Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200) > Computation Theory and Mathematics not elsewhere classified (080299)"
|Up a level|
- Subjects classification (41554)
- Australian and New Zealand Standard Research Classification (41554)
Group by: Authors/Creators | Item Type
Number of items at this level: 28.
Acar, Evrim, Camtepe, Seyit A., Krishnamoorthy, Mukkai S., & Yener, Bulent (2005) Modeling and multiway analysis of chatroom tensors. Lecture Notes in Computer Science : Intelligence and Security Informatics, 3495, pp. 256-268.
Acar, Evrim, Camtepe, Seyit A., & Yener, Bulent (2006) Collective sampling and analysis of high order tensors for chatroom communications. Lecture Notes in Computer Science : Intelligence and Security Informatics, 3975, pp. 213-224.
Broadbent, Anne, Gutoski, Gus, & Stebila, Douglas (2013) Quantum one-time programs. Lecture Notes in Computer Science [Advances in Cryptology - CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II], 8043, pp. 344-360.
Craik, Andrew J. & Kelly, Wayne A. (2010) Using Ownership to Reason About Inherent Parallelism in Object-Oriented Programs. Lecture Notes in Computer Science, 6011, pp. 145-164.
Han, Guo-Sheng, Yu, Zuguo, Anh, Vo, Krishnajith, Anaththa P.D., & Tian, Yu-Chu (2013) An ensemble method for predicting subnuclear localizations from primary protein structures. PLOS ONE, 8(2), e57225:1-e57225:14.
Lermer, Karl, Fidge, Colin J., & Hayes, Ian (2005) A theory for execution-time derivation in real-time programs. Theoretical Computer Science, 346(1), pp. 3-27.
Lin, R & Liu, Fawang (2007) Fractional High Order Methods For The Nonlinear Fractional Ordinary Differential Equation. Nonlinear Analysis, 66(4), pp. 856-869.
Miao, Hui & Tian, Yu-Chu (2013) Dynamic robot path planning using an enhanced simulated annealing approach. Applied Mathematics and Computation, 222, pp. 420-437.
Peng, Chen, Yue, Dong, & Tian, Yu-Chu (2009) New Approach on Robust Delay-Dependent H∞ Control for Uncertain T-S Fuzzy Systems With Interval Time-Varying Delay. IEEE Transactions on Fuzzy Systems, 17(4), pp. 890-900.
Pipanmaekaporn, Luepol & Li, Yuefeng (2012) Discovering relevant features for effective query formulation. Lecture Notes in Computer Science, 7356/2012, pp. 137-151.
Warne, David J., Hayward, Ross F., Kelson, Neil A., & Mallet, Dann G. (2013) An efficient algorithm for the detection of Eden. Complex Systems, 22(4), pp. 377-404.
Zhang, Tonghua, Tade, Moses O., & Tian, Yu-Chu (2007) Linear estimate of the number of limit cycles for a class of non-linear systems. Chaos, Solitons and Fractals, 31(4), pp. 804-810.
Zhang, Tonghua, Tian, Yu-Chu, & Tade, Moses O. (2007) On the Number of Zeros of the Abelian Intergrals for a Class of Perturbed Lienard Systems. International Journal of Bifurcation and Chaos, 17(9), pp. 3281-3287.
Zhuang, Pinghui & Liu, Fawang (2007) Finite difference approximation for two-dimensional time fractional diffusion equation. Journal of Algorithms & Computational Technology, 1(1), pp. 1-15.
Au, Wai, Gollmann, Dieter, & Josang, Audun (2006) A Method for Access Authorisation Through Delegation Networks. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.
Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Avoiding full extension field arithmetic in pairing computations. In Progress in Cryptology - AFRICACRYPT 2010, Springer Verlag, Stellenbosch, South Africa, pp. 203-224.
Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Delaying mismatched field multiplications in pairing computations. In Arithmetic of Finite Fields : Third International Workshop, WAIFI 2010, Proceedings, Springer Verlag, Istanbul, Turkey, pp. 196-214.
Costello, Craig, Lange, Tanja, & Naehrig, Michael (2010) Faster pairing computations on curves with high-degree twists. In Public Key Cryptography – PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings, Springer Verlag, Paris, pp. 224-242.
Gu, Tianlong, Dong, Rongsheng, & Tian, Yu-Chu (2003) Continuous Petri nets augmented with maximal and minimal firing speeds. In IEEE International Conference on Systems, Man and Cybernetics, 5-8 Oct 2003, Washington, DC.
Hu, Jianbo, Shi, Manhong, & Tian, Yu-Chu (2004) A new switching function for variable structure control. In Fifth World Congress on Intelligent Control and Automation, 15-19 June 2004, Hagzhou, China.
Josang, Audun (2007) Probabilistic logic under uncertainty. In Gudmundsson, J. & Jay, B. (Eds.) Thirteenth Computing : The Australasian Theory Symposium (CATS2007), 30 January - 2 February 2007, Ballarat, Australia.
Krishnajith, Anaththa P. D., Kelly, Wayne A., Hayward, Ross F., & Tian, Yu-Chu (2013) Managing memory and reducing I/O cost for correlation matrix calculation in bioinformatics. In Proceedings of the IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, IEEE, Grand Copthorne Waterfront Hotel, Singapore, pp. 36-43.
Liu, Bin, Li, Yuefeng, & Tian, Yu-Chu (2012) Discovering novel knowledge using granule mining. In Lecture Notes in Computer Science [Rough Sets and Current Trends in Computing: 8th International Conference], Springer, Chengdu, China, pp. 380-387.
Xie, Gang, Guo, H. B., Tian, Yu-Chu, & Tang, Maolin (2012) A human-simulated immune evolutionary computation approach. In Huang, T. (Ed.) Lecture Notes in Computer Science, Springer, Doha, Qatar, pp. 92-99.
Craik, Andrew J. (2008) Ownership Effects Type System Safety. (Unpublished)
Warne, David (2013) On the effect of topology on cellular automata rule spaces. (Unpublished)