# Research Publications

 Search | Show all All2009 Narrow your search « 1 2 3 »Results per Page 10 25 50 100 250713 result(s) By TypeConference Paper (426)Journal Publication (160)Book Chapter (26)Technical Report (19)Other Conference Presentation (18)By YearShow all yearsBy Research GroupControl and Signal Processing (37)Machine Learning (33)Computer Vision (16)Networks (12)Optics and Nano Electronics (11)Software Systems (6)Optimisation (1) Wanzhi Qiu, Stan Skafidas, Peng HaoAd Hoc Networks - May 2009 Tania Kameneva, D. NesicNonlinear Analysis: Hybrid Systems. - May 2009 M. Bakaul, Thas Nirmalathas, C. Lim, D. Novak, R. WaterhouseOSA Journal of Optical Networking (JON). - May 2009 Craig Savage, B. La ScalaIEEE Transactions on Automatic Control. - May 2009 B-L Lim, G Kemp, BR Metcalf, TV Wrigley, KL Bennell, KM CrossleyArthritis & Rheumatism-Arthritis Care & Research - May 2009 YR Ma, Q Yang, Y. Tang, SM Chen, William ShiehOptics Express - May 2009 Georgios Katsirelos, Nina Narodytska, Toby WalshAn attractive mechanism to specify global constraints in rostering and other domains is via formal languages. For instance, the \regular and \CFG constraints specify constraints in terms of the %fixed-length languages accepted by an automaton ...The Sixth International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems - May 2009 Fang Chen, Yong SunMultimodal User Interaction technology aims at building natural and intuitive interfaces allowing a user to interact with computer in a way similar to human-to-human communication, for example, through speech and gestures. As a critical component in a ...Handbook of Research on Multimodal Human Computer Interaction and Pervasive Services: Evolutionary Techniques for Improving Accessibility - May 2009 Yean Choon Ham, Yu ShiSmart cameras are becoming more popular in human computer interaction (HCI). One of HCI research areas, multimodal user interface (MMUI) allows user to interact with a computer by using his or her natural communication modalities, such as speech, pen,...IEEE International Symposium on Consumer Electronics 2009 (ISCE'2009) - May 2009 Adam Kowalczyk, B. Beresford-Smith, Tom Conway, S. Choudhury, S. Sukumar, K. Polyak, Izhak HavivShort-SIG: Algorithms for Short Read Analysis Special Interest Group, ISMB 2009. - June 2009 Michael MaherOpen forms of global constraints allow the addition of new variables to an argument during the execution of a constraint program. Such forms are needed for difficult constraint programming problems where problem construction and problem solving are ...CPAIOR - May 2009 Model Driven Development (MDD) refers to the systematic use of models as primary engineering artefacts throughout a software development life cycle. In recently years, MDD has been increasingly employed to guide development with a focus on system ...Early Aspects at ICSE: Aspect-Oriented Requirements Engineering and Architecture Design - May 2009 M. WallaceCPAIOR 2009: The sixth international conference on Integration of AI and OR techniques in constraint programming for combinatorial optimisation problems. - May 2009 Steve Glass, Marius Portmann, Muthukkumarasamy VallipuramWireless networks are being used increasingly in industrial, health care, military and public-safety environments.In these environments security is extremely important because a successful attack against the network may pose a threat to human life. To ...IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) - May 2009 Bahman Tahayori, L.A. Johnston, Iven Mareels, Peter FarrellSIAM Conference on Applications of Dynamical Systems - May 2009 Steve Glass, Marius Portmann, Muthukkumarasamy VallipuramAPCO Project 25 (P25) is the digital communications standard that has widespread deployment amongst emergency ?rst-responders in several different countries. This paper describes the implementation of a low-cost software-defined radio receiver for APCO ...International Workshop on Advanced Topics in Mobile Computing for Emergency Management: Communication and Computing Platforms - May 2009 Brian Anderson, Peter Belhumeur, Stephen Morse, Walter Whiteley, Richard Yang, Tolga Eren, David GoldenbergThe sensor network localization problem is one of determining the Euclidean positions of all sensors in a network given knowledge of the Euclidean positions of some, and knowledge of a number of inter-sensor distances. This paper identifies graphical ...Wireless Networks - February 2009 Paul BannermanThis paper examines software architecture through the lenses of four basic organizational perspectives and identifies opportunities for research to improve the positioning, acceptance and support of the discipline within organizations. It concludes that ...International Conference on Software Engineering (ICSE): Workshop on Leadership and Management in Software Architecture (LMSA) - May 2009 Basem SuleimanThis research investigates how to provide automated analysis and decision-making support for adaptation of business processes and underlying software infrastructure, in the way that both maximizes business value metrics (e.g., profit, return on investment...ICSE 2009 - May 2009 Basem Suleiman, Vladimir TosicWe address the problems that Web service management policies are not defined during Web service design (they are usually defined later, during deployment or run-time) and that management information collected during run-time is not directly annotated ...Principles of Engineering Service Oriented Systems (PESOS) 2009 - May 2009 Franck Cassez, Jan J. Jessen, Kim G. Larsen, Jean-François Raskin, Pierre-Alain ReynierIn this paper, we show how to apply recent tools for the automatic synthesis of robust and near-optimal controllers for a real industrial case study. We show how to use three different classes of models and their supporting existing tools, TiGA ...Proc. of the 12th International Conference on Hybrid Systems: Computation and Control (HSCC'09) - April 2009 Paul BannermanSoftware development governance is a nascent field of research. Establishing how it is framed early, can significantly affect the progress of contributions. This position paper considers the nature and role of governance in organizations and in the ...International Conference on Sodftware Engineering (ICSE): Software Development Governance (SDG) Workshop - May 2009 Trinabh Gupta, Sanchit Garg, Anirban Mahanti, Niklas Carlsson, Martin ArlittIt is increasingly common for users to have accounts with multiple different social networking services. Motivated by this scenario, “social aggregation” services have been intro- duced, which aggregate the information available through various ...AAAI International Conference on Web and Social Media (ICWSM) - May 2009 Nazrina Khurshid, Paul Bannerman, Mark StaplesThis paper further examines why some software development organizations decide not to adopt CMMI by replicating an earlier Australian study in another country. The study examines data collected from the efforts of three consulting firms to sell a CMMI ...International Conference on Software Process (ICSP) - May 2009 Liming Zhu, Tu Tak Tran, Mark Staples, Ross JefferyBackground: A Technical Development Process (TDP) is a development process for a particular technology, such as XML, service orientation, object orientation or a programming language. Unlike software development life-cycle processes, TDPs provide concrete...International Conference on Software Process - May 2009 Basem SuleimanThis research investigates how to provide automated analysis and decision-making support for adaptation of business processes and underlying software infrastructure, in the way that both maximizes business value metrics (BVMs) (e.g., profit, return on ...ICSE/Doctoral Consortium - May 2009 Maria Pini, Francesca Rossi, Brent Venable, Toby WalshThe stable marriage problem is a well-known problem of matching men to women so that no man and woman who are not married to each other both prefer each other. Such a problem has a wide variety of practical applications ranging, from matching ... 