A new legal framework for identifying and reporting Australian data breaches. A data breach reporting mechanism will provide security and economic benefits for Australia. One aim of such a mechanism is to enable law enforcement agencies to discover identity crime threats arising from data breaches. Enhanced reporting will lead to more information sharing which will lead to enhanced detection. The reporting mechanism will be built with the needs to Australian business at its heart to encourage re ....A new legal framework for identifying and reporting Australian data breaches. A data breach reporting mechanism will provide security and economic benefits for Australia. One aim of such a mechanism is to enable law enforcement agencies to discover identity crime threats arising from data breaches. Enhanced reporting will lead to more information sharing which will lead to enhanced detection. The reporting mechanism will be built with the needs to Australian business at its heart to encourage reporting. In turn, this will enhance consumer confidence through enhanced governance regarding the handling of personal information. The research will cement Australia's reputation as an advanced technological jurisdiction that can incorporate the security requirements of technical development. Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less
Efficient and Effective Text Information Retrieval with Phrases. Current Internet search engines find documents by matching queries to documents, then present the closest matches to the user. Such searching is often ineffective. Another technique for searching, which with current algorithms is not feasible for large text collections such as the Web, is to browse vocabularies and view phrases in the contexts in which they are used. The aim of this project is to make wider use of phrases in re ....Efficient and Effective Text Information Retrieval with Phrases. Current Internet search engines find documents by matching queries to documents, then present the closest matches to the user. Such searching is often ineffective. Another technique for searching, which with current algorithms is not feasible for large text collections such as the Web, is to browse vocabularies and view phrases in the contexts in which they are used. The aim of this project is to make wider use of phrases in retrieval, by developing new phrase-based querying algorithms and investigating how users can use phrase indexes to find documents. The outcome will be new, efficient methods for exploring the Internet.Read moreRead less
Fault-tolerant operation and scale-up of a silicon quantum computer beyond laboratory prototypes. The Centre for Quantum Computer Technology's mission is the construction of a prototype few-qubit silicon quantum processor to demonstrate the feasibility of this breakthrough technology for massively parallel computation. This application will initiate a new strategic research program within the Centre to address the key issue of interfacing laboratory with silicon CMOS microelectronics. The Hybrid ....Fault-tolerant operation and scale-up of a silicon quantum computer beyond laboratory prototypes. The Centre for Quantum Computer Technology's mission is the construction of a prototype few-qubit silicon quantum processor to demonstrate the feasibility of this breakthrough technology for massively parallel computation. This application will initiate a new strategic research program within the Centre to address the key issue of interfacing laboratory with silicon CMOS microelectronics. The Hybrid Quantum- Conventional Processor will provide calibrated gate control and readout of individual buried atom quantum bits,to run logic operations with quantum error correction. This program will require a deep understanding of physics issues to develop fault tolerant coherent control of qubit arrays for real applications.Read moreRead less
Acoustic Filter Functions from Morphological Measurements. This project works toward enabling the broadcast of high-fidelity 3D audio. By developing an efficient technique for deriving personalised acoustic filter functions based on image data of the listener's head and ears, we hope to enable high-fidelity 3D audio decoding and rendering. Morphological parameterisation techniques and databases recently developed at the University of York will be combined with the statistical synthesis technique ....Acoustic Filter Functions from Morphological Measurements. This project works toward enabling the broadcast of high-fidelity 3D audio. By developing an efficient technique for deriving personalised acoustic filter functions based on image data of the listener's head and ears, we hope to enable high-fidelity 3D audio decoding and rendering. Morphological parameterisation techniques and databases recently developed at the University of York will be combined with the statistical synthesis techniques and databases developed at the University of Sydney to substantially reduce the development time required for either group alone. Psychoacoustic experiments carried out at the University of Sydney will demonstrate the fidelity of the delivered 3D audio.Read moreRead less
PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at ....PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at different levels of the system, in isolation. This project is aimed at investigating the implications of adaptation decisions being taken in isolation at different levels on the system stability and performance.Read moreRead less
