Complexity Constrained Iterative Information Processing. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in high-speed wireless communications networks; Education of future Australian academic and industrial innovators; Raising the inter ....Complexity Constrained Iterative Information Processing. The contribution of Information and Communications Technologies to the National Economy has been widely recognized. ICT enables wealth creation, employment and exports, and underpins many innovation processes. Immediate project benefits will be: Contribution to the knowledge base and fundamental capabilities in high-speed wireless communications networks; Education of future Australian academic and industrial innovators; Raising the international profile of Australian research in the area of information technology. Applied development of the outcomes will lead to the generation of valuable intellectual property. Close links to Australian industry ensures that Australian ICT companies stand to gain commercial advantage.Read moreRead less
Iterative Architechtures for Data Communications. Growing markets for data intensive applications such as real-time video or speech necessitate continual improvements of communications systems. Iterative information processing algorithms have recently received attention for communications equipment design, however theoretical understanding of these methods is still lacking. Within an iterative processing paradigm, the project aim is the optimization of complex communications systems subject to c ....Iterative Architechtures for Data Communications. Growing markets for data intensive applications such as real-time video or speech necessitate continual improvements of communications systems. Iterative information processing algorithms have recently received attention for communications equipment design, however theoretical understanding of these methods is still lacking. Within an iterative processing paradigm, the project aim is the optimization of complex communications systems subject to constraints on computational complexity. Theoretical analysis and design methodologies for such systems will be developed, resulting in basic contributions to statistical science and in cheaper communications infrastructures supporting a wider range of services through better use of limited bandwidth, power and computational complexity.Read moreRead less
Efficient pooling of cross-section and time series data using Bayesian machine learning with two econometric applications. In this project, we adapt a Bayesian modelling strategy, namely the minimum message length principle, to the problem of efficient partitioning of economic units, such as firms or countries, into groups whose behavioural patterns are similar within each group but distinct across groups. This methodology can incorporate the requirements of economic theory. The resulting softwa ....Efficient pooling of cross-section and time series data using Bayesian machine learning with two econometric applications. In this project, we adapt a Bayesian modelling strategy, namely the minimum message length principle, to the problem of efficient partitioning of economic units, such as firms or countries, into groups whose behavioural patterns are similar within each group but distinct across groups. This methodology can incorporate the requirements of economic theory. The resulting software will be developed for the Web. We consider two specific applications, namely modelling gasoline demand in OECD countries, and finding the foreign factor with the most predictive power for the growth rate of the Australian economy. The second application is of considerable national interest.Read moreRead less
Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) deve ....Security Services for Stream-Oriented and Multicast-Based Communication. Multicast communication over lossy networks is becoming the basic for a growing number of aplications. It is therefore critical to provide sound security mechanisms for multicast communication. Yet, existing security protocols for multicast offer only partial solutions. This project is concerned with two major security problems of multicast communications: authentication and secrecy. The goal of this project is to: (1) develop a framework for analysis and evaluation of security services for multicast communication; (2) design efficient algorithms and protocols for securing emerging applications that are multicast-based and/or stream-oriented.
Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, whi ....Non-Parametric Modelling of Motion and Depth fields with Boundary Geometry for Scalable Compression and Dissemination. Applications for large format video surveillance are about to grow rapidly, starting with military applications and then moving into the civilian arena, highlighting the importance of compression for interactive dissemination, so as to make best use of limited communication channels. This project will develop an innovative representation for motion and depth/elevation maps, which addresses a key obstacle in the deployment of technology for efficient interactive access to large format video and geospatial imagery. These applications are relevant to Australia's defence and infrastructure for smart information use. Moreover, this is a strategic proposal to strengthen Australia's existing lead in aspects of interactive media dissemination.Read moreRead less
Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our ....Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our culture by protecting individual's privacy and providing security for sensitive data. Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switc ....A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switched information networks.Read moreRead less
Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project a ....Highly Scalable Video Compression with Finely Embedded Motion Signalling. Highly scalable video compression is critical to the emergence of new applications in video distribution and management. Examples include interactive remote browsing of video and robust video surveillance over shared networks. Previous ARC funding produced fundamental breakthroughs in scalable video compression, resulting in a new paradigm which has been adopted by leading researchers in the field. The present project addresses the two most important problems which currently limit the potential of this paradigm. Inspired by the applicant's recent discoveries, the outcomes of this project are likely to represent significant scientific breakthroughs and contribute to a new international video coding standard.Read moreRead less