8th International Conference on Autonomous Agents and Multiagent Systems - May 2009 Gerwin Klein, Ralf Huuck, Bastian SchlichThis is the editorial for the JAR special issue on Operating System Verification. - March 2009 Fuyuki Ishikawa, Basem Suleiman, Kayoko Yamamoto, Shinichi HonidenApplication software in pervasive computing is required to control devices embedded in the environment by being aware of the contexts on which eectiveness of the devices depend. Developers face diculties to enumerate involved physical prerequisites for ...The ACM International Conference on Pervasive Services - July 2009 Jeff LiThis paper proposes a cognitive and integrated communication system that can support any combination of transmission media (TM) available in a future digital home. To avoid the overhead with frequent hand-over in relation to authentication, association ...Broadband Multimedia 2009 - May 2009 Niklas Carlsson, Derek Eager, Anirban MahantiSystems delivering stored video content using a peer-assisted approach are able to serve large numbers of concurrent requests by utiliz- ing upload bandwidth from their clients to assist in delivery. In systems providing download service, ...IFIP/TC6 Networking - May 2009 Alex Stivala, A. Wirth, Peter StuckeyBMC Bioinformatics - May 2009 Eric ChengInternational Journal of Signal and Imaging Systems Engineering (IJSISE) - May 2009 Hongdong Li, Chunhua Shen - May 2009 Lars Jermiin, Joshua Ho, Kwok Wai Lau, Vivek JayaswalCompositional heterogeneity is a poorly appreciated attribute of aligned nucleotide and amino acid sequences. It is a common property of molecular phylogenetic data, and it has been found to occur across sequences and/or across sites. Most molecular ...Bioinformatics for DNA Sequence Analysis - 2009 Shuichiro Yamamoto, Komon Ibe, June Verner, Karl Cox, Steven BleisteinThe i* framework is a goal-oriented approach that addresses organizational IT requirements engineering concerns, and is considered an effective technique for analyzing dependencies between actors. However, the effectiveness and limitations of i* are ...ICEIS - April 2009 We introduce the DR-CONTRACT architecture to represent and reason on e-Contracts. The architecture extends the DR-device architecture by a deontic defeasible logic of violation. We motivate the choice for the logic and we show how to extend ...International Journal of Business Process Integration and Management - 2009 Dino Miniutti, Leif Hanlen, David Smith, Andrew Zhang, David Rodda, Ben Gilbert, Dan FangPartial proposal for the IEEE 802.15.6 PHY and MAC standard.IEEE 802.15.6 - May 2009 Nhat Vo, Bill Moran, Subhash ChallaAdvances in Neural Networks – ISNN 2009 - May 2009 Guoqiang Mao, Baris FidanEdited book on localization - May 2009 Guoqiang Mao, Baris FidanAbstract— Localization is an important aspect in the field of wireless sensor networks that has attracted significant research interest recently. The interest in wireless sensor network localization is expected to grow further with the advances in the ...Localization Algorithms and Strategies for Wireless Sensor networks - May 2009 It has been shown that isometric matching problems can be solved exactly in polynomial time, by means of a Junction Tree with small maximal clique size. Recently, an iterative algorithm was presented which converges to the same solution an order of ...Spatial Vision - May 2009 Leif HanlenWe consider secure communication for Body-Area-Networks (BAN's). We examine the near-body radio channel of BAN's as a source of common randomness between two sensors. The movement of the subject and associated fading is used to hide a secure key from ...Australian National University - April 2009 DC Ng Chee Keong2009 WEHI Student Retreat - April 2009 S. Zhang, M.M. Hossain, M.R. Hassan, James Bailey2009 SIAM International Conference on Data Mining (SDM) - April 2009 Jhoanna PedrasaWe propose a different approach to determining network availability of mobile nodes which leverages on the fact that nodes on the move will meet other nodes who will be able to share conditions of networks they have recently encountered. This paper ...MobiSys PhD Forum - June 2009 Ruopeng Lu, Shazia Sadiq, Guido Governatori, Yang XiaopingIn current dynamic business environment, it has been argued that certain characteristics of ad-hocism in business processes are desirable. Such business processes typically have a very large number of instances, where design decisions for each process ...12th International Conference on Business Information Systems - 27-29 April 2009 Marcus Hutter, R.A. ServedioThis special issue contains expanded versions of papers that appeared in preliminary form in the proceedings of the 18th International Conference on Algorithmic Learning Theory (ALT 2007), which was held in Sendai, Japan during October 1--4, 2007. ...Theoretical Computer Science - April 2009 Maria Fox, Sylvie ThiebauxArtificial Intelligence - April 2009 Paul BannermanResearching organization structures is no longer in fashion. However, a recent study uncovered gaps in our knowledge about the structure of software projects and their associated risks. This paper develops risk profiles from the literature for four common...Australian Software Engineering Conference (ASWEC 2009) - April 2009 Lili Abdullah, June VernerOrganizations are increasingly outsourcing the development of strategic IT systems to external vendors. Because of the importance of such systems to a client organization, unaddressed risks that develop into serious problems can have a huge negative ...Research Challenges in Information Science - April 2009 June Verner, Jennifer Sampson, Vladimir Tosic, Barbara Kitchenham, Nur Azzah Abu BakarWithout careful methodological guidance, case studies in software engineering are difficult to plan, design and execute. While there are a number of broad guidelines for case study research, there are none that specifically address the needs of a software...Research