Achieving Tailored Industrial Software Process Improvement with Experience Repositories and Electronic Process Guides. There is a well-recognised need for organisations to improve their software development processes in order to achieve higher software quality and greater efficiencies in development. The use of electronic process guides and experience repositories have been two technologies independently proposed to achieve these aims. This research will develop a framework, methods and tools ....Achieving Tailored Industrial Software Process Improvement with Experience Repositories and Electronic Process Guides. There is a well-recognised need for organisations to improve their software development processes in order to achieve higher software quality and greater efficiencies in development. The use of electronic process guides and experience repositories have been two technologies independently proposed to achieve these aims. This research will develop a framework, methods and tools to allow integration of experience repositories and electronic process guides to facilitate process tailoring, process improvement, and project management. The result will be significant improvements in software development productivity and quality.Read moreRead less
Special Research Initiatives - Grant ID: SR0567493
Funder
Australian Research Council
Funding Amount
$99,146.00
Summary
E-Services for Comparative Studies in Molecular Biology. The central challenge of post-genomic biology is to exploit the range of sequence and microarray data to yield greater understanding of biological processes. Large comparative studies are hamstrung by the inaccessibility of specialist comparative tools and the problem of managing large-scale disparate data. This project will provide portal and web services facilities to remove these obstacles, relying on robust and scalable business techno ....E-Services for Comparative Studies in Molecular Biology. The central challenge of post-genomic biology is to exploit the range of sequence and microarray data to yield greater understanding of biological processes. Large comparative studies are hamstrung by the inaccessibility of specialist comparative tools and the problem of managing large-scale disparate data. This project will provide portal and web services facilities to remove these obstacles, relying on robust and scalable business technologies to be made freely available. Our work will be driven by specific applications in bacterial genomics and cancer research, and will support research into prostate cancer and the pathogens Chlamydia and Bacillus anthracis.Read moreRead less
Fast and Scalable Search Techniques for Genomic Databases. Tens of thousands of users each day search the genomic databases that are so far the most significant product of the Human Genome Project. In this project, we will investigate fundamental new bioinformatics techniques for information retrieval from genomic databases. The outcomes will allow molecular biologists to accurately and efficiently discover relationships between DNA and protein sequences. In contrast to existing approaches, o ....Fast and Scalable Search Techniques for Genomic Databases. Tens of thousands of users each day search the genomic databases that are so far the most significant product of the Human Genome Project. In this project, we will investigate fundamental new bioinformatics techniques for information retrieval from genomic databases. The outcomes will allow molecular biologists to accurately and efficiently discover relationships between DNA and protein sequences. In contrast to existing approaches, our techniques will remain fast despite the enormous growth in genomic database sizes. This research will contribute significantly to the "key areas of study includ[ing] genomics and bioinformatics" in the new ARC genome/phenome link priority area.Read moreRead less
Diagnosis of Reference Flow Control Alerts for the Identification of Malicious Event Sequences (DiagRF). There are a reported two billion computer attacks worldwide per year. Many of these attacks require a skilled human to decipher them and to develop the "signatures" by which they can be detected. The main outcome of this project will be fundamental knowledge regarding how information flows can be tracked and then forensically analysed in a distributed computer system or network in order to ....Diagnosis of Reference Flow Control Alerts for the Identification of Malicious Event Sequences (DiagRF). There are a reported two billion computer attacks worldwide per year. Many of these attacks require a skilled human to decipher them and to develop the "signatures" by which they can be detected. The main outcome of this project will be fundamental knowledge regarding how information flows can be tracked and then forensically analysed in a distributed computer system or network in order to enable the automatic characterization of certain classes of attacks. This new approach will enable the automatic development of attack signatures and thus the detection of such attacks. The project will lead to the development of a prototype which implements the automatic analysis and characterization of such attacks to provide proof of concept.Read moreRead less