Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 76 - 90 of 158.

Add to Quick Collection   All 158 Results

Sort:
 Add All Items to Quick Collection
Date: 2011
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/159992
Description: Finding a global optimum of an unknown system has attracted a great deal of interest in many engineering problems. In this settings, meta-heuristics are very common as efficient approaches for solving ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: book
Identifier: http://hdl.handle.net/1959.14/314188
Description: 263 page(s)
Date: 2011
Language: eng
Resource Type: book
Identifier: http://hdl.handle.net/1959.14/130912
Description: Rule responder agents framework and instantiations / Harold Boley, Adrian Paschke -- Specifying and monitoring obligations in open multiagent systems using semantic web technology / Nicoletta Fornara ... More
Date: 2011
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/159123
Description: 2 page(s)
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/158900
Description: With the advent of service-oriented computing, the issue of trust and Quality of Service (QoS) have become increasingly important. In service-oriented environments, when there are a few service provid ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/159998
Description: In Online Social Networks (OSNs), participants can conduct rich activities, where trust is one of the most important factors for their decision making. This necessitates the evaluation of the trustwor ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/155929
Description: Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a ma ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/118093
Description: In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sen ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/155467
Description: In a service-oriented online social network consisting of service providers and consumers, a service consumer can search trustworthy service providers via the social network. This requires the evaluat ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148096
Description: This paper develops a model for short-term prediction of time series based on Element Oriented Analysis (EOA). The EOA model represents nonlinear changes in a time series as strata and uses these in d ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/148108
Description: With the much increased capability of data collection and storage in the past decade, data miners have to deal with much larger datasets in knowledge discovery tasks. Very large observations may cause ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/140686
Description: Security and trust are fundamental challenges when it comes to the deployment of large wireless sensor networks. In this paper, we propose a novel hierarchical trust management scheme that minimizes c ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/323549
Description: In this paper, we present an application of an Element Oriented Analysis (EOA) credit scoring model used as a classifier for assessing the bad risk records. The model building methodology we used is t ... More
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/115030
Description: Wavelet Analysis method is considered as one of the most efficient methods for detecting DDoS attacks. However, during the peak data communication hours with a large amount of data transactions, this ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/127694
Description: The experimental microarray data has the potential application in determining the underlying mechanisms of transcription regulation in a living cell. The inference of this regulation circuitry with co ... More
Reviewed: Reviewed