Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Faculty of Informatics - Papers (Archive)

Era2015

Articles 1 - 30 of 39

Full-Text Articles in Physical Sciences and Mathematics

Efficient Fair Conditional Payments For Outsourcing Computations, Xiaofeng Chen, Jin Li, Willy Susilo Jan 2012

Efficient Fair Conditional Payments For Outsourcing Computations, Xiaofeng Chen, Jin Li, Willy Susilo

Faculty of Informatics - Papers (Archive)

The outsourcing computations in distributed environments suffer from the trust problems between the outsourcer and the workers. All existing solutions only assume the rational lazybut- honest workers. In this paper, we first introduce the rational lazy-and-partially-dishonest workers in the outsourcing computation model. In addition, we propose a new fair conditional payment scheme for outsourcing computation that is only based on traditional electronic cash systems. The proposed construction uses a semitrusted third party T to achieve the fairness and efficiency. However, is only involved in the protocol in the exceptional case, namely in the case of disputes. Moreover, since neither the …


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Jan 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Faculty of Informatics - Papers (Archive)

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration …


A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin Jan 2012

A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

Epidemic protocols belong to a class of routing paradigm that have wide ranging applications in Delay Tolerant Networks (DTNs) due to their simplicity, low delays, and little to no reliance on special nodes. To this end, a comprehensive study of their performance will serve as an important guide to future protocol designers. Unfortunately, to date, there is no work that studies epidemic routing protocols using a common framework that evaluates their performance objectively using the same mobility model and parameters. To this end, we study four categories of epidemic routing protocols. Namely, P-Q epidemic, epidemic with Time-To-Live (TTL), epidemic with …


On Crystal Sets, Chun Li, Jennifer Seberry Jan 2012

On Crystal Sets, Chun Li, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

We are interested in 2-crystal sets and protocrystal sets in which every difference between distinct elements occurs zero or an even number of times. We show that several infinite families of such sets exist. We also give non-existence theorems for infinite families. We find conditions to limit the computer search space for such sets. We note that search for 2-crystal sets (n; k1, k2), k =k1 + k2 even, in a set of size n, immediately cuts the search space for two circulant weighing matrices with periodic autocorrelation function zero from 32n to …


The Fallout From Emerging Technologies: Surveillance, Social Networks And Suicide, Katina Michael, M G. Michael Jan 2011

The Fallout From Emerging Technologies: Surveillance, Social Networks And Suicide, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

Saint Augustine of Hippo (354-430 CE) [1] one of the most revered doctors of the ecclesia catholica, might not have been so highly esteemed had he fl ourished centuries afterwards in a world of uberveillance [2]. One of the unique aspects of Augustine's life that endeared him to the community of the faithful, both past and present, was his rising up from the "fornications" [3] and the "delight in thievery" [4] to become a paradigm for both the eastern and western churches of the penitent who becomes a saint.


Consumers, Alrc Privacy Principles And The 2010 Healthcare Identifiers Act, Jennifer A. Heath Jan 2011

Consumers, Alrc Privacy Principles And The 2010 Healthcare Identifiers Act, Jennifer A. Heath

Faculty of Informatics - Papers (Archive)

Aspects of the 2010 Healthcare Identifiers Act (HIA) are compared to the Australian Law Reform Commission (ALRC) Unified Privacy Principles. The opportunity for improved healthcare delivery through the enabling healthcare identifiers is acknowledged and discussion moves beyond such justifications to consideration of broader implications for Australian society. Law Academic Roger Magnusson’s three broad, sequential conceptual shifts in health privacy provide a framework for the discussion. Lost opportunities for Australian consumers are also highlighted.


Creating Value From Business Analytics Systems: The Impact Of Strategy, Graeme Shanks, Rajeev Sharma Jan 2011

Creating Value From Business Analytics Systems: The Impact Of Strategy, Graeme Shanks, Rajeev Sharma

Faculty of Informatics - Papers (Archive)

Business analytics systems can potentially contribute to firm performance and create competitive advantage. However, these benefits do not always follow from investment in business analytics technology. This paper argues that dynamic capabilities, enabled by business analytics technology, lead to value-creating actions and ultimately to improved firm performance. We develop a theoretical model that explains how organizational strategy relates to both business analytics technology and organizational structure, and impacts value-creating actions. We use the theoretical model to explain the implementation of a CRM system for one type of strategy.


