Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 47.

Add to Quick Collection   All 47 Results

Sort:
 Add All Items to Quick Collection
Authors: Kong, Yinan
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/166296
Description: In the development of a new professional course, Digital Systems Design, at the author's university, a problem based learning (PBL) approach has been used. A major component of this course is a team-b ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/166432
Description: Authorisation systems play a vital role in protecting access to resources in distributed systems. Traditionally, authorisation is performed at the user level to determine whether a user has the necess ... More
Reviewed: Reviewed
Authors: Li, Lei | Wang, Yan
Date: 2011
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/145151
Description: In Service-Oriented Computing (SOC) environments, the trustworthiness of each service provider is critical for a service client when selecting one from a large pool of service providers. The trust val ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/166552
Description: Significant developments in the recent times have led to an increasing use of mobile devices such as smart phones in accessing Internet services and applications over wireless networks. In this paper, ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/167557
Description: Today, PDF is one of the widely used applications for sharing documents. Some of the important factors for the popular use of the PDF application are due to its platform independency and rich digital ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/166500
Description: Virtualisation is one of the important technologies for the realisation of cloud computing. A Virtual Machine Monitor (VMM) is an additional software layer which has complete control on the physical r ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/166429
Description: Today most of the desktops, laptops are being shipped with the TPM and Virtualisation technology is widely being deployed. On the other hand, we are witnessing an increasing number of zero day attacks ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/120118
Description: Enabled by Service-Oriented Architecture (SOA), recently Software as a Service (SaaS) and Cloud computing are gaining momentum in the industry. An open issue is how to ensure accountability in busines ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/120117
Description: 8 page(s)
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/115030
Description: Wavelet Analysis method is considered as one of the most efficient methods for detecting DDoS attacks. However, during the peak data communication hours with a large amount of data transactions, this ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/119654
Description: In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting sever ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/120123
Description: Since Representational State Transfer (REST) architecture was proposed by Fielding in early 1990s for distributed hypermedia systems, it has become a popular architectural style of choice in various c ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/118543
Description: This paper addresses the problem of reducing cluttering in interactive maps. It presents a new technique for visualizing large spatial datasets using hierarchical aggregation. The technique creates a ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/119462
Description: The inference of gene regulatory networks (GRN) from microarrray data suffers from the low accuracy and the excessive computation time. Biological domain knowledge of the cellular process, from which ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117938
Description: As the key character of grid is the good service quality, the study of QoS (quality of services) becomes more and more important. And SLA (service level agreement) can really guarantee the QoS. Althou ... More
Full Text: Full Text
Reviewed: Reviewed