Australian Computer Society

Displaying 1-40 of 79 results

  • White Papers // May 2013

    Peer-to-Peer Data Mining Classifiers for Decentralized Detection of Network Attacks

    Data mining aims to extract from huge amount of data stochastic theories, called knowledge models, to explain or predict complex phenomenon. In this paper the authors propose new distributed data mining algorithms to recognize network attacks against a set of devices from statistic data generated locally by each device according...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Finding Skylines for Incomplete Data

    In the last decade, skyline queries have been extensively studied for different domains because of their wide applications in multi-criteria decision making and search space pruning. A skyline query returns all the interesting points in a multi-dimensional data set that are not dominated by any other point with respect to...

    Provided By Australian Computer Society

  • White Papers // May 2013

    User Awareness and Policy Compliance of Data Privacy in Cloud Computing

    Cloud computing is promising many technical benefits such as enhanced scalability, computing elasticity, and cost efficiency. However, with the benefits of cloud-based, hosted software platforms also comes the responsibility to data privacy. This paper investigates the data privacy issues brought about by cloud computing from an Australian perspective with specific...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Cloud-Aware Processing of MapReduce-Based OLAP Applications

    As the volume of data to be processed in a timely manner soars, the scale of computing and storage systems has much trouble keeping up with such a rate of explosive data growth. A hybrid cloud combining two or more clouds is emerging as an appealing alternative to expand local/private...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Non-blocking Parallel Subset Construction on Shared-memory Multicore Architectures

    The authors discuss ways to effectively parallelize the sub-set construction algorithm, which is used to convert Non-deterministic Finite Automata (NFAs) to Deterministic Finite Automata (DFAs). This conversion is at the heart of string pattern matching based on regular expressions and thus has many applications in text processing, compilers, scripting languages...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Request Oriented Model for Web Services

    The existing service modeling methodologies, such as WSDL and OWL-S, are service-oriented, which mainly focus on providing formalisms for the important features of a web service, including its functionality and QoS parameters. Conforming to these models, users need to first find what the available services are, go through the descriptions,...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Anatomy of Drive-by Download Attack

    Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Simseer and Bugwise - Web Services for Binary-level Software Similarity and Defect Detection

    Simseer and bugwise are online web services that perform binary program analysis: simseer identifies similarity between submitted executables based on similarity in the control flow of each binary. A software similarity service provides benefit in identifying malware variants and families, discovering software theft, and revealing plagiarism of software programs. Simseer...

    Provided By Australian Computer Society

  • White Papers // May 2013

    A Dynamic, Decentralised Search Algorithm for Efficient Data Retrieval in a Distributed Tuple Space

    In this paper, the authors present an algorithm which may be used to efficiently search for and retrieve tuples in a distributed tuple space. The algorithm, a core part of the Tupleware system, is based on the success or failure of previous tuple requests to remote nodes in the system,...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Efficient Identity-based Signcryption without Random Oracles

    In this paper, the authors propose a new Identity-Based SignCryption (IBSC) scheme in the standard model. Their scheme shows an improvement of approximately 40% reduction in the ciphertext size when compared to the previously proposed IBSC schemes in the standard model. Further, they argue that the previous IBSC schemes do...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Scaling Up Transit Priority Modelling Using High-Throughput Computing

    The optimization of Road Space Allocation (RSA) from a network perspective is computationally challenging. An analogue to the Network Design Problem (NDP), RSA can be classified NP-hard. In large-scale networks when the number of alternatives increases exponentially, there is a need for an efficient method to reduce the number of...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Non-Functional Requirements in Business Process Modeling

    Business Process Modeling entails the capture of a set of tasks that invariably model the functional behavior of a system. Another aspect of Business Process Modeling involves the accurate capture of operational behavior and the associated process constraints. Whether the process is automated or manual, such operational constraints and behavior...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Robust WYSIWYS: A Method for Ensuring that What You See is What You Sign

    The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or intentional malfunctioning has the potential of wrongly imposing...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes

    Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators can often be used to establish a view of regular usage patterns which can then be examined for unusual occurrences. This paper describes one such method...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Transformation and Reaction Rules for Data on the Web

    The transformation and manipulation of XML is an increasingly important research topic. This paper examines a number of issues with regard to languages for transforming and reacting to changes on XML data. On the transformation side, the authors focus on XSLT, a powerful language for converting XML data into other...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Cooperative Query Answering for Semistructured Data

    Semi-structured data, in particular XML, has emerged as one of the primary means for information exchange and content management. The power of XML allows authors to structure a document in a way which precisely captures the semantics of the data. This, however, poses a substantial barrier to casual and non-expert...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Energy Efficiency for MapReduce Workloads: An In-depth Study

    The energy efficiency has emerged as a crucial optimization goal in data centers. MapReduce has become a popular and even fashionable distributed processing model for parallel computing in data centers. Hadoop is an open-source implementation of MapReduce, which is widely used for short jobs requiring low response time. In this...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Evaluating Semantic Browsers for Consuming Linked Data

    The value of a single dataset is increased when it is linked to combinations of datasets to provide users with more information. Linked data is a style of publishing data on the web by using a structured machine-readable format, RDF, and semantically typed relations to connect related data. Its structured...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Indexing RFID Data Using the VG-Curve

    Existing methods for the management of multi-dimensional data typically do not scale well with an increased number of dimensions or require the unsupported augmentation of the kernel. However, the use of multidimensional data continues to grow in modern database applications, specifically in spatio-temporal databases. These systems produce vast volumes of...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Managing Large Numbers of Business Processes with Cloud Workflow Systems

    With the emergence of cloud computing which can deliver on-demand high-performance computing resources over the Internet, cloud workflow systems offer a competitive software solution for managing large numbers of business processes. In this paper, the authors first analyze the basic system requirements through a motivating example, and then, the general...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Optimised X-HYBRIDJOIN for Near-Real-Time Data Warehousing

    Stream-based join algorithms are needed in modern near-real-time data warehouses. A particular class of stream-based join algorithms, with MESHJOIN as a typical example, computes the join between a stream and a disk-based relation. Recently the authors have presented a new algorithm X-HYBRIDJOIN (EXtended HYBRID JOIN) in that class. X-HYBRIDJOIN achieves...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    How to Manage Spatio-Temporal Events in Relational Databases

    In this paper, the authors discuss the need for Event-Condition-Action (ECA) rules in spatio-temporal databases and outline a generic scenario for them. A proposal for the implementation of ECA rules is then presented in which several implementation alternatives for different spatio-temporal rule types are considered. Through a series of experiments,...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Document Logic: Risk Analysis of Business Processes Through Document Authenticity

    Document Logic is a simple yet powerful framework to infer risks in business processes. The authors focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. They have built a prototype of a system that checks document authenticity in...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Scheduling with Freshness and Performance Guarantees for Web Applications in the Cloud

    Highly distributed data management platforms (e.g., PNUTS, Dynamo, Cassandra, and BigTable) are rapidly becoming the favorite choice for hosting modern web applications in the cloud. Among other features, these platforms rely on data partitioning, replication and relaxed consistency to achieve high levels of performance and scalability. However, these design choices...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Privacy and Anonymity in Untrusted Data Stores

    In this paper the authors describe a security problem involving an online data repository, which acts as a proxy for multiple companies allowing their customers to perform online services (e.g., pay invoices). The repository's host is trusted to honestly fulfill its duties in maintaining the data in a manner consistent...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    A System for Managing Data Provenance in In Silico Experiments

    In silico experiments use computers or computer simulation to speed up the rate at which scientific discoveries are made. However, the voluminous amounts of data generated in such experiments are often recorded in an ad hoc manner without regard to work-flow, and often lacks rigorous business rules. The absence of...

