ORCID Profile
0000-0002-1235-9673
Current Organisation
RMIT University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Information Systems | Global Information Systems | Distributed Computing | Information Systems Management | Database Management | Distributed and Grid Systems | Analysis of Algorithms and Complexity | Artificial Intelligence and Image Processing not elsewhere classified | Computer System Security | Networking and Communications | Computer Software | Operating Systems | Distributed computing and systems software | Information Systems Development Methodologies | Artificial Intelligence and Image Processing | Database Management | Data Structures | Information Storage, Retrieval And Management | Software Engineering | Information Systems Organisation | Electronic Commerce | Data Security | Cloud computing | Distributed systems and algorithms | Pattern Recognition and Data Mining | Cyberphysical systems and internet of things | Analysis Of Algorithms And Complexity | Business and Management | Interdisciplinary Engineering Not Elsewhere Classified | Manufacturing robotics | Interorganisational Information Systems and Web Services
Information processing services | Application tools and system utilities | Application packages | Application Tools and System Utilities | Expanding Knowledge in the Information and Computing Sciences | Communication Networks and Services not elsewhere classified | Computer software and services not elsewhere classified | Application Software Packages (excl. Computer Games) | Computer Software and Services not elsewhere classified | Other | Commercial security services | Technological and organisational innovation | Management of Greenhouse Gas Emissions from Information and Communication Services | Communication services not elsewhere classified | Information Processing Services (incl. Data Entry and Capture) |
Publisher: IEEE
Date: 12-2015
Publisher: IEEE
Date: 06-2020
Publisher: No publisher found
Date: 2010
Publisher: IEEE
Date: 09-2016
Publisher: ACM
Date: 05-08-2019
Publisher: ACM
Date: 23-11-2020
Publisher: IEEE
Date: 06-2010
Publisher: No publisher found
Date: 2004
DOI: 10.1007/11516798\_30
Publisher: IEEE
Date: 05-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2016
Publisher: Elsevier BV
Date: 05-2014
Publisher: Association for Computing Machinery (ACM)
Date: 12-1997
Abstract: We address the development of a normalization theory for object-oriented data models that have common features to support objects. We first provide an extension of functional dependencies to cope with the richer semantics of relationships between objects, called path dependency, local dependency, and global dependency constraints. Using these dependency constraints, we provide normal forms for object-oriented data models based on the notions of user interpretation (user-specified dependency constraints) and object model . In constrast to conventional data models in which a normalized object has a unique interpretation, in object-oriented data models, an object may have many multiple interpretations that form the model for that object. An object will then be in a normal form if and only if the user's interpretation is derivable from the model of the object. Our normalization process is by nature iiterative, in which objects are restructured until their models reflect the user's interpretation.
Publisher: No publisher found
Date: 2018
Publisher: IEEE
Date: 2004
Publisher: Elsevier BV
Date: 12-2006
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2014
DOI: 10.1109/MCC.2014.20
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2014
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Elsevier BV
Date: 2014
DOI: 10.1016/J.CMPB.2013.06.019
Abstract: Hospital waiting times are considerably long, with no signs of reducing any-time soon. A number of factors including population growth, the ageing population and a lack of new infrastructure are expected to further exacerbate waiting times in the near future. In this work, we show how healthcare services can be modelled as queueing nodes, together with healthcare service workflows, such that these workflows can be optimised during execution in order to reduce patient waiting times. Services such as X-ray, computer tomography, and magnetic resonance imaging often form queues, thus, by taking into account the waiting times of each service, the workflow can be re-orchestrated and optimised. Experimental results indicate average waiting time reductions are achievable by optimising workflows using dynamic re-orchestration.