Improving Knowledge Sharing Behaviour Within Organizations: Towards A Model, Marion Zalk, Rachelle Bosua, Rajeev Sharma Jan 2011

Improving Knowledge Sharing Behaviour Within Organizations: Towards A Model, Marion Zalk, Rachelle Bosua, Rajeev Sharma

Faculty of Informatics - Papers (Archive)

Knowledge management is the process of capturing, storing, sharing and using organizational knowledge with the aim of improving organizational performance. A necessary precursor for successful knowledge management initiatives is knowledge exchange between employees. This exchange is voluntary and highly dependent on an individual’s willingness to share his/her knowledge. It thus becomes important to identify the factors motivating employees to share their knowledge. This research in progress draws on Locke and Latham’s Goal Setting Theory (1990) to propose a model explaining knowledge sharing behavior.


The Amicable-Kronecker Construction Of Quaternion Orthogonal Designs, Jennifer Seberry, Sarah S. Adams Jan 2011

The Amicable-Kronecker Construction Of Quaternion Orthogonal Designs, Jennifer Seberry, Sarah S. Adams

Faculty of Informatics - Papers (Archive)

Recently, quaternion orthogonal designs (QODs) were introduced as a mathematical construct with the potential for applications in wireless communications. The poten- tial applications require new methods for constructing QODs, as most of the known methods of construction do not produce QODs with the exact properties required for implementation in wireless systems. This paper uses real amicable orthogonal designs and the Kronecker product to construct new families of QODs. The proposed Amicable- Kronecker Construction can be applied to build quaternion orthogonal designs of a variety of sizes and types. Although it has not yet been simulated whether the result- ing designs …


A New Generic Digital Signature Algorithm, Jennifer Seberry, Vinhbuu To, Dongvu Tonien Jan 2011

A New Generic Digital Signature Algorithm, Jennifer Seberry, Vinhbuu To, Dongvu Tonien

Faculty of Informatics - Papers (Archive)

In this paper, we study two digital signature algorithms, the DSA and ECDSA, which have become NIST standard and have been widely used in almost all commercial applications. We will show that the two algorithms are actually ‘the same’ algebraically and propose a generic algorithm such that both DSA and ECDSA are instances of it. By looking at this special angle through the generic algorithm, we gain a new insight into the two algorithms DSA and ECDSA. Our new proposed digital signature algorithm is described generically using a group G and a map toNumber : G → Z. As an …


Pedestrian Sensing Using Time-Of-Flight Range Camera, Xue Wei, Son Lam Phung, Abdesselam Bouzerdoum Jan 2011

Pedestrian Sensing Using Time-Of-Flight Range Camera, Xue Wei, Son Lam Phung, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

This paper presents a new approach to detect pedestrians using a time-of-flight range camera, for applications in car safety and assistive navigation of the visually impaired. Using 3-D range images not only enables fast and accurate object segmentation and but also provides useful information such as distances to the pedestrians and their probabilities of collision with the user. In the proposed approach, a 3-D range image is first segmented using a modified local variation algorithm. Three state-of-the-art feature extractors (GIST, SIFT, and HOG) are then used to find shape features for each segmented object. Finally, the SVM is applied to …


Efficient Strong Designated Verifier Signature Schemes Without Random Oracle Or With Non-Delegatability, Q Huang, G Yang, D S Wong, Willy Susilo Jan 2011

Efficient Strong Designated Verifier Signature Schemes Without Random Oracle Or With Non-Delegatability, Q Huang, G Yang, D S Wong, Willy Susilo

Faculty of Informatics - Papers (Archive)

Designated verifier signature (DVS) allows a signer to convince a designated verifier that a signature is generated by the signer without letting the verifier transfer the conviction to others, while the public can still tell that the signature must be generated by one of them. Strong DVS (SDVS) strengthens the latter part by restricting the public from tellingwhether the signature is generated by one of them or by someone else. In this paper, we propose two new SDVS schemes. Compared with existing SDVS schemes, the first new scheme has almost the same signature size and meanwhile, is proven secure in …


Sparsity Issues In Self-Organizing-Maps For Structures, Markus Hagenbuchner, Giovanni Da San Martino, Ah Chung Tsoi, Alessandro Sperduti Jan 2011

