Browsing Closed by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Gervasi, Vincenzo; Zowghi, Didar (Assoc Computing Machinery, 2005)
    The use of logic in identifying and analyzing inconsistency in requirements from multiple stakeholders has been found to be effective in a number of studies. Nonmonotonic logic is a theoretically well-founded formalism ...
  • Ying, Mingsheng (Springer-Verlag, 2003)
    We introduce a notion of strong monotonicity of probabilistic predicate transformers. This notion enables us to establish a normal form theorem for monotone probabilistic predicate transformers. Three other healthiness ...
  • Najaftorkaman, Mohammadreza; Ghapanchi, Amir; Talaei-Khoei, Amir; Ray, Pradeep (Atlantis Press, 2013)
    This study undertook a literature survey to provide a taxonomy that represents research areas of Electronic Medical Record (EMR). We identified the following areas of research and classified them into eight main categories: ...
  • Damian, Daniela; Zowghi, Didar (Springer, 2003)
  • Talevski, Alex; Chang, Elizabeth; Dillon, Tharam (IEEE, 2005)
    Transportation and warehousing logistics are activities that require strong information systems and computer support. This requirement has grown with the advent of e-commerce. Companies such as FedEx and UPS now allow their ...
  • Ying, Mingsheng; Wirsing, Martin (Elsevier Science Bv, 2001)
    Regarding behaviour equivalence in higher-order process calculi, Sangiorgi (Inform. and Comput. 131 (1996) 141) and Thomsen (Inform. and Comput. 116 (1995) 38) introduced context and higher-order bisimulations, respectively. ...
  • Tao, Dacheng; Li, Xuelong; Lu, Wen; Gao, Xinbo (IEEE-Inst Electrical Electronics Engineers Inc, 2009)
    The human visual system (HVS) provides a suitable cue for image quality assessment (IQA). In this paper, we develop a novel reduced-reference (RR) IQA scheme by incorporating the merits from the contourlet transform, ...
  • Ariffin, Shamsul (Australian and New Zealand Mobile Learning Group, 2012)
    This paper presents the researcher?s reflections on the study of local culture and makes recommendations for creating awareness in the light of qualitative research conducted in Malaysia. The recommendations address ...
  • Li, Sanjiang; Ying, Mingsheng (Elsevier B.V, 2003)
    Originating in Allen's analysis of temporal relations, the notion of composition table has become a key technique in providing an efficient inference mechanism for a wide class of theories in the field artificial intelligence. ...
  • Zhang, Yuehua; Zhang, Peng; Shi, Yong (Elsevier, 2009)
    Although Regularized Multiple Criteria Linear Programming (RMCLP) model has shown its effectiveness in classification problems, its inherent drawback of linear formulation limits itself into only solving linear classification ...
  • Cen, Yonghua; Gan, Liren; Bai, Chen (University of Sheffield, 2013)
    Introduction. The study seeks to answer two questions: How do university students learn to use correct strategies to conduct scholarly information searches without instructions? and, What are the differences in learning ...
  • Chowdhury, Sudatta; Gibb, F (Emerald Group Publishing Limited, 2009)
    Purpose - This paper aims to argue that different types Of uncertainty are associated with information seeking and retrieval (IS&R), and that, with the proliferation of new and different search tools, channels and sources, ...
  • Alami, Adam; Wong, Bernard; Mcbride, Tom (Ivy League Publishing, 2008)
    Recent studies have shown a substantial growth in the global IT outsourcing market. The literature discusses an extensive range of various IT outsourcing models. This study introduces a cross onshore and offshore outsourcing ...
  • Suffern Kevin; Balsys Ronald (Institute of Electrical and Electronics Engineers, 2003)
  • Jamdagni, Aruna; Nanda, Priyadarsi; Liu, Renping; Tan, Thomas; He, Sean (Elsevier BV, 2013)
    Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data ...
  • Hintz, Thomas; Szewcow, Ury; He, Sean (Elsevier Science Bv, 1998)
    Edge detection in computer vision and image processing is a process which detects one kind of significant feature in an image that appears as discontinuities in intensities. A parallel edge detection algorithm based on ...
  • Li, Sanjiang (Elsevier B.V., 2007)
    Decision making under uncertainty is one of the central tasks of artificial agents. Due to their simplicity and ease of specification, qualitative decision tools are popular in artificial intelligence. Brafman and Tennenholtz ...
  • Lister, Raymond; Beglund, A; Clear, Tony; Bergin, Joe; Garvin-Doxas, Kathy; Hanks, Brian; Hitchner, Lew; Luxton-Reilly, Andrew; Sanders, Kate; Schulte, Carsten; Whalley, J (ACM Press, 2006)
  • Olsson, Michael (Australian Library & Information Assoc Ltd, 2009)
    This article provides a critical analysis of some of the key theories and assumptions that underpin prevailing approaches to the concept of 'information user' in contemporary information research and professional practice, ...
  • Gao, Xinbo; An, Lingling; Li, Xuelong; Tao, Dacheng (Elsevier Science Bv, 2009)
    Recently, lossless data hiding has attracted increasing interests. As a reversible watermark scheme, the host media and hidden data should be recovered without distortion. A latest lossless data hiding technique based on ...