Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DISTRIBUTED COMPUTING (080500) > Networking and Communications (080503)"
|Up a level|
- Subjects classification (38959)
- Australian and New Zealand Standard Research Classification (38959)
Group by: Authors/Creators | Item Type
Number of items at this level: 65.
Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Ben Harush, Orit Rivka (2010) Out of touch? On the lack of emotional support over the mobile phone. Media Asia, 37(4).
Bruns, Axel (2010) New Media and Public Communication: Mapping Australian User-Created Content in Online Social Networks. In Making Connections: Innovations in Research, 10th February 2010, QUT. (Unpublished)
Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.
Bye, Rainer, Luther, Katja, Camtepe, Seyit A., Alpcan, Tansu, Albayrak, Sahin, & Yener, Bulent (2007) Decentralized detector generation in cooperative intrusion detection system. Lecture Notes in Computer Science : Stabilization, Safety, and Security of Distributed Systems, 4838, pp. 37-51.
Caelli, William, Liu, Vicky, & Longley, Dennis (2013) Background to the development of a curriculum for the history of “cyber” and “communications” security. In Dodge Jr., R.C. & Futcher, L. (Eds.) Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8 Proceedings [IFIP Advances in Information and Communication Technology, Volume 406], Springer, Auckland, New Zealand, pp. 39-47.
Camtepe, S. A., Yener, B., & Yung, Moti (2006) Expander graph based key distribution mechanisms in wireless sensor networks. In Proceedings of IEEE International Conference on Communications, IEEE Conference Publications , Istanbul Turkey, 2262 -2267.
Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.
Camtepe, Seyit A. & Yener, Bulent (2008) Key Management in Wireless Sensor Networks. In Lopez , Javier & Zhou, Jianying (Eds.) Wireless Sensor Network Security. IOS Press, pp. 110-141.
Caron, David, Stauffer, Beth, Darjany, Lindsay, Oberg, Carl, Pereira, Arvind, Das, Jnaneshwar, et al. (2009) Networked aquatic microbial observing systems: An overview. In Center for Embedded Networked Sensing Annual Research Review,, May 12, 2009, University of California (Los Angeles) [UCLA].
Chen, Xiaoqin, Jayalath, Dhammika, Munasinghe, Gayan, & Ziri-Castro, Karla I. (2011) Analysis of multiple shared channel cooperative routing in OFDM based wireless networks. In Proceedings of IET International Communication Conference on Wireless Mobile & Computing, Institution of Engineering Technology (IET), Blue Palace Hotel, Shanghai, pp. 175-180.
Chen, Yen-Lin, Tian, Guosong, Gao, Jing, & Tian, Yu-Chu (2014) Cross-layer design for traffic management in wireless networked control systems. In Proceedings of the 9th IEEE Conference on Industrial Electronics and Applications (ICIEA 2014), IEEE, Hangzhou, China. (In Press)
Cheung, W.L., Fung, Y.F., & Ho, T.K. (2001) Mobile communication in power distribution application. In 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233), Victoria, British Columbia, pp. 639-642.
Chin, Yiyong & Jayalath, Dhammika (2012) On the diversity analysis of the sequential slotted amplify-decode-and-forward protocol. In Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT), Surfers Paradise, Qld.
Chin, Yiyong, Jayalath, Dhammika, & Senadji, Bouchra (2012) Slotted distributed space-time coding. In Proceedings of Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on, IEEE, Sydney, N.S.W, pp. 783-788.
Chin, Yiyong, Widanagamage, Anushka, & Jayalath, Dhammika (2012) Sequential slotted amplify-and-forward with partial relay isolation. In On the Proceedings of IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), IEEE, Sydney, Australia, pp. 1377-1382.
Chin, Yiyong, Widanagamage, Anushka, & Jayalath, Dhammika (2013) Sequential slotted amplify-decode-and-forward. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, Shanghai, Chaina, pp. 2699-2704.
Choi, Jaz Hee-jeong, Foth, Marcus, Lawson, Shaun, & Hirsch, Tad (2011) Food(ing): between human-computer and human-food-experience. In 5th International Conference on Communities & Technologies (C&T 2011), 29 June - 2 July 2011, State Library of Queensland, Brisbane, QLD.
Choi, Jaz Hee-jeong & Seeburger, Jan (2011) Sapporo World Window : urban interaction through public and private screens. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 25 March 2011, Seattle.
Cradduck, Lucy, Caelli, Bill, & McCullagh, Adrian (2008) Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions. Forum on Public Policy Online, Spring, pp. 1-43.
Edirippulige, Sisira, Martin-Khan, Melinda, Beattie, Elizabeth, Smith, Anthony, & Gray, Leonard (2013) A systematic review of telemedicine services for residents in long term care facilities. Journal of Telemedicine and Telecare, 19(3), pp. 127-132.
