Provably Correct on-chip Communication-based Design. This project falls in the priority area of Frontier Technologies for Building and Transforming Australian Industries. Embedded systems have complex communication architectures and functionalities due to their mission- and time-critical applications. This project will develop verifiable algorithms and techniques for design reuse to address them, help solve outstanding problems in the VLSI/SoC community and to lift the country's visibility and ....Provably Correct on-chip Communication-based Design. This project falls in the priority area of Frontier Technologies for Building and Transforming Australian Industries. Embedded systems have complex communication architectures and functionalities due to their mission- and time-critical applications. This project will develop verifiable algorithms and techniques for design reuse to address them, help solve outstanding problems in the VLSI/SoC community and to lift the country's visibility and credibility in the area. The economic benefits are better techniques for design reuse for embedded systems that may be integrated into existing Computer Aided Design environments, with potential to commercialise the algorithms to Electronic Design Automation and vendors.Read moreRead less
Towards High-performance and Fault-tolerant Distributed Java Implementations. Java Virtual Machines form an important part of the web and business
server market. Distributed Java Virtual Machines have the potential to
make a significant contribution to industries that utilize this
technology. An attractive platform for this purpose is the
cluster, a highly cost-effective and scalable parallel computer
model. However, realizing on such a platform a high performance virtual
machine implem ....Towards High-performance and Fault-tolerant Distributed Java Implementations. Java Virtual Machines form an important part of the web and business
server market. Distributed Java Virtual Machines have the potential to
make a significant contribution to industries that utilize this
technology. An attractive platform for this purpose is the
cluster, a highly cost-effective and scalable parallel computer
model. However, realizing on such a platform a high performance virtual
machine implementation tolerant to hardware and software faults, and
having efficient memory utilization, presents many challenging research
issues. This project will address these issues by extending a highly
efficient and extensible Java implementation to be aware of its cluster
environment.
Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0347131
Funder
Australian Research Council
Funding Amount
$115,490.00
Summary
Intelligent Computer System to Access Information Directly from the Brain Using High Resolution Electroencephalography and Repetitive Transcranial Magnetic Stimulation. The ambitious aim of this project is to create a novel intelligent computer system which accesss information from the brain. To do this we use repetitive Transcranial Magnetic Stimulation and high resolution Electroencephalography.
Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not o ....Scalable & Accountable Privacy-Preserving Blockchain with Enhanced Security. This project aims to address the scalability and accountability of privacy-preserving blockchain by advancing cryptographic techniques. This project expects to develop scalable protocols for privacy-preserving blockchain while also adding accountability for authority to trace cyber crime activities, which is a missing piece in any state-of-the-art public blockchain system. Expected outcomes of this project include not only practical solutions for protecting sensitive data recorded in blockchain but also crucial techniques to make the blockchain accountable for practical applications with enhanced security. This project provides significant benefits, such as building a trusted environment for sensitive transactions in the digital economy.Read moreRead less
Reducing the risks associated with developing large-scale, critical software-integrated systems. Industry, government and defence increasingly rely on large-scale, critical software-integrated systems. The scale and complexity of these systems means current methods of analysing, designing and assuring their dependability are struggling to provide the constructive support and assurance that is demanded. Consequently, there are significant risks of cost and schedule overruns and of system problems ....Reducing the risks associated with developing large-scale, critical software-integrated systems. Industry, government and defence increasingly rely on large-scale, critical software-integrated systems. The scale and complexity of these systems means current methods of analysing, designing and assuring their dependability are struggling to provide the constructive support and assurance that is demanded. Consequently, there are significant risks of cost and schedule overruns and of system problems and failures. This project builds on results from our current collaboration - a new method for modelling, analysis and defect detection for the requirements of large-scale systems. We will develop and scale-up to industry strength, simpler, more powerful, strategies for analysing, designing and providing the high level of assurance required.Read moreRead less
