# Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200)"

Up a level |

- Subjects classification (42575)
- Australian and New Zealand Standard Research Classification (42575)
- INFORMATION AND COMPUTING SCIENCES (080000) (4477)
**COMPUTATION THEORY AND MATHEMATICS (080200)**(149)

- INFORMATION AND COMPUTING SCIENCES (080000) (4477)

- Australian and New Zealand Standard Research Classification (42575)

Group by: Authors/Creators | Item Type

Jump to: Journal Article | Conference Paper

Number of items at this level:

**60**.## Journal Article

Alhaqbani, Bandar S., Josang, Audun, & Fidge, Colin J.
(2009)
A medical data reliability assessment model.

*Journal of Theoretical and Applied Electronic Commerce Research*,*4*(2), pp. 64-78.
128

3

Alston, Clair & Mengersen, Kerrie
(2010)
Allowing for the effect of data binning in a Bayesian Normal mixture model.

*Computational Statistics and Data Analysis*,*54*(4), pp. 916-923.
2

1

Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Ahmed, Ejaz
(2012)
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.

*Security and Communication Networks*,*5*(2), pp. 125-144.
3

4

Bartlett, Peter L.
(2010)
Learning to act in uncertain environments : technical perspective.

*Communications of the ACM*,*53*(5), p. 98.

Bartlett, Peter L.
(2010)
Optimal online prediction in adversarial environments.

*Algorithmic Learning Theory: 21st International Conference Proceedings [Lecture Notes in Computer Science]*,*6331*, p. 34.

Burrage, Kevin, Lenane, Ian, & Lythe, Grant
(2007)
Numerical methods for second-order stochastic differential equations.

*SIAM Journal on Scientific Computing*,*29*(1), pp. 245-264.
28

23

Case, John, Kinber, Efim, Sharma, Arun, & Stephan, Frank
(2004)
On the Classification of Recursive Languages.

*Information and Computation*,*192*(1), pp. 15-40.
1

1

Case, John, Ott, Matthias, Sharma, Arun, & Stephan, Frank
(2002)
Learning to win process-control games watching game-masters.

*Information and Computation*,*174*(1), pp. 1-19.
3

3

Chen, Chang-Ming, Liu, Fawang, Turner, Ian, & Anh, Vo
(2011)
Numerical methods with fourth-order spatial accuracy for variable-order nonlinear Stokes' first problem for a heated generalized second grade fluid.

*Computers and Mathematics with Applications*,*62*(3), pp. 971-986.
13

13

Chen, Chang-ming, Liu, Fawang, Turner, Ian, & Anh, Vo
(2007)
Implicit Difference Approximation of the Galilei Invariant Fractional Advection Diffusion Equation.

*ANZIAM Journal*,*48*(Supp), pp. 775-789.

Denman, Nick, McGree, James, Eccleston, John, & Duffull, Stephen
(2011)
Design of experiments for bivariate binary responses modelled by Copula functions.

*Computational Statistics and Data Analysis*,*55*(4), pp. 1509-1520.
186

1

Dhanasekar, Manicka & Haider, W
(2008)
Explicit finite element analysis of lightly reinforced masonry shear walls.

*Computers and Structures*,*86*(1-2), pp. 15-26.
24

16

Drovandi, Christopher C. & Pettitt, Tony
(2011)
Likelihood-free Bayesian estimation of multivariate quantile distributions.

*Computational Statistics and Data Analysis*,*55*(9), pp. 2541-2556.
7

7

Gu, YuanTong
(2005)
Meshfree methods and their comparisons.

*International Journal of Computational Methods (IJCM)*,*2*(4), pp. 477-515.
41

Gupta, Gaurav & Pieprzyk, Josef
(2009)
Database relation watermarking resilient against secondary watermarking attacks.

*Lecture Notes in Computer Science : Information Systems Security*,*5905*, pp. 222-236.
2

7

How, Janice, Verhoeven, Peter, & Huang, Caro
(2005)
Information asymmetry surrounding earnings and dividend announcements: an intra-day analysis.

