Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 16.

Add to Quick Collection   All 16 Results

Sort:
 Add All Items to Quick Collection
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1196335
Description: With an ever-increasing trend of cybercrimes and incidents due to software vulnerabilities and exposures, effective and proactive vulnerability management becomes imperative in modern organisations re ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1217778
Description: The continued growth of the Internet has resulted in the increasing sophistication of toolkit and methods to conduct computer attacks and intrusions that are easy to use and publicly available to down ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067227
Description: The auction mechanism is an effective solution to expedite the reform of spectrum allocation in 5G networks. With the reference of the spectrum geolocation database, it can provide secondary networks ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066617
Description: Hierarchical curl- and divergence-conforming vector bases for two- and three-dimensional cells were derived and discussed in a four paper series published by Graglia, Peterson et al. in the IEEE Trans ... More
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066786
Description: We exploit the Degrees of Freedom (DoF) resulting from the deployment of multiple antennas, both at the Access Points (APs) and the clients, to address the Hidden Terminal problem in Multi User (MU) M ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067539
Description: Edge-detection methods have been an active area of research among researchers in the area of Digital Signal Processing. Some distinct methods have been recommended for edge extraction within an image. ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067627
Description: Cryptosystems, even after recent algorithmic improvements, can be vulnerable to side channel attacks (SCA). In this paper, we investigated one of the powerful class of SCA based on machine learning te ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067151
Description: A distributed antenna system (DAS) architecture is a key enabler for Cloud Radio Access Networks (CRAN) where geographically separated base stations are connected to a centralized processing and decis ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067179
Description: The target allocation problem is one of the important challenges in WSNs as sensor nodes have limited sensing and communication capabilities. In the target allocation problem, a set of targets is sele ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066807
Description: Data Center (DC), the underlying infrastructure of cloud computing, becomes startling large with more powerful computing and communication capability to satisfy the wide spectrum of composite applicat ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066813
Description: Resource capacity is often over provisioned to primarily deal with short periods of peak load. Shaping these peaks by shifting them to low utilization periods (valleys) is referred to as "resource con ... More
Reviewed: Reviewed
Authors: Ma, Jun
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/16356
Description: In this paper we formulate a new approach to medical image reconstruction from projections in emission tomography. This approach differs from traditional methods such as filtered back projection, maxi ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18323
Description: Ad-hoc routing protocols are challenging to design and the need for security services further complicates the situation. So far the proposals for routing in ad-hoc networks offer no security mechanism ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2003
Subject Keyword: 020500 Optical Physics
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1244818
Description: We demonstrate two antennas that use two different electromagnetic bandgap materials. The first is a thin, high gain resonator antenna formed from a three-dimensional electromagnetic bandgap material ... More
Reviewed: Reviewed
Date: 2003
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1245362
Description: Several probe-fed E-shaped microstrip patch antennas, which are targeted at wireless computer networks and other similar systems operating in the 5.0-6.0 GHz frequency range, are presented. The gap be ... More
Reviewed: Reviewed