Research Services Division

Deakin Research

2010 School of Information Technology Research Output

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

Abawajy, Jemal and Kim, Tai-hoon* (2010) Performance analysis of cyber security awareness delivery methods, in Kim, Tai-hoon; Fang, Wai-chi; Khan, Muhammad Khurram; Arnett, Kirk P.; Kang, Heau-jo and Slezak, Dominik (eds), Security technology, disaster recovery and business continuity, pp. 142-148, Spring-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Al-Neyadi, Fahed and Abawajy, Jemal (2010) A privacy preserving service broker architecture for data sharing, in Kim, Tai-hoon; Lee, Young-hoon; Kang, Byeong-Ho and Slezak, Dominik (eds), Future generation information technology, pp. 450-458, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Beliakov, Gleb (2010) Optimization and aggregation functions, in Lodwick, Weldon A. and Kacprzyk, Janusz (eds), Fuzzy optimization : recent advances and applications, pp. 77-108, Springer-Verlag Berlin, Berlin, Germany [B1]
DRO entry for this publication

Brock, Michael and Goscinski, Andrzej (2010) Toward a framework for cloud security, in Hsu, Ching-Hsien; Yang, Laurence T.; Park, Jong Hyuk and Yeo, Sang-Soo (eds), Algorithms and architectures for parallel processing, pp. 254-263, Springer, Berlin, Germany [B1]
DRO entry for this publication

Chen, Yi-Ping, Rong, Jia and Li, Gang (2010) Advanced graph mining methods for protein analysis, in Chen, Jake Y. and Lonardi, Stefano (eds), Biological Data Mining, pp. 111-136, Chapman & Hall/CRC, Boca Raton, Fla. [B1]
DRO entry for this publication

Chong, Soon-Keow and Abawajy, Jemal (2010) Risk-based trust management for e-commerce, in Yan, Zhang (eds), Trust modeling and management in digital environments : from social concept to system development, pp. 332-351, Information Science Reference, Hershey, Pa., USA [B1]
DRO entry for this publication

Church, Philip, Wong, Adam, Goscinski, Andrzej and Lefevre, Christophe (2010) Harnessing clusters for high performance computation of gene expression microarray comparative analysis, in Hsu, Ching-Hsien; Yang, Laurence T.; Park, Jong Hyuk and Yeo, Sang-Soo (eds), Algorithms and architectures for parallel processing, pp. 188-197, Springer-Verlag Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Goscinski, Andrzej and Hobbs, Michael (2010) Experiences gained from building a services-based distributed operating system, in Hsu, Ching-Hsien; Yang, Laurence T.; Park, Jong Hyuk and Yeo, Sang-Soo (eds), Algorithms and architectures for parallel processing, pp. 225-234, Springer-Verlag Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Herawan, Tutut*, Deris, Mustafa Mat* and Abawajy, Jemal (2010) Matrices representation of multi soft-sets and its application, in Taniar, David; Gervasi, Osvaldo; Murgante, Beniamino; Pardede, Eric and Apduhan, Bernady O. (eds), Computational science and its applications - ICCSA 2010, pp. 201-214, Springer-Verlag, Berlin, Germany [B1]
Citation counts: Scopus - 1
DRO entry for this publication

Huang, Xinyi*, Mu, Yi*, Susilo, Willy*, Wu, Wei* and Xiang, Yang (2010) Further observations on optimistic fair exchange protocols in the multi-user setting, in Nguyen, Phong Q. and Pointcheval, David (eds), Public key cryptography - PKC 2010 : 13th International Conference on Practice and Theory of Public-Key Cryptography, Paris, France, May 26-28, 2010 : proceedings, pp. 124-141, Springer, New York, N. Y. [B1]
DRO entry for this publication

Islam, Md. Saiful*, Mahmud, Abdullah Al* and Islam, Md Rafiqul (2010) Machine learning approaches for modeling spammer behavior, in Cheng, Pu-Jen; Kan, Min-Yen; Lam, Wai and Nakov, Preslav (eds), Information retrieval technology : 6th Asia Information Retrieval Symposium, AIRS 2010, Taipei, Taiwan, December 1-3, 2010 : proceedings, pp. 251-260, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Juan, A.*, Ferrer, A.*, Serrat, C.*, Faulin, J.*, Beliakov, Gleb and Hester, J.* (2010) Potential applications of discrete-event simulation and fuzzy rule-based systems to structural reliability and availability, in Faulin, Javier; Juan, Angel A.; Martorell, Sebastian and Ramirez-Marquez, Jose-Emmanuel (eds), Simulation methods for reliability and availability of complex systems, pp. 199-214, Springer-Verlag, London, England [B1]
DRO entry for this publication

Li, Bai, Batten, Lynn and Doss, Robin (2010) Network resilience in low-resource mobile wireless sensor networks, in Schmidt, Andreas U.; Russello, Giovanni; Lioy, Antonio; Prasad, Neeli R. and Lian, Shiguo (eds), Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, pp. 127-138, Springer, Berlin, Germany [B1]
DRO entry for this publication

Liao, Zhihua*, Zhang, Zili and Liu, Yang* (2010) Chinese named entity recognition based on hierarchical hybrid model, in Zhang, Byoung-Tak and Orgun, Mehmet A. (eds), PRICAI 2010 : trends in artificial intelligence : 11th Pacific Rim International Conference on Artificial Intelligence, Daegu, Korea, August 30-September 2, 2010 : proceedings, pp. 620-624, Springer, Berlin, Germany [B1]
DRO entry for this publication