Publisher: IEEE
Date: 09-2017
Publisher: Elsevier BV
Date: 09-2017
Publisher: ACM
Date: 23-04-2006
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: No publisher found
Date: 2017
Publisher: ACM
Date: 29-06-2003
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2020
Publisher: IEEE
Date: 2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2006
DOI: 10.1109/MDSO.2006.57
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: IEEE
Date: 2006
Publisher: Elsevier BV
Date: 05-2020
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.62
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2016
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11516798_30
Publisher: IEEE
Date: 2005
DOI: 10.1109/ISCC.2005.19
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2017
Publisher: Elsevier BV
Date: 03-2014
Publisher: IEEE
Date: 07-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: No publisher found
Date: 2003
Publisher: Inderscience Publishers
Date: 2004
Publisher: Springer Berlin Heidelberg
Date: 1994
Publisher: IEEE
Date: 09-2010
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Elsevier BV
Date: 2014
Publisher: International Academy Publishing (IAP)
Date: 07-2013
Publisher: American Chemical Society (ACS)
Date: 11-02-2010
DOI: 10.1021/LA904751Q
Abstract: We demonstrate a simple synthetic strategy for the fabrication of single-phase rare earth (RE) doped gadolinium oxide (Gd(2)O(3):RE where RE = terbium (Tb), ytterbium (Yb), and erbium (Er)) nanorods (NRs) as multimodal imaging probes. The NRs are ultranarrow and exhibit both emission and magnetic characteristics. The Tb-doped and Yb/Er-codoped Gd(2)O(3) NRs exhibit down- and up-conversion fluorescence respectively, and also exhibit paramagnetism. Importantly, these codoped NRs possess excellent magnetic characteristics, as shown in their longitudinal relaxation time (T1) -weighted image contrast, which is closer to that of commercial Gadovist for magnetic resonance imaging (MRI) applications. This property opens up new avenues in the development of contrast agents.
Publisher: IEEE
Date: 10-2017
Publisher: Springer Science and Business Media LLC
Date: 20-12-2006
Publisher: IEEE
Date: 10-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2015
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: World Scientific Pub Co Pte Lt
Date: 03-1995
DOI: 10.1142/S0218843095000020
Abstract: This paper describes a number of approaches to the development of more intelligent and more adaptable software. The paper introduces the notion of reflection and surveys two major styles: task and programming reflection. The paper then introduces a new form, viz operational reflection, based on the integration of these styles. This form of reflection is applied to cooperative environments and enables local database systems to be surrounded by a layer of meta-level software. This is used to capture domain and operational knowledge, and to describe, at least in part, remote systems and to monitor task-oriented activities. Thus we can turn a set of discrete database systems into a cooperative environment.
Publisher: No publisher found
Date: 2003
Publisher: No publisher found
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2001
DOI: 10.1109/71.970557
Publisher: Springer Berlin Heidelberg
Date: 1994
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2020
Publisher: Elsevier BV
Date: 09-2017
Publisher: IEEE
Date: 05-2020
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 05-2020
Publisher: Elsevier BV
Date: 07-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2023
Publisher: IEEE
Date: 2006
DOI: 10.1109/ICNS.2006.22
Publisher: No publisher found
Date: 2005
DOI: 10.1007/11575863\_64
Publisher: No publisher found
Date: 2010
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 1997
DOI: 10.1109/4236.623965
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2016
DOI: 10.1109/MCC.2016.76
Publisher: No publisher found
Date: 2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2017
Publisher: Emerald
Date: 31-12-2006
DOI: 10.1108/17427370780000137
Abstract: Caching is commonly used to improve the performance of mobile computers. Due to the limitations of wireless networks (e.g. low bandwidth, intermittent connectivity), ensuring the consistency of cached data becomes a difficult issue. Existing research have shown that broadcast‐based cache invalidation techniques can effectively maintain cache consistency for mobile applications. However, most existing performance analysis of cache invalidation algorithms were carried out through simulation. Therefore, an analytical study is important to provide a deeper understanding of broadcast‐based invalidation techniques. In this paper, we present detailed analytical models of the major existing cache invalidation schemes. The models provide a basis to highlight the strengths and weaknesses of the different schemes and facilitate further investigation into cache invalidation for mobile environments. Extensive simulation has also been performed, and verifies the accuracy of the models developed.
Publisher: IEEE
Date: 09-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2014
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: Association for Computing Machinery (ACM)
Date: 11-2000
Publisher: IEEE
Date: 07-2008
Publisher: IEEE
Date: 2005
DOI: 10.1109/ICDE.2005.76
Publisher: Elsevier BV
Date: 07-2010
Publisher: IEEE
Date: 2006
Publisher: IEEE
Date: 1999
Publisher: ACM
Date: 04-02-2020
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Elsevier BV
Date: 04-2017
Publisher: IEEE
Date: 03-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2001
Publisher: Elsevier BV
Date: 02-2018
Publisher: No publisher found
Date: 2017
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE Comput. Soc
Date: 2003
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2020
Publisher: IEEE Comput. Soc. Press
Date: 1997
Publisher: IEEE (Comput. Soc.)
