Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-ba ....Design and Development of a Web-based Intelligent Multimedia Mining System. Increasing amounts of digital multimedia data in the form of video is being captured and stored. However, even the most advanced storage and retrieval techniques lack the features required to be used singly, or in combination, to fulfil a wide range of user needs and rapid access to multimedia resources, even in a very large video database. The core challenges are indeed to develop efficient, smart and intelligent web-based multimedia mining in Australia and elsewhere. In this project, we will explore techniques and develop algorithms for content-based multimedia retrieval and mining in multimedia databases.Read moreRead less
Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is sig ....Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is significant because it is expected to automate most of the tedious and complex activities of on-line transactions. The main outcome will be a set of techniques and programs that will form the basis of the commercial software, with a significant export potential.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. ....Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. Sensor networks have data like this, and they play a vital role in environmental monitoring. Cloud computing platforms also have this type of data, and these allow smaller enterprises to grow smoothly, without needing large up-front investments in computing infrastructure.Read moreRead less
Integration of Object Behavior in Federated Information Systems. Integration of autonomous object-oriented systems requires the integration
of object structure and object behaviour. Research in federated information
systems has so far mainly addressed integration of object structure. This
project will investigate the integration of object behaviour, especially object
life cycles. A major application area is the integration of business processes,
which is typically required when companies me ....Integration of Object Behavior in Federated Information Systems. Integration of autonomous object-oriented systems requires the integration
of object structure and object behaviour. Research in federated information
systems has so far mainly addressed integration of object structure. This
project will investigate the integration of object behaviour, especially object
life cycles. A major application area is the integration of business processes,
which is typically required when companies merge or enter into
consumer-producer relationships and constitutes a key capability for B2B e-commerce
systems. Consistency criteria for behaviour integration
will be defined and applied in a graphical integration tool that guides the
definition of global behavioural views upon autonomous object-oriented systems.
Read moreRead less
Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issue ....Scalable Composition and Deployment of Business-to-Business Web-based E-Services. The ubiquity of the Internet offers far reaching opportunities for
emerging Web applications. Separate businesses may be linked into a virtual enterprise that provides a one-stop shop for users. However, there is no model available for managing electronically accessible
services (e-services) in a systematic manner which make them easy to compose and deploy. Our research proposes to address the fundamental issues related to fast and scalable composition of e-services in Web-based environments. We propose novel concepts for integrating a large number of dynamic and loosely coupled services. Another distinctive feature of our approach is the peer-to-peer collaborative execution of services.Read moreRead less
Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory an ....Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory and informed decision-making. This provides significant benefits of not only placing Australia in the forefront of exploiting multimodal user behaviour big data in dynamic e-commerce but also transforming Australian government and businesses to intelligent and contextual services adaptive to complex situations.Read moreRead less
Dynamic Semantic Interoperability for Business Processes. The integration of independently developed applications constitutes
one of the major bottlenecks in modern software development in
business, industry, and defense, in particular for a nation such as
Australia that is highly reliant on overseas trade. Technologies that
facilitate the smooth application integration promise significant
savings in software development. By offering automated support task,
this project offers the potenti ....Dynamic Semantic Interoperability for Business Processes. The integration of independently developed applications constitutes
one of the major bottlenecks in modern software development in
business, industry, and defense, in particular for a nation such as
Australia that is highly reliant on overseas trade. Technologies that
facilitate the smooth application integration promise significant
savings in software development. By offering automated support task,
this project offers the potential of significant cost savings, highly
beneficial to any industry with a major ICT component. Lessons learned
from the demonstration prototype can be directly carried over into
commercial tool development. The project strengthens links to high
quality European research laboratories.
Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less