QUT ePrints

Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DISTRIBUTED COMPUTING (080500) > Networking and Communications (080503)"

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Jump to: A | B | C | E | G | I | J | L | M | P | R | S | T | W | Y
Number of items at this level: 64.

A

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 396
Number of citations in Scopus 9
Number of citations in Web of Science® 3

B

Ben Harush, Orit Rivka (2010) Out of touch? On the lack of emotional support over the mobile phone. Media Asia, 37(4).

Bruns, Axel (2010) New Media and Public Communication: Mapping Australian User-Created Content in Online Social Networks. In Making Connections: Innovations in Research, 10th February 2010, QUT. (Unpublished)

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.

Bye, Rainer, Luther, Katja, Camtepe, Seyit A., Alpcan, Tansu, Albayrak, Sahin, & Yener, Bulent (2007) Decentralized detector generation in cooperative intrusion detection system. Lecture Notes in Computer Science : Stabilization, Safety, and Security of Distributed Systems, 4838, pp. 37-51.
Number of citations in Scopus 1

C

Caelli, William, Liu, Vicky, & Longley, Dennis (2013) Background to the development of a curriculum for the history of “cyber” and “communications” security. In Dodge Jr., R.C. & Futcher, L. (Eds.) Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8 Proceedings [IFIP Advances in Information and Communication Technology, Volume 406], Springer, Auckland, New Zealand, pp. 39-47.
Number of full-text downloads 71

Camtepe, S. A., Yener, B., & Yung, Moti (2006) Expander graph based key distribution mechanisms in wireless sensor networks. In Proceedings of IEEE International Conference on Communications, IEEE Conference Publications , Istanbul Turkey, 2262 -2267.
Number of citations in Scopus 13
Number of citations in Web of Science® 2

Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK : Praxis der Informationsverarbeitung und Kommunikation, 35(1), pp. 25-31.
Number of full-text downloads 84

Camtepe, Seyit A. & Yener, Bulent (2008) Key Management in Wireless Sensor Networks. In Lopez , Javier & Zhou, Jianying (Eds.) Cryptology and Information Security Series, Wireless Sensor Network Security. IOS Press, pp. 110-141.

Caron, David, Stauffer, Beth, Darjany, Lindsay, Oberg, Carl, Pereira, Arvind, Das, Jnaneshwar, et al. (2009) Networked aquatic microbial observing systems: An overview. In Center for Embedded Networked Sensing Annual Research Review,, May 12, 2009, University of California (Los Angeles) [UCLA].
Number of full-text downloads 32

Chen, Xiaoqin, Jayalath, Dhammika, Munasinghe, Gayan, & Ziri-Castro, Karla I. (2011) Analysis of multiple shared channel cooperative routing in OFDM based wireless networks. In Proceedings of IET International Communication Conference on Wireless Mobile & Computing, Institution of Engineering Technology (IET), Blue Palace Hotel, Shanghai, pp. 175-180.

Chen, Yen-Lin, Tian, Guosong, Gao, Jing, & Tian, Yu-Chu (2014) Cross-layer design for traffic management in wireless networked control systems. In Proceedings of the 9th IEEE Conference on Industrial Electronics and Applications (ICIEA 2014), IEEE, Hangzhou, China. (In Press)

Cheung, W.L., Fung, Y.F., & Ho, T.K. (2001) Mobile communication in power distribution application. In 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233), Victoria, British Columbia, pp. 639-642.
Number of full-text downloads 176
Number of citations in Scopus 1

Chin, Yiyong & Jayalath, Dhammika (2012) On the diversity analysis of the sequential slotted amplify-decode-and-forward protocol. In Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT), Surfers Paradise, Qld.
Number of full-text downloads 26

Chin, Yiyong, Jayalath, Dhammika, & Senadji, Bouchra (2012) Slotted distributed space-time coding. In Proceedings of Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on, IEEE, Sydney, N.S.W, pp. 783-788.
Number of full-text downloads 24

Chin, Yiyong, Widanagamage, Anushka, & Jayalath, Dhammika (2012) Sequential slotted amplify-and-forward with partial relay isolation. In On the Proceedings of IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), IEEE, Sydney, Australia, pp. 1377-1382.
Number of full-text downloads 48
Number of citations in Scopus 1

