Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issue ....Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issues related to fast and scalable composition of e-services in Web-based environments. We propose novel concepts for integrating a large number of dynamic and loosely coupled services. Another distinctive feature of our approach is the peer-to-peer collaborative execution of services.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Dynamic Load Balancing for Systems under Heavy Traffic Demand and High Task Size Variation. Current computer systems cannot cope with extremely heavy traffic demands. A solution to such a difficult problem is to dynamically balance the load across the system's servers. Several solutions have been proposed and demonstrate advances in certain limited conditions (e.g. uniform distribution). However fundamental research work must be undertaken beyond the current way of dealing with the core issues o ....Dynamic Load Balancing for Systems under Heavy Traffic Demand and High Task Size Variation. Current computer systems cannot cope with extremely heavy traffic demands. A solution to such a difficult problem is to dynamically balance the load across the system's servers. Several solutions have been proposed and demonstrate advances in certain limited conditions (e.g. uniform distribution). However fundamental research work must be undertaken beyond the current way of dealing with the core issues of load balancing. Accounting for realistic conditions is a theoretical and practical challenge. This project aims at developing theoretical and computational models for dynamic task distribution for the studied systems. The benefits include substantial improvement of the system response time.Read moreRead less
Megha: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. In the next 20 years, service-oriented computing will play an important role in shaping the industry, impacting the way business is conducted and how services are delivered and managed. This paradigm will have major impact on the services economy, which contributes significantly towards Australia's GDP. With the increased demand for delivering services to a large number of users, providers are ....Megha: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services. In the next 20 years, service-oriented computing will play an important role in shaping the industry, impacting the way business is conducted and how services are delivered and managed. This paradigm will have major impact on the services economy, which contributes significantly towards Australia's GDP. With the increased demand for delivering services to a large number of users, providers are looking for novel ways of hosting their application services on Clouds at low cost while meeting users' quality of service expectations. This project develops novel utility-oriented technologies for federation of Clouds to support scaling of application services and thereby, transform the Australian service industry and economy.Read moreRead less
Service Level Agreement (SLA)-oriented Resource Allocation for Data Centers and Cloud Computing Systems. In the next 20 years, service-oriented computing will play an important role in shaping the industry and the way business is conducted and services are delivered and managed. This paradigm will have major impact on service economy, which contributes significantly towards Australia's GDP. The service sector, which includes health, financial, and government services, involves significant intera ....Service Level Agreement (SLA)-oriented Resource Allocation for Data Centers and Cloud Computing Systems. In the next 20 years, service-oriented computing will play an important role in shaping the industry and the way business is conducted and services are delivered and managed. This paradigm will have major impact on service economy, which contributes significantly towards Australia's GDP. The service sector, which includes health, financial, and government services, involves significant interaction between clients and providers. With increasing dependency on ICT technologies in their realization, major advances are required in service-driven allocation of resources to competing applications. This project develops technologies for Service Level Agreement (SLA)-based allocation of Data Center/Cloud computing system resources to applications.Read moreRead less
InterGrid: Peering Architecture and Policies for Internetworking Disparate Grids. Grid computing enables the creation of Cyberinfrastructure for e-Research applications. It is recognised as one of the top five emerging technologies that will have a major impact on the quality of science and society over the next 20 years. Several nations around the world including Australia have developed their own national Grids based on the notion of virtual organisations. These dispersed Grid initiatives have ....InterGrid: Peering Architecture and Policies for Internetworking Disparate Grids. Grid computing enables the creation of Cyberinfrastructure for e-Research applications. It is recognised as one of the top five emerging technologies that will have a major impact on the quality of science and society over the next 20 years. Several nations around the world including Australia have developed their own national Grids based on the notion of virtual organisations. These dispersed Grid initiatives have resulted in Grid islands without any support for peering arrangements between them. This limitation will not allow us to realise full potential of the Grid computing paradigm. This InterGrid project aims to revolutionise Grid computing by developing new technologies for peering of Grids.Read moreRead less
Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users ....Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users can be achieved by leveraging existing infrastructure provided by other CDNs, creating economies of scale that were previously impossible. This is crucial for uses on the so-called edges of the internet (e.g. Australia) that depend on a small number of expensive data links to the major data centres in Europe and the USA.Read moreRead less
Quality of Service-based Scheduling of e-Research Application Workflows on Global Grids. e-Research has the potential to offer Australia significant economic and social benefits as it enables researchers from different disciplines and organisations to engage in collaborative scientific investigation. In e-Research environments, users need to have secure access to remote resources owned by different organisations. Since these resources are not directly under the control of e-Research applications ....Quality of Service-based Scheduling of e-Research Application Workflows on Global Grids. e-Research has the potential to offer Australia significant economic and social benefits as it enables researchers from different disciplines and organisations to engage in collaborative scientific investigation. In e-Research environments, users need to have secure access to remote resources owned by different organisations. Since these resources are not directly under the control of e-Research applications, they need to negotiate with resource providers for access time, duration, and the level of quality of service expected to make sure that the interlinked operations are performed as required. This project develops information and communications technologies that enable the creation of such e-Research environments.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less