Australian Computer Society

Displaying 1-40 of 86 results

  • White Papers // May 2013

    Finding Skylines for Incomplete Data

    In the last decade, skyline queries have been extensively studied for different domains because of their wide applications in multi-criteria decision making and search space pruning. A skyline query returns all the interesting points in a multi-dimensional data set that are not dominated by any other point with respect to...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Peer-to-Peer Data Mining Classifiers for Decentralized Detection of Network Attacks

    Data mining aims to extract from huge amount of data stochastic theories, called knowledge models, to explain or predict complex phenomenon. In this paper the authors propose new distributed data mining algorithms to recognize network attacks against a set of devices from statistic data generated locally by each device according...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Cloud-Aware Processing of MapReduce-Based OLAP Applications

    As the volume of data to be processed in a timely manner soars, the scale of computing and storage systems has much trouble keeping up with such a rate of explosive data growth. A hybrid cloud combining two or more clouds is emerging as an appealing alternative to expand local/private...

    Provided By Australian Computer Society

  • White Papers // May 2013

    User Awareness and Policy Compliance of Data Privacy in Cloud Computing

    Cloud computing is promising many technical benefits such as enhanced scalability, computing elasticity, and cost efficiency. However, with the benefits of cloud-based, hosted software platforms also comes the responsibility to data privacy. This paper investigates the data privacy issues brought about by cloud computing from an Australian perspective with specific...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Non-blocking Parallel Subset Construction on Shared-memory Multicore Architectures

    The authors discuss ways to effectively parallelize the sub-set construction algorithm, which is used to convert Non-deterministic Finite Automata (NFAs) to Deterministic Finite Automata (DFAs). This conversion is at the heart of string pattern matching based on regular expressions and thus has many applications in text processing, compilers, scripting languages...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Anatomy of Drive-by Download Attack

    Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Simseer and Bugwise - Web Services for Binary-level Software Similarity and Defect Detection

    Simseer and bugwise are online web services that perform binary program analysis: simseer identifies similarity between submitted executables based on similarity in the control flow of each binary. A software similarity service provides benefit in identifying malware variants and families, discovering software theft, and revealing plagiarism of software programs. Simseer...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Request Oriented Model for Web Services

    The existing service modeling methodologies, such as WSDL and OWL-S, are service-oriented, which mainly focus on providing formalisms for the important features of a web service, including its functionality and QoS parameters. Conforming to these models, users need to first find what the available services are, go through the descriptions,...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Dynamic, Decentralised Search Algorithm for Efficient Data Retrieval in a Distributed Tuple Space

    In this paper, the authors present an algorithm which may be used to efficiently search for and retrieve tuples in a distributed tuple space. The algorithm, a core part of the Tupleware system, is based on the success or failure of previous tuple requests to remote nodes in the system,...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Scaling Up Transit Priority Modelling Using High-Throughput Computing

    The optimization of Road Space Allocation (RSA) from a network perspective is computationally challenging. An analogue to the Network Design Problem (NDP), RSA can be classified NP-hard. In large-scale networks when the number of alternatives increases exponentially, there is a need for an efficient method to reduce the number of...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Efficient Identity-based Signcryption without Random Oracles

    In this paper, the authors propose a new Identity-Based SignCryption (IBSC) scheme in the standard model. Their scheme shows an improvement of approximately 40% reduction in the ciphertext size when compared to the previously proposed IBSC schemes in the standard model. Further, they argue that the previous IBSC schemes do...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Transformation and Reaction Rules for Data on the Web

    The transformation and manipulation of XML is an increasingly important research topic. This paper examines a number of issues with regard to languages for transforming and reacting to changes on XML data. On the transformation side, the authors focus on XSLT, a powerful language for converting XML data into other...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Cooperative Query Answering for Semistructured Data

    Semi-structured data, in particular XML, has emerged as one of the primary means for information exchange and content management. The power of XML allows authors to structure a document in a way which precisely captures the semantics of the data. This, however, poses a substantial barrier to casual and non-expert...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes

    Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators can often be used to establish a view of regular usage patterns which can then be examined for unusual occurrences. This paper describes one such method...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Non-Functional Requirements in Business Process Modeling

