Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200)"
|Up a level|
- Subjects classification (40559)
- Australian and New Zealand Standard Research Classification (40559)
- INFORMATION AND COMPUTING SCIENCES (080000) (4285)
- COMPUTATION THEORY AND MATHEMATICS (080200) (146)
- INFORMATION AND COMPUTING SCIENCES (080000) (4285)
- Australian and New Zealand Standard Research Classification (40559)
Group by: Authors/Creators | Item Type
Number of items at this level: 57.
Alhaqbani, Bandar S., Josang, Audun, & Fidge, Colin J. (2009) A medical data reliability assessment model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), pp. 64-78.
Alston, Clair & Mengersen, Kerrie (2010) Allowing for the effect of data binning in a Bayesian Normal mixture model. Computational Statistics and Data Analysis, 54(4), pp. 916-923.
Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Ahmed, Ejaz (2012) Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Security and Communication Networks, 5(2), pp. 125-144.
Bartlett, Peter L. (2010) Learning to act in uncertain environments : technical perspective. Communications of the ACM, 53(5), p. 98.
Bartlett, Peter L. (2010) Optimal online prediction in adversarial environments. Algorithmic Learning Theory: 21st International Conference Proceedings [Lecture Notes in Computer Science], 6331, p. 34.
Burrage, Kevin, Lenane, Ian, & Lythe, Grant (2007) Numerical methods for second-order stochastic differential equations. SIAM Journal on Scientific Computing, 29(1), pp. 245-264.
Case, John, Kinber, Efim, Sharma, Arun, & Stephan, Frank (2004) On the Classification of Recursive Languages. Information and Computation, 192(1), pp. 15-40.
Case, John, Ott, Matthias, Sharma, Arun, & Stephan, Frank (2002) Learning to win process-control games watching game-masters. Information and Computation, 174(1), pp. 1-19.
Chen, Chang-Ming, Liu, Fawang, Turner, Ian, & Anh, Vo (2011) Numerical methods with fourth-order spatial accuracy for variable-order nonlinear Stokes' first problem for a heated generalized second grade fluid. Computers and Mathematics with Applications, 62(3), pp. 971-986.
Chen, Chang-ming, Liu, Fawang, Turner, Ian, & Anh, Vo (2007) Implicit Difference Approximation of the Galilei Invariant Fractional Advection Diffusion Equation. ANZIAM Journal, 48(Supp), pp. 775-789.
Denman, Nick, McGree, James, Eccleston, John, & Duffull, Stephen (2011) Design of experiments for bivariate binary responses modelled by Copula functions. Computational Statistics and Data Analysis, 55(4), pp. 1509-1520.
Dhanasekar, Manicka & Haider, W (2008) Explicit finite element analysis of lightly reinforced masonry shear walls. Computers and Structures, 86(1-2), pp. 15-26.
Drovandi, Christopher C. & Pettitt, Tony (2011) Likelihood-free Bayesian estimation of multivariate quantile distributions. Computational Statistics and Data Analysis, 55(9), pp. 2541-2556.
Gu, YuanTong (2005) Meshfree methods and their comparisons. International Journal of Computational Methods (IJCM), 2(4), pp. 477-515.
Gupta, Gaurav & Pieprzyk, Josef (2009) Database relation watermarking resilient against secondary watermarking attacks. Lecture Notes in Computer Science : Information Systems Security, 5905, pp. 222-236.
How, Janice, Verhoeven, Peter, & Huang, Caro (2005) Information asymmetry surrounding earnings and dividend announcements: an intra-day analysis. Mathematics and Computers in Simulation, 68(5-6), pp. 463-473.
Ignjatovic, Aleksandar & Sharma, Arun (2004) Some applications of logic to feasibility in higher types. ACM Transactions on Computational Logic, 5(2), pp. 332-350.
Jain, Sanjay & Sharma, Arun (2002) Mind change complexity of learning logic programs. Theoretical Computer Science, 284(1), pp. 143-160.
Kitto, Kirsty (2008) High end complexity. International Journal of General Systems: a comprehensive periodical devoted to general systems methodology, applications and education, 37(6), pp. 689-714.
Leier, Andre, Burrage, Kevin, & Burrage, Pamela (2007) Stochastic modelling and simulation of coupled autoregulated oscillators in a multicellular environment: The her1/her7 genes. Lecture Notes in Computer Science, 4487, pp. 778-785.
Liu, Fawang & Burrage, Kevin (2011) Novel techniques in parameter estimation for fractional dynamical models arising from biological systems. Computers and Mathematics with Applications, 62(3), pp. 822-833.
