Aghasadeghi, K & Zare, D 2008, 'Efficacy of alternate day dosing of atorvastatin', Open Medicine, vol. 3, no. 2, pp. 163-166.
View/Download from: Publisher's site
View description>>
AbstractAtorvastatin is a synthetic inhibitor of 3-hydroxy 3-methylglutaryl coenzyme A (HMG-CoA) reductase inhibitor. It has a longer half life and longer duration of action than that of all other available HMG-CoA inhibitors. We evaluated the efficacy of alternate-day dosing of atorvastatin in comparison with the standard one-daily dose on total cholesterol, low and High-density lipoprotein (LDL and HDL) and triglycerides. This study is a randomized, blinded, and controlled clinical trial. Sixty-six patients with LDL cholesterol of more than 100 mg/dl were enrolled. Baseline fasting lipid profile (total cholesterol, LDL, HDL and triglyceride), liver function tests and creatine kinase were drawn. Patients were randomized to three atorvastatin dose groups. Group I received 10 mg of atorvastatin every day, group II received 20 mg of atorvastatin every day, and group III received 20 mg every other day. After 6 weeks of treatment with atorvastatin, fasting lipid profiles, liver function tests and creatine kinase concentrations were re-taken. Compliance to treatment was assessed at each visit. Of the sixty-six patients enrolled, sixty completed the study. All three regimens significantly reduced total cholesterol and LDL compared to baseline. No statistically significant difference existed between the three groups in regards to total or a percentage decrease in total cholesterol and LDL cholesterol at 6 weeks compared to baseline. All regimens were well tolerated and none of the patients showed significant elevation of liver enzyme or creatine kinase during the course of the study. In conclusions the alternate-day dosing of atorvastatin is an efficacious and safe alternate to daily dosing and yet inexpensive.
Azadeh, A, Ghaderi, SF, Javaheri, Z & Saberi, M 2008, 'A Fuzzy Mathematical Programming Approach to DEA Models', American Journal of Applied Sciences, vol. 5, no. 10, pp. 1352-1357.
View/Download from: Publisher's site
View description>>
Evaluating the performance of activities or organizations by traditional Data Envelopment Analysis (DEA) as efficiency frontier analysis models requires crisp input/output data. However, in real-world problems inputs and outputs are often imprecise. This study develops DEA models using imprecise data represented by fuzzy sets. An important outcome of assessing relative efficiencies within a group of Decision Making Units (DMUs) in fuzzy data envelopment analysis is to determine efficient DMUs. We find efficiency measures with fuzzy inputs and outputs via proposed model. An example using fuzzy data is presented for illustrative purposes. We apply this method in the application to the power generation sector of Iran. © 2008 Science Publications.
Azadeh, A, Saberi, M, Ghaderi, SF, Gitiforouz, A & Ebrahimipour, V 2008, 'Improved estimation of electricity demand function by integration of fuzzy system and data mining approach', Energy Conversion and Management, vol. 49, no. 8, pp. 2165-2177.
View/Download from: Publisher's site
Catley, C, McGregor, C, Percival, J, Curry, J, James, A & IEEE 2008, 'Multi-dimensional Knowledge Translation: Enabling Health Informatics Capacity Audits Using Patient Journey Models', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-8, pp. 1502-1505.
View/Download from: Publisher's site
Cetindamar, D & Hopkins, T 2008, 'Enhancing students’ responsibility towards society through civic involvement projects', Innovations in Education and Teaching International, vol. 45, no. 4, pp. 401-410.
View/Download from: Publisher's site
Cetindamar, D & Ulusoy, G 2008, 'Innovation performance and partnerships in manufacturing firms in Turkey', Journal of Manufacturing Technology Management, vol. 19, no. 3, pp. 332-345.
View/Download from: Publisher's site
View description>>
PurposeThis paper aims to shed light on the relationship between partnerships and innovation efforts of the firms. The goal is to understand whether Turkish firms collaborate for innovation or not and, if they do, what is the impact of partnerships on the innovation performance of firms?Design/methodology/approachIn this research, a survey methodology is employed. The questionnaire is implemented through structured interviews conducted with 135 Turkish companies from the textile, chemical, food and machinery industries.FindingsThe findings show that Turkish firms have high‐collaboration ties with other companies in particular but the existing partnerships have a weak impact on innovation performance.Research limitations/implicationsAs only one country is studied and data come from one year, the findings of this study are limited in terms of generalizing the results for a wide variety of developing countries.Practical implicationsNon‐materialized performance is to a degree due to low quality of relationships, but more importantly Turkish firms need to find ways to improve their partnerships and in‐house capabilities, particularly their absorptive capacities, if they want to improve their innovativeness through partnerships.Originality/valueThis paper is one of the early examples empirically investigating the relationship between technology collaborations and innovation performance of firms in a developing country c...
Chin-Teng Lin, Li-Wei Ko, Jin-Chern Chiou, Jeng-Ren Duann, Ruey-Song Huang, Sheng-Fu Liang, Tzai-Wen Chiu & Tzyy-Ping Jung 2008, 'Noninvasive Neural Prostheses Using Mobile and Wireless EEG', Proceedings of the IEEE, vol. 96, no. 7, pp. 1167-1183.
View/Download from: Publisher's site
Dellepiane, M, Pietroni, N, Tsingos, N, Asselot, M & Scopigno, R 2008, 'Reconstructing head models from photographs for individualized 3D-audio processing.', Comput. Graph. Forum, vol. 27, pp. 1719-1727.
View/Download from: Publisher's site
Devitt, SJ, Fowler, AG, Stephens, AM, Greentree, AD, Hollenberg, LCL, Munro, WJ & Nemoto, K 2008, 'Architectural design for a topological cluster state quantum computer', New. J. Phys., vol. 11, p. 083032.
View/Download from: Publisher's site
View description>>
The development of a large scale quantum computer is a highly sought aftergoal of fundamental research and consequently a highly non-trivial problem.Scalability in quantum information processing is not just a problem of qubitmanufacturing and control but it crucially depends on the ability to adaptadvanced techniques in quantum information theory, such as error correction, tothe experimental restrictions of assembling qubit arrays into the millions. Inthis paper we introduce a feasible architectural design for large scale quantumcomputation in optical systems. We combine the recent developments intopological cluster state computation with the photonic module, a simple chipbased device which can be used as a fundamental building block for a largescale computer. The integration of the topological cluster model with thiscomparatively simple operational element addresses many significant issues inscalable computing and leads to a promising modular architecture with completeintegration of active error correction exhibiting high fault-tolerantthresholds.
Devitt, SJ, Munro, WJ & Nemoto, K 2008, 'High Performance Quantum Computing', Progress in Informatics 8 (2011): 49-55, no. 8, pp. 49-55.
View/Download from: Publisher's site
View description>>
The architecture scalability afforded by recent proposals of a large scalephotonic based quantum computer, utilizing the theoretical developments oftopological cluster states and the photonic chip, allows us to move on to adiscussion of massively scaled Quantum Information Processing (QIP). In thisletter we introduce the model for a secure and unsecured topological clustermainframe. We consider the quantum analogue of High Performance Computing,where a dedicated server farm is utilized by many users to run algorithms andshare quantum data. The scaling structure of photonics based topologicalcluster computing leads to an attractive future for server based QIP, wherededicated mainframes can be constructed and/or expanded to serve anincreasingly hungry user base with the ideal resource for individual quantuminformation processing.
Dovey, K 2008, 'Addressing Structural Inhibitors of Change in Public Health Sector Organizations: A South African Case', Journal of Change Management, vol. 8, no. 1, pp. 37-56.
View/Download from: Publisher's site
View description>>
This article draws attention to the structural inhibitors of effective service delivery within a South African public health organization and outlines a change initiative aimed at facilitating the decentralization of decision-making power in an attempt to transform the service offered by this organization.
Duer, W, Bremner, MJ & Briegel, HJ 2008, 'Quantum simulation of interacting high-dimensional systems: The influence of noise', PHYSICAL REVIEW A, vol. 78, no. 5, p. 052325.
View/Download from: Publisher's site
View description>>
We consider the simulation of interacting high-dimensional systems using pairwise interacting qubits. The main tool in this context is the generation of effective many-body interactions, and we examine a number of different protocols for obtaining them. These methods include the usage of higher-order processes commutator method , unitary conjugation or graph state encoding, as well as teleportation-based approaches. We illustrate and compare these methods in detail and analyze the time cost for simulation. In the second part of the paper, we investigate the influence of noise on the simulation process. We concentrate on errors in the interaction Hamiltonians and consider two generic noise models: i timing errors in pairwise interactions and ii noisy pairwise interactions described by Master equations of Lindblad form. We analyze and compare the effect of noise for the different simulation methods and propose a way to significantly reduce the influence of noise by making use of entanglement purification together with a teleportation-based protocol.
Frazier, SK, Lennie, TA & Moser, DK 2008, 'Preface', Nursing Clinics of North America, vol. 43, no. 1, pp. xi-xii.
View/Download from: Publisher's site
GAO, YA, ZHANG, G, LU, JIE, DILLON, T & ZENG, X 2008, 'A λ-CUT APPROXIMATE ALGORITHM FOR GOAL-BASED BILEVEL RISK MANAGEMENT SYSTEMS', International Journal of Information Technology & Decision Making, vol. 07, no. 04, pp. 589-610.
View/Download from: Publisher's site
View description>>
Bilevel programming techniques are developed for decentralized decision problems with decision makers located in two levels. Both upper and lower decision makers, termed as leader and follower, try to optimize their own objectives in solution procedure but are affected by those of the other levels. When a bilevel decision model is built with fuzzy coefficients and the leader and/or follower have goals for their objectives, we call it fuzzy goal bilevel (FGBL) decision problem. This paper first proposes a λ-cut set based FGBL model. A programmable λ-cut approximate algorithm is then presented in detail. Based on this algorithm, a FGBL software system is developed to reach solutions for FGBL decision problems. Finally, two examples are given to illustrate the application of the proposed algorithm.
Goyal, ML, Lu, J & Zhang, G 2008, 'Decision Making in Multi-Issue e-Market Auction Using Fuzzy Techniques and Negotiable Attitudes.', J. Theor. Appl. Electron. Commer. Res., vol. 3, no. 2, pp. 97-110.
View description>>
Online auctions are one of the most effective ways of negotiation of salable goods over the internet. Software agents are increasingly being used to represent humans in online auctions. These agents can systematically monitor a wide variety of auctions and can make rapid decisions about what bids to place In what auctions. To be successful in open multi-agent environments, agents must be capable of adapting different strategies and tactics to their prevailing circumstances. This paper presents a software test-bed for studying autonomous bidding strategies in simulated auctions for procuring goods. It shows that agents' bidding strategy explore the attitudes and behaviors that help agents to manage dynamic assessment of prices of goods given the different criteria and scenario conditions. Our agent also uses fuzzy techniques for the decision making: to make decisions about the outcome of auctions, and to alter the agent's bidding strategy in response to the different criteria and market conditions. © 2008 Universidad de Talca - Chile.
Guo, Y, Jin, J, Zheng, L, Zhu, J & Lu, H 2008, 'A Permanent Magnet Linear Synchronous Motor Drive for HTS Maglev Transportation Systems', Journal of Electronic Science and Technology of China - Zhongguo Dianzi Keji, vol. 6, no. 2, pp. 125-129.
View description>>
A permanent magnet linear synchronous motor (pMLSM) for a high temperature superconducting (HTS) maglev system has been studied, including the motor structure, control strategy, and analysis techniques. Finite elemeut analysis (FEA) of magnetic field is conducted to accurately calculate major motor parameters. Equivalent electrical circuit is used to predict the drive's steady-state characteristics, and a phase variable model is applied to predict the dynamic performance. Preliminary experiment with a prototype has been made to verify the theoretical analysis and the HTS-PM synchronons driving technology.
Guo, Y, Zhu, JG, Lin, ZW, Lu, H, Wang, X & Chen, J 2008, 'Influence of inductance variation on performance of a permanent magnet claw pole soft magnetic composite motor', Journal of Applied Physics, vol. 103, no. 7, pp. 07F118-07F118.
View/Download from: Publisher's site
View description>>
Winding inductance is an important parameter in determining the performance of electrical machines, particularly those with large inductance variation. This paper investigates the influence of winding inductance variation on the performance of a three-phase three-stack claw pole permanent magnet motor with soft magnetic composite (SMC) stator by using an improved phase variable model. The winding inductances of the machine are computed by using a modified incremental energy method, based on three-dimensional nonlinear time-stepping magnetic field finite element analyses. The inductance computation and performance simulation are verified by the experimental results of an SMC claw pole motor prototype.
HAN, A, HONG, Y, LAI, KK & WANG, S 2008, 'Interval Time Series Analysis with an Application to the Sterling-Dollar Exchange Rate', Journal of Systems Science and Complexity, vol. 21, no. 4, pp. 558-573.
View/Download from: Publisher's site
View description>>
Inconsistency of multi-perspective requirements specifications is a pervasive issue during the requirements process. However, managing inconsistency is not just a pure technical problem. It is always associated with a process of interactions and competitions among corresponding stakeholders. The main contribution of this paper is to present a negotiations approach to handling inconsistencies in multi-perspective software requirements. In particular, the priority of requirements relative to each perspective plays an important role in proceeding negotiation over resolving inconsistencies among different stakeholders. An algorithm of generating negotiation proposals and an approach to evaluating proposals are also presented in this paper, respectively. © 2008 Academy of Mathematics & Systems Science, Beijing, China.
Hornecker, E, Jacob, RJ, Hummels, C, Ullmer, B, Schmidt, A, van den Hoven, E & Mazalek, A 2008, 'TEI Goes On: Tangible and Embedded Interaction', IEEE Pervasive Computing, vol. 7, no. 2, pp. 91-96.
Jakeman, AJ, Rizzoli, AE & Voinov, AA 2008, 'Outstanding reviewers for environmental modelling and software in 2007', Environmental Modelling & Software, vol. 23, no. 12, pp. 1343-1343.
View/Download from: Publisher's site
Johnston, A, Candy, L & Edmonds, E 2008, 'Designing and evaluating virtual musical instruments: facilitating conversational user interaction', Design Studies, vol. 29, no. 6, pp. 556-571.
View/Download from: Publisher's site
View description>>
This paper is concerned with the design of interactive virtual musical instruments. An interaction design strategy which uses on-screen objects that respond to user actions in physically realistic ways is described. This approach allows musicians to 'play' the virtual instruments using the sound of their familiar acoustic instruments. An investigation of user experience identified three modes of interaction that characterise the musicians' approach to the virtual instruments: instrumental, ornamental and conversational. When using the virtual instruments in instrumental mode, musicians prioritise detailed control; in ornamental mode, they surrender detailed control to the software and allow it to transform their sound; in conversational mode, the musicians allow the virtual instrument to 'talk back', helping to shape the musical direction of performance much as a human playing partner might. Finding a balance between controllability and complexity emerged as a key issue in facilitating 'conversational' interaction. © 2008 Elsevier Ltd. All rights reserved.
Kennedy, P, Francis, N, Rovnyak, D & Kastner, ME 2008, 'Redetermination ofcis-diaquadiglycolatozinc(II)', Acta Crystallographica Section E Structure Reports Online, vol. 64, no. 12, pp. m1635-m1635.
View/Download from: Publisher's site
Lin Gui, Bo Liu, Wenfeng Ma & Bowei Song 2008, 'A Novel Method of Frequency-Offset Estimation Using Time Domain PN Sequences in OFDM Systems', IEEE Transactions on Broadcasting, vol. 54, no. 1, pp. 140-145.
View/Download from: Publisher's site
Lister, R 2008, 'Computer Science Education', Computer Science Education, vol. 18, no. 2, pp. 65-66.
View/Download from: Publisher's site
Lister, R 2008, 'CS research', ACM SIGCSE Bulletin, vol. 40, no. 4, pp. 16-18.
View/Download from: Publisher's site
View description>>
If our human bodies are a reflection of what we eat, then the collective body of an academic community is a reflection of what its members cite. To better understand the Computing Education Research Community, I recently counted the conferences, journals and books cited in the 43 papers comprising the first three International Computing Education Research Workshops (i.e. ICERs 2007-2007). These 43 ICER papers contained 1130 citations, which is a remarkable average of 26 citations per publication. Almost one third (32%) of the citations were to conferences, while 38% of citations were to journals, and 21% to books and book chapters.
Lister, R 2008, 'The originality glut', ACM SIGCSE Bulletin, vol. 40, no. 2, pp. 14-15.
View/Download from: Publisher's site
View description>>
Originality is over-rated in computing education research. We have a world-wide glut of originality.
Lister, R & Box, I 2008, 'A citation analysis of the sigcse 2007 proceedings', ACM SIGCSE Bulletin, vol. 40, no. 1, pp. 476-480.
View/Download from: Publisher's site
View description>>
This paper identifies the most commonly cited conferences, journals and books among the 1398 citations made in the 122 publications of the SIGCSE 2007 proceedings. The SIGCSE 2007 authors cited a very large array of conferences, journals and books, but the majority are only cited within a single paper. There are only a very small set of journals and conferences cited frequently. Most books cited are concerned with technical information or are textbooks. Only 2% of books are concerned with computer science education and 23% with education in general. The picture that emerges from this citation analysis is that the SIGCSE community does not have a substantial core set of educational literature. Also, the epistemology of the SIGCSE community is primarily objectivist, with a focus on content, rather than a constructivist, student-centered focus on learning.
Liu, B, Gui, L, Zhang, W & Song, B 2008, 'On Channel Estimation Method Using Time Domain Sequences in OFDM Systems', IEEE Transactions on Broadcasting, vol. 54, no. 4, pp. 786-791.
View/Download from: Publisher's site
Liu, B, Gui, L, Zhang, W & Xiong, H 2008, 'Frequency Domain Feed-forward Filter Combined DFE Structure in Single Carrier Systems over Time-varying Channels', IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, vol. 54, no. 4, pp. 1569-1575.