Mahdin, Hairulnizam* and Abawajy, Jemal (2010) An approach to filtering duplicate RFID data streams, in Kim, Tai-hoon; Ma, Jianhua; Fang, Wai-chi; Park, Byungjoo; Kang, Byeong-Ho and Slezak, Dominik (eds), U- and E-service, science and technology, pp. 125-133, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Maitra, Subhamoy*, Sarkar, Santanu* and Chowdhury, Morshed (2010) Faster CRT-RSA Decryption towards RFID applications, in Li, Yingjiu and Zhou, Jianying (eds), Radio frequency identification system security : RFIDsec'10 Asia Workshop proceedings, pp. 61-72, IOS Press, Amsterdam, The Netherlands [B1]
DRO entry for this publication

Fudzee, Mohd Farhan Md and Abawajy, Jemal (2010) Request-driven cross-media content adaptation technique, in Ragab, Khaled; Helmy, Tarek and Hassanien, Aboul-Ella (eds), Developing advanced web services through P2P computing and autonomous agents : trends and innovations, pp. 91-113, Information Science Reference, Hershey, Pa., USA [B1]
DRO entry for this publication

Paternain, D.*, Bustince, H.*, Fernandez, J.*, Beliakov, Gleb and Mesiar, R.* (2010) Some averaging functions in image reduction, in Garcia-Pedraja, Nicolas; Herera, Francisco; Fyfe, Colin; Benitez, Jose Manuel and Ali, Moonis (eds), Trends in applied intelligent systems, pp. 399-408, Springer, Berlin, Germany [B1]
DRO entry for this publication

Patterson, Nicholas Charles and Hobbs, Michael (2010) A multidiscipline approach to governing virtual property theft in virtual worlds, in Berleur, Jacques; Hercheui, Magda David and Hilty, Lorenz M. (eds), What kind of information society? : governance, virtuality, surveillance, sustainability, resilience : 9th IFIP TC 9 international conference, HCC9 2010 and 1st IFIP TC 11 international conference, CIP 2010, held as part of WCC 2010, Brisbane, Australia,, pp. 161-171, Springer, Berlin, Germany [B1]
DRO entry for this publication

Sajjanhar, Atul, Lu, Guojun* and Zhang, Dengsheng* (2010) Novel spectral descriptor for object shape, in Qiu, Guoping; Lam, Kin Man; Xue, Xiang-Yang; Kuo, C.-C. Jay and Lew, Michael S. (eds), Advances in multimedia information processing - PCM 2010, pp. 58-67, Springer - Verlag, Berlin, Germany [B1]
DRO entry for this publication

Yu, Shui, Thapngam, Theerasak, Wei, Su and Zhou, Wanlei (2010) Efficient web browsing with perfect anonymity using page prefetching, in Hsu, Ching-Hsien; Yang, Laurence T.; Park, Jong Hyuk and Yeo, Sang-Soo (eds), Algorithms and architectures for parallel processing : 10th international conference, ICA3PP 2010, Busan, Korea, May 21-23, 2010 : proceedings, pp. 1-12, Springer-Verlag Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Dang, Xuan Hong* and Ong, Kok-Leong (2010) Knowledge discovery in data streams, in Bates, Marcia J. (eds), Encyclopedia of library and information sciences, pp. 3115-3128, CRC Press, Boca Raton, Fla. [B2]
DRO entry for this publication

An, Jiyuan*, Choi, Kwok Pui*, Wells, Christine A.* and Chen, Yi-Ping Phoebe (2010) Identifying co-regulating microrna groups, Journal of bioinformatics and computational biology, vol. 8, no. 1, pp. 99-115, Imperial College Press, London, England [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Scopus - 7
DRO entry for this publication

Beliakov, Gleb, James, Simon, Mordelova, Juliana*, Ruckschlossová, Tatiana* and Yager, Ronald R.* (2010) Generalized Bonferroni mean operators in multi-criteria aggregation, Fuzzy sets and systems, vol. 161, no. 17, pp. 2227-2242, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-77955271541
Citation counts: Scopus - 33, Thomson - 21
DRO entry for this publication

Beliakov, Gleb, Calvo, Tomasa* and James, Simon (2010) On Lipschitz properties of generated aggregation functions, Fuzzy sets and systems, vol. 161, no. 10, pp. 1437-1447, Elsevier, Amsterdam, Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-77949486401
Citation counts: Scopus - 1, Thomson - 4
DRO entry for this publication

Beliakov, Gleb and Ferrer, Albert* (2010) Bounded lower subdifferentiability optimization techniques : applications, Journal of global optimization, vol. 47, no. 2, pp. 211-231, Springer, New York, N.Y. [C1]
ERA journal ID: 246 – Scopus EID: 2-s2.0-77954757424
Citation counts: Scopus - 1
DRO entry for this publication

Calvo, Tomasa* and Beliakov, Gleb (2010) Aggregation functions based on penalties, Fuzzy sets and systems, vol. 161, no. 10, pp. 1420-1436, Elsevier, Amsterdam, Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-77949485464
Citation counts: Scopus - 33, Thomson - 30
DRO entry for this publication

Casey, John* and Zhou, Wanlei (2010) A locality aware cache diffusion system, Journal of supercomputing, vol. 52, no. 1, pp. 1-22, Springer New York LLC, New York, N.Y. [C1]
ERA journal ID: 18042 – Scopus EID: 2-s2.0-77954563450
DRO entry for this publication

Chen, Qingfeng and Chen, Yi-Ping Phoebe (2010) Mining characteristic relations bind to RNA secondary structures, IEEE transactions on information technology in biomedicine, vol. 14, no. 1, pp. 10-15, IEEE, Piscataway, NJ [C1]
ERA journal ID: 13572 – Scopus EID: 2-s2.0-76849105021
Citation counts: Scopus - 1
DRO entry for this publication

Craig, Annemieke and Coldwell, Jo (2010) An initiative to address the gender imbalance in tertiary IT studies, Interdisciplinary journal of information, knowledge and management, vol. 5, pp. 177-190, Informing Science Institute, Santa Rosa, Calif. [C1]
ERA journal ID: 41726 – Scopus EID: Not tagged
DRO entry for this publication