Challenges in Information Science - April 2009 Anirban Mahanti, Siddharth Mitra, Mayank Agarwal, Amit Yadav, Derek Eager, Niklas CarlssonA video sharing service allows user generated'' video clips to be uploaded, and users of the service to view, rate, and comment on uploaded videos. Prior work has focused mostly on the YouTube video sharing service. While YouTube is arguably the ...International World Wide Web Conference (WWW) - April 2009 Aditya Ghose, Guido Governatori, Ramakoti Sadananda - September 2009 In this paper we show how defeasible logic could formally account for the non-monotonic properties involved in motivational attitudes like intention and obligation. Usually, \emph{normal} modal operators are used to represent such attitudes ...Logic Journal of the IGPL - September 2009 Philip Kilby- Detailing the advantages of traffic control systems in providing an adaptive response to traffic demand and management - Exploring the recent developments in real-time traffic state modelling and new technology for tracking and reporting traffic ...Smart Transport - April 2009 Tet Fei Yap, Eliathamby Ambikairajah, Ho (Eric) Choi, Fang ChenCurrent automatic cognitive load measurement system uses MFCC and prosody as features. These features utilize only the magnitude part of the speech spectrum. This paper aims to improve the performance of this baseline system by introducing phase based ...IEEE International Conference on Acoustic, Speech and Signal Processing - April 2009 Bo Yin, Eliathamby Ambikairajah, Fang ChenAs a major prosodic feature, duration-based features have been explored in related areas but the existing approaches require manually annotated corpus to train the segmentation models, which may be cost and time-consuming. In this paper, a novel duration ...ICASSP - April 2009 Ansgar Fehnker, Stefan Edelkamp, Victor Schuppan, Dragan Bosnaki, Anton Wijs, Husain AljazzarThis article surveys and gives historical accounts to the algorithmic essentials of directed model checking, a promising bug-hunting technique to mitigate the state explosion problem. In the enumeration process, successor selection is prioritized. We ...MoChart 2008 - 2009 Basem Suleiman, Fuyuki IshikawaA key problem that challenges the designers of service-oriented systems is ensuring the consistency of contract parameter values in service composition. This paper utilizes constraint satisfaction approach to examine the problem at design time and by ...3rd International Workshop on Web Service Composition and Adaptation (WSCA-2009) - July 2009 (Hans) Joachim Gudmundsson, Marc van Kreveld, Giri NarasimhanClustering problems in a complex geographical setting are often required to incorporate the type and extent of land cover within a region. Given a set P of n points in a geographical setting, with the constraint that the points of P can only occur in one ...Computational Geometry - Theory & Applications - April 2009 Vidhyasaharan Sethu, Eliathamby Ambikairajah, Julien EppsSpectral and excitation features, commonly used in automatic emotion classification systems, parameterise different aspects of the speech signal. This paper groups these features as speech production cues, broad spectral measures and detailed spectral ...IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) - April 2009 MD Cao, T. Dix, Lloyd AllisonAdvances in Knowledge Discovery and Data Mining. - April 2009 Jenny Liu, Xin Liang, Liming ZhuMashup provides a way of forming new applications from existing Web content using APIs provided by different Web sites. Such a nature makes mashup a promising technology to deliver a Web-based Enterprise application with rich information of various ...Australian Software Engineering Conference (ASWEC 09) - April 2009 Laurianne SitbonSearch has a lot to do with what it is that is actually being searched. Traditionally, this has been documents, but our notion of a “document” is blurring. People are also interested today in connecting with people through social networks or discovering ...NGS09 Next Generation Search Workshop - April 2009 Laurianne Sitbon As the digital information takes more space in everyday life, users suffering from language impairments are left in a gap. It is essential that search systems take into account such impairments to help users. Language impairments vary so much from one...NGS09 Next Generation Search Workshop - April 2009 Qinfeng Shi, James Petterson, Gideon Dror, John Langford, Alex Smola, Alex Strehl, Vishy VishwanathanWe propose hashing to facilitate eﬃcient kernels. This generalizes previous work using sampling and we show a principled way to compute the kernel matrix for data streams and sparse feature spaces. Moreover, we give deviation bounds from the exact kernel ...AISTATS - 2009 Adrian Bishop, Brian Anderson, Baris Fidan, Pubudu Pathirana, Guoqiang MaoIn this paper we examine the problem of optimal bearing-only localization of a single target using synchronous measurements from multiple sensors. We approach the problem by forming geometric relationships between the measured parameters and their ...IEEE Transactions on Aerospace and Electronic Systems - January 2009 Andrew Zhang, David Smith, Leif Hanlen, Dino Miniutti, David Rodda, Ben GilbertThe stability of a dynamic narrowband on-body area channel is characterized based on real-time measurements of the time domain channel response at frequencies near the 900MHz and 2400MHz, Industrial, Scientific and Medical (ISM) bands. A new parameter,... - April 2009 Vladimir Tosic, Patrick C. K. Hung, Claudio Bartolini Management (monitoring and control) of service-oriented systems is needed to ensure their regular operation, attain guaranteed quality of service (QoS), and accommodate changes. Monitoring is used to measure technical QoS (e.g., response time, ...The 20th Australian Software Engineering Conference (ASWEC 2009) - April 2009 Jacky KeungSoftware project managers require reliable methods for estimating software project costs, and it is especially important at the early stage of software cycle. For this purpose, analogy for software cost estimation has been considered as an suitable ...Australian Software Engineering Conference - March 2009 Liam O'BrienDetermining the scope, size, cost and effort of a Service Oriented Architecture (SOA) project is important to building the business case and securing the funding for the project. Little work has been done in examining the various aspects of SOA projects ...The 20th Australian Software Engineering Conference - April 2009 Guido Governatori, Shazia SadiqIt is a typical scenario that many organisations have their business processes specified independently of their business obligations (which includes contractual obligations to business partners, as well as obligations a business has to fulfil ...Handbook of Research on Business Process Modeling - 2009 Elsa Loekito, James Bailey13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) - April 2009 Ben GilbertMatlab worksheets for the synthesis and