Chin, Yiyong, Widanagamage, Anushka, & Jayalath, Dhammika (2013) Sequential slotted amplify-decode-and-forward. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, Shanghai, Chaina, pp. 2699-2704.
Number of full-text downloads 31

Choi, Jaz Hee-jeong, Foth, Marcus, Lawson, Shaun, & Hirsch, Tad (2011) Food(ing): between human-computer and human-food-experience. In 5th International Conference on Communities & Technologies (C&T 2011), 29 June - 2 July 2011, State Library of Queensland, Brisbane, QLD.
Number of full-text downloads 55

Choi, Jaz Hee-jeong & Seeburger, Jan (2011) Sapporo World Window : urban interaction through public and private screens. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 25 March 2011, Seattle.
Number of full-text downloads 255
Number of citations in Scopus 3

Cradduck, Lucy, Caelli, Bill, & McCullagh, Adrian (2008) Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions. Forum on Public Policy Online, Spring, pp. 1-43.

E

Edirippulige, Sisira, Martin-Khan, Melinda, Beattie, Elizabeth, Smith, Anthony, & Gray, Leonard (2013) A systematic review of telemedicine services for residents in long term care facilities. Journal of Telemedicine and Telecare, 19(3), pp. 127-132.
Number of citations in Scopus 2

G

Gesche, Astrid (2008) Adapting to virtual third space language learning futures. In Veiga Marriott, R & Torres, P (Eds.) Handbook of Research on E-Learning Methodologies for Language Acquisition. Information Science Reference (IGI Global), United States of America, Pennsylvania, Hershey, pp. 524-538.

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Number of full-text downloads 422

Gui, Li & Tian, Yu-Chu (2011) A conditional retransmission enabled transport protocol for real-time networked control systems. In Pfeifer, Tom, Jayasumana, Anura, & Aschenbruck, Nils (Eds.) Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN 2011), IEEE , Hilton Hotel, Bonn, pp. 235-238.
Number of full-text downloads 47

I

Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Number of full-text downloads 153

Ingram, David M.E., Campbell, Duncan A., Schaub, Pascal, & Ledwich, Gerard (2011) Test and evaluation system for multi-protocol sampled value protection schemes. In Proceedings of IEEE PES Trondheim PowerTech 2011, IEEE, Norwegian University of Science and Technology (NTNU), Trondheim, Norway.
Number of full-text downloads 258

Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2012) Performance analysis of IEC 61850 sampled value process bus networks. IEEE Transactions on Industrial Informatics, 9(3), pp. 1445-1454.
Number of full-text downloads 472
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2013) System level tests of transformer differential protection using an IEC 61850 process bus. IEEE Transactions on Power Delivery. (In Press)
Number of full-text downloads 136

Ingram, David M.E., Steinhauser, Fred, Marinescu, Cristian, Taylor, Richard R., Schaub, Pascal, & Campbell, Duncan A. (2012) Direct evaluation of IEC 61850-9-2 process bus network performance. IEEE Transactions on Smart Grid, 3(4), pp. 1853-1854.
Number of full-text downloads 233
Number of citations in Scopus 2
Number of citations in Web of Science® 2

J

Jurdak, Raja, Corke, Peter, Dharman, Dhinesh, & Salagnac, Guillaume (2010) Adaptive GPS duty cycling and radio ranging for energy-efficient localization. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems - SenSys '10, Association for Computing Machinery (ACM), ETH Zurich, Zurich, pp. 57-73.
Number of full-text downloads 169
Number of citations in Scopus 7

L

Lau, Andy, Mason, Richard, Pham, Binh, Richards, Mark, Roe, Paul, & Zhang, Jinglan (2008) Monitoring the environment through acoustics using smartphone-based sensors and 3G networking. In Langendoen, K (Ed.) Proceedings of the Second International Workshop on Wireless Sensor Network Deployments (WiDeploy08); 4th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2008, 11-14 June 2008, Greece, Santorini Island.