*Mathematics and Computers in Simulation*,*68*(5-6), pp. 463-473.
1

Ignjatovic, Aleksandar & Sharma, Arun
(2004)
Some applications of logic to feasibility in higher types.

*ACM Transactions on Computational Logic*,*5*(2), pp. 332-350.
1

Jain, Sanjay & Sharma, Arun
(2002)
Mind change complexity of learning logic programs.

*Theoretical Computer Science*,*284*(1), pp. 143-160.
8

8

Kitto, Kirsty
(2008)
High end complexity.

*International Journal of General Systems: a comprehensive periodical devoted to general systems methodology, applications and education*,*37*(6), pp. 689-714.
14

8

Leier, Andre, Burrage, Kevin, & Burrage, Pamela
(2007)
Stochastic modelling and simulation of coupled autoregulated oscillators in a multicellular environment: The her1/her7 genes.

*Lecture Notes in Computer Science*,*4487*, pp. 778-785.

Liu, Fawang & Burrage, Kevin
(2011)
Novel techniques in parameter estimation for fractional dynamical models arising from biological systems.

*Computers and Mathematics with Applications*,*62*(3), pp. 822-833.
14

13

Liu, Fawang, Shen, Shujun, Anh, Vo, & Turner, Ian
(2005)
Analysis of a discrete non-Markovian random walk approximation for the time fractional diffusion equation.

*The ANZIAM Journal*,*46*, C488-C504.
81

18

Martin, Eric, Sharma, Arun, & Stephan, Frank
(2003)
Learning power and language expressiveness.

*Theoretical Computer Science*,*298*(2), pp. 365-383.

Martin, Eric, Sharma, Arun, & Stephan, Frank
(2007)
On the data consumption benefits of accepting increased uncertainty.

*Theoretical Computer Science*,*382*(3), pp. 170-182.

Mclaren, Mitchell, Vogt, Robert, Baker, Brendan, & Sridharan, Sridha
(2010)
A comparison of session variability compensation approaches for speaker verification.

*IEEE Transactions on Information Forensics and Security*,*5*(4), pp. 802-809.
4

3

Nicolau, Jr, Dan & Burrage, Kevin
(2008)
Stochastic simulation of chemical reactions in spatially complex media.

*Computers and Mathematics with Applications*,*55*(5), pp. 1007-1018.
4

5

Rubinstein, B., Bartlett, P.L., & Rubinstein, J.
(2009)
Shifting : one-inclusion mistake bounds and sample compression.

*Journal of Computer and System Sciences*,*75*(1), pp. 37-59.
7

5

Rubinstein, Benjamin I.P., Bartlett, Peter L., & Rubinstein, J. Hyam
(2010)
Corrigendum to “Shifting : one-inclusion mistake bounds and sample compression” [J. Comput. System Sci. 75 (1) (2009) 37–59].

*Journal of Computer and System Sciences*,*76*(3-4), pp. 278-280.

Shen, Shujun, Liu, Fawang, Anh, Vo, & Turner, Ian
(2006)
Detailed analysis of a conservative difference approximation for the time fractional diffusion equation.

*Journal of Applied Mathematics and Computing*,*22*(3), pp. 1-19.
631

6

Sidje, Roger, Burrage, Kevin, & Macnamara, Shev
(2007)
Inexact uniformization method for computing transient distributions of Markov chains.

*SIAM Journal on Scientific Computing*,*29*(6), pp. 2562-2580.
21

16

Simpson, Matthew & Landman, Kerry
(2008)
Theoretical analysis and physical interpretation of temporal truncation errors in operator split algorithms.

*Mathematics and Computers in Simulation*,*77*(1), pp. 9-21.
1

2

Simpson, Matthew, Landman, Kerry, & Clement, T. Prabhakar
(2005)
Assessment of a non-traditional operator split algorithm for simulation of reactive transport.

