Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Michael Hannaford

    Research Interests:
    Summary Query processing is an important concern in the field of distributed databases. The main problem is: if a query can be decomposed into subqueries that require operations at geographically separated databases, determine the... more
    Summary Query processing is an important concern in the field of distributed databases. The main problem is: if a query can be decomposed into subqueries that require operations at geographically separated databases, determine the sequence and the sites for performing this set of operations such that the operating cost (communication cost and processing cost) for processing this query is minimized.
    This paper describes experiences with the use of the Globus toolkit and related technologies for development of a secure portal that allows nationally-distributed Australian researchers to share data and application programs. The portal... more
    This paper describes experiences with the use of the Globus toolkit and related technologies for development of a secure portal that allows nationally-distributed Australian researchers to share data and application programs. The portal allows researchers to access infrastructure that will be used to enhance understanding of the causes of schizophrenia and advance its treatment, and aims to provide access to a resource that can expand into the world's largest on-line collaborative mental health research facility. Since access to patient data is controlled by local ethics approvals, the portal must transparently both provide and deny access to patient data in accordance with the fine-grained access permissions afforded individual researchers. Interestingly, the access protocols are able to provide researchers with hints about currently inaccessible data that may be of interest to them, providing them the impetus to gain further access permissions.
    Research Interests:
    The modern day Internet has evolved over the past 35 years from a single-purpose research network to a massively connected network of peers hosting a major percentage of world-wide communications. This evolutionary process has created a... more
    The modern day Internet has evolved over the past 35 years from a single-purpose research network to a massively connected network of peers hosting a major percentage of world-wide communications. This evolutionary process has created a network that is performing tasks which were never in its original design. While emerging overlays such as peer-to-peer networking have spawned in an attempt to cope with the restrictive original design, core-level issues hamper further development. As the Internet grows into an increasingly connected and dynamic network these design flaws will continue to cause problems. It is proposed to investigate the use of distributed computing and software runtime environments to host the next generation of Internet applications, in much the same way as the current crop of Internet browsers host thin web applications. This research will define a runtime environment that allows developers to create distributed, component-based applications for which the system m...
    Research Interests:
    Abstract In the Web Services environment, traditional ACID transactions are not always sufficient to support the activities that businesses would like to process. While Web Services transactions standards do exist, it is still difficult... more
    Abstract In the Web Services environment, traditional ACID transactions are not always sufficient to support the activities that businesses would like to process. While Web Services transactions standards do exist, it is still difficult for an end-user to combine services from ...
    Current Internet trends have caused us to outgrow existing online data storage paradigms. This paper presents an extended model for distributed online data storage. The model addresses issues of data duplication, data freshness and data... more
    Current Internet trends have caused us to outgrow existing online data storage paradigms. This paper presents an extended model for distributed online data storage. The model addresses issues of data duplication, data freshness and data ownership, while facilitating two modes of data access -direct and indirect. Direct data access is implemented using advanced handoff techniques while indirect access is implemented using robust server-to-server protocols that enforce strict policies on data management. Results are presented that compare this solution to existing technologies and an example migration path is described for existing Web 2.0 applications wishing to adopt this new paradigm.
    Research Interests:
    On
    Abstract With the recent increase in web application reliance on user-generated content, issues such as data duplication, data age and data ownership are becoming an increasing problem. It is now common to have multiple distinct web... more
    Abstract With the recent increase in web application reliance on user-generated content, issues such as data duplication, data age and data ownership are becoming an increasing problem. It is now common to have multiple distinct web applications storing duplicate ...
    Research Interests:
    Research Interests:
    Abstract Algorithm visualization is a technique used to help in the teaching and learning of algorithms in computer science. Despite the potential benefits of this technique, it has not been adopted by educators as expected due to the... more
    Abstract Algorithm visualization is a technique used to help in the teaching and learning of algorithms in computer science. Despite the potential benefits of this technique, it has not been adopted by educators as expected due to the difficulties of integrating the algorithm visualizations into the learning environment and the lack of interactivity features. A course on operating systems constitutes one of the main courses in any undergraduate computer science program. Operating systems algorithms have not received enough support by the ...
    Abstract Cloud Computing allows us to abstract distributed, elastic IT resources behind an interface that promotes scalability and dynamic resource allocation. The boundary of this cloud sits outside the application and the hardware that... more
    Abstract Cloud Computing allows us to abstract distributed, elastic IT resources behind an interface that promotes scalability and dynamic resource allocation. The boundary of this cloud sits outside the application and the hardware that hosts it. For the end user, a web ...
    Abstract Modern operating systems offer a large array of features in their network subsystems that support fine-grained access control, monitoring and accounting. Such features allow a system administrator to account and filter outgoing... more
    Abstract Modern operating systems offer a large array of features in their network subsystems that support fine-grained access control, monitoring and accounting. Such features allow a system administrator to account and filter outgoing network connections ...
    The rising popularity of Web 2.0 applications has seen an increase in the volume of user-generated content. Web Applications allow users to define policies that specify how they wish their content to be accessed. In large Web 2.0... more
    The rising popularity of Web 2.0 applications has seen an increase in the volume of user-generated content. Web Applications allow users to define policies that specify how they wish their content to be accessed. In large Web 2.0 applications these policies can ...