Sparsity Issues In Self-Organizing-Maps For Structures, Markus Hagenbuchner, Giovanni Da San Martino, Ah Chung Tsoi, Alessandro Sperduti

Faculty of Informatics - Papers (Archive)

Recent developments with Self-Organizing Maps (SOMs) produced methods capable of clustering graph structured data onto a fixed dimensional display space. These methods have been applied successfully to a number of benchmark problems and produced state-of-the-art results. This paper discusses a limitation of the most powerful version of these SOMs, known as probability measure graph SOMs (PMGraphSOMs), viz., the sparsity induced by processing a large number of small graphs, which prevents a successful application of PMGraphSOM to such problems. An approach using the idea of compactifying the generated state space to address this sparsity problem is proposed. An application to an …


Promises And Successful Practice In It Governance: A Survey Of Australian Senior It Managers, Akemi T. Chatfield, Terrence Coleman Jan 2011

Promises And Successful Practice In It Governance: A Survey Of Australian Senior It Managers, Akemi T. Chatfield, Terrence Coleman

Faculty of Informatics - Papers (Archive)

In a global, digital economy, companies increasingly depend on IT for timely information sharing,effective operational control, rapid innovation, speed to market, and customer satisfaction. On theother hand, recent global financial crisis and economic recessions encourage trends for increasedmanagerial scrutiny to reduce IT spending and to increase business value of IT. Globally, concepts ofIT governance (ITG) have proliferated as a solution for improving IT management under businessuncertainty and rapid technological change. However, empirical research on organisational ITGpractice still is lacking and urgently required. This paper, therefore, presents survey results on ITGpractice from a perspective of senior IT managers in Australian private-sector …


Women In Ict: Guidelines For Evaluating Intervention Programmes, Annemieke Craig, Julie Fisher, Linda Dawson Jan 2011

Women In Ict: Guidelines For Evaluating Intervention Programmes, Annemieke Craig, Julie Fisher, Linda Dawson

Faculty of Informatics - Papers (Archive)

Many intervention programmes to increase the number of women in theInformation and Communications Technology (ICT) profession have been implemented over the last twenty years. Detailed evaluations help us to determine the effectiveness of these programmes yet few comprehensive evaluations appear in the literature.The research reported here describes an investigation of the evaluation of the intervention programmes focusing on increasing the enrolment and retention of females in ICT in Australia. This paper describes an empirical study which explores how evaluation has been and might be conducted and concludes with guidelines for evaluation for those developing programmes for increasing the participation of …


On Maximizing Voip Capacity And Energy Conservation In Multi-Rate Wlans, Kwan-Wu Chin Jan 2010

On Maximizing Voip Capacity And Energy Conservation In Multi-Rate Wlans, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

This letter highlights a key problem that arises when frame aggregation, a popular method for boosting VoIP capacity, is used in Wireless Local Area Networks (WLANs) that employ asynchronous power save mode (PSM). Specifically, it shows how the PSM proposed by the Wi-Fi Alliance renders frame aggregation ineffective. It then proposes a novel opportunistic scheduler that restores the benefits of frame aggregation whilst ensuring stations have minimal energy expenditure.


Supporting Change Propagation In Uml Models, Hoa Khanh Dam, Michael Winikoff Jan 2010

Supporting Change Propagation In Uml Models, Hoa Khanh Dam, Michael Winikoff

Faculty of Informatics - Papers (Archive)

A critical issue in software maintenance and evolution is change propagation: given a primary change that is made in order to meet a new or changed requirement, what additional, secondary, changes are needed? We have previously developed techniques for effectively supporting change propagation within design models of intelligent agent systems. In this paper, we propose how this approach is applied to support change propagation within UML design models. Our approach offers a number of advantages in terms of saving substantial time writing hard-coded rules, ensuring soundness and completeness, and at the same time capturing the cascading nature of change propagation. …


Supporting Change Propagation In The Maintenance And Evolution Of Service-Oriented Architectures, Hoa Khanh Dam, Aditya K. Ghose Jan 2010

Supporting Change Propagation In The Maintenance And Evolution Of Service-Oriented Architectures, Hoa Khanh Dam, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

