Australian Computer Society

Displaying 1-40 of 292 results

  • White Papers // Jan 2015

    Towards An Ontology-Based Pivot Model for Spatio-Temporal Sources

    The spectacular evolution of sensor networks and the proliferation of location-sensing devices in daily life activities are leading to an explosion of disparate spatio-temporal data. The collected data describes the movement of mobile objects used to construct what everyone calls trajectory data. The diversity of these generated data has led...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    A Semi-supervised Topic-based User Model for Web Information Visualization

    Web graph is a very effective tool to visualize web information. To serve user specific visualization and to reduce the size, personalization is applied to web graphs, by integrating user interests in filtering, graph generation and clustering. Modelling of the user interests is the key aspect to achieve personalization. Keyword...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    On the Effectiveness of Virtualisation Assisted View Comparison for Rootkit Detection

    There is growing interest in tools for monitoring virtualization infrastructure and detecting malware within Virtual Machines (VMs). View comparison, or cross view validation, is a technique for detecting object hiding by malware. It involves comparing different views of system objects to and discrepancies that might indicate the use of object...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Breakfast with ICT Employers: What Do They Want to See in Our Graduates?

    In an increasingly globalized and competitive economy, there is a need to ensure that graduates have the skills, knowledge and attitudes to be not only work ready for today but work ready PLUS for tomorrow. Data from the graduate destination survey (2012) show that 75% of ICT students get a...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Enhancing Recommender Systems Using Linked Open Data-Based Semantic Analysis of Items

    The Linked Open Data (LOD) project is a community effort that aims to publish structured data using open and liberal licenses. The LOD cloud provides free access to datasets in diverse areas such as media, geography, publications and life sciences. These datasets are publicly available for machine and human consumption...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Temporal Attributes: Status and Subsumption

    Representing data that changes over time in conceptual data models is required by various application domains and requires a language that is expressive enough to fully capture the operational semantics of the time-varying information. Temporal modelling languages typically focus on representing and reasoning over temporal classes and relationships, but have...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Linked Data and Entity Search: A Brief History and Some Ways Ahead

    In this paper, the authors present a brief survey of the current efforts in the semantic Web literature with respect to the three research topics of linked data, semantic search and search interfaces. First they give a basic overview about linked data, discussing the concepts, principles and examples of relevant...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Linked Data Provenance: State of the Art and Challenges

    Linked Open Data (LOD) is rapidly emerging in publishing and sharing structured data over the semantic web using URIs (Uniform Resource Identifiers) and RDF (Resource Description Framework) in many application domains such as fisheries, health, environment, education and agriculture. Since different schemas that have the same semantics are found in...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Judgement and Analysis Rules for Ontology-driven Comparative Data Analysis in Data Warehouses

    Online analytical processing tools facilitate interactive inspection of aggregated measures of groups of data in data warehouses. In comparative data analysis, business analysts assess measures of a group of interest against measures of a group of comparison. Judgement rules annotate comparisons with background knowledge otherwise tacit to the business analyst....

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Validation of Expressive XML Keys with XML Schema and XQuery

    The eXtensible Markup Language (XML) is the de-facto industry standard for exchanging data on the Web and elsewhere. While the relational model of data enjoys a well-accepted definition of a key, several competing notions of keys exist in XML. These have complementary properties and therefore serve different applications domains. In...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    BPIM: A Multi-view Model for Business Process Instances

    Business process management has grown into a mature discipline supported by a large number of commercial and open source products, collectively referred to as Business Process Management Systems (BPMSs). Because most of the business processes are long-running, any data relating to a running instance of a business process need to...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Model-Driven Optimisation of Memory Hierarchy and Multithreading on GPUs

    Due to their potentially high peak performance and energy efficiency, GPUs (Graphics Processing Units) are increasingly popular for scientific computations. However, the complexity of the architecture makes it difficult to write code that achieves high performance. Two of the most important factors in achieving high performance are the usage of...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Effect of Similarity Distribution on the Convergence of Decentralized Similarity Overlays

