A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switc ....A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switched information networks.Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
Efficient Algorithms for In-memory Sorting, Searching and Indexing on Modern Multi-core Cache-based and Graphics Processor Architectures. This project clearly belongs to one of the national research priority
goals, Smart Information Use. The copy-based techniques and work on sorting and searching will considerably impact the development of in-memory algorithms in cutting-edge computer architectures. Efficient suffix trees and suffix sorting have myriad applications in string-processing and will ....Efficient Algorithms for In-memory Sorting, Searching and Indexing on Modern Multi-core Cache-based and Graphics Processor Architectures. This project clearly belongs to one of the national research priority
goals, Smart Information Use. The copy-based techniques and work on sorting and searching will considerably impact the development of in-memory algorithms in cutting-edge computer architectures. Efficient suffix trees and suffix sorting have myriad applications in string-processing and will be of high interest to bioinformatics companies. The sortdex project will develop novel algorithms that will be used by enterprise search engine companies to develop applications for libraries and organisations dealing with large databases. Algorithms using the graphics processor as a co-processor have important applications in the high-growth field of computer graphics and games. Read moreRead less
Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create ....Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.Read moreRead less
XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contr ....XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contribute to the advance in database and web research communities and establish us as an internationally leading group in this research area. The technological outcomes will help organisations in Australia effectively and efficiently conduct e-Business on the Internet. Read moreRead less
Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da ....Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.Read moreRead less