Browsing 08 Information and Computing Sciences by Title

UTSePress Research/Manakin Repository

Search UTSePress Research


Advanced Search

Browse

My Account

  • >
  • >

Browsing 08 Information and Computing Sciences by Title

Sort by: Order: Results:

  • Given-Wilson, Thomas; Gorla, Daniele; Jay, Barry (Springer, 2010)
    Concurrent pattern calculus drives interaction between processes by unifying patterns, just as sequential pattern calculus drives computation by matching a pattern against a data structure. By generalising from pattern ...
  • Su, Steven; Bao, Jie; Lee, Peter (Taylor and Francis, 2006)
    In this paper, we consider the problem of input disturbance suppression for nonlinear systems based on feedforward passivity. First, we show that integral control can sufficiently suppress a class of slowly variant (including ...
  • Dou, Wc; Chen, Q; Chen, Jinjun (Elsevier Science Bv, 2013)
    Distributed Denial-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily applied in cloud security due to their relatively low efficiency, large storage, to ...
  • Yan, Xiaowei; Zhang, Chengqi; Zhang, Shichao (Taylor & Francis Inc, 2009)
    We propose a simple, novel, and yet effective confidence metric for measuring the interestingness of association rules. Distinguishing from existing confidence measures, our metrics really indicate the positively companionate ...
  • Mairiza, Dewi; Zowghi, Didar; Gervasi, Vincenzo (IEEE Hungary Section, 2013)
    Prior studies reveal that conflicts among Non Functional Requirements (NFRs) are not always absolute. They can also be relative depending on the context of the system being developed.
  • Ma, Jun; Xiao, Tian-Yuan; Zeng, Jian-Chao; Hao, Ma (IEEE, 2008)
    Due to the design knowledge discrepancy during collaborative design, conflicts can be revealed from the process of collaborative design decision. A critical element of collaborative design would be conflict resolution. The ...
  • Li, Xuyou; Guo, Lishu; Kong, Xiaoying; Gao, Shuaihe (American Scientific Publishers, 2013)
    Considering that the GPS carrier tracking loop is fragile in high dynamic and weak signal environments, carrier tracking loop with information aided from inertial sensors is designed in this paper. The conflicts between ...
  • Davies, Will (2010-05-03)
    In this Markets Forum, Will Davies, challenges the presentation of history. Will has worked in the documentary film industry since completing his BA in 1972, his interest in history stirred by tales of explorers as a ...
  • Kennedy, Paul; Simoff, Simeon (University of Technology, Sydney, 2003)
    With the invention of microarray technology, researchers are capable of measuring the expression levels of ten thousands of genes in parallel at various time points of the biological process. During the investigation of ...
  • Parvin, Sazia; Hussain, Farookh; Hussain, Omar (Elsevier, 2013)
    With the rapid development of wireless communication, the growth of Cognitive Radio (CR) is increasing day by day. Because CR is flexible and operates on the wireless network, there are more security threats to CR technology ...
  • Henderson-Sellers, Brian; Gonzalez Perez, Cesar (ETH Zurich, 2005)
  • Li, Zhenhua; He, Ying; Cao, Longbing; Wong, Limsoon; Li, Jinyan (Inderscience, 2012)
    The conservation of interfacial water molecules has only been studied in small data sets consisting of interfaces of a specific function. So far, no general conclusions have been drawn from large?scale analysis, due to the ...
  • Feuerlicht, George (IEEE Computer Society, 2008)
    Service composition research mostly focuses on the dynamic (workflow) aspects of compositions. In this paper we consider the static component of service composition and focus on analyzing the data flows between services ...
  • Duflos, Sandrine; Kervalla, Brigitte; Gay, Valerie (IEEE Computer Society, 2007)
    This paper proposes to improve policy-based management by integrating security parameters into the Service Level Specification (SLS). Integrating those parameters in the QoS part of the Service Level Agreement (SLA) ...
  • Henderson-Sellers, Brian (IOS Press, 2010)
    Development and acceptance of a modelling language (ML) for agentoriented software development has many facets. To complement the '"bottom-up" suggestions of icons for particular fine-scale agent-oriented concepts, here ...
  • Wang, Chao; Lu, Jie; Zhang, Guangquan (Springer Berlin / Heidelberg, 2007)
    This paper proposes an approach to detect duplicates among relational data. Traditional methods for record linkage or duplicate detection work on a set of records which have no explicit relations with each other. These ...
  • Bian, Wei; Tao, Dacheng (IEEE-inst Electrical Electronics Engineers Inc, 2012)
    Distance metric learning (DML) has received increasing attention in recent years. In this paper, we propose a constrained empirical risk minimization framework for DML. This framework enriches the state-of-the-art studies ...
  • Du, Haiping; Lam, James (Elsevier Sci LTD, 2007)
    The paper presents a constrained H2 approximation method for multiple input-output delay systems by using a genetic algorithm. The H2 error between the original and the approximate models is minimized subject to constraints ...
  • Liu, W; Tian, Xinmei; Tao, Dacheng; Liu, Jianzhuang (AAAI Press, 2010)
    Vectored data frequently occur in a variety of fields, which are easy to handle since they can be mathematically abstracted as points residing in a Euclidean space. An appropriate distance metric in the data space is ...
  • Mu, Yang; Ding, Wei; Zhou, Tianyi; Tao, Dacheng (ACM, 2013)
    The least squares problem is one of the most important re- gression problems in statistics, machine learning and data mining. In this paper, we present the Constrained Stochas- tic Gradient Descent (CSGD) algorithm to ...