Australian Computer Society

Displaying 1-40 of 87 results

  • White Papers // May 2013

    Peer-to-Peer Data Mining Classifiers for Decentralized Detection of Network Attacks

    Data mining aims to extract from huge amount of data stochastic theories, called knowledge models, to explain or predict complex phenomenon. In this paper the authors propose new distributed data mining algorithms to recognize network attacks against a set of devices from statistic data generated locally by each device according...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Finding Skylines for Incomplete Data

    In the last decade, skyline queries have been extensively studied for different domains because of their wide applications in multi-criteria decision making and search space pruning. A skyline query returns all the interesting points in a multi-dimensional data set that are not dominated by any other point with respect to...

    Provided By Australian Computer Society

  • White Papers // May 2013

    User Awareness and Policy Compliance of Data Privacy in Cloud Computing

    Cloud computing is promising many technical benefits such as enhanced scalability, computing elasticity, and cost efficiency. However, with the benefits of cloud-based, hosted software platforms also comes the responsibility to data privacy. This paper investigates the data privacy issues brought about by cloud computing from an Australian perspective with specific...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Cloud-Aware Processing of MapReduce-Based OLAP Applications

    As the volume of data to be processed in a timely manner soars, the scale of computing and storage systems has much trouble keeping up with such a rate of explosive data growth. A hybrid cloud combining two or more clouds is emerging as an appealing alternative to expand local/private...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Non-blocking Parallel Subset Construction on Shared-memory Multicore Architectures

    The authors discuss ways to effectively parallelize the sub-set construction algorithm, which is used to convert Non-deterministic Finite Automata (NFAs) to Deterministic Finite Automata (DFAs). This conversion is at the heart of string pattern matching based on regular expressions and thus has many applications in text processing, compilers, scripting languages...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Request Oriented Model for Web Services

    The existing service modeling methodologies, such as WSDL and OWL-S, are service-oriented, which mainly focus on providing formalisms for the important features of a web service, including its functionality and QoS parameters. Conforming to these models, users need to first find what the available services are, go through the descriptions,...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Anatomy of Drive-by Download Attack

    Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Simseer and Bugwise - Web Services for Binary-level Software Similarity and Defect Detection

    Simseer and bugwise are online web services that perform binary program analysis: simseer identifies similarity between submitted executables based on similarity in the control flow of each binary. A software similarity service provides benefit in identifying malware variants and families, discovering software theft, and revealing plagiarism of software programs. Simseer...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Dynamic, Decentralised Search Algorithm for Efficient Data Retrieval in a Distributed Tuple Space

    In this paper, the authors present an algorithm which may be used to efficiently search for and retrieve tuples in a distributed tuple space. The algorithm, a core part of the Tupleware system, is based on the success or failure of previous tuple requests to remote nodes in the system,...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Efficient Identity-based Signcryption without Random Oracles

    In this paper, the authors propose a new Identity-Based SignCryption (IBSC) scheme in the standard model. Their scheme shows an improvement of approximately 40% reduction in the ciphertext size when compared to the previously proposed IBSC schemes in the standard model. Further, they argue that the previous IBSC schemes do...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Scaling Up Transit Priority Modelling Using High-Throughput Computing

    The optimization of Road Space Allocation (RSA) from a network perspective is computationally challenging. An analogue to the Network Design Problem (NDP), RSA can be classified NP-hard. In large-scale networks when the number of alternatives increases exponentially, there is a need for an efficient method to reduce the number of...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Non-Functional Requirements in Business Process Modeling

    Business Process Modeling entails the capture of a set of tasks that invariably model the functional behavior of a system. Another aspect of Business Process Modeling involves the accurate capture of operational behavior and the associated process constraints. Whether the process is automated or manual, such operational constraints and behavior...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Robust WYSIWYS: A Method for Ensuring that What You See is What You Sign

    The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or intentional malfunctioning has the potential of wrongly imposing...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes

    Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators can often be used to establish a view of regular usage patterns which can then be examined for unusual occurrences. This paper describes one such method...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Transformation and Reaction Rules for Data on the Web