Long, Y.H., Ho, T.K., & Rad, A.B. (2000) Fair flow control of ABR service by per-VC virtual queuing. Computer Communications, 23(1), p. 71.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Long, Y.H., Ho, T.K., & Rad, A.B. (2000) Weighted fairness with MCR guarantee and a general-purpose explicit rate allocation algorithm for ATM ABR service. Computer Communications, 23(13), pp. 1235-1251.
Number of citations in Scopus 1

Long, Y.H., Ho, T.K., & Rad, A.B. (2001) An enhanced explicit rate algorithm for ABR traffic control in ATM networks. International Journal of Communication Systems, 14(10), pp. 909-923.
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Long, Y.H., Ho, T.K., Rad, A.B., & Lam, S.P.S. (1999) A ∑GIi/D/1/∞ queue with heterogeneous input/output slot times. Computer Communications, 22(12), pp. 1136-1149.

Long, Y.H., Ho, T.K., Rad, A.B., & Lam, S.P.S. (1999) A study of the generalised max–min fair rate allocation for ABR control in ATM. Computer Communications, 22(13), pp. 1247-1259.
Number of citations in Web of Science® 8

Long, Yihong & Ho, T.K. (2000) Efficient algorithm for achieving GWPMM fairness in ATM ABR services. Electronics Letters, 36(8), p. 772.

M

Mathew, Avin D., Purser, Michael, Ma, Lin, & Barlow, Matthew (2010) Open standards-based system integration for asset management decision support. In Kiritsis, Dimitris, Emmanouilidis, Christos, Koronios, Andy, & Mathew, Joseph (Eds.) Proceedings of the Fourth World Congress on Engineering Asset Management (WCEAM) 2009, Springer-Verlag London Limited, Athens, Greece, pp. 221-229.
Number of full-text downloads 866

Mohd Yusoh, Zeratul Izzah & Tang, Maolin (2012) Composite SaaS placement and resource optimization in Cloud computing using evolutionary algorithms. In Proceeding of the 2012 IEEE International Conference on Cloud Computing, IEEE Computer Society, Hyatt Regency Waikiki Resort and Spa, Honolulu, Hawaii, pp. 590-597.
Number of full-text downloads 235
Number of citations in Scopus 2

P

Pereira, Arvind, Das, Jnaneshwar, Heidarsson, Hordur, Smith, Ryan N., Stauffer, Beth, Seubert, Erica, et al. (2009) Networked robotic sensor platform deployments for use in coastal environmental assessment in southern California. In Posters for the Center for Embedded Network Sensing, 5 Dec., 2009, University of California Los Angeles, Los Angeles, CA.
Number of full-text downloads 45

Pradittasnee, Lapas, Tian, Yu-Chu, & Jayalath, Dhammika (2012) Efficient route update and maintenance processes for multipath routing in large-scale industrial wireless sensor networks. In 2012 IEEE Australasian Telecommunication Networks and Applications Conference (ATNAC'2012), 7-9 November 2012, Traders Hotel , Brisbane, QLD.
Number of full-text downloads 43

R

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 185
Number of citations in Scopus 4

Ring, Jared W., Foo, Ernest, & Looi, Mark (2007) On ensuring continuity of mobile communications in a disaster environment. In Research Network for a Secure Australia : Security Technology Conference, The Research Network for a Secure Australia (RNSA), Melbourne, pp. 268-278.
Number of full-text downloads 124

S

Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Number of citations in Scopus 6
Number of citations in Web of Science® 1

Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware multicast protocol for emergency message dissemination in vehicular networks. International Journal of Vehicular Technology, 2012.
Number of full-text downloads 55

Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2010) A multicast routing scheme for efficient safety message dissemination in VANET. In Proceedings of 2010 IEEE Wireless Communications and Networking Conference, IEEE eXpress Conference Publishing, Sydney. (In Press)
Number of full-text downloads 323

Shi, Xiaohan, Tian, Guosong, & Tian, Yu-Chu (2012) A reliable real-time transport protocol for control systems over wireless networks. In 2012 IEEE Australasian Telecommunication Networks and Applications Conference (ATNAC'2012), 7-9 November 2012, Traders Hotel , Brisbane, QLD.
Number of full-text downloads 38