    Provided By Australian Computer Society

  • White Papers // Oct 2010

    The Crowd in the Cloud: Moving Beyond Traditional Boundaries for Large Scale Experiences in the Cloud

    In this paper the authors propose a taxonomy for crowd based interaction paradigms, and categorize the literature according to this taxonomy. The conventional definition of crowds needs to be reconsidered in the light of advances in communication technology such as smart phones and cloud based infrastructures. They have extended the...

    Provided By Australian Computer Society

  • White Papers // Sep 2010

    Classification of Malware Using Structured Control Flow

    Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great benefit in early detection. Control flow has been proposed as a characteristic that can be identified across variants, resulting in flow-graph based malware classification. Static analysis is widely used for the classification but...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The E-Decisional Community: An Integrated Knowledge Sharing Platform

    The Knowledge Management (KM) has become a key success factor in diverse fields, given the importance of knowledge as a significant organizational asset. In order to solve problems and support complex decision-making processes, knowledge and experience have to be transmitted across individuals, business units and organizations. Thus, Knowledge Sharing (KS)...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    A Technology to Expose a Cluster as a Service in a Cloud

    Clouds refer to computational resources (in particular, clusters) that are accessible as scalable, on demand, pay-as-the user-go services provided in the internet. However, clouds are in their infancy and lack a high level abstraction. Specifically, there is no effective discovery and selection service for clusters and offer little to no...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The Effect of User Interface Delay in Thin Client Mobile Games

    Thin-client computing may be a solution to such problems as providing sophisticated applications on devices with low computational power, or providing reasonable access to digital artifacts whose distribution the copyright owner still wishes to protect. However, certain application domains have tight constraints around user interface response times, and the network...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    iAnnotate: Exploring Multi-User Ink Annotation in Web Browsers

    This paper presents iAnnotate, a tool that provides multi-user digital ink annotation on standard web pages within a commercial browser. The annotation can be saved, retrieved and shared with others via a URL. In addition multiple users' annotations can be displayed on the same page. The paper describes the design...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Middleware for Context Sensitive Mobile Applications

    Contextual information such as spatial location can significantly enhance the utility of mobile applications. This paper introduces the concept of active preferences that represent a combination of user preference information and choices combined with spatial or temporal information. Active preferences set the policy on how a mobile application should customise...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Efficient Management of XML Documents

    XML has become a de facto standard for data representation and exchange on the World-Wide-Web. Unlike HTML tags that are mainly used to describe presentations, tags in XML capture some semantics, especially when domain-specific common DTDs are used when authoring XML documents. Since industries are indeed enthusiastic about XML, and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Optimizing the Lazy DFA Approach for XML Stream Processing

    Lazy DFA (Deterministic Finite Automata) approach has been recently proposed to for efficient XML stream data processing. This paper discusses the drawbacks of the approach, suggests several optimizations as solutions, and presents a detailed analysis for the processing model. The experiments show that the proposed approach is indeed effective and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Middleware for Context Sensitive Mobile Applications

    Contextual information such as spatial location can significantly enhance the utility of mobile applications. This paper introduces the concept of active preferences that represent a combination of user preference information and choices combined with spatial or temporal information. Active preferences set the policy on how a mobile application should customise...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Efficient Management of XML Documents

    XML has become a de facto standard for data representation and exchange on the World-Wide-Web. Unlike HTML tags that are mainly used to describe presentations, tags in XML capture some semantics, especially when domain-specific common DTDs are used when authoring XML documents. Since industries are indeed enthusiastic about XML, and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Optimizing the Lazy DFA Approach for XML Stream Processing

    Lazy DFA (Deterministic Finite Automata) approach has been recently proposed to for efficient XML stream data processing. This paper discusses the drawbacks of the approach, suggests several optimizations as solutions, and presents a detailed analysis for the processing model. The experiments show that the proposed approach is indeed effective and...

