Location-Based Personalisation in Mobile Commerce (M-Commerce). M-commerce, though playing an important role in future competitiveness of Australia, suffers a low user demand. While location-based services have taken off in Europe, they are still at their infancy in Australia. In terms of IT access, Australia is ranked lower than many Asian countries. Our work gains an understanding of users' concerns and expectations of location-based services, which leads to better application designs and thus ....Location-Based Personalisation in Mobile Commerce (M-Commerce). M-commerce, though playing an important role in future competitiveness of Australia, suffers a low user demand. While location-based services have taken off in Europe, they are still at their infancy in Australia. In terms of IT access, Australia is ranked lower than many Asian countries. Our work gains an understanding of users' concerns and expectations of location-based services, which leads to better application designs and thus a wider adoption. An examination of users' attitude towards personalised content and concerns about data privacy provides insights to Australian legislation in relation to telemarketing and data-driven marketing. National benefits will stem from a balance between telemarketing efficiency and users' benefits.Read moreRead less
Control protocols for wireless networks. There is tremendous commercial potential in the development of wireless multi-hop and sensor networks. This project will help realize such networks, with commercial benefits for the network providers, and the customers that use them (low cost networking). Particular outcomes targeted for Australian needs include: 1) protocols allowing advanced telecommunications services to cover greater geographic areas with less infrastructure 2) improved reliability o ....Control protocols for wireless networks. There is tremendous commercial potential in the development of wireless multi-hop and sensor networks. This project will help realize such networks, with commercial benefits for the network providers, and the customers that use them (low cost networking). Particular outcomes targeted for Australian needs include: 1) protocols allowing advanced telecommunications services to cover greater geographic areas with less infrastructure 2) improved reliability of local communication services in remote or rugged areas 3) protocols for sensor networks, allowing remote monitoring and control of many environmental factors. Read moreRead less
Developing Minimum Message Length and Support Vector Machine methods to predict user behaviour. Predicting and modelling customer behaviour enables considerable savings in the telecommunications industry and elsewhere. The resulting predictive models facilitate identifying novice users, identifying fraud, responding to users' needs, guiding and advising users, and forwarding useful information.
We consider two cutting-edge data mining approaches, Minimum Message Length (developed and led by ....Developing Minimum Message Length and Support Vector Machine methods to predict user behaviour. Predicting and modelling customer behaviour enables considerable savings in the telecommunications industry and elsewhere. The resulting predictive models facilitate identifying novice users, identifying fraud, responding to users' needs, guiding and advising users, and forwarding useful information.
We consider two cutting-edge data mining approaches, Minimum Message Length (developed and led by Monash) and Support Vector Machines, in order to create efficient tailor-made software.
Our software will respond to specific groups of users, and their changes over time, rather than just the average user. Moreover, it will integrate the functionalities of existing individual data mining software.Read moreRead less
EPOS: Efficient Processing of Moving Object Streams in Data Management Systems. Advanced moving object data management systems are becoming a core technology for a large variety of applications such as traffic management and inventory tracking. These applications play a ubiquitous, critical role in our daily lives. In the same way as the first prototype of a relational database paved the way for successive relational database management systems, we envision that EPOS will form the foundation for ....EPOS: Efficient Processing of Moving Object Streams in Data Management Systems. Advanced moving object data management systems are becoming a core technology for a large variety of applications such as traffic management and inventory tracking. These applications play a ubiquitous, critical role in our daily lives. In the same way as the first prototype of a relational database paved the way for successive relational database management systems, we envision that EPOS will form the foundation for a new generation of moving object databases. EPOS is designed to process a large number of concurrently running continuous monitoring queries on a massive set of moving objects with frequent updates. Read moreRead less
Overseeing the internet: new paradigms of network measurement. Like the electricity network, the Internet is a core infrastructure, and so must be reliable, efficient, and fairly accessible. A gap in bandwidth supply is like a blackout in terms of lost business and productivity. Inefficiency increases costs as more equipment is needed for the same service, and an inability to police network providers distorts economics and strangles access to the best services. Network health can only be assesse ....Overseeing the internet: new paradigms of network measurement. Like the electricity network, the Internet is a core infrastructure, and so must be reliable, efficient, and fairly accessible. A gap in bandwidth supply is like a blackout in terms of lost business and productivity. Inefficiency increases costs as more equipment is needed for the same service, and an inability to police network providers distorts economics and strangles access to the best services. Network health can only be assessed through measurements, however, current methods are incapable of measuring some of the most important metrics, for instance whether a provider is conforming to its contract. This project will provide the breakthroughs necessary to ensure that network behaviour can be accurately and comprehensively assessed.Read moreRead less
Data Mining by Clustering in Very Large Relational Databases. Many commercial and governmental entities possess very large relational data that cannot be feasibly analyzed by today's computers, e.g., gene expression data, product usage databases and telecommunication call records. The clustering tools developed in this project will have a significant benefit on many business processes that involve clustering this type of data, such as fraud detection and market segmentation.
Enabling Reliable, Efficient, and Secure Networks: Next Generation Measurement for the Internet. Like the electricity network, the Internet is a core infrastructure connecting society, and so must be reliable, efficient, and secure. A gap in bandwidth supply is like a blackout in terms of lost business, productivity and essential data. Inefficiency increases costs as more equipment is needed for the same service, and poor security threatens both the economic and personal spheres, limiting free ....Enabling Reliable, Efficient, and Secure Networks: Next Generation Measurement for the Internet. Like the electricity network, the Internet is a core infrastructure connecting society, and so must be reliable, efficient, and secure. A gap in bandwidth supply is like a blackout in terms of lost business, productivity and essential data. Inefficiency increases costs as more equipment is needed for the same service, and poor security threatens both the economic and personal spheres, limiting freedom and adding cost. A raw material of network health and security is network measurements showing what is going on. However, current methods cannot cope with the size and speed of today's Internet. This project will provide the measurement breakthroughs necessary to ensure that networks are reliable, secure, and fairly priced.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop paral ....High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop parallel algorithms for traffic analysis and load balancing that can exploit the capacity of these new firewalls. This project provides an excellent opportunity for an Australian company to compete in the growing security market.Read moreRead less
Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses an ....Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses and break-in attempts frequently appear in the world news. A major impediment to confidence in voice-over-IP services is the risk of attacks on its infrastructure, and the potential for using weaknesses in voice-over-IP infrastructure to launch attacks on the existing telephone network.Read moreRead less