Doss, Robin, Li, Gang, Mak, Vicky and Tissera, Menik (2010) Information discovery in mission-critical wireless sensor networks, Computer networks, vol. 54, no. 14, pp. 2383-2399, Elsevier BV, North-Holland, Amsterdam, Netherlands [C1]
ERA journal ID: 22147 – Scopus EID: 2-s2.0-77956268552
Citation counts: Scopus - 7, Thomson - 5
DRO entry for this publication

Doss, Robin, Chandra, Deddy, Pan, Lei, Zhou, Wanlei and Chowdhury,Morshed (2010) Dynamic addressing in wireless sensor networks without location awareness, Journal of information science and engineering, vol. 26, no. 2, pp. 443-460, Institute of Information Sciences and Technology, Massey University, Taipei, Taiwan [C1]
ERA journal ID: 39672 – Scopus EID: 2-s2.0-77950380498
DRO entry for this publication

Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi* and Alazab, Mamoun* (2010) Applying genetic algorithm for optimizing broadcasting process in ad-hoc network, International journal of recent trends in engineering and technology, vol. 4, no. 1, pp. 68-72, The Association of Computer Electronics and Electrical Engineers (ACEEE), New York, N.Y. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Fan, Xiang* and Xiang, Yang (2010) Modeling the propagation of peer-to-peer worms, Future generation computer systems, vol. 26, no. 8, pp. 1433-1443, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-77955517954
Citation counts: Scopus - 15, Thomson - 10
DRO entry for this publication

Galar, M.*, Bustince, H.*, Fernandez, J.*, Sanz, J.* and Beliakov, G. (2010) Fuzzy entropy from weak fuzzy subsethood measures, Neural network world : international journal on non-standard computing and artificial intelligence, vol. 20, no. 1, pp. 139-158, Czech Technical University in Prague, Faculty of Transportation Sciences, Prague, Czech Republic [C1]
ERA journal ID: 41067 – Scopus EID: 2-s2.0-77749337462
Citation counts: Scopus - 2
DRO entry for this publication

Gao, Longxiang, Li, Ming, Li, Bai and Zhou, Wanlei (2010) Virtual backbone routing structures in wireless ad-hoc networks, Global journal of computer science and technology, vol. 10, no. 4, pp. 21-32, Global Journals, Pradesh, India [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Geng, Xin*, Smith-Miles, Kate*, Wang, Liang*, Li, Ming and Wu, Qiang* (2010) Context-aware fusion : a case study on fusion of gait and face for human identification in video, Pattern recognition, vol. 43, no. 10, pp. 3660-3673, Pergamon, Oxford, England [C1]
ERA journal ID: 4503 – Scopus EID: 2-s2.0-77953652311
Citation counts: Scopus - 13, Thomson - 12
DRO entry for this publication

Goel, Shivali, Abawajy, Jemal and Kim, Tai-hoon* (2010) Performance analysis of receive diversity in wireless sensor networks over GBSBE models, Sensors, vol. 10, no. 12, pp. 11021-11037, Molecular Diversity Preservation International, Basel, Switzerland [C1]
ERA journal ID: 34304 – Scopus EID: 2-s2.0-78650259837
Citation counts: Scopus - 1
DRO entry for this publication

Goold, Annegret, Coldwell, Jo and Craig, Annemieke (2010) An examination of the role of the e-tutor, Australasian journal of educational technology, vol. 26, no. 5, pp. 704-716, ASCILITE, Wollongong, N.S.W. [C1]
ERA journal ID: 20265 – Scopus EID: 2-s2.0-77956786038
Citation counts: Scopus - 8, Thomson - 4
DRO entry for this publication

Goscinski, Andrzej and Brock, Michael (2010) Toward dynamic and attribute based publication, discovery and selection for cloud computing, Future generation computer systems, vol. 26, no. 7, pp. 947-970, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-77955712658
Citation counts: Scopus - 78, Thomson - 33
DRO entry for this publication

Herawan, Tutut*, Deris, Mustafa Mat* and Abawajy, Jemal H. (2010) A rough set approach for selecting clustering attribute, Knowledge-based systems, vol. 23, no. 3, pp. 220-231, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18062 – Scopus EID: 2-s2.0-77549086430
Citation counts: Scopus - 45, Thomson - 30
DRO entry for this publication

Jiang, Da*, Zhou, Shuigeng*, Liu, Hui* and Chen, Yi-Ping Phoebe (2010) Inferring minimal feasible metabolic networks of Escherichia coli, Applied biochemistry and biotechnology, vol. 160, no. 1, pp. 222-231, Humana Press, Totowa, N. J. [C1]
ERA journal ID: 3329 – Scopus EID: 2-s2.0-73649126880
DRO entry for this publication

Kelarev, A. V.*, Yearwood, J. L.*, Watters, P.*, Wu, X.*, Abawajy, J. H. and Pan, L. (2010) Internet security applications of the Munn rings, Semigroup forum, vol. 81, no. 1, pp. 162-171, Springer New York LLC, New York N.Y. [C1]
ERA journal ID: 389 – Scopus EID: 2-s2.0-77954863117
Citation counts: Scopus - 3, Thomson - 3
DRO entry for this publication

Li, Gang, Law, Rob*, Rong, Jia and Vu, Huy Quan (2010) Incorporating both positive and negative association rules into the analysis of outbound tourism in Hong Kong, Journal of travel & tourism marketing, vol. 27, no. 8, pp. 812-828, Routledge, Philadelphia, Pa. [C1]
ERA journal ID: 19711 – Scopus EID: 2-s2.0-78650107089
Citation counts: Scopus - 6, Thomson - 4
DRO entry for this publication

Li, Gang, Law, Rob* and Wang, Jinlong* (2010) Analyzing international travelers' profile with self-organizing maps, Journal of travel & tourism marketing, vol. 27, no. 2, pp. 113-131, Routledge Taylor & Francis Group, Philadelphia, Pa. [C1]
ERA journal ID: 19711 – Scopus EID: 2-s2.0-77949335913
Citation counts: Scopus - 3, Thomson - 3
DRO entry for this publication