    Provided By Australian Computer Society

  • White Papers // Jan 2010

    Visualising Java Data Structures as Graphs

    This paper presents a simple, general-purpose tool for visualising Java data structures. The tool uses Java reflection and an open-source graph drawing program to produce text-book quality depictions of arbitrary Java objects. The tool offers certain pedagogical advantages over other "Heavy-Weight" visualisation systems. Its simplicity and generality means that students...

    Provided By Australian Computer Society

  • White Papers // Jan 2009

    Mobile Information Exchange and Integration: From Query to Application Layer

    Due to the popularity of mobile devices, more and more commercial applications have been developed on these devices. While commercial applications are mostly backed by relational database systems, numerous database engines have been ported to or built on these devices, for example, SQLite. Since connectivity can be unstable or slow,...

    Provided By Australian Computer Society

  • White Papers // Dec 2009

    Multi-Factor Password-Authenticated Key Exchange

    The authors consider a new form of authenticated key exchange which they call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Resource Provisioning Based on Lease Preemption in InterGrid

    Resource provisioning is one of the main challenges in resource sharing environments such as InterGrid. Recently, many resource management systems in resource sharing environments use lease abstraction and virtual machines for provisioning. In resource sharing environments resource providers serve requests from external (grid) users along with their own local users....

    Provided By Australian Computer Society

  • White Papers // Sep 2010

    Classification of Malware Using Structured Control Flow

    Malware is a pervasive problem in distributed computer and network systems. Identification of malware variants provides great benefit in early detection. Control flow has been proposed as a characteristic that can be identified across variants, resulting in flow-graph based malware classification. Static analysis is widely used for the classification but...

    Provided By Australian Computer Society

  • White Papers // Oct 2012

    A Web Portal for Management of Aneka-Based MultiCloud Environments

    Many Cloud providers offer services with different sets of configurations and settings. This makes it difficult for their clients to seamlessly integrate various services from different Cloud providers. To simplify, the authors developed an extendible Cloud Web Portal (CWP), a comprehensive open source Cloud management portal that aims to deliver...

    Provided By Australian Computer Society

  • White Papers // Aug 2007

    On the Correlation between Process Model Errors and Metrics

    Business Process Models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive application of process modeling in practice there are hardly empirical results available on quality aspects of process models. This paper aims to advance the understanding of this...

    Provided By Australian Computer Society

  • White Papers // Dec 2009

    A Conceptually Rich Model of Business Process Compliance

    In this paper, the authors extend the preliminary work developed elsewhere and investigate how to characterize many aspects of the compliance problem in Business Process Modeling. They first define a formal and conceptually rich language able to represent, and reason about, chains of reparational obligations of various types. Second, they...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Non-Functional Requirements in Business Process Modeling

    Business Process Modeling entails the capture of a set of tasks that invariably model the functional behavior of a system. Another aspect of Business Process Modeling involves the accurate capture of operational behavior and the associated process constraints. Whether the process is automated or manual, such operational constraints and behavior...

    Provided By Australian Computer Society

  • White Papers // Apr 2008

    Deploying Access Control in Distributed Workflow

    Workflows are operational business processes. Work-Flow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there has been a trend to integrate WFMS in distributed inter-organizational systems. In this case malfunctioning of one WFMS can affect more than one organization, making the correct...

    Provided By Australian Computer Society

  • White Papers // Nov 2011

    How to Manage Spatio-Temporal Events in Relational Databases

    In this paper, the authors discuss the need for Event-Condition-Action (ECA) rules in spatio-temporal databases and outline a generic scenario for them. A proposal for the implementation of ECA rules is then presented in which several implementation alternatives for different spatio-temporal rule types are considered. Through a series of experiments,...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Access Control: What Is Required in Business Collaboration?

    Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralized systems; however, unique and challenging security issues concerning collaboration in the context of Service Oriented Computing (SOC) have arisen due to the dynamic and loosely coupled...

    Provided By Australian Computer Society

  • White Papers // Feb 2011

    Document Logic: Risk Analysis of Business Processes Through Document Authenticity

    Document Logic is a simple yet powerful framework to infer risks in business processes. The authors focus on flows of documents and build a set of inference rules based on document authenticity and a simple trust model. They have built a prototype of a system that checks document authenticity in...

