Investigations into machine learning applications in link analysis. Link analysis is an emerging tool for the detection of patterns in structured data. The detection of pattern in such data can lead to the detection of fraud occurrence, security breaches in computer systems, and patterns of social interactions with a community. It is also popularly applied to applications such as Web search engine designs and marketing analysis. This project aims to advance the area of link analysis by allowing ....Investigations into machine learning applications in link analysis. Link analysis is an emerging tool for the detection of patterns in structured data. The detection of pattern in such data can lead to the detection of fraud occurrence, security breaches in computer systems, and patterns of social interactions with a community. It is also popularly applied to applications such as Web search engine designs and marketing analysis. This project aims to advance the area of link analysis by allowing the incorporation of contextual information which accounts for relationships among actors properly. Advances in link detection will allow improvements in security and Web services on which a wide field of national bodies rely. This project can help to place Australia at the forefront of this research area.Read moreRead less
Exploring Scientific Information with Advanced New Search Tools. The rapidly growth of scientific literature in many fields makes finding information a challenge. For example, biologists produce over 1 million articles each year. Existing search tools have only limited success satisfying the demands of scientists' queries. This project will deliver intelligent e-research assistants capable of answering scientists' questions directly rather than returning a list of documents. This will allow scie ....Exploring Scientific Information with Advanced New Search Tools. The rapidly growth of scientific literature in many fields makes finding information a challenge. For example, biologists produce over 1 million articles each year. Existing search tools have only limited success satisfying the demands of scientists' queries. This project will deliver intelligent e-research assistants capable of answering scientists' questions directly rather than returning a list of documents. This will allow scientists to more efficiently exploit the literature enabling them to be more innovative and productive. This technology is applicable where ever finding facts in large volumes of text is critical, e.g. analysing surveillance material. Advanced search tools will have considerable academic and industrial impact.Read moreRead less
Ask the Net: Intelligent Natural Language Learning. Natural Language Processing (NLP) has progressed rapidly using corpus-based machine learning techniques. However, corpus development costs cause a ?data bottleneck? which prevents systems from reaching human competence. This project overcomes the difficulties of creating huge corpora by employing the innate language ability of untrained contributors. We will show how to automatically select and present examples, containing informative lingui ....Ask the Net: Intelligent Natural Language Learning. Natural Language Processing (NLP) has progressed rapidly using corpus-based machine learning techniques. However, corpus development costs cause a ?data bottleneck? which prevents systems from reaching human competence. This project overcomes the difficulties of creating huge corpora by employing the innate language ability of untrained contributors. We will show how to automatically select and present examples, containing informative linguistic structures, which are most beneficial for training NLP systems. These examples will be analysed by many contributors whose responses will be automatically collated into corpora. Huge corpora are vital to emerging language technologies for managing textual information in the global economy.
Read moreRead less
Parsing the web: Exploiting redundancy to understand language. This project will automatically learn the grammatical structure of language by exploiting redundancy of facts, like 'Mozart was born in 1756', from a trillion words of web text. These facts will be used to understand more complex sentences. This will enable smart information use of text with grammatical information for large-scale information access for the first time. This project will strengthen Australia's world-class expertise, ....Parsing the web: Exploiting redundancy to understand language. This project will automatically learn the grammatical structure of language by exploiting redundancy of facts, like 'Mozart was born in 1756', from a trillion words of web text. These facts will be used to understand more complex sentences. This will enable smart information use of text with grammatical information for large-scale information access for the first time. This project will strengthen Australia's world-class expertise, providing opportunities for future researchers in this area. Our expanded C&C tools and trillion word corpus will be used by academics, companies and governments, in Australia and internationally, aiding applications including financial surveillance and fraud detection.
Read moreRead less
Planning, Communication, and Collaboration in Cognitive Systems: A Constructive Approach. Change is a constant and unavoidable characteristic of the current and foreseeable business environment. Currently systems cope poorly with change and as a result they are not sufficiently dependable and adaptable to support business agility and innovation. The aim of this project is to advance the start-of-the art and to lay a new foundation for dependable and adaptable cognitive systems that can plan, com ....Planning, Communication, and Collaboration in Cognitive Systems: A Constructive Approach. Change is a constant and unavoidable characteristic of the current and foreseeable business environment. Currently systems cope poorly with change and as a result they are not sufficiently dependable and adaptable to support business agility and innovation. The aim of this project is to advance the start-of-the art and to lay a new foundation for dependable and adaptable cognitive systems that can plan, communicate and collaborate in complex and dynamic environments.Read moreRead less
Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, rec ....Network Intrusion Detection via Machine Learning. Computer security is an increasingly important, yet complex task. It
takes significant skills to configure systems properly such that they
are safe from malicious attacks.
The proposed project aims at designing automatic systems which are
able to adapt to an existing network configuration and which detect
novel and unusual events. For this purpose we will use modern machine
learning techniques, mainly based on kernels. In particular, recently
developed algorithms to estimate the support of a distribution and
detect rare events will be employed in this context.
The project is in cooperation with Dr. Ralf Herbrich (Microsoft
Research, Cambridge).
Read moreRead less
Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, ....Computer Vision Optimization Problems Using Machine Learning. Computer Vision concerns itself with understanding the world through the analysis of images obtained by a video or still camera. An important application is tracking of people in video and modelling their movements. This has evident applications in security, sport and entertainment. By enabling the computer to capture the motion of a subject in a video, we may detect suspicious activity in security, analyze the motion (golf-swing, diving style) of a sports-person, or capture the motion of an actor for animation or game applications. Development of a reliable technology requires new optimization techniques, which will place Australia at the forefront of the application of such research, commercially and for the public benefit.Read moreRead less
Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. ....Computing with nearly-consistent data. This project will help programmers correctly use data that originates at various times and places, and spreads unevenly through a system. Computation will combine data that comes from different situations, and is not exactly consistent. Capability to develop high quality software on platforms with this feature will enhance the value of the Australian IT industry. As well, the industries which use the software benefit from correctly working with their data. Sensor networks have data like this, and they play a vital role in environmental monitoring. Cloud computing platforms also have this type of data, and these allow smaller enterprises to grow smoothly, without needing large up-front investments in computing infrastructure.Read moreRead less
Enhanced Automation of Close-Range Photogrammetry for Defence and National Security Applications. The project, which falls under the National Research Priority of safeguarding Australia, will be of significant national and community benefit. The research outcomes will advance close-range photogrammetry (CRP) technology, especially in the critical areas of defence and national security. It will lower the cost base of CRP and expand its commercial potential in new application domains, thus promoti ....Enhanced Automation of Close-Range Photogrammetry for Defence and National Security Applications. The project, which falls under the National Research Priority of safeguarding Australia, will be of significant national and community benefit. The research outcomes will advance close-range photogrammetry (CRP) technology, especially in the critical areas of defence and national security. It will lower the cost base of CRP and expand its commercial potential in new application domains, thus promoting business activity in the broader Australian spatial information industry. Also, community oriented benefits will be seen through the improved prospects for new public-good applications of CRP, ranging for example from cultural heritage recording through to homeland security and forensic measurement for crime scene analysis.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less