Fast, practical and effective algorithms for clustering with advice. To maintain a safe and healthy society, government and industry need high quality immunization and national security databases. Since we cannot afford to have duplicate, incomplete and conflicting records that refer to the same person, we unify them by identifying clusters of related records.
In the emerging field of functional genomics, diagnosis of certain diseases is enhanced by determining which genes act together. Diffe ....Fast, practical and effective algorithms for clustering with advice. To maintain a safe and healthy society, government and industry need high quality immunization and national security databases. Since we cannot afford to have duplicate, incomplete and conflicting records that refer to the same person, we unify them by identifying clusters of related records.
In the emerging field of functional genomics, diagnosis of certain diseases is enhanced by determining which genes act together. Different experimental runs might result in different clusterings of genes: we need one consensus clustering that summarizes the experimental outcomes.
Cleaning databases and combining clusterings by hand would require vast amounts of time. This project will result in faster and more accurate computational procedures.Read moreRead less
Efficient Synchronisation of Large Repositories. Accuracy and maintenance of vast quantities of data are essential for any modern society. The economy, health institutes and industries, and our defence and legal systems rely on having data being distributed widely and securely, and on queries being answered accurately and quickly. Complete synchronisation of databases is often impossible due to the limitations of internet bandwidth. Better compression techniques have the potential to allow crit ....Efficient Synchronisation of Large Repositories. Accuracy and maintenance of vast quantities of data are essential for any modern society. The economy, health institutes and industries, and our defence and legal systems rely on having data being distributed widely and securely, and on queries being answered accurately and quickly. Complete synchronisation of databases is often impossible due to the limitations of internet bandwidth. Better compression techniques have the potential to allow critical data to be distributed much more efficiently; we anticipate in some applications that the size of a compressed file could be reduced tenfold or more compared to previous best methods, leading to dramatic savings.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
The Time-Varying Eigenvalue Problem with Application to Signal Processing and Control. Linear models are ubiquitous in representing physical processes. Decomposing a linear model into its fundamental components is known as the eigenvalue problem. In applications as wide ranging as astronomy, aircraft control systems, Internet search engines and communication systems, it is necessary to perform this decomposition of a pertinent time varying linear model on the fly. This project aims to develop si ....The Time-Varying Eigenvalue Problem with Application to Signal Processing and Control. Linear models are ubiquitous in representing physical processes. Decomposing a linear model into its fundamental components is known as the eigenvalue problem. In applications as wide ranging as astronomy, aircraft control systems, Internet search engines and communication systems, it is necessary to perform this decomposition of a pertinent time varying linear model on the fly. This project aims to develop significantly faster and more accurate algorithms for this time varying eigenvalue problem than currently exist. Very modern techniques will be employed to achieve this aim, and the potential benefits to Australian hi-tech industries are great.
Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algor ....Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algorithms developed in the project will help security analysts to detect abnormal behavious such as money laundering, help biologists understand protein-protein interaction networks, and help engineers to understand large software systems.Read moreRead less
Sparse grid approximations and fitting using generalised combination techniques. Sparse grid techniques provide an effective tool to deal with the
computational curse of dimensionality which is a constant challenge in
modelling complex data. The proposed research is aimed at the
development and analysis of algorithms for data fitting with sparse
grids using variants of the combination technique. The outcome of the
research is a theory which will provide insights in the applicability,
limit ....Sparse grid approximations and fitting using generalised combination techniques. Sparse grid techniques provide an effective tool to deal with the
computational curse of dimensionality which is a constant challenge in
modelling complex data. The proposed research is aimed at the
development and analysis of algorithms for data fitting with sparse
grids using variants of the combination technique. The outcome of the
research is a theory which will provide insights in the applicability,
limitations and the convergence properties of the proposed
algorithms. The outcomes will be widely applicable in modelling of
large scale and complex data as is encountered in areas of
bioinformatics, physics and experimental studies of complex systems.
Read moreRead less
Evolutionary multi-objective algorithms for Global Grids. This research investigates alternative software technologies for Grid-based evolutionary multi-objective decision algorithms. By employing the latest adaptive techniques and taking advantage of the low cost Grid infrastructure, new parallel evolutionary systems will be developed that can rapidly supply robust solutions to complex problems. This project will further develop an understanding of scaling issues in parallel evolutionary syste ....Evolutionary multi-objective algorithms for Global Grids. This research investigates alternative software technologies for Grid-based evolutionary multi-objective decision algorithms. By employing the latest adaptive techniques and taking advantage of the low cost Grid infrastructure, new parallel evolutionary systems will be developed that can rapidly supply robust solutions to complex problems. This project will further develop an understanding of scaling issues in parallel evolutionary systems and pave the way for even more widespread application of evolutionary techniques for large scale, data-intensive applications in science and industry.Read moreRead less