Date: 2004
DOI: 10.1109/LCN.2004.79
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: IEEE
Date: 07-2009
Publisher: IEEE
Date: 2000
Publisher: Elsevier BV
Date: 12-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2017
Publisher: No publisher found
Date: 2020
Publisher: Elsevier BV
Date: 2014
Publisher: IEEE
Date: 24-11-2020
Publisher: IEEE
Date: 12-2017
Publisher: IEEE
Date: 11-2006
Publisher: No publisher found
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2016
DOI: 10.1109/MCC.2016.117
Publisher: IEEE Comput. Soc
Date: 2000
Publisher: No publisher found
Date: 2004
Publisher: IBM
Date: 09-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
DOI: 10.1109/MCC.2017.20
Publisher: No publisher found
Date: 1994
Publisher: Springer Science and Business Media LLC
Date: 28-03-2012
Publisher: IEEE
Date: 06-2010
DOI: 10.1109/CIT.2010.164
Publisher: ACM
Date: 09-03-2003
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Science and Business Media LLC
Date: 1999
Publisher: Elsevier BV
Date: 07-2005
Publisher: IEEE
Date: 10-2017
Publisher: IEEE
Date: 10-2017
Publisher: IEEE
Date: 12-2010
Publisher: Kluwer Academic Publishers
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2013
Publisher: No publisher found
Date: 2010
Publisher: IGI Global
Date: 04-2005
Abstract: Web Services require a common understanding of messages and message content in order to interact with each other. Several protocols have been proposed, which are coded into agent interfaces or implemented using framework-specific methods such as shared repositories. However, an agent wishing to interact with a large number of other disparate agents cannot be expected to have knowledge of how to initiate or maintain a conversation with all other agents it may encounter. In this paper, we propose a dynamic communication protocol for Web services—DynWES. This involves the publication of protocol specifications representing a finite state machine (FSM). A client agent downloads this specification, validates it for correctness, and then implements the protocol dynamically as a state machine. Mechanisms for building FSMs and checking their correctness are presented. An implementation of DynWES also is described and tested (using applications in the wine selling business domain).
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11596141_10
Publisher: No publisher found
Date: 2015
Publisher: Elsevier BV
Date: 02-2017
Publisher: Elsevier BV
Date: 06-2013
Publisher: ACM
Date: 29-01-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2015
Publisher: Wiley
Date: 30-12-2023
DOI: 10.1002/CPE.6799
Abstract: Apache Storm is a distributed processing engine that can reliably process unbounded streams of data for real‐time applications. While recent research activities mostly focused on devising a resource allocation and task scheduling algorithm to satisfy high performance or low latency requirements of Storm applications across a distributed and multi‐core system, finding a solution that can optimize the energy consumption of running applications remains an important research question to be further explored. In this article, we present a controlling strategy for CPU throttling that continuously optimize the level of consumed energy of a Storm platform by adjusting the voltage and frequency of the CPU cores while running the assigned tasks under latency constraints defined by the end‐users. The experimental results running over a Storm cluster with 4 physical nodes (total 24 cores) validates the effectiveness of proposed solution when running multiple compute‐intensive operations. In particular, the proposed controller can keep the latency of analytic tasks, in terms of 99th latency percentile, within the quality of service requirement specified by the end‐user while reducing the total energy consumption by 18% on average across the entire Storm platform.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: No publisher found
Date: 1999
Publisher: IEEE
Date: 2005
DOI: 10.1109/LCN.2005.7
Publisher: No publisher found
Date: 2006
Publisher: Springer International Publishing
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Elsevier BV
Date: 07-2014
Publisher: IEEE
Date: 10-2016
Publisher: Springer Berlin Heidelberg
Date: 1992
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2016
DOI: 10.1109/MCC.2016.30
Publisher: IEEE
Date: 03-2015
Publisher: Springer Berlin Heidelberg
Date: 1992
Publisher: ACM
Date: 15-11-2004
Publisher: IEEE Comput. Soc
Date: 1999
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11575863_64
Publisher: No publisher found
Date: 2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2017
Publisher: IEEE
Date: 03-2014
Publisher: No publisher found
Date: 2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-0004
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: IEEE
Date: 10-2017
Publisher: IEEE
Date: 2005
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2010
DOI: 10.1109/TSC.2010.23
Publisher: Elsevier BV
Date: 03-2015
Publisher: Elsevier BV
Date: 05-2013
Publisher: Springer Nature Switzerland
Date: 2022
Publisher: No publisher found
Date: 2005
DOI: 10.1007/11596141\_10
Publisher: Birkhäuser Basel
Date: 2007
Publisher: IEEE
Date: 2004