View/Download from: Publisher's site
Liu, B, Hao, Z, Lu, J & Zhang, G 2008, 'Supervised feature extraction based on One-against-All scheme', Dynamics of Continuous, Discrete and Impulsive Systems Series B: Applications and Algorithms, vol. 15, no. 3, pp. 339-350.
View description>>
Support vector machines (SVMs) as being good tools for classification problems has been proposed by Vapnik. This paper proposes a supervised feature extraction method based on One-against-All scheme for the multi-class classification problems. In this approach, after embedding all the classes into one feature space and constructing hyperplanes based on One-against-All scheme, we extract the orientation distance features between the examples and every hyperplanes in the space, and then map the new features into another feature space, finally utilize other algorithms to classify them. In order to examine the performance of the proposed approach, One-against-All, One-against-One and the introduced approach are compared using three UCI data sets. From the results, we reported that after mapping the examples two times, the training accuracy and generalization performance is enhanced more or less. Copyright © 2008 Watam Press.
Lu, J, Yang, X & Zhang, G 2008, 'Support vector machine-based multi-source multi-attribute information integration for situation assessment', EXPERT SYSTEMS WITH APPLICATIONS, vol. 34, no. 2, pp. 1333-1340.
View/Download from: Publisher's site
View description>>
Understanding any given situation requires integrating many pieces of information. Such information has in most cases multiple attributes and is obtained from multiple data sources within multiple time slots. Situation assessors' experience and preference will naturally influence the result of information integration, and hence influence the awareness generated for a situation. This study focuses on how multi-source multi-attribute information about a situation is integrated and how the awareness information for the situation is derived. A learning-based information integration approach, which embeds the fuzzy least squares support vector machine (FLS-SVM) technique, is developed in this study. This approach can assess a situation through integrating and inference obtained information and analyzing related data sources. A series of experiments show that the proposed approach has an accuracy learning ability from assessors' experience in the information integration for generating awareness for a situation. © 2007 Elsevier Ltd. All rights reserved.
Lu, J, Zhang, G & Ruan, D 2008, 'Intelligent multi-criteria fuzzy group decision-making for situation assessments', SOFT COMPUTING, vol. 12, no. 3, pp. 289-299.
View/Download from: Publisher's site
View description>>
Organizational decisions and situation assessment are often made in groups, and decision and assessment processes involve various uncertain factors. To increase efficiently group decision-making, this study presents a new rational-political model as a systematic means of supporting group decision-making in an uncertain environment. The model takes advantage of both rational and political models and can handle inconsistent assessment, incomplete information and inaccurate opinions in deriving the best solution for the group decision under a sequential framework. The model particularly identifies three uncertain factors involved in a group decision-making process: decision makers' roles, preferences for alternatives, and judgments for assessment-criteria. Based on this model, an intelligent multi-criteria fuzzy group decision-making method is proposed to deal with the three uncertain factors described by linguistic terms. The proposed method uses general fuzzy numbers and aggregates these factors into a group satisfactory decision that is in a most acceptable degree of the group. Inference rules are particularly introduced into the method for checking the consistence of individual preferences. Finally, a real case-study on a business situation assessment is illustrated by the proposed method. © Springer-Verlag 2007.
Lu, J, Zhang, G & Wu, F 2008, 'TEAM SITUATION AWARENESS USING WEB-BASED FUZZY GROUP DECISION SUPPORT SYSTEMS', INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, vol. 1, no. 1, pp. 50-59.
View/Download from: Publisher's site
View description>>
Situation awareness (SA) is an important element to support responses and decision making to crisis problems. Decision making for a complex situation often needs a team to work cooperatively to get consensus awareness for the situation. Team SA is characterized including information sharing, opinion integration and consensus SA generation. In the meantime, various uncertainties are involved in team SA during information collection and awareness generation. Also, the collaboration between team members may be across distances and need web-based technology to facilitate. This paper presents a web-based fuzzy group decision support system (WFGDSS) and demonstrates how this system can provide a means of support for generating team SA in a distributed team work context with the ability of handling uncertain information.
Lu, J, Zhang, G & Wu, F 2008, 'Team Situation Awareness using Web-Based Fuzzy Group Decision Support Systems', International Journal of Computational Intelligence Systems, vol. 1, no. 1, pp. 50-59.
View/Download from: Publisher's site
View description>>
Situation awareness (SA) is an important element to support responses and decision making to crisis problems. Decision making for a complex situation often needs a team to work cooperatively to get consensus awareness for the situation. Team SA is characterized including information sharing, opinion integration and consensus SA generation. In the meantime, various uncertainties are involved in team SA during information collection and awareness generation. Also, the collaboration between team members may be across distances and need web-based technology to facilitate. This paper presents a web-based fuzzy group decision support system (WFGDSS) and demonstrates how this system can provide a means of support for generating team SA in a distributed team work context with the ability of handling uncertain information. © 2008 Taylor & Francis Group, LLC.
McGregor, C, Percival, J, Curry, J, Foster, D, Anstey, E, Churchill, D & IEEE 2008, 'A Structured Approach to Requirements Gathering Creation Using PaJMa Models', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-8, pp. 1506-1509.
View/Download from: Publisher's site
Merigó, JM & Gil Lafuente, AM 2008, 'THE GENERALIZED ADEQUACY COEFFICIENT AND ITS APPLICATION IN STRATEGIC DECISION MAKING', FUZZY ECONOMIC REVIEW, vol. 13, no. 02, pp. 17-36.
View/Download from: Publisher's site
View description>>
The adequacy coefficient is a very useful technique that provides a more complete formulation than the Hamming distance in decision making problems. In this paper, we suggest a generalization by using generalized and quasi-arithmetic means. As a result, we will get the generalized ordered weighted averaging adequacy coe fficient (GOWAAC) and the Quasi- OWAAC operator. These new aggregation operators generalize a wide range of particular cases such as the generalized adequacy coefficient (GAC), the weighted generalized adequacy coefficient (WGAC), the ordered weighted averaging adequacy coefficient (OWAAC), the ordered weighted quadratic averaging adequacy coefficient (OWQAAC), and others. We study different families and properties of these aggregation operators. We also analyze the unification point with distance measures and we find that in these situations, the GOWAAC and the Quasi-OWAAC become the Minkowski ordered weighted averaging distance (MOWAD) operator and the Quasi- OWAD operator, respectively. Finally, we also develop an application of the new approach in a strategic decision making problem about selection of strategies.
Mu, K, Jin, Z & Zowghi, D 2008, 'A Priority-Based Negotiations Approach for Handling Inconsistencies in Multi-Perspective Software Requirements', JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, vol. 21, no. 4, pp. 574-596.
View/Download from: Publisher's site
View description>>
Inconsistency of multi-perspective requirements specifications is a pervasive issue during the requirements process. However, managing inconsistency is not just a pure technical problem. It is always associated with a process of interactions and competit
Musiał, K, Juszczyszyn, K & Kazienko, P 2008, 'Ontology-based recommendation in multimedia sharing systems', Systems Science, vol. 34, no. 1, pp. 97-106.
View description>>
In this paper, a new framework for recommendation of multimedia objects in the environment of the multimedia sharing system has been proposed. It uses two kinds of individual ontologies, one is created for multimedia objects and the second one for system users. The final recommendation process takes into account similarities calculated both between objects' and users' ontologies. These individual ontologies respect all the social and semantic features existing in the system. The entire recommender framework was developed for the use in Flickr, a typical photo sharing system.
Nataatmadja, I & Dyson, LE 2008, 'The Role of Podcasts in Students' Learning', International Journal of Interactive Mobile Technologies, vol. 2, no. 3, pp. 17-21.
View description>>
Podcasts have been employed extensively in some countries and are now being trialed at a number of universities in Australia. They allow ubiquitous learning whereby students can access a variety of educational material anywhere, anytime on iPods, MP3 players or even desktop computers. There remain many questions about the impact of podcasts on students learning. One issue is how podcasts can be used to support high quality, experiential learning rather than merely perpetuating the old transmission model of education. In this paper, we explore the reasons why students either use, or fail to use, podcasts provided for their education. We report on the motivation of students enrolled in a large first-year information systems subject. These varied considerably and show that podcasts are a useful adjunct for providing for the diverse range of learning styles of our students. However, we also conclude that further research is needed into the use of podcasts to promote deeper learning in our students and how podcasts can act as a support tool for other forms of m-learning.
Qumer, A & Henderson-Sellers, B 2008, 'A framework to support the evaluation, adoption and improvement of agile methods in practice', JOURNAL OF SYSTEMS AND SOFTWARE, vol. 81, no. 11, pp. 1899-1919.
View/Download from: Publisher's site
View description>>
Agile methods are often seen as providing ways to avoid overheads typically perceived as being imposed by traditional software development environments. However, few organizations are psychologically or technically able to take on an agile approach rapidly and effectively. Here, we describe a number of approaches to assist in such a transition. The Agile Software Solution Framework (ASSF) provides an overall context for the exploration of agile methods, knowledge and governance and contains an Agile Toolkit for quantifying part of the agile process. These link to the business aspects of software development so that the business value and agile process are well aligned. Finally, we describe how these theories are applied in practice with two industry case studies using the Agile Adoption and Improvement Model (AAIM). © 2008 Elsevier Inc. All rights reserved.
Qumer, A & Henderson-Sellers, B 2008, 'An evaluation of the degree of agility in six agile methods and its applicability for method engineering', INFORMATION AND SOFTWARE TECHNOLOGY, vol. 50, no. 4, pp. 280-295.
View/Download from: Publisher's site
View description>>
While agile methods are in use in industry, little research has been undertaken into what is meant by agility and how a supposed agile method can be evaluated with regard to its veracity to belong to this category of software development methodological approaches. Here, an analytical framework, called 4-DAT, is developed and applied to six well-known agile methods and, for comparison, two traditional methods. The results indicate the degree of agility to be found in each method, from which a judgement can be made as to whether the appellation of 'agile' to that method is appropriate. This information is shown to be useful, for example, when constructing a methodology from method fragments (method engineering) and when comparing agile and traditional methods. © 2007 Elsevier B.V. All rights reserved.
Schirmer, SG, Oi, DKL & Devitt, SJ 2008, 'Physics-based mathematical models for quantum devices via experimental system identification', Journal of Physics: Conference Series, vol. 107, pp. 012011-012011.
View/Download from: Publisher's site
Sheard, J, Carbone, A, Lister, R, Simon, B, Thompson, E & Whalley, JL 2008, 'Going SOLO to assess novice programmers', ACM SIGCSE Bulletin, vol. 40, no. 3, pp. 209-213.
View/Download from: Publisher's site
View description>>
This paper explores the programming knowledge of novices using Biggs' SOLO taxonomy. It builds on previous work of Lister et al. (2006) and addresses some of the criticisms of that work. The research was conducted by studying the exam scripts for 120 introductory programming students, in which three specific questions were analyzed using the SOLO taxonomy. The study reports the following four findings: when the instruction to students used by Lister et al. - 'In plain English, explain what the following segment of Java code does' - is replaced with a less ambiguous instruction, many students still provide multistructural responses; students are relatively consistent in the SOLO level of their answers; student responses on SOLO reading tasks correlate positively with performance on writing tasks; postgraduates students manifest a higher level of thinking than undergraduates.
Shui Yu, Wanlei Zhou & Doss, R 2008, 'Information theory based detection against network behavior mimicking DDoS attacks', IEEE Communications Letters, vol. 12, no. 4, pp. 318-321.
View/Download from: Publisher's site
Stephens, AM, Evans, ZWE, Devitt, SJ & Hollenberg, LCL 2008, 'Asymmetric quantum error correction via code conversion', Physical Review A, vol. 77, no. 6.
View/Download from: Publisher's site
Stephens, AM, Evans, ZWE, Devitt, SJ, Greentree, AD, Fowler, AG, Munro, WJ, O’Brien, JL, Nemoto, K & Hollenberg, LCL 2008, 'Deterministic optical quantum computer using photonic modules', Physical Review A, vol. 78, no. 3.
View/Download from: Publisher's site
van den Hoven, E & Eggen, B 2008, 'Informing augmented memory system design through autobiographical memory theory', PERSONAL AND UBIQUITOUS COMPUTING, vol. 12, no. 6, pp. 433-443.
View/Download from: Publisher's site
View description>>
Autobiographical memory (AM) is the "memory for the events in one's life" [1]. Often it is assumed that in order to remember all those events, you just need to record everything and when you replay these recordings you will remember those events. You can compare this with a library metaphor that has been used to explain AM according to the record-keeping approach. However, after many years of AM-research it was concluded that AM is stored in a different manner, namely according to the constructionist approach, which often is initiated by memory cues. This paper explains these AM theories, surveys literature on existing augmented memory systems and describes our own work in this area. All this input is combined into eight design recommendations for future augmented memory systems.
Voinov, A 2008, 'Understanding and communicating sustainability: global versus regional perspectives', Environment, Development and Sustainability, vol. 10, no. 4, pp. 487-501.
View/Download from: Publisher's site
View description>>
While there is no single definition of sustainability, most would agree that it implies that a system is to be maintained at a certain level, held within certain limits. Sustainability denies run-away growth, but it also precludes any substantial set backs or cuts. This sustainability path is hard to reconcile with the renewal cycle that can be observed in most living systems developing according to their natural intrinsic mechanisms. Besides, since different human dominated systems are in significantly different states and stages of development, sustaining those states assumes maintaining social disparities in perpetuity. This creates a challenge in communicating the ideas of sustainability in different regions. Systems are parts of hierarchies where systems of higher levels are made of subsystems from lower levels. Renewal in components is an important factor of adaptation and evolution. But then sustainability of a system borrows from sustainability of a supra-system and rests upon lack of sustainability in subsystems. Therefore by sustaining certain systems beyond their renewal cycle, we decrease the sustainability of larger, higher level systems. The only way to resolve this contradiction is to agree that the biosphere as a whole with humans as one of its components is the only system which sustainability we are to seek. © 2007 Springer Science+Business Media B.V.
Voinov, A & Gaddis, EJB 2008, 'Lessons for successful participatory watershed modeling: A perspective from modeling practitioners', Ecological Modelling, vol. 216, no. 2, pp. 197-207.
View/Download from: Publisher's site
Wang, G, Huo, H, Han, D & Hui, X 2008, 'Query Processing and Optimization Techniques over Streamed Fragmented XML', World Wide Web, vol. 11, no. 3, pp. 339-359.
View/Download from: Publisher's site
Woodside, AG, Sood, S & Miller, KE 2008, 'When consumers and brands talk: Storytelling theory and research in psychology and marketing', PSYCHOLOGY & MARKETING, vol. 25, no. 2, pp. 97-145.
View/Download from: Publisher's site
View description>>
Storytelling is pervasive through life. Much information is stored, indexed, and retrieved in the form of stories. Although lectures tend to put people to sleep, stories move them to action. People relate to each other in terms of stories - and products and brands often play both central and peripheral roles in their stories. To aid storytelling research in consumer psychology, this article develops a narrative theory that describes how consumers use brands as props or anthropomorphic actors in stories they report about themselves and others. Such drama enactments enable these storytellers to experience powerful myths that reflect psychological archetypes. The article includes findings from case study research that probes propositions of the theory. Implications for consumer psychology and marketing practice follow the discussion of the findings. © 2008 Wiley Periodicals, Inc.
Youguang Guo, Jian Guo Zhu, Jinjiang Zhong, Haiyan Lu & Jian Xun Jin 2008, 'Measurement and Modeling of Rotational Core Losses of Soft Magnetic Materials Used in Electrical Machines: A Review', IEEE Transactions on Magnetics, vol. 44, no. 2, pp. 279-291.
View/Download from: Publisher's site
View description>>
In many situations, for example, in the cores of a rotating electrical machine and the T-joints of multiphase transformers, the magnetic flux varies with time in terms of both magnitude and direction, i.e., the local flux density vector rotates with varying magnitude and varying speed. Therefore, it is important that the magnetic properties of the core materials under various rotational magnetizations be properly investigated, modeled, and applied in the design and analysis of electromagnetic devices with rotational flux. Drawing from the huge amount of papers published by various researchers in the past century, this paper presents an extensive survey on the measurement and modeling of rotational core losses of soft magnetic materials used in electrical machines, particularly from the view of practical engineering application. The paper aims to provide a broad picture of the historical development of measuring techniques, measuring apparatus, and practical models of rotational core losses. © 2008 IEEE.
Yusop, N, Zowghi, D & Lowe, D 2008, 'The impacts of non-functional requirements in web system projects', International Journal of Value Chain Management, vol. 2, no. 1, pp. 18-18.
View/Download from: Publisher's site
View description>>
In web system development, the Non-Functional Requirements (NFRs) are typically considered only briefly during the requirements elicitation stage and not rigorously articulated by either web developers or the client. This paper reports on an investigation into this issue involving interviews with web developers who were engaged in commercial web development projects. The results from this qualitative research highlight that web developers commonly do not pay sufficient attention to NFRs. This arises due to uncertainty, lack of time, lack of knowledge in the importance of NFRs and partly because NFRs are not readily available and documented from previous similar projects. Web developers also do not elicit NFR at the same time and at the same level of details as Functional Requirements (FRs). This study highlights that exploring the domain at an early stage of development will help developers to better understand NFR. A lack of rigour in articulating NFRs may significantly impact on the development effectiveness and the quality of the resulting web system. An evaluation of NFRs may also lead to discovering new FRs.
Zhang, G, Lu, J & Gao, Y 2008, 'An algorithm for fuzzy multi-objective multi-follower partial cooperative bilevel programming', JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, vol. 19, no. 4-5, pp. 303-319.
View description>>
In a bilevel decision problem, both the leader and the follower may have multiple objectives to optimize under certain constraints. In the meantime, these objective functions and constraints may contain some uncertain parameters. In addition, there may h
Zhang, G, Lu, J & Gao, Y 2008, 'FUZZY BILEVEL PROGRAMMING: MULTI-OBJECTIVE AND MULTI-FOLLOWER WITH SHARED VARIABLES', INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, vol. 16, pp. 105-133.
