Architecture-based Open Network Management Systems for Next Generation Telecommunications. We aim to develop an open, policy-based architecture for the management of next generation telecommunications networks. It is expected that a comprehensive Open Architecture-based Telecommunications Management Network (AuTuMN) framework could be put in place to manage the network based on centralised policies and roles rather than having to handle individual users and elements. Significantly, the scient ....Architecture-based Open Network Management Systems for Next Generation Telecommunications. We aim to develop an open, policy-based architecture for the management of next generation telecommunications networks. It is expected that a comprehensive Open Architecture-based Telecommunications Management Network (AuTuMN) framework could be put in place to manage the network based on centralised policies and roles rather than having to handle individual users and elements. Significantly, the scientific knowledge of open systems and network management systems for next generation networks will be extended.Read moreRead less
Humanising the Convergence of Information and Communication Technology. The convergence of Information and Communication Technologies (ICTs) enables delivery of multiple services by a single mobile device. Frequently ICT convergence is driven by the capabilities of the technology. However, if technologies are to be appropriated, that is enter into long-term use, they must be compatible with that use.
The University of Melbourne and Novell will establish a way of identifying opportunities f ....Humanising the Convergence of Information and Communication Technology. The convergence of Information and Communication Technologies (ICTs) enables delivery of multiple services by a single mobile device. Frequently ICT convergence is driven by the capabilities of the technology. However, if technologies are to be appropriated, that is enter into long-term use, they must be compatible with that use.
The University of Melbourne and Novell will establish a way of identifying opportunities for ICT convergence based on an understanding of appropriation. Our research project will examine the social and personal use of mobile ICTs by young people 16 to 22 years as the basis for understanding the human drivers of convergence.
Read moreRead less
Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Novel cloud computing based workflow technology for managing large numbers of process instances. Cloud computing is a recent computing paradigm which can offer workflow with services via virtualised resources from the Internet. This project develops new technology with a novel cloud workflow architecture and its corresponding innovative mechanisms for managing millions of process instances effectively. The success of this project will build and foster long-term collaboration with the industry pa ....Novel cloud computing based workflow technology for managing large numbers of process instances. Cloud computing is a recent computing paradigm which can offer workflow with services via virtualised resources from the Internet. This project develops new technology with a novel cloud workflow architecture and its corresponding innovative mechanisms for managing millions of process instances effectively. The success of this project will build and foster long-term collaboration with the industry partner. The research conducted with this project will position Australia as a world leader in this area. The intellectual property resulting from project outcomes will potentially benefit many Australian organisations with similar nature for e-business like insurance and banking processes, and e-government like Medicare and Centrelink processes.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
New information access technologies for people with intellectual disability. New information access technologies for people with intellectual disability. This project aims to co-design a social, interactive and visual internet search interface for people with intellectual disability. Enabling choice and independence is key to the new National Disability Insurance Scheme, but people with intellectual disability are effectively excluded from much of the Web. This project will investigate ways to a ....New information access technologies for people with intellectual disability. New information access technologies for people with intellectual disability. This project aims to co-design a social, interactive and visual internet search interface for people with intellectual disability. Enabling choice and independence is key to the new National Disability Insurance Scheme, but people with intellectual disability are effectively excluded from much of the Web. This project will investigate ways to access and provide information using technologies such as interactive avatars, virtual worlds and trusted social support. New interfaces will enable people with intellectual disability to inform themselves, make choices and foster their social inclusion. Expected outcomes are new search interface technology, a theoretical framework and new Web accessibility guidelines.Read moreRead less
Ontology Based Multisite Distributed Software Development. Increasingly clients in cities are developing software overseas or in regional centres. The participating companies have found existing centralized software engineering techniques inadequate for multisite development. This project produces new principles and techniques for multisite distributed software development. Thus it proposes a new methodology, a new project management approach, a new workflow tracking technique and a new concept ....Ontology Based Multisite Distributed Software Development. Increasingly clients in cities are developing software overseas or in regional centres. The participating companies have found existing centralized software engineering techniques inadequate for multisite development. This project produces new principles and techniques for multisite distributed software development. Thus it proposes a new methodology, a new project management approach, a new workflow tracking technique and a new concept of software object/component that allows differentiated access. A platform is also developed for use in field studies for validation and benchmarking. The results will help Australia become a provider of software services for international clients and permit devolution to regional centres.Read moreRead less
Improving the Performance, Scalability and Reliability of the Linux Operating System. This project aims to improve the scalability of the Linux operating system to large systems without loss of performance on small, embedded, systems. It will improve Linux robustness and security by de-privileging particularly error-prone code, such as device drivers, without undue impact on performance. It will improve configurability and ease tuning by making critical components, such as processor, disk and me ....Improving the Performance, Scalability and Reliability of the Linux Operating System. This project aims to improve the scalability of the Linux operating system to large systems without loss of performance on small, embedded, systems. It will improve Linux robustness and security by de-privileging particularly error-prone code, such as device drivers, without undue impact on performance. It will improve configurability and ease tuning by making critical components, such as processor, disk and memory schedulers, pluggable and their policies controllable at user level. It will investigate the feasibility and benefits of user-level file systems and processor and memory scheduling and will demonstrate that these can improve system reliability without undermining performance.Read moreRead less