Li, Xiangwen*, Mak, Vicky and Zhou, Sanming* (2010) Optimal radio labellings of complete m-ary trees, Discrete applied mathematics, vol. 158, no. 5, pp. 507-515, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 127 – Scopus EID: 2-s2.0-75449113820
Citation counts: Scopus - 7, Thomson - 2
DRO entry for this publication

Mann, Scott and Chen, Yi-Ping Phoebe (2010) Bacterial genomic G + C composition-eliciting environmental adaptation, Genomics, vol. 95, no. 1, pp. 7-15, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 2388 – Scopus EID: 2-s2.0-72049086424
Citation counts: Scopus - 20, Thomson - 17
DRO entry for this publication

Mann, Scott, Li, Jinyan* and Chen, Yi-Ping Phoebe (2010) Insights into bacterial genome composition through variable target GC content profiling, Journal of computational biology, vol. 17, no. 1, pp. 79-96, Mary Ann Liebert Publishers, New York, N. Y. [C1]
ERA journal ID: 39765 – Scopus EID: 2-s2.0-77149173190
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Qu, Wenyu*, Zhou, Wanlei and Kitsuregawa, Masaru* (2010) Sharable file searching in unstructured peer-to-peer systems, Journal of supercomputing, vol. 51, no. 2, pp. 149-166, Springer New York LLC, New York, N.Y. [C1]
ERA journal ID: 18042 – Scopus EID: 2-s2.0-76549101455
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Sajjanhar, Atul, Lu, Guojun*, Zhang, Dengsheng*, Hou, Jingyu, Zhou, Wanlei and Chen, Yi-Ping Phoebe (2010) Spectral shape descriptor using spherical harmonics, Integrated computer-aided engineering, vol. 17, no. 2, pp. 167-173, IOS Press, Netherlands [C1]
ERA journal ID: 41720 – Scopus EID: 2-s2.0-77954556101
Citation counts: Scopus - 4, Thomson - 3
DRO entry for this publication

Sajjanhar, A., Lu, G.*, Zhang, D.* and Zhou, W. (2010) Connectivity-based shape descriptors, International journal of computers and applications, vol. 32, no. 1, pp. 93-98, ACTA Press, Calgary, Canada [C1]
ERA journal ID: 17956 – Scopus EID: 2-s2.0-77951273706
DRO entry for this publication

Wang, Jinlong*, Wu, Shunyao* and Li, Gang (2010) Clustering with instance and attribute level side information, International journal of computational intelligence systems, vol. 3, no. 6, pp. 770-785, Atlantis Press, Paris, France [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Scopus - 4, Thomson - 2
DRO entry for this publication

Wang, Jinlong*, Wu, Shunyao*, Jiao, Yang* and Vu, Huy Quan (2010) Study on student score based on data mining, Journal of convergence information technology, vol. 5, no. 6, pp. 171-179, Advanced Institute of Convergence IT (AICIT), Korea [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Wang, Jinlong*, Gao, Ke* and Vu, Huy Quan (2010) Spamcooling : a parallel heterogeneous ensemble spam filtering system based on active learning techniques, Journal of convergence information technology, vol. 5, no. 4, pp. 90-102, Advanced Institute of Convergence IT, Korea [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Wang, Jinlong*, Gao, Ke* and Li, Gang (2010) Empirical analysis of customer behaviors in Chinese e-commerce, Journal of networks, vol. 5, no. 10, pp. 1177-1184, Academy Publisher, Oulu, Finland [C1]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Wang, Jinlong*, Wen, Can*, Wu, Shunyao* and Vu, Huy Quan (2010) A visual mining system for theme development evolution analysis of scientific literature, International journal of digital content technology and its applications JDCTA, vol. 4, no. 3, pp. 215-223, Advanced Institute of Convergence IT (AICIT), Korea [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Wang, Yu, Xiang, Yang and Yu, Shun-Zheng* (2010) An automatic application signature construction system for unknown traffic, Concurrency computation practice and experience, vol. 22, no. 13, pp. 1927-1944, John Wiley & Sons, West Sussex, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-77956489422
Citation counts: Scopus - 15, Thomson - 10
DRO entry for this publication

Xiang, Yang*, Tian, Daxin* and Zhou, Wanlei (2010) A microscopic competition model and its dynamics analysis on network attacks, Concurrency computation practice and experience, vol. 22, no. 4, pp. 503-517, John Wiley & Sons, West Sussex, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-77449150932
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Yager, Ronald R.* and Beliakov, Gleb (2010) OWA operators in regression problems, IEEE transactions on fuzzy systems, vol. 18, no. 1, pp. 106-113, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 17872 – Scopus EID: 2-s2.0-76849109701
Citation counts: Scopus - 21, Thomson - 18
DRO entry for this publication

Yang, Pengyi*, Zhou, Bing B.*, Zhang, Zili and Zomaya, Albert Y.* (2010) A multi-filter enhanced genetic ensemble system for gene selection and sample classification of microarray data, BMC bioinformatics, vol. 11, no. Suppl - 1, pp. 1-12, BioMed Central Ltd, London, England [C1]
ERA journal ID: 40343 – Scopus EID: 2-s2.0-75149178749
Citation counts: Scopus - 7, Thomson - 10
DRO entry for this publication

Yang, Pengyi*, Zhang, Zili, Zhou, Bing B.* and Zomaya, Albert Y.* (2010) A clustering based hybrid system for biomarker selection and sample classification of mass spectrometrydata, Neurocomputing, vol. 73, no. 13-15, pp. 2317-2331, Elsevier BV, Amsterdam [C1]
ERA journal ID: 18092 – Scopus EID: 2-s2.0-77955325026
Citation counts: Scopus - 6, Thomson - 3
DRO entry for this publication

