# Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200)"

Up a level |

- Subjects classification (40559)
- Australian and New Zealand Standard Research Classification (40559)
- INFORMATION AND COMPUTING SCIENCES (080000) (4285)
**COMPUTATION THEORY AND MATHEMATICS (080200)**(146)

- INFORMATION AND COMPUTING SCIENCES (080000) (4285)

- Australian and New Zealand Standard Research Classification (40559)

Group by: Authors/Creators | Item Type

Jump to: Journal Article | Conference Paper

Number of items at this level:

**57**.## Journal Article

Alhaqbani, Bandar S., Josang, Audun, & Fidge, Colin J. (2009) A medical data reliability assessment model.

*Journal of Theoretical and Applied Electronic Commerce Research*,*4*(2), pp. 64-78. 122

3

Alston, Clair & Mengersen, Kerrie (2010) Allowing for the effect of data binning in a Bayesian Normal mixture model.

*Computational Statistics and Data Analysis*,*54*(4), pp. 916-923. 1

1

Alzaid, Hani, Foo, Ernest, Gonzalez Nieto, Juan, & Ahmed, Ejaz (2012) Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.

*Security and Communication Networks*,*5*(2), pp. 125-144. 3

3

Bartlett, Peter L. (2010) Learning to act in uncertain environments : technical perspective.

*Communications of the ACM*,*53*(5), p. 98.Bartlett, Peter L. (2010) Optimal online prediction in adversarial environments.

*Algorithmic Learning Theory: 21st International Conference Proceedings [Lecture Notes in Computer Science]*,*6331*, p. 34.Burrage, Kevin, Lenane, Ian, & Lythe, Grant (2007) Numerical methods for second-order stochastic differential equations.

*SIAM Journal on Scientific Computing*,*29*(1), pp. 245-264. 24

20

Case, John, Kinber, Efim, Sharma, Arun, & Stephan, Frank (2004) On the Classification of Recursive Languages.

*Information and Computation*,*192*(1), pp. 15-40. 1

1

Case, John, Ott, Matthias, Sharma, Arun, & Stephan, Frank (2002) Learning to win process-control games watching game-masters.

*Information and Computation*,*174*(1), pp. 1-19. 3

3

Chen, Chang-Ming, Liu, Fawang, Turner, Ian, & Anh, Vo (2011) Numerical methods with fourth-order spatial accuracy for variable-order nonlinear Stokes' first problem for a heated generalized second grade fluid.

*Computers and Mathematics with Applications*,*62*(3), pp. 971-986. 9

8

Chen, Chang-ming, Liu, Fawang, Turner, Ian, & Anh, Vo (2007) Implicit Difference Approximation of the Galilei Invariant Fractional Advection Diffusion Equation.

*ANZIAM Journal*,*48*(Supp), pp. 775-789.Denman, Nick, McGree, James, Eccleston, John, & Duffull, Stephen (2011) Design of experiments for bivariate binary responses modelled by Copula functions.

*Computational Statistics and Data Analysis*,*55*(4), pp. 1509-1520. 170

Dhanasekar, Manicka & Haider, W (2008) Explicit finite element analysis of lightly reinforced masonry shear walls.

*Computers and Structures*,*86*(1-2), pp. 15-26. 23

14

Drovandi, Christopher C. & Pettitt, Tony (2011) Likelihood-free Bayesian estimation of multivariate quantile distributions.

*Computational Statistics and Data Analysis*,*55*(9), pp. 2541-2556. 5

4

Gu, YuanTong (2005) Meshfree methods and their comparisons.

*International Journal of Computational Methods (IJCM)*,*2*(4), pp. 477-515. 38

Gupta, Gaurav & Pieprzyk, Josef (2009) Database relation watermarking resilient against secondary watermarking attacks.

*Lecture Notes in Computer Science : Information Systems Security*,*5905*, pp. 222-236. 1

6

How, Janice, Verhoeven, Peter, & Huang, Caro (2005) Information asymmetry surrounding earnings and dividend announcements: an intra-day analysis.

*Mathematics and Computers in Simulation*,*68*(5-6), pp. 463-473. 1

Ignjatovic, Aleksandar & Sharma, Arun (2004) Some applications of logic to feasibility in higher types.

*ACM Transactions on Computational Logic*,*5*(2), pp. 332-350. 1

Jain, Sanjay & Sharma, Arun (2002) Mind change complexity of learning logic programs.

*Theoretical Computer Science*,*284*(1), pp. 143-160. 8

8

Kitto, Kirsty (2008) High end complexity.

*International Journal of General Systems: a comprehensive periodical devoted to general systems methodology, applications and education*,*37*(6), pp. 689-714. 13

8

Leier, Andre, Burrage, Kevin, & Burrage, Pamela (2007) Stochastic modelling and simulation of coupled autoregulated oscillators in a multicellular environment: The her1/her7 genes.