    The transformation and manipulation of XML is an increasingly important research topic. This paper examines a number of issues with regard to languages for transforming and reacting to changes on XML data. On the transformation side, the authors focus on XSLT, a powerful language for converting XML data into other...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Cooperative Query Answering for Semistructured Data

    Semi-structured data, in particular XML, has emerged as one of the primary means for information exchange and content management. The power of XML allows authors to structure a document in a way which precisely captures the semantics of the data. This, however, poses a substantial barrier to casual and non-expert...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Managing Large Numbers of Business Processes with Cloud Workflow Systems

    With the emergence of cloud computing which can deliver on-demand high-performance computing resources over the Internet, cloud workflow systems offer a competitive software solution for managing large numbers of business processes. In this paper, the authors first analyze the basic system requirements through a motivating example, and then, the general...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Optimised X-HYBRIDJOIN for Near-Real-Time Data Warehousing

    Stream-based join algorithms are needed in modern near-real-time data warehouses. A particular class of stream-based join algorithms, with MESHJOIN as a typical example, computes the join between a stream and a disk-based relation. Recently the authors have presented a new algorithm X-HYBRIDJOIN (EXtended HYBRID JOIN) in that class. X-HYBRIDJOIN achieves...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Energy Efficiency for MapReduce Workloads: An In-depth Study

    The energy efficiency has emerged as a crucial optimization goal in data centers. MapReduce has become a popular and even fashionable distributed processing model for parallel computing in data centers. Hadoop is an open-source implementation of MapReduce, which is widely used for short jobs requiring low response time. In this...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Evaluating Semantic Browsers for Consuming Linked Data

    The value of a single dataset is increased when it is linked to combinations of datasets to provide users with more information. Linked data is a style of publishing data on the web by using a structured machine-readable format, RDF, and semantically typed relations to connect related data. Its structured...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Indexing RFID Data Using the VG-Curve

    Existing methods for the management of multi-dimensional data typically do not scale well with an increased number of dimensions or require the unsupported augmentation of the kernel. However, the use of multidimensional data continues to grow in modern database applications, specifically in spatio-temporal databases. These systems produce vast volumes of...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    How to Manage Spatio-Temporal Events in Relational Databases

    In this paper, the authors discuss the need for Event-Condition-Action (ECA) rules in spatio-temporal databases and outline a generic scenario for them. A proposal for the implementation of ECA rules is then presented in which several implementation alternatives for different spatio-temporal rule types are considered. Through a series of experiments,...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

    Cloud computing technologies have recently gained momentum and moved from a hyped trend to a mature set of technological innovations providing an infrastructure for the Software-as-a-Service (SaaS) paradigm. However, a number of questions about cloud-deployed applications inter-operability and cross-integration, stemming from multiple areas of computer science domains, have also been...

    Provided By Australian Computer Society

  • White Papers // May 2011

    Using Ontologies to Synchronize Change in Relational Database Systems

    Ontology is a building block of the semantic Web. Ontology building requires a detailed domain analysis, which in turn requires financial resources, intensive domain knowledge and time. Domain models in industry are frequently stored as relational database schemas in relational databases. An ontology base underlying such schemas can represent concepts...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Document Logic: Risk Analysis of Business Processes Through Document Authenticity

    Document Logic is a simple yet powerful framework to infer risks in business processes. The authors focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. They have built a prototype of a system that checks document authenticity in...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Scheduling with Freshness and Performance Guarantees for Web Applications in the Cloud

    Highly distributed data management platforms (e.g., PNUTS, Dynamo, Cassandra, and BigTable) are rapidly becoming the favorite choice for hosting modern web applications in the cloud. Among other features, these platforms rely on data partitioning, replication and relaxed consistency to achieve high levels of performance and scalability. However, these design choices...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Privacy and Anonymity in Untrusted Data Stores

    In this paper the authors describe a security problem involving an online data repository, which acts as a proxy for multiple companies allowing their customers to perform online services (e.g., pay invoices). The repository's host is trusted to honestly fulfill its duties in maintaining the data in a manner consistent...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    A System for Managing Data Provenance in In Silico Experiments

    In silico experiments use computers or computer simulation to speed up the rate at which scientific discoveries are made. However, the voluminous amounts of data generated in such experiments are often recorded in an ad hoc manner without regard to work-flow, and often lacks rigorous business rules. The absence of...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Designing and Developing a Modern Distributed Data Acquisition and Monitoring System

    In this paper the authors introduce new control system aspects used for designing and implementing a distributed data acquisition and monitoring software system. These aspects are proposed according to OPC technologies and XML as standards for interfaces, functionalities, and architectures. The proposed system allows the authors to easily aggregate existing...

