# Research Publications

 Search | Show all AllTechnical Report Narrow your search « 1 2 »Results per Page 10 25 50 100 25089 result(s) By TypeShow all typesBy Year2013 (5)2012 (16)2011 (13)2010 (10)2009 (19)By Research GroupSoftware Systems (18)Networks (18)Machine Learning (3)Computer Vision (2)Optimisation (1)Control and Signal Processing (1) Franck Cassez, JÃ©rÃ©my Dubreil, HervÃ© MarchandIn this paper, we address the problem of synthesizing \emph{opaque} systems. A secret predicate $S$ over the runs of a system $G$ is \emph{opaque} to an external user having partial observability over $G$, if s/he can never infer from the ...IRISA - May 2009 Joel Veness, Kee Siong Ng, Marcus Hutter, David SilverThis paper describes a computationally feasible approximation to the AIXI agent, a universal reinforcement learning agent for arbitrary environments. AIXI is scaled down in two key ways: First, the class of environment models is restricted to all ...arXiv - September 2009 Kelvin Cheng, Benjamin Itzstein, Paul Sztajer, Markus Rittenbruch... of this architecture on the Linux Operating System, demonstrating the possibility of using touch displays in a collaborative work environment on the tabletop. The paper concludes with lessons learnt and technical challenges from our experience.Tabletops and Interactive Surfaces 2009 - September 2009 Wray BuntineThis report is the background theory for Discrete Component Analysis software called DCA. Currently the software is run in stand-alone mode, and scavengers data streaming libraries and Dirichlet utilities from the older MPCA system1. The software itself ...NICTA - July 2009 Wray BuntineThis report is the software development and installation guide for the Discrete Component Analysis (DCA) software for Version 0.200. It includes a description of input and output files, the C code base, prerequisites and installation, and a guide to ...NICTA - July 2009 Wray BuntineThis report is a user guide for the Discrete Component Analysis (DCA) software in development, Version 0.200. It shows how to use the software, and should be read in conjunction with the worked examples in the examples/ directory.NICTA - July 2009 Wray BuntineTopic models are a discrete analogue to principle component analysis and independent component analysis that model topic at the word level within a document. They have many variants such as NMF, PLSI and LDA, and are used in many fields such as genetics...NICTA - July 2009 With the mobile communication market increasingly moving towards value-added services the network cost will need to be included in the service offering itself. This will lead service providers to optimize network usage based on real cost rather than the ...NICTA - 2009 Christoph Dwertmann, Mesut Erdin, Guillaume Jourjon, Max Ott, Thierry Rakotoarivelo, Ivan SeskarWe propose to showcase the experiment facility control, management & measurement framework (OMF) with an experiment demonstrating a common investigative life cycle. The demo scenario will highlight the steps from the idea, to simulations, and finally ...NICTA - 2009 Ben GilbertMatlab worksheets for the synthesis and simulation of 2nd, 3rd, and 4th order systems using passive loop filters. The method employed is derived from Dean Banerjee's Book "PLL Performance, Simulation, and Design" 4th Edition.Circuit Sage - 2009 Ben GilbertMatlab worksheets for the synthesis and simulation of 2nd, 3rd, and 4th order systems using passive loop filters. The method employed is derived from Dean Banerjee's Book "PLL Performance, Simulation, and Design" 4th Edition.Mathworks - 2009 Mark Reid, Bob WilliamsonWe unify f-divergences, Bregman divergences, surrogate loss bounds (regret bounds), proper scoring rules, matching losses, cost curves, ROC-curves and information. We do this by systematically studying integral and variational representations of these ...ArXiv - 2009 Renato IannellaThe Emergency Warning System Framework (EWSF) describes and captures the interoperation of agencies and delivery channels that provides the functions for the national emergency warning framework. The EWSF is composed of three key functions; Message ... Tet Fei YapCognitive load refers to the amount of mental stress experienced while performing a task. The cognitive load measurement (CLM) system is a novel invention which automatically measures the mental workload of users in real time. Using the information ...University of New South Wales - November 2008 David SmithContained in this report is some results of electromagnetic simulation using the male human body phantom provided by SPEAG to be used in SEMCAD X [1], proprietary electromagnetic modelling software, and an approximate uniform body and head which has been ...NICTA - April 2008 Jenny Liu, Jacky Kueng, Liming Zhu, Kate Foster, Thong Nguyen...attributes to produce a final rigorous evaluation summary. This report presents a new method for trade-off analysis at fine grained levels of the middleware architecture. This report encompasses the research work that addresses above two challenges....NICTA - June 2008 Ralph Becket, S Brand, Mark Brown, Gregory Duck, Thibaut Feydy, J Fischer, J. Huang, Kim Marriott, N Nethercote, Jakob Puchinger, R Rafeh, Peter Stuckey, M WallaceModRef'08: 7th International Workshop on Constraint Modelling and Reformulation - September 2008 Sherif SakrThis paper presents an extensive experimental study of the state-of-the-art of XML compression tools. The study reports the behavior of nine XML compressors using a large corpus of XML documents which covers the different natures and scales of XML ...VLDB - August 2008 Gia Hieu Dinh, Jenny LiuCurrently, enhancing the interoperability of Web 2.0 Technologies over mobile devices remains a challenge to software engineering. Resource limitation of mobile devices and non-adaptability of web server application has restricted the interaction ...NICTA - 2008 Liming Zhu, Thong Nguyen, Tan Dao, Jenny Liu... DSTO, which is responsible for technically evaluating ADF acquisitions, is considering ... evaluation activities. In a separate report, we critically reviewed the state-of-the-art ... assessment and mitigation. In this report, we propose some improvements over ...DSTO - 2008 Liming Zhu, Thong Nguyen, Tan Doan , Jenny Liu... and acquisition as well. DSTO, which is responsible for technically evaluating ADF acquisitions, is considering integrating MDD into their evaluation activities. This report critically reviews the state-of-the-art of MDD in the ...DSTO - 2008 Leif HanlenWe outline progress toward building a predictor of workload based on instantaneous acceleration in 3-dimensions and synchronised heart-rate. Rating of Perceived Exertion (RPE) is used as a proxy measure of workload. We conclude that the range of ...NICTA - 2008 David SmithContained in this report is some results of electromagnetic simulation using the male human body phantom provided by SPEAG to be used in SEMCAD X [1], proprietary electromagnetic modelling software, and an approximate uniform body and head which has been ...NICTA - 2008 Lixiang Xiong, Lavy Libman, Guoqiang MaoDespite the considerable research literature on cooperative diversity in the physical layer in recent years, related concepts at higher layers have not received nearly as much attention. This paper focuses on cooperative retransmission at the MAC layer, ... - 2008 Andrew Zhang...frequency. With the emerging need of localization in sports, new localization techniques and sys- tems are desired. In this report, we will have an overview of current localization techniques and systems, focusing on those with application potential in ...NICTA - March 2008 Timothy Bourke, Arcot SowmyaTrace inclusion against a deterministic Timed Automata can be verified with the Uppaal model checking tool by constructing a test automaton that traps illegal synchronisation possibilities. Constructing the automaton manually is tedious and error ...Uni. of NSW, Computer Science and Engineering - December 2007 Michael Norrish...). The formal model was developed in the HOL theorem-prover, providing additional guarantees as to its good sense. This report presents and explains extracts from the mechanised source-code that was fed to HOL. This work was performed under funding ...NICTA - 2008 Renato Iannella... and provide an accountable, enforceable, flexible and trusted experience for the web community. This paper looks at the technical issues in moving towards a common policy framework and model that both encapsulates the many vertical interests and provides ...NICTA - 2007 Dhammika Elkaduwe, Gerwin Klein, Kevin ElphinstoneThis paper presents a machine-checked high-level security analysis of seL4 â€” an evolution of the L4 kernel series targeted to secure, embedded devices. We provide an abstract specification of the seL4 access control system in terms of a classical ...NICTA - 2007 Kevin Elphinstone, Scott Brandt Proceedings of the 2007 Workshop on Operating System Platforms for Embedded Real-Time Applications Technical Report , NICTA, July, 2007 Editors: Scott Brandt and Kevin Elphinstone NICTA - July 2007 C. Liu, Stan Skafidas, T. Pollock, Rob Evans, Dino MiniuttiIEEE Standards 802.15-06-0222-00-003c - May 2006 T. Pollock, Z. Krusevac, Gupta, Dino Miniutti, C. Liu, Stan SkafidasIEEE Standards - May 2006 Paul BannermanExecutive Summary NSW Government agencies have a proud tradition in effective ICT adoption, which is supported by the projects in this study. However, while we are getting better at managing projects, outcomes can be improved through better risk ...NSW Department of Commerce (on behalf of NSW Government) - January 2006 D. Veitch, M. Sridhar, F. Baccelli, J. Bolot - November 2005 Paul Malcolm, Wray Buntine... into the collected text, which is often voluminous and complex in form. Additional investigations described in this report concern questions of identifying and quantifying differences between stake-holder group text written to a common subject matter. ...DSTO Todayâ€™s mobile devices are increasingly containing multiple radios, enabling users on the move to take advantage of the heterogeneous wireless network environment. In addition, we observe that many bandwidth intensive services such as podcasts, ...NICTA - March 2010 Kanchana Thilakarathna, Lars (Henrik) Petander, Aruna SeneviratneAn increasing portion of traffic in mobile networks comes from users creating content and uploading it to the Internet to share it. The capacity of mobile networks is a limited resource and uploading high resolution content consumes a large part of it. We...NICTA We propose a process algebra for wireless mesh networks that combines novel treatments of local broadcast, conditional unicast and data structures. In this framework, we model the Ad-hoc On-Demand Distance Vector (AODV) routing protocol. We give a ...NICTA Silvano Colombo-Tosatto, Guido Governatori, Pierre Kelsen, Leendert van der TorreIn the present paper we analyze the complexity of a fragment of the compliance checking problem. Although the fragment studied leaves out many feature of the original problem, like compensations and non-structured processes, we prove that the complexity ...Artificial Intelligence