    Business Process Modeling entails the capture of a set of tasks that invariably model the functional behavior of a system. Another aspect of Business Process Modeling involves the accurate capture of operational behavior and the associated process constraints. Whether the process is automated or manual, such operational constraints and behavior...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Robust WYSIWYS: A Method for Ensuring that What You See is What You Sign

    The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or intentional malfunctioning has the potential of wrongly imposing...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Optimised X-HYBRIDJOIN for Near-Real-Time Data Warehousing

    Stream-based join algorithms are needed in modern near-real-time data warehouses. A particular class of stream-based join algorithms, with MESHJOIN as a typical example, computes the join between a stream and a disk-based relation. Recently the authors have presented a new algorithm X-HYBRIDJOIN (EXtended HYBRID JOIN) in that class. X-HYBRIDJOIN achieves...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Energy Efficiency for MapReduce Workloads: An In-depth Study

    The energy efficiency has emerged as a crucial optimization goal in data centers. MapReduce has become a popular and even fashionable distributed processing model for parallel computing in data centers. Hadoop is an open-source implementation of MapReduce, which is widely used for short jobs requiring low response time. In this...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Managing Large Numbers of Business Processes with Cloud Workflow Systems

    With the emergence of cloud computing which can deliver on-demand high-performance computing resources over the Internet, cloud workflow systems offer a competitive software solution for managing large numbers of business processes. In this paper, the authors first analyze the basic system requirements through a motivating example, and then, the general...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Evaluating Semantic Browsers for Consuming Linked Data

    The value of a single dataset is increased when it is linked to combinations of datasets to provide users with more information. Linked data is a style of publishing data on the web by using a structured machine-readable format, RDF, and semantically typed relations to connect related data. Its structured...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Indexing RFID Data Using the VG-Curve

    Existing methods for the management of multi-dimensional data typically do not scale well with an increased number of dimensions or require the unsupported augmentation of the kernel. However, the use of multidimensional data continues to grow in modern database applications, specifically in spatio-temporal databases. These systems produce vast volumes of...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    How to Manage Spatio-Temporal Events in Relational Databases

    In this paper, the authors discuss the need for Event-Condition-Action (ECA) rules in spatio-temporal databases and outline a generic scenario for them. A proposal for the implementation of ECA rules is then presented in which several implementation alternatives for different spatio-temporal rule types are considered. Through a series of experiments,...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

    Cloud computing technologies have recently gained momentum and moved from a hyped trend to a mature set of technological innovations providing an infrastructure for the Software-as-a-Service (SaaS) paradigm. However, a number of questions about cloud-deployed applications inter-operability and cross-integration, stemming from multiple areas of computer science domains, have also been...

    Provided By Australian Computer Society

  • White Papers // May 2011

    Using Ontologies to Synchronize Change in Relational Database Systems

    Ontology is a building block of the semantic Web. Ontology building requires a detailed domain analysis, which in turn requires financial resources, intensive domain knowledge and time. Domain models in industry are frequently stored as relational database schemas in relational databases. An ontology base underlying such schemas can represent concepts...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Document Logic: Risk Analysis of Business Processes Through Document Authenticity

    Document Logic is a simple yet powerful framework to infer risks in business processes. The authors focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. They have built a prototype of a system that checks document authenticity in...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Scheduling with Freshness and Performance Guarantees for Web Applications in the Cloud

    Highly distributed data management platforms (e.g., PNUTS, Dynamo, Cassandra, and BigTable) are rapidly becoming the favorite choice for hosting modern web applications in the cloud. Among other features, these platforms rely on data partitioning, replication and relaxed consistency to achieve high levels of performance and scalability. However, these design choices...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Privacy and Anonymity in Untrusted Data Stores

    In this paper the authors describe a security problem involving an online data repository, which acts as a proxy for multiple companies allowing their customers to perform online services (e.g., pay invoices). The repository's host is trusted to honestly fulfill its duties in maintaining the data in a manner consistent...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Designing and Developing a Modern Distributed Data Acquisition and Monitoring System

    In this paper the authors introduce new control system aspects used for designing and implementing a distributed data acquisition and monitoring software system. These aspects are proposed according to OPC technologies and XML as standards for interfaces, functionalities, and architectures. The proposed system allows the authors to easily aggregate existing...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    A System for Managing Data Provenance in In Silico Experiments

    In silico experiments use computers or computer simulation to speed up the rate at which scientific discoveries are made. However, the voluminous amounts of data generated in such experiments are often recorded in an ad hoc manner without regard to work-flow, and often lacks rigorous business rules. The absence of...

