High dimensional problems of integration and approximation. In many applications, notably financial mathematics, problems of
integration and approximation of functions in very high dimensions
are of great interest. By finding modern mathematical solutions to
these problems, we will therefore contribute to Australia's future
success in developing innovative technologies for industrial and
economic applications. By researching at an internationally
competitive level and by cooperating with i ....High dimensional problems of integration and approximation. In many applications, notably financial mathematics, problems of
integration and approximation of functions in very high dimensions
are of great interest. By finding modern mathematical solutions to
these problems, we will therefore contribute to Australia's future
success in developing innovative technologies for industrial and
economic applications. By researching at an internationally
competitive level and by cooperating with international experts, we
will have a share in further strengthening the excellent role of
Australian research institutions within the international scientific
community in mathematics and scientific computing.Read moreRead less
Compilation Techniques for Embedded Systems. Highly optimising compiler tools are becoming an important part of the software development process for embedded systems. This project will provide Australia with core technology in the area of tools for embedded systems. It will allow safer embedded systems in mission-critical applications. In addition, the Australian Industry will benefit from a substantially growing embedded systems market where tools are a pre-requisite for a cost-aware and safe s ....Compilation Techniques for Embedded Systems. Highly optimising compiler tools are becoming an important part of the software development process for embedded systems. This project will provide Australia with core technology in the area of tools for embedded systems. It will allow safer embedded systems in mission-critical applications. In addition, the Australian Industry will benefit from a substantially growing embedded systems market where tools are a pre-requisite for a cost-aware and safe software development. The industry interested in embedded system tools are: Telecom/Datacom, Consumer Electronics, Industrial Automation, Retail Automation, Office Automation, Military/Aerospace, Automotive, Information Automation, Medical Devices.Read moreRead less
Multivariate Algorithmics: Meeting the Challenge of Real World computational complexity. This Project will result in better methods for designing the algorithms that all computer applications depend on. Algorithms are the instruction sets that tell computers how to process information. Some information processing tasks are intrinsically difficult, even for computers working at enormous speeds. This Project will deliver new mathematical approaches to overcome these difficulties. More efficient al ....Multivariate Algorithmics: Meeting the Challenge of Real World computational complexity. This Project will result in better methods for designing the algorithms that all computer applications depend on. Algorithms are the instruction sets that tell computers how to process information. Some information processing tasks are intrinsically difficult, even for computers working at enormous speeds. This Project will deliver new mathematical approaches to overcome these difficulties. More efficient algorithmic approaches for difficult problems enable advances in all areas of computer applications such as medical diagnosis and health prediction, national security, communications efficiency, industrial productivity and all fields of science and engineering.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Algorithmics for Extremely Mobile Wireless Networks. Existing wireless network protocols need stringent conditions to be effective. These conditions are rarely met for concrete applications such as Defence, Disaster-Relief, Search-and-Rescue. All these cannot rely on existing infrastructure, and often require high mobility. This is crucial in the case of Australia which cannot rely on complete network coverage of its lands and seas. This project will develop new wireless protocols for applicati ....Algorithmics for Extremely Mobile Wireless Networks. Existing wireless network protocols need stringent conditions to be effective. These conditions are rarely met for concrete applications such as Defence, Disaster-Relief, Search-and-Rescue. All these cannot rely on existing infrastructure, and often require high mobility. This is crucial in the case of Australia which cannot rely on complete network coverage of its lands and seas. This project will develop new wireless protocols for applications requiring extreme mobility. It will increase Australia's control of this, now ubiquitous, technology thus rendering Australia a key player in this field.Read moreRead less
Parameterized Algorithm Design and Complexity Analysis: New Methods and Strategic Applications in the FPT Algorithmic Server Project. A fundamental discovery of the first decades of computer science is that completely efficient (polynomial time) algorithms probably do not exist for thousands of natural computational problems. The project will result in new methods for designing and analyzing algorithms for hard problems with natural parameters, and in improved
algorithms for these problems.
Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results ....Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results pertaining to constrained control to estimation problems. (iii) Problems with mixed constraints, for example, interval and finite set constraints. (iv) Fundamental limitations imposed by constraints to filtering and control problems.Read moreRead less
Efficient Processing of Complex Spatial Queries. Similarity search and join are two of the most popular yet complex queiries in spatial databases. They are also two of the major spatial data analysis paradigms. To complement the existing techniques, this project aims to investigate a more complex and important form of these two problems, and to develop novel framework to approach the proposed problems. The successful achievements of the project will not only bring new spatial data analysis techn ....Efficient Processing of Complex Spatial Queries. Similarity search and join are two of the most popular yet complex queiries in spatial databases. They are also two of the major spatial data analysis paradigms. To complement the existing techniques, this project aims to investigate a more complex and important form of these two problems, and to develop novel framework to approach the proposed problems. The successful achievements of the project will not only bring new spatial data analysis techniques but also deliever effective solutions to a number of real-life apllications.Read moreRead less