Browsing Conference Papers by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Browsing Conference Papers by Title

Sort by: Order: Results:

  • Abolhasan, Mehran; Wysocki, T.; Dutkeiwicz, E. (IEEE, 2002)
    This paper presents a new routing strategy for mobile ad hoc networks, called dynamic zone-based topology routing protocol (DZTR). We introduce new strategies to maintain up-to-date intrazone and interzone topology information ...
  • Arabnia, Hamid; He, Sean (ISCA, 2004)
  • Jin, Jesse Sheng; Xu, Richard (Springer, 2005)
    In recent times, there are increasing numbers of computer vision and pattern recognition (CVPR) technologies being applied to real time video processing using single processor PCs. However, these multiple computational ...
  • Jay, Barry; Jones, Simon (Springer, 2008)
    We intoduce System IF, for implicit System F, in which many type applications can be made implicit. It supports decidable type checking and strong normalisation. System IF constitutes a first foray into a new area in the ...
  • Liu, Dan; He, Sean (CSREA Press, 2004)
  • Han, Song; Chang, Elizabeth; Dillon, Tharam (UDN Digital Co Ltd, 2005)
    Online transactions using mobile agents need secure protocols to help the mobile agents to accomplish the transactions initiated by a client in an electronic commerce. However, the mobile agent could encounter hostile ...
  • Bernardo, Daniel (IEEE, 2012)
    High-speed network protocols operate on high speed networks (i.e., Cloud and Smart Grid), which offer low-cost, easy-access to education, e-health, communication and business services. One of the important reasons going ...
  • Bernardo, Daniel; Hoang, Doan (Springer, 2010)
    The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addressess various infrastructure requirements for transmitting data in high speed networks. However, this development creates ...
  • Kapnoullas, T.; Chang, E.; Dillon, T. S; Damiani, E. (Springer-Verlag, 2003)
    Security Framework for Mobile Agent Platforms or SFMAP key feature of this approach is to provide for multiple levels of access control for agents that arrive at a server, depending on their level of trust. This level ...
  • Zheng, Lihong; Wu, Qiang; Jia, Wenjing; Samali, Bijan; Palaniswami, Marimuthu; He, Sean (IEEE, 2008)
    License plate recognition usually contains three steps, namely license plate detection/localization, character segmentation and character recognition. When reading characters on a license plate one by one after license ...
  • Abu Mahmoud, Md Khaled; Al-Jumaily, Adel Ali (IEEE, 2011)
    A gradient vector flow (GVF) snake is proposed in this paper for the segmentation of skin cancer images. In order to make the snake insensitive to noise and be able to remove the hairs, an Adaptive Filter (Wiener and ...
  • Jia, Wenjing; Wu, Qiang; He, Sean (IEEE Computer Society, 2010)
    In this paper, to enable a fast and robust system for automatically recognizing license plates with various appearances, new and simple but efficient algorithms are developed to segment characters from extracted license ...
  • Zhang, Shaoqian; Dou, Wanchun; Chen, Jinjun (IEEE Computer Society, 2013)
    Web service composition lets users create valueadded composite Web services on existent services, where topk composite services are helpful for users to find a satisfying composite service efficiently. However, with an ...
  • Debenham, John (Springer, 2001)
    Emergent processes are high-level business processes; they are opportunistic in nature whereas production workflows are routine. Emergent processes may not be managed; they may contain goal-driven sub-processes that can ...
  • Wu, Jia; Cai, Zhihua; Zhu, Xingquan (IEEE, 2013)
    Probability estimation from a given set of training examples is crucial for learning Naive Bayes (NB) Classifiers. For an insufficient number of training examples, the estimation will suffer from the zero-frequency problem ...
  • Wu, Hui; Qu, Guangzhi; Zhu, Xingquan (Springer, 2011)
    Spectral clustering has been applied in various applications. But there still exist some important issues to be resolved, among which the two major ones are to (1) specify the scale parameter in calculating the similarity ...
  • Culjak, Gordana (WSEAS, 2006)
  • Debenham, John; Prodan, Ante (Springer, 2010)
    The self-organisation of telecommunications networks has to confront the two challenges of the scalability and the stability of the solution. This paper describes a distributed, co-operative multiagent system in which ...
  • Debenham, John; Prodan, Ante (Springer Verlag, 2008)
    A lightweight multiagent system is deployed at each node in a communications network with the aim of self-organising the network as usage alters. The distributed, light-weight, co-operative multiagent system guarantees ...
  • Fang, Meng; Zhu, Xingquan; Li, Bin; Ding, Wei; Wu, Xindong (IEEE Computer Society, 2012)
    The emergence of social tagging and crowdsourcing systems provides a unique platform where multiple weak labelers can form a crowd to fulfill a labeling task. Yet crowd labelers are often noisy, inaccurate, and have limited ...