As Service-Oriented Architecture (SOA) continues to be broadly adopted, the maintenance and evolution of service-oriented systems become a growing issue. Maintenance and evolution are inevitable activities since almost all systems tbat are useful and successful stimulate user-generated requests for change and improvement. A critical issue in the evolution of SOA is change propagation: given a set of primary changes that have been made to the SOA model, what additional secondary changes are needed to maintain consistency across mUltiple levels of the SOA models. This paper presents how an existing framework can be applied to effectively support change propagation within a …


Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation, Jean-Claude Bajard, Christophe Negre, Thomas Plantard Jan 2010

Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation, Jean-Claude Bajard, Christophe Negre, Thomas Plantard

Faculty of Informatics - Papers (Archive)

This paper deals with binary field multiplication. We use the bivariate representation of binary field called Double Polynomial System (DPS) presented in . This concept generalizes the composite field representation to every finite field. As shown in , the main interest of DPS representation is that it enables to use Lagrange approach for multiplication, and in the best case, Fast Fourier Transform approach, which optimizes Lagrange approach. We use here a different strategy from to perform reduction, and we also propose in this paper, some new approaches for constructing DPS. We focus on DPS, which provides a simpler and more …


A Network-Aware Virtual Machine Placement And Migration Approach In Cloud Computing, Jingtai Piao, Jun Yan Jan 2010

A Network-Aware Virtual Machine Placement And Migration Approach In Cloud Computing, Jingtai Piao, Jun Yan

Faculty of Informatics - Papers (Archive)

Cloud computing represents a major step up in computing whereby shared computation resources are provided on demand. In such a scenario, applications and data thereof can be hosted by various networked virtual machines (VMs). As applications, especially data-intensive applications, often need to communicate with data frequently, the network I/O performance would affect the overall application performance significantly. Therefore, placement of virtual machines which host an application and migration of these virtual machines while the unexpected network latency or congestion occurs is critical to achieve and maintain the application performance. To address these issues, this paper proposes a virtual machine placement …


Planetary-Scale Rfid Services In An Age Of Uberveillance, Katina Michael, George Roussos, George Q. Huang, Arunabh Chattopadhyay, Rajit Gadh, B S. Prabhu, Peter Chu Jan 2010

Planetary-Scale Rfid Services In An Age Of Uberveillance, Katina Michael, George Roussos, George Q. Huang, Arunabh Chattopadhyay, Rajit Gadh, B S. Prabhu, Peter Chu

Faculty of Informatics - Papers (Archive)

Radio-frequency identification has a great number of unfulfilled prospects. Part of the problem until now has been the value proposition behind the technology- it has been marketed as a replacement technique for the barcode when the reality is that it has far greater capability than simply non-line-of-sight identification, towards decision-making in strategic management and reengineered business processes. The vision of the Internet of Things has not eventuated but a world in which every object you can see around you carries the possibility of being connected to the internet is still within the realm of possibility. However incremental innovations may see …


Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou Jan 2010

Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou

Faculty of Informatics - Papers (Archive)

Random Testing (RT) is a fundamental software testing technique. Adaptive Random Testing (ART) improves the fault-detection capability of RT by employing the location information of previously executed test cases. Compared with RT, test cases generated in ART are more evenly spread across the input domain. ART has conventionally been applied to programs that have only numerical input types, because the distance between numerical inputs is readily measurable. The vast majority of computer programs, however, involve non-numerical inputs. To apply ART to these programs requires the development of effective new distance measures. Different from those measures that focus on the concrete …


Unpacking The Rfid Investment Decision, Byron W. Keating, Tim R. Coltman, Samuel Fosso Wamba, Valerie Baker Jan 2010

Unpacking The Rfid Investment Decision, Byron W. Keating, Tim R. Coltman, Samuel Fosso Wamba, Valerie Baker

Faculty of Informatics - Papers (Archive)

Mandates aside, there are many reasons why firms decide to move forward with or delay investment in RFID technology. In this paper we use a theoretically based, easy to implement methodology to empirically derive a relative importance scale of those factors that influence the decision to invest in RFID technology. More specifically, we compare the factors that matter most and least to a sample of firms that have adopted RFID technology with a sample of firms that have yet to embrace RFID technology. The theoretical and practical implications are that both RFID adopters and non adopters are driven by the …


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, Katina Michael, M G. Michael Jan 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …


Pairwise: A Time Hopping Medium Access Control Protocol For Wireless Sensor Networks, Kwan-Wu Chin Jan 2009

Pairwise: A Time Hopping Medium Access Control Protocol For Wireless Sensor Networks, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

The availability of low cost, multifunctional embedded devices have become ubiquitous due to their wide ranging application that includes monitoring Radio Frequency Identification (RFID) tagged objects to ambient conditions such as temperature and humidity. Also, these devices can be equipped with a camera and then deployed in hostile environments. A key characteristic of these devices is that they can communicate wirelessly and form an ad-hoc, Wireless Sensor Network (WSN). Devices in a WSN then collaboratively monitor environment factors or objects, and forward data back to one or more central nodes. A key challenge in WSN is ensuring nodes operate in …


An Efficient Task Allocation Protocol For P2p Multi-Agent Systems, Dayong Ye, Quan Bai, Minjie Zhang, Khin Than Win, Zhiqi Shen Jan 2009

An Efficient Task Allocation Protocol For P2p Multi-Agent Systems, Dayong Ye, Quan Bai, Minjie Zhang, Khin Than Win, Zhiqi Shen

Faculty of Informatics - Papers (Archive)

Recently, task allocation in multi-agent systems has been investigated by many researchers. Some researchers suggested to have a central controller which has a global view about the environment to allocate tasks. Although centralized control brings convenience during task allocation processes, it also has some obvious weaknesses. Firstly, a central controller plays an important role in a multi-agent system, but task allocation procedures will break down if the central controller of a system cannot work properly. Secondly, centralized multi-agent architecture is not suitable for distributed working environments. In order to overcome some limitations caused by centralized control, some researchers proposed distributed …


Controller Design For Time-Delay Systems Using Genetic Algorithms, Haiping Du, Nong Zhang Jan 2009

Controller Design For Time-Delay Systems Using Genetic Algorithms, Haiping Du, Nong Zhang

Faculty of Informatics - Papers (Archive)

This paper presents a new approach to design controllers for time-delay systems by using genetical gorithms (GAs) together with the solvability of linear matrix inequalities (LMIs). Both of the state- feedback controller and the static output feedback controller can be designed with this approach. It is confirmed by numerical examples that this approach achieves less conservative results than previouslyexisting methods on the given examples.


Design And Estimation For Split Questionnaire Surveys, James O. Chipperfield, David G. Steel Jan 2009

Design And Estimation For Split Questionnaire Surveys, James O. Chipperfield, David G. Steel

Faculty of Informatics - Papers (Archive)

When sampling from a finite population to estimate the means or totals of K population characteristics of interest, survey designs typically impose the constraint that information on all K characteristics (or data items) is collected from all units in the sample. Relaxing this constraint means that information on a subset of the K data items may be collected from any given unit in the sample. Such a design, called a split questionnaire design (SQD), has three advantages over the typical design: increased efficiency with which design objectives can be met, by allowing the number of sample units from which information …


Dynamic Service Selection For Service Composition With Time Constraints, Azlan Ismail, Jun Yan, Jun Shen Jan 2009

Dynamic Service Selection For Service Composition With Time Constraints, Azlan Ismail, Jun Yan, Jun Shen

Faculty of Informatics - Papers (Archive)

Service selection is a kind of planning approach that evaluates and selects from multiple services to form a composite plan. In service selection, we found one additional issue that has not been investigated yet namely time constraints consistency among composite services. This issue is significant because there are potential time constraints involved that might cause inconsistency between selected services although they can offer aggregated QoS that satisfy global requirements. Furthermore, there might be some unintended waiting time to be considered in the QoS aggregation. Thus, this paper contributes to the analysis on the problem caused by the time constraints and …


Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu Jan 2009

Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu

Faculty of Informatics - Papers (Archive)

Two of the most recent and powerful multi-property preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former was proposed by Andreeva et al. at ASIACRYPT 2007 and the latter was proposed by Bellare and Ristenpart at ICALP 2007. In the existing literature, ten notions of security for hash functions have been considered in analysis of MPP capabilities of domain extension transforms, namely CR, Sec, aSec, eSec (TCR), Pre, aPre, ePre, MAC, PRF, PRO. Andreeva et al. showed that ROX is able to preserve seven properties; namely collision resistance (CR), three …