    Decentralized systems are used by a significant number of Internet users due to their specific features such as autonomy and content privacy. With the evolution of big data, the problem of filtering information based on user interests has become prevalent. Decentralized strategies for information filtering, such as similarity clustering, seem...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Performance Evaluation of Parallel-processing Networked System with Linear Time Delay

    Time delays in system subcomponents or control may result into unacceptable system operation or uncertainty in specialized technical systems like aircraft control, plant control, robotics, etc. In parallel computing, different computing subunits share their tasks to balance loads to increase performance and throughput. To be able to do so, subsystems...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    A Stack-Based Concatenative Approach to Co-processor Simulation and Code Generation

    As users run to the end of the silicon roadmap, the rapidly escalating cost of design, fabrication and test in future systems-on-chip may justify a reevaluation of homogeneous reconfigurable mesh architectures. Ultimately, the geometric constraints of extreme nanoscale device layout may support only simple functional arrays with predominately nearest neighbor...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Adaptive Planning for Distributed Systems using Goal Accomplishment Tracking

    Goal accomplishment tracking is the process of monitoring the progress of a task or series of tasks towards completing a goal. Goal accomplishment tracking is used to monitor goal progress in a variety of domains, including workflow processing, teleoperation and industrial manufacturing. Practically, it involves the constant monitoring of task...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    An Accurate FPGA-Based Hardware Emulation on Quantum Fourier Transform

    Powerful parallelism is among the leading attractions towards quantum computing research. Before large-scale quantum computers become viable, the use of Field Programmable Gate Array (FPGA) technology which can mimic the behavior of quantum parallelism is vital. In this paper, a methodology to perform mapping of quantum algorithms for efficient quantum...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    On the Reliability and Energy Efficiency in Cloud Computing

    Cloud computing is the next major revolution in Information and Communication Technology (ICT) which uses virtualization technology to provide a powerful and flexible computing environment. With the popularity of cloud computing, it becomes crucial to provide on-demand services dynamically according to the user's requirements. Reliability and energy efficiency are two...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    DEWE: A Framework for Distributed Elastic Scientific Workflow Execution

    As cloud computing is increasingly adopted, the open, on-demand nature of public clouds makes explicit consideration of the underlying environment highly advantageous in terms of decreasing cost and increasing elasticity. In this paper, the authors address the exploitation of such cloud capabilities and present DEWE, a framework for the distributed,...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Recognizing Hand-drawn Glyphs from One Example and Four Lines of Code

    The biggest challenge in the development of gesture based user interfaces is the creation of a gesture recognizer. Existing approaches to support high-level recognition of glyphs require a lot of effort from developers are error prone and suffer from low recognition rates. The authors propose a tool that generates a...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    A Performance Model for Scalable Cloud Computing

    Cloud computing is a new paradigm that offers several advantages in terms of scalability, maintainability, high availability, efficiency and data processing. Infrastructure and applications are moved to the cloud and provided as a pay-for-use service. When designing a cloud infrastructure, it is critical to assure beforehand that the system will...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Hypervisor-based Security Architecture to Protect Web Applications

    Web based applications are very common now-a-days where almost every software can be accessible through a web browser in one form or the other. This paper proposes techniques to detect different threats related to web applications by using hypervisor-based security architecture. The proposed architecture leverages the hypervisor's visibility of the...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    The Effectiveness of Transient User Interface Components

    With small screen devices, including mobile and tablet based systems, becoming more common, the effective use of available screen space has become a critical skill in the design of user interfaces. Transient interface components are one technique that allows for a more complex interface to be displayed, in the form...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Hardware Trojans - A Systemic Threat

    Hardware Trojans are a systemic threat that can impact the operations and infrastructure of corporations and government organizations. In this paper, the authors evaluate a credible and organization-wide hardware Trojan threat from compromised network cards. Their research examines the systemic threat of hardware Trojans with an actual hardware Trojan implementation...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    Potentiality of Power Management on Database Systems with Power Saving Function of Disk Drives

    Power consumption of modern datacenters is increasing rapidly. Databases, especially OLTPs (Online Transaction Processing Systems), have become a major application at datacenters. Therefore, power-saving management for OLTP applications has become an important task for user budgets and datacenter operations. A recent report described that disk drives consume about 70% of...