View/Download from: Publisher's site
View description>>
Bilevel programming deals with hierarchical optimization problems in which the leader at the upper level attempts to optimize his or her objectives, but subject to a set of constraints and the follower's reactions. Typical bilevel programming considers one leader one follower situation and supposes each of them has only one objective. In real world situations, multiple followers may be involved and they may be with different relationships such as sharing decision variables or not, sharing objectives or not. Therefore, the leader's decision will be affected not only by those followers' reactions but also by their relationships. In addition, any of the leader and/or these followers may have multiple conflict objectives that should be optimized simultaneously. Furthermore, the parameters of a bilevel programming model may be described by uncertain values. This paper addresses all these three issues as a whole by particularly focusing on the situation of sharing decision variables among followers. It first proposes a set of fuzzy multi-objective multi-follower bilevel programming (FMMBP) models to describe the complex issue. It then presents an approximation branch-and-bound algorithm to solve the FMMBP problems. Finally, two examples illustrate the proposed models and algorithm.
Zhang, G, Shi, C & Lu, J 2008, 'AN EXTENDED KTH-BEST APPROACH FOR REFERENTIAL-UNCOOPERATIVE BILEVEL MULTI-FOLLOWER DECISION MAKING', INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, vol. 1, no. 3, pp. 205-214.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques have been mainly developed for solving decentralized management problems with decision makers in a hierarchical organization. When multiple followers are involved in a bilevel decision problem, called a bilevel multi-follower (BLMF) decision problem, the leaderâs decision will be affected, not only by the reactions of these followers, but also by the relationships among these followers. The referential-uncooperative situation is one of the popular cases of BLMF decision problems where these multiple followers donât share decision variables with each other but may take othersâ decisions as references to their decisions. This paper presents a model for the referential-uncooperative BLMF decision problem. As the kth-best approach is one of the most successful approaches in dealing with normal bilevel decision problems, this paper then proposes an extended kth-best approach to solve the referential-uncooperative BLMF problem. Finally an example of logistics planning illustrates the application of the proposed extended kth-best approach.
Zhang, G, Shi, C & Lu, J 2008, 'An ExtendedKth-Best Approach For Referential-Uncooperative Bilevel Multi-Follower Decision Making', International Journal of Computational Intelligence Systems, vol. 1, no. 3, pp. 205-214.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques have been mainly developed for solving decentralized management problems with decision makers in a hierarchical organization. When multiple followers are involved in a bilevel decision problem, called a bilevel multi-follower (BLMF) decision problem, the leader's decision will be affected, not only by the reactions of these followers, but also by the relationships among these followers. The referential-uncooperative situation is one of the popular cases of BLMF decision problems where these multiple followers don't share decision variables with each other but may take others' decisions as references to their decisions. This paper presents a model for the referential-uncooperative BLMF decision problem. As the kth-best approach is one of the most successful approaches in dealing with normal bilevel decision problems, this paper then proposes an extended kth-best approach to solve the referential-uncooperative BLMF problem. Finally an example of logistics planning illustrates the application of the proposed extended kth-best approach. © 2008 Taylor & Francis Group, LLC.
Zharova, N, Sfriso, A, Pavoni, B & Voinov, A 2008, 'Analysis of annual fluctuations of C. nodosa in the Venice lagoon: Modeling approach', Ecological Modelling, vol. 216, no. 2, pp. 134-144.
View/Download from: Publisher's site
Al-Oqaily, A, Kennedy, PJ, Catchpoole, D & Simoff, S 1970, 'Comparison of visualization methods of genome-wide SNP profiles in childhood acute lymphoblastic leukaemia', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, Australian Computer Society, Adelaide, Australia, pp. 111-121.
View description>>
Data mining and knowledge discovery have been applied to datasets in various industries including biomedical data. Modelling, data mining and visualization in biomedical data address the problem of extracting knowledge from large and complex biomedical data. The current challenge of dealing with such data is to develop statistical-based and data mining methods that search and browse the underlying patterns within the data. In this paper, we employ several data reduction methods for visualizing genome- wide Single Nucleotide Polymorphism (SNP) datasets based on state-of-art data reduction techniques. Visualization approach has been selected based on the trustworthiness of the resultant visualizations. To deal with large amounts of genetic variation data, we have chosen to apply different data reduction methods to deal with the problem induced by high dimensionality. Based on the trustworthiness metric we found that neighbour Retrieval Visualizer (NeRV) outperformed other methods. This method optimizes the retrieval quality of Stochastic neighbour Embedding. The quality measure of the visualization (i.e. NeRV) showed excellent results, even though the dataset was reduced from 13917 to 2 dimensions. The visualization results will assist clinicians and biomedical researchers in understanding the systems biology of patients and how to compare different groups of clusters in visualizations. © 2008, Australian Computer Society, Inc.
Azadeh, A, Saberi, M, Javanmardi, L & Azaron, A 1970, 'Developing expert system on decision making unit efficiency', 2008 IEEE International Symposium on Industrial Electronics, 2008 IEEE International Symposium on Industrial Electronics (ISIE 2008), IEEE, pp. 809-816.
View/Download from: Publisher's site
View description>>
Efficiency is a key concept for financial institutions. As personnel specifications have greatest impact on efficiency, they can help us designing work environments for maximizing efficiency. Providing information on multiple input and output factors are a complicated and time consuming procedure. Developing expert system in this situation is hard. This paper proposed a procedure that solved mentioned problem. At first, the integrated approach determining important attributes and then expert system is developed. The integrated approach uses Data Envelopment Analysis (DEA) and Data Mining tools. DEA is used for DMUs efficiency evaluation. Artificial Neural Network (ANN) and Cross Validation Test Technique (CVTT) are used for precision testing and forecasting and finally DEA is again utilized for identification of attributes importance. ANN is used for determining important attributes and developing expert system. As well, K-means algorithm is used in developing expert system. A Procedure is proposed to developing expert system with mentioned tools and completed rule base. The constructed expert system helps managers to forecast DMUs efficiencies by selected attributes and grouping inferred efficiency. Also, they can assess new situation before happening and compare with present situation. The proposed integrated approach is applied to an actual banking system and its superiorities and advantages are discussed. © 2008 IEEE.
Azadeh, A, Saberi, M, Javanmardi, L & Azaron, A 1970, 'Developing Expert System on Decision Making Unit Efficiency', 2008 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-5, IEEE International Symposium on Industrial Electronics, IEEE, Cambridge, ENGLAND, pp. 232-+.
Azadeh, A, Seraj, O & Saberi, M 1970, 'A Total Fuzzy Regression Algorithm for Energy Consumption Estimation', 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 6th IEEE International Conference on Industrial Informatics, IEEE, Daejeon, SOUTH KOREA, pp. 1466-+.
Azadeh, A, Seraj, O & Saberi, M 1970, 'A total fuzzy regression algorithm for energy consumption estimation', 2008 6th IEEE International Conference on Industrial Informatics, 2008 6th IEEE International Conference on Industrial Informatics (INDIN), IEEE, pp. 1562-1568.
View/Download from: Publisher's site
View description>>
This study presents an integrated fuzzy regression and time series algorithm to estimate and predict electricity demand for seasonal and monthly changes in electricity consumption especially in developing countries such as China and Iran. Furthermore, it is diy Least-Squares Regression, Fuzzy Mathematical model kand styding theri advantages, thebest model is selectedl for estimation. In addition, another unique feature of this study is utillizaiton of Autocorrelation Function (ACF) to define input variable versus trail and error method. Monthyly electricity consumption of Iran form 1992 to 2004 is condidered ad the case of this study. ©2008 IEEE.
Babar, A, Zowghi, D, Cox, K, Tosic, V & ACM 1970, 'Three Integration Approaches for Map and B-SCP Requirements Engineering Techniques', APPLIED COMPUTING 2008, VOLS 1-3, ACM Symposium on Applied Computing, ACM, Fortaleza, Brazil, pp. 650-655.
Babar, AR, Zowghi, D, Cox, K, Tosic, V, Bleistein, S & Verner, J 1970, 'Problem frames and business strategy modelling', Proceedings of the 3rd international workshop on Applications and advances of problem frames, ICSE '08: International Conference on Software Engineering, ACM, Liepzig, Germany, pp. 48-51.
View/Download from: Publisher's site
View description>>
Requirements engineering describes how an IT implementation will support business functions. Most IT systems are operational in nature and typical requirements engineering techniques and methods are usually adequate in capturing and documenting the requirements for such systems. Jackson’s problem frames is a technique that is suitable for straightforward IT systems descriptions. However, when an organization deploys an IT system that must deliver upon its competitive business strategy, then an appropriate technique or method needs to be used to capture that business strategy in order to connect it to business-critical IT requirements. Here we provide an overview of the use and adaptation of problem frames to connect requirements to business strategy. We found that a simplification of the problem frames notation was necessary and that to be really effective, we had to integrate problem fames with goal modelling and Map, a method that helps describe the evolution of IT over time.
Bagia, R & Sharma, D 1970, 'Environmental Policies v. Energy Security in Australia', Proceedings of 2nd IAEE Asian Conference, The 2nd International Association of Energy Economics Asian Conference, Curtin University of Technology Business School, Perth, Western Australia.
View description>>
Abstract: 'Environment' has lately emerged as a policy issue of immense significance in Australia. Two of the most recently released reports on the topic, namely, Garnaut Review and the Australian Government's Green Paper, have established the foundations for a deeper debate on this topic. An early review of these reports, and other literature on this topic, suggests that much of the discussion on the likely impacts of climate change and strategies to mitigate climate-change-inducing greenhouse gases essentially revolves around economic arguments, for example, cost of mitigation, price and other micro- and macro-economic impacts. A lesser emphasis appears, in this debate, to have been placed on another equally strategic dimension associated with this issue, namely, the impacts of various environmental policy initiatives on âenergy securityâ. This paper provides a discussion on this dimension.
Baker, E, Kan, MM, Teo, ST, Onyx, J, Grant, T & Zowghi, D 1970, 'Managing sustainable non-profit network organizations', Proceedings of the Annual Conference of the Administrative Sciences Association of Canada, Annual Conference of the Administrative Sciences Association of Canada, Administrative Sciences Association of Canada, University of Ottawa, Canada, pp. 118-128.
View description>>
We draw upon a case study conducted within a non-profit network organization to propose five dualities which are central to understanding effective management of non-profit networks. We then examine strategies that address these dualities, based on new approaches to leadership, performance measurement, governance, coaching and creative management of dualities.
Berglund, A & Lister, RF 1970, 'Debating the OO debate: where is the problem?', Conferences in Research and Practice in Information Technology, Vol 68: Koli Calling Proceedings of the Seventh Baltic Sea Conference on Computing Education Research, Baltic Sea Conference on Computing Education Research, Australian Computer Society, Koli National Park, Finland, pp. 171-174.
View description>>
Abstract: In this paper we discuss problems related to the teaching of object-oriented programming (OOP). We argue that more research on how the computer science teacher understands OOP would be beneficial. Our argument takes its point of departure in three sets of studies: (1) an ongoing study on how computer science teachers understand core concepts of OOP, (2) a study of how the teaching of OOP is discussed within the CS community, and (3) a set of studies that discuss the different ways in which CS teachers experience their teaching. This paper reports on an ongoing study of the different ways in which computing science teachers understand object- oriented programming, and what they mean when use the term objects first.. The phenomenographic research approach has been applied to the analysis of a discussion that occurred in the SIGCSE-members mailing list. Two understandings of objects first have been identified: (1) as an extension of imperative programming, and (2) as conceptually different from imperative programming. These two understandings are illustrated via the differing ways in which computing science teachers use the term polymorphism.
Berglund, A, Box, I, Eckerdal, A, Lister, R & Pears, A 1970, 'Learning educational research methods through collaborative research: The PhICER initiative', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Wollongong, Australia, pp. 35-42.
View description>>
To accommodate an increasing interest in phenomenography among the computing education research community, the authors of this paper have organised two workshops, or intensive courses, in phenomenography, intended for researchers in computing education at a university level. Although the workshop programs contained lectures and smaller exercises, the emphasis was on preparing one joint publication from each of the workshops. The publication from the first workshop discussed the experience of being a teacher in computing, while the second focused on teachers' experiences of the problems their students encounter when learning computing. The workshops and their impact on the community are discussed in this paper. © 2008, Australian Computer Society, Inc.
Bucknell, A, Lowe, D & Zowgh, D 1970, 'A method for analysing web systems model alignment', AusWeb 2008: 14th Australasian World Wide Web Conference, Australian World Wide Web Conference, Southern Cross University, Ballina, Australia, pp. 17-26.
View description>>
The introduction or modification of IT systems will often lead to the need for consequential changes to the associated business processes. This is particularly true for Web systems, where the system can be much more deeply intertwined with the business processes. The failure to identify these potential impacts early on can lead to major delays or cost increases in the development process, and subsequent redevelopment as the IT system and business processes are appropriately modified to bring them into alignment. We believe that early modelling of the existing business processes, and their relationship to the IT systems, as well as the potential changes to these processes will allow the identification of misalignments in the model which are a reflection of likely misalignments which would exist in the actual processes if the changes were to be implemented. This then will allow rectification of the misalignment much earlier than is currently the case. It is worth noting that his does not necessarily require new modelling notations, but rather the use of existing notations in new ways combined with appropriate analysis tools. This research aims to demonstrate that this identification of misalignments can be achieved using existing modelling notations by applying algorithmic analysis to the information about the business process captured in the model. This can be achieved by integrating this analysis with modelling tools, and hence supporting the identification of likely flaws in a proposed changed business process before that process is actually implemented. This paper presents a proof of concept that demonstrates an approach to analysing the properties of model elements using a constraint-based rule system in conjunction with an existing widely-used modelling tool. © 2008. Andrew Bucknell, David Lowe, Didar Zowghi.
Catley, C, Stratti, H & McGregor, C 1970, 'Multi-dimensional temporal abstraction and data mining of medical time series data: Trends and challenges', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 4322-+.
View/Download from: Publisher's site
Cetindamar, D & Pala, O 1970, 'The relationship between CTO and performance', PICMET '08 - 2008 Portland International Conference on Management of Engineering & Technology, Technology, IEEE, Univ Pretoria, Cape Town, SOUTH AFRICA, pp. 42-49.
View/Download from: Publisher's site
Clear, T, Edwards, J, Lister, R, Simon, B, Thompson, E & Whalley, J 1970, 'The teaching of novice computer programmers: Bringing the scholarly-research approach to Australia', Conferences in Research and Practice in Information Technology Series, Australasian Conference on Computer Science Education, Australian Computer Society, Wollongong, pp. 63-68.
View description>>
BRACElet is a multi-institutional multi-national research study of how novice programmers comprehend and write computer programs. This paper reviews the first action research cycle of the BRACElet project and, in the process, charts a path for the upcoming second cycle. The project remains close to educational practice, with much of the data being either data collected directly from exams sat by novices, or data from think-out-loud protocols where the task undertaken by a novice or an expert is modelled on an exam question. The first action research cycle analysed data in terms of the SOLO taxonomy. From think-aloud responses, the authors found that educators tended to manifest a SOLO relational response on small reading problems, whereas students tended to manifest a multistructural response. Furthermore, those students who manifested a relational response tended to do better overall in the exam than students who manifested a multistructural response. The second action research cycle will explore the relationship between the ability to read code and the ability to write code. Apart from reporting on the BRACElet project itself, this paper serves as an invitation for institutions and individuals to join the second action research cycle of the BRACElet project.
Cox, W, Cardwell, H & Voinov, A 1970, 'SVP as a Short Term Planning Tool: Preliminary Results of a Pilot Study', World Environmental and Water Resources Congress 2008, World Environmental and Water Resources Congress 2008, American Society of Civil Engineers.
View/Download from: Publisher's site
View description>>
Shared vision planning encompasses the basic principles of traditional planning but differs from the conventional approach in its fundamental reliance on stakeholder collaboration in a process of mutual learning and discovery as facilitated by a collaboratively developed model of the system. This collaborative approach seeks to define issues and problems, identify values and interests, and explore alternative strategies for resolving conflict and solving problems. This paper reports on the preliminary results of a pilot study initiated by the U.S. Army Corps of Engineers' Institute for Water Resources to investigate the feasibility of SVP as a planning tool in a short-term, small-scale context in support of regulatory programs and local water planning. Experience with the pilot study conducted in the James River Basin of Virginia to date suggests significant challenges to application of SVP in a short-term, small-scale planning environment. Engaging a full range of stakeholders has been hindered by restrictions imposed by the short time frame, and scale limitations created stakeholder doubt about the validity and usefulness of the process. The fact that the pilot study was presented as a limited exercise caused it to be viewed as a threat to prospects for future, larger-scale planning studies in the Basin. This experience illustrates the importance of pre-existing conditions to the success of SVP and demonstrates the special challenges that impact use of SVP in situations involving limited time and scope. © 2008 ASCE.
Davis, AM, Nurmuliani, N, Park, S & Zowghi, D 1970, 'Requirements Change: What's the Alternative?', 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008 32nd Annual IEEE International Computer Software and Applications Conference, IEEE, Turku, Finland, pp. 635-638.
View/Download from: Publisher's site
View description>>
Numerous studies have shown that a software projectpsilas cost, schedule and defect density escalate as the rate of requirements change increases. Yet none of these studies have explored the effects of not making requirements changes in response to changes in user needs. This paper explains why a project incurs just as much, if not more, risk when requirements changes are suppressed.
Debenham, JK, Simoff, SJ, Leaney, JR & Mirchandani, V 1970, 'Smart communications network management through a synthesis of distributed intelligence and information', ARTIFICIAL INTELLIGENCE IN THEORY AND PRACTICE II, World Computer Congress, Springer Verlag, Milano, Italy, pp. 415-419.