Liu, Fawang, Shen, Shujun, Anh, Vo, & Turner, Ian (2005) Analysis of a discrete non-Markovian random walk approximation for the time fractional diffusion equation. The ANZIAM Journal, 46, C488-C504.
Martin, Eric, Sharma, Arun, & Stephan, Frank (2003) Learning power and language expressiveness. Theoretical Computer Science, 298(2), pp. 365-383.
Martin, Eric, Sharma, Arun, & Stephan, Frank (2007) On the data consumption benefits of accepting increased uncertainty. Theoretical Computer Science, 382(3), pp. 170-182.
Mclaren, Mitchell, Vogt, Robert, Baker, Brendan, & Sridharan, Sridha (2010) A comparison of session variability compensation approaches for speaker verification. IEEE Transactions on Information Forensics and Security, 5(4), pp. 802-809.
Nicolau, Dan & Burrage, Kevin (2008) Stochastic simulation of chemical reactions in spatially complex media. Computers and Mathematics with Applications, 55(5), pp. 1007-1018.
Rubinstein, B., Bartlett, P.L., & Rubinstein, J. (2009) Shifting : one-inclusion mistake bounds and sample compression. Journal of Computer and System Sciences, 75(1), pp. 37-59.
Rubinstein, Benjamin I.P., Bartlett, Peter L., & Rubinstein, J. Hyam (2010) Corrigendum to “Shifting : one-inclusion mistake bounds and sample compression” [J. Comput. System Sci. 75 (1) (2009) 37–59]. Journal of Computer and System Sciences, 76(3-4), pp. 278-280.
Shen, Shujun, Liu, Fawang, Anh, Vo, & Turner, Ian (2006) Detailed analysis of a conservative difference approximation for the time fractional diffusion equation. Journal of Applied Mathematics and Computing, 22(3), pp. 1-19.
Sidje, Roger, Burrage, Kevin, & Macnamara, Shev (2007) Inexact uniformization method for computing transient distributions of Markov chains. SIAM Journal on Scientific Computing, 29(6), pp. 2562-2580.
Simpson, Matthew & Landman, Kerry (2008) Theoretical analysis and physical interpretation of temporal truncation errors in operator split algorithms. Mathematics and Computers in Simulation, 77(1), pp. 9-21.
Simpson, Matthew, Landman, Kerry, & Clement, T. Prabhakar (2005) Assessment of a non-traditional operator split algorithm for simulation of reactive transport. Mathematics and Computers in Simulation, 70(1), pp. 44-60.
Song, Jiangning & Burrage, Kevin (2006) Predicting residue-wise contact orders in proteins by support vector regression. BMC Bioinformatics, 7, pp. 1-15.
Song, Jiangning, Burrage, Kevin, Yuan, Zheng, & Huber, Thomas (2006) Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information. BMC Bioinformatics, 7, pp. 1-13.
Strickland, Christopher, Forbes, Catherine, & Martin, Gael (2006) Bayesian analysis of the stochastic conditional duration model. Computational Statistics & Data Analysis, 50(9), pp. 2247-2267.
Turner, Ian, Belward, John, & Oqielat, Moa'Ath (2010) Error bounds for least squares gradient estimates. SIAM Journal on Scientific Computing, 32(4), pp. 2146-2166.
Utting, Mark, Malik, Petra, & Toyn, Ian (2010) Transformation rules for Z. Chicago Journal of Theoretical Computer Science, pp. 1-26.
Verbeek, Eric, Wynn, Moe, van der Aalst, Wil, & ter Hofstede, Arthur (2009) Reduction rules for reset/inhibitor nets. Journal of Computer and System Sciences, 76(2), pp. 125-143.
Wu, Burton, McGrory, Clare, & Pettitt, Tony (2010) A new variational Bayesian algorithm with application to human mobility pattern modeling. Statistics and Computing, Online(Online), pp. 1-19.
Xu, Xu, Liu, Gui-Rong, Gu, YuanTong, & Zhang, Guiyong (2010) A conforming point interpolation method (CPIM) by shape function reconstruction for elasticity problems. International Journal of Computational Methods, 7(3), pp. 369-395.
Zheng, Tingting & Liu, Fawang (2006) A Petrov-Galerkin method for a singularly perturbed ordinary differential equation with non-smooth data. Journal of Applied Mathematics and Computing, 22(1-2), pp. 317-329.
Zhuang, Pinghui & Liu, Fawang (2006) Implicit difference approximation for the time fractional diffusion equation. Journal of Applied Mathematics and Computing, 22(3), pp. 87-99.