    Provided By Australian Computer Society

  • White Papers // Apr 2008

    Integrating Privacy Policies into Business Processes

    The increased interest around business processes management and modeling techniques has brought many organizations to make significant investments in business process modeling projects. One of the most recent proposal for a new business process modeling technique is the Business Process Modeling Notation (BPMN). Often, the modeled business processes involve sensible...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Robust WYSIWYS: A Method for Ensuring that What You See is What You Sign

    The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or intentional malfunctioning has the potential of wrongly imposing...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes

    Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators can often be used to establish a view of regular usage patterns which can then be examined for unusual occurrences. This paper describes one such method...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Efficient XQuery Join Processing in Publish/Subscribe Systems

    Efficient XML filtering has been a fundamental technique in recent web service and XML publish/subscribe applications. In this paper, the authors consider the problem of filtering a continuous stream of XML data against a large number of XQuery queries that contain multiple inter-document value-based join operations in their where clauses....

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists

    The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organizations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    QUIP: A Protocol for Securing Content in Peer-to-Peer Publish/Subscribe Overlay Networks

    Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber submits a description of the sort of content they are interested in, then the publish/subscribe system delivers any appropriate messages as they are published. Although publish/subscribe networks offer advantages over...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    Discovering Frequent Sets from Data Streams with CPU Constraint

    Data streams are usually generated in an online fashion characterized by huge volume, rapid unpredictable rates, and fast changing data characteristics. It has been hence recognized that mining over streaming data requires the problem of limited computational resources to be adequately addressed. Since the arrival rate of data streams can...

    Provided By Australian Computer Society

  • White Papers // Nov 2008

    Elliptic Indexing of Multidimensional Databases

    In this paper an R-tree variant, which uses minimum volume covering ellipsoids instead of usual minimum bounding rectangles, is presented. The most significant aspects, which determine R-tree index structure performance, are an amount of dead space coverage and overlaps among the covering regions. Intuitively, ellipsoid as a quadratic surface should...

    Provided By Australian Computer Society

  • White Papers // Nov 2006

    Computer Assisted Assessment of SQL Query Skills

    The Structured Query Language (SQL) is the dominant language for querying relational databases today, and is an essential topic in introductory database courses in higher education. Even though the language is syntactically simple, relatively concise, and highly structured, students experience many difficulties while learning to express queries in SQL. In...

    Provided By Australian Computer Society

  • White Papers // Jan 2013

    Conflict Scheduling of Transactions on XML Documents

    In the last few years an interest in native XML databases has surfaced. With other authors researchers argue that such databases need their own provisions for concurrency control since traditional methods are inadequate to capture the complicated update-behavior that is possible for XML documents. Ideally, updates should not be limited...

    Provided By Australian Computer Society

  • White Papers // Nov 2007

    Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling

    In this paper the authors differentiate between the conceptual models used for data modeling, knowledge modeling, and ontology modeling. It next examines the problem of developing a conceptual model for ontology. It provides a notation that can be used for representing the conceptual models. A great deal of discussion has...

    Provided By Australian Computer Society

  • White Papers // Oct 2007

    An Integrated Access Control for Securely Querying and Updating XML Data

    Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/or rewriting queries into safe ones each time a user requests a query or takes an action. In this paper, the authors propose a fine-grained access control model,...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Peer-to-Peer Data Mining Classifiers for Decentralized Detection of Network Attacks

    Data mining aims to extract from huge amount of data stochastic theories, called knowledge models, to explain or predict complex phenomenon. In this paper the authors propose new distributed data mining algorithms to recognize network attacks against a set of devices from statistic data generated locally by each device according...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Finding Skylines for Incomplete Data

    In the last decade, skyline queries have been extensively studied for different domains because of their wide applications in multi-criteria decision making and search space pruning. A skyline query returns all the interesting points in a multi-dimensional data set that are not dominated by any other point with respect to...