*Mathematics and Computers in Simulation*,*70*(1), pp. 44-60.
22

20

Song, Jiangning & Burrage, Kevin
(2006)
Predicting residue-wise contact orders in proteins by support vector regression.

*BMC Bioinformatics*,*7*, pp. 1-15.
41

42

Song, Jiangning, Burrage, Kevin, Yuan, Zheng, & Huber, Thomas
(2006)
Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information.

*BMC Bioinformatics*,*7*, pp. 1-13.
52

45

Sorensen, Andrew, Swift, Ben, & Riddell, Alistair
(2014)
The many meanings of live coding.

*Computer Music Journal*,*38*(1), pp. 65-76.
14

Strickland, Christopher, Forbes, Catherine, & Martin, Gael
(2006)
Bayesian analysis of the stochastic conditional duration model.

*Computational Statistics & Data Analysis*,*50*(9), pp. 2247-2267.
17

17

Turner, Ian, Belward, John, & Oqielat, Moa'Ath
(2010)
Error bounds for least squares gradient estimates.

*SIAM Journal on Scientific Computing*,*32*(4), pp. 2146-2166.
3

3

Utting, Mark, Malik, Petra, & Toyn, Ian
(2010)
Transformation rules for Z.

*Chicago Journal of Theoretical Computer Science*, pp. 1-26.

Verbeek, Eric, Wynn, Moe, van der Aalst, Wil, & ter Hofstede, Arthur
(2009)
Reduction rules for reset/inhibitor nets.

*Journal of Computer and System Sciences*,*76*(2), pp. 125-143.
10

6

Wu, Burton, McGrory, Clare, & Pettitt, Tony
(2010)
A new variational Bayesian algorithm with application to human mobility pattern modeling.

*Statistics and Computing*,*Online*(Online), pp. 1-19.
4

Xu, Xu, Liu, Gui-Rong, Gu, YuanTong, & Zhang, Guiyong
(2010)
A conforming point interpolation method (CPIM) by shape function reconstruction for elasticity problems.

*International Journal of Computational Methods*,*7*(3), pp. 369-395.
6

6

Zheng, Tingting & Liu, Fawang
(2006)
A Petrov-Galerkin method for a singularly perturbed ordinary differential equation with non-smooth data.

*Journal of Applied Mathematics and Computing*,*22*(1-2), pp. 317-329.
90

Zhuang, Pinghui & Liu, Fawang
(2006)
Implicit difference approximation for the time fractional diffusion equation.

*Journal of Applied Mathematics and Computing*,*22*(3), pp. 87-99.
61

Zhuang, Pinghui, Liu, Fawang, Anh, Vo, & Turner, Ian
(2007)
Numerical Treatment For The Fractional Fokker-Planck Equation.

*ANZIAM Journal*,*48*(Supp), pp. 759-774.
2

Ziari, Iman, Ledwich, Gerard, Ghosh, Arindam, Cornforth, David, & Wishart, Michael
(2010)
Optimal allocation and sizing of capacitors to minimize the transmission line loss and to improve the voltage profile.

*Computers and Mathematics with Applications*,*60*(4), pp. 1003-1013.
11

12

van der Aalst, Wil, van Hee, Kees, ter Hofstede, Arthur, Sidorova, Natalia, Verbeek, H.M.W., Voorhoeve, Marc, et al.
(2010)
Soundness of workflow nets: classification, decidability, and analysis.

*Formal Aspects of Computing: applicable formal methods*,*23*(3), pp. 333-363.
70

26

## Conference Paper

Alhaqbani, Bandar S. & Fidge, Colin J.
(2009)
A time-variant medical data trustworthiness assessment model. In

*Proceedings of the 11th International Conference on e-Health Networking, Applications and Services*, 15-18 December 2009, Sydney.
146

1

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest
(2009)
A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In

*Proceedings of the 1st International ICST Conference on Sensor Systems and Software*, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa.
546

1

Anh, Vo, Liu, Fawang, & Su, Ninghu
(2002)
Simulating Seawater Intrusion in Aquifers using the Modified Fokker-Planck Equation and Boussinesq Equation Subject to Phase-Modulated Tidal Waves. In
Gulati, C, Lin, Y, Mishra, S, & Rayner, J (Eds.)