Zhuang, Pinghui, Liu, Fawang, Anh, Vo, & Turner, Ian (2007) Numerical Treatment For The Fractional Fokker-Planck Equation. ANZIAM Journal, 48(Supp), pp. 759-774.
Ziari, Iman, Ledwich, Gerard, Ghosh, Arindam, Cornforth, David, & Wishart, Michael (2010) Optimal allocation and sizing of capacitors to minimize the transmission line loss and to improve the voltage profile. Computers and Mathematics with Applications, 60(4), pp. 1003-1013.
van der Aalst, Wil, van Hee, Kees, ter Hofstede, Arthur, Sidorova, Natalia, Verbeek, H.M.W., Voorhoeve, Marc, et al. (2010) Soundness of workflow nets: classification, decidability, and analysis. Formal Aspects of Computing: applicable formal methods, 23(3), pp. 333-363.
Alhaqbani, Bandar S. & Fidge, Colin J. (2009) A time-variant medical data trustworthiness assessment model. In Proceedings of the 11th International Conference on e-Health Networking, Applications and Services, 15-18 December 2009, Sydney. (In Press)
Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest (2009) A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa. (In Press)
Anh, Vo, Liu, Fawang, & Su, Ninghu (2002) Simulating Seawater Intrusion in Aquifers using the Modified Fokker-Planck Equation and Boussinesq Equation Subject to Phase-Modulated Tidal Waves. In Gulati, C, Lin, Y, Mishra, S, & Rayner, J (Eds.) Advances in Statistics, Combinatorics and Related Areas., 19-21 December 2001, University of Wollongong, New South Wales.
Chandran, Vinod (1994) On the computation and interpretation of auto- and cross-trispectra. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE, Adelaide, South Australia, IV/445-IV/448.
Gupta, Gaurav, Pieprzyk, Josef, & Kankanhalli, Mohan (2009) Robust and reversible numerical set watermarking. In Fernández-Medina, Eduardo, Malek, Manu, & Hernando , Javier (Eds.) Proceedings of the International Conference on Signal Processing and Multimedia Applications (SIGMAP 2009), INSTICC Press, Portugal , Milan, Italy, pp. 141-148.
Gupta , Gaurav & Pieprzyk, Josef (2008) Source code watermarking based on function dependency oriented sequencing. In Pan, Jeng-Shyang, Niu, Xia-Mu, Huang, Hsiang-Cheh, & Jain, Lakhmi C (Eds.) Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '08), IEEE Computer Society, Harbin, China, pp. 965-968.
Islam, Mohammad Badiul, Azadi, Mollah Masum Billah, Rahman, Md. Abdur, & Hashem, M. M. A. (2005) Bengali handwritten character recognition using modified syntactic method. In Proceedings of 2nd National Conference on Computer Processing of Bangla (NCCPB-2005), Independent University, Bangladesh, Dhaka, Bangladesh.
Liu, Fawang, Zhuang, P., Turner, Ian, & Anh, Vo (2006) A fractional-order implicit difference approximation for the space-time fractional diffusion equation. In Stacey, A., Blyth, B., & Shepherd, J. (Eds.) Proceedings of the 7th Biennial Engineering Mathematics and Applications Conference, ANZIAM Journal, Melbourne, Victoria, pp. 48-68.
Martin, Eric, Sharma, Arun, & Stephan, Frank (2004) On the data consumption benefits of accepting increased uncertainty. In Ben-David, Shai, Case, John, & Maruoka, Akira (Eds.) Algorithmic Learning Theory : proceedings of the 15th International Conference, ALT 2004, Springer-Verlag, Padova, Italy, pp. 83-98.
Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2009) Certified pseudonyms colligated with master secret key. In Fernández-Medina, Eduardo, Malek, Manu, & Hernando, Javier (Eds.) Proceeding of the International Conference on Security and Cryptography (SECRYPT 2009), INSTICC Press, Setúbal, Milan, Italy, pp. 190-197.
Symonds, Michael, Bruza, Peter D., Sitbon, Laurianne, & Turner, Ian (2011) Modelling word meaning using efficient tensor representations. In Proceedings of 25th Pacific Asia Conference on Language, Information and Computation, Nanyang Technological University, Singapore.
Widdows, Dominic, Cohen, Trevor, & De Vine, Lance (2012) Real, complex, and binary semantic vectors. In Quantum Interaction 2012, 27 - 29 June 2012, Paris School of Economics, Paris. (In Press)