internet is that they are largely a corollary to the futility of obtaining an entirely 'neutral' design of the Internet that is both robust and scalable. The question then is how to arrange the necessary volume of discriminations so as to obtain a design as value free as possible, for only such a design can be in line with the premise of stipulating no values other than (1) good order at large, and (2) the appreciation of the pursuit of local purposes by individuals. …
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Bruce Vanstone
The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract future growth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
M. G. Michael
No abstract provided.
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
Professor Katina Michael
No abstract provided.
Memory Reconsolidation For Natural Language Processing, Kum Tu, David Cooper, Hava Siegelmann
Memory Reconsolidation For Natural Language Processing, Kum Tu, David Cooper, Hava Siegelmann
Hava Siegelmann
We propose a model of memory reconsolidation that can output new sentences with additional meaning after refining information from input sentences and integrating them with related prior experience. Our model uses available technology to first disambiguate the meanings of words and extracts information from the sentences into a structure that is an extension to semantic networks. Within our long-term memory we introduce an action relationships database reminiscent of the way symbols are associated in brain, and propose an adaptive mechanism for linking these actions with the different scenarios. The model then fills in the implicit context of the input and …
Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya
Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya
Dr. Huanjing Wang
A large system often goes through multiple software project development cycles, in part due to changes in operation and development environments. For example, rapid turnover of the development team between releases can influence software quality, making it important to mine software project data over multiple system releases when building defect predictors. Data collection of software attributes are often conducted independent of the quality improvement goals, leading to the availability of a large number of attributes for analysis. Given the problems associated with variations in development process, data collection, and quality goals from one release to another emphasizes the importance of …
Short-Wavelength Technology And The Potential For Distributed Networks Of Small Radar Systems, David Mclaughlin, David Pepyne, Brenda Philips, James Kurose, Michael Zink, David Westbrook, Eric Lyons, Eric Knapp, Anthony Hopf, Alfred Defonzo, Robert Contreras, Theodore Djaferis, Edin Insanic, Stephen Frasier, V. Chandrasekar, Francesc Junyent, Nitin Bharadwaj, Yanting Wang, Yuxiang Liu, Brenda Dolan, Kelvin Droegemeier, Jerald Brotzge, Ming Xue, Kevin Kloesel, Keith Brewster, Frederick Carr, Sandra Cruz-Pol, Kurt Hondl, Pavlos Kollias
Short-Wavelength Technology And The Potential For Distributed Networks Of Small Radar Systems, David Mclaughlin, David Pepyne, Brenda Philips, James Kurose, Michael Zink, David Westbrook, Eric Lyons, Eric Knapp, Anthony Hopf, Alfred Defonzo, Robert Contreras, Theodore Djaferis, Edin Insanic, Stephen Frasier, V. Chandrasekar, Francesc Junyent, Nitin Bharadwaj, Yanting Wang, Yuxiang Liu, Brenda Dolan, Kelvin Droegemeier, Jerald Brotzge, Ming Xue, Kevin Kloesel, Keith Brewster, Frederick Carr, Sandra Cruz-Pol, Kurt Hondl, Pavlos Kollias
James Kurose
Dense networks of short-range radars capable of mapping storms and detecting atmospheric hazards are described. Composed of small X-band (9.4 GHz) radars spaced tens of kilometers apart, these networks defeat the Earth curvature blockage that limits today's long-range weather radars and enables observing capabilities fundamentally beyond the operational state-of-the-art radars. These capabilities include multiple Doppler observations for mapping horizontal wind vectors, subkilometer spatial resolution, and rapid-update (tens of seconds) observations extending from the boundary layer up to the tops of storms. The small physical size and low-power design of these radars permits the consideration of commercial electronic manufacturing approaches and …
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Tobias Hahn
The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract futuregrowth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.
النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University
النتائج المالية لشهادة التسجيل للحصول على الآيزو في الشركات الصناعية المساهمة العامة, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao
High-Dimensional Software Engineering Data And Feature Selection, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao
Dr. Huanjing Wang
Software metrics collected during project development play a critical role in software quality assurance. A software practitioner is very keen on learning which software metrics to focus on for software quality prediction. While a concise set of software metrics is often desired, a typical project collects a very large number of metrics. Minimal attention has been devoted to finding the minimum set of software metrics that have the same predictive capability as a larger set of metrics – we strive to answer that question in this paper. We present a comprehensive comparison between seven commonly-used filter-based feature ranking techniques (FRT) …
M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael
M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael
Professor Katina Michael
No abstract provided.
Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Tobias Hahn
There is a long established history of applying Artificial Neural Networks (ANNs) to financial data sets. In this paper, the authors demonstrate the use of this methodology to develop a financially viable, short-term trading system. When developing short-term systems, the authors typically site the neural network within an already existing non-neural trading system. This paper briefly reviews an existing medium-term long-only trading system, and then works through the Vanstone and Finnie methodology to create a short-term focused ANN which will enhance this trading strategy. The initial trading strategy and the ANN enhanced trading strategy are comprehensively benchmarked both in-sample and …
An Ontology For Autonomic License Management, Qian Zhao, Mark Perry
An Ontology For Autonomic License Management, Qian Zhao, Mark Perry
Mark Perry
The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …
A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry
A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry
Mark Perry
Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.
Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry
Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry
Mark Perry
Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of off-the-shelf, packaged, consumer software. However, as component-based software gradually becomes mainstream in software development, new component-oriented licensing systems are required. This paper proposes an enterprise component licensing model for the management of software component licenses. The model provides a comprehensive license management framework allowing for extensibility and flexibility. Furthermore, we identify differences between stand-alone …
One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael
One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael
Michael Organ
No abstract provided.
Hybridisation Of Evolutionary Algorithms For Solving Multi-Objective Simulation Optimisation Problems, Liana Napalkova
Hybridisation Of Evolutionary Algorithms For Solving Multi-Objective Simulation Optimisation Problems, Liana Napalkova
Liana Napalkova
No abstract provided.
An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang
An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang
Jia Zhang
No abstract provided.
Open & Mobile Equipment, Timothy J. Rowley
Open & Mobile Equipment, Timothy J. Rowley
Timothy J Rowley
This was a "Lightning Presentation" about making cutting edge technology available to university students.
Student Staff: A Village Philosophy, Lisa Caughron
Student Staff: A Village Philosophy, Lisa Caughron
Lisa Caughron
No abstract provided.
Controlling Technology, K. Michael, M. Michael
Controlling Technology, K. Michael, M. Michael
Associate Professor Katina Michael
No abstract provided.
Controlling Technology, K. Michael, M. G. Michael
Digital Audio In The Library, Richard Griscom
Digital Audio In The Library, Richard Griscom
Richard Griscom
An incomplete draft of a book intended to serve as a guide and reference for librarians who are responsible for implementing digital audio services in their libraries. The book is divided into two parts. Part 1, "Digital Audio Technology," covers the fundamentals of recorded sound and digital audio, including a description of digital audio formats, how digital audio is delivered to the listener, and how digital audio is created. Part 2, "Digital Audio in the Library," covers digitizing local collections, providing streaming audio reserves, and using digital audio to preserve analog recordings.
Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang
Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang
Jia Zhang
No abstract provided.
Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang
Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang
Jia Zhang
Service Oriented Architecture (SOA) is one central technical foundation supporting the rapidly emerging Cloud Computing paradigm. To date, however, its application practice is not always successful. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a variationoriented analysis method of performing architectural building blocks (ABB)-based SOA solution design for enabling cloud application design. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables eventbased variation notification and propagation analysis. We report a prototype tool and describe how we extend the …
The Prüm Treaty And The Implications Of The European Court Of Human Rights’ Ruling Against The Uk’S Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects, K. Michael
Associate Professor Katina Michael
See CTCP release at http://ctcp.uow.edu.au/news/UOW065026.html
Decision Making, Philadelphia University
Decision Making, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
End User As Application Developer For Decision Support, Shah Jahan Miah
End User As Application Developer For Decision Support, Shah Jahan Miah
Dr Shah Jahan Miah
This paper discusses a new generation end-user centred information service view, for developing decision support applications. The tailorable solution allows specific applications to be designed by end-users, where integrity is assured by the architecture’s control in knowledge-based systems. In the development approach, the end-users at different level engage in interaction for secondary application creation. This initiative reinforces a shift from the traditional IS development process to a new provision where end-users can actively participate for a secondary application design. A secondary application design can be seen as a secondary activity for tailoring applications by the end users so that it …