Browsing Closed by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Feng, Yucai; Chi, Lianhua; Chi, Hehua; Liu, Chuanlu; Liu, Zhou (IEEE, 2012)
    A very promising idea for fast searching in time series databases is to map the time series into a representative space. In this paper, we propose an effective querying algorithm QoM (Querying on Motif) based on time series ...
  • Wanchun, Don; Chao, Lv; Zhang, Xuyun; Chen, Jinjun (IEEE, 2011)
    In service selection, an end user often has his or her personal preferences imposing on a candidate service's non-functional properties. For a service selection process promoted by a group of users, candidate services are ...
  • Teague, Donna; Corney, Malcolm; Ahadi, Alireza; Lister, Raymond (Australian Computer Society Inc, 2013)
    Abstract: Recent research indicates that some of the difficulties faced by novice programmers are manifested very early in their learning. In this paper, we present data from think aloud studies that demonstrate the ...
  • Zhang, Wenjie; Lin, Xuemin; Cheema, Muhammad; Zhang, Ying; Wang, Wei (IEEE, 2010)
    K Nearest Neighbor search has many applications including data mining, multi-media, image processing, and monitoring moving objects. In this paper, we study the problem of KNN over multi-valued objects. We aim to provide ...
  • Bernardo, Daniel; Chua, Bee Bee; Hoang, Doan (Research Publishing Services, 2009)
    This paper introduces a novel approach to a more practical Quantitative SRA. The approach formalized in this paper is based on the methods described in various risk assessment frameworks that were described by existing ...
  • Ying, Mingsheng; Feng, Yuan; Yu, Nengkun (IEEE Computer Society, 2013)
    Quantum cryptography has been extensively studied in the last twenty years, but information-flow security of quantum computing and communication systems has been almost untouched in the previous research. Due to the essential ...
  • Qin, Lu; Yu, Jeffrey; Chang, Lijun; Tao, Yufei (IEEE, 2009)
    Keyword search on relational databases provides users with insights that they can not easily observe using the traditional RDBMS techniques. Here, an l-keyword query is specified by a set of l keywords, {k1, k2, middot ...
  • Yang, Chi; Liu, Chang; Zhang, Xuyun; Nepal, Surya; Chen, Jinjun (IEEE Computer Society, 2013)
    Nowadays, we enter a new era of data explosion which introduces the new problems for big data processing. Current methods for querying streaming XML big data are mostly based on events filtering techniques. It is ...
  • Chang, Lijun; Yu, Jeffrey; Qin, Lu (ACM, 2009)
    Twig queries have been extensively studied as a major fragment of XPATH queries to query XML data. In this paper, we study PXML-RANK query, (Q, k), which is to rank top-k probabilities of the answers of a twig query Q in ...
  • Yeh, Wei-Chang; Yeh, Yuan-Ming; Chou, Chun-Hua; Chung, Yuk; He, Sean (IEEE Computer Society, 2012)
    Radio-frequency identification (RFID) is an automatic identification system which has become a hot topic in the fields of manufacturing, logistics, and so on. The purpose of this research is to propose a methodology for ...
  • Agbinya, Johnson; Chaczko, Zenon; Aboura, Khalid (BroadBandCom '09, 2009)
    Electromagnetic Fields radiation has raised concerns within several segments of the population in the past three decades. Many studies proved inconclusive mainly due to the scarcity of the data. We propose an architecture ...
  • Xie, Bo; Song, Mingli; Mu, Yang; Tao, Dacheng (Springer, 2010)
    Image retrieval on large-scale datasets is challenging. Current indexing schemes, such as k-d tree, suffer from the a??curse of dimensionalitya? . In addition, there is no principled approach to integrate various features ...
  • Tao, Dacheng; Tang, Xiaoou (IEEE Computer Soc, 2004)
    Relevance feedback (RF) schemes based on support vector machine (SVM) have been widely used in content-based image retrieval. However, the performance of SVM based RF is often poor when the number of labeled positive ...
  • Shen, Yuzhong; Seevinck, Jennifer; Baydogan, Emre (IOS Press, 2006)
    Wound debridement refers to the removal of necrotic, devitalized, or contaminated tissue and/or foreign material to promote wound healing. Surgical debridement uses sharp instruments to cut dead tissue from a wound and it ...
  • Harbinson, Dirk; Balsys, Ronald; Suffern, Kevin (IEEE Computer Society, 2008)
  • Abolhasan, Mehran; Hagelstein, Brett (IEEE APCC Wireless Communication Systems (IEEE APCC), 2009)
    The proliferation of mesh or ad hoc network protocols has lead to a push for protocol standardisation. While there are a number of both open-source and proprietary mesh routing protocols being developed, there is only a ...
  • Agbinya, Johnson; Lee, Vivian; Aboura, Khalid; Chaczko, Zenon (BroadBandCom '09, 2009)
    Radio frequency spectrum mapping allows determining the radio frequency signatures prevalent within an environment. We address the primary frequency bands used for cellular, wireless LAN, UMTS and ultra wideband communications. ...
  • Liang, Jie; Hua, Jie; Huang, Mao Lin; Nguyen, Quang Vinh; Simoff, Simeon (ACM Press, 2012)
    Prior works on treemaps have mainly focused on developing the new layouts. The existing treemaps generated from various algorithms require careful examination on design parameter. However, current research does not provide ...
  • Su, Hao; Chen, Ling; Ye, Yuhuang; Sun, Z; Wu, Qiang (Springer, 2010)
    Semi-supervised learning has been the focus of machine learning and data mining research in the past few years. Various algorithms and techniques have been proposed, from generative models to graph-based algorithms. In ...
  • Al-Khamayseh, Shadi; Lawrence, Elaine (IARIA Conference, 2011)
    This paper is the second of a series of investigations into the key success factors for mobile government services (mGovernment) in Australia, Jordan and the United Arab Republic. The case study in this paper concerns a ...