Yap, Poh Hean, Wang, Xungai, Wang, Lijing* and Ong, Kok-Leong (2010) Prediction of wool knitwear pilling propensity using support vector machines, Textile Research Journal, vol. 80, no. 1, pp. 77-83, Sage Publications, London, England [C1]
ERA journal ID: 3629 – Scopus EID: 2-s2.0-72149127378
Citation counts: Scopus - 10, Thomson - 10
DRO entry for this publication

Yi, Xun* and Batten, Lynn (2010) Wireless broadcast encryption based on smart cards, Wireless networks, vol. 16, no. 1, pp. 153-165, Springer, New York, N.Y. [C1]
ERA journal ID: 4515 – Scopus EID: 2-s2.0-45149094227
Citation counts: Thomson - 3
DRO entry for this publication

Zhao, Ying*, Yue, Ye*, Zhang, Xianren*, Li, Shuangyang* and Sajjanhar, Atul (2010) Many-body dissipative particle dynamics simulation of wetting phenomena, Frontiers of chemical engineering in China, vol. 4, no. 3, pp. 280-282, Gaodeng Jiaoyu Chubanshe, China [C1]
ERA journal ID: 3959 – Scopus EID: 2-s2.0-77955055494
DRO entry for this publication

Zhu, Wei*, Hou, Jingyu and Chen, Yi-Ping Phoebe* (2010) Semantic and layered protein function prediction from PPI networks, Journal of theoretical biology, vol. 267, no. 2, pp. 129-136, Academic Press, London, England [C1]
ERA journal ID: 39758 – Scopus EID: 2-s2.0-77956235987
Citation counts: Scopus - 9, Thomson - 8
DRO entry for this publication

Ahmed, Mahbub and Xiang, Yang (2010) Above the trust and security in cloud computing : a notion towards innovation, in Unknown (ed.), IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, pp. 723-730, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Al-Jaljouli, Raja and Abawajy, Jemal (2010) Negotiation strategy for mobile agent-based e-negotiation, in Unknown (ed.), PRIMA 2010 : Proceedings of the 13th International conference on principles and practice of multi-agent systems, pp. 128-135, Springer, Berlin , Germany [E1]
DRO entry for this publication

Alaraj, Maen*, Hou, Jingyu and Fukami, Tadanori* (2010) A neural network based human identification framework using ear images, in Unknown (ed.), TENCON 2010 : Proceedings of the 2010 IEEE Region 10 Conference, pp. 1595-1600, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Alazab, Ammar, Venkatraman, Sitalakshmi*, Abawajy, Jemal and Alazab, Mamoun* (2010) An optimal transportation routing approach using GIS-based dynamic traffic flows, in Rawani, A.M. and Zhang, Chris (eds), ICMTA 2010 : Proceedings of the International Conference on Management Technology and Applications, pp. 172-178, Research Publishing Services, Singapore [E1]
DRO entry for this publication

Batten, Lynn and Pan, Lei (2010) Using relationship-building in event profiling for digital forensic investigations, in Unknown (ed.), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Springer, Shangai, China [E1]
DRO entry for this publication

Batten, Lynn and Wolf, Christopher* (2010) The padding scheme for RSA signatures, in Warren, Matthew (eds), ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, pp. 1-7, School of Information Systems, Deakin University, Melbourne, Vic. [E1]
DRO entry for this publication

Beliakov, Gleb, Bustince, Humberto*, Fernandez, Javier* and Paternain, Daniel* (2010) Means on discrete product lattices, in Rubio, Antonio Peregrin; Fernandez, Jesus Alcala; Velo, Francisco Jose Moreno and Hernandez, Francisco Alfredo Marquez (eds), ESTYLF 2010 : Proceedings of the XIII Spanish Conference on Technologies and Fuzzy Logic, pp. 315-319, Universidad de Huelva, Huelva, Spain [E1]
DRO entry for this publication

Brock, Michael and Goscinski, Andrzej (2010) Toward ease of discovery, selection and use of clusters within a cloud, in Unknown (ed.), CLOUD 2010 : Proceedings 2010 IEEE 3rd International Conference on Cloud Computing, pp. 289-296, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Brock, Michael and Goscinski, Andrzej (2010) Grids vs. clouds, in Unknown (ed.), FutureTech 2010 : Proceedings of the 5th International Conference on Future Information Technology, pp. 1-6, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Brock, Michael and Goscinski, Andrzej (2010) A technology to expose a cluster as a service in a cloud, in Chen, Jinjun and Ranjan, Rajiv (eds), AusPDC 2010 : Proceedings of the 8th Australasian Symposium on Parallel and Distributed Computing, pp. 3-12, Australian Computer Society Inc., Darlinghurst, Australia [E1]
DRO entry for this publication

Buyya, Rajkumar*, Beloglazov, Anton* and Abawajy, Jemal (2010) Energy-efficient management of data center resources for cloud computing : a vision, architectural elements, and open challenges, in Arabnia, Hamid R. (eds), PDPTA 2010 : Proceedings of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications, pp. 6-17, CSREA Press, United States of America [E1]
DRO entry for this publication

Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi* and Alazab, Mamoun* (2010) GOM : new genetic optimizing model for broadcasting tree in MANET, in Unknown (ed.), ICCTD 2010 : Proceedings of the 2010 2nd International Conference on Computer Technology and Development, pp. 477-481, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Fernando, Harinda and Abawajy, Jemal (2010) A hybrid mutual authentication protocol for RFID, in Unknown (ed.), MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 1-2, ICST Gent, Gent, Belgium [E1]
DRO entry for this publication