View/Download from: Publisher's site
View description>>
Demands on communications networks to support bundled, interdependent communications services (data, voice, video) are increasing in complexity. Smart network management techniques are required to meet this demand. Such management techniques are envisioned to be based on two main technologies: (i) embedded intelligence; and (ii) up-to-the-millisecond delivery of performance information. This paper explores the idea of delivery of intelligent network management as a synthesis of distributed intelligence and information, obtained through information mining of network performance.
Dong, H, Hussain, FK & Chang, E 1970, 'A Semantic Crawler Based on an Extended CBR Algorithm', ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008 WORKSHOPS, On the Move Confederated International Conference and Workshops, Springer-verlag Berlin, Monterrey, MEXICO, pp. 1076-1085.
View description>>
A semantic (web) crawler refers to a series of web crawlers designed for harvesting semantic web content. This paper presents the frame-work of a semantic crawler that call abstract metadata from online webpages and Cluster the metadata by associating th
Dong, H, Hussain, FK & Chang, E 1970, 'A survey in semantic web technologies-inspired focused crawlers', 2008 Third International Conference on Digital Information Management, 2008 Third International Conference on Digital Information Management (ICDIM), IEEE, pp. 934-936.
View/Download from: Publisher's site
View description>>
Crawlers are software which can traverse the internet and retrieve webpages by hyperlinks. In the face of the inundant spam websites, traditional web crawlers cannot function well to solve this problem. Semantic focused crawlers utilize semantic web technologies to analyze the semantics of hyperlinks and web documents. This paper briefly reviews the recent studies on one category of semantic focused crawlers - ontology-based focused crawlers, which are a series of crawlers that utilize ontologies to link the fetched web documents with the ontological concepts (topics). The purpose of this is to organize and categorize web documents, or filtering irrelevant webpages with regards to the topics. A brief comparison are made among these crawlers, from six perspectives - domain, working environment, special functions, technologies utilized, evaluation metrics and evaluation results. The conclusion with respect to this comparison is made in the final section. © 2008 IEEE.
Dong, H, Hussain, FK & Chang, E 1970, 'A Transport Service Ontology-based Focused Crawler', 2008 Fourth International Conference on Semantics, Knowledge and Grid, 2008 Fourth International Conference on Semantics, Knowledge and Grid (SKG), IEEE, pp. 49-56.
View/Download from: Publisher's site
View description>>
Ontology is a technology for conceptualizing specific domain knowledge, which can provide machine-readable definitions to the severed domain. Therefore, ontology can be utilized to enhance the performance of focused crawlers, by precisely defining the crawling boundary. In this paper, we will exhibit a conceptual framework of an ontology-based focused crawler serving in the domain of transport services. Here, a transport service ontology is designed for filtering non-relevant metadata, by means of logically linking the metadata with ontological concepts. In addition, we will provide the evaluation process in order to assess the power of ontology in the focused crawler. Conclusion and further works based on our current evaluation results will be made in the final section. © 2008 IEEE.
Dong, J, Wang, J, Sun, D & Lu, H 1970, 'The Research of Software Product Line Engineering Process and Its Integrated Development Environment Model', 2008 International Symposium on Computer Science and Computational Technology, 2008 International Symposium on Computer Science and Computational Technology, IEEE, Shanghai, China, pp. 66-71.
View/Download from: Publisher's site
View description>>
In order to realize the industrialization production of software, people have carried out research on and analysis the software product line architecture of the growing maturity, component technology and development methods for product line. In this paper, a novel software engineering process model is proposed based on the modern industrial production systems and automated production method: that is ldquoN-life-cycle modelrdquo. Based on this new model, not only integrated software engineering environment model and framework have been proposed, which are based on the product line development process model, but also study systematically on theirs implementation. "N-life-cycle model" and "integrated software engineering environment model based on the product line" which are set up in the article are brand-new open models possessing modern manufacturing production characteristic. The models can impel the research development quickly of product line engineering and product line software engineering environment towards the industrialisation and automatization of the software industry.
Dong, J, Zeng, F, Wang, J & Lu, H 1970, 'Price Forecasting of Supply Chain Product Based on Dynamic Fractal Dimension', 2008 International Conference on Information Management, Innovation Management and Industrial Engineering, 2008 International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), IEEE, Taipei, Taiwan, pp. 153-156.
View/Download from: Publisher's site
View description>>
Supply chain management (SCM) is an emerging field that has commanded attention and support from the industrial community. Demand forecast taking inventory into consideration is an important issue in SCM. This paper presents a novel computerized system for implementing the forecasting activities required in SCM. It can help the supply chain enterprises find hidden forms, trends and relationships in the date of supply chain by the dynamic fractal dimension of fractal theory, find that dynamic fractal dimension not only can overcome the delay of the existing technical analysis on the price forecasts, and but also can instruct the supply chain product prices in advance.
Doss, R, Li, G, Yu, S, Mak, V & Chowdhury, M 1970, 'The Crossroads Approach to Information Discovery in Wireless Sensor Networks', DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 9th International Conference on Distributed Computing and Networking, Springer Berlin Heidelberg, Kolkata, INDIA, pp. 310-321.
View/Download from: Publisher's site
Dyson, LE & Nataatmadja, I 1970, 'Students Motivations in Podcast Use', Interactive Mobile and Computer aided Learning (IMCL), Interactive Mobile and Computer aided Learning, IMCL, Amman, Jordan, pp. 1-5.
Dyson, LE, Lawrence, E, Litchfield, A & Zmijewska, A 1970, 'M-Fieldwork for Information Systems Students', Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008 41st Annual Hawaii International Conference on System Sciences, IEEE, Waikoloa, USA, pp. 1-10.
View/Download from: Publisher's site
View description>>
Fieldwork has long been identified as providing students undertaking professional studies with a means of implementing theory into a real world context. In recent years some educators, particularly in the health sciences, have introduced mobile devices to support students' fieldwork learning. In many ways there is a natural link between fieldwork and mobile technology. In this paper we report on a trial to introduce mobile support into the study of information systems in the field. The experience showed that mobile devices can assist students collect data in richer, multimedia formats and make subsequent classroom presentations of their field study much more interesting. However, it also revealed certain usage and deployment issues with the mobile devices themselves which have implications for device selection and educational design.
Dyson, LE, Leigh, EE, Litchfield, AJ, Raban, R & Tyler, JV 1970, 'Improving the Participation of International and local Students Using mLearning', UTS Learning and Teaching Forum, UTS, UTS.
Eklund, JM, McGregor, C & Smith, KP 1970, 'A method for physiological data transmission and archiving to support the service of critical care using DICOM and HL7', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 1486-+.
View/Download from: Publisher's site
Gao, Y, Zhang, G & Lu, J 1970, 'A Particle Swarm Optimization Based Algorithm for Fuzzy Bilevel Decision Making with Objective-Shared Followers', SIMULATED EVOLUTION AND LEARNING, PROCEEDINGS, Asia-Pacific Conference on Simulated Evolution and Learning, Springer, Melbourne, Australia, pp. 190-199.
View/Download from: Publisher's site
View description>>
A bilevel decision problem may have multiple followers as the lower decision units and have fuzzy demands simultaneously. This paper focuses on problems of fuzzy linear bilevel decision making with multiple followers who share a common objective but have different constraints (FBOSF). Based on the ranking relationship among fuzzy sets defined by cut set and satisfactory degree, a FBOSF model is presented and a particle swarm optimization based algorithm is developed.
Gao, Y, Zhang, G, Lu, J & Goyal, M 1970, 'A decision support system for fuzzy bilevel decision making', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific Publishing Co., Inc., Madrid, Spain, pp. 763-768.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques are developed for decentralized decision problems, which may be defined by fuzzy coefficients. Based on a fuzzy linear bilevel (FLBL) model and two FLBL algorithms, this research develops a FLBL decision support system (FLBLDS
Ghous, H, Kennedy, PJ, Catchpoole, DR & Simoff, SJ 1970, 'Kernel-based visualisation of genes with the gene ontology', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, Australian Computer Society, Adelaide, pp. 133-140.
View description>>
With the development of microarray-based high- throughput technologies for examining genetic and biological information en masse, biologists are now faced with making sense of large lists of genes identi-ffed from their biological experiments. There is a vital need for \system biology' approaches which can allow biologists to see new or unanticipated potential relationships which will lead to new hypotheses and eventual new knowledge. Finding and understanding relationships in this data is a problem well suited to visualisation. We augment genes with their associated terms from the Gene Ontology and visualise them using kernel Principal Component Analysis with both specialised linear and Gaussian kernels. Our results show that this method can correctly visualise genes by their functional relationships and we describe the difference between using the linear and Gaussian kernels on the problem. © 2008, Australian Computer Society, Inc.
Golsteijn, C, van den Hoven, E, Geurts, S, Eichenbrenner, M, van Leest, C, van den Hurk, S & Ling, YS 1970, 'BLB: A persuasive and interactive installation designed to improve well-being', PERSUASIVE TECHNOLOGY, Persuasive 2008, Springer, Oulu, Finland, pp. 262-265.
View description>>
Well-being is a broad subject, which is described in this paper as: a personal balance of mental, social and physical being, influenced by life circumstances and life factors. These factors include emotions, engagement, life satisfaction, intentional activities and social network. The project described in this paper aims at improving well-being through the design of a persuasive and interactive installation for the home environment. After the investigation of well-being by means of a literature study, cultural probes and questionnaires, a concept was developed. This paper describes the design, implementation and evaluation of this concept. 'BLB', as it is called, encourages its users to seize the moment in order to increase their well-being.
Greentree, AD, Jong, LM, Van Donkelaar, JA, Devitt, SJ, Cole, JH, Stephens, AM, Jamieson, DN & Hollenberg, LCL 1970, 'Spatial adiabatic passage as a quantum wire', 2008 International Conference on Nanoscience and Nanotechnology, 2008 International Conference on Nanoscience and Nanotechnology (ICONN), IEEE, Melbourne, AUSTRALIA, pp. 156-159.
View/Download from: Publisher's site
Guo, Y, Dou, Y, Zhu, J, Lu, H & Jin, J 1970, 'Numerical magnetic field analysis and parameter computation of a PM synchronous generator', Proceedings of the 11th International Conference on Electrical Machines and Systems, ICEMS 2008, 11th International Conference on Electrical Machines and Systems, WORLD PUBLISHING CORPORATION, Huazhong Univ Sci & Technol, Wuhan, PEOPLES R CHINA, pp. 2866-2869.
View description>>
This paper presents the parameter computation and performance prediction of a permanent magnet (PM) synchronous generator based on numerical magnetic field analyses. The finite element method is employed to accurately determine the magnetic field distribution and key parameters of the machine, such as the winding flux, back electromotive force, winding inductance and core loss. An equivalent electrical circuit is applied to predict the generator performance such as the external characteristic.
Guo, Y, Dou, Y, Zhu, J, Lu, H & Jin, J 1970, 'Numerical Magnetic Field Analysis and Performance Computation of a Permanent Magnet Synchronous Generator', Proceedings of the 11th International Conference on Electrical Machines and Systems (ICEMS), World Publishing Corporation, Wuhan, China, pp. 2866-2869.
Guo, Y, Wang, X, Zhu, JG & Lu, H 1970, 'Development of a Wound Rotor Brushless Doubly Fed Machine Based on Slot MMF Harmonics', 2008 IEEE Industry Applications Society Annual Meeting, 2008 IEEE Industry Applications Society Annual Meeting (IAS), IEEE, Edmonton, Canada, pp. 1-5.
View/Download from: Publisher's site
View description>>
In the rotor winding magnetomotive force (MMF) of an ac machine, there exist so-called slot harmonics which appear in pairs and the lower order harmonic of each pair rotates in the opposite direction against the fundamental component. In addition, the slot harmonics have the same winding factor as the fundamental component. Based on these properties, this paper develops a brushless doubly fed machine (BDFM) with wound rotor. The machine consists of two stator windings with p1 and p2 pole-pairs, respectively. The rotor has a normal symmetrical multi-phase winding, in which rotating MMFs with p1 and p2 pole-pairs are induced by their stator counterparts. When the number of rotor slots equals the sum p1 and p2, the two MMFs rotate in opposite directions with respect to the rotor, satisfying the requirement of a BDFM. The major advantage of such a machine is that for both p1 and p2 pole-pair MMFs the winding factor is as high as that of the fundamental component, leading to high utilization of rotor winding and electrical efficiency.
Guo, Y, Zhu, J, Chen, J, Su, SW, Lu, H & Jin, J 1970, 'Performance Analysis of a Claw Pole PM Motor', Proceedings of Australasian Universities Power Engineering Conference 2008, Australasian Universities Power Engineering Conference, University of New South Wales, Sydney, Australia, pp. 1-5.
View description>>
This paper presents the performance analysis of a three-phase three-stack permanent magnet (PM) claw pole motor by using an improved phase variable model, which has been developed for accurate and efficient performance simulation of PM brushless dc motors. The improved model can take into account the effect of magnetic saturation and rotor position dependence of key parameters including back electromagnetic force, winding inductance, cogging torque and core loss, which are obtained from time-stepping nonlinear magnetic field finite element analysis (FEA). The presented model has been implemented in Simulink environment and employed to simulate the dynamic and steady-state performance of the three-phase three-stack PM claw pole motor with soft magnetic composite stator. Parameter computation and performance simulation are validated by experiments on the motor prototype.
Guo, Y, Zhu, J, Lu, H, Lin, Z, Wang, S & Jin, J 1970, '3-D Vector Magnetic Properties of SMC Material for Advanced Field Analysis of SMC Machine', Proceedings of Australasian Universities Power Engineering Conference, Australasian Universities Power Engineering Conference, University of New South Wales, Sydney, Australia, pp. 1-4.
View description>>
In a rotating electrical machine or the T-joints of a multiphase transformer, the magnetic flux is basically three dimensional (3-D) and rotational. This paper presents the 3-D vector magnetic properties of soft magnetic composite (SMC) materials for advanced field analysis of electromagnetic devices with SMC core, which is particularly developed for application of electrical machines with complex structure and 3-D flux. The 3-D magnetic reluctivity tensor is derived from the magnetic measurements on a cubic SMC sample by using a 3-D magnetic property tester. The tensor consists of both diagonal and offdiagonal terms and the latter account for the effect of rotating flux. Practical techniques for employing the vector magnetic properties in field analysis are reviewed and discussed.
Hai Dong, Hussain, FK & Chang, E 1970, 'A survey in semantic search technologies', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Phitsanulok, Thailand, pp. 403-408.
View/Download from: Publisher's site
View description>>
In this paper, we make a survey over the primary literature regarding semantic search technologies. By classifying the literature into six main categories, we review their characteristics respectively. In addition, the issues within the reviewed semantic search methods and engines are analysed and concluded based on four perspectives.
Heijboer, M & van den Hoven, E 1970, 'Keeping up appearances', Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges, NordiCHI08: 5th Nordic Conference on Human-Computer Interaction, ACM, Lund, Sweden, pp. 162-171.
View/Download from: Publisher's site
View description>>
The design and interaction of physical game artefacts is becoming increasingly important for the design of digital tabletop games. In this paper a study is described investigating the differences in interpretations of realistic and abstract game artifacts comparing children and adults. A game was created on a digital tabletop as a carrier for the user evaluation presented in this paper. The appearance of the game artifacts was explored and a family of each of the artifacts was created. The interpretations of each of the individual artifacts and their different visual appearances were tested to determine whether children rank and interpret the functionalities of the artefacts differently than adults. The results showed that overall the understanding of abstract artifacts compared to realistic ones was best for both children and adults. It also indicated there was no significant difference in the interpretations of the realistic and abstract artefacts between children and adults.
Hong, D, Höllerer, T, Haller, M, Takemura, H, Cheok, AD, Kim, GJ, Billinghurst, M, Woo, W, Hornecker, E, Jacob, RJK, Hummels, C, Ullmer, B, Schmidt, A, van den Hoven, E & Mazalek, A 1970, 'Advances in Tangible Interaction and Ubiquitous Virtual Reality', IEEE Pervasive Computing, Institute of Electrical and Electronics Engineers (IEEE), pp. 90-96.
View/Download from: Publisher's site
View description>>
The first article reports on context-sensitive augmented-reality research presented at the 2007 International Symposium on Ubiquitous Virtual Reality. This student-organized event explored the use of contextual information, design principles, and effective user evaluation for developing AR applications for ubiquitous computing environments. The second article reports on The International Conference on Tangible and Embedded Interaction, the first conference series worldwide to focus on tangible and embedded interaction. The conference is interdisciplinary, covering the arts, hardware design, software toolkits for prototyping, and user studies and theory development. © 2006 IEEE.
Huang, A, Milne, D, Frank, E & Witten, IH 1970, 'Clustering Documents with Active Learning Using Wikipedia', 2008 Eighth IEEE International Conference on Data Mining, 2008 Eighth IEEE International Conference on Data Mining (ICDM), IEEE, Pisa, ITALY, pp. 839-844.
View/Download from: Publisher's site
Huang, ML, Liang, J & Nguyen, QV 1970, 'A Usability Study on the Use of Multi-Context Visualization', 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation, 2008 5th International Conference on Computer Graphics, Imaging and Visualisation (CGIV), IEEE, Penang, Malaysia, pp. 311-315.
View/Download from: Publisher's site
View description>>
Graph visualization has been widely used in real-world applications, as it provides better presentation of overall data structure. However, there are navigation problems existing in deep and large relational datasets. To address these challenges, a new technique called multi-context visualization, which provides users with rich contextual information, has been proposed as the solution to the navigation in large scale datasets. This paper evaluates the multi-context visualization by conducting an experiment-based user study. To answer whether the more contextual information positively assist in making more accurate and easier decisions, it aims to evaluate the effectiveness and efficiency of the multi-context visualization, by measuring the user performance. Specifically, this usability test was designed to test if the use of multiple context views can improve navigation problems for deep and large relational data sets. © 2008 IEEE.