    Research Interests:
    Research Interests:
    ABSTRACT The modern web browser performs a multitude of tasks, which were never contemplated in its original design. This work investigates the roles and responsibilities of the various components that comprise the web browser, and a... more
    ABSTRACT The modern web browser performs a multitude of tasks, which were never contemplated in its original design. This work investigates the roles and responsibilities of the various components that comprise the web browser, and a traditional web application. We review the web browser's role in the greater architecture and propose that a "Super Browser" concept need not mean greater responsibilities for the web browser application. Instead, the solution described in this work introduces a distributed approach that is capable of executing applications composed of distinct components. The paper presents an implementation of this concept, and a comparison of this approach with a traditional web application framework.
    Research Interests:
    Abstract High quality e-learning resources are expensive to produce. The “learning object” is an emerged instructional technology to promote the reusability of high quality learning resources. This paper presents an exploratory study of... more
    Abstract High quality e-learning resources are expensive to produce. The “learning object” is an emerged instructional technology to promote the reusability of high quality learning resources. This paper presents an exploratory study of the learning objects designed to support computer science teaching and learning. The aim of the exploratory study is to get insight into the characteristics of computer science learning objects and to study different factors related to them. These factors include growth over time, user ratings, and personal ...
    ABSTRACT Loss-less data compression is attractive in database systems as it may facilitate query performance improvement and storage reduction. Although there are many compression techniques that handle the whole database in main memory,... more
    ABSTRACT Loss-less data compression is attractive in database systems as it may facilitate query performance improvement and storage reduction. Although there are many compression techniques that handle the whole database in main memory, problems arise when the amount of data increases gradually over time, and also when the data has high cardinality. Management of a rapidly evolving large volume of data in a scalable way is very challenging. This paper describes a disk based single vector large data cardinality approach, incorporating data compression in a distributed environment. The approach provides substantial storage performance improvement compared to other high performance database systems. The presented compressed database structure provides direct addressability in a distributed environment, thereby reducing retrieval latency when handling large volumes of data.
    ... BM Monjurul Alom, Frans Henskens, Michael Hannaford School Of Electrical Engineering and Computer Science, University Of Newcastle, Callaghan, NSW 2308, Australia ... [28] S. Pal, I. Cseri, O. Seeliger, G. Schaller, L. Giakoumakis,... more
    ... BM Monjurul Alom, Frans Henskens, Michael Hannaford School Of Electrical Engineering and Computer Science, University Of Newcastle, Callaghan, NSW 2308, Australia ... [28] S. Pal, I. Cseri, O. Seeliger, G. Schaller, L. Giakoumakis, and V. Zolotov, "Indexing XML data Stored ...
    Deadlock detection is very difficult in a distributed database system because no controller has complete and current information about the system and data dependencies. The deadlock problem is intrinsic to a distributed database system... more
    Deadlock detection is very difficult in a distributed database system because no controller has complete and current information about the system and data dependencies. The deadlock problem is intrinsic to a distributed database system which employs locking as its concurrency control algorithm. This paper attempts a comprehensive study of deadlock detection in distributed database systems. Afterwards, a deadlock detection algorithm
    ABSTRACT As data management applications grow more complex, they are likely to need efficient distributed query processing. In Distributed Database Systems complete replication consists of maintaining complete copies of the database at... more
    ABSTRACT As data management applications grow more complex, they are likely to need efficient distributed query processing. In Distributed Database Systems complete replication consists of maintaining complete copies of the database at each site; this has advantages such as highest locality of reference, highest reliability, availability, and is best for reading. The most promising and dominant data format for data processing and representing on the Internet is the semistructured data form termed XML. XML data has no fixed schema; it evolved and is self describing which results in management difficulties compared to, for example relational data. It is therefore a major challenge for the database community to design query languages and storage methods that can retrieve semistructured data. In this paper, we present a storing and querying scheme for semistructured data views of relational form in distributed environments. The proposed technique stores path dictionary, word dictionary, attribute dictionary, and the complete compressed replication of semistructured data in each distributed site of the DDBS. The presented technique provides query performance improvement due to the compression of semistructured data.
    Research Interests:
    With the recent increase in web application reliance on user-generated content, issues such as data duplication, data age and data ownership are becoming an increasing problem. It is now common to have multiple distinct web applications... more
    With the recent increase in web application reliance on user-generated content, issues such as data duplication, data age and data ownership are becoming an increasing problem. It is now common to have multiple distinct web applications storing duplicate ...
    This poster presents evaluation metrics to assess learning objects in terms of their compatibility with different learning styles. The metrics allow learning objects to be ranked based on their effectiveness with different types of... more
    This poster presents evaluation metrics to assess learning objects in terms of their compatibility with different learning styles. The metrics allow learning objects to be ranked based on their effectiveness with different types of students which, in turn, can facilitate designing and searching for learning objects that meet the learner's requirements and preferences. Keywords: learning object, learning style, evaluation metrics.
    Research Interests:
    Page 1. An Investigation into the Learning Styles and Self-Regulated Learning Strategies for Computer Science Students Ali Alharbi, David Paul, Frans Henskens, Michael Hannaford School of Electrical Engineering and Computer Science The... more
    Page 1. An Investigation into the Learning Styles and Self-Regulated Learning Strategies for Computer Science Students Ali Alharbi, David Paul, Frans Henskens, Michael Hannaford School of Electrical Engineering and Computer Science The University of Newcastle, Australia. Page 2. Outline • Introduction. – Computer Science Education. – Student-centred education. • Theoretical Background. – Learning Style. – Self-Regulated Learning. • The Study. • Results and implications on Computer Science Education. • Conclusions and Future Work. ...

    And 2 more