*Lecture Notes in Computer Science*,*4487*, pp. 778-785.Liu, Fawang & Burrage, Kevin (2011) Novel techniques in parameter estimation for fractional dynamical models arising from biological systems.

*Computers and Mathematics with Applications*,*62*(3), pp. 822-833. 14

13

Liu, Fawang, Shen, Shujun, Anh, Vo, & Turner, Ian (2005) Analysis of a discrete non-Markovian random walk approximation for the time fractional diffusion equation.

*The ANZIAM Journal*,*46*, C488-C504. 71

18

Martin, Eric, Sharma, Arun, & Stephan, Frank (2003) Learning power and language expressiveness.

*Theoretical Computer Science*,*298*(2), pp. 365-383.Martin, Eric, Sharma, Arun, & Stephan, Frank (2007) On the data consumption benefits of accepting increased uncertainty.

*Theoretical Computer Science*,*382*(3), pp. 170-182.Mclaren, Mitchell, Vogt, Robert, Baker, Brendan, & Sridharan, Sridha (2010) A comparison of session variability compensation approaches for speaker verification.

*IEEE Transactions on Information Forensics and Security*,*5*(4), pp. 802-809. 3

2

Nicolau, Dan & Burrage, Kevin (2008) Stochastic simulation of chemical reactions in spatially complex media.

*Computers and Mathematics with Applications*,*55*(5), pp. 1007-1018. 4

5

Rubinstein, B., Bartlett, P.L., & Rubinstein, J. (2009) Shifting : one-inclusion mistake bounds and sample compression.

*Journal of Computer and System Sciences*,*75*(1), pp. 37-59. 5

3

Rubinstein, Benjamin I.P., Bartlett, Peter L., & Rubinstein, J. Hyam (2010) Corrigendum to “Shifting : one-inclusion mistake bounds and sample compression” [J. Comput. System Sci. 75 (1) (2009) 37–59].

*Journal of Computer and System Sciences*,*76*(3-4), pp. 278-280.Shen, Shujun, Liu, Fawang, Anh, Vo, & Turner, Ian (2006) Detailed analysis of a conservative difference approximation for the time fractional diffusion equation.

*Journal of Applied Mathematics and Computing*,*22*(3), pp. 1-19. 612

6

Sidje, Roger, Burrage, Kevin, & Macnamara, Shev (2007) Inexact uniformization method for computing transient distributions of Markov chains.

*SIAM Journal on Scientific Computing*,*29*(6), pp. 2562-2580. 20

15

Simpson, Matthew & Landman, Kerry (2008) Theoretical analysis and physical interpretation of temporal truncation errors in operator split algorithms.

*Mathematics and Computers in Simulation*,*77*(1), pp. 9-21. 1

2

Simpson, Matthew, Landman, Kerry, & Clement, T. Prabhakar (2005) Assessment of a non-traditional operator split algorithm for simulation of reactive transport.

*Mathematics and Computers in Simulation*,*70*(1), pp. 44-60. 21

20

Song, Jiangning & Burrage, Kevin (2006) Predicting residue-wise contact orders in proteins by support vector regression.

*BMC Bioinformatics*,*7*, pp. 1-15. 40

40

Song, Jiangning, Burrage, Kevin, Yuan, Zheng, & Huber, Thomas (2006) Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information.

*BMC Bioinformatics*,*7*, pp. 1-13. 51

44

Strickland, Christopher, Forbes, Catherine, & Martin, Gael (2006) Bayesian analysis of the stochastic conditional duration model.

*Computational Statistics & Data Analysis*,*50*(9), pp. 2247-2267. 16

16

Turner, Ian, Belward, John, & Oqielat, Moa'Ath (2010) Error bounds for least squares gradient estimates.

*SIAM Journal on Scientific Computing*,*32*(4), pp. 2146-2166. 2

2

Utting, Mark, Malik, Petra, & Toyn, Ian (2010) Transformation rules for Z.

*Chicago Journal of Theoretical Computer Science*, pp. 1-26.Verbeek, Eric, Wynn, Moe, van der Aalst, Wil, & ter Hofstede, Arthur (2009) Reduction rules for reset/inhibitor nets.

*Journal of Computer and System Sciences*,*76*(2), pp. 125-143. 9

4

Wu, Burton, McGrory, Clare, & Pettitt, Tony (2010) A new variational Bayesian algorithm with application to human mobility pattern modeling.

*Statistics and Computing*,*Online*(Online), pp. 1-19. 4

Xu, Xu, Liu, Gui-Rong, Gu, YuanTong, & Zhang, Guiyong (2010) A conforming point interpolation method (CPIM) by shape function reconstruction for elasticity problems.

*International Journal of Computational Methods*,*7*(3), pp. 369-395. 6

6

Zheng, Tingting & Liu, Fawang (2006) A Petrov-Galerkin method for a singularly perturbed ordinary differential equation with non-smooth data.

*Journal of Applied Mathematics and Computing*,*22*(1-2), pp. 317-329. 81

Zhuang, Pinghui & Liu, Fawang (2006) Implicit difference approximation for the time fractional diffusion equation.