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: No publisher found
Date: 1994
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2015
Publisher: IEEE
Date: 12-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2000
DOI: 10.1109/4434.865893
Publisher: IEEE
Date: 04-2020
Publisher: IEEE
Date: 07-2011
DOI: 10.1109/SCC.2011.82
Publisher: Association for Computing Machinery (ACM)
Date: 04-2008
Abstract: Service matching approaches trade precision for recall, creating the need for users to choose the correct services, which obviously is a major obstacle for automating the service discovery and aggregation processes. Our approach to overcome this problem, is to eliminate the appearance of false positives by returning only the correct services. As different users have different semantics for what is correct, we argue that the correctness of the matching results must be determined according to the achievement of users' goals: that only services achieving users' goals are considered correct. To determine such correctness, we argue that the matching process should be based primarily on the high-level functional specifications (namely goals, achievement contexts, and external behaviors). In this article, we propose models, data structures, algorithms, and theorems required to correctly match such specifications. We propose a model called G + , to capture such specifications, for both services and users, in a machine-understandable format. We propose a data structure, called a Concepts Substitutability Graph (CSG), to capture the substitution semantics of application domain concepts in a context-based manner, in order to determine the semantic-preserving mapping transformations required to match different G + models. We also propose a behavior matching approach that is able to match states in an m-to-n manner, such that behavior models with different numbers of state transitions can be matched. Finally, we show how services are matched and aggregated according to their G + models. Results of supporting experiments demonstrate the advantages of the proposed service matching approaches.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Elsevier BV
Date: 07-2014
Publisher: No publisher found
Date: 2008
Publisher: Springer International Publishing
Date: 2021
Publisher: No publisher found
Date: 2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2015
DOI: 10.1109/MCC.2015.45
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2018
Publisher: Springer International Publishing
Date: 2018
Publisher: No publisher found
Date: 2012
Publisher: IEEE
Date: 04-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Berlin Heidelberg
Date: 1998
DOI: 10.1007/BFB0056014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2014
DOI: 10.1109/TPDS.2013.76
Publisher: IEEE
Date: 07-2013
Publisher: IEEE
Date: 2005
Publisher: IEEE
Date: 11-2007
DOI: 10.1109/ECOWS.2007.7
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2008
DOI: 10.1109/TSC.2008.8
Publisher: IEEE
Date: 07-2007
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: IGI Global
Date: 2006
Abstract: Information Flow Control (IFC) is a method of enforcing confidentiality by using labels, data structures for specifying security classifications. IFC is used in programming languages to monitor procedures in an attempt to detect and prevent information leakage. While it ensures greater security, IFC excessively restricts flow of information. This paper presents a model of information flow control using semi-discretionary label structures. We propose a set of rules that not only increases the flexibility of IFC but also defines labels as a practical component of a security system. We propose a dynamic approach using a centralized model for dynamic label checking and verify the proposed model using theoretical proofs.
Publisher: Springer International Publishing
Date: 2017
Publisher: Association for Computing Machinery (ACM)
Date: 17-07-2023
DOI: 10.1145/3592797
Abstract: The modern electric power grid, known as the Smart Grid , has fast transformed the isolated and centrally controlled power system to a fast and massively connected cyber-physical system that benefits from the revolutions happening in communications (such as 5G/6G) and the fast adoption of Internet of Things devices (such as intelligent electronic devices and smart meters). While the synergy of a vast number of cyber-physical entities has allowed the Smart Grid to be much more effective and sustainable in meeting the growing global energy challenges, it has also brought with it a large number of vulnerabilities resulting in breaches of data integrity, confidentiality, and availability. False data injection (FDI) appears to be among the most critical cyberattacks and has been a focal point of interest for both research and industry. To this end, this article presents a comprehensive review of the recent advances in defence countermeasures of FDI attacks on the Smart Grid. Relevant existing works of literature are evaluated and compared in terms of their theoretical and practical significance to Smart Grid cybersecurity. In conclusion, a range of technical limitations of existing false data attack detection research is identified, and a number of future research directions are recommended.