simulation of 2nd, 3rd, and 4th order systems using passive loop filters. The method employed is derived from Dean Banerjee's Book "PLL Performance, Simulation, and Design" 4th Edition.Circuit Sage - 2009 Ben GilbertMatlab worksheets for the synthesis and simulation of 2nd, 3rd, and 4th order systems using passive loop filters. The method employed is derived from Dean Banerjee's Book "PLL Performance, Simulation, and Design" 4th Edition.Mathworks - 2009 Stefan Pohl, Alistair MoffatOverall query execution time consists of the time spent transferring data from disk to memory, and the time spent performing actual computation. In any measurement of overall time on a given hardware confi guration, the two separate costs are aggregated. ...European Conference on Information Retrieval - April 2009 Lin Luo, Andrew Zhang, Zhenning ShiQuadrature orthogonal frequency division multiple access (Q-OFDMA) systems have been recently proposed to reduce the peak-to-average power ratio (PAPR) and complexity, and improve carrier frequency offset (CFO) robustness and frequency diversity for the ... - 2009 Harvey TuchSystems code is almost universally written in the C programming language or a variant. C has a very low level of type and memory abstraction and formal reasoning about C systems code requires a memory model that is able to capture the semantics of C ...Journal of Automated Reasoning - April 2009 Ke Zhang, Marcus Hutter, Warren JinDetecting outliers which are grossly different from or inconsistent with the remaining dataset is a major challenge in real-world KDD applications. Existing outlier detection methods are ineffective on scattered real-world datasets due to implicit data ...13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) - April 2009 Alberto Piatti, Marco Zaffalon, Fabio Trojani, Marcus HutterIn this paper, we consider the coherent theory of (epistemic) uncertainty of Walley, in which beliefs are represented through sets of probability distributions, and we focus on the problem of modeling prior ignorance about a categorical random variable. ...International Journal of Approximate Reasoning - April 2009 We present two unitary space-time signal designs for two or more transmit antennas. The first design is a reparametrization of rotations applied to diagonal matrices to form unitary space-time codes. The rotations are applied as matrices similar to ... - February 2009 Dave Snowdon, Etienne Le Sueur, Stefan Petters, Gernot HeiserManaging the power consumption of computing platforms is a prohibitively complicated problem thanks to a multitude of hardware configuration options and characteristics. Much of the academic research is based on unrealistic assumptions, and has, therefore...Eurosys 2009 - April 2009 Leif Hanlen, David Smith, Daniel Lewis, Andrew ZhangWe consider secure communication for Body-Area-Networks (BAN's). We examine the near-body radio channel of BAN's as a source of common randomness between two sensors. The movement of the subject and associated fading is used to hide a secure key from ...Bodynets - April 2009 Asia Slowinska, Herbert BosThis paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tainting has been used for two main purposes: detection of ...EuroSys ’09 - 1–3, April 2009 Iman Shames, Baris Fidan, Brian AndersonThis paper considers the problem of reduction of self-localization errors in multi-agent autonomous formations when only distance measurements are available to the agents in a globally rigid formation. It is shown that there is a relationship between ... - April 2009 Asad Amir Pirzada, Marius Portmann, Ryan Wishart, Jadwiga IndulskaReliable broadband communication is becoming increasingly important during disaster recovery and emergency response operations. In situations where infrastructure-based communication is not available or has been disrupted, an Incident Area Network needs ...Pervasive and Mobile Computing, Elsevier - April 2009 Wynita Griggs, Brian Anderson, Alexander Lanzon, Michael RotkowitzSystems and Control Letters - 2009 Steffan Thiel, Ali Babar, Goetz Botterweck, Liam O'BrienProduct line approaches are well-known in many manufacturing industries, such as consumer electronics, medical systems and automotive [1]. In recent years, approaches with a similar background have rapidly emerged within Software Engineering, so ...SAE International Journal on Passenger Cars - Electronic and Electrical Systems - April 2009 Yang WangThis paper presents an approach of moving vehicle detection and cast shadow removal for video based traffic monitoring. Based on conditional random field, spatial and temporal dependencies in traffic scenes are formulated under a probabilistic ... - March 2009 In this paper, we study the giant component, the largest component containing a non-vanishing fraction of nodes, in a wireless multi-hop network where n nodes are randomly and uniformly distributed in [0; 1]d (d = 1; 2) and any two nodes can ...IEEE Wireless Communications and Networking Conference - 2009 Wireless multihop networks, in various forms, are being increasingly used in military and civilian applications. Advanced applications of wireless multihop networks demand better understanding on their properties. Existing research on wireless ...IEEE Wireless Communications and Networking Conference - 2009 SehChun Ng, Guoqiang Mao, Brian AndersonEnergy saving is an important design consideration in wireless sensor networks. In this paper, we analyze the energy savings that can be achieved in a sensor network where each sensor is capable of reducing its transmission power from a maximum power ...IEEE Wireless Communications and Networking Conference - March 2009 Nicholas Fitzroy-Dale, Ihor KuzUse of hardware-based memory protection to implement a componentised system is an effective way to enforce isolation between untrusted software components. Unfortunately this type of system design can lead to poor performance. Manual optimisation is ...IIES 2009 - March 2009 Anushiya Kannan, Baris Fidan, Guoqiang MaoErroneous local geometric realizations in some parts of the network due to their sensitivity to certain distance measurement errors is a major problem in wireless sensor network localization. This may in turn affect the localization of either the ...IEEE Wireless Communications & Networking Conference - March 2009 N. Askitis, Justin ZobelThe VLDB International Journal on Very Large Databases. - February 2009 S. Brand24th Annual ACM Symposium on Applied Computing - March 2009 Marcus Brazil, P. Grossman, D. Lee, J.H. Rubinstein, D. ThomasOrebody Modelling and Strategic Mine Planning Conference - March 2009 Tania Kameneva, , D. Nesic Automatica - March 2009 William Shieh, R. Hui, X. Yi, Graeme Pendock, IEEE TRANSACTIONS ON COMMUNICATIONS - March 2009 Y. Ma, Q. Yang, S. Tang, William ShiehOFC-NFOEC'2009 - March 2009 Q. Yang, N. Aneda, S. Chandrasekhar, William ShiehOFC-NFOEC'2009 - March 2009 S. Chen, Q. Yang, Y. Ma, William ShiehOFC-NFOEC'2009 - March 2009 Q. Yang, N. Kaneda, X. Liu, William