Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Science (9)
- Services Computing (7)
- Bayesian Networks (5)
- Uberveillance (5)
- Electrical Power Systems (4)
-
- Arithmetic Circuits (3)
- Diagnosis (3)
- Government (3)
- LANGUAGE (3)
- Net-Centric Collaboration (3)
- Service level agreements (3)
- Aby filters (2)
- Adoption (2)
- Ajax (2)
- Anti-chipping (2)
- Artificial neural network (2)
- Australia (2)
- Automatic Identification (2)
- Bayesian networks (2)
- Business process (2)
- Chip Implants (2)
- Decision-making (2)
- Discrete Choice Analysis (2)
- E-Democracy (2)
- ERP (2)
- Electronic voting (2)
- Emergency Management (2)
- Employer-Employee (2)
- Expert Systems (2)
- Fundamental analysis (2)
- Publication
-
- Professor Katina Michael (11)
- Jia Zhang (10)
- Mark Perry (9)
- M. G. Michael (5)
- Marcel Adam Just (5)
-
- Michael J Rees (5)
- Ole J Mengshoel (5)
- Eva Hudlicka (3)
- Hanna M. Wallach (3)
- Andrew Kae (2)
- Bruce Vanstone (2)
- Dr. Muhammad Zubair Asghar (2)
- Erik G Learned-Miller (2)
- Gabriel A. Moreno (2)
- John Mark Ockerbloom (2)
- Neil Immerman (2)
- Robert H Yacobellis (2)
- Tobias Hahn (2)
- Amber Settle (1)
- Arcot Desai NARASIMHALU (1)
- C. Jason Woodard (1)
- Cheng-Kuang Wu (1)
- Christine L. Borgman (1)
- Clive Harfield (1)
- Dr Byron W. Keating (1)
- Dr Roba Abbas (1)
- Dr Samuel Fosso Wamba (1)
- Dr. Torstein Tengs (1)
- Gerome Miklau (1)
- Iliano Cervesato (1)
- File Type
Articles 1 - 30 of 105
Full-Text Articles in Physical Sciences and Mathematics
The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield
The European Court Of Human Rights Ruling Against Britain's Policy Of Keeping Fingerprints & Dna Samples Of Criminal Suspects, K. Michael, Clive Harfield
Clive Harfield
In England and Wales, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two different contexts …
Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael
Katina On Right Path To Test Tracking Technology, Courtney Trenwith, K. Michael
Professor Katina Michael
No abstract provided.
Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff
Towards Extending The Equilibrium Of Discrimination In The Internet To Its Fringes, Matthias Bärwolff
Matthias Bärwolff
The core insight to the history of the dynamics of limitations, restrictions, and discriminations on the Internet is that they are largely a corollary to the futility of obtaining an entirely 'neutral' design of the Internet that is both robust and scalable. The question then is how to arrange the necessary volume of discriminations so as to obtain a design as value free as possible, for only such a design can be in line with the premise of stipulating no values other than (1) good order at large, and (2) the appreciation of the pursuit of local purposes by individuals. …
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Bruce Vanstone
The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract future growth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
M. G. Michael
No abstract provided.
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
With Words That Last, Sean Nicholls, Leesha Mckenny, M.G. Michael, K. Michael
Professor Katina Michael
No abstract provided.
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Returns To Selecting Value Stocks In Australia – The Aby Filters, Bruce Vanstone, Tobias Hahn, Gavin Finnie
Tobias Hahn
The development of the Financial Crisis throughout 2008 and into 2009 has caused many fund managers to question their Growth based investment models. Interest appears to be again rekindled in the traditional Value based models, where investment decisions are based on sound company fundamentals rather than abstract futuregrowth expectations. This paper reviews a specific set of value based filters for selecting undervalued stocks which appeared in a series of papers published soon after the 2000 Dot-Com debacle. This paper documents the performance of these filters in the Australian stockmarket.
M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael
M.G. Michael And K. Michael (2009). "Uberveillance: Definition" In Ed. S. Butler, Fifth Edition Of The Macquarie Dictionary (Australia's National Dictionary, Sydney University), P. 1094, Susan Butler, M.G. Michael, K. Michael
Professor Katina Michael
No abstract provided.
Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Designing Short Term Trading Systems With Artificial Neural Networks, Bruce Vanstone, Gavin Finnie, Tobias Hahn
Tobias Hahn
There is a long established history of applying Artificial Neural Networks (ANNs) to financial data sets. In this paper, the authors demonstrate the use of this methodology to develop a financially viable, short-term trading system. When developing short-term systems, the authors typically site the neural network within an already existing non-neural trading system. This paper briefly reviews an existing medium-term long-only trading system, and then works through the Vanstone and Finnie methodology to create a short-term focused ANN which will enhance this trading strategy. The initial trading strategy and the ANN enhanced trading strategy are comprehensively benchmarked both in-sample and …
An Ontology For Autonomic License Management, Qian Zhao, Mark Perry
An Ontology For Autonomic License Management, Qian Zhao, Mark Perry
Mark Perry
The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …
A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry
A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry
Mark Perry
Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.
Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry
Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry
Mark Perry
Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of off-the-shelf, packaged, consumer software. However, as component-based software gradually becomes mainstream in software development, new component-oriented licensing systems are required. This paper proposes an enterprise component licensing model for the management of software component licenses. The model provides a comprehensive license management framework allowing for extensibility and flexibility. Furthermore, we identify differences between stand-alone …
One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael
One Million Downloads For Uow’S Research Online, Kate Mcilwain, Michael Organ, K. Michael, M. Michael
Michael Organ
No abstract provided.
An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang
An Integrated Service Model Approach For Enabling Soa, Liang-Jie Zhang, Jia Zhang
Jia Zhang
No abstract provided.
Open & Mobile Equipment, Timothy J. Rowley
Open & Mobile Equipment, Timothy J. Rowley
Timothy J Rowley
This was a "Lightning Presentation" about making cutting edge technology available to university students.
Student Staff: A Village Philosophy, Lisa Caughron
Student Staff: A Village Philosophy, Lisa Caughron
Lisa Caughron
No abstract provided.
Controlling Technology, K. Michael, M. G. Michael
Digital Audio In The Library, Richard Griscom
Digital Audio In The Library, Richard Griscom
Richard Griscom
An incomplete draft of a book intended to serve as a guide and reference for librarians who are responsible for implementing digital audio services in their libraries. The book is divided into two parts. Part 1, "Digital Audio Technology," covers the fundamentals of recorded sound and digital audio, including a description of digital audio formats, how digital audio is delivered to the listener, and how digital audio is created. Part 2, "Digital Audio in the Library," covers digitizing local collections, providing streaming audio reserves, and using digital audio to preserve analog recordings.
Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang
Componentization Of Business Process Layer In The Soa Reference Architecture, Liang-Jie Zhang, Jia Zhang
Jia Zhang
No abstract provided.
Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang
Architecture-Driven Variation Analysis For Designing Cloud Applications, Liang-Jie Zhang, Jia Zhang
Jia Zhang
Service Oriented Architecture (SOA) is one central technical foundation supporting the rapidly emerging Cloud Computing paradigm. To date, however, its application practice is not always successful. One major reason is the lack of a systematic engineering process and tool supported by reusable architectural artifacts. Toward this ultimate goal, this paper proposes a variationoriented analysis method of performing architectural building blocks (ABB)-based SOA solution design for enabling cloud application design. We present the modeling of solution-level architectural artifacts and their relationships, whose formalization enables eventbased variation notification and propagation analysis. We report a prototype tool and describe how we extend the …
Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar
Computer Assisted Diagnoses For Red Eye (Cadre), Dr. Muhammad Zubair Asghar
Dr. Muhammad Zubair Asghar
This paper introduces an expert System (ES) named as “CADRE-Computer Assisted Diagnoses for Red Eye. Mostly the remote areas of the population are deprived of the facilities of having experts in eye disease. So it is the need of the day to store the expertise of Eye specialists in computers through using ES technology. This ES is a rule-based Expert System that assists in red-eye diagnosis and treatment. The knowledge acquired from literature review and human experts of the specific domain was used as a base for analysis, diagnosis and recommendations. CADRE evaluates the risk factors of 20 eye diseases …
Structure Theorem And Strict Alternation Hierarchy For Fo2 On Words, Philipp Weis, Neil Immerman
Structure Theorem And Strict Alternation Hierarchy For Fo2 On Words, Philipp Weis, Neil Immerman
Neil Immerman
It is well-known that every first-order property on words is expressible using at most three variables. The subclass of properties expressible with only two variables is also quite interesting and well-studied. We prove precise structure theorems that characterize the exact expressive power of first-order logic with two variables on words. Our results apply to both the case with and without a successor relation.