Publisher: IEEE Comput. Soc
Date: 1998
Publisher: No publisher found
Date: 1992
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2016
Publisher: IEEE
Date: 10-2020
Publisher: Elsevier BV
Date: 07-2019
Publisher: IEEE
Date: 09-2009
Publisher: IEEE
Date: 2004
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: No publisher found
Date: 1992
Publisher: ACM
Date: 27-11-2006
Publisher: No publisher found
Date: 2003
Publisher: Inderscience Publishers
Date: 2016
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: IEEE
Date: 04-2007
Publisher: IEEE
Date: 07-2010
DOI: 10.1109/NCA.2010.31
Publisher: IEEE Comput. Soc. Press
Date: 1996
Publisher: IEEE Comput. Soc
Date: 2000
Publisher: Elsevier BV
Date: 1999
Publisher: Springer Berlin Heidelberg
Date: 1999
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Association for Computing Machinery (ACM)
Date: 17-04-2020
DOI: 10.1145/3379499
Abstract: Supervisory Control and Data Acquisition (SCADA) systems play an important role in monitoring industrial processes such as electric power distribution, transport systems, water distribution, and wastewater collection systems. Such systems require a particular attention with regards to security aspects, as they deal with critical infrastructures that are crucial to organizations and countries. Protecting SCADA systems from intrusion is a very challenging task because they do not only inherit traditional IT security threats but they also include additional vulnerabilities related to field components (e.g., cyber-physical attacks). Many of the existing intrusion detection techniques rely on supervised learning that consists of algorithms that are first trained with reference inputs to learn specific information, and then tested on unseen inputs for classification purposes. This article surveys supervised learning from a specific security angle, namely SCADA-based intrusion detection. Based on a systematic review process, existing literature is categorized and evaluated according to SCADA-specific requirements. Additionally, this survey reports on well-known SCADA datasets and testbeds used with machine learning methods. Finally, we present key challenges and our recommendations for using specific supervised methods for SCADA systems.
Publisher: ACM
Date: 09-03-2003
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2023
Publisher: Springer New York
Date: 2015
Publisher: IEEE Comput. Soc
Date: 2000
Publisher: IEEE
Date: 09-2019
Publisher: IEEE
Date: 10-2013
Publisher: IEEE
Date: 12-2019
Publisher: Wiley
Date: 07-06-2005
DOI: 10.1111/J.1440-1746.2005.03856.X
Abstract: A major area of research in transplantation medicine is the potential application of stem cells in liver regeneration. This would require well-defined and efficient protocols for directing the differentiation of stem cells into the hepatic lineage, followed by their selective purification and proliferation in vitro. The development of such protocols would reduce the likelihood of spontaneous differentiation of stem cells into ergent lineages upon transplantation, as well as reduce the risk of teratoma formation in the case of embryonic stem cells. Additionally, such protocols could provide useful in vitro models for studying hepatogenesis and liver metabolism. The development of pharmokinetic and cytotoxicity/genotoxicity screening tests for newly developed biomaterials and drugs, could also utilize protocols developed for the hepatic differentiation of stem cells. Hence, this review critically examines the various strategies that could be employed to direct the differentiation of stem cells into the hepatic lineage in vitro.
Publisher: IEEE
Date: 2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2013
Publisher: Elsevier BV
Date: 10-2014
Publisher: Springer International Publishing
Date: 2018
Publisher: Elsevier BV
Date: 10-2015
Publisher: IEEE
Date: 08-2017
DOI: 10.1109/ICPP.2017.42
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 2006
Publisher: No publisher found
Date: 2010
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Oxford University Press (OUP)
Date: 30-12-2022
Abstract: Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. However, this third party is lacking in transparency and could harm user privacy. Therefore, providing a distributed access control solution, while considering transparency and privacy-preserving awareness in IoT smart systems, is of paramount importance. The described issue can be addressed using the emergent Blockchain technology that provides a promising choice to build a new generation of decentralized and transparent access control solutions. This paper proposes a smart contract-based access control framework for IoT smart healthcare systems, which is based on smart contracts to provide a distributed and trustworthy access control, combined with the GTRBAC model to express fine-grained access control policies while considering temporal authorization constraints. To prove the feasibility and validity of the proposed framework, this paper also provides a detailed technical description and an initial implementation and execution. An experimental evaluation shows that security properties’ analyses on smart contracts achieved the best possible evaluation with no vulnerabilities found, and the cost of access control operations increases linearly as the number of policy constraints increases. Besides, a comparative analysis reveals that the proposed approach can achieve good results with low gas costs and latency.