ShiehOFC-NFOEC'2009 - March 2009 William Shiehhttp://www.ofcnfoec.org - March 2009 Q. Yang, Y. Tang, Y. Ma, William ShiehJOURNAL OF LIGHTWAVE TECHNOLOGY - March 2009 K. Lee, J.L. Riding, A.V. Tran, Rod TuckerOptical Fiber Communication Conference - National Fiber Optic Engineers Conference OFC-NFOEC'2009 - March 2009 Aditi Barthwal, Michael NorrishWe describe the mechanisation of SLR parsing, covering background properties of context-free languages and grammars, as well as the construction of an SLR automaton. Among the various properties proved about the parser we show, in particular, soundness: ...ESOP - 2009 SM Cowan, KM Crossley, Journal of Electromyography and Kinesiology - March 2009 Udo Kannengiesser, Liming ZhuThis paper develops an ontological basis for evaluating software design methods, based on the situated function-behaviour-structure (FBS) framework. This framework accounts for the situatedness of designing, viewing it as a dynamic activity driven by the ... - 2009 kirsty Kitto, Peter Bruza, Laurianne SitbonIn this third Quantum Interaction (QI) meeting it is time to examine our failures. One of the weakest elements of QI is its continuing lack of models displaying proper Schr¨odinger-type time evolution. This paper presents an overview of the modern ...International Symposum on Quantum Interactions - March 2009 In this paper, we study the giant component, the largest component containing a non-vanishing fraction of nodes, in wireless multi-hop networks in IEEE INFOCOM - 2009 Trevor Anderson, Ken Clarke, D. Beaman, Herman Ferra, M. Birk, Z. GuodongOFC/NFOEC - March 2009 Anika Schumann, Martin Sachenbacher, Jinbo HuangFifth Workshop on Model-Based Testing (MBT-09) - March 2009 James Cheney, René Vestergaard, Michael NorrishAdequacy is an important criterion for judging the correctness of formal reasoning. The issue is particularly subtle in the expansive case of approaches to languages with name-binding. We posit that adequacy of a novel representation technique is best ...2nd International Workshop on Theory and Applications of Abstraction, Substitution and Naming - March 2009 J.L. Riding, J.C. Ellershaw, A.V. Tran, L.-J. Guan, Terence SmithOptical Fiber Communication Conference - National Fiber Optic Engineers Conference OFC-NFOEC'2009 - March 2009 Sam Zhao, Yongsheng Gao, Baochang ZhangFeature extraction and classification using Gabor wavelets have proven to be successful in computer vision and pattern recognition. Gabor feature-based Elastic Bunch Graph Matching (EBGM), which demonstrated excellent performance in the FERET evaluation ...Pattern Recognition Letters (PRL) - July 2009 Csaba Veres, Jennifer Sampson, Steven Bleistein, Karl Cox, June VernerB-SCP is a promising framework addressing alignment of IT with business strategy from a requirements engineering persective. A problem with the B-SCP framework is that it is extremely difficult to track dependencies between requirements in a project ...Second International Workshop on Ontology Alignment and Visualization - OnAV'09 - March 2009 Server virtualisation is addressing tomorrow’s environmental challenges by enabling higher average server utilisation and reduced electricity consumption resulting in decreased green house emissions. In this presentation Server Oriented Performance ...ACS Annual Conference 2009 - March 2009 Guido Governatori, Antonino RotoloThe import of the notion of institution in the design of MASs requires to develop formal and efficient methods for modeling the interaction between agents' behaviour and normative systems. This paper discusses how to check whether agents' ...NorMAS 2009 - March 15-20 2009 Jadwiga Indulska, Ricky RobinsonContext modelling approaches differ in what concepts can be captured by application designers, in the expressive power of the context models, in the support they can provide for reasoning about context, and in the way they facilitate software engineering ...6th IEEE Workshop on Context Modeling and Reasoning - March 2009 Tharmarajah Thiruvaran, Mohaddeseh Nosratighods, Eliathamby Ambikairajah, Julien EppsRecently, subband frame-averaged frequency modulation (FM) as a complementary feature to amplitude-based features for several speech based classification problems including speaker recognition has shown promise. One problem with using FM extraction in ...IET Electronics Letter - March 2009 Jussi RintanenThe planning problem in Artificial Intelligence was the first application of SAT to reasoning about transition systems and a direct precursor to the use of SAT in a number of other applications including bounded model-checking in computer-aided ...Handbook of Satisfiability - March 2009 David Smith, Dino Miniutti, Leif Hanlen, Andrew Zhang, David Rodda, Ben GilbertWe present details of channel measurements around 400MHz for on-body to on-body radio communication using human subjects. The results extend previous works IEEE 802.15-08-354-01-0006IEEE 802.15.6 standard - March 2009 David Smith, Dino Miniutti, Leif Hanlen, Andrew Zhang, David Rodda, Ben GilbertPower delay profile analysis for dynamic BAN channel measurements around 2400MHz, 900MHz and 400MHzIEEE 802.15.6 standard - March 2009 Gernot HeiserWe make the case for virtual shared memory (VSM) for supporting future many-core chips. VSM is a shared memory abstraction implemented over distributed memory by a hypervisor, providing the operating system direct access to all memory in the system. VSM ...2nd Workshop on Managed Many-Core Systems (MMCS) - March 2009 Daniel HaraborReal-time strategy (RTS) games often feature a wide number unit types for the player to control. One of my favourite titles from the past, Westwood's seminal Red Alert, had many classes of differently sized units: small infantry soldiers, medium-sized ...AIGameDev.com - 03 2009 Jonathan Sprinkle, J. Mikael Eklund, Humberto Gonzalez, Esten Ingar Grotli, Ben Upcroft, Alex Makarenko, William Uther, Hugh Durrant-Whyte, S. Shankar SastryThe impact of model-based design on the software engineering community is impressive, and recent research in model transformations, and elegant behavioral specifications of systems has the potential to revolutionize the way in which systems are designed. ... - 2009 Nhat Vo, Duc Vo, Subhash Challa, Bill MoranCIDM '09 - IEEE Symposium on Computational Intelligence and Data Mining, 2009. - March 30-April 2 2009 M. Asif Khawaja, Fang Chen, Nadine MarcusIn complex and time-critical situations, system users can experience extremely high cognitive load, which can interfere with task completion. An understanding of the users’ cognitive load will enable us to alleviate these problems by implementing ...Cognitive Load Theory Conference 2009 - March 2009 PW Hodges, R. Mellor, K. Crossley, K. BennellArthritis & Rheumatism-Arthritis Care & Research - March 2009 Marcus HutterGiven i.i.d. data from an unknown distribution, we consider the problem of predicting future items. An adaptive way to estimate the probability density is to