The Australian Research Data Commons (ARDC) invites you to participate in a short survey about your
interaction with the ARDC and use of our national research infrastructure and services. The survey will take
approximately 5 minutes and is anonymous. It’s open to anyone who uses our digital research infrastructure
services including Reasearch Link Australia.
We will use the information you provide to improve the national research infrastructure and services we
deliver and to report on user satisfaction to the Australian Government’s National Collaborative Research
Infrastructure Strategy (NCRIS) program.
Please take a few minutes to provide your input. The survey closes COB Friday 29 May 2026.
Complete the 5 min survey now by clicking on the link below.
Algorithms for hard graph problems based on auxiliary data. When solving computational problems, algorithms usually access only the data that is absolutely necessary to define the problem. However, much more data is often readily available. Especially for important or slowly evolving data, such as road networks, social graphs, company rankings, or molecules, more and more auxiliary data becomes available through computational processes, sensors, and simple user entries. This auxiliary data can g ....Algorithms for hard graph problems based on auxiliary data. When solving computational problems, algorithms usually access only the data that is absolutely necessary to define the problem. However, much more data is often readily available. Especially for important or slowly evolving data, such as road networks, social graphs, company rankings, or molecules, more and more auxiliary data becomes available through computational processes, sensors, and simple user entries. This auxiliary data can greatly speed up an algorithm and improve its accuracy. This project aims to design improved algorithms that harness auxiliary data to solve selected high-impact NP-hard graph problems, and will build a new empowering theory to discern when auxiliary data can be used to improve algorithms.Read moreRead less
Expander graphs, isoperimetric numbers, and forwarding indices. Expanders are sparse but well connected networks. With numerous applications to modern technology, they have attracted many world leaders in mathematics and computer science. This project aims at substantial advancement on some important problems on expanders and related areas. It will put Australia at the forefront of this topical field.
Towards the prime power conjecture. This project attacks a famous and long standing conjecture in pure mathematics that has important ramifications in many applied areas. The project aims to determine when it is possible to produce more efficient codes for electronic communication and statistically balanced designs for experiments in areas as diverse as agriculture and psychology.
Ultimately Trusted Security through Human-Powered Cryptography. Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies. This project aims to create a simple and strong cryptography, so that hu ....Ultimately Trusted Security through Human-Powered Cryptography. Cryptography offers wonderful tools for unbreakable data security, but only between computer nodes, leaving their human owners helpless. Encrypted tunnels terminate not at humans but at mobile phones and personal computers, exposing users' secrets to spyware from search-engine keyloggers to full-bore malware planted by crooks, hackers, and foreign spy agencies. This project aims to create a simple and strong cryptography, so that humans can, for the first time, take front seat in real security protocols. The technical challenge is to build public-key ciphers, operable manually from a mental key in seconds, and from there remake human-powered versions of many useful information security protocols.Read moreRead less