Publisher: World Scientific Pub Co Pte Lt
Date: 06-1996
DOI: 10.1142/S0218194096000132
Abstract: This paper addresses the problem of method evolution in object-oriented databases. We propose a set of evolutionary operations that affect all parts of methods, the signature and the implementation. When a restructuring operation is applied to a schema, behavioral consistency is checked by constructing a proof of program correctness. Two levels of granularity for behavioral consistency are described. The first level relates to the evolution of methods in the context of class inheritance hierarchy and is concerned with the semantics of the polymorphism of methods. The second level relates to behavioral evolution in which the chain of calling relationships between methods is considered. Behavioral consistency is checked with a graph-based approach that deals with problems such as run-time type errors, side-effects, redundant methods, and unexpected behaviors.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-1997
DOI: 10.1109/35.587718
Publisher: ACM
Date: 27-03-1970
Publisher: Elsevier BV
Date: 06-2014
Publisher: IEEE
Date: 11-2006
Publisher: Hindawi Limited
Date: 2005
DOI: 10.1155/2005/513531
Abstract: Traffic and access delay can be reduced in a mobile network by caching data objects at network nodes near the clients. Traditional caching techniques, however, are unsuitable in this environment because they do not account for the changing location of the users. To deal with this problem, cache relocation techniques can be applied to dynamically relocate data objects so they remain close to the moving clients. Existing relocation techniques rely heavily on path prediction. Unfortunately, the inaccuracy of path prediction can lead to high relocation overhead and poor response time. This paper presents an analytical study of the effects of client mobility on network cache performance. Two new cache relocation techniques are proposed to deal with the issue of poor path prediction and reduce the overhead of existing cache relocation schemes. The first technique, 2PR, compensates for poor path prediction by temporarily moving data objects to a common parent node prior to a handover. Objects are moved to the correct destination once the client's new location has been confirmed. The second technique, ROLP, reduces the traffic overhead associated with cache relocation by ensuring duplicate objects are not relocated and relocation of objects are performed only from the nearest node to the destination. Test results show that 2PR reduces the query delay experienced by mobile clients by 60 to 83% after handovers, while ROLP reduces the overhead of cache relocation by between 33 to 65% compared to existing schemes.
Publisher: Wiley
Date: 06-2001
DOI: 10.1002/CPE.557
Publisher: IEEE Comput. Soc. Press
Date: 1995
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-0007
Publisher: IEEE
Date: 11-2014
Publisher: IEEE
Date: 10-2007
DOI: 10.1109/LCN.2007.44
Publisher: ACM
Date: 21-04-2008
Publisher: IEEE
Date: 11-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 07-2013
Publisher: No publisher found
Date: 2018
Publisher: No publisher found
Date: 2018
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2011
Publisher: IEEE
Date: 2004
Publisher: Springer International Publishing
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2015
Publisher: IEEE
Date: 12-2016
Publisher: Association for Computing Machinery (ACM)
Date: 30-12-2020
DOI: 10.1145/3422369
Abstract: Industrial cyber-physical systems ( monospace ICPS /monospace ) are heterogeneous inter-operating parts that can be physical, technical, networking, and even social like agent operators. Incrementally, they perform a central role in critical and industrial infrastructures, governmental, and personal daily life. Especially with the Industry 4.0 revolution, they became more dependent on the connectivity by supporting novel communication and distance control functionalities, which expand their attack surfaces that result in a high risk for cyber-attacks. Furthermore, regarding physical and social constraints, they may push up new classes of security breaches that might result in serious economic damages. Thus, designing a secure monospace ICPS /monospace is a complex task, since this needs to guarantee security and harmonize the functionalities between the various parts that interact with different technologies. This article highlights the significance of cyber-security infrastructure and shows how to evaluate, prevent, and mitigate monospace ICPS /monospace -based cyber-attacks. We carried out this objective by establishing an adequate semantics for monospace ICPS /monospace ’s entities and their composition, which includes social actors that act differently than mobile robots and automated processes. This article also provides the feasible attacks generated by a reinforcement learning mechanism based on multiple criteria that selects both appropriate actions for each monospace ICPS /monospace component and the possible countermeasures for mitigation. To efficiently analyze monospace ICPS /monospace ’s security, we proposed a model-checking-based framework that relies on a set of predefined attacks from where the security requirements are used to assess how well the model is secure. Finally, to show the effectiveness of the proposed solution, we model, analyze, and evaluate the monospace ICPS /monospace security on two real use cases.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: Association for Computing Machinery (ACM)