recursively subdivide the domain to an appropriate data-dependent granularity. A Bayesian would ...ARXIV - March 2009 Ben Goertzel, Pascal Hitzler, Marcus HutterThe Conference on Artificial General Intelligence is the only major conference series devoted wholly and specifically to the creation of AI systems possessing general intelligence at the human level and ultimately beyond. Its second installation, AGI-09, ...Second Conference of Artificial General Intelligence - March 2009 Marcus HutterGeneral purpose intelligent learning agents cycle through (complex,non-MDP) sequences of observations, actions, and rewards. On the other hand, reinforcement learning is well-developed for small finite state Markov Decision Processes (MDPs). So far it is ...Second Conference of Artificial General Intelligence - March 2009 Marcus HutterFeature Markov Decision Processes (PhiMDPs) are well-suited for learning agents in general environments. Nevertheless, unstructured (Phi)MDPs are limited to relatively simple environments. Structured MDPs like Dynamic Bayesian Networks (DBNs) are used for...Second Conference of Artificial General Intelligence - March 2009 Khaled Matrouk, Bjorn Landfeldt - March 2009 Variance in business process execution can be the result of several situations, such as disconnection between documented models and business operations, workarounds in spite of process execution engines, dynamic change and exception handling, flexible and... - 2009 Ta Xiaoyuan, Guoqiang Mao, Brian AndersonIEEE Communication Letters - March 2009 Kandeepan SithamparanathanA hyperbolic arctan based Digital Tanlock Loop (D-TLL) operating with complex signals at baseband or intermediate frequencies in high Doppler environments is treated here. The arctand D-PLL, known as the tanlock loop (TLL), is used in software defined ... - February 2009 Fawad Nazir, Hideaki TakedaOne of the most important questions in social networks is the identification of cohesive subgroups (a.k.a. community identification). These cohesive subgroups are loosely defined as collection of individuals who interact frequently. Once the communities ...IADIS International Conference e-Society 2009 - Feburary 2009 Peter Stuckey, Thibaut FeydyConstraints - February 2009 G. Chiu, Aaron Harwood, Peter StuckeyJournal on Satisfiability, Boolean Modeling and Computation - February 2009 Colin HalesThe Open Artificial Intelligence Journal - February 2009 Colin HalesJournal of Consciousness Studies - February 2009 Y. Gu, J. FrazerFirst International Conference on Complex Sciences: Theory and Applications 2009 - February 2009 Khusro Saleem, Byron Wicks, K. DassanayakeTelecommunication Journal of Australia - February 2009 K. Prendergast, D. Thomas, Jia WengNetworks - March 2009 M.G. Volz, Marcus Brazil, D. ThomasOrebody Modelling and Strategic Mine Planning - March 2009 Wanzhi Qiu, Stan SkafidasResearch Letters in Electronics - February 2009 W. Chen, F. Buchali, X. Yi, William ShiehIEEE Photonics Technology Letters - February 2009 C. Lim, Thas Nirmalathas, M. Bakaul, K. Lee, D. Novak, R. WaterhouseJournal of Optical Networking - February 2009 Mattthieu Gilson, M. Buerck, Anthony Burkitt, JL Van HemmenCosyne2009 - February-March 2009 Gerwin KleinThis paper gives a high-level introduction to the topic of formal, interactive, machine-checked software verification in general, and the verification of operating systems code in particular. We survey the state of the art, the advantages and ...Sadhana - February 2009 (Hans) Joachim Gudmundsson, Michiel SmidGiven a connected geometric graph G, we consider the problem of constructing a t-spanner of G having the minimum number of edges. We prove that for every real number t with 1 < t < 1/4*log n, there exists a connected geometric graph G with n vertices, ...International Journal on Foundations of Computer Science - February 2009 Eleventh Australian Symposium on Antennas - February 2009 Paul BrebnerIn this presentation we provide an overview of NICTA’s performance modelling approach, and then explore a number of alternative deployment scenarios for an example SOA application — an emissions trading system. Our modelling approach provides insights ...NICTA CRL Seminar - February 2009 Frisch Alan, Hnich Brahim, Kiziltan Zeynep, Miguel Ian, Toby Walsh - February 2009 Armin Biere, Marijn Heule, Hans van Maaren, Toby Walsh “Satisfiability (SAT) related topics have attracted researchers from various disciplines: logic, applied areas such as planning, scheduling, operations research and combinatorial optimization, but also theoretical issues on the theme of complexity and ... - February 2009 M. Asif Khawaja, Fang Chen, Nadine MarcusWe present results from two studies where users’ speech was analysed to determine their cognitive load for the task at hand. Certain speech features have been shown to change under high levels of load and are good candidates for cognitive load indices. ...Motivation and Cognition Conference 2009, University of Sydney - February 2009 Ildiko Horvath, Brian C. LovellThis study utilized the multi-instrument data of the Defense Meteorological Satellite Program to investigate the evening/nighttime topside ionosphere during the 1996/1997 southern summer. A series of regional surface maps were constructed and permitted ...Journal of Geophysical Research - Space Physics - February 2009 Brian Anderson, Ming Cao, Stephen Morse, Brian AndersonThe sensor network localization problem with distance information is to determine the positions of all sensors in a network, given the positions of some of the sensors and the distances between some pairs of sensors. A definition is given of what is ... - Feb 2009 Nicola Stokes, Yi Li, Lawrence Cavedon, Justin ZobelQuery Expansion is commonly used in Information Retrieval to overcome vocabulary mismatch issues, such as synonymy between the original query terms and a relevant document. In general, query expansion experiments exhibit mixed results. Overall TREC ...Information Retrieval - February 2009 Robert van Glabbeek, Peter D. Mosses - February 2009 Yong Sun, Yu Shi, Fang Chen, Vera ChungIn a multimodal interface, a user can use multiple modalities, such as speech, gesture, and eye gaze etc., to communicate with a system. As a critical component in a multimodal interface, multimodal input fusion explores the ways to effectively interpret ...IUI 2009 - 2 2009 Jia Weng, Iven Mareels, D. ThomasEvolution- The Experience - February 2009 Poster presented for AusCTW 2009, Non-coherent fractional sampling UWB receiverAustralian Communication Theory Workshop - February 2009 David Smith, Leif Hanlen, Andrew Zhang, Dino Miniutti, David Rodda, Ben GilbertA summary of statistical characterizations is presented of the dynamic narrowband on-body and on-body to off-body area channel at carrier frequencies near the 900 MHz and 2400 MHz Industrial, Scientific and Medical Bands. In consideration of an ...Australian Communications Theory Workshop 2009 AusCTW2009 - February 2009 Oliver Nagy, Leon Craven, Leif