For both languages, our structure theorems show exactly what is expressible using a given quantifier depth, n, and using m blocks of alternating quantifiers, for any m ≤ n. Using these characterizations, we prove, among other results, …
A Framework For Technology Transfer, Arcot Desai Narasimhalu
A Framework For Technology Transfer, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Technology transfer is often perceived to be transfer of intellectual property (IP). Very few realize that there are other means of transferring technology. Most common means of technology transfer is the transfer of the IP alone. While this is interesting in itself, it is not the best means of transferring technology in all cases. IP such as patents, trademark and copyrighted material can easily be transferred in this manner. However, that is the lowest level of technology transfer possible. The next level of technology transfer is the ability to handover technology from the originating team to the recipient team. This …
Lazy-Adaptive Tree: An Optimized Index Structure For Flash Devices, D. Agrawal, D. Ganesan, Ramesh K. Sitaraman, Y. Diao, S. Singh
Lazy-Adaptive Tree: An Optimized Index Structure For Flash Devices, D. Agrawal, D. Ganesan, Ramesh K. Sitaraman, Y. Diao, S. Singh
Ramesh Sitaraman
Flash memories are in ubiquitous use for storage on sensor nodes, mobile devices, and enterprise servers. However, they present significant challenges in designing tree indexes due to their fundamentally different read and write characteristics in comparison to magnetic disks. In this paper, we present the Lazy-Adaptive Tree (LA-Tree), a novel index structure that is designed to improve performance by minimizing accesses to ash. The LA-tree has three key features: 1) it amortizes the cost of node reads and writes by performing update operations in a lazy manner using cascaded buffers, 2) it dynamically adapts buffer sizes to workload using an …
Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair
Cayley-Dixon Projection Operator For Multi-Univariate Composed Polynomials, Arthur Chtcherba, Deepak Kapur, Manfred Minimair
Manfred Minimair
The Cayley-Dixon formulation for multivariate projection operators (multiples of resultants of multivariate polynomials) has been shown to be efficient (both exper- imentally and theoretically) for simultaneously eliminating many variables from a polynomial system. In this paper, the behavior of the Cayley-Dixon projection op- erator and the structure of Dixon matrices are analyzed for composed polynomial systems constructed from a multivariate system in which each variable is substi- tuted by a univariate polynomial in a distinct variable. Under some conditions, it is shown that a Dixon projection operator of the composed system can be expressed as a power of the resultant …
Relating State-Based And Process-Based Concurrency Through Linear Logic, Iliano Cervesato, Andre Scedrov
Relating State-Based And Process-Based Concurrency Through Linear Logic, Iliano Cervesato, Andre Scedrov
Iliano Cervesato
This paper has the purpose of reviewing some of the established relationships between logic and concurrency, and of exploring new ones. Concurrent and distributed systems are notoriously hard to get right. Therefore, following an approach that has proved highly beneficial for sequential programs, much effort has been invested in tracing the foundations of concurrency in logic. The starting points of such investigations have been various idealized languages of concurrent and distributed programming, in particular the well-established state-transformation model inspired by Petri nets and multiset rewriting, and the prolific process-based models such as the π-calculus and other process algebras. In nearly …
Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom
Architectural Mismatch: Why Reuse Is Still So Hard, David Garlan, Robert Allen, John Mark Ockerbloom
John Mark Ockerbloom
In this article, David Garlan, Robert Allen, and John Ockerbloom reflect on the state of architectural mismatch, a term they coined in their 1995 IEEE Software article, "Architectural Mismatch: Why Reuse Is So Hard." Although the nature of software systems has changed dramatically since the earlier article was published, the challenge of architectural mismatch remains an important concern for the software engineering field.
Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba
Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba
Dr Samuel Fosso Wamba
Using a Proof of Concept approach, this paper examines RFID’s impact on inventory control of a small-to-medium retailer. Results indicate that RFID technology can function effectively in a small-to-medium hardware environment. Also, the majority of the simulations recorded reasonable read rates even though the simulations were set up over a short period of time without a great deal of fine-tuning. Moreover, RFID could have a positive impact on the inventory-related processes of the organisation by either streamlining or formalizing them and facilitate the electronic storage of information captured in real-time, relating to the movement of stock and the amount of …
Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba
Using Rfid To Overcome Inventory Control Challenges: A Proof Of Concept, Dane Hamilton, Katina Michael, Samuel Fosso Wamba
Professor Katina Michael
Using a Proof of Concept approach, this paper examines RFID’s impact on inventory control of a small-to-medium retailer. Results indicate that RFID technology can function effectively in a small-to-medium hardware environment. Also, the majority of the simulations recorded reasonable read rates even though the simulations were set up over a short period of time without a great deal of fine-tuning. Moreover, RFID could have a positive impact on the inventory-related processes of the organisation by either streamlining or formalizing them and facilitate the electronic storage of information captured in real-time, relating to the movement of stock and the amount of …
Computational Thinking (Ct): On Weaving It In, Paul Curzon, Joan Peckham, Harriet G. Taylor, Amber Settle, Eric Roberts