Gan, Min and Dai, Honghua (2010) A study on the accuracy of frequency measures and its impact on knowledge discovery in single sequences, in Fan, Wei; Hsu, Wynne; Webb, Geoffrey I.; Liu, Bing; Zhang, Chengqi; Gunopulos, Dimitrios and Wu, Xindong (eds), ICDMW 2010 : Proceedings of 10th IEEE International Conference on Data Mining Workshops, pp. 859-866, IEEE Computer Society, Sydney, NSW [E1]
DRO entry for this publication

Islam, Rafiqul, Tian, Ronghua, Batten, Lynn and Versteeg, Steve* (2010) Classification of malware based on string and function feature selection, in Unknown (ed.), CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, pp. 9-17, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Islam, Rafiqul and Xiang, Yang (2010) Email classification using data reduction method, in Unknown (ed.), CHINACOM 2010 : Proceedings of the 5th International ICST Conference on Communications and Networking in China, pp. 1-5, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Jurio, A.*, Paternain, D.*, Bustince, H.*, Guerra, C.* and Beliakov, G. (2010) A construction method of Atanassov’s intuitionistic fuzzy sets for image processing, in Unknown (ed.), IS 2010 : Proceedings of the 5th IEEE International Conference of Intelligent Systems, pp. 337-342, IEEE, United States [E1]
DRO entry for this publication

Li, Ming, Bonti, Alessio and Zhou, Wanlei (2010) OST : A transaction based online social trust model for social network and file sharing security, in Unknown (ed.), IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, pp. 826-832, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Li, Ming, Gao, Longxiang and Zhou, Wanlei (2010) S-Kcore : a social-aware Kcore decomposition algorithm in pocket switched networks, in Unknown (ed.), IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, pp. 737-742, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Li, Ping, Zhou, Wanlei and Wang, Yini (2010) Getting the real-time precise round-trip time for stepping stone detection, in Xiang, Yang; Samarati, Pierangela; Hu, Jiankun; Zhou, Wanlei and Sadeghi, Ahmad-Reza (eds), NSS 2010 : Proceedings of the 4th International Conference on Network and System Security, pp. 377-382, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Li, Ping, Zhou, Wanlei and Yu, Yanli* (2010) A quick-response real-time stepping stone detection scheme, in Unknown (ed.), HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, pp. 677-682, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

McLachlan, Christine, Craig, Annemieke and Coldwell, Jo (2010) Student perceptions of ICT : a gendered analysis, in Unknown (ed.), ACE 2010 : Proceedings of the twelfth Australasian computing education conference, Australian Computer Society, Sydney South, N.S.W. [E1]
DRO entry for this publication

Fudzee, Mohd Farhan Md, Abawajy, Jemal and Deris, Mustafa Mat* (2010) Multi-criteria content adaptation service selection broker, in Parashar, Manish and Buyya, Rajkumar (eds), 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing : proceedings : Melbourne, Australia, 17-20 May, 2010, pp. 721-726, IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, Calif. [E1]
DRO entry for this publication

Fudzee, Mohd Farhan Md, Abawajy, Jemal and Deris, Mustafa Mat* (2010) Service discovery for service-oriented content adaptation, in Unknown (ed.), MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services, pp. 1-2, ICST Gent, Gent, Belgium [E1]
DRO entry for this publication

Nichol, Sophie (2010) Emergence of creativity in learning via social technologies, in Michael, Katina (eds), ISTAS 2010 : Proceedings of the IEEE International Symposium on Technology and Society : Social implications of emerging technologies, pp. 196-204, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Paternain, Daniel*, Bustince, Humberto*, Fernandez, Javier*, Beliakov, Gleb and Mesiar, Radko* (2010) Image reduction with local reduction operators, in Unknown (ed.), WCCI 2010 : IEEE World Congress on Computational Intelligence, pp. 1-8, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Patterson, Nicholas C. and Hobbs, Michael (2010) Can virtual world property be considered a digital good?, in Kommers, Piet; Issa, Tomayess and Isaias, Pedro (eds), IADIS ITS 2010 : Proceedings of THE IADIS International Conference : Internet Technologies & Society, pp. 33-40, IADIS Press, Perth, Australia [E1]
DRO entry for this publication

Ray, Biplob R.* and Chowdhury, Morshed U. (2010) Enhanced RFID mutual authentication scheme based on shared secret information, in Harris, Frederick C. Jr. and Hu, Fei (eds), CAINE 2010 : Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, pp. 208-213, International Society for Computers and their Applications (ISCA)., Cary, N.C. [E1]
DRO entry for this publication

Biplob, Ray*, Chowdhury, Morshed U. and Pham, Thao (2010) Mutual authentication with malware protection for a RFID system, in Sajeev, A.S.M. (eds), ITS 2010 : Proceedings of the Annual International Conference on Information Technology Security, pp. 24-29, Global Science & Technology Forum (GSTF), Singapore [E1]
DRO entry for this publication

Saha, Subrata, Sajjanhar, Atul, Gao, Shang, Dew, Robert and Zhao, Ying* (2010) Delivering categorized news items using RSS feeds and web services, in Unknown (ed.), CIT 2010 : 10th IEEE International Conference on Computer and Information Technology Proceedings, pp. 698-702, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Sarkar, Pinaki*, Saha, Amrita* and Chowdhury, Morshed U. (2010) Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes, in Unknown (ed.), IEEE MASS 2010 : Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, pp. 507-512, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Smith-Miles, Kate* and Islam, Rafiqul (2010) Meta-learning for data summarization based on instance selection method, in Unknown (ed.), WCCI 2010 : IEEE World Congress on Computational Intelligence, pp. 1-8, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Tian, Ronghua, Islam, Rafiqul, Batten, Lynn and Versteeg, Steve* (2010) Differentiating malware from cleanware using behavioural analysis, in Unknown (ed.), MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, pp. 23-30, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Tian, Yukang* and Vu, Huy Quan (2010) A multiple population genetic algorithm and its application in fuzzy controller, in Yu, Fei; Peng, Xuange; Liu, Haiwen; Shu, Jian and Ng, Roy (eds), IITSI 2010 : Proceedings of the 3rd International Symposium on Intelligent Information Technology and Security Informatics, pp. 729-733, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Vijayakumar, V.*, Wahida Banu, R. S. D.* and Abawajy, Jemal (2010) Novel mechanism for evaluating feedback in the grid environment on resource allocation, in Arabnia, Hamid R.; Gravvanis, George A. and Solo, Ashu M.G. (eds), GCA 2010 : Proceedings of the 2010 International Conference on Grid Computing and Applications, pp. 11-17, CSREA Press, Las Vegas, Nevada [E1]
DRO entry for this publication