Efficient Web Services Discovery in Peer-to-Peer Networks. The most direct application of this research will be in the area of applying Web services technologies and discovery techniques for building enterprise-strength, B2B and B2G solutions for the Australian SMEs. Economic benefits are applicable to the Australian SMEs, major government organizations, large cooperations and universities who are considering Web services-based dynamic integration of their IT systems in the near future. The outc ....Efficient Web Services Discovery in Peer-to-Peer Networks. The most direct application of this research will be in the area of applying Web services technologies and discovery techniques for building enterprise-strength, B2B and B2G solutions for the Australian SMEs. Economic benefits are applicable to the Australian SMEs, major government organizations, large cooperations and universities who are considering Web services-based dynamic integration of their IT systems in the near future. The outcomes of this project have potential commercial value for Beacon Software Innovations Pty Ltd, which will put the company in competitive advantage in the budget management software industry. Read moreRead less
Open Agent Architectures for Intelligent Distributed Decision Making. Sophisticated software systems are part of the essential infrastructure of our daily lives. Complex systems such as the internet, finance, or telecommunications software cannot have a centralised point of control or a single developer. The aim of this project is to develop an architecture and support infrastructure enabling intelligent agents to locate and use services in such open systems. The fundamental questions that must ....Open Agent Architectures for Intelligent Distributed Decision Making. Sophisticated software systems are part of the essential infrastructure of our daily lives. Complex systems such as the internet, finance, or telecommunications software cannot have a centralised point of control or a single developer. The aim of this project is to develop an architecture and support infrastructure enabling intelligent agents to locate and use services in such open systems. The fundamental questions that must be addressed include issues such as how agents will find and use newly added services and how services will communicate with each other, given that they are developed independently.Read moreRead less
Achieving Tailored Industrial Software Process Improvement with Experience Repositories and Electronic Process Guides. There is a well-recognised need for organisations to improve their software development processes in order to achieve higher software quality and greater efficiencies in development. The use of electronic process guides and experience repositories have been two technologies independently proposed to achieve these aims. This research will develop a framework, methods and tools ....Achieving Tailored Industrial Software Process Improvement with Experience Repositories and Electronic Process Guides. There is a well-recognised need for organisations to improve their software development processes in order to achieve higher software quality and greater efficiencies in development. The use of electronic process guides and experience repositories have been two technologies independently proposed to achieve these aims. This research will develop a framework, methods and tools to allow integration of experience repositories and electronic process guides to facilitate process tailoring, process improvement, and project management. The result will be significant improvements in software development productivity and quality.Read moreRead less
Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costl ....Information Security Evaluation of Embedded Computer Software. Safeguarding classified electronic communications is of major national importance. This research, into security evaluation of computer software, is supported by the Defence Signals Directorate, which verifies the security of communications devices used by Australia's government and armed forces. As such devices become increasingly sophisticated, traditional security evaluation techniques have become unacceptably difficult and costly. Hardware evaluation techniques, based on tracing paths through circuitry diagrams, have proven unsuitable for software evaluations. Consequently, devising new tools and techniques for information security evaluation of embedded computer software is essential for preserving Australia's national security.Read moreRead less
Pervasive Lifelong User Modelling for User Controlled Personalisation and Augmented Cognition. This project will give users the ability to scrutinise and control their personal data gathered in pervasive computing environments.
This addresses people's concerns about privacy and overcomes a critical barrier for progress in the development of pervasive computing. This provides national benefit in the following ways:
we will build software infrastructure that will have commercial and
strategic v ....Pervasive Lifelong User Modelling for User Controlled Personalisation and Augmented Cognition. This project will give users the ability to scrutinise and control their personal data gathered in pervasive computing environments.
This addresses people's concerns about privacy and overcomes a critical barrier for progress in the development of pervasive computing. This provides national benefit in the following ways:
we will build software infrastructure that will have commercial and
strategic value; we will build a set of demonstrator applications
that address the national priority areas of smart information use, and promoting and maintaining good health; and we will enhance knowledge of the complementary fields of user modelling, context aware computing and personal privacy management.
Read moreRead less