Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 59.

Add to Quick Collection   All 59 Results

Sort:
 Add All Items to Quick Collection
Date: 2014
Subject Keyword: 160800 Sociology
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/351373
Description: Inequality and the redistributive impact of public policies have been central themes in Frank Stilwell's research and in his time as a public intellectual. This chapter examines inequality in Australi ... More
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/172402
Description: Passive RFID tags have limited rewritable memory for data storage and limited computation power, which pose difficulties to implement security protection on RFID tags. It has been shown that strong se ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/172380
Description: We propose a process algebra for wireless mesh networks that combines novel treatments of local broadcast, conditional unicast and data structures. In this framework, we model the Ad-hoc On-Demand Dis ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197456
Description: Virtual reality can support edutainment applications which seek to provide an engaging experience with virtual objects and spaces. However, these environments often contain scripted avatars and activi ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197553
Description: In this paper we present a visual approach for classification in data mining, based on the enhanced separation feature of a visual technique, called Hypothesis-Oriented Verification and Validation by ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197445
Description: Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197442
Description: Stakeholders demand trustworthy information systems. Trust is a subjective but strong belief in the ability of a system to perform dependably within a specified context defined by (necessarily changin ... More
Reviewed: Reviewed
Date: 2012
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197376
Description: Quality of Service (QoS) analysis and prediction for Web service compositions is an important and challenging issue in distributed computing. In existing work, QoS for service compositions is either c ... More
Reviewed: Reviewed
Authors: Schwitter, Rolf
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197418
Description: Controlled natural languages are subsets of natural languages that can be used to describe a problem in a very precise way, furthermore they can often be translated automatically into a formal notatio ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/172368
Description: This paper describes an automated, formal and rigorous analysis of the Ad hoc On-Demand Distance Vector (AODV) routing protocol, a popular protocol used in wireless mesh networks. We give a brief over ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/175059
Description: NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recen ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197573
Description: A successful execution of a Business Process (BP) is possible only if the proper coordination exists between (1) BP's execution policy, (2) BP's authorization policy, and (3) the authorization policie ... More
Reviewed: Reviewed
Authors: Schwitter, Rolf
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197565
Description: If not all temporal information is available in a text, humans usually use additional background knowledge to answer questions about the text. In this paper, we first investigate how humans answer thi ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper abstract
Identifier: http://hdl.handle.net/1959.14/168214
Description: Security and trust issues have been catapulted to the forefront with the dramatic developments in technologies such as web applications, cloud computing, mobile devices and social networking. Though t ... More
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/197421
Description: Cryptographic smartcards provide a standardized, interoperable way for multi-factor authentication. They bridge the gap between strong asymmetric authentication and short, user-friendly passwords (PIN ... More
Reviewed: Reviewed