Date: 16-01-2023
DOI: 10.1145/3560816
Abstract: The Internet of Things (IoT) ecosystem connects physical devices to the internet, offering significant advantages in agility, responsiveness, and potential environmental benefits. The number and variety of IoT devices are sharply increasing, and as they do, they generate significant data sources. Deep learning (DL) algorithms are increasingly integrated into IoT applications to learn and infer patterns and make intelligent decisions. However, current IoT paradigms rely on centralized storage and computing to operate the DL algorithms. This key central component can potentially cause issues in scalability, security threats, and privacy breaches. Federated learning (FL) has emerged as a new paradigm for DL algorithms to preserve data privacy. Although FL helps reduce privacy leakage by avoiding transferring client data, it still has many challenges related to models’ vulnerabilities and attacks. With the emergence of blockchain and smart contracts, the utilization of these technologies has the potential to safeguard FL across IoT ecosystems. This study aims to review blockchain-based FL methods for securing IoT systems holistically. It presents the current state of research in blockchain, how it can be applied to FL approaches, current IoT security issues, and responses to outline the need to use emerging approaches toward the security and privacy of IoT ecosystems. It also focuses on IoT data analytics from a security perspective and the open research questions. It also provides a thorough literature review of blockchain-based FL approaches for IoT applications. Finally, the challenges and risks associated with integrating blockchain and FL in IoT are discussed to be considered in future works.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2021
Publisher: Elsevier BV
Date: 09-2009
Publisher: Elsevier BV
Date: 06-2013
Publisher: Elsevier BV
Date: 06-2019
Location: Algeria
Location: France
Start Date: 2014
End Date: 2016
Funder: Australian Research Council
View Funded ActivityStart Date: 2020
End Date: 2022
Funder: Department of Industry, Innovation and Science, Australian Government
View Funded ActivityStart Date: 2016
End Date: 2018
Funder: Australian Research Council
View Funded ActivityStart Date: 2015
End Date: 2017
Funder: Australian Research Council
View Funded ActivityStart Date: 2015
End Date: 2015
Funder: Siemens/Germany
View Funded ActivityStart Date: 2010
End Date: 2013
Funder: Australian Research Council
View Funded ActivityStart Date: 2020
End Date: 2023
Funder: Australian Research Council
View Funded ActivityStart Date: 02-2003
End Date: 08-2006
Amount: $161,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2009
End Date: 08-2014
Amount: $255,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2015
End Date: 12-2017
Amount: $315,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 11-2003
End Date: 09-2007
Amount: $251,771.00
Funder: Australian Research Council
View Funded ActivityStart Date: 11-2002
End Date: 10-2005
Amount: $191,500.00
Funder: Australian Research Council
View Funded ActivityStart Date: 10-2020
End Date: 10-2023
Amount: $375,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2023
End Date: 12-2025
Amount: $450,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 05-2006
End Date: 11-2007
Amount: $320,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2008
End Date: 12-2010
Amount: $315,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2017
End Date: 09-2020
Amount: $390,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 09-2004
End Date: 09-2007
Amount: $330,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 02-2010
End Date: 12-2013
Amount: $250,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 05-2011
End Date: 12-2015
Amount: $270,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 12-2010
End Date: 12-2015
Amount: $365,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 09-2004
End Date: 12-2007
Amount: $240,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 10-2006
End Date: 02-2010
Amount: $360,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 02-2004
End Date: 11-2004
Amount: $10,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 04-2016
End Date: 12-2019
Amount: $574,932.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2024
End Date: 06-2029
Amount: $5,000,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 04-2022
End Date: 02-2024
Amount: $538,350.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2009
End Date: 06-2012
Amount: $280,000.00
Funder: Australian Research Council
View Funded Activity