Smith, Ryan N., Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Caron, David A., Jones, Burton H., et al. (2009) Implementation of an embedded sensor network for the coordination of Slocum gliders for coastal monitoring and observation. In WUWNet 09 : Proceedings of the 4th ACM International Workshop on UnderWater Networks, ACM, Bechtel Engineering Center, Berkeley, California, pp. 1-8.
Number of full-text downloads 58

Smith, Ryan N., Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Cetinic, Ivona, Darjany, Lindsay, et al. (2010) USC CINAPS Builds bridges : observing and monitoring the southern california bight. IEEE Robotics and Automation Magazine, 17(1), pp. 20-30.
Number of full-text downloads 109
Number of citations in Scopus 24
Number of citations in Web of Science® 10

Smith, Ryan N., Stauffer, Beth, Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Chao, Yi, et al. (2009) Design and implementation of sensor networks for the observation and research of harmful algal blooms in southern California coastal waters. In Proceedings of the 2009 Conference on Coastal Environmental Sensing Networks, Boston Park Plaza & University of Massachusetts, Boston, MA.
Number of full-text downloads 42

Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Number of full-text downloads 86

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 201
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 428
Number of citations in Scopus 2

Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Number of full-text downloads 96

T

Tang, Maolin (2012) Evolutionary placement of continuously operating reference stations of network Real-Time Kinematic. In Proceeding if the 2012 IEEE World Congress on Computational Intelligence, IEEE Computer Society Press, International Convention Centre, Brisbane, QLD, pp. 1461-1468.
Number of full-text downloads 65

Tang, Maolin (2009) Gateways placement in backbone wireless mesh networks. International Journal of Communications, Network and System Sciences, 2(1), pp. 44-50.

Tang, Maolin (2009) QoS-aware reference station placement for regional network RTK. Journal of Software Engineering and Applications, 2(1), pp. 44-49.

Tang, Maolin & Pan, Shenchen (2014) A hybrid genetic algorithm for the energy-efficient virtual machine placement problem in data centers. Neural Processing Letters. (In Press)

Tian, Guosong, Fidge, Colin J., & Tian, Yu-Chu (2009) Hybrid system simulation of computer control applications over communication networks. In Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, 21-23 September 2009, Imperial College, London. (In Press)
Number of full-text downloads 293

Tian, Guosong & Tian, Yu-Chu (2012) Modelling and performance evaluation of the IEEE 802.11 DCF for real-time control. Computer Networks, 56(1), pp. 435-447.
Number of full-text downloads 150
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Tian, Guosong & Tian, Yu-Chu (2013) QoS differentiation in IEEE 802.11 wireless local area networks for real-time control. In Bertogna, Marko (Ed.) Work-in-Progress Proceedings, RTAS13 19th Real-Time and Embedded Technology and Applications Symposium, RTAS WiP Committee, Philadephia, PA, pp. 33-36.
Number of full-text downloads 72

Tian, Guosong, Tian, Yu-Chu, & Fidge, Colin J. (2010) Performance analysis of IEEE 802.11 DCF based WNCS networks. In Proceedings of The 35th IEEE Conference on Local Computer Networks (LCN), IEEE, Sheraton Denver Downtown, Denver, Colorado, pp. 512-519.
Number of full-text downloads 99
Number of citations in Scopus 4

W

Widanagamage, Anushka, Jayalath, Dhammika, & O'Shea, Peter J. (2012) Ergodic capacity of the exponentially correlated slotted amplify and forward relay channel. In Sari, Hikmet (Ed.) Proceedings of IEEE Wireless Communications and Networking Conference, IEEE Communications Society, France, pp. 776-780.
Number of full-text downloads 56

Y

Yildiz, Mursel, Toker, Ahmet Cihat, Sivrikaya, Fikret, Camtepe, Seyit A., & Albayrak, Sahin (2012) User facilitated congestion and attack mitigation. In Pentikousis, Kostas, Aguiar, Rui, Sargento, Susana, & Aguero, Ramon (Eds.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Networks and Management, Springer Berlin Heidelberg, Aveiro, Portugal, pp. 358-371.

This list was generated on Sat Apr 19 11:20:17 2014 EST.