    Provided By Australian Computer Society

  • White Papers // Jan 2015

    On Inferences of Full Hierarchical Dependencies

    Full Hierarchical Dependencies (FHDs) constitute a large class of relational dependencies. A relation exhibits an FHD precisely when it can be decomposed into at least two of its projections without loss of information. Therefore, FHDs generalize MultiValued Dependencies (MVDs) in which case the number of these projections is precisely two....

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    SQL-Sampler: A Tool to Visualize and Consolidate Domain Semantics by Perfect SQL Sample Data

    SQL (Structured Query Language) database designs can result from methodologies such as UML (Unified Modeling Language) or entity-relationship modeling, description logic specifications, or relational normalization. Independently from the methodology, the use of good sample data is promoted by academia and commercial database design tools to visualize validate and consolidate the...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Effects of 3D Display Technologies on Spatial Memory

    Spatial memory has been recognized as an important factor in efficient human-computer interaction. However, most previous studies are limited to very simple depth cues and 2D displays. The authors present a study investigating the effects of head-coupled perspective, stereoscopy and simple landmarks on spatial memory by measuring performance and accuracy...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Developmental Directions in Parallel Accelerators

    Parallel accelerators such as massively-cored graphical processing units or many-cored co-processors such as the Xeon Phi are becoming widespread and affordable on many systems including blade servers and even desktops. The use of a single such accelerator is now quite common for many applications, but the use of multiple devices...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Shape Predicates Allow Unbounded Verification of Linearizability Using Canonical Abstraction

    Canonical abstraction is a static analysis technique that represents states as 3-valued logical structures and is able to construct finite representations of systems with infinite statespaces for verification. The granularity of the abstraction can be altered by the definition of instrumentation predicates, which derive their meaning from other predicates. The...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments

    A business process fragment is a portion of a business process, more commonly designed for reuse purposes. Fragments are intended to be declared as safe from a privacy perspective, when manipulated in an open context. Privacy is related to the authority to have a view on some sensitive information. A...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    A Multi-tier Client-Server Project Employing Mobile Clients

    The current generation of computer science students are far more likely to engage with computer networking through their own mobile, wireless devices than they are using wired, desktop computers. Traditional approaches to teaching computer networking evolved when the Internet was composed of fixed wired infrastructure and this historical background still...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    An Adaptive Aggregate Maintenance Approach for Mixed Workloads in Columnar In-Memory Databases

    The mixed database workloads generated by enterprise applications can be categorized into short running transactional as well as long-running analytical queries with resource-intensive data aggregations. The introduction of materialized views can accelerate the execution of aggregate queries significantly. However, the overhead of materialized view maintenance has to be taken into...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    DAC: Database Application Context Analysis applied to Enterprise Applications

    In today's fast-paced business environment, everyone see an ongoing trend towards the need for analytics on the latest operational data. The data management layer of enterprise applications needs to adapt to this requirement and in-memory column stores have been proposed as a new architecture that can handle such mixed workload...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Difference Computation for Grammar-Compressed XML Data

    Whenever web data processing requires the storage or the exchange of multiple versions of big XML (eXtensible Markup Language) data collections and the pure size of big XML data becomes a bottleneck in storage or fast data exchange over the web, XML compression and XML version control may become significant...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Keyword Search on DAG-Compressed XML Data

    With the growing size of publicly available XML (eXtensible Markup Language) document collections, fast keyword search becomes increasingly important. The authors present an indexing and keyword search technique that is suitable for DAG (Directed Acyclic Graph) compressed data and has the advantage that common subtrees have to be searched only...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    A Load-Balanced MapReduce Algorithm for Blocking-based Entity-resolution with Multiple Keys

