Efficient and Effective Interactive Visualization of Large Graphical Information Spaces. The expected outcome will change ways of interacting with and thinking about information processing for all information systems. As Australian companies became larger and more global, the ability to view and analyse the growing amount of company information becomes crucial to aspects as varied as trouble shooting or new ventures and eventually to the very viability of the organization itself. The expected ou ....Efficient and Effective Interactive Visualization of Large Graphical Information Spaces. The expected outcome will change ways of interacting with and thinking about information processing for all information systems. As Australian companies became larger and more global, the ability to view and analyse the growing amount of company information becomes crucial to aspects as varied as trouble shooting or new ventures and eventually to the very viability of the organization itself. The expected outcome will enhance this ability by providing an optimised global view and an effective navigation scheme of large graphical information spaces. This will attract leading international IT companies to use it for developing cutting-age tools, and will enhance significantly the capacity and international standing of Australian IT industry.Read moreRead less
Experimental runtime complexity analysis of logic programs. While declarative languages improve programmer productivity, they make it harder for programmers to understand the performance of their code. We will build a tool that will use profiling data and program analysis to allow programmers to predict the running time of their programs.
Multivariate Algorithmics: Meeting the Challenge of Real World computational complexity. This Project will result in better methods for designing the algorithms that all computer applications depend on. Algorithms are the instruction sets that tell computers how to process information. Some information processing tasks are intrinsically difficult, even for computers working at enormous speeds. This Project will deliver new mathematical approaches to overcome these difficulties. More efficient al ....Multivariate Algorithmics: Meeting the Challenge of Real World computational complexity. This Project will result in better methods for designing the algorithms that all computer applications depend on. Algorithms are the instruction sets that tell computers how to process information. Some information processing tasks are intrinsically difficult, even for computers working at enormous speeds. This Project will deliver new mathematical approaches to overcome these difficulties. More efficient algorithmic approaches for difficult problems enable advances in all areas of computer applications such as medical diagnosis and health prediction, national security, communications efficiency, industrial productivity and all fields of science and engineering.Read moreRead less
Algorithms and computation in four-dimensional topology. This project will establish Australia as a world leader in computational topology, particularly in the all-important areas of topology in three and four dimensions. In four dimensions this work will be truly groundbreaking; until now the field has seen little development due to the complexity of the algorithms and computations required, and the applicant is in the unique position of having the necessary tools to make significant progress ....Algorithms and computation in four-dimensional topology. This project will establish Australia as a world leader in computational topology, particularly in the all-important areas of topology in three and four dimensions. In four dimensions this work will be truly groundbreaking; until now the field has seen little development due to the complexity of the algorithms and computations required, and the applicant is in the unique position of having the necessary tools to make significant progress in a feasible time frame. In three dimensions this project will strengthen the distinguished computational topology community in Melbourne, led by pioneers such as Rubinstein, Goodman, Hodgson as well as the applicant himself.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
Adapting the Bulk Synchronous Parallel processing model to Peer-to-Peer Networked Computing. Advances in distributed computing have shown that data parallel and parametric applications domains are amenable to wide area distribution. The project will advance the Bulk Synchronous Parallel processing model to describe innovative applications from the loosely synchronous domain, e.g. fluid dynamics, strategy algorithms and N-body problems are challenges that have significant scientific and industria ....Adapting the Bulk Synchronous Parallel processing model to Peer-to-Peer Networked Computing. Advances in distributed computing have shown that data parallel and parametric applications domains are amenable to wide area distribution. The project will advance the Bulk Synchronous Parallel processing model to describe innovative applications from the loosely synchronous domain, e.g. fluid dynamics, strategy algorithms and N-body problems are challenges that have significant scientific and industrial value. The project specializes the exciting peer-to-peer paradigm, a frontier of inter-networking technology. By using the latest techniques and taking advantage of the technology implosion caused by low cost parallel infrastructure, the project outcomes will give Australia a strong position in the future of parallel technology.Read moreRead less
Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results ....Towards a unified theory of constrained control and estimation. The project will investigate the implications of duality and other connections between constrained control and estimation. We believe that the research will result in a richer understanding of these problems. In particular, we envisage an impact in at least four areas: (i) Computational issues, i.e., development of more efficient algorithms for constrained problems. (ii) Geometry of constrained problems, by extending recent results pertaining to constrained control to estimation problems. (iii) Problems with mixed constraints, for example, interval and finite set constraints. (iv) Fundamental limitations imposed by constraints to filtering and control problems.Read moreRead less
Parsimonious Quantization in Signal Processing and Control. In today's society there is an abundance of data. Indeed, it could be argued that we suffer from data 'overload'. Thus to turn 'data' into actions, the need for parsimony in signal processing and control arises. For that purpose, the data must be sampled (in time) and quantized (in space). Within this context, the current project is aimed at understanding aspects of sampled parsimonious quantization. The results have widespread practica ....Parsimonious Quantization in Signal Processing and Control. In today's society there is an abundance of data. Indeed, it could be argued that we suffer from data 'overload'. Thus to turn 'data' into actions, the need for parsimony in signal processing and control arises. For that purpose, the data must be sampled (in time) and quantized (in space). Within this context, the current project is aimed at understanding aspects of sampled parsimonious quantization. The results have widespread practical uses including digital cameras, video compression, audio quantization, control over communication networks, switching of electronic devices and many others.Read moreRead less