Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 121.

Add to Quick Collection   All 121 Results

Sort:
 Add All Items to Quick Collection
Date: 2016
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1063669
Description: This paper proposes an approach for user interface (UI) generation and updating. A role-enriched business process model is developed with detailed description for tasks and associated data. The model ... More
Date: 2016
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1055821
Description: This chapter looks at how gamification of existing technology can be used to incorporate the factors that have been found to improve patient adherence. Lack of adherence to medical advice is a major p ... More
Date: 2016
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1189028
Description: Today, resource capacity is no longer an issue for running large-scale distributed systems, such as MapReduce. As a result, it is often the case that resources are provisioned, for such systems, at th ... More
Date: 2016
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1190765
Description: “Classical” proofs of secure systems are based on reducing the hardness of one problem (defined by the protocol) to that of another (a known difficult computational problem). In standard program devel ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1051779
Description: In this paper, a whole identification system is introduced for finger vein recognition. The proposed algorithm first maps the input data into kernel space, then; two-dimensional principal component an ... More
Authors: Schwitter, Rolf
Date: 2015
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1057532
Description: 15 page(s)
Date: 2015
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1051784
Description: Kernel functions have been very useful in data classification for the purpose of identification and verification so far. Applying such mappings first and using some methods on the mapped data such as ... More
Authors: Schwitter, Rolf
Date: 2015
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1057575
Description: Defaults are statements in natural language that generalise over a particular kind of objects or over what a particular kind of objects does. Defaults are very useful in human communication since we o ... More
Date: 2015
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1057730
Description: Increasing interest in Collaborative Virtual Environments (CVEs) in different applications has imposed new requirements on the design of the CVEs and the resident Intelligent Virtual Agents (IVAs). In ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1258229
Description: The nature of distributed computation has long been a topic of interest in complex systems science, physics, artificial life and bioinformatics. In particular, emergent complex behavior has often been ... More
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/331490
Description: In recent times, there has been an increasing development of storing data securely in the cloud. The Role-based access control (RBAC) model, a widely used access control model, can provide a flexible ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1089283
Description: With the rapid increase in the amount of digital information that needs to be stored, cloud storage has attracted much attention in recent times because of its ability to deliver resources for storage ... More
Authors: Steinfeld, Ron
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1259019
Description: The NTRU public-key cryptosystem, proposed in 1996 by Hoffstein, Pipher, and Silverman, is a fast and practical alternative to classical schemes based on factorization or discrete logarithms. In contr ... More
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1258265
Description: Self-organisation is pervasive: neuronal ensembles self-organise into complex spatio-temporal spike patterns which facilitate synaptic plasticity and long-term consolidation of information; large-scal ... More
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1203725
Description: 14 page(s)