Wang, Jinlong*, Wu, Shunyao*, Vu, Huy Quan and Li, Gang (2010) Text document clustering with metric learning, in Chen, Hsin-Hsi; Efthimiadis, Efthimis N.; Savoy, Jacques; Crestani, Fabio and Marchand-Maillet, Stephane (eds), Proceedings of the 33rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 783-784, Association for Computing Machinery, New York, N.Y. [E1]
DRO entry for this publication

Wen, Sheng*, Jia, Weijia*, Zhou, Wei*, Zhou, Wanlei and Xu, Chuan* (2010) CALD : surviving various application-layer DDoS attacks that mimic flash crowd, in Xiang, Yang; Samarati, Pierangela; Hu, Jiankun; Zhou, Wanlei and Sadeghi, Ahmad-Reza (eds), NSS 2010 : Proceedings of the 4th International Conference on Network and System Security, pp. 247-254, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Wen, Sheng*, Xiang, Yang and Zhou, Wanlei (2010) A lightweight intrusion alert fusion system, in Unknown (ed.), HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, pp. 695-700, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Yu, Shui, Thapngam, Theerasak, Tse, Hou In and Wang, Jinlong* (2010) Anonymous web browsing through predicted pages, in unknown (ed.), IEEE Globecom 2010 : Proceedings of the 53rd Global Communications Conference, Exhibition and Industry Forum, pp. 1581-1585, IEEE, United States [E1]
DRO entry for this publication

Zhao, Laiping*, Ren, Yizhi*, Xiang, Yang and Sakurai, Kouichi* (2010) Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems, in Unknown (ed.), HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, pp. 434-441, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Khaddage, Ferial and Lattemann, Christoph* (2010) A proposed mobile network architecture for universities, in Unknown (ed.), ICL 2010 : Academic and corporate e-learning in a global context : Proceedings of the Interactive Collaborative Learning 2010 international conference, pp. 590-599, Kassel University Press, Berlin, Germany [E1.1]
DRO entry for this publication

Khaddage, Ferial, Chonka, Ashley and Zhou, Wanlei (2010) Image indexing for learning content via a mobile phone, in Abas, Zoraini Wati; Jung, Insung and Luca, Joseph (eds), GLOBAL LEARN 2010 : Proceedings of the Learning and Technology Asia Pacific 2010 Global Conference, pp. 187-194, AACE, Chesapeake, Va. [E1.1]
DRO entry for this publication

Wu, Shunyao*, Wang, Jinlong*, Vu, Huy Quan and Li, Gang (2010) Text clustering with important words using normalization, JCDL 2010 : Proceedings of the 2010 ACM/IEEE International Joint Conference on Digital Libraries : Vision 2020 - Beyond Digital Libraries, p. 393, Association for Computing Machinery, New York, N.Y. [E2]
DRO entry for this publication

Grants and Consultancies

Grants with funding during 2010

Research Income - National Competitive Grants

Kloeden, P and Ivanov, A. Computer visualisation of chaotic delay equations, Australian Research Council Small Grant [T]

  • 1995: $9,684

Goscinski, A, Horan, P and Gerrity, G*. Performance studies of distributed operating systems based on the Rhodos system, Australian Research Council Large Grant [T]

  • 1995: $44,768

Ivanov, A. Perturbations of Difference Equations, Australian Research Council Large Grant [T]

  • 1998: $1,167
  • 1997: $48,000

Wang, L. Solving Combinatorial Optimisation Problems using Discrete Time Neural Networks, Australian Research Council Small Grant [T]

  • 1997: $19,414

Garner, B and Sunwoo, J*. An automated (concurrent) software audit for software development process, Australian Research Council SPIRT Grant [T]

  • 2000: $77,487
  • 1999: $151,165

Goscinski, A. Supporting PVM Programmers and Improving Performance of PVM Based Parallel Processing., Australian Research Council Small Grant [T]

  • 1998: $17,000

Goscinski, A and Silcock, J. The Management of Parallel Processes, Data and computational Resources for Applications Using distributed Shared Memory., Australian Research Council Small Grant [T]

  • 1999: $17,000

Yang, Y and Zhou, W. Coordination and Security Mechanisms for Computer-Mediated Teamwork Support in a Web-based Environment., Australian Research Council Small Grant [T]

  • 1998: $10,000

Yang, Y. Visual Programming support for Web-Based Teamwork Modelling., Australian Research Council Small Grant [T]

  • 1999: $10,000

Zhou, W. A Reactive system for Building Fault-Tolerant java Applications, Australian Research Council Small Grant [T]

  • 1998: $10,000

Zhou, W. Towards the Building of Reliable Web-Based Databases., Australian Research Council Small Grant [T]

  • 1999: $14,000

Webb, G. Machine-expert collaborative knowledge acquisition, Australian Research Council Large Grant [T]

  • 1996: $47,286
  • 1995: $46,934

Kloeden, P and Diamond, P*. Numerical Analysis of Dynamical Systems and the Computational Process as a Dynamical System, Australian Research Council Large Grant [T]

  • 1997: $71,280
  • 1996: $68,795
  • 1995: $65,000

Webb, G, Pazzani, M* and Zheng, Z*. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2000: $56,971