    Provided By Australian Computer Society

  • White Papers // Oct 2010

    The Crowd in the Cloud: Moving Beyond Traditional Boundaries for Large Scale Experiences in the Cloud

    In this paper the authors propose a taxonomy for crowd based interaction paradigms, and categorize the literature according to this taxonomy. The conventional definition of crowds needs to be reconsidered in the light of advances in communication technology such as smart phones and cloud based infrastructures. They have extended the...

    Provided By Australian Computer Society

  • White Papers // Sep 2010

    Classification of Malware Using Structured Control Flow

    Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great benefit in early detection. Control flow has been proposed as a characteristic that can be identified across variants, resulting in flow-graph based malware classification. Static analysis is widely used for the classification but...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The E-Decisional Community: An Integrated Knowledge Sharing Platform

    The Knowledge Management (KM) has become a key success factor in diverse fields, given the importance of knowledge as a significant organizational asset. In order to solve problems and support complex decision-making processes, knowledge and experience have to be transmitted across individuals, business units and organizations. Thus, Knowledge Sharing (KS)...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    A Technology to Expose a Cluster as a Service in a Cloud

    Clouds refer to computational resources (in particular, clusters) that are accessible as scalable, on demand, pay-as-the user-go services provided in the internet. However, clouds are in their infancy and lack a high level abstraction. Specifically, there is no effective discovery and selection service for clusters and offer little to no...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The Effect of User Interface Delay in Thin Client Mobile Games

    Thin-client computing may be a solution to such problems as providing sophisticated applications on devices with low computational power, or providing reasonable access to digital artifacts whose distribution the copyright owner still wishes to protect. However, certain application domains have tight constraints around user interface response times, and the network...

    Provided By Australian Computer Society

  • White Papers // May 2010

    A Query System for XML Data Stream and its Semantics-based Buffer Reduction

    With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buffer scale may increase exponentially, which can cause memory bottleneck. Some optimization techniques have been proposed to solve the problem. However, the limit of...

    Provided By Australian Computer Society

  • White Papers // Sep 2010

    Classification of Malware Using Structured Control Flow

    Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great benefit in early detection. Control flow has been proposed as a characteristic that can be identified across variants, resulting in flow-graph based malware classification. Static analysis is widely used for the classification but...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Aug 2007

    On the Correlation between Process Model Errors and Metrics

    Business Process Models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive application of process modeling in practice there are hardly empirical results available on quality aspects of process models. This paper aims to advance the understanding of this...

    Provided By Australian Computer Society

  • White Papers // Dec 2009

    A Conceptually Rich Model of Business Process Compliance

    In this paper, the authors extend the preliminary work developed elsewhere and investigate how to characterize many aspects of the compliance problem in Business Process Modeling. They first define a formal and conceptually rich language able to represent, and reason about, chains of reparational obligations of various types. Second, they...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Non-Functional Requirements in Business Process Modeling

    Business Process Modeling entails the capture of a set of tasks that invariably model the functional behavior of a system. Another aspect of Business Process Modeling involves the accurate capture of operational behavior and the associated process constraints. Whether the process is automated or manual, such operational constraints and behavior...

    Provided By Australian Computer Society

  • White Papers // Apr 2008

    Deploying Access Control in Distributed Workflow

    Workflows are operational business processes. Work-Flow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there has been a trend to integrate WFMS in distributed inter-organizational systems. In this case malfunctioning of one WFMS can affect more than one organization, making the correct...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    How to Manage Spatio-Temporal Events in Relational Databases

    In this paper, the authors discuss the need for Event-Condition-Action (ECA) rules in spatio-temporal databases and outline a generic scenario for them. A proposal for the implementation of ECA rules is then presented in which several implementation alternatives for different spatio-temporal rule types are considered. Through a series of experiments,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Access Control: What Is Required in Business Collaboration?

    Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralized systems; however, unique and challenging security issues concerning collaboration in the context of Service Oriented Computing (SOC) have arisen due to the dynamic and loosely coupled...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Document Logic: Risk Analysis of Business Processes Through Document Authenticity

    Document Logic is a simple yet powerful framework to infer risks in business processes. The authors focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. They have built a prototype of a system that checks document authenticity in...

    Provided By Australian Computer Society

  • White Papers // Apr 2008

    Integrating Privacy Policies into Business Processes

    The increased interest around business processes management and modeling techniques has brought many organizations to make significant investments in business process modeling projects. One of the most recent proposal for a new business process modeling technique is the Business Process Modeling Notation (BPMN). Often, the modeled business processes involve sensible...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Robust WYSIWYS: A Method for Ensuring that What You See is What You Sign

    The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or intentional malfunctioning has the potential of wrongly imposing...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes

    Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators can often be used to establish a view of regular usage patterns which can then be examined for unusual occurrences. This paper describes one such method...

    Provided By Australian Computer Society

  • White Papers // Oct 2008

    ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns

    Share-frequent pattern mining discovers more useful and realistic knowledge from database compared to the traditional frequent pattern mining by considering the non-binary frequency values of items in trans-actions. Therefore, recently share-frequent pattern mining problem becomes a very important research issue in data mining and knowledge discovery. Existing algorithms of share-frequent...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Beyond Purpose-Based Privacy Access Control

    Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central concept on which access decisions are made. A complexity of purpose and users role hierarchies is utilized to manage the mapping between users and purposes. In...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Establishing an XML Metadata Knowledge Base to Assist Integration of Structured and Semi-structured Databases

    This paper describes the establishment of an XML Metadata Knowledge Base (XMKB) to assist integration of distributed heterogeneous structured data residing in relational databases and semi-structured data held in well-formed XML documents (XML documents that conform to the XML syntax rules but have no referenced DTD or XML schema) produced...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Towards a Decision Model Based on Trust and Security Risk Management

    From choosing the daily lunch menu to buying or selling stock options, decisions have to be made every day. In general, due to incomplete information, making a decision carries a risk. Typically, such risks are mitigated through risk management. However, risk is not the only element involved in the decision...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Extraction of Flat and Nested Data Records from Web Pages

    This paper deals with studies the problem of identification and extraction of flat and nested data records from a given web page. With the explosive growth of information sources available on the World Wide Web, it has become increasingly difficult to identify the relevant pieces of information, since web pages...

    Provided By Australian Computer Society

  • White Papers // Oct 2008

    An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems

    Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication and identity management in the early implementations were, and sometimes still are, vulnerable to various attacks such as phishing. Current state-of-the art solutions include methods for re-authenticating users...

    Provided By Australian Computer Society

  • White Papers // Oct 2008

    Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing

    In this paper, the authors propose a framework to combine Knowledge Management and context-aware and pervasive computing, emphasizing on synchronization and adaptation issues of workflow processes in mobile settings. The key aspect of the proposed framework is to enable adaptive, two-way interaction between context aware systems and users in mobile...

    Provided By Australian Computer Society

  • White Papers // Oct 2006

    The Privacy of K-NN Retrieval for Horizontal Partitioned Data - New Methods and Applications

    Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retrieval operation for many data mining algorithms, especially clustering and k-NN classification. The algorithms that efficiently support k-NN queries are of special interest. The authors show how...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    A New Efficient Privacy-Preserving Scalar Product Protocol

    Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically represented as attribute-vectors and, for many applications; the scalar (dot) product is one of the fundamental operations that is repeatedly used. In privacy-preserving data mining,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    A Proposal for an Effective Information Flow Control Model for Sharing and Protecting Sensitive Information

    As the use of IT systems and the internet for social infrastructure such as e-commerce and e-government increases, leaks of sensitive company information and personal private information is becoming a serious problem. Information leakage has become a serious problem for computer systems that handle a company's sensitive information, such as...

