The dog that didn't bark: a Bayesian account of reasoning from censored data. This project aims to develop and test a new computational theory of inductive reasoning. Inductive reasoning involves extending knowledge from known to novel instances, and is a central component of intelligent behaviour. This project will address the cognitive mechanisms that allow people to draw inferences based on both observed and censored evidence. The project intends to test the model through an extensive program ....The dog that didn't bark: a Bayesian account of reasoning from censored data. This project aims to develop and test a new computational theory of inductive reasoning. Inductive reasoning involves extending knowledge from known to novel instances, and is a central component of intelligent behaviour. This project will address the cognitive mechanisms that allow people to draw inferences based on both observed and censored evidence. The project intends to test the model through an extensive program of experimental investigation and computational modelling. The anticipated benefits include an enhanced understanding of human inference, especially in domains such as the evaluation of forensic or financial evidence, where data censoring is common.Read moreRead less
Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal healt ....Eat and Dream: effective automatic testing and debugging for real-life embedded wireless communications software. Embedded software is a key enabling technology for the majority of Australian manufacturing industries, including strategically important sectors such as the automotive industry. Embedded wireless communication technologies are playing an increasingly significant role in Australia with a wide range of critical applications ranging from natural disaster early warning to personal health monitoring. Embedded wireless communications software, however, is difficult to test and debug owing to the complexity of the operational environment and complications arising from the interplay between software and hardware. This project will develop an effective and automatic technology to alleviate these difficulties and achieve higher quality software.Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
Seeing Change: Science, Culture and Technology in the Antipodes from the age of Darwin - a multi-media research collaboration. To build a collaboration across the humanities, natural sciences, business technology and public culture sectors that will use new forms of digital and visual research to demonstrate the neglected importance of Australasia in the formation of nineteenth-century evolutionary thought and to suggest the relevance of these ideas to understanding contemporary issues of enviro ....Seeing Change: Science, Culture and Technology in the Antipodes from the age of Darwin - a multi-media research collaboration. To build a collaboration across the humanities, natural sciences, business technology and public culture sectors that will use new forms of digital and visual research to demonstrate the neglected importance of Australasia in the formation of nineteenth-century evolutionary thought and to suggest the relevance of these ideas to understanding contemporary issues of environmental sustainability and the development of frontier technologies within our society and region. Read moreRead less
Data Management Technologies for the Magnetic Resonance Imaging e-Research Grid. Howard Florey Institute researchers will collaborate with SGI's file-systems engineering team. Substantial benefits are expected from the development of techniques to support centralized and distributed processing medical image datasets. Issues requiring research include file space allocation algorithms and caching strategies. The proposed rapid database access technologies aim at solving these problems in the medic ....Data Management Technologies for the Magnetic Resonance Imaging e-Research Grid. Howard Florey Institute researchers will collaborate with SGI's file-systems engineering team. Substantial benefits are expected from the development of techniques to support centralized and distributed processing medical image datasets. Issues requiring research include file space allocation algorithms and caching strategies. The proposed rapid database access technologies aim at solving these problems in the medical imaging research context. The project attempts to 'improve data management for existing and new business applications'. This enhanced sharing of information will improve critical mass therefore fostering national and international collaboration. Read moreRead less
Generalized Information Fusion and Scheduling for Effective Situational Awareness. Research on the generalized information fusion will lead to better surveillance,monitoring & situational awareness technologies that will significantly enhance our national security and contribute to the strategic directions set by the Nation. It will deliver generic integrated uncertainty reasoning models, algorithms and implementations and will lead to enhanced interoperation capability across multiple collabora ....Generalized Information Fusion and Scheduling for Effective Situational Awareness. Research on the generalized information fusion will lead to better surveillance,monitoring & situational awareness technologies that will significantly enhance our national security and contribute to the strategic directions set by the Nation. It will deliver generic integrated uncertainty reasoning models, algorithms and implementations and will lead to enhanced interoperation capability across multiple collaborating organizations that have surveillance and situational awareness as their prime responsibilities (defence, police and the road transport authority). It will position the nation to use its relatively small defence force to maximum effectiveness in combating terrorism, crime and natural disasters like Tsunami & Earth quakes.
Read moreRead less
ARC Research Network in Enterprise Information Infrastructure. EII targets consolidated research towards the comprehensive development & establishment of advanced information infrastructures. Its prime purpose is to provide a forum for intellectual exchange by diverse yet complementary research groups, to address the fundamental research problems faced by scientific & business communities when dealing with deployment of information technology to globally distributed, and data intensive environme ....ARC Research Network in Enterprise Information Infrastructure. EII targets consolidated research towards the comprehensive development & establishment of advanced information infrastructures. Its prime purpose is to provide a forum for intellectual exchange by diverse yet complementary research groups, to address the fundamental research problems faced by scientific & business communities when dealing with deployment of information technology to globally distributed, and data intensive environments. EII will address 3 tightly coupled research themes: Ability to interoperate across existing heterogenous platforms & applications; Efficient processing of very large data sets; Technology adoption & impact. Generic results will be applicable to e-science and large business information systems installations.Read moreRead less