*Journal of Applied Mathematics and Computing*,*22*(3), pp. 87-99. 52

Zhuang, Pinghui, Liu, Fawang, Anh, Vo, & Turner, Ian (2007) Numerical Treatment For The Fractional Fokker-Planck Equation.

*ANZIAM Journal*,*48*(Supp), pp. 759-774.Ziari, Iman, Ledwich, Gerard, Ghosh, Arindam, Cornforth, David, & Wishart, Michael (2010) Optimal allocation and sizing of capacitors to minimize the transmission line loss and to improve the voltage profile.

*Computers and Mathematics with Applications*,*60*(4), pp. 1003-1013. 11

11

van der Aalst, Wil, van Hee, Kees, ter Hofstede, Arthur, Sidorova, Natalia, Verbeek, H.M.W., Voorhoeve, Marc, et al. (2010) Soundness of workflow nets: classification, decidability, and analysis.

*Formal Aspects of Computing: applicable formal methods*,*23*(3), pp. 333-363. 57

19

## Conference Paper

Alhaqbani, Bandar S. & Fidge, Colin J. (2009) A time-variant medical data trustworthiness assessment model. In

*Proceedings of the 11th International Conference on e-Health Networking, Applications and Services*, 15-18 December 2009, Sydney. (In Press) 137

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest (2009) A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In

*Proceedings of the 1st International ICST Conference on Sensor Systems and Software*, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa. (In Press) 509

1

Anh, Vo, Liu, Fawang, & Su, Ninghu (2002) Simulating Seawater Intrusion in Aquifers using the Modified Fokker-Planck Equation and Boussinesq Equation Subject to Phase-Modulated Tidal Waves. In Gulati, C, Lin, Y, Mishra, S, & Rayner, J (Eds.)

*Advances in Statistics, Combinatorics and Related Areas.*, 19-21 December 2001, University of Wollongong, New South Wales.Chandran, Vinod (1994) On the computation and interpretation of auto- and cross-trispectra. In

*Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing*, IEEE, Adelaide, South Australia, IV/445-IV/448. 13

Gupta, Gaurav, Pieprzyk, Josef, & Kankanhalli, Mohan (2009) Robust and reversible numerical set watermarking. In Fernández-Medina, Eduardo, Malek, Manu, & Hernando , Javier (Eds.)

*Proceedings of the International Conference on Signal Processing and Multimedia Applications (SIGMAP 2009)*, INSTICC Press, Portugal , Milan, Italy, pp. 141-148.Gupta , Gaurav & Pieprzyk, Josef (2008) Source code watermarking based on function dependency oriented sequencing. In Pan, Jeng-Shyang, Niu, Xia-Mu, Huang, Hsiang-Cheh, & Jain, Lakhmi C (Eds.)

*Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '08)*, IEEE Computer Society, Harbin, China, pp. 965-968. 2

1

Islam, Mohammad Badiul, Azadi, Mollah Masum Billah, Rahman, Md. Abdur, & Hashem, M. M. A. (2005) Bengali handwritten character recognition using modified syntactic method. In

*Proceedings of 2nd National Conference on Computer Processing of Bangla (NCCPB-2005)*, Independent University, Bangladesh, Dhaka, Bangladesh. 1,458

Liu, Fawang, Zhuang, P., Turner, Ian, & Anh, Vo (2006) A fractional-order implicit difference approximation for the space-time fractional diffusion equation. In Stacey, A., Blyth, B., & Shepherd, J. (Eds.)

*Proceedings of the 7th Biennial Engineering Mathematics and Applications Conference*, ANZIAM Journal, Melbourne, Victoria, pp. 48-68. 64

Martin, Eric, Sharma, Arun, & Stephan, Frank (2004) On the data consumption benefits of accepting increased uncertainty. In Ben-David, Shai, Case, John, & Maruoka, Akira (Eds.)

*Algorithmic Learning Theory : proceedings of the 15th International Conference, ALT 2004*, Springer-Verlag, Padova, Italy, pp. 83-98.Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong (2009) Certified pseudonyms colligated with master secret key. In Fernández-Medina, Eduardo, Malek, Manu, & Hernando, Javier (Eds.)

*Proceeding of the International Conference on Security and Cryptography (SECRYPT 2009)*, INSTICC Press, Setúbal, Milan, Italy, pp. 190-197. 32

Symonds, Michael, Bruza, Peter D., Sitbon, Laurianne, & Turner, Ian (2011) Modelling word meaning using efficient tensor representations. In

*Proceedings of 25th Pacific Asia Conference on Language, Information and Computation*, Nanyang Technological University, Singapore. 227

5

Widdows, Dominic, Cohen, Trevor, & De Vine, Lance (2012) Real, complex, and binary semantic vectors. In

*Quantum Interaction 2012*, 27 - 29 June 2012, Paris School of Economics, Paris. (In Press) 170