    Provided By Australian Computer Society

  • White Papers // Oct 2010

    The Crowd in the Cloud: Moving Beyond Traditional Boundaries for Large Scale Experiences in the Cloud

    In this paper the authors propose a taxonomy for crowd based interaction paradigms, and categorize the literature according to this taxonomy. The conventional definition of crowds needs to be reconsidered in the light of advances in communication technology such as smart phones and cloud based infrastructures. They have extended the...

    Provided By Australian Computer Society

  • White Papers // Sep 2010

    Classification of Malware Using Structured Control Flow

    Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great benefit in early detection. Control flow has been proposed as a characteristic that can be identified across variants, resulting in flow-graph based malware classification. Static analysis is widely used for the classification but...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The E-Decisional Community: An Integrated Knowledge Sharing Platform

    The Knowledge Management (KM) has become a key success factor in diverse fields, given the importance of knowledge as a significant organizational asset. In order to solve problems and support complex decision-making processes, knowledge and experience have to be transmitted across individuals, business units and organizations. Thus, Knowledge Sharing (KS)...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The Effect of User Interface Delay in Thin Client Mobile Games

    Thin-client computing may be a solution to such problems as providing sophisticated applications on devices with low computational power, or providing reasonable access to digital artifacts whose distribution the copyright owner still wishes to protect. However, certain application domains have tight constraints around user interface response times, and the network...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    A Technology to Expose a Cluster as a Service in a Cloud

    Clouds refer to computational resources (in particular, clusters) that are accessible as scalable, on demand, pay-as-the user-go services provided in the internet. However, clouds are in their infancy and lack a high level abstraction. Specifically, there is no effective discovery and selection service for clusters and offer little to no...

    Provided By Australian Computer Society

  • White Papers // May 2010

    A Query System for XML Data Stream and its Semantics-based Buffer Reduction

    With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buffer scale may increase exponentially, which can cause memory bottleneck. Some optimization techniques have been proposed to solve the problem. However, the limit of...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Spreadsheet Visualisation to Improve End-User Understanding

    Spreadsheets are an extremely common form of end-user programming that have many applications, from calculating student marks to accounting for global multinationals. Ways of studying the structure of a spreadsheet itself are normally constrained to the tools provided in the spreadsheet software. This paper explores new ways to visualise spreadsheets...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    iAnnotate: Exploring Multi-User Ink Annotation in Web Browsers

    This paper presents iAnnotate, a tool that provides multi-user digital ink annotation on standard web pages within a commercial browser. The annotation can be saved, retrieved and shared with others via a URL. In addition multiple users' annotations can be displayed on the same page. The paper describes the design...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    A Domain Specific Language for Execution Profiling & Regulation

    Profiling is the process of gathering information about a runtime system to determine the performance of the system under certain circumstances. This information can be used to reveal areas of the system that are computationally intensive. Profiling consists of three stages: the collection of performance data, the processing of that...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Middleware for Context Sensitive Mobile Applications

    Contextual information such as spatial location can significantly enhance the utility of mobile applications. This paper introduces the concept of active preferences that represent a combination of user preference information and choices combined with spatial or temporal information. Active preferences set the policy on how a mobile application should customise...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Efficient Management of XML Documents

    XML has become a de facto standard for data representation and exchange on the World-Wide-Web. Unlike HTML tags that are mainly used to describe presentations, tags in XML capture some semantics, especially when domain-specific common DTDs are used when authoring XML documents. Since industries are indeed enthusiastic about XML, and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Optimizing the Lazy DFA Approach for XML Stream Processing

    Lazy DFA (Deterministic Finite Automata) approach has been recently proposed to for efficient XML stream data processing. This paper discusses the drawbacks of the approach, suggests several optimizations as solutions, and presents a detailed analysis for the processing model. The experiments show that the proposed approach is indeed effective and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Visualising Java Data Structures as Graphs

    This paper presents a simple, general-purpose tool for visualising Java data structures. The tool uses Java reflection and an open-source graph drawing program to produce text-book quality depictions of arbitrary Java objects. The tool offers certain pedagogical advantages over other "Heavy-Weight" visualisation systems. Its simplicity and generality means that students...