Hussain, FK 1970, 'Papers in track 15 - Social networks', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE.
View/Download from: Publisher's site
Hussain, FK, Chang, E & Hussain, O 1970, 'A robust methodology for prediction of trust and reputation values', Proceedings of the 2008 ACM workshop on Secure web services, CCS08: 15th ACM Conference on Computer and Communications Security 2008, ACM, pp. 97-108.
View/Download from: Publisher's site
View description>>
In this paper, we present the FC direct trust value-based decision making methodology, for making direct trust value based decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot. The direct trust value-based decision making methodology models the context specific nature of trust and the dynamic nature of trust to make direct trust value-based decisions regarding interactions. Additionally in this paper, we present the FC reputation-based trust decision making methodology, for making reputation-based trust decisions regarding interactions, if direct trust value-based decisions cannot be made. The FC reputationbased trust decision making methodology can make reputationbased trust decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot. Copyright 2008 ACM.
Juszczyszyn, K, Kazienko, P & Musiał, K 1970, 'Local Topology of Social Network Based on Motif Analysis', KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Zagreb, CROATIA, pp. 97-105.
View/Download from: Publisher's site
Kaindl, H, Constantine, L, Pastor, O, Sutcliffe, A & Zowghi, D 1970, 'How to Combine Requirements Engineering and Interaction Design?', 2008 16th IEEE International Requirements Engineering Conference, 2008 16th IEEE International Requirements Engineering Conference (RE), IEEE, pp. 299-301.
View/Download from: Publisher's site
View description>>
In this panel, we propose to figure out how requirements engineering and interaction design can be usefully combined. In particular, some people argue that scenarios / use cases should be concrete, as in story-telling. Others argue for use of "essential" use cases as a methodological approach to interaction and user-interface design. Somewhat in the middle, it is argued that use cases should help acquiring the requirements in the first place. What should the practitioner believe and, in particular, do, in order to develop useful and usable software and systems? Software development and interaction design require different skills and different methods and are typically done by different people. Still, scenario-based design is proposed for several activities relevant for both tasks, such as requirements elicitation, software design, and interaction design. Symbolic modeling in this spirit is actually common to various fields. However, scenario-based approaches vary, especially with regard to their use, e.g., employing abstract use cases or integrating scenarios with functions and goals in a systematic design process. So, the key issue to be raised at the panel is how to combine different approaches, e.g., in scenario-based development, so that the interaction design as well as the development of the user interface and of the software internally result in an overall useful and useable system. © 2008 IEEE.
Kazienko, P & Musiał, K 1970, 'Mining Personal Social Features in the Community of Email Users', SOFSEM 2008: THEORY AND PRACTICE OF COMPUTER SCIENCE, 34th Conference on Current Trends in Theory and Practice of Computer Science, Springer Berlin Heidelberg, Novy Smokovec, SLOVAKIA, pp. 708-719.
View/Download from: Publisher's site
Kazienko, P, Musiał, K & Juszczyszyn, K 1970, 'Recommendation of Multimedia Objects Based on Similarity of Ontologies', KNOWLEDGE - BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Zagreb, CROATIA, pp. 194-201.
View/Download from: Publisher's site
Kazienko, P, Musiał, K & Kajdanowicz, T 1970, 'Profile of the social network in photo sharing systems', 14th Americas Conference on Information Systems, AMCIS 2008, pp. 2815-2826.
View description>>
People, who interact, cooperate or share common activities within the photo sharing system can be seen as a multirelational social network. The results of their activities, i.e. tags, comments, references to favourites and others that semantically connect users through multimedia objects, i.e. pictures are the crucial component of the semantic web concept. Every online sharing system provides data that can be used for extraction of different kinds of relations grouped in layers in the multirelational social network. Layers and their profiles were identified and studied on two, spanned in time, snapshots of Flickr population for better understanding of social network structure complexity. Additionally, for each of the identified layers, a separate strength measure was proposed in the paper. The experiments on the Flickr photo sharing system revealed that users are inspired by both the semantic relationships between objects they operate on and social links they have to other users. Moreover, the density and affluence of the social network grows over course of time.
Kierkels, J & van den Hoven, E 1970, 'Children's haptic experiences of tangible artifacts varying in hardness', Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges, NordiCHI08: 5th Nordic Conference on Human-Computer Interaction, ACM, Lund, Sweden, pp. 221-228.
View/Download from: Publisher's site
View description>>
In this paper we describe our investigations on the role of material hardness in the haptic experience of tangible artefacts. Without seeing the artifacts children had to rank their experience on a scale of two antonyms while touching and holding these artifacts. In this experiment it was shown that children have no problem ranking hardness. Two groups could be identified: soft artifacts were found to be cute, speedy and warm, e.g., and hard artifacts boring, sad and old-fashioned. We think that paying attention to this factor in the design of tangible user interfaces for children can improve their experience.
Kurian, JC 1970, 'A Multi-Paradigm Fuzzy Aggregation of Domain Ontology and Media Assets on the Semantic Web Framework', INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS, International Symposium on Information Technology, IEEE, MALAYSIA, Univ Kebangsaan, Fac Informat Sci & Technol, Kuala Lumpur, pp. 758-763.
Kurian, JC, Goh, DH-L, Htoo, THH, Wheeler, L & Hazel, L 1970, 'Enabling Single Sign-On Authentication for Web Repositories using Domain Directory Services', INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS, International Symposium on Information Technology, IEEE, MALAYSIA, Univ Kebangsaan, Fac Informat Sci & Technol, Kuala Lumpur, pp. 48-+.
Lawrence, E, Bachfischer, A, Dyson, LE & Litchfield, A 1970, 'Mobile Learning and Student Perspectives: An mReality Check!', 2008 7th International Conference on Mobile Business, 2008 7th International Conference on Mobile Business (ICMB), IEEE, Barcelona, Spain, pp. 287-295.
View/Download from: Publisher's site
View description>>
n this paper the authors report on the results of a survey aimed at ascertaining the opinions of contemporary university students on the use of mobile devices as learning tools. Four hundred and forty two postgraduate and undergraduate students from an Australian University completed the online survey. The authors analyzed both quantitative and qualitative data focusing on the ramifications for m-learning practices in university environments. Mobile technology acceptance factors are used to highlight important findings from the survey.
Lebbe, MA, Agbinya, JI, Chaczko, Z & Braun, R 1970, 'Artificial immune system inspired danger modelling in Wireless Mesh Networks', 2008 International Conference on Computer and Communication Engineering, 2008 International Conference on Computer and Communication Engineering (ICCCE), IEEE, Malaysia, pp. 984-988.
View/Download from: Publisher's site
View description>>
In recent years wireless mesh network (WMN) technologies and its applications have been actively researched and developed as the promising solution for future wireless mobile networks. On the other hand security of WMN is often a secondary reflection in development. In our previous work we proposed Artificial Immune System model to employ in secure routing in WMN. This paper improves and extends the algorithm in our previous work with more achievable danger levels and introduces responsible parameters and model danger in WMN. Moreover this paper proposes the elected network simulator for the experiments. ©2008 IEEE.
Lee, S & Lister, R 1970, 'Experiments in the dynamics of phase coupled oscillators when applied to graph colouring', Conferences in Research and Practice in Information Technology Series, Australasian Computer Science Conference, Australian Computer Society, Inc, Wollongong, Australia, pp. 83-89.
View description>>
This paper examines the capacity of networks of phase coupled oscillators to coordinate activity in a parallel, distributed fashion. To benchmark these networks of oscillators, we present empirical results from a study of the capacity of such networks to colour graphs. We generalise the update equation of Aihara et al. (2006) to an equation that can be applied to graphs requiring multiple colours. We find that our simple multi-phase model can colour some types of graphs, especially complete graphs and complete k-partite graphs with equal or a near equal number of vertices in each partition. A surprising empirical result is that the effectiveness of the approach appears to be more dependent upon the topology of the graph than the size of the graph. Copyright © 2008, Australian Computer Society, Inc.
Lee, S, Leaney, J, O’Neill, T & Hunter, M 1970, 'Evaluating Open Service Access with an Abstract Model of NGN Functions', 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Asia-Pacific Network Operations and Management Symposium, Springer Berlin Heidelberg, Beijing, China, pp. 487-490.
View/Download from: Publisher's site
View description>>
As new business models and market opportunities are rapidly emerging from the `opening up of telecommunications networks, we required a better understanding of the effectiveness of using open standards to provide access to functions in NGNs. In this paper we reason about the coverage of openly accessible functions using an abstract model of NGN functionality. Defining and using an abstract model allows us to evaluate the effectiveness of open standards from a perspective where a wide range of NGN functionality can be generalised and conveniently categorised. Subsequently, it will be possible to identify the gaps, which are a subset of functionality that we are specifically interested in for our project.
Lee, S, Leaney, J, O'Neill, T & Hunter, M 1970, 'Evaluating open service access with an abstract model of NGN functions', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 487-490.
View/Download from: Publisher's site
View description>>
As new business models and market opportunities are rapidly emerging from the 'opening up' of telecommunications networks, we required a better understanding of the effectiveness of using open standards to provide access to functions in NGNs. In this paper we reason about the coverage of openly accessible functions using an abstract model of NGN functionality. Defining and using an abstract model allows us to evaluate the effectiveness of open standards from a perspective where a wide range of NGN functionality can be generalised and conveniently categorised. Subsequently, it will be possible to identify the gaps, which are a subset of functionality that we are specifically interested in for our project. © 2008 Springer Berlin Heidelberg.
Li, J & Hao, P 1970, 'Reliable Representation of Data on Manifolds', Procedings of the British Machine Vision Conference 2008, British Machine Vision Conference 2008, British Machine Vision Association.
View/Download from: Publisher's site
View description>>
The manifold learning algorithms are promising data analysis tools. However, to fit an unseen point in a learned model, the point must be located in the training set, which limits its scalability. In this paper, we discuss how to select landmarks from the data to help locate the test points. Our method is for data on manifolds: the way the landmarks represent the data in the ambient space should resemble the way they represent the data on the manifold. Compared to the previous research, (i) Our test foregoes the requirement of knowing the intrinsic manifold dimension and thus is more applicable and robust. (ii) Our selection implies a provable topology preservation property. (iii) We also provide a way to improve existing landmarks. Experiments on the synthetic data and the real data have been done. The results support the proposed properties and algorithms.
Li, J, Hao, P & Zhang, C 1970, 'Transferring Colours to Grayscale Images by Locally Linear Embedding', Procedings of the British Machine Vision Conference 2008, British Machine Vision Conference 2008, British Machine Vision Association.
View/Download from: Publisher's site
View description>>
In this paper, we propose a learning-based method for adding colours to grayscale images. In contrast to many previous computer-aided colourizing methods, which require intensive and accurate human intervention, our method needs only the user to provide a colourful image of the similar content as the grayscale image. We accept the "image manifold" assumption and apply manifold learning methods to model the relations between the chromatic channels and the gray levels in the training images. Then we synthesize the objective chromatic channels using the learned relations. Experiments show that our method gives superior results to those of the previous work.
Lister, R 1970, 'After the gold rush: Toward sustainable scholarship in computing', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Wollongong, Australia, pp. 3-17.
View description>>
In just thirty years, we have gone from punched cards to Second Life. But, as the American National Science Foundation (NSF) recently noted, 'undergraduate computing education today often looks much as it did several decades ago' (NSF, 2006). Consequently, today's 'Nintendo Generation' have voted with their feet. We bore them. The contrast between the changes wrought via computer research over the last 30 years, and the failure of computing education to adapt to those changes, is because computing academics lead a double life. In our research lives we see ourselves as part of a community that reaches beyond our own university. We read literature, we attend conferences, we publish, and the cycle repeats, with community members building upon each other's work. But in our teaching lives we rarely discuss teaching beyond our own university, we are not guided by any teaching literature; instead we simply follow our instincts. Academics in computing, or in any other discipline, can approach their teaching as research into how novices become experts. Several recent multi-institutional research collaborations have studied the development of novice programmers. This paper describes some of the results from those collaborations. The separation of our teaching and research lives diminishes not just our teaching but also our research. The modern practice of stripping away all 'distractions' to maximize research output is like the practice of stripping away rainforest to grow beef - both practices appear to work, for a little while, but not indefinitely. Twenty-first century academia needs to bring teaching and research together, to form a scholarship of computing that is an integrated, sustainable, ecological whole. © 2008, Australian Computer Society, Inc.
Lister, R & Box, I 1970, 'A citation analysis of the ACE2005 - 2007 proceedings, with reference to the June 2007 CORE conference and journal rankings', Conferences in Research and Practice in Information Technology Series, Australasian Computing Education Conference, Australian Computer Society, Wollongong, Australia, pp. 93-102.
View description>>
This paper compares the CORE rankings of computing education conferences and journals to the frequency of citation of those journals and conferences in the ACE2005, 2006 and 2007 proceedings. The assumption underlying this study is that citation rates are a measure of esteem, and so there should be a positive relationship between citation rates and rankings. The CORE conference rankings appear to broadly reflect the ACE citations, but there are some inconsistencies between citation rates and the journal rankings. The paper also identifies the most commonly cited books in these ACE proceedings. Finally, in the spirit of 'Quis custodiet ipsos custodes?' the paper discusses some ways in which the CORE rankings process itself might in future be made more transparent and open to scholarly discourse. © 2008, Australian Computer Society, Inc.
Lister, R & Box, I 1970, 'A citation analysis of the sigcse 2007 proceedings', Proceedings of the 39th SIGCSE technical symposium on Computer science education, SIGCSE '08: The 39th ACM Technical Symposium on Computer Science Education, ACM, Portland, OR, USA, pp. 476-480.
View/Download from: Publisher's site
View description>>
Abstract: This paper identifies the most commonly cited conferences, journals and books among the 1398 citations made in the 122 publications of the SIGCSE 2007 proceedings. The SIGCSE 2007 authors cited a very large array of conferences, journals and books, but the majority are only cited within a single paper. There are only a very small set of journals and conferences cited frequently. Most books cited are concerned with technical information or are textbooks. Only 2% of books are concerned with computer science education and 23% with education in general. The picture that emerges from this citation analysis is that the SIGCSE community does not have a substantial core set of educational literature. Also, the epistemology of the SIGCSE community is primarily objectivist, with a focus on content, rather than a constructivist, student-centered focus on learning.
Lister, R, Caspersen, ME & Clancy, M 1970, 'ICER'08 - Proceedings of the ACM Workshop on International Computing Education Research: Foreword', ICER'08 - Proceedings of the ACM Workshop on International Computing Education Research.
Lister, RF & Simon, S 1970, 'Koli Calling 2007', Proceedings of the 7th Baltic Sea Conference on Computing Education Research, Baltic Sea Conference on Computing Education Research, Australian Computer Society, Koli National Park, Finland, pp. 1-231.
View description>>
The Seventh Baltic Sea Conference on Computing Education Research, Koli Calling 2007, was held in Finlandâs beautiful Koli National Park on 15-18 November 2007. Contributions to Koli Calling can take one of four forms. Research papers present unpublished original research. System papers describe tools for learning, instruction, or assessment in computing education, motivated by the didactic needs of computing. Discussion papers are shorter papers used to present novel ideas, proposals, prototypes, or work in progress. Posters are very short presentations describing novel approaches or work in progress. All papers and posters were double-blind peer reviewed by members of the international programme committee and additional reviewers. There were 30 âlongâ papers submitted (i.e. research or system papers). The acceptance rate for long papers was 43% (12 research papers and one system paper). The remaining long papers, and those papers submitted speciï¬cally as discussion papers, comprised a total of 28 papers, of which 15 (54%) were accepted as short papers. The authors of all these accepted papers are from 12 diï¬erent countries.
Lister, RF, Caspersen, M & Clancy, M 1970, 'Proceeding of the fourth International workshop on Computing education research', Proceeding of the fourth International workshop on Computing education research, International workshop on Computing education research, Association of Computing Machinery, Sydney, Australia, pp. 1-184.
View description>>
The call for papers attracted 46 submissions. All papers were double-blind peer-reviewed by members of the international program committee. After the reviewing, 16 papers (35%) were accepted for inclusion in the conference, written by authors across 9 countries: Australia, Canada, Denmark, Finland, Germany, New Zealand, Sweden, the United Kingdom, and the United States of America
Lopez, M, Whalley, J, Robbins, P & Lister, R 1970, 'Relationships between reading, tracing and writing skills in introductory programming', Proceedings of the Fourth international Workshop on Computing Education Research, ICER '08: International Computing Education Research Workshop, ACM, Sydney, Australia, pp. 101-112.
View/Download from: Publisher's site
View description>>
ABSTRACT: This study analyzed student responses to an examination, after the students had completed one semester of instruction in programming. The performance of students on code tracing tasks correlated with their performance on code writing tasks. A correlation was also found between performance on "explain in plain English" tasks and code writing. A stepwise regression, with performance on code writing as the dependent variable, was used to construct a path diagram. The diagram suggests the possibility of a hierarchy of programming related tasks. Knowledge of programming constructs forms the bottom of the hierarchy, with "explain in English", Parson's puzzles, and the tracing of iterative code forming one or more intermediate levels in the hierarchy.
Lu, J, Deng, X, Vroman, P, Zeng, X, Ma, J & Zhang, G 1970, 'A fuzzy multi-criteria group decision support system for nonwoven based cosmetic product development evaluation', 2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence), 2008 IEEE 16th International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, Kong Kong, China, pp. 1700-1707.
