Number of items at this level: 58.
High end complexity.
International Journal of General Systems: a comprehensive periodical devoted to general systems methodology, applications and education, 37(6), pp. 689-714.
Ziari, Iman, Ledwich, Gerard, Ghosh, Arindam, Cornforth, David, & Wishart, Michael
Optimal allocation and sizing of capacitors to minimize the transmission line loss and to improve the voltage profile.
Computers and Mathematics with Applications, 60(4), pp. 1003-1013.
van der Aalst, Wil, van Hee, Kees, ter Hofstede, Arthur, Sidorova, Natalia, Verbeek, H.M.W., Voorhoeve, Marc, et al.
Soundness of workflow nets: classification, decidability, and analysis.
Formal Aspects of Computing: applicable formal methods, 23(3), pp. 333-363.
Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest
A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In
Proceedings of the 1st International ICST Conference on Sensor Systems and Software, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa. (In Press)
Anh, Vo, Liu, Fawang, & Su, Ninghu
Simulating Seawater Intrusion in Aquifers using the Modified Fokker-Planck Equation and Boussinesq Equation Subject to Phase-Modulated Tidal Waves. In
Gulati, C, Lin, Y, Mishra, S, & Rayner, J (Eds.)
Advances in Statistics, Combinatorics and Related Areas., 19-21 December 2001, University of Wollongong, New South Wales.
Gupta, Gaurav, Pieprzyk, Josef, & Kankanhalli, Mohan
Robust and reversible numerical set watermarking. In
Fernández-Medina, Eduardo , Malek, Manu , & Hernando , Javier (Eds.)
Proceedings of the International Conference on Signal Processing and Multimedia Applications (SIGMAP 2009), INSTICC Press, Portugal , Milan, Italy, pp. 141-148.
Gupta , Gaurav & Pieprzyk, Josef
Source code watermarking based on function dependency oriented sequencing. In
Pan, Jeng-Shyang, Niu, Xia-Mu, Huang, Hsiang-Cheh, & Jain, Lakhmi C (Eds.)
Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '08), IEEE Computer Society, Harbin, China, pp. 965-968.
Islam, Mohammad Badiul, Azadi, Mollah Masum Billah, Rahman, Md. Abdur, & Hashem, M. M. A.
Bengali handwritten character recognition using modified syntactic method. In
Proceedings of 2nd National Conference on Computer Processing of Bangla (NCCPB-2005), Independent University, Bangladesh, Dhaka, Bangladesh.
Liu, Fawang, Zhuang, P., Turner, Ian, & Anh, Vo
A fractional-order implicit difference approximation for the space-time fractional diffusion equation. In
Stacey, A., Blyth, B., & Shepherd, J. (Eds.)
Proceedings of the 7th Biennial Engineering Mathematics and Applications Conference, ANZIAM Journal, Melbourne, Victoria, pp. 48-68.
Martin, Eric, Sharma, Arun, & Stephan, Frank
On the data consumption benefits of accepting increased uncertainty. In
Ben-David, Shai, Case, John, & Maruoka, Akira (Eds.)
Algorithmic Learning Theory : proceedings of the 15th International Conference, ALT 2004, Springer-Verlag, Padova, Italy, pp. 83-98.
Pasupathinathan, Vijayakrishnan, Pieprzyk, Josef, & Wang, Huaxiong
Certified pseudonyms colligated with master secret key. In
Fernández-Medina, Eduardo, Malek, Manu, & Hernando, Javier (Eds.)
Proceeding of the International Conference on Security and Cryptography (SECRYPT 2009), INSTICC Press, Setúbal, Milan, Italy, pp. 190-197.
Symonds, Michael, Bruza, Peter D., Sitbon, Laurianne, & Turner, Ian
Modelling word meaning using efficient tensor representations. In
Proceedings of 25th Pacific Asia Conference on Language, Information and Computation, Nanyang Technological University, Singapore.
Widdows, Dominic, Cohen, Trevor, & De Vine, Lance
Real, complex, and binary semantic vectors. In
Quantum Interaction 2012, 27 - 29 June 2012, Paris School of Economics, Paris. (In Press)