    Provided By Australian Computer Society

  • White Papers // Jan 2009

    Mobile Information Exchange and Integration: From Query to Application Layer

    Due to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational database systems, numerous database engines have been ported to or built on these devices, for example, SQLite. Since connectivity can be unstable or slow,...

    Provided By Australian Computer Society

  • White Papers // Dec 2009

    Multi-Factor Password-Authenticated Key Exchange

    The authors consider a new form of authenticated key exchange which they call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Sep 2010

    Classification of Malware Using Structured Control Flow

    Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great benefit in early detection. Control flow has been proposed as a characteristic that can be identified across variants, resulting in flow-graph based malware classification. Static analysis is widely used for the classification but...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Aug 2007

    On the Correlation between Process Model Errors and Metrics

    Business Process Models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive application of process modeling in practice there are hardly empirical results available on quality aspects of process models. This paper aims to advance the understanding of this...

    Provided By Australian Computer Society

  • White Papers // Jan 2009

    Optimizing Tunneled Grid Connectivity Across Firewalls

    Grids today generally assume that concurrent network connections are possible among many processors attached to high-capacity networks. However, inter-network boundaries dividing independent institutions often have firewalls, typically to restrict how many and which ports are accessible. In some cases, ports are opened indefinitely for Grid applications, but this compromises security...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Network Access Control Configuration Management Using Semantic Web Techniques

    Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application domains. For example, a Network Access Control policy might be configured in terms of firewall, proxy, intrusion prevention and user-access policies. While defined separately, these security policies may...

    Provided By Australian Computer Society

  • White Papers // Oct 2006

    The Privacy of K-NN Retrieval for Horizontal Partitioned Data - New Methods and Applications

    Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retrieval operation for many data mining algorithms, especially clustering and k-NN classification. The algorithms that efficiently support k-NN queries are of special interest. The authors show how...

    Provided By Australian Computer Society

  • White Papers // Jul 2007

    Capturing Users' Everyday, Implicit Information Integration Decisions

    Integration of large databases by expert teams is only a small part of the data integration activities that take place. Users without data integration expertise very often gather, organize, reconcile, and use diverse information as a normal part of their jobs. Often, they do this by copying data into a...

    Provided By Australian Computer Society

  • White Papers // Jan 2007

    HAT-Trie: A Cache-Conscious Trie-Based Data Structure for Strings

    Tries are the fastest tree-based data structures for managing strings in-memory, but are space-intensive. The burst-trie is almost as fast but reduces space by collapsing trie-chains into buckets. This is not how-ever, a cache-conscious approach and can lead to poor performance on current processors. In this paper, the authors introduce...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    A New Efficient Privacy-Preserving Scalar Product Protocol

    Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically represented as attribute-vectors and, for many applications; the scalar (dot) product is one of the fundamental operations that is repeatedly used. In privacy-preserving data mining,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    A Proposal for an Effective Information Flow Control Model for Sharing and Protecting Sensitive Information

    As the use of IT systems and the internet for social infrastructure such as e-commerce and e-government increases, leaks of sensitive company information and personal private information is becoming a serious problem. Information leakage has become a serious problem for computer systems that handle a company's sensitive information, such as...

    Provided By Australian Computer Society

  • White Papers // Oct 2006

    Merging Dynamic Functionality: Integration of XML Transformations

    Integration of XML data is an increasingly important problem and many methods have recently been developed. In this paper, the authors examine the related and more challenging task of how to integrate XSLT programs. XSLT is a primary language for XML transformation. Program integration can be particularly important for server-side...