Goscinski, A. The Improvement of Execution Performance of Parallel Applications and Utilisation of a Cluster of Workstations Using Global Scheduling, Australian Research Council Small Grant [T]

  • 2000: $16,300

Zhang, C. Coordinating Multi-Agent Systems for Business Process Management Based on Temporal Dependencies, Australian Research Council Small Grant [T]

  • 2000: $16,000

Zhou, W. Managing Replicated Transactions in Web-Based Applications to survive Network Partitioning Failures, Australian Research Council Small Grant [T]

  • 2000: $13,000

Webb, G. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2002: $61,626
  • 2001: $60,281

Goscinski, A, Zhou, B and Brent, R. Job Scheduling Strategies for General-Purpose High Performance Computing Clusters, ARC - Discovery [T]

  • 2004: $70,033
  • 2003: $66,155
  • 2002: $62,322

Zou, L and Hu, E. Removal of Toxic Air Pollutants from car cabin by Photocatalytic Oxidation Reactor, Australian Research Council Linkage APAI [T]

  • 2005: $24,650

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System, Australian Research Council Linkage Project [T]

  • 2005: $24,650
  • 2004: $48,260

Dawson, E*, Batten, L and Simpson, L*. Efficient and Secure Word-Based Stream Ciphers for Wireless Communications, Australian Research Council Discovery Project [T]

  • 2005: $16,666
  • 2004: $16,666

Chen, Y. Australian Centre for Genome-Phenome Bioinformatics, ARC Centre - Centres of Excellence [T]

  • 2009: $54,572
  • 2005: $96,122
  • 2004: $82,000

Chen, Y. Integrating Database Technologies and Visual Analysis, Australian Research Council, Project - Discovery - Projects [T]

  • 2004: $62,961

Chen, Y, Wong, L* and Li, J*. Development of Knowledge Discovery for High Dimensional Biomedical Data, Australian Research Council [T]

  • 2005: $7,147

Goscinski, A, Silcock, J, Hobbs, M and Dew, R. Self Discovery, Self Configuration and Self Healing of Enterprise Grids, Australian Research Council Discovery Project [T]

  • 2005: $82,701

Chen, Y. Exploiting Database Technologies for the Visualization and Analysis of Measured and Simulated Plant Structures in Bioinformatics, Australian Research Council Discovery Project [T]

  • 2005: $51,050

Zhou, S* and Mak, V. Channel Assignment in Cellular Communication Systems and Optical Networks, Australian Research Council Discovery Project [T]

  • 2005: $2,500

Wang, H* and Charnes, C. Private Information Retrieval, Australian Research Council Discovery Project [T]

  • 2005: $10,000

Zhou, W, Shi, W* and Shi, W. Protecting Web Services from Distributed Denial of Service Attacks, ARC Collaborative - Linkage - Projects (Round 2, APAI) [T]

  • 2009: $13,069
  • 2005: $12,325

Zhou, W. Development of methods to address internet crime, ARC Grant - Discovery Projects [T]

  • 2009: $78,568

Research Income - Other Public Sector Funding

Ivanov, A. Visiting fellowship for Professor Alexander Sharkovsky. [U]

  • 1997: $13,950

Hobbs, M. PhD Scholarship - Brendan McKenzie [U]

  • 2005: $8,931
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Warren, M. PhD Scholarship - Warren Brooks [U]

  • 2002: $13,000

Zhou, W. PhD Scholarship - Elicia Lanham [U]

  • 2005: $8,228
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Zhou, W. Local Government System [U]

  • 2005: $1,250
  • 2004: $7,500
  • 2003: $1,250

Goscinski, A. PhD Scholarship - Andrew Maloney [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - John Casey [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - Naomi Augar [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Batten, L, Doss, R and Palm, B*. Recovery Mechanisms for Wireless Sensor Devices [U]

  • 2009: $18,855

Research Income - Industry and Other Funding

Garner, B. Scholarship Income [V]

  • 2000: $20,000

Batten, L and Castleman, T. Supplier wide eBusiness engagement Project [V]

  • 2003: $25,000
  • 2002: $25,000

Rosenberg, J. BlueJ- The interactive environment [V]

  • 2003: $168,899

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System [V]

  • 2004: $5,000
  • 2005: $5,000

Research Income - Industry and Other Funding - Australian

Zhou, W, Shi, W* and Shi, W. Protecting Web Services from Distributed Denial of Service Attacks [V.1]

  • 2005: $6,000

Beliakov, G. Reliable methods of data approximation and forecasting [V.1]

  • 2005: $21,000

Zhou, W and Shi, W. A novel computational approach for identifying transcription factor binding sites in gene promoters [V.1]

  • 2005: $23,000

Chen, Y. Development of data mining tools for the prediction of genomic linked clinical outcomes in a genetic disease state Cystic Fibrosis [V.1]

  • 2005: $18,000

Research Income - Industry and Other Funding - International B (Other Income)

Rosenberg, J. BlueJ- The interactive environment [V.3]

  • 2007: $215,655

Higher Degree by Research Completions

2010 - Doctor of Philosophy

Michael Brock. Supervisor: Andrzej Goscinski
Thesis entitled: Enhancing Clouds, Internet-scale Distributed Systems, using Attributed Web Services.

Ferial Khaddage. Supervisor: Wanlei Zhou
Thesis entitled: Image Indexing for Learning Content in a Mobile Learning Environment.

Scott Mann. Supervisor: Yi-Ping Phoebe Chen
Thesis entitled: Extensible Motif and Aberrant Nucleotide Extraction in Genomic Sequences.

Dharani Perera. Supervisor: Michael Hobbs
Thesis entitled: Voice Art: Exploring Assistive Technologies for Artists with Disabilities.

Yiqing Tu. Supervisor: Honghua Dai
Thesis entitled: Efficient Dimensionality Reduction and One-class Classification for Content-based Image Retrieval.

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Friday 31st October 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

8th November 2010