View/Download from: Publisher's site
View description>>
Product prototype evaluation is an important phase in new product development (NPD). Such evaluation often requires multiple criteria that are within a hierarchy and a group of evaluators. The evaluation process and these evaluation criteria often involve uncertain and fuzzy data in the weights of these criteria and the judgments of these evaluators. To evaluate nonwoven cosmetic product prototypes, this study first develops a NPD evaluation model, which has evaluation criteria within three levels, based on the features of nonwoven products. It then proposes a fuzzy (multi-level) multi-criteria group decision-making (FMCGDM) method for supporting the evaluation task. A fuzzy multi-criteria group decision support system (FMCGDSS) is developed to implement the proposed method and applied in nonwoven cosmetic product development evaluation. © 2008 IEEE.
Lu, J, Deng, X, Zeng, X, Vroman, P, Wu, F & Zhang, G 1970, 'A fuzzy multi-objective decision support system for nonwoven products experiment design', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 787-792.
View/Download from: Publisher's site
View description>>
Experiment design often involves multiple objectives and uncertain data in its optimizing process. Fuzzy multi-objective linear programming (FMOLP) is an appropriate method to handle this problem. For the case of modeling nonwoven-based resilient product
Lu, J, Zhu, Y, Zeng, X, Koehl, L, Ma, J & Zhang, G 1970, 'A Fuzzy Decision Support System for Garment New Product Development', AI 2008: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, Australasian Joint Conference on Artificial Intelligence, Springer, New Zealand, pp. 532-+.
View/Download from: Publisher's site
View description>>
Garment new product development (NPD) evaluation requires considering multiple criteria under a hierarchical structure. The evaluation process often involves uncertainty and fuzziness in both the relationships between criteria and the judgments of evaluators. This study first presents a garment NPD evaluation model under a well-being concept. It then proposes a fuzzy multi-criteria group decision-making (FMCGDM) method to evaluate garment NPD. The advantages of the FMCGDM method include handling criteria in a hierarchical structure, dealing with three kinds of uncertainties simultaneously, and using suitable types of fuzzy numbers to describe linguistic terms. A fuzzy multi-criteria group decision support system (FMCGDSS) is developed to implement the proposed method. Finally a garment NPD evaluation case study demonstrates the proposed method and software system.
Lu, J, Zhu, Y, Zeng, X, Koehl, L, Ma, J & Zhang, G 1970, 'A fuzzy multi-criteria group decision support system for textile material fabric-hand evaluation', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 1129-1134.
View/Download from: Publisher's site
View description>>
Fabric-hand evaluation is one of the key features and measures in textile material selection for fashion design. Fabric-hand evaluation requires considering multiple criteria with in a group of evaluators, The evaluation process often involves fuzziness
Ma, J & Guangquan Zhang. 1970, 'Team Situation Awareness measurement using group aggregation and implication operators', 2008 3rd International Conference on Intelligent System and Knowledge Engineering, 2008 3rd International Conference on Intelligent System and Knowledge Engineering (ISKE 2008), IEEE, Xianeb, pp. 625-630.
View/Download from: Publisher's site
View description>>
Situation Awareness (SA) has been received much attention from human factors and ergonomics community during the past two decades. Team working plays a vital role in complex dynamic situations, increasing requirements for sharing perceptions and comprehension of a situation among team members and improving team situation awareness have been merged. This paper presents a team SA measurement (TSAM) method taking both qualitative and quantitative information into consideration. The TSAM method uses a hierarchy to depict team's shared mental model, applies linguistic terms to represent individual SA and adopts a group aggregation strategy to integrate individual SA through indicator-specified implication operators. Example has shown its effective. © 2008 IEEE.
Madhisetty, S, Busch, P & Feuerlicht, G 1970, 'Utility Computing Framework and its Impact on the Medical Industry', Con-IRM 2008 (IRMA), International Conference on Information Resources Management, IDEA Group Publishing, Ontario, Canada, pp. 1-7.
Madhisetty, S, Busch, P, Feuerlicht, G & Flax, L 1970, 'Utility computing and its influence on the IT-industry', International Conference on Enterprise Information Systems and Web Technologies 2008, EISWT 2008, International Conference On Enterprise Systems and Web Technologies, ISRST, Orlando, USA, pp. 134-140.
View description>>
Though much service-oriented architecture have failed before to deliver on their promises of remote delivery of IT services, the ubiquitous nature of computing which is now present is the motivating factor for computing to be seen in a 'Utility model'. Utility Computing (UC) is an on demand delivery of enterprise applications and business process in a shared, secured and scalable standards based environment over the Internet. The impact of this new technology will be seen in many areas. Utility applications built on multi-tenant architecture where many users can access their applications concurrently is a cost effective means for providing service oriented computing to the end user. This paper studies the adoption of such technology in the IT industry. This paper studies the inhibiting factors for the successful adoption of Utility Computing model in the IT-Industry.
Mathieson, L & Szeider, S 1970, 'Parameterized Graph Editing with Chosen Vertex Degrees', COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS, 2nd International Conference on Combinatorial Optimization and Applications, Springer Berlin Heidelberg, St Johns, CANADA, pp. 13-22.
View/Download from: Publisher's site
Mathieson, L & Szeider, S 1970, 'The parameterized complexity of regular subgraph problems and generalizations', Conferences in Research and Practice in Information Technology Series.
View description>>
We study variants and generalizations of the problem of finding an r-regular subgraph (where r ≥ 3) in a given graph by deleting at most k vertices. Moser and Thilikos (2006) have shown that the problem is fixed-parameter tractable (FPT) if parameterized by (k, r). They asked whether the problem remains fixed-parameter tractable if parameterized by k alone. We answer this question negatively: we show that if parameterized by k alone the problem is W[1]-hard and therefore very unlikely fixed-parameter tractable. We also give W[1]-hardness results for variants of the problem where the parameter is the number of vertex and edge deletions allowed, and for a new generalized form of the problem where the obtained subgraph is not necessarily regular but its vertices have certain prescribed degrees. Following this we demonstrate fixed-parameter tractability for the considered problems if the parameter includes the regularity r or an upper bound on the prescribed degrees in the generalized form of the problem. These FPT results are obtained via kernelization, so also provide a practical approach to the problems presented. © 2008, Australian Computer Society, Inc.
Maxwell, C, Leaney, J & O'Neill, T 1970, 'Utilising Abstract Matching to Preserve the Nature of Heuristics in Design Optimisation', 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008), 2008 15th Annual IEEE International Conference on Engineering of Computer Based Systems (ECBS), IEEE, Belfast, NORTH IRELAND, pp. 287-+.
View/Download from: Publisher's site
McGregor, C & Eklund, JM 1970, 'Real-Time Service-Oriented Architectures to Support Remote Critical Care: Trends and Challenges', 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008 32nd Annual IEEE International Computer Software and Applications Conference, IEEE, pp. 1199-1204.
View/Download from: Publisher's site
View description>>
Healthcare providers and governments are under pressure to maintain and improve the quality of care to an increasing volume of critical care patients at either end of the life cycle, namely premature and ill-term babies together with the elderly. The provision of a service of critical care utilizing real-time service-oriented architectures has the potential to enable clinicians to be supported in the care of a greater number patients that are, perhaps more importantly, located elsewhere to their intensive care units. This paper presents a review of recent research in the application of computing and IT to support the service of critical care and determines the trends and challenges for the application of real-time service-oriented architectures within the domain. © 2008 IEEE.
McGregor, C & Frize, M 1970, 'Women in Biomedical Engineering and Health Informatics', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 5933-+.
View/Download from: Publisher's site
McGregor, C, Smith, KP & Percival, J 1970, 'Women in biomedical engineering and health informatics and its impact on gender representation for accepted publications at IEEE EMBC 2007', 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, Vancouver, CANADA, pp. 2881-2884.
View/Download from: Publisher's site
Medelyan, O & Milne, D 1970, 'Augmenting domain-specific thesau with knowledge from wikipedia', New Zealand Computer Science Research Student Conference, NZCSRSC 2008 - Proceedings, pp. 108-114.
View description>>
We propose a new method for extending a domain-specific thesaurus with valuable information from Wikipedia. The main obstacle is to disambiguate thesaurus concepts to correct Wikipedia articles. Given the concept name, we first identify candidate mappings by analyzing article titles, their redirects and disambiguation pages. Then, for each candidate, we compute a link-based similarity score to all mappings of context terms related to this concept. The article with the highest score is then used to augment the thesaurus concept. It is the source for the extended gloss, explaining the concept's meaning, synonymous expressions that can be used as additional non-descriptors in the thesaurus, translations of the concept into other languages, and new domain-relevant concepts. Copyright is held by the author/owner(s).
Medelyan, O, Witten, IH & Milne, D 1970, 'Topic indexing with wikipedia', AAAI Workshop - Technical Report, pp. 19-24.
View description>>
Wikipedia can be utilized as a controlled vocabulary for identifying the main topics in a document, with article titles serving as index terms and redirect titles as their synonyms. Wikipedia contains over 4M such titles covering the terminology of nearly any document collection. This permits controlled indexing in the absence of manually created vocabularies. We combine state-of-the-art strategies for automatic controlled indexing with Wikipedia's unique property-a richly hyperlinked encyclopedia. We evaluate the scheme by comparing automatically assigned topics with those chosen manually by human indexers. Analysis of indexing consistency shows that our algorithm performs as well as the average person.
Mehboob, Z, Zowghi, D & Lowe, D 1970, 'Supporting integrated dependency model for change impact analysis in web systems', AusWeb 2008: 14th Australasian World Wide Web Conference, Australian World Wide Web Conference, Southern Cross University, Ballina, Australia, pp. 173-178.
View description>>
Change Impact Analysis (CIA) is typically used to identify the consequences of making a software change by utilizing the dependency and traceability information with regard to that change. Previous research highlights that CIA techniques are developed by both an understanding of interdependencies (between system components) as well as interaction of architectural modules. Given that Web systems (WS) are usually developed as a multi-tier and components based system, it is postulated that their multi-tier interaction and components interdependencies require different CIA methods. In this paper we propose extending current CIA techniques with the concept of an integrated dependency model to accommodate multi-tier and interoperability dependencies in WS. © 2008. Zafar Mehboob, Didar Zowghi and David Lowe.
MERIGÓ, JM & CASANOVAS, M 1970, 'DECISION MAKING WITH DEMPSTER-SHAFER BELIEF STRUCTURE USING THE 2-TUPLE LINGUISTIC REPRESENTATION MODEL', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, SPAIN, pp. 325-330.
View/Download from: Publisher's site
MERIGÓ, JM & CASANOVAS, M 1970, 'DECISION MAKING WITH DISTANCE MEASURES AND INDUCED AGGREGATION OPERATORS', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, SPAIN, pp. 483-488.
View/Download from: Publisher's site
Merigó, JM & Casanovas, M 1970, 'Fuzzy induced aggregation operators in decision making with Dempster-Shafer belief structure', ICEIS 2008 - Proceedings of the 10th International Conference on Enterprise Information Systems, 10th International Conference on Enterprise Information Systems, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Barcelona, SPAIN, pp. 548-552.
View description>>
We develop a new approach for decision making with Dempster-Shafer theory of evidence when the available information is uncertain and it can be assessed with fuzzy numbers. With this approach, we are able to represent the problem without losing relevant information, so the decision maker knows exactly which are the different alternatives and their consequences. For doing so, we suggest the use of different types of fuzzy induced aggregation operators in the problem. As a result, we get new types of fuzzy induced aggregation operators such as the belief structure - fuzzy induced ordered weighted averaging (BS-FIOWA) operator. We also develop an application of the new approach in a financial decision making problem.
Merigó, JM & Casanovas, M 1970, 'The generalized hybrid averaging operator and its application in financial decision making', ICEIS 2008 - Proceedings of the 10th International Conference on Enterprise Information Systems, 10th International Conference on Enterprise Information Systems, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Barcelona, SPAIN, pp. 467-471.
View description>>
We present the generalized hybrid averaging (GHA) operator. It is a new aggregation operator that generalizes the hybrid averaging (HA) operator by using the generalized mean. Then, we are able to generalize a wide range of mean operators such as the HA, the hybrid quadratic averaging (HQA), etc. The HA is an aggregation operator that includes the ordered weighted averaging (OWA) operator and the weighted average (WA). Then, with the GHA, we are able to get all the particular cases obtained by using generalized means in the OWA and in the WA such as the weighted geometric mean, the ordered weighted geometric (OWG) operator, the weighted quadratic mean (WQM), etc. We further generalize the GHA by using quasi-arithmetic means. Then, we obtain the quasi-arithmetic hybrid averaging (Quasi-HA) operator. Finally, we apply the new approach in a financial decision making problem.
MERIGÓ, JM & GIL-LAFUENTE, AM 1970, 'THE INDUCED LINGUISTIC GENERALIZED OWA OPERATOR', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, SPAIN, pp. 513-518.
View/Download from: Publisher's site
Merigó, JM & Gil-Lafuente, AM 1970, 'The linguistic generalized OWA operator and its application in strategic decision making', ICEIS 2008 - Proceedings of the 10th International Conference on Enterprise Information Systems, 10th International Conference on Enterprise Information Systems, INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, Barcelona, SPAIN, pp. 219-224.
View description>>
We introduce the linguistic generalized ordered weighted averaging (LGOWA) operator. It is a new aggregation operator that uses linguistic information and generalized means in the OWA operator. It is very useful for uncertain situations where the available information can not be assessed with numerical values but it is possible to use linguistic assessments. This aggregation operator generalizes a wide range of aggregation operators that use linguistic information such as the linguistic generalized mean (LGM), the linguistic weighted generalized mean (LWGM), the linguistic OWA (LOWA) operator, the linguistic ordered weighted geometric (LOWG) operator and the linguistic ordered weighted quadratic averaging (LOWQA) operator. We also introduce a new type of Quasi-LOWA operator by using quasi-arithmetic means in the LOWA operator. Finally, we develop an application of the new approach. We analyze a decision making problem about selection of strategies.
Merigó, JM, Casanovas, M & Martínez, L 1970, 'A Decision Making Model Based on Dempster-Shafer Theory and Linguistic Hybrid Aggregation Operators', 2008 Eighth International Conference on Hybrid Intelligent Systems, 2008 8th International Conference on Hybrid Intelligent Systems (HIS), IEEE, pp. 180-185.
View/Download from: Publisher's site
View description>>
The solving processes for decision making problems based on the use of the Dempster-Shafer (D-S) theory can be accomplished in different ways according to the necessities of each single problem. In this contribution we present a decision making scheme based on the D-S defined in a linguistic framework and then, we propose the use of an hybrid averaging operator (2-THA) that use the 2-tuple linguistic representation model. By using the 2-THA in D-S theory, we obtain a new aggregation operator: the belief structure - 2-THA (BS-2-THA) operator. We study some of its main properties and then show an illustrative example of the new approach in a decision making problem. © 2008 IEEE.
Miliszewska, I 1970, 'Transnational Education Programs: Student Reflections on a Fully-Online Versus a Hybrid Model', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 79-90.
View/Download from: Publisher's site
View description>>
With rapid expansion of the transnational education market, more and more universities join the ranks of transnational education providers, or expand their transnational education offerings. Many of those providers regard online provision of their programs as an economic alternative to face-to-face teaching. Do the transnational students support this view? This paper discusses student responses to the fully-online provision of education programs in several important transnational markets: Hong Kong, Malaysia, Singapore, and Vietnam. The paper reports on a study of the perceptions of transnational students in those locales of the importance of the hybrid learning environment with an emphasis on face-to-face interaction in their courses, and discusses the importance of cultural sensitivities on those perceptions. The paper concludes by considering the future of the hybrid education model in the transnational context. © 2008 Springer-Verlag Berlin Heidelberg.
Miliszewska, I, Venables, A & Tan, G 1970, 'Reflections on a mentoring experience in an undergraduate computing course at Victoria University', Proceedings of the 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering, FECS 2008, pp. 47-52.
View description>>
The problems encountered by students in first-year computer programming units are a common concern in many universities, including Victoria University. Despite various initiatives introduced over the years to alleviate the problems, commencing students continue to struggle with programming; this struggle results in high failure rates in introductory programming units and contributes significantly to the high attrition in computing degree programs. This paper reports on a mentoring program introduced as part of a strategy to improve the learning outcomes of novice programming students. The paper describes the mentoring initiative, discusses its various dimensions, explores the roles of its participants, and reflects on the benefits gained from the experience.
Milne, D & Witten, IH 1970, 'An effective, low-cost measure of semantic relatedness obtained from wikipedia links', AAAI Workshop - Technical Report, pp. 25-30.
View description>>
This paper describes a new technique for obtaining measures of semantic relatedness. Like other recent approaches, it uses Wikipedia to provide structured world knowledge about the terms of interest. Our approach is unique in that it does so using the hyperlink structure of Wikipedia rather than its category hierarchy or textual content. Evaluation with manually defined measures of semantic relatedness reveals this to be an effective compromise between the ease of computation of the former approach and the accuracy of the latter. Copyright © 2008.
Milne, D & Witten, IH 1970, 'Learning to link with wikipedia', Proceedings of the 17th ACM conference on Information and knowledge management, CIKM08: Conference on Information and Knowledge Management, ACM, pp. 509-518.
View/Download from: Publisher's site
View description>>
This paper describes how to automatically cross-reference documents with Wikipedia: the largest knowledge base ever known. It explains how machine learning can be used to identify significant terms within unstructured text, and enrich it with links to the appropriate Wikipedia articles. The resulting link detector and disambiguator performs very well, with recall and precision of almost 75%. This performance is constant whether the system is evaluated on Wikipedia articles or -real world- documents. This work has implications far beyond enriching documents with explanatory links. It can provide structured knowledge about any unstructured fragment of text. Any task that is currently addressed with bags of words-indexing, clustering, retrieval, and summarization to name a few-could use the techniques described here to draw on a vast network of concepts and semantics. © 2008 ACM.
Milne, D, Nichols, DM & Witten, IH 1970, 'A competitive environment for exploratory query expansion', Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries, JCDL08: Joint Conference on Digital Libraries, ACM, pp. 197-200.