    Provided By Australian Computer Society

  • White Papers // May 2013

    User Awareness and Policy Compliance of Data Privacy in Cloud Computing

    Cloud computing is promising many technical benefits such as enhanced scalability, computing elasticity, and cost efficiency. However, with the benefits of cloud-based, hosted software platforms also comes the responsibility to data privacy. This paper investigates the data privacy issues brought about by cloud computing from an Australian perspective with specific...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The E-Decisional Community: An Integrated Knowledge Sharing Platform

    The Knowledge Management (KM) has become a key success factor in diverse fields, given the importance of knowledge as a significant organizational asset. In order to solve problems and support complex decision-making processes, knowledge and experience have to be transmitted across individuals, business units and organizations. Thus, Knowledge Sharing (KS)...

    Provided By Australian Computer Society

  • White Papers // May 2013

    Cloud-Aware Processing of MapReduce-Based OLAP Applications

    As the volume of data to be processed in a timely manner soars, the scale of computing and storage systems has much trouble keeping up with such a rate of explosive data growth. A hybrid cloud combining two or more clouds is emerging as an appealing alternative to expand local/private...

    Provided By Australian Computer Society

  • White Papers // Oct 2010

    The Crowd in the Cloud: Moving Beyond Traditional Boundaries for Large Scale Experiences in the Cloud

    In this paper the authors propose a taxonomy for crowd based interaction paradigms, and categorize the literature according to this taxonomy. The conventional definition of crowds needs to be reconsidered in the light of advances in communication technology such as smart phones and cloud based infrastructures. They have extended the...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    A Technology to Expose a Cluster as a Service in a Cloud

    Clouds refer to computational resources (in particular, clusters) that are accessible as scalable, on demand, pay-as-the user-go services provided in the internet. However, clouds are in their infancy and lack a high level abstraction. Specifically, there is no effective discovery and selection service for clusters and offer little to no...

    Provided By Australian Computer Society

  • White Papers // Nov 2009

    Using Markov Chain Analysis to Study Dynamic Behaviour in Large-Scale Grid Systems

    In large-scale grid systems with decentralized control, the interactions of many service providers and consumers will likely lead to emergent global system behaviors that result in unpredictable, often detrimental, outcomes. This possibility argues for developing analytical tools to allow understanding, and prediction, of complex system behavior in order to ensure...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Scheduling with Freshness and Performance Guarantees for Web Applications in the Cloud

    Highly distributed data management platforms (e.g., PNUTS, Dynamo, Cassandra, and BigTable) are rapidly becoming the favorite choice for hosting modern web applications in the cloud. Among other features, these platforms rely on data partitioning, replication and relaxed consistency to achieve high levels of performance and scalability. However, these design choices...

    Provided By Australian Computer Society

  • White Papers // Aug 2010

    The Effect of User Interface Delay in Thin Client Mobile Games

    Thin-client computing may be a solution to such problems as providing sophisticated applications on devices with low computational power, or providing reasonable access to digital artifacts whose distribution the copyright owner still wishes to protect. However, certain application domains have tight constraints around user interface response times, and the network...

    Provided By Australian Computer Society

  • White Papers // Nov 2010

    Privacy and Anonymity in Untrusted Data Stores

    In this paper the authors describe a security problem involving an online data repository, which acts as a proxy for multiple companies allowing their customers to perform online services (e.g., pay invoices). The repository's host is trusted to honestly fulfill its duties in maintaining the data in a manner consistent...

    Provided By Australian Computer Society

  • White Papers // Jan 2012

    Energy Efficiency for MapReduce Workloads: An In-depth Study

    The energy efficiency has emerged as a crucial optimization goal in data centers. MapReduce has become a popular and even fashionable distributed processing model for parallel computing in data centers. Hadoop is an open-source implementation of MapReduce, which is widely used for short jobs requiring low response time. In this...

    Provided By Australian Computer Society