The red belly blockchain: a scalable blockchain for internet of things. This project aims to offer a blockchain that scales with the number of participants. There have been major investments in blockchain technologies during the last year as blockchains promise to disrupt industries like supply chains. Unfortunately, blockchains cannot solve this problem in their current form, because they cannot scale. They require resources that grow with the number of participants and yet fail at providing in ....The red belly blockchain: a scalable blockchain for internet of things. This project aims to offer a blockchain that scales with the number of participants. There have been major investments in blockchain technologies during the last year as blockchains promise to disrupt industries like supply chains. Unfortunately, blockchains cannot solve this problem in their current form, because they cannot scale. They require resources that grow with the number of participants and yet fail at providing increasing performance. The project will leverage many devices of limited resources to offer higher performance and will impact the distributed computing field by establishing a new connection between energy efficient systems and highly scalable distributed algorithms.Read moreRead less
Provably Secure Cryptography Techniques: Effective, Elegant, and Economic. This project aims to contribute to advanced knowledge and techniques to remove relaxed proof factors from provable security. Cryptography nowadays can be proven secure and must be provably secure before being adopted for data protection. Until today, most cryptography schemes are still using some relaxed proof factors to prove security, but using these relaxed factors was risky. The expected outcomes are proof methodolog ....Provably Secure Cryptography Techniques: Effective, Elegant, and Economic. This project aims to contribute to advanced knowledge and techniques to remove relaxed proof factors from provable security. Cryptography nowadays can be proven secure and must be provably secure before being adopted for data protection. Until today, most cryptography schemes are still using some relaxed proof factors to prove security, but using these relaxed factors was risky. The expected outcomes are proof methodologies for researchers to prove security in an easy way (effective), cryptography techniques for proving security without any relaxed proof factors for cryptography schemes (elegant), and more practical cryptography schemes with elegant proofs to enable Australians to receive benefit from secure data protection (economic).
Read moreRead less
Computational Mechanisms of Online Attention Markets. The internet has operated as an major exchange of information and attention for the past few decades, yet surprisingly little is known about how individual choices and collective attention interact, let alone about how different parties can influence or control it. This project aims to uncover the mathematical underpinnings between individual actions and collective trends in online attention market, design computational methods for estimating ....Computational Mechanisms of Online Attention Markets. The internet has operated as an major exchange of information and attention for the past few decades, yet surprisingly little is known about how individual choices and collective attention interact, let alone about how different parties can influence or control it. This project aims to uncover the mathematical underpinnings between individual actions and collective trends in online attention market, design computational methods for estimating and influencing attention allocation, and enable applications where content consumers, producers, hosting platforms and regulatory bodies are each empowered with their share of influence in the attention market.Read moreRead less
Continuously learning to see. The ultimate goal of computer vision is to make a machine able to understand the world through analysis of images or videos. The new machine learning techniques developed in this project will enable previously impossible methods of computer vision and help strengthen Australia's competitiveness in this important area.
Deep Adder Networks on Edge Devices. This project aims to empower edge devices with intelligence by developing advanced deep neural networks that address the conflict between the high resource requirements of deep learning and the generally inadequate performance of the edge. Multiplication has been the dominant type of operation in deep learning, though the addition is known to be much cheaper. This project expects to yield theories and algorithms that allow deep neural networks consisting of n ....Deep Adder Networks on Edge Devices. This project aims to empower edge devices with intelligence by developing advanced deep neural networks that address the conflict between the high resource requirements of deep learning and the generally inadequate performance of the edge. Multiplication has been the dominant type of operation in deep learning, though the addition is known to be much cheaper. This project expects to yield theories and algorithms that allow deep neural networks consisting of nearly pure additions to fulfil the requisites of accuracy, robustness, calibration and generalisation in real-world computer vision tasks. The success of this project will benefit deep learning-based products on smartphones or robots in health and cybersecurity.Read moreRead less
Algorithmics for visual analytics of massive complex networks. The project will provide new scalable algorithms for visual analytics of massive complex networks. These fast algorithms will enable security analysts to detect abnormal behaviours such as money laundering, biologists to understand protein-protein interaction networks, and support software engineers new ways of understanding large software systems.
Dynamic resource provisioning for autonomic management of cloud computing environments. In the next 20 years, service-oriented computing will play an important role in shaping the industry and will require cloud infrastructure hosting applications to deliver services at low cost. This project will develop technologies for self-managed cloud computing platforms that reduce usage and operational costs, thus transforming the Australian economy.
Memetic algorithms for multiobjective optimisation problems in bioinformatics. Many questions of paramount importance in life sciences can be formulated as optimisation problems but using just a single criterion can be misleading. This project will address this problem using multiobjective optimisation and leveraging Australia's investment in supercomputing with algorithms that mimic evolutionary processes in silico.
Data Exploitation for Critical Infrastructure Protection: Gathering Intelligence from Digital Evidence Collected from IT Networks and Process Control Systems. This proposal addresses the National Priority of Safeguarding Australia and its results will serve as a major input into current Australian Federal Government and Defence initiatives in digital evidence collection and exploitation as part of process control system security. It will play a significant part in satisfying the Australian commu ....Data Exploitation for Critical Infrastructure Protection: Gathering Intelligence from Digital Evidence Collected from IT Networks and Process Control Systems. This proposal addresses the National Priority of Safeguarding Australia and its results will serve as a major input into current Australian Federal Government and Defence initiatives in digital evidence collection and exploitation as part of process control system security. It will play a significant part in satisfying the Australian community that steps are being taken to safeguard national services and will develop techniques for protecting Australia against criminal or terrorist cyber attack on national services infrastructure. It will serve to develop niche Australian research expertise in this very specialised international field.Read moreRead less
Performing cold microwave measurements with warm diamonds. Detecting weak microwave signals at room temperature is an exceptionally difficult task, due to the excessive thermal microwave noise that exists all around us. At present, the best microwave receivers must be cooled to cryogenic temperatures, restricting their widespread use. This project aims to apply diamond-based quantum technologies to achieve unprecedented microwave signal detection sensitivities with a room-temperature setup, prov ....Performing cold microwave measurements with warm diamonds. Detecting weak microwave signals at room temperature is an exceptionally difficult task, due to the excessive thermal microwave noise that exists all around us. At present, the best microwave receivers must be cooled to cryogenic temperatures, restricting their widespread use. This project aims to apply diamond-based quantum technologies to achieve unprecedented microwave signal detection sensitivities with a room-temperature setup, providing more accessible ultra-low noise detectors. The ability to measure weak microwave signals is crucial for a range of sectors and the results of this project are expected to have applications in defence (radar), space exploration (satellite communication), and fundamental research (spectroscopy).Read moreRead less