View/Download from: Publisher's site
View description>>
Most information workers query digital libraries many times a day. Yet people have little opportunity to hone their skills in a controlled environment, or compare their performance with others in an objective way. Conversely, although search engine logs record how users evolve queries, they lack crucial information about the user's intent. This paper describes an environment for exploratory query expansion that pits users against each other and lets them compete, and practice, in their own time and on their own workstation. The system captures query evolution behavior on predetermined information-seeking tasks. It is publicly available, and the code is open source so that others can set up their own competitive environments. Copyright 2008 ACM.
Mohamed Mowjoon, D, Agbinya, JI & Chaczko, ZC 1970, 'Policy-based Danger Management in Artificial Immune System Inspired Secure Routing in Wireless Mesh Networks', Proceedings International MultiConference of Engineers and Computer Scientists, International MultiConference of Engineers and Computer Scientists, International Association of Engineers, Hong Kong, pp. 268-270.
View description>>
This paper introduces Policy based Management Information Base to manage danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management functions are defined and the paper focuses only on the security function. Proposed policy based management and typical operation of the architecture are also reported.
Mu, K, Jin, Z & Zowghi, D 1970, 'A Measurement-Driven Process Model For Managing Inconsistent Software Requirements', APSEC 2008:15TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, Asia-Pacific Software Engineering Conference, IEEE Explore, Beijing, China, pp. 291-298.
View/Download from: Publisher's site
View description>>
nconsistency is a pervasive issue in software engineering. Both general rules of inconsistency management and special case-based approaches to handling inconsistency have recently been considered. In this paper, we present a process model for handling requirements inconsistency within the viewpoints framework. In this process model, when an inconsistency among viewpoints is detected, a set of candidate proposals for handling inconsistency will be generated using techniques from multi-agent automated negotiations. The proposals are then prioritized using an integrated measurement of inconsistencies. The viewpoints involved in the inconsistency will then enter the negotiations by being presented with the candidate proposals and thus selecting an acceptable proposal based on the priorities associated with each candidate proposal. To facilitate usability, in our process, we assume that the natural language requirements statements are first translated into corresponding logical formulas using a translator software. Moreover, the candidate proposals for handling inconsistency are also translated back from formal logic into natural language before being presented for selection.
Niu, L & Zhang, G 1970, 'A Model of Cognition-Driven Decision Process for Business Intelligence', 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, Sydney, Australia, pp. 876-879.
View/Download from: Publisher's site
View description>>
We proposed a cognition-driven decision process model for business intelligence. In this model, a manager's situation awareness (SA) and mental models are developed and enriched for naturalistic decision making based on traditional business intelligence systems. Mental models are also used to supervise the process of situation information retrieval and presentation. The final decision-making process is based on recognition-primed decision model. © 2008 IEEE.
Pal, U, Sharma, N, Wakabayashi, T & Kimura, F 1970, 'Handwritten Character Recognition of Popular South Indian Scripts', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 251-264.
View/Download from: Publisher's site
View description>>
India is a multi-lingual, multi-script country. Considerably less work has been done towards handwritten character recognition of Indian languages than for other languages. In this paper we propose a quadratic classifier based scheme for the recognition of off-line handwritten characters of three popular south Indian scripts: Kannada, Telugu, and Tamil. The features used here are mainly obtained from the directional information. For feature computation, the bounding box of a character is segmented into blocks, and the directional features are computed in each block. These blocks are then down-sampled by a Gaussian filter, and the features obtained from the down-sampled blocks are fed to a modified quadratic classifier for recognition. Here, we used two sets of features. We used 64-dimensional features for high speed recognition and 400-dimensional features for high accuracy recognition. A five-fold cross validation technique was used for result computation, and we obtained 90.34%, 90.90%, and 96.73% accuracy rates from Kannada, Telugu, and Tamil characters, respectively, from 400 dimensional features. © 2008 Springer-Verlag Berlin Heidelberg.
Parakhine, A, Leaney, J & O'Neill, T 1970, 'Design guidance using simulation-based Bayesian belief networks', FIFTEENTH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, IEEE International Conference and Workshop on the Engineering of Computer Based Systems, IEEE, Belfast, Northern Ireland, pp. 76-84.
View/Download from: Publisher's site
View description>>
In this work, the task of complex computer-based system design optimization involves exploration of a number of possible candidate designs matching the optimisation criteria. However, the process by which the possible candidate designs are generated and rated is fundamental to an optimal outcome. It is dependent upon the set of system characteristics deemed relevant by the designer given the systems requirements. We propose a method which is aimed at providing the designer with guidance based upon description of the possible causal relationships between various system characteristics and qualities. This guidance information is obtained by employing principles of multiparadigm simulation to generate a set of data which is then processed by an algorithm to generate a Bayesian Belief Network representation of causalities present in the source system. Furthermore, we address the issues and tools associated with application of the proposed method by presenting a detailed simulation and network generation effort undertaken as part of a significant industrial case study.
Prior, J, Robertson, T & Leaney, J 1970, 'Situated Software Development: Work Practice and Infrastructure Are Mutually Constitutive', 19th Australian Conference on Software Engineering (aswec 2008), 2008 19th Australian Conference on Software Engineering ASWEC, IEEE, pp. 160-169.
View/Download from: Publisher's site
View description>>
Software developers' work is much more interesting and multifarious in practice than formal definitions of software development processes imply. Rational models of work are often representations of processes defined as they should be performed, rather than portrayals of what people actually do in practice. These models offer a simplified picture of the phenomena involved, and are frequently confused with how the work is carried out in reality, or they are advocated as the ideal way to accomplish the work. A longitudinal ethnographic study (45 days of fieldwork over 20 months) of a group of professional software developers revealed the importance of including their observed practice, and the "infrastructure" that supports and shapes this practice, in an authentic account of their work. Moreover, this research revealed that software development work practice and the infrastructure used to produce software are inextricably entwined and mutually constitutive over time. © 2008 IEEE.
Prior, J, Robertson, T & Leaney, J 1970, 'Situated software development: Work practice and infrastructure are mutually constitutive', ASWEC 2008: 19TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 19th Australian Software Engineering Conference, IEEE COMPUTER SOC, Perth, AUSTRALIA, pp. 160-+.
View/Download from: Publisher's site
View description>>
Software developers work is much more interesting and multifarious in practice than formal definitions of software development processes imply. Rational models of work are often representations of processes defined as they should be performed, rather than portrayals of what people actually do in practice. These models offer a simplified picture of the phenomena involved, and are frequently confused with how the work is carried out in reality, or they are advocated as the ideal way to accomplish the work. A longitudinal ethnographic study (45 days of fieldwork over 20 months) of a group of professional software developers revealed the importance of including their observed practice, and the infrastructure that supports and shapes this practice, in an authentic account of their work. Moreover, this research revealed that software development work practice and the infrastructure used to produce software are inextricably entwined and mutually constitutive over time.
Qiao, Y & Tartary, C 1970, 'Counting Method for Multi-party Computation over Non-abelian Groups', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Cryptology and Network Security, Springer Berlin Heidelberg, Hong Kong, pp. 162-177.
View/Download from: Publisher's site
View description>>
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. The function to be computed is f G (x 1,...,x n ) :∈=∈x 1 •...•x n where each participant P i holds an input x i from the non-commutative group G. The settings of their study are the passive adversary model, information-theoretic security and black-box group operations over G. They presented three results. The first one is that honest majority is needed to ensure security when computing f G . Second, when the number of adversary , they reduced building such a secure protocol to a graph coloring problem and they showed that there exists a deterministic secure protocol computing f G using exponential communication complexity. Finally, Desmedt et al. turned to analyze random coloring of a graph to show the existence of a probabilistic protocol with polynomial complexity when t∈<∈n/μ, in which μ is a constant less than 2.948. We call their analysis method of random coloring the counting method as it is based on the counting of the number of a specific type of random walks. This method is inspiring because, as far as we know, it is the first instance in which the theory of self-avoiding walk appears in multiparty computation. In this paper, we first give an altered exposition of their proof. This modification will allow us to adapt this method to a different lattice and reduce the communication complexity by 1/3, which is an important saving for practical implementations of the protocols. We also show the limitation of the counting method by presenting a lower bound for this technique. In particular, we will deduce that this approach would not achieve the optimal collusion resistance. © 2008 Springer Berlin Heidelberg.
Raban, R, Leigh, EE, Litchfield, AJ & Dyson, LE 1970, 'Using Internet-Enabled Mobile Devices to Support Low-Cost Experiential Learning', 11th International Conference on Experiential Learning (ICEL 2008): Identity of Experience: Challenges for Experiential Learning, 11th International Conference on Experiential Learning, ICEL, Sydney, Australia, pp. 1-9.
View description>>
This paper examines model-making, specifically prototyping, as a problem-based, and possibly experiential, learning activity. Prototyping activities are increasingly being introduced by schools of architecture around the world for the teaching of architectural design and construction technology. Such activities mediate between sophisticated digital modeling technologies, new materials and new construction techniques, and are a means of enabling students to oscillate between the abstract and the concrete: between the virtual world of the computer screen and the physical reality of a model built to scale from representative materials. This paper reviews the literature on what is being done and how. It discusses whether current prototyping activities are taking advantage of the large body of knowledge contained within theories of experiential learning and proposes that a series of guidelines should be formulated to inform the implementation of experimental prototyping activities in the architecture studio. The paper concludes with my own prototyping case study conducted at the University of Technology, Sydney in 2007, which was deliberately designed as an experiential learning activity. Perceptions of its successes and challenges are discussed. A hands-on construction activity will be provided to engage participants in this session.
Rahman, A, Kennedy, P, Simmonds, A & Edwards, J 1970, 'Fuzzy logic based modelling and analysis of network traffic', 2008 8th IEEE International Conference on Computer and Information Technology, 2008 8th IEEE International Conference on Computer and Information Technology (CIT), IEEE, Sydney, Australia, pp. 652-657.
View/Download from: Publisher's site
View description>>
Accurate computer network traffic models are required for many network tasks such as network traffic analysis and performance optimization. Existing statistical traffic modelling techniques rely on precise mathematical analysis of extensive measured data such as packet arrival time, packet size and server-side or client-side round trip time. With the advent of high speed broadband networks, gathering an acceptable quantity of data needed for the precise representation of traffic is a difficult, time consuming, expensive and in some cases almost an impossible task. In this work we developed a fuzzy logic based traffic models using imprecise data sets that can be obtained realistically. The model include a parameter, the R parameter, which is also useful for analysis of network traffic.
Roddick, J, Li, J, Christen, P & Kennedy, PJ 1970, 'Data Mining & Analytics 20068: Proceedings of the 7th Australasian Data Mining Conference (AusDM 2008)', Data Mining & Analytics 20068: Proceedings of the 7th Australasian Data Mining Conference (AusDM 2008), Australian Data Mining Conference, Australian Computer Society, Adelaide.
Roddick, JF, Li, J, Christen, P & Kennedy, P 1970, 'Preface', Conferences in Research and Practice in Information Technology Series.
Saberi, M, Azadeh, A & Ghorbani, S 1970, 'Forecasting oil production by adaptive neuro fuzzy inference system', 2008 IEEE International Symposium on Industrial Electronics, 2008 IEEE International Symposium on Industrial Electronics (ISIE 2008), IEEE, pp. 1035-1043.
View/Download from: Publisher's site
View description>>
In this paper, the efficiency of neuro fuzzy network (ANFIS) is examined against auto regression (AR). Mean absolute percentage error (MAPE) is applied for this purpose. After applying different data preprocessing methods, the models are developed. A method for calculating ANFIS performance is also proposed. Due to various seasonal and monthly changes in oil production and difficulties in modeling it with conventional methods, we consider a case study in four countries for oil production estimation. Finally, analysis of variance (ANOVA) and Duncan Multiple Range Test (DMRT) is conducted for each country to evaluate the most efficient method. © 2008 IEEE.
Saberi, M, Azadeh, A & Ghorbani, S 1970, 'Forecasting Oil Production by Adaptive Neuro Fuzzy Inference system', 2008 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-5, IEEE International Symposium on Industrial Electronics, IEEE, Cambridge, ENGLAND, pp. 240-+.
Schirmer, SG, Kandasamy, G & Devitt, SJ 1970, 'Control paradigms for quantum engineering', 2008 3rd International Symposium on Communications, Control and Signal Processing, 2008 3rd International Symposium on Communications, Control and Signal Processing (ISCCSP), IEEE, St Julians, MALTA, pp. 966-+.
View/Download from: Publisher's site
Schmidt, A, Gellersen, H, van den Hoven, E, Mazalek, A, Holleis, P & Villar, N 1970, 'Proceedings of the Second International Conference on Tangible and Embedded Interaction (TEIâ08)', TEI'08, TEI'08, ACM, Bonn, Germany.
View description>>
We are happy to present the proceedings of the second international conference on tangible and embedded interaction (TEI'08). The feedback we received in response to the first conference and the call of TEI'08 highlighted that there is a great interest in the state-of-the-art on Tangible Interaction, the research community and even beyond these topics. In its second year the tangible an embedded interaction conference is held in Bonn, Germany. The conference is in cooperation with ACM SIGCHI, with its proceedings to be archived in ACM's Digital Library. With technological advances, computing has progressively moved beyond the desktop into new physical and social contexts. As physical artifacts gain new computational behaviors, they become reprogrammable, customizable, repurposable, and interoperable in rich ecologies and diverse contexts. They also become more complex, and require intense design effort in order to be functional, usable, and enjoyable. Designing such systems requires interdisciplinary thinking. Their creation must not only encompass software, electronics, and mechanics, but also the system's physical form and behavior, its social and physical milieu, and beyond. These proceedings include original research work addressing HCI issues, design, use context, tools and technologies, as well as interactive art works in the domain of tangible and embedded interaction. The contributions range from concrete innovative solutions to inspiring novel ideas. The conference brings together this new field, providing a meeting ground for the diverse communities of research and practice involved with tangibles --- from computing, hardware, and sensor technology, to HCI, interaction design, and CSCW, to product- and industrial design and interactive arts. The conference provides with talks, interactive exhibitions, and posters appropriate presentation forms for different types of contributions.
Sheard, J, Carbone, A, Lister, R, Simon, B, Thompson, E & Whalley, JL 1970, 'Going SOLO to assess novice programmers', Proceedings of the 13th annual conference on Innovation and technology in computer science education, ITiCSE '08: 13th Annual Conference on Innovation and Technology in Computer Science Education, ACM, Madrid, Spain, pp. 209-213.
View/Download from: Publisher's site
View description>>
ABSTRACT: This paper explores the programming knowledge of novices using Biggs' SOLO taxonomy. It builds on previous work of Lister et al. (2006) and addresses some of the criticisms of that work. The research was conducted by studying the exam scripts for 120 introductory programming students, in which three specific questions were analyzed using the SOLO taxonomy. The study reports the following four findings: when the instruction to students used by Lister et al. - "In plain English, explain what the following segment of Java code does" - is replaced with a less ambiguous instruction, many students still provide multistructural responses; students are relatively consistent in the SOLO level of their answers; student responses on SOLO reading tasks correlate positively with performance on writing tasks; postgraduates students manifest a higher level of thinking than undergraduates.
Sidhu, A, Hussain, FK & Madzic, M 1970, 'Papers in track 14 - Health ecosystems', 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies (DEST), IEEE.
View/Download from: Publisher's site
Simon, Carbone, A, de Raadt, M, Lister, R, Hamilton, M & Sheard, J 1970, 'Classifying computing education papers', Proceedings of the Fourth international Workshop on Computing Education Research, ICER '08: International Computing Education Research Workshop, ACM, Sydney, Australia, pp. 161-172.
View/Download from: Publisher's site
View description>>
ABSTRACT: We have applied Simon's system for classifying computing education publications to all three years of papers from ICER. We describe the process of assessing the inter-rater reliability of the system and fine-tuning it along the way. Our analysis of the ICER papers confirms that ICER is a research-intensive conference. It also indicates that the research is quite narrowly focused, with the majority of the papers set in the context of programming courses. In addition we find that ICER has a high proportion of papers involving more than one institution, and high proportions of papers on the themes of ability/aptitude and theories and models of teaching and learning.
Simon, S, Sheard, J, Carbone, A, de Raadt, M, Hamilton, M, Lister, RF & Thompson, E 1970, 'Eight years of computing education papers at NACCQ', Proceedings of the 21st Annual Conference of the National Advisory Committee on Computing Qualifications, National Advisory Committee on Computing Qualifications, National Advisory Committee on Computing Qualifications, Auckland, New Zealand, pp. 101-107.
View description>>
Abstract: The 157 computing education papers from the past eight NACCQ conferences are categorised and summarised by a group of researchers from multiple institutions, with steps taken to measure and improve the consistency of classification. The papers are set predominantly in programming subjects, hardware/architecture/systems/ network subjects, and capstone projects. The bulk of the papers are about teaching/learning techniques, assessment techniques, teaching/learning tools, curriculum, and educational technology. Most of the papers are set within single subjects, a few in multiple subjects within a single program or department, and fewer still in a range of subjects across the whole institution or multiple institutions. Nearly a quarter of the papers either expound a position or outline a proposal; a large but diminishing proportion report on something such as a change of curriculum or approach; and a large and increasing proportion are clearly research papers, focusing on the analysis of data to answer an explicit research question.
Smith, G & Johnston, AJ 1970, 'Interactive Software for Guitar Learning', Sound : Space - Proceedings of the Australasian Computer Music Conference, Australasian Computer Music Conference, Australasian Computer Music Association, Sydney, Australia, pp. 69-77.
View description>>
In this paper we present software designed to help address problems encountered by beginning guItarists, using interactive software to find effective solutions to enhance the learning process. Software can be utilised to improve a player's ability tdhear mistakes in theIr performance, as well as to create a fun and entertaining learning environment 'to motivate the player to practice. A software prototype ~~s been developed, which served as a basIs for usabllzty testmg, to highlight the usefulness of vari~us methods of feedback and provide a way forward in developing valuable software for guitar tuition.