    Entity Resolution (ER), which detects records referring to the same entity across data sources, is a long-lasting challenge in database management research. The sheer volume of data collections today calls for the need of a blocking-based ER algorithm using the MapReduce framework for cloud computing. Most studies on blocking-based ER...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Communication Delegation Method for Exascale Systems

    High Performance Computing is trending towards exascale and some of the major barriers of high performance computing or scientific computing are dominated by latencies incurred due to storage, communication and component failures. In this paper, the authors discuss a technique to overcome one of those obstacles: latency incurred due to...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Efficient Parallel Algorithms for the Maximum Subarray Problem

    Parallel algorithm design is generally hard. Parallel program verification is even harder. The authors take an example from the maximum subarray problem and show those two problems of design and verification. The best known communication steps for mesh architecture for the maximum subarray problem are 2n - 1. They give...

    Provided By Australian Computer Society

  • White Papers // Jan 2014

    Hypervisor-based Security Architecture for Validating DNS Services (Poster)

    Domain Name System (DNS) is one of the critical services in the current Internet infrastructure. However DNS is vulnerable to a range of attacks. One of the fundamental weaknesses with the existing DNS protocols is that the request and response messages are transmitted on the network as plain text. This...

    Provided By Australian Computer Society

  • White Papers // Dec 2009

    Multi-Factor Password-Authenticated Key Exchange

    The authors consider a new form of authenticated key exchange which they call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Middleware for Context Sensitive Mobile Applications

    Contextual information such as spatial location can significantly enhance the utility of mobile applications. This paper introduces the concept of active preferences that represent a combination of user preference information and choices combined with spatial or temporal information. Active preferences set the policy on how a mobile application should customise...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Optimizing the Lazy DFA Approach for XML Stream Processing

    Lazy DFA (Deterministic Finite Automata) approach has been recently proposed to for efficient XML stream data processing. This paper discusses the drawbacks of the approach, suggests several optimizations as solutions, and presents a detailed analysis for the processing model. The experiments show that the proposed approach is indeed effective and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Efficient Management of XML Documents

    XML has become a de facto standard for data representation and exchange on the World-Wide-Web. Unlike HTML tags that are mainly used to describe presentations, tags in XML capture some semantics, especially when domain-specific common DTDs are used when authoring XML documents. Since industries are indeed enthusiastic about XML, and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Visualising Java Data Structures as Graphs

    This paper presents a simple, general-purpose tool for visualising Java data structures. The tool uses Java reflection and an open-source graph drawing program to produce text-book quality depictions of arbitrary Java objects. The tool offers certain pedagogical advantages over other "Heavy-Weight" visualisation systems. Its simplicity and generality means that students...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Spreadsheet Visualisation to Improve End-User Understanding

    Spreadsheets are an extremely common form of end-user programming that have many applications, from calculating student marks to accounting for global multinationals. Ways of studying the structure of a spreadsheet itself are normally constrained to the tools provided in the spreadsheet software. This paper explores new ways to visualise spreadsheets...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    iAnnotate: Exploring Multi-User Ink Annotation in Web Browsers

    This paper presents iAnnotate, a tool that provides multi-user digital ink annotation on standard web pages within a commercial browser. The annotation can be saved, retrieved and shared with others via a URL. In addition multiple users' annotations can be displayed on the same page. The paper describes the design...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Sep 2010

    Classification of Malware Using Structured Control Flow

    Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great benefit in early detection. Control flow has been proposed as a characteristic that can be identified across variants, resulting in flow-graph based malware classification. Static analysis is widely used for the classification but...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Robust WYSIWYS: A Method for Ensuring that What You See is What You Sign

    The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or intentional malfunctioning has the potential of wrongly imposing...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Non-Functional Requirements in Business Process Modeling

    Business Process Modeling entails the capture of a set of tasks that invariably model the functional behavior of a system. Another aspect of Business Process Modeling involves the accurate capture of operational behavior and the associated process constraints. Whether the process is automated or manual, such operational constraints and behavior...

