eCite Digital Repository

Items where Subject is Field of Research, Information and Computing Sciences, Computation Theory and Mathematics, Analysis of Algorithms and Complexity

Journal Article
Shi, P and Ratkowsky, DA and Wang, N and Li, Y and Zhao, L and Reddy, GVP and Li, BL, Comparison of five methods for parameter estimation under Taylor's power law, Ecological Complexity, 32 pp. 121-130. ISSN 1476-945X (2017) [Refereed Article] 
Cauchi-Saunders, AJ and Lewis, IJ, GPU enabled XDraw viewshed analysis, Journal of Parallel and Distributed Computing, 84 pp. 87-93. ISSN 0743-7315 (2015) [Refereed Article] 
Drinkwater, B and Charleston, MA, An improved node mapping algorithm for the cophylogeny reconstruction problem, Coevolution: An Open Access Journal, 2, (1) pp. 1-17. ISSN 2325-6214 (2014) [Refereed Article]
Drinkwater, B and Charleston, MA, Introducing TreeCollapse: a novel greedy algorithm to solve the cophylogeny reconstruction problem, BMC Bioinformatics, 15, (Suppl 16: S14) pp. 1-15. ISSN 1471-2105 (2014) [Refereed Article]
Loureiro, E and Nixon, P and Dobson, S, Decentralized and Optimal Control of Shared Resource Pools, ACM Transactions on Autonomous and Adaptive Systems, 7, (1) pp. 14:1-14:30. ISSN 1556-4665 (2012) [Refereed Article]
Gaudin, B and Hinchey, MH and Vassev, E and Nixon, P and Garcia, JC and Maalej, W, FastFix: A Control Theoretic View of Self-Healing for Automatic Corrective Software Maintenance, Scalable Computing: Practice and Experience, 13, (1) pp. 5-20. ISSN 1895-1767 (2012) [Refereed Article]
Kelarev, AV, An algorithm for repeated convex regions in geographic information systems, Far East Journal of Applied Mathematics, 8, (1) pp. 75-79. ISSN 0972-0960 (2002) [Refereed Article] 
Chapter in Book
Loureiro, E and Nixon, P and Dobson, S, Decentralized Self-optimization in Shared Resource Pools, Studies in Computational Intelligence: Intelligent Networking, Collaborative Systems and Applications, Springer, S Caballe, F Xhafa, A Abraham (ed), Berlin, pp. 149-170. ISBN 978-3-642-16792-8 (2011) [Research Book Chapter] 
Conference Publication
Ebrahimi, M and ShafieiBavani, E and Wong, RK and Chi, C-H, A new meta-heuristic approach for efficient search in the Internet of Things, Proceedings of the 12th IEEE International Conference on Services Computing, 27 June - 2 July 2015, New York City, NY, USA, pp. 264-270. ISBN 9781467372817 (2015) [Refereed Conference Paper]
Zhao, Y and Wong, R and Chi, C-H and Zhou, W and Ding, C and Wang, C, Hierarchical clustering using homogeneity as similarity measure for big data analytics, Proceedings of the 12th IEEE International Conference on Services Computing, 27 June-02 July 2015, New York City, NY, USA, pp. 348-354. ISBN 9781467372817 (2015) [Refereed Conference Paper]
Yang, LH and Liu, M and Pan, Y and Gong, W and Stannus, S, Can SSDs help reduce random I/Os in Hash Joins?, Web-Age Information Management, 14-16 June 2013, Beidaihe, China, pp. 417-422. ISBN 978-3-642-38561-2 (2013) [Refereed Conference Paper] 
Naseri, S and Bahrehmand, A and Ding, C and Chi, C, Enhancing tag-based collaborative filtering via integrated social networking information, Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 25-28 August 2013, Niagra Falls, Canada, pp. 760-764. ISBN 978-1-4503-2240-9 (2013) [Conference Extract]
Gaudin, B and Nixon, P, Supervisory Control for Software Runtime Exception Avoidance, Proceedings of the Fifth International C* Conference on Computer Science and Software Engineering, 27-29 June, 2012, Montreal, Canada, pp. 109-112. ISBN 978-1-4503-1084-0 (2012) [Refereed Conference Paper] 
Jiang, D, A Finite Step Scheme for General Near-Optimal Stochastic Control, Proceedings of 24th American Control Conference , June 2005, Portland, United States, pp. 1-10 . ISBN 0-7803-9098-9 (2005) [Refereed Conference Paper] 
Negnevitsky, M and Lim, MJ and Hartnett, JS and Reznik, L, Email communications analysis: how to use computational intelligence methods and tools?, Proceedings of the 2005 IEEE International Conference in Computational Intelligence for Homeland Security and Personal Safety (CIHSPS 2005), 31 March - 1 April 2005, Orlando, FL, USA, pp. 16-23. ISBN 0-7803-9176-4 (2005) [Refereed Conference Paper] 
Lim, MJ and Negnevitsky, M and Hartnett, JS, Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools, Proceedings of the 6th Australian Information Warfare and Security Conference, 24-25, Nov, 2005, Geelong, Australia, pp. 112-124. ISBN 1 74156 028 4 (2005) [Refereed Conference Paper] 
Malhotra, V, Modeling risks from errors in decision algorithms, Proceedings of the IASTED International Conference: Modelling and Simulation 2000, 15-17 May 2000, Pittsburgh, USA, pp. 168-174. ISBN 0-88986-284-2 (2000) [Refereed Conference Paper] 
Jamil, T and Holmes, WN and Blest, DC, Towards implementation of a binary number system for complex numbers, Proceedings of the IEEE SoutheastCon 2000, April 2000, Nashville, pp. 268 - 274. ISBN 0 7803 6314 0 (2000) [Refereed Conference Paper] 
Kelarev, AV and Trotter, PG, A combinatorial property of automata, languages, and syntactic monoids, Words, Languages, Combinatorics, March 1999, Kyoto, pp. 66-67. (1999) [Conference Extract] 
Bespamyatnikh, SN and Kelarev, AV, Shortest paths and d-cycle problem, Combinatorial Algorithms, August 1999, Perth, pp. 152-156. (1999) [Refereed Conference Paper] 

This list was generated on Mon May 20 13:46:42 2019.