*Advances in Statistics, Combinatorics and Related Areas.*, 19-21 December 2001, University of Wollongong, New South Wales.

Chandran, Vinod
(1994)
On the computation and interpretation of auto- and cross-trispectra. In

*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing*, IEEE, Adelaide, South Australia, IV/445-IV/448.
18

Gupta, Gaurav, Pieprzyk, Josef, & Kankanhalli, Mohan
(2009)
Robust and reversible numerical set watermarking. In
Fernández-Medina, Eduardo , Malek, Manu , & Hernando , Javier (Eds.)

*Proceedings of the International Conference on Signal Processing and Multimedia Applications (SIGMAP 2009)*, INSTICC Press, Portugal , Milan, Italy, pp. 141-148.

Gupta, Gaurav & Pieprzyk, Josef
(2008)
Source code watermarking based on function dependency oriented sequencing. In
Pan, Jeng-Shyang, Niu, Xia-Mu, Huang, Hsiang-Cheh, & Jain, Lakhmi C (Eds.)

*Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '08)*, IEEE Computer Society, Harbin, China, pp. 965-968.
2

1

Islam, Mohammad Badiul, Azadi, Mollah Masum Billah, Rahman, Md. Abdur, & Hashem, M. M. A.
(2005)
Bengali handwritten character recognition using modified syntactic method. In

*Proceedings of 2nd National Conference on Computer Processing of Bangla (NCCPB-2005)*, Independent University, Bangladesh, Dhaka, Bangladesh.
1,596

Liu, Fawang, Zhuang, P., Turner, Ian, & Anh, Vo
(2006)
A fractional-order implicit difference approximation for the space-time fractional diffusion equation. In
Stacey, A., Blyth, B., & Shepherd, J. (Eds.)

*Proceedings of the 7th Biennial Engineering Mathematics and Applications Conference*, ANZIAM Journal, Melbourne, Victoria, pp. 48-68.
76

Martin, Eric, Sharma, Arun, & Stephan, Frank
(2004)
On the data consumption benefits of accepting increased uncertainty. In
Ben-David, Shai, Case, John, & Maruoka, Akira (Eds.)

*Algorithmic Learning Theory : proceedings of the 15th International Conference, ALT 2004*, Springer-Verlag, Padova, Italy, pp. 83-98.

Ong, L-L., Bailey, T., Durrant-Whyte, H., & Upcroft, B.
(2008)
Decentralised particle filtering for multiple target tracking in wireless sensor networks. In
Hanebeck, E.D. & Ulmke, M (Eds.)

*11th International Conference of Information Fusion, FUSION 2008*, Germany.
9

Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong
(2009)
Certified pseudonyms colligated with master secret key. In
Fernández-Medina, Eduardo, Malek, Manu, & Hernando, Javier (Eds.)

*Proceeding of the International Conference on Security and Cryptography (SECRYPT 2009)*, INSTICC Press, Setúbal, Milan, Italy, pp. 190-197.
47

Symonds, Michael, Bruza, Peter D., Sitbon, Laurianne, & Turner, Ian
(2011)
Modelling word meaning using efficient tensor representations. In

*Proceedings of 25th Pacific Asia Conference on Language, Information and Computation*, Nanyang Technological University, Singapore.
249

5

Utting, Mark, Malik, Petra, & Toyn, Ian
(2009)
Transformation rules for Z. In
Downey, R & Manyem, P (Eds.)

*Proceedings of the 15th Computing: The Australasian Theory Symposium*, 20 - 23 January, 2009, New Zealand.
1

Widdows, Dominic, Cohen, Trevor, & De Vine, Lance
(2012)
Real, complex, and binary semantic vectors. In

*Quantum Interaction 2012*, 27 - 29 June 2012, Paris School of Economics, Paris. (In Press)
185