Conference Publication |
Ebrahimi, M and ShafieiBavani, E and Wong, RK and Chi, C-H, A new meta-heuristic approach for efficient search in the Internet of Things, Proceedings of the 12th IEEE International Conference on Services Computing, 27 June - 2 July 2015, New York City, NY, USA, pp. 264-270. ISBN 9781467372817 (2015) [Refereed Conference Paper] |  |
Zhao, Y and Wong, R and Chi, C-H and Zhou, W and Ding, C and Wang, C, Hierarchical clustering using homogeneity as similarity measure for big data analytics, Proceedings of the 12th IEEE International Conference on Services Computing, 27 June-02 July 2015, New York City, NY, USA, pp. 348-354. ISBN 9781467372817 (2015) [Refereed Conference Paper] |  |
Yang, LH and Liu, M and Pan, Y and Gong, W and Stannus, S, Can SSDs help reduce random I/Os in Hash Joins?, Web-Age Information Management, 14-16 June 2013, Beidaihe, China, pp. 417-422. ISBN 978-3-642-38561-2 (2013) [Refereed Conference Paper] | |
Naseri, S and Bahrehmand, A and Ding, C and Chi, C, Enhancing tag-based collaborative filtering via integrated social networking information, Proceedings of 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 25-28 August 2013, Niagra Falls, Canada, pp. 760-764. ISBN 978-1-4503-2240-9 (2013) [Conference Extract] |  |
Gaudin, B and Nixon, P, Supervisory Control for Software Runtime Exception Avoidance, Proceedings of the Fifth International C* Conference on Computer Science and Software Engineering, 27-29 June, 2012, Montreal, Canada, pp. 109-112. ISBN 978-1-4503-1084-0 (2012) [Refereed Conference Paper] | |
Jiang, D, A Finite Step Scheme for General Near-Optimal Stochastic Control, Proceedings of 24th American Control Conference , June 2005, Portland, United States, pp. 1-10 . ISBN 0-7803-9098-9 (2005) [Refereed Conference Paper] | |
Negnevitsky, M and Lim, MJ and Hartnett, JS and Reznik, L, Email communications analysis: how to use computational intelligence methods and tools?, Proceedings of the 2005 IEEE International Conference in Computational Intelligence for Homeland Security and Personal Safety (CIHSPS 2005), 31 March - 1 April 2005, Orlando, FL, USA, pp. 16-23. ISBN 0-7803-9176-4 (2005) [Refereed Conference Paper] | |
Lim, MJ and Negnevitsky, M and Hartnett, JS, Tracking and Monitoring E-mail Traffic Activities of Criminal and Terrorist Organisations Using Visualisation Tools, Proceedings of the 6th Australian Information Warfare and Security Conference, 24-25, Nov, 2005, Geelong, Australia, pp. 112-124. ISBN 1 74156 028 4 (2005) [Refereed Conference Paper] | |
Malhotra, V, Modeling risks from errors in decision algorithms, Proceedings of the IASTED International Conference: Modelling and Simulation 2000, 15-17 May 2000, Pittsburgh, USA, pp. 168-174. ISBN 0-88986-284-2 (2000) [Refereed Conference Paper] | |
Jamil, T and Holmes, WN and Blest, DC, Towards implementation of a binary number system for complex numbers, Proceedings of the IEEE SoutheastCon 2000, April 2000, Nashville, pp. 268 - 274. ISBN 0 7803 6314 0 (2000) [Refereed Conference Paper] | |
Kelarev, AV and Trotter, PG, A combinatorial property of automata, languages, and syntactic monoids, Words, Languages, Combinatorics, March 1999, Kyoto, pp. 66-67. (1999) [Conference Extract] | |
Bespamyatnikh, SN and Kelarev, AV, Shortest paths and d-cycle problem, Combinatorial Algorithms, August 1999, Perth, pp. 152-156. (1999) [Refereed Conference Paper] | |