Gesche, Astrid (2008) Adapting to virtual third space language learning futures. In Veiga Marriott, R & Torres, P (Eds.) Handbook of Research on E-Learning Methodologies for Language Acquisition. Information Science Reference (IGI Global), United States of America, Pennsylvania, Hershey, pp. 524-538.
Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Gui, Li & Tian, Yu-Chu (2011) A conditional retransmission enabled transport protocol for real-time networked control systems. In Pfeifer, Tom, Jayasumana, Anura, & Aschenbruck, Nils (Eds.) Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN 2011), IEEE , Hilton Hotel, Bonn, pp. 235-238.
Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Ingram, David M.E., Campbell, Duncan A., Schaub, Pascal, & Ledwich, Gerard (2011) Test and evaluation system for multi-protocol sampled value protection schemes. In Proceedings of IEEE PES Trondheim PowerTech 2011, IEEE, Norwegian University of Science and Technology (NTNU), Trondheim, Norway.
Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2012) Performance analysis of IEC 61850 sampled value process bus networks. IEEE Transactions on Industrial Informatics, 9(3), pp. 1445-1454.
Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2013) System level tests of transformer differential protection using an IEC 61850 process bus. IEEE Transactions on Power Delivery, 29(3), pp. 1382-1389.
Ingram, David M.E., Steinhauser, Fred, Marinescu, Cristian, Taylor, Richard R., Schaub, Pascal, & Campbell, Duncan A. (2012) Direct evaluation of IEC 61850-9-2 process bus network performance. IEEE Transactions on Smart Grid, 3(4), pp. 1853-1854.
Jurdak, Raja, Corke, Peter, Dharman, Dhinesh, & Salagnac, Guillaume (2010) Adaptive GPS duty cycling and radio ranging for energy-efficient localization. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems - SenSys '10, Association for Computing Machinery (ACM), ETH Zurich, Zurich, pp. 57-73.
Lau, Andy, Mason, Richard, Pham, Binh, Richards, Mark, Roe, Paul, & Zhang, Jinglan (2008) Monitoring the environment through acoustics using smartphone-based sensors and 3G networking. In Langendoen, K (Ed.) Proceedings of the Second International Workshop on Wireless Sensor Network Deployments (WiDeploy08); 4th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2008, 11-14 June 2008, Greece, Santorini Island.
Long, Y.H., Ho, T.K., & Rad, A.B. (2000) Fair flow control of ABR service by per-VC virtual queuing. Computer Communications, 23(1), p. 71.
Long, Y.H., Ho, T.K., & Rad, A.B. (2000) Weighted fairness with MCR guarantee and a general-purpose explicit rate allocation algorithm for ATM ABR service. Computer Communications, 23(13), pp. 1235-1251.
Long, Y.H., Ho, T.K., & Rad, A.B. (2001) An enhanced explicit rate algorithm for ABR traffic control in ATM networks. International Journal of Communication Systems, 14(10), pp. 909-923.
Long, Y.H., Ho, T.K., Rad, A.B., & Lam, S.P.S. (1999) A ∑GIi/D/1/∞ queue with heterogeneous input/output slot times. Computer Communications, 22(12), pp. 1136-1149.
Long, Y.H., Ho, T.K., Rad, A.B., & Lam, S.P.S. (1999) A study of the generalised max–min fair rate allocation for ABR control in ATM. Computer Communications, 22(13), pp. 1247-1259.
Long, Yihong & Ho, T.K. (2000) Efficient algorithm for achieving GWPMM fairness in ATM ABR services. Electronics Letters, 36(8), p. 772.
Mathew, Avin D., Purser, Michael, Ma, Lin, & Barlow, Matthew (2010) Open standards-based system integration for asset management decision support. In Kiritsis, Dimitris, Emmanouilidis, Christos, Koronios, Andy, & Mathew, Joseph (Eds.) Proceedings of the Fourth World Congress on Engineering Asset Management (WCEAM) 2009, Springer-Verlag London Limited, Athens, Greece, pp. 221-229.
Mohd Yusoh, Zeratul Izzah & Tang, Maolin (2012) Composite SaaS placement and resource optimization in Cloud computing using evolutionary algorithms. In Proceeding of the 2012 IEEE International Conference on Cloud Computing, IEEE Computer Society, Hyatt Regency Waikiki Resort and Spa, Honolulu, Hawaii, pp. 590-597.
Pereira, Arvind, Das, Jnaneshwar, Heidarsson, Hordur, Smith, Ryan N., Stauffer, Beth, Seubert, Erica, et al. (2009) Networked robotic sensor platform deployments for use in coastal environmental assessment in southern California. In Posters for the Center for Embedded Network Sensing, 5 Dec., 2009, University of California Los Angeles, Los Angeles, CA.
Pradittasnee, Lapas, Tian, Yu-Chu, & Jayalath, Dhammika (2012) Efficient route update and maintenance processes for multipath routing in large-scale industrial wireless sensor networks. In 2012 IEEE Australasian Telecommunication Networks and Applications Conference (ATNAC'2012), 7-9 November 2012, Traders Hotel , Brisbane, QLD.
Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Ring, Jared W., Foo, Ernest, & Looi, Mark (2007) On ensuring continuity of mobile communications in a disaster environment. In Research Network for a Secure Australia : Security Technology Conference, The Research Network for a Secure Australia (RNSA), Melbourne, pp. 268-278.
Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware multicast protocol for emergency message dissemination in vehicular networks. International Journal of Vehicular Technology, 2012.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2010) A multicast routing scheme for efficient safety message dissemination in VANET. In Proceedings of 2010 IEEE Wireless Communications and Networking Conference, IEEE eXpress Conference Publishing, Sydney. (In Press)
Shi, Xiaohan, Tian, Guosong, & Tian, Yu-Chu (2012) A reliable real-time transport protocol for control systems over wireless networks. In 2012 IEEE Australasian Telecommunication Networks and Applications Conference (ATNAC'2012), 7-9 November 2012, Traders Hotel , Brisbane, QLD.
Smith, Ryan N., Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Caron, David A., Jones, Burton H., et al. (2009) Implementation of an embedded sensor network for the coordination of Slocum gliders for coastal monitoring and observation. In WUWNet 09 : Proceedings of the 4th ACM International Workshop on UnderWater Networks, ACM, Bechtel Engineering Center, Berkeley, California, pp. 1-8.
Smith, Ryan N., Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Cetinic, Ivona, Darjany, Lindsay, et al. (2010) USC CINAPS Builds bridges : observing and monitoring the southern california bight. IEEE Robotics and Automation Magazine, 17(1), pp. 20-30.
Smith, Ryan N., Stauffer, Beth, Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Chao, Yi, et al. (2009) Design and implementation of sensor networks for the observation and research of harmful algal blooms in southern California coastal waters. In Proceedings of the 2009 Conference on Coastal Environmental Sensing Networks, Boston Park Plaza & University of Massachusetts, Boston, MA.
Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Tang, Maolin (2012) Evolutionary placement of continuously operating reference stations of network Real-Time Kinematic. In Proceeding if the 2012 IEEE World Congress on Computational Intelligence, IEEE Computer Society Press, International Convention Centre, Brisbane, QLD, pp. 1461-1468.
Tang, Maolin (2009) Gateways placement in backbone wireless mesh networks. International Journal of Communications, Network and System Sciences, 2(1), pp. 44-50.
Tang, Maolin (2009) QoS-aware reference station placement for regional network RTK. Journal of Software Engineering and Applications, 2(1), pp. 44-49.
Tang, Maolin & Pan, Shenchen (2014) A hybrid genetic algorithm for the energy-efficient virtual machine placement problem in data centers. Neural Processing Letters. (In Press)
Tian, Guo-Song, Tian, Yu-Chu, & Fidge, Colin (2014) Precise relative clock synchronization for distributed control using TSC registers. Journal of Network and Computer Applications, 44, pp. 63-71.
Tian, Guosong, Fidge, Colin J., & Tian, Yu-Chu (2009) Hybrid system simulation of computer control applications over communication networks. In Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, 21-23 September 2009, Imperial College, London. (In Press)
Tian, Guosong & Tian, Yu-Chu (2012) Modelling and performance evaluation of the IEEE 802.11 DCF for real-time control. Computer Networks, 56(1), pp. 435-447.
Tian, Guosong & Tian, Yu-Chu (2013) QoS differentiation in IEEE 802.11 wireless local area networks for real-time control. In Bertogna, Marko (Ed.) Work-in-Progress Proceedings, RTAS13 19th Real-Time and Embedded Technology and Applications Symposium, RTAS WiP Committee, Philadephia, PA, pp. 33-36.
Tian, Guosong, Tian, Yu-Chu, & Fidge, Colin J. (2010) Performance analysis of IEEE 802.11 DCF based WNCS networks. In Proceedings of The 35th IEEE Conference on Local Computer Networks (LCN), IEEE, Sheraton Denver Downtown, Denver, Colorado, pp. 512-519.
Widanagamage, Anushka, Jayalath, Dhammika, & O'Shea, Peter J. (2012) Ergodic capacity of the exponentially correlated slotted amplify and forward relay channel. In Sari, Hikmet (Ed.) Proceedings of IEEE Wireless Communications and Networking Conference, IEEE Communications Society, France, pp. 776-780.
Yildiz, Mursel, Toker, Ahmet Cihat, Sivrikaya, Fikret, Camtepe, Seyit A., & Albayrak, Sahin (2012) User facilitated congestion and attack mitigation. In Pentikousis, Kostas, Aguiar, Rui, Sargento, Susana, & Aguero, Ramon (Eds.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Networks and Management, Springer Berlin Heidelberg, Aveiro, Portugal, pp. 358-371.