    Provided By Australian Computer Society

  • White Papers // Jul 2007

    Capturing Users' Everyday, Implicit Information Integration Decisions

    Integration of large databases by expert teams is only a small part of the data integration activities that take place. Users without data integration expertise very often gather, organize, reconcile, and use diverse information as a normal part of their jobs. Often, they do this by copying data into a...

    Provided By Australian Computer Society

  • White Papers // Jan 2007

    HAT-Trie: A Cache-Conscious Trie-Based Data Structure for Strings

    Tries are the fastest tree-based data structures for managing strings in-memory, but are space-intensive. The burst-trie is almost as fast but reduces space by collapsing trie-chains into buckets. This is not how-ever, a cache-conscious approach and can lead to poor performance on current processors. In this paper, the authors introduce...

    Provided By Australian Computer Society

  • White Papers // Oct 2006

    Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research

    An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is being used to provide a scalable and extensible basis for the cyberinfrastructure, and X-ray diffraction is targeted as an ideal development domain. Australian research is enhancing the...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Transformation and Reaction Rules for Data on the Web

    The transformation and manipulation of XML is an increasingly important research topic. This paper examines a number of issues with regard to languages for transforming and reacting to changes on XML data. On the transformation side, the authors focus on XSLT, a powerful language for converting XML data into other...

    Provided By Australian Computer Society

  • White Papers // Oct 2006

    Merging Dynamic Functionality: Integration of XML Transformations

    Integration of XML data is an increasingly important problem and many methods have recently been developed. In this paper, the authors examine the related and more challenging task of how to integrate XSLT programs. XSLT is a primary language for XML transformation. Program integration can be particularly important for server-side...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Cooperative Query Answering for Semistructured Data

    Semi-structured data, in particular XML, has emerged as one of the primary means for information exchange and content management. The power of XML allows authors to structure a document in a way which precisely captures the semantics of the data. This, however, poses a substantial barrier to casual and non-expert...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    CSC: Supporting Queries on Compressed Cached XML

    Whenever a client frequently has to retrieve, to query and to locally transform large parts of a huge XML document that is stored on a remote web information server, data exchange from the server to the client may become a serious bottleneck that simply limits scaling of the amount of...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    State Aware WSDL

    With the recent innovations in stateful web services, they are now being used to support the construction of distributed systems using software as a service. While the state of web services is preserved, the state is still hidden from clients thus searches for both functionality and state remains a two...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    CURIO : A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets

    Outlier (or anomaly) detection is an important problem for many domains, including fraud detection, risk analysis, network intrusion and medical diagnosis, and the discovery of significant outliers is becoming an integral aspect of data mining. This paper presents CURIO, a novel algorithm that uses quantization and implied distance metrics to...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery

    XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, the authors address how to optimally query encrypted XML documents using XQuery, with the key point being how to eliminate redundant decryption so as to accelerate the querying. They propose...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Efficient XQuery Join Processing in Publish/Subscribe Systems

    Efficient XML filtering has been a fundamental technique in recent web service and XML publish/subscribe applications. In this paper, the authors consider the problem of filtering a continuous stream of XML data against a large number of XQuery queries that contain multiple inter-document value-based join operations in their where clauses....

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    Discovering Frequent Sets from Data Streams with CPU Constraint

    Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recognized that mining over streaming data requires the problem of limited computational resources to be adequately addressed. Since the arrival rate of data streams can...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Elliptic Indexing of Multidimensional Databases

    In this paper an R-tree variant, which uses minimum volume covering ellipsoids instead of usual minimum bounding rectangles, is presented. The most significant aspects, which determine R-tree index structure performance, are an amount of dead space coverage and overlaps among the covering regions. Intuitively, ellipsoid as a quadratic surface should...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Computer Assisted Assessment of SQL Query Skills

    The Structured Query Language (SQL) is the dominant language for querying relational databases today, and is an essential topic in introductory database courses in higher education. Even though the language is syntactically simple, relatively concise, and highly structured, students experience many difficulties while learning to express queries in SQL. In...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Nov 2007

    Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling

    In this paper the authors differentiate between the conceptual models used for data modeling, knowledge modeling, and ontology modeling. It next examines the problem of developing a conceptual model for ontology. It provides a notation that can be used for representing the conceptual models. A great deal of discussion has...

    Provided By Australian Computer Society