    Provided By Australian Computer Society

  • White Papers // Oct 2006

    Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research

    An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is being used to provide a scalable and extensible basis for the cyberinfrastructure, and X-ray diffraction is targeted as an ideal development domain. Australian research is enhancing the...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Transformation and Reaction Rules for Data on the Web

    The transformation and manipulation of XML is an increasingly important research topic. This paper examines a number of issues with regard to languages for transforming and reacting to changes on XML data. On the transformation side, the authors focus on XSLT, a powerful language for converting XML data into other...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    CSC: Supporting Queries on Compressed Cached XML

    Whenever a client frequently has to retrieve, to query and to locally transform large parts of a huge XML document that is stored on a remote web information server, data exchange from the server to the client may become a serious bottleneck that simply limits scaling of the amount of...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    State Aware WSDL

    With the recent innovations in stateful web services, they are now being used to support the construction of distributed systems using software as a service. While the state of web services is preserved, the state is still hidden from clients thus searches for both functionality and state remains a two...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Cooperative Query Answering for Semistructured Data

    Semi-structured data, in particular XML, has emerged as one of the primary means for information exchange and content management. The power of XML allows authors to structure a document in a way which precisely captures the semantics of the data. This, however, poses a substantial barrier to casual and non-expert...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Efficient XQuery Join Processing in Publish/Subscribe Systems

    Efficient XML filtering has been a fundamental technique in recent web service and XML publish/subscribe applications. In this paper, the authors consider the problem of filtering a continuous stream of XML data against a large number of XQuery queries that contain multiple inter-document value-based join operations in their where clauses....

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    CURIO : A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets

    Outlier (or anomaly) detection is an important problem for many domains, including fraud detection, risk analysis, network intrusion and medical diagnosis, and the discovery of significant outliers is becoming an integral aspect of data mining. This paper presents CURIO, a novel algorithm that uses quantization and implied distance metrics to...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery

    XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, the authors address how to optimally query encrypted XML documents using XQuery, with the key point being how to eliminate redundant decryption so as to accelerate the querying. They propose...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Elliptic Indexing of Multidimensional Databases

    In this paper an R-tree variant, which uses minimum volume covering ellipsoids instead of usual minimum bounding rectangles, is presented. The most significant aspects, which determine R-tree index structure performance, are an amount of dead space coverage and overlaps among the covering regions. Intuitively, ellipsoid as a quadratic surface should...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    Discovering Frequent Sets from Data Streams with CPU Constraint

    Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recognized that mining over streaming data requires the problem of limited computational resources to be adequately addressed. Since the arrival rate of data streams can...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Nov 2007

    Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling

    In this paper the authors differentiate between the conceptual models used for data modeling, knowledge modeling, and ontology modeling. It next examines the problem of developing a conceptual model for ontology. It provides a notation that can be used for representing the conceptual models. A great deal of discussion has...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    An Integrated Access Control for Securely Querying and Updating XML Data

    Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/or rewriting queries into safe ones each time a user requests a query or takes an action. In this paper, the authors propose a fine-grained access control model,...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Computer Assisted Assessment of SQL Query Skills

    The Structured Query Language (SQL) is the dominant language for querying relational databases today, and is an essential topic in introductory database courses in higher education. Even though the language is syntactically simple, relatively concise, and highly structured, students experience many difficulties while learning to express queries in SQL. In...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

    Cloud computing technologies have recently gained momentum and moved from a hyped trend to a mature set of technological innovations providing an infrastructure for the Software-as-a-Service (SaaS) paradigm. However, a number of questions about cloud-deployed applications inter-operability and cross-integration, stemming from multiple areas of computer science domains, have also been...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Availability Modeling and Evaluation on High Performance Cluster Computing Systems

    Cluster computing has been attracting more and more attention from both the industrial and the academic world for its enormous computing power and scalability. Beowulf type cluster, for example, is a typical High Performance Computing (HPC) cluster system. Availability, as a key attribute of the system, needs to be considered...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    An Investigation into Business-to-Business Electronic Commerce Organizations

    The issue of Information Technology (IT) investment evaluation in B2BEC (Business-To-Business Electronic Commerce) has generated a lot of interest and discussion among academics and researchers. This paper was undertaken to investigate the relationships between the level of IT maturity, the use of IT Investment Evaluation Methodology (IEM) and Benefits Realization...

    Provided By Australian Computer Society