Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/976440dlproceedingsBook PagePublication Pagesaus-cswConference Proceedingsconference-collections
ACSW Frontiers '04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
2004 Proceeding
Publisher:
  • Australian Computer Society, Inc.
  • P.O. Box 319 Darlinghurst, NSW 2010
  • Australia
Conference:
ACSW Frontiers '04: Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation Dunedin New Zealand 1 January 2004
Published:
01 January 2004

Bibliometrics
Abstract

No abstract available.

Article
Free
Survivability and business continuity management
Pages 3–6

With the number of attacks on systems increasing, it is highly probable that sooner or later an intrusion will be successful. Not having to execute a complete shutdown in this situation will soon be a standard requirement. The intention of this paper ...

Article
Free
A framework for obfuscated interpretation
Pages 7–16

Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead of obfuscating the program itself. The obfuscated interpretation enables us ...

Article
Free
A buddy model of security for mobile agent communities operating in pervasive scenarios
Pages 17–25

This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the objectives behind the development of these agent communities and analyses ...

Article
Free
Tamper-proofing software watermarks
Pages 27–36

We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamper-proofing method is based on transforming numeric or non-numeric ...

Article
Free
Mesmerize: an open framework for enterprise security management
Pages 37–42

We have identified five problems that inhibit effective enterprise security management - policy divide, lack of reproducibility, lack of consistency, lack of coverage and lack of flexibility in current management systems. We discuss these problems and ...

Article
Free
Defining security services for electronic tendering
Pages 43–52

A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requirements for forming a complex electronic contract. This paper analyses the e-...

Article
Free
A case study in access control requirements for a Health Information System
Pages 53–61

We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involved principals. We show that, even for such a relatively simple system, the ...

Article
Free
Belief-based risk analysis
Pages 63–68

This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and look-up tables to derive levels of risk, it uses subjective beliefs about threats and ...

Article
Free
Secure key issuing in ID-based cryptography
Pages 69–74

ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent drawback of key escrow problem, i.e. users' private keys are known to the key generation center (KGC). Therefore secure key ...

Article
Free
On the security of some proxy blind signature schemes
Pages 75–78

A proxy blind signature scheme is a digital signature scheme which combines the properties of proxy signature and blind signature schemes. Recently, Tan et al. proposed two proxy blind signature schemes based on DLP and ECDLP respectively. Later, ...

Article
Free
We have seen the future, and it is symbolic
Page 83
Article
Free
Application of self-organizing maps to clustering of high-frequency financial data
Pages 85–90

This paper analyzes the clustering of trades on the Australian Stock Exchange (ASX) with respect to the trade direction variable. The ASX is a limit order market operating an electronic limit order book. The order book consists of buy limit orders (bids) ...

Article
Free
Early assessment of classification performance
Pages 91–96

The ability to distinguish between objects is the fundamental to learning and intelligent behavior in general. The difference between two things is the information we seek; the processed information is actually the base for the knowledge. Automatic ...

Article
Free
Visualisation and comparison of image collections based on self-organised maps
Pages 97–102

Self-organised maps (SOM) have been widely used for cluster analysis and visualisation purposes in exploratory data mining. In image retrieval applications, SOMs have been used to visualise high-dimensional feature space and build indexing structures. In ...

Article
Free
Experiences in building a tool for navigating association rule result sets
Pages 103–108

Practical knowledge discovery is an iterative process. First, the experiences gained from one mining run are used to inform the parameter setting and the dataset and attribute selection for subsequent runs. Second, additional data, either incremental ...

Article
Free
Cost-efficient mining techniques for data streams
Pages 109–114

A data stream is a continuous and high-speed flow of data items. High speed refers to the phenomenon that the data rate is high relative to the computational power. The increasing focus of applications that generate and receive data streams stimulates ...

Article
Free
Clustering stream data by regression analysis
Pages 115–120

In data clustering, many approaches have been proposed such as K-means method and hierarchical method. One of the problems is that the results depend heavily on initial values and criterion to combine clusters. In this investigation, we propose a new ...

Article
Free
A fuzzy ontology for medical document retrieval
Pages 121–126

Ontologies represent a method of formally expressing a shared understanding of information, and have been seen by many authors as a prerequisite for the "Semantic web". A mapping between query terms and members of an ontology is usually a key part of any ...

Article
Free
Monitoring and controlling of a multi-agent based workflow system
Pages 127–132

Business processes are often likely to undergo drastic changes and hence the workflow systems that model, simulate and enact these processes should support the monitoring and controlling of processes. In extension to our previous work on the framework ...

Article
Free
Applying online gradient descent search to genetic programming for object recognition
Pages 133–138

This paper describes an approach to the use of gradient descent search in genetic programming (GP) for object classification problems. In this approach, pixel statistics are used to form the feature terminals and a random generator produces numeric ...

Article
Free
A wavelet-based neuro-fuzzy system for data mining small image sets
Pages 139–143

Creating a robust image classification system depends on having enough data with which one can adequately train and validate the model. If there is not enough available data, this assumption may not hold and would result in a classifier that exhibits ...

Article
Free
Detecting stress in spoken English using Decision Trees and Support Vector Machines
Pages 145–150

This paper describes an approach to the detection of stress in spoken New Zealand English. After identifying the vowel segments of the speech signal, the approach extracts two different sets of features - prosodic features and vowel quality features - ...

Article
Free
Learning dynamics of pesticide abuse through data mining
Pages 151–156

Recent studies by agriculture researchers in Pakistan have shown that attempts of crop yield maximization through pro-pesticide state policies have led to a dangerously high pesticide usage. These studies have reported a negative correlation between ...

Article
Free
Discovering parallel text from the World Wide Web
Pages 157–161

Parallel corpus is a rich linguistic resource for various multilingual text management tasks, including cross-lingual text retrieval, multilingual computational linguistics and multilingual text mining. Constructing a parallel corpus requires effective ...

Article
Free
A framework for privacy preserving classification in data mining
Pages 163–168

Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets exposed to different parties. Consequently privacy issues are constantly under ...

Article
Free
Mining association rules from XML data using XQuery
Pages 169–174

In recent years XML has became very popular for representing semistructured data and a standard for data exchange over the web. Mining XML data from the web is becoming increasingly important. Several encouraging attempts at developing methods for mining ...

Article
Free
A market-based rule learning system
Pages 175–180

In this paper, a 'market trading' technique is integrated with the techniques of rule discovery and refinement for data mining. A classifier system-inspired model, the market-based rule learning (MBRL) system is proposed and its capability of evolving ...

Article
Free
Language technology and software internationalisation
Page 185

This talk explores how language technology might be used to support software internationalisation. We begin by defining what language technology -- the use of computational techniques to process and manipulate human language -- is in the large, and ...

Article
Free
Key challenges in software internationalisation
Pages 187–194

The trend toward globalisation of products and services has brought a strong economic imperative to the development of general methods for the localisation of software to different cultural environments. While ad hoc localisation may satisfy immediate ...

Article
Free
Software internationalisation in the Web services domain
Page 195

The development of internationalisation-aware programming language support -- following on from the widespread adoption of the Unicode standard -- has meant that many of the localisation problems which have plagued developers have now been mitigated for ...

Contributors
  • Motorola Australia
  • University of South Australia

Index Terms

  1. Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Acceptance Rates

          Overall Acceptance Rate 204 of 424 submissions, 48%
          YearSubmittedAcceptedRate
          ACSW '18964951%
          ACSW '171567850%
          ACSW '161727745%
          Overall42420448%