    Provided By Australian Computer Society

  • White Papers // Dec 2009

    A Conceptually Rich Model of Business Process Compliance

    In this paper, the authors extend the preliminary work developed elsewhere and investigate how to characterize many aspects of the compliance problem in Business Process Modeling. They first define a formal and conceptually rich language able to represent, and reason about, chains of reparational obligations of various types. Second, they...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Document Logic: Risk Analysis of Business Processes Through Document Authenticity

    Document Logic is a simple yet powerful framework to infer risks in business processes. The authors focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. They have built a prototype of a system that checks document authenticity in...

    Provided By Australian Computer Society

  • White Papers // Aug 2007

    On the Correlation between Process Model Errors and Metrics

    Business Process Models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive application of process modeling in practice there are hardly empirical results available on quality aspects of process models. This paper aims to advance the understanding of this...

    Provided By Australian Computer Society

  • White Papers // Aug 2011

    CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

    Cloud computing technologies have recently gained momentum and moved from a hyped trend to a mature set of technological innovations providing an infrastructure for the Software-as-a-Service (SaaS) paradigm. However, a number of questions about cloud-deployed applications inter-operability and cross-integration, stemming from multiple areas of computer science domains, have also been...

    Provided By Australian Computer Society

  • White Papers // May 2011

    Using Ontologies to Synchronize Change in Relational Database Systems

    Ontology is a building block of the semantic Web. Ontology building requires a detailed domain analysis, which in turn requires financial resources, intensive domain knowledge and time. Domain models in industry are frequently stored as relational database schemas in relational databases. An ontology base underlying such schemas can represent concepts...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Designing and Developing a Modern Distributed Data Acquisition and Monitoring System

    In this paper the authors introduce new control system aspects used for designing and implementing a distributed data acquisition and monitoring software system. These aspects are proposed according to OPC technologies and XML as standards for interfaces, functionalities, and architectures. The proposed system allows the authors to easily aggregate existing...

    Provided By Australian Computer Society

  • White Papers // May 2010

    A Query System for XML Data Stream and its Semantics-based Buffer Reduction

    With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buffer scale may increase exponentially, which can cause memory bottleneck. Some optimization techniques have been proposed to solve the problem. However, the limit of...

    Provided By Australian Computer Society

  • White Papers // May 2009

    Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services

    Data warehouses manage historical information for the decision making process, and this information could be discovered by unauthorized users if security constraints are not established. It is therefore highly important for OLAP tools to consider the security rules defined at early stages of the development lifecycle. By following the MDA...

    Provided By Australian Computer Society

  • White Papers // Aug 2008

    A Privacy-Enhancing Architecture for Databases

    Innovative approaches to searching for hidden meaning in data have recently emerged. In some cases, however, the support of privacy is compromised and consistent privacy protection remains elusive. Privacy perceptions and requirements differ from person to person and over time, leading to diverse privacy preferences within a community. This paper...

    Provided By Australian Computer Society

  • White Papers // Feb 2008

    An Investigation into Business-to-Business Electronic Commerce Organizations

    The issue of Information Technology (IT) investment evaluation in B2BEC (Business-To-Business Electronic Commerce) has generated a lot of interest and discussion among academics and researchers. This paper was undertaken to investigate the relationships between the level of IT maturity, the use of IT Investment Evaluation Methodology (IEM) and Benefits Realization...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Availability Modeling and Evaluation on High Performance Cluster Computing Systems

    Cluster computing has been attracting more and more attention from both the industrial and the academic world for its enormous computing power and scalability. Beowulf type cluster, for example, is a typical High Performance Computing (HPC) cluster system. Availability, as a key attribute of the system, needs to be considered...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Access Control: What Is Required in Business Collaboration?

    Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralized systems; however, unique and challenging security issues concerning collaboration in the context of Service Oriented Computing (SOC) have arisen due to the dynamic and loosely coupled...

    Provided By Australian Computer Society

  • White Papers // Apr 2008

    Integrating Privacy Policies into Business Processes

    The increased interest around business processes management and modeling techniques has brought many organizations to make significant investments in business process modeling projects. One of the most recent proposal for a new business process modeling technique is the Business Process Modeling Notation (BPMN). Often, the modeled business processes involve sensible...

    Provided By Australian Computer Society

  • White Papers // Apr 2008

    Deploying Access Control in Distributed Workflow

    Workflows are operational business processes. Work-Flow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there has been a trend to integrate WFMS in distributed inter-organizational systems. In this case malfunctioning of one WFMS can affect more than one organization, making the correct...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    How to Manage Spatio-Temporal Events in Relational Databases

    In this paper, the authors discuss the need for Event-Condition-Action (ECA) rules in spatio-temporal databases and outline a generic scenario for them. A proposal for the implementation of ECA rules is then presented in which several implementation alternatives for different spatio-temporal rule types are considered. Through a series of experiments,...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    Discovering Frequent Sets from Data Streams with CPU Constraint

    Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recognized that mining over streaming data requires the problem of limited computational resources to be adequately addressed. Since the arrival rate of data streams can...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Elliptic Indexing of Multidimensional Databases

    In this paper an R-tree variant, which uses minimum volume covering ellipsoids instead of usual minimum bounding rectangles, is presented. The most significant aspects, which determine R-tree index structure performance, are an amount of dead space coverage and overlaps among the covering regions. Intuitively, ellipsoid as a quadratic surface should...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Computer Assisted Assessment of SQL Query Skills

    The Structured Query Language (SQL) is the dominant language for querying relational databases today, and is an essential topic in introductory database courses in higher education. Even though the language is syntactically simple, relatively concise, and highly structured, students experience many difficulties while learning to express queries in SQL. In...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Nov 2007

    Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling

    In this paper the authors differentiate between the conceptual models used for data modeling, knowledge modeling, and ontology modeling. It next examines the problem of developing a conceptual model for ontology. It provides a notation that can be used for representing the conceptual models. A great deal of discussion has...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    An Integrated Access Control for Securely Querying and Updating XML Data

    Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/or rewriting queries into safe ones each time a user requests a query or takes an action. In this paper, the authors propose a fine-grained access control model,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Efficient XQuery Join Processing in Publish/Subscribe Systems

    Efficient XML filtering has been a fundamental technique in recent web service and XML publish/subscribe applications. In this paper, the authors consider the problem of filtering a continuous stream of XML data against a large number of XQuery queries that contain multiple inter-document value-based join operations in their where clauses....

    Provided By Australian Computer Society

  • White Papers // Oct 2006

    The Privacy of K-NN Retrieval for Horizontal Partitioned Data - New Methods and Applications

    Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retrieval operation for many data mining algorithms, especially clustering and k-NN classification. The algorithms that efficiently support k-NN queries are of special interest. The authors show how...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    A New Efficient Privacy-Preserving Scalar Product Protocol

    Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically represented as attribute-vectors and, for many applications; the scalar (dot) product is one of the fundamental operations that is repeatedly used. In privacy-preserving data mining,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    A Proposal for an Effective Information Flow Control Model for Sharing and Protecting Sensitive Information

    As the use of IT systems and the internet for social infrastructure such as e-commerce and e-government increases, leaks of sensitive company information and personal private information is becoming a serious problem. Information leakage has become a serious problem for computer systems that handle a company's sensitive information, such as...

    Provided By Australian Computer Society

  • White Papers // Jul 2007

    Capturing Users' Everyday, Implicit Information Integration Decisions

    Integration of large databases by expert teams is only a small part of the data integration activities that take place. Users without data integration expertise very often gather, organize, reconcile, and use diverse information as a normal part of their jobs. Often, they do this by copying data into a...

    Provided By Australian Computer Society