Thongkam, J, Xu, G & Zhang, Y 1970, 'AdaBoost algorithm with random forests for predicting breast cancer survivability', 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), 2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong), IEEE, Hong Kong, China, pp. 3062-3069.
View/Download from: Publisher's site
Thongkam, J, Xu, G, Zhang, Y & Huang, F 1970, 'Support Vector Machine for Outlier Detection in Breast Cancer Survivability Prediction', Advanced Web and NetworkTechnologies, and Applications Lecture Notes in Computer Science, Asia Pacific Web Conference, Springer Berlin Heidelberg, Shenyang, China, pp. 99-109.
View/Download from: Publisher's site
View description>>
Finding and removing misclassified instances are important steps in data mining and machine learning that affect the performance of the data mining algorithm in general. In this paper, we propose a C-Support Vector Classification Filter (C-SVCF) to identify and remove the misclassified instances (outliers) in breast cancer survivability samples collected from Srinagarind hospital in Thai- land, to improve the accuracy of the prediction models. Only instances that are correctly classified by the filter are passed to the learning algorithm. Perform- ance of the proposed technique is measured with accuracy and area under the re- ceiver operating characteristic curve (AUC), as well as compared with several popular ensemble filter approaches including AdaBoost, Bagging and ensemble of SVM with AdaBoost and Bagging filters. Our empirical results indicate that C-SVCF is an effective method for identifying misclassified outliers. This ap- proach significantly benefits ongoing research of developing accurate and robust prediction models for breast cancer survivability.
Van Den Hoven, E, Mazalek, A, Gellersen, H & Schmidt, A 1970, 'TEI'08 - Second International Conference on Tangible and Embedded Interaction - Conference: Preface', TEI'08 - Second International Conference on Tangible and Embedded Interaction - Conference Proceedings.
Voinov, A, Arctur, D, Zaslavskiy, I & Ali, S 1970, 'Community-based software tools to support participatory modelling: A vision', Proc. iEMSs 4th Biennial Meeting - Int. Congress on Environmental Modelling and Software: Integrating Sciences and Information Technology for Environmental Assessment and Decision Making, iEMSs 2008, pp. 766-774.
View description>>
Environmental management depends on analysis of complex dynamics and spatial relationships of ecological and socio-economic systems. Modelling, when used to conduct such analyses, is recognized as an effective decision support tool in environmental management. Modelling conducted in a participatory fashion, involving stakeholders in various stages of model building and data processing has evolved as an efficient method for conflict resolution and decision-making. However, successful participatory modelling efforts require specific software and computer tools that are not available or accessible for stakeholders. There is a clear need for specialized modelling and data processing infrastructure that would allow comprehensive environmental simulations, based on limited computer programming skills, computer power, and data availability. We are developing a software framework of model and data modules to enable various stakeholders to tap into the recent and ongoing advances in environmental modelling, and high-quality data available on the Internet. The proposed framework would allow managers and planners to run simulations of policy scenarios and utilize state-of-the-art algorithms to develop and evaluate policy alternatives. The web-based modelling framework is based on the following components: A web-based domain-specific interface which facilitates the development, configuration, and execution of models applicable to region-specific watershed issues; A data-finder and transformer unique to the landscape modelling framework that lever-ages relevant Open GIS catalogue, RDF, and GRID resource discovery standards; A module composer that uses a module pool and guided composition of modules based on expert rules, which are either automatically acquired or input from human users, to guide the simulation-modelling process; and A semi-automatic model calibrator and verifier to deliver high quality simulation models. The framework's core components, i.e. model composition...
Voinov, A, Zaslavskiy, I, Arctur, D, Duffy, C & Seppelt, R 1970, 'Community modelling, and data-model interoperability', Proc. iEMSs 4th Biennial Meeting - Int. Congress on Environmental Modelling and Software: Integrating Sciences and Information Technology for Environmental Assessment and Decision Making, iEMSs 2008, pp. 2035-2050.
View description>>
Community modelling is a promising paradigm to develop complex evolving and adaptable modelling systems that can share methods, data and models more easily within specialized communities. Why then are cooperative modelling communities still quite rare and do not propagate easily? Why has open source been so successful for software development, yet open models are still quite exotic? One difference between software and models is that software shares some common language. Models often use very different principles, theories, and semantics. For example hydrodynamic models, ecological models, and decision support models may have limited commonalities, In these cases, the disciplinary problem being solved may be the impediment to communication and to development of effective community tools these principles to another; it becomes difficult for one model to talk to another one. Similar problems prevail in data operations, when data sets (which are also models of sort) are hard to integrate with other data. An issue of contemporary interest is how will community data and models be implemented within environmental observatories. The environmental observatory may are become the ultimate driver for advancing research with a clear need for interoperability standards and functionality. There are at least three facets to the problem: • Lack of common modelling and software tools to enable modularity and connectivity; • Insufficient community understanding or access to basic tools; • Lack of social motivation and communication skills to enable communal work and sharing environments. The goals of this paper are to explore these areas with respect to the following points: • Understand the interoperability needs of the community for data and models within a participatory and collaborative framework; • Discuss research scenarios that would benefit from interoperability and explore interoperability architecture and standards supporting these scenarios; • Explore environmental syste...
Wang Jian-zhou, Zhu Su-ling, Sun Dong-huai & Lu Hai-yan 1970, 'Combining principal component analysis and fuzzy cluster analysis for China's oil security', 2nd International Symposium on Information Technologies and Applications in Education (ISITAE 2008), 2nd International Symposium on Information Technologies and Applications in Education (ISITAE 2008), IEE, Xiamen, China, pp. 287-292.
View/Download from: Publisher's site
View description>>
It is significant to evaluate the situations of oil security for taking national oil security measures, because very important relationships exist between the oil security and the national security. A novel combined method is presented in this paper, which is based on using principal component analysis (PCA) and fuzzy cluster analysis (FCA) modeling. It is used for assessing oil security. In this paper, the data of 13 years is taken as sample and 10 indexes are selected to constitute an evaluation system for oil security. PCA is used for reducing the dimensions of indexes, and the new indexes are formed for oil security. Then FCA is used for classifying the 13 samples. At last a dialed analysis is made and some suggestions are put forward to ensure oil security.
Wang, C, Lu, J & Zhang, G 1970, 'An ontology data matching method for web information integration', Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, iiWAS08: 10th International Conference on Information Integration and Web-based Applications & Services, ACM, Linz, Austria, pp. 208-213.
View/Download from: Publisher's site
Wang, J, Che, J, Liang, J & Lu, H 1970, 'A Fuzzy Pattern Recognition System Based on SOM Clustering and RBF Neural Networks for Prediction', Proceedings of the 6th International Conference on Information Collection and Data Disposal.
Wang, J, Wang, Y, Sun, D & Lu, H 1970, 'Supply Chain Safety Stock Quantity's Fractal Forecast and Study', 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), IEEE, Dalian, China, pp. 1-4.
View/Download from: Publisher's site
View description>>
Safety stock, a very important composing of the stock management, which is significant for reducing the cost and increasing interests for an enterprise, is the base of the setting of enterprise's stocks, so it is crucial for stock management to presume a rational and exact SS. In this paper, introducing fractal theory, a new method based on the fractal collage theorem and the iterative process of fractal interpolation functions was proposed to forecast the safety stock. Based on the fractal collage theorem, it uses the iterated function system whose attractor is close to the historical data to establish the fractional function, and set the forecasting model proposed according to the iterative process of fractional function. Then by an example the rationality and reliability of this method is verified, and the result show that it is helpful indeed to set the reasonable safety stock for enterprise.
Wang, J, Zhu, W, Sun, D & Lu, H 1970, 'Application of SVM Combined with Mackov Chain for Inventory Prediction in Supply Chain', 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), IEEE, Dalian, China, pp. 1-4.
View/Download from: Publisher's site
View description>>
The aim of this paper is to predict the inventory of the relevant upstream enterprises in supply chain. The support vector machine, a novel artificial intelligence-based method developed from statistical learning theory, is adopted herein to establish a short-term stage forecasting model. However, take the fact into account that demand signal is affected by variant random factors and behaves big uncertainty, the predicted accuracy of SVM is not approving when the data show great randomness. It is obligatory that we present Markov chain to improve the predicted accuracy of SVM. This combined model takes advantage of the high predictable power of SVM model and at the same time take advantage of the prediction power of Markov chain modeling on the discrete states based on the SVM modeling residual sequence. Then we use the statistical data of the output of the gasoline of China from Feb-06 to Dec-07 for a validation of the effectiveness of the above model.
Wang, J-Z, Che, J-X, Liang, J-Z & Lu, H 1970, 'Research on Real Estate Early Warning System Based on Decision Tree and Fuzzy Recognition Theory', 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), IEEE, Jinan, PEOPLES R CHINA, pp. 414-+.
View/Download from: Publisher's site
Wang, J-Z, Wen, J-N, Sun, D-H & Lu, H-Y 1970, 'Detecting and Disposing Abnormal Signal Outliers with Masking Effect by Using Data Accumulated Generating Operation', 2008 Congress on Image and Signal Processing, 2008 Congress on Image and Signal Processing, IEEE, Hainan, pp. 426-430.
View/Download from: Publisher's site
View description>>
In this paper, we study a signal processing problem which concentrates on outlier detection and data mining in order to rediscover some useful information. Moreover, the great difficulty of the subject is caused by both the external environment and the internal mechanism. In the external, owing to limit of impersonal condition, such as, realistic disturbance from noise signal can not avoid. In the internal, the masking effect appears in outlying observation so as to produce some unreasonable results by data analysis. Therefore, based not only on the requirement of external quality assurance schemes, but also on internal quality control where screening for outliers should probably be part of the procedure for our main goal. As a consequence, we have applied data accumulated generating operation and sample median test for solving the conundrum. © 2008 IEEE.
Wen, JN, Wang, JZ & Lu, HY 1970, 'An improved new approach for electric capacity forecasting based on historical data of GDP', 2008 3rd IEEE Conference on Industrial Electronics and Applications, 2008 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA), IEEE, Singapore, pp. 2487-2491.
View/Download from: Publisher's site
View description>>
Prediction is important for the electricity capacity management. Accurate prediction can help the policymaker make correct decision and promote the decision making quality. For improving an accuracy of prediction, in this paper, we adopt the theory of Grey prediction to develop a new forecasting approach that integrates historical data of the gross domestic products (GDP) into an electric capacity forecasting. We adopted Grey prediction as a forecasting means because of its fast calculation with as few as four data inputs needed. As a result, our study considered that Wu and Chen proposed a modeling method of the improved grey relational analysis and main shows that the general Grey model, GM (1, 1), which is an especial case, is adequate to handle an electrical power system. In this study, the prediction is improved significantly by applying the transformed Grey model and the concept of average system slope. The adaptive value of a in the Grey differential equation is obtained quickly with the average system slope technique. In such a way, the wastage of electric consumption can be avoided. That is, it is another achievement of virtual electric power plant. ©2008 IEEE.
Wenjun Zhang, Lin Gui, Wenfeng Ma, Bo Liu & Jian Xiong 1970, 'The television broadcasting network of Chinese High Speed Railway', 2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2008 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), IEEE, Las Vegas, NV, pp. 1-4.
View/Download from: Publisher's site
Xu, G, Zhang, Y & Yi, X 1970, 'Modelling User Behaviour for Web Recommendation Using LDA Model', 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, Sydney, NSW, Australia, pp. 529-532.
View/Download from: Publisher's site
Ya Gao, Guangquan Zhang & Jie Lu 1970, 'A particle swarm optimization based algorithm for fuzzy bilevel decision making', 2008 IEEE International Conference on Fuzzy Systems (IEEE World Congress on Computational Intelligence), 2008 IEEE 16th International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, Kong Kong, China, pp. 1452-1457.
View/Download from: Publisher's site
View description>>
Bilevel decision techniques are developed for decentralized planning problems with decision makers located in a two-level system. This study develops a particle swarm optimization based algorithm to solve fuzzy linear bilevel (FLBL) decision problems. A main advantage of this algorithm is that the optimization technique is adopted directly on FLBL problems by fully considering the original information carried by the fuzzy parameters, thus minimizing information loss. Experiments reveal that this algorithm can effectively solve the fuzzy linear bilevel decision problems. © 2008 IEEE.
Ye, D, Bai, Q & Zhang, M 1970, 'Ontology-Based Knowledge Representation for a P2P Multi-agent Distributed Intrusion Detection System', 2008 IFIP International Conference on Network and Parallel Computing, 2008 IFIP International Conference on Network and Parallel Computing (NPC), IEEE, Shanghai, PEOPLES R CHINA, pp. 111-118.
View/Download from: Publisher's site
Ye, D, Bai, Q, Zhang, M & Ye, Z 1970, 'P2P Distributed Intrusion Detections by Using Mobile Agents', Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008), Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008), IEEE, Portland, OR, pp. 259-+.
View/Download from: Publisher's site
Yu, S & Zhou, W 1970, 'Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks', 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008 IEEE International Conference on Pervasive Computing and Communications (PerCom), IEEE, Hong Kong, PEOPLES R CHINA, pp. 566-571.
View/Download from: Publisher's site
Yu, S, Doss, R, Thapngam, T & Qian, D 1970, 'A Transformation Model for Heterogeneous Servers', 2008 10th IEEE International Conference on High Performance Computing and Communications, 2008 10th IEEE International Conference on High Performance Computing and Communications (HPCC), IEEE, Dalian Univ Technol, Dalian, PEOPLES R CHINA, pp. 665-+.
View/Download from: Publisher's site
Zhang, G, Yang, X & Lu, J 1970, 'A SVM-based classification approach for early warning systems', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 549-554.
View/Download from: Publisher's site
ZHANG, G, ZHANG, G & XIE, H 1970, 'HYBRID GENETIC ALGORITHM BASED ON DISTANCE DENSITY AND QUASI-SIMPLEX TECHNIQUE', Computational Intelligence in Decision and Control, Proceedings of the 8th International FLINS Conference, WORLD SCIENTIFIC, Madrid, Spain, pp. 737-742.
View/Download from: Publisher's site
Zhang, J, Lu, J & Zhang, G 1970, 'An integrated framework of early warning systems', COMPUTATIONAL INTELLIGENCE IN DECISION AND CONTROL, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Madrid, Spain, pp. 683-688.
View/Download from: Publisher's site
View description>>
An early warning system (EWS) is critical to saving lives and mitigating loss from disasters. Literature addresses specific technical issues of EWSs in different hazard domains, however, only a few discussions on framework and standards. The paper proposes a set of practical designing standards and a comprehensive EWS integration framework. The framework takes considerations of human factors, lead-time and feed-back issues, therefore more suitable for a wide range of applications in practice.
Zhang, Y & Xu, G 1970, 'Using Web Clustering for Web Communities Mining and Analysis', 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, Sydney, NSW, Australia.
View/Download from: Publisher's site
Zhen Ye, Weiwei Song, Dayong Ye & Lei Yue 1970, 'Dynamic trust model applied in mobile agent', 2008 6th IEEE International Conference on Industrial Informatics, 2008 6th IEEE International Conference on Industrial Informatics (INDIN), IEEE, pp. 536-540.
View/Download from: Publisher's site
View description>>
A novel philosophy of secure mobile agent model which is based on trust model, risk evaluation and cryptography is proposed in this paper. Compared to current related research, our dynamic model can update in real time and is comprehensive for combining subjective and objective estimation. In addition, this model is broadly adaptive due to its flexibility. Trust and trust relationship are defined on secure problem as while as character of trust itself which are faced when analyzing mobile agent, and trust update function and recommender evaluate function which are already existent are improved. Finally, secure problems which might be brought by trust are discussed. © 2008 IEEE.
Zhu, J, Lu, H, Guo, Y & Lin, Z 1970, 'Development of electromagnetic linear actuators for micro robots (invited)', Proceedings of the 11th International Conference on Electrical Machines and Systems, ICEMS 2008, International Conference on Electrical Machines and Systems, World Publishing Corporation, Wuhan, China, pp. 3673-3679.
View description>>
For micro robotic applications, piezoelectric actuators are widely used, whereas electromagnetic actuators are not favored because of the complex structures and difficult fabrication. On the other hand, electromagnetic actuators have many merits that are suitable for robotic applications, such as relatively large displacement or stroke and no need of high voltage power supply. With the recent fast development of micro precision machining techniques, the fabrication of complex structures is no longer a problem. This paper presents our recent study of developing electromagnetic actuators for micro robotic applications, including a comparison between piezoelectric and electromagnetic actuators, design of two types of electromagnetic actuators, and fabrication and testing of a moving magnet tubular linear actuator.
Zi Lu, Rui-ling Han, Pei-pei Zhang, Yi-ming Ren & Guangquan Zhang 1970, 'An intelligent evaluation system for tourism websites in Shijiazhuang city', 2008 3rd International Conference on Intelligent System and Knowledge Engineering, 2008 3rd International Conference on Intelligent System and Knowledge Engineering (ISKE 2008), IEEE, Xianeb, pp. 1404-1408.
View/Download from: Publisher's site
View description>>
This study conducts evaluate research on ten selected tourism websites of Shijiazhuang city and establishes a complete tourism website intelligence evaluation index system. This paper presents this system and analyzes its components and functions. It also presents how to apply fuzzy clustering analysis to evaluate the development of these tourism websites. The proposed evaluation system can be used for other cities tourism website evaluation and the evaluation results can be directly used for improving Shijiazhuang city tourism website development.
Zowghi, D & Cleland-Huang, J 1970, 'Transforming the Requirements Engineering Classroom Experience', 2008 16th IEEE International Requirements Engineering Conference, 2008 16th IEEE International Requirements Engineering Conference (RE), IEEE, pp. 297-297.
View/Download from: Publisher's site
View description>>
This panel presents and discusses effective techniques for teaching requirements engineering principles and practices, in ways which actively engage students in the learning process. © 2008 IEEE.