Making sense of trajectory data: a database approach. This project investigates new challenges related to providing functionality, flexibility and efficiency for large scale trajectory data management and processing. The expected outcome includes significant technical contributions in novel indexing structures and advanced query processing methods for making better use of rich trajectory data.
Algorithmic engineering and complexity analysis of protocols for consensus. Opinions, rankings, observations, votes, gene sequences, sensor-networks in security systems or climate models. Massive datasets and the ability to share information at unprecedented speeds, makes finding the most central representative, the Consensus Problem, extremely complex. This research delivers new insights and new, efficient algorithms.
Making Spatiotemporal Data More Useful: An Entity Linking Approach. This project aims to establish a methodology for spatiotemporal entity linking by utilising object movement traces to support database integration and data quality management for the next-generation of data where spatiotemporal attributes are ubiquitous. It expects to develop a novel entity linking paradigm for automatic, efficient and reliable spatiotemporal data integration together with a new data privacy study in this contex ....Making Spatiotemporal Data More Useful: An Entity Linking Approach. This project aims to establish a methodology for spatiotemporal entity linking by utilising object movement traces to support database integration and data quality management for the next-generation of data where spatiotemporal attributes are ubiquitous. It expects to develop a novel entity linking paradigm for automatic, efficient and reliable spatiotemporal data integration together with a new data privacy study in this context. Expected outcome include new database technologies for data signature generation and similarity-based search, and improved location data privacy protection methods. This project should provide significant benefits to all areas where high quality spatiotemporal data fusion is essential to meaningful data analysis.Read moreRead less
Approximate proximity for applications in data mining and visualization. Data Mining, pattern recognition and visualization of relational information are all important data analysis techniques in which it is essential to determine which data points are in the vicinity of others. The huge size of the data sets involved and the need for real-time interaction preclude the use of conventional methods for the precise computation of the proximity information required. This project will develop efficie ....Approximate proximity for applications in data mining and visualization. Data Mining, pattern recognition and visualization of relational information are all important data analysis techniques in which it is essential to determine which data points are in the vicinity of others. The huge size of the data sets involved and the need for real-time interaction preclude the use of conventional methods for the precise computation of the proximity information required. This project will develop efficient algorithms and data structures for gathering high-quality approximations of the full proximity information, and will use these innovations as the basis for new, practical tools for visualization, and clustering in data mining.Read moreRead less
Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes ....Embracing Changes for Responsive Video-sharing Services. Video-sharing platforms are a critical information channel for the public. Increasing scale and shifts in user base, with Generation Z now as the dominant user, have resulted in an unprecedented amount of ubiquitous changes in the content and users of these platforms which greatly challenges the responsiveness and quality of the services provided. This project aims to design innovative algorithms to effectively predict and leverage changes, optimise the value of changes, and extract insights from changes for diverse downstream applications of video-sharing platforms. The expected outcomes will create new-generation representation learning techniques, and provide practical tools to amplify the socioeconomic values of video-sharing platforms.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Recently discovered rare manuscripts of mediaeval Pali subcommentaries: a missing link in Buddhist textual transmission. The project will "enhance Australia's capacity to interpret and engage with its regional environment through a greater understanding of languages, societies and cultures" (Research priority 4: Understanding our region and the world); it will deepen our understanding of religious and cultural traditions of many Buddhist countries, which constitute a substantial part of Australi ....Recently discovered rare manuscripts of mediaeval Pali subcommentaries: a missing link in Buddhist textual transmission. The project will "enhance Australia's capacity to interpret and engage with its regional environment through a greater understanding of languages, societies and cultures" (Research priority 4: Understanding our region and the world); it will deepen our understanding of religious and cultural traditions of many Buddhist countries, which constitute a substantial part of Australia's regional environment, and advance our knowledge of Buddhism, the fastest growing religion in Australia. Since this is the first project of its kind in the field of Pali studies, it will increase the international prestige of Australian research capability and open new possibilities for international cooperation in the field.Read moreRead less
Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algo ....Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algorithms proposed to date. This project will examine existing algorithms and attacks to determine design criteria for secure encryption algorithms for use in a wireless environment. An algorithm which meets these criteria and can be implemented efficiently in hardware and software will be proposed.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less