HanlenThis paper finds the number of essential Fourier coefficients required to synthesise an arbitrary wave field composed of plane waves from all directions. We analyse the problem in rectangular coordinates for 1D, 2D and 3D regions, and our findings ...AusCTW - February 2009 Ying Chen, Andrew Zhang, Dhammika JayalathAbstract—This paper presents an efficient low-complexity clipping noise compensation scheme for PAR reduced orthogonal frequency division multiple access (OFDMA) systems. Conventional clipping noise compensation schemes proposed for OFDM systems are ...AusCTW 2009 - Feb. 2009 Marcus HutterWalley's Imprecise Dirichlet Model (IDM) for categorical i.i.d. data extends the classical Dirichlet model to a set of priors. It overcomes several fundamental problems which other approaches to uncertainty suffer from. Yet, to be useful in practice, one ...International Journal of Approximate Reasoning - February 2009 Brad Yu, Brian Anderson, Soura Dasgupta, Baris FidanThis paper studies the problem of controlling the shape of a formation of point agents in the plane. A model is considered where the distance between certain agent pairs is maintained by one of the agents making up the pair; if enough appropriately ... - February 2009 M.R. Hassan, M.M. Hossain, James Bailey, Geoffrey John MacIntyre, Joshua Ho, Rao KotagiriBMC Bioinformatics - January 2009 Richard Hartley, Fredrik Kahl - 2009 Peter Baumgartner, Alexander Fuchs, Hans de Nivelle, Cesare TinelliRecent years have seen considerable interest in procedures for computing finite models of first-order logic specifications. One of the major paradigms, MACE-style model building, is based on reducing model search to a sequence of propositional ...Journal of Applied Logic - March 2009 Ralf Huuck, Bastian Schlich, Michael Tapp, Ansgar FehnkerMicrocontroller software typically consists of a few hundreds lines of code only, but it is rather different from standard application code. The software is highly hardware and platform specific, and bugs are often a consequence of neglecting subtle ...35th International Conference on Current Trends in Theory and Practice of Computer Science - January 2009 K. Crossley, G. Marino, M. Macilquham, A. Schache, R. HinmanScience and Medicine in Sport - January 2009 Taolue Chen, Wan Fokkink, Robert van GlabbeekWe provide a finite basis for the (in)equational theory of the process algebra BCCS modulo the weak failures preorder and equivalence. We also give positive and negative results regarding the axiomatizability of BCCS modulo weak impossible futures ...35th Conference on Current Trends in Theory and Practice of Computer Science - January 2009 Colleen B Estigoy, Fredrik Pontén, Jacob Odeberg, Benjamin Herbert , Michael Guilhaus, Michael Charleston, Joshua Ho, Darryl Cameron, Cristobal dos RemediosThe intercalated disc (ICD) occupies a central position in the transmission of force, electrical continuity and chemical communication between cardiomyocytes. Changes in its structure and composition are strongly implicated in heart failure. ICD ...Biophysical Reviews - February 2009 Pranam Janney, Glenn GeersCCTV cameras are becoming a common fixture at the roadside. Their use varies from traffic monitoring to security surveillance. In this paper a novel technique, using Invariant Features of Local Textures (IFLT) & Support Vector Machine (SVM), for ...Pacific-Rim Symposium on Image and Video Technology 2009 - January 2009 Thi Khanh Van Tran, Raymond Wong, William Cheung, Jiming LiuDue to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational database systems, numerous database engines have been ported to or built on ...20th Australasian Database Conference (ADC 2009) - January 2009 Tsong Yueh Chen, Joshua Ho, Huai Liu, Xiaoyuan XieBackground: Recent advances in experimental and computational technologies have fueled the development of many sophisticated bioinformatics programs. The correctness of such programs is crucial as incorrectly computed results may lead to wrong ...BMC Bioinformatics - January 2009 Thomas ChaeIntelligent Buildings and Smart Homes Conference 2009 (IBASH 2009) - November 2009 Asad Pirzada, Ryan Wishart, Marius Portmann, Jadwiga IndulskaHybrid Wireless Mesh Networks (WMN) are generally employed to establish communication during disaster recovery operations. The Hybrid WMN network is formed in a spontaneous manner when wireless nodes belonging to different agencies are operated in the ...Australasian Computer Science Conference (ACSC) - January 2009 Ildiko Horvath, Brian C. LovellThis study utilizes a novel technique to map the Defense Meteorological Satellite Program (DMSP) data across the two hemispheres to learn about the morphology and plasma composition of the topside ionosphere, and the underlying ionospheric dynamics. In...Journal of Geophysical Research - Space Physics - January 2009 Renato IannellaThe wider Social Network & Professional Network communities will benefit from interoperable standards for data portability, policy expression and accountability, and network migration. These standards need to be developed which addresses both the ...W3C Workshop on the Future of Social Networking - January 2009 Efficient Information retrieval is the key goal of Semantic Web. This technology ameliorates the documents with metadata in a machine readable markup. Well known semantic search engines such as swoogle1 or SHOE2 use pre-fetched static indexing for ...6th Annual IEEE Consumer Communications and Networking Conference (CCNC 2009) - January 2009 Gernot HeiserVirtualization, well established in enterprise, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology....6th Annual IEEE Consumer Communications & Networking Conference - January 2009 Renato Iannella, Karen Robinson, Patti Aymond, Rex Brooks, Gary Ham, Werner Joerg, Alessandro TriglaThis XML-based Emergency Data Exchange Language (EDXL) Resource Messaging specification describes a suite of standard messages for data sharing among emergency and other information systems that deal in requesting and providing emergency equipment, ...OASIS - Nov 2009 Bathiya Senanayake, Mark Reed, Zhenning ShiIn this paper we construct an optimal IDMA receiver where the timing for each user is asynchronous. We derive the maximum likelihood receiver for a chip asynchronous IDMA system. A super-block structure is used to formulate a band diagonal matrix model...Australian Communications Theory Workshop - February 2009 Mark Reid, Bob WilliamsonWe unify f-divergences, Bregman divergences, surrogate loss bounds (regret bounds), proper scoring rules, matching losses, cost curves, ROC-curves and information. We do this by systematically studying integral and variational representations of these ...ArXiv - 2009 Marcus HutterBackground: Some diseases, like tumors, can be related to chromosomal aberrations, leading to changes of DNA copy number. The copy number of an aberrant genome can be represented as a piecewise constant function, since it can exhibit regions of deletions ...BMC Bioinformatics - January 2009 Sandra H Dandach, Baris Fidan, Soura Dasgupta, Brian AndersonThe problem of source localization has assumed increased importance in recent years. In this paper, we formulate a continuous time adaptive localization algorithm, that permits a mobile agent to estimate the location of a stationary source, using only ... - January 2009 Marcus FothAlive with movement and excitement, cities transmit a rapid flow of exchange facilitated by a meshwork of infrastructure connections. In this environment, the Internet has advanced to become the prime communication medium, creating a vibrant and ... - January 2009 Sakrapee (Paul) Paisitkriangkrai, Chunhua Shen, Jian ZhangAccurately detecting pedestrians is the first fundamental step for many computer vision applications such as video surveil- lance, smart vehicles, intersection traffic analysis, etc. This paper presents an experimental study on pedestrian detection ... - 2009 Jeffrey Kai Chi Chan, James Bailey, Chris LeckieIOS Press - October 2009 Ildiko Horvath, Brian C. LovellA detailed study with statistical investigations was conducted on the morning topside ionosphere for the 1996/97 equinoctial period utilizing DMSP data and CTIP wind simulations. Highly structured plasma densities, including a daytime Weddell Sea Anomaly ... - accepted 2009 Asad Pirzada, Ryan Wishart, Marius Portmann, Jadwiga IndulskaHybrid Wireless Mesh Networks (WMN) are generally employed to establish communication during disaster recovery operations. The Hybrid WMN network is formed in a spontaneous manner when wireless nodes belonging to different agencies are operated in the...Australasian Computer Science Conference (ACSC) - January 2009 KM Crossley, G Marino, M Macilquham, A Schache, R HinmanJournal of Science and Medicine in Sport - January 2009 Marcus HutterGeneral-purpose, intelligent, learning agents cycle through sequences of observations, actions, and rewards that are complex, uncertain, unknown, and non-Markovian. On the other hand, reinforcement learning is well-developed for small finite state Markov ...Journal of Artificial General Intelligence - October 2009 Peter Carr, Richard HartleyWe are interested in the problem of automatically tracking football players, subject to the constraint that only one vantage point is available. Tracking algorithms benefit from seeing the entire playing field, as one does not have to worry about objects...DICTA - December 2009 Olivier Chapelle, Chuong B. Do, Quoc Le, Alex Smola, Choon Hui TeoLarge-margin structured estimation methods work by minimizing a convex upper bound of loss functions. While they allow for efficient optimization algorithms, these convex formulations are not tight and sacrifice the ability to accurately model the true...Advances in Neural Information Processing Systems 22 - September 2009 Sebastian Maneth, Sylvia Pott, Helmut SeidlTree walking transducers are an expressive formalism for reasoning about XSLT-like document transformations. One of the useful properties of tree transducers is decidability of type checking: given a transducer and input and output types, it can be ...Modern Applications of Automata Theory - 2009 Peter Carr, Richard HartleyImages captured in foggy weather conditions exhibit losses in quality which are dependent on distance. If the depth and atmospheric conditions are known, one can enhance the images (to some degree) by compensating for the effects of the fog. Recently, ...DICTA - December 2009 Peter Carr, Richard HartleyApproximate solutions to labelling problems can be found using binary graph cuts and the alpha-beta swap algorithm. In some specific cases, an exact solution can be computed by constructing a multilabel graph. However, in many practical applications ...DICTA - December 2009 Ke Jia, Nianjun Liu, lei Wang, Li ChengThis paper presents a novel discriminative approach for pave-ment scene understanding and obstacle detection in real-world images. It overcomes the heavy constraints in previous systems such as a simple background, a speci c obstacle, etc. The approach ...Aisian Conference on Computer Vision - Sept 2009 Kelvin Cheng, Masa TakatsukaLarge displays are now more widely used than ever before, yet the computer mouse remains the most common input tool for large displays users. The main drawback of the mouse is that it is only a tool for mapping hand movements to on-screen cursor movements...Human-Computer Interaction - 2009 Justin Bedo, Geoffrey John MacIntyre, Izhak Haviv, Adam KowalczykIt is typically thought that the interaction between transcription factor (TF) and DNA is mediated by the ability of the TF to recognise a canonical DNA sequence, and the chromatin structure that renders the DNA accessible to the TF. As the DNA ...ISMB - June 2009 peter bruza, kirsty kitto, brentyn ramm, Laurianne Sitbon, dawei songHumans frequently produce emergent properties or associates when com- bining concepts in new ways. This presentation will examine the manner in which concept combination can generate emergent properties suggest- ing that the process is abductive in ...Proceedings of MODEL-BASED REASONING Conference IN SCIENCE AND TECHNOLOGY - December 2009 Xiaoyuan Xie, Joshua Ho, Christian Murphy, Gail Kaiser, Baowen Xu, Tsong Yueh ChenMany applications in the field of scientific computing - such as computational biology, computational linguistics, and others - depend on Machine Learning algorithms to provide important core functionality to support solutions in the particular ...International Conference on Quality Software - August 2009 Joshua Ho, Ming-Wei Lin, Stephen Adelstein, Cristobal dos RemediosSystemic Lupus Erythematosus (SLE) is a complex autoimmune disease that has heterogeneous clinical manifestation with diverse patterns of organ involvement, autoantibody profiles and varying degrees of severity of disease. Research and clinical ...Proteomics Clinical Applications - 2009 Jack Tsai, Tim MoorsThis paper investigates combining opportunistic routing techniques with multipath routing for achieving reliability and timeliness in fast-changing network conditions. We present two approaches, WIMOP and DOMR, based on source routing and distributed ...The Sixth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness - November 2009 Mohammad Emam Hossain, Muhammad Ali Babar, Hye-Young Paik, June Verner There is growing interest in applying agile practices in Global Software Development (GSD) projects. But project stakeholder distribution in GSD creates a number of challenges that make it difficult to use some agile practices. Moreover, little is known ...APSEC 2010 - December 2009 Tim Baldwin, Manuel Paul Anil Kumar JosephThis paper explores the use of machine learning techniques to restore punctuation and case in English text, as part of which it investigates the co-dependence of case information and punctuation. We achieve an overall F-score of .619 for the task using a ...Australasian Joint Conference on Artificial Intelligence - December 2009