Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 115.

Add to Quick Collection   All 115 Results

Sort:
 Add All Items to Quick Collection
Date: 2014
Subject Keyword: 080300 Computer Software
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/303620
Description: The observable output of a probabilistic system that processes a secret input might reveal some information about that input. The system can be modelled as an information-theoretic channel that specif ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/336156
Description: In this paper, we propose a new advanced malware that distributes its features to multiple software components in order to bypass various security policies such as application whitelisting and securit ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1044070
Description: Wireless Sensor Networks (WSNs) are useful for a wide range of applications, from different domains. Recently, new features and design trends have emerged in the WSN field, making those networks appea ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/329765
Description: This paper proposes a novel model for evaluating cloud users' credibility of providing subjective assessment or objective assessment for cloud services. In contrast to prior studies, cloud users in ou ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1045650
Description: We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. We show that, given a desired degree of geo-indistinguishability, it is possible to co ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1044052
Description: Large-scale Bag-of-Tasks (BoT) applications are characterized by their massively parallel, yet independent operations. The use of resources in public clouds to dynamically expand the capacity of a pri ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1044059
Description: Using the virtually unlimited resource capacity of public cloud, dynamic scaling out of large-scale applications is facilitated. A critical question arises practically here is how to run such applicat ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/329842
Description: Online social networks have been widely used for a large number of activities in recent years. Utilizing social network information to infer or predict trust among people to recommend services from tr ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/336167
Description: Today, healthcare service providers are increasingly making use of the cloud for hosting their services. Although such services are regulated by policies such as HIPAA and healthcare service providers ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/270042
Description: Attribute grammars are a powerful specification paradigm for many language processing tasks, particularly semantic analysis of programming languages. Recent attribute grammar systems use dynamic sched ... More
Reviewed: Reviewed
Date: 2013
Subject Keyword: 080300 Computer Software
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/213192
Description: Domain-specific languages are often implemented by embedding them in general-purpose programming languages. The Kiama library used in this chapter for the Scala programming language contains a rewriti ... More
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/285720
Description: The purpose of email spam is to advertise to sell, phishing attacks, DDOS attacks and many more. Many solutions of various kinds such as blacklisting, whitelisting, grey-listing, content filtering hav ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/262217
Description: Prinsys (pronounced "princess") is a new software-tool for probabilistic invariant synthesis. In this paper we discuss its implementation and improvements of the methodology which was set out in previ ... More
Reviewed: Reviewed
Date: 2013
Subject Keyword: 080300 Computer Software
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/217819
Description: Attribute grammars enable complex algorithms to be defined on tree and graph structures by declarative equations. An understanding of how the equations cooperate is necessary to gain a proper understa ... More
Reviewed: Reviewed
Date: 2012
Subject Keyword: 080300 Computer Software
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/199571
Description: This paper proposes a simple operational semanticsof pGCL, Dijkstra's guarded command language extended withprobabilistic choice, and relates this to pGCL's wp-semantics byMcIver and Morgan. Parameter ... More
Reviewed: Reviewed