Browsing 08 Information and Computing Sciences by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing 08 Information and Computing Sciences by Title

Sort by: Order: Results:

  • Phalip, J; Jean, D; Edmonds, EA (ACM Press, 2008-01)
    In this paper we report on a qualitative study aiming to support online and asynchronous collaboration between stakeholders of the film scoring industry. We first describe the low-fidelity prototype we designed to facilitate ...
  • Zhang, Y; Weakley, AJ; Edmonds, EA (Springer, 2007-01)
    This paper extends the knowledge and understanding of art-technology collaboration. It reports upon a close empirical study of how computer programmers interacted with a digital artist to develop a computer-based interactive ...
  • Simmonds, AJ; Nanda, P (Kluwer Academic Publishers, 2002-01)
  • Olsson, MR (2009-03)
  • Song, J; He, X; Qian, F (IEEE Computer Society, 2010)
    To promote a fractal algorithm from being suitable for global optimization only on three dimensional spaces to an n dimensional space, this paper presents a simple and convenient method for dividing an n-dimensional ...
  • Cao, Y; Ying, M; Chen, G (IEEE-Inst Electrical Electronics Engineers Inc, 2007-01)
    Fuzzy automata, whose input alphabet is a set of numbers or symbols, are a formal model of computing with values. Motivated by Zadeh's paradigm of computing with words rather than numbers, Ying proposed a kind of fuzzy ...
  • Yang, Y; Zhuang, Y; Xu, D; Pan, Y; Tao, D; Maybank, S (Association for Computing Machinery, Inc. (ACM), 2009-01)
    Cartoons play important roles in many areas, but it requires a lot of labor to produce new cartoon clips. In this paper, we propose a gesture recognition method for cartoon character images with two applications, namely ...
  • Gao, X; An, L; Li, X; Tao, D (Elsevier Science Bv, 2009-01)
    Recently, lossless data hiding has attracted increasing interests. As a reversible watermark scheme, the host media and hidden data should be recovered without distortion. A latest lossless data hiding technique based on ...
  • Hoshyar, AN; Al-Jumaily, A; Sulaiman, R (IEEE, 2011-01)
    Skin cancer is increasing in different countries especially in Australia. Early detection of skin cancer can treat melanoma successfully, therefore, curability and survival depends directly on removing melanoma in its early ...
  • Leong, TW; Wright, P (2013)
    Music shapes our social lives. While previous research has provided a foundational understanding of the social affordances surrounding people's interactions with music, there is a need to update this understanding in light ...
  • Chua, B (IEEE, 2010-01)
    The rework cost of a requirement change is high. Requirements changes, which relate to hidden catastrophic failures, can cost many thousands of dollars to fix. An exploratory study on software maintenance records demonstrates ...
  • Anderson, TK; Orsatti, J (University of Sheffield, 2008-01)
    The paper reports on findings from a project merging exploring the professional practice of academics, research students and practitioners within the ISIC community, drawn from fieldwork at the 2006 Information Seeking in ...
  • Wang, M; Zhu, L; Chen, J (2012)
    Scientific workflows are generally computing- and data-intensive with large volume of data generated during their execution. Therefore, some of the data should be saved to avoid the expensive re-execution of tasks in case ...
  • Demong, NA; Lu, J (Springer, 2012-01)
    Investment in the real estate industry is subject to high risk, especially when there are a large number of uncertainty factors in a project. Risk analysis has been widely used to make decisions for real estate investment. ...
  • Zhang, C; Tao, D (Microtome Publ, 2013-01)
    Levy processes refer to a class of stochastic processes, for example, Poisson processes and Brownian motions, and play an important role in stochastic processes and machine learning. Therefore, it is essential to study ...
  • Hussain, O; Chang, E; Soh, B; Dillon, TS (IEEE, 2005-01)
    Risk is associated with almost every activity that is undertaken on a daily life. Risk associated with Trust, Security and Privacy. Risk is associated with transactions, businesses, information systems, environments, ...
  • Lu, J; Jain, LC; Zhang, G (2012)
    Organizational decision making often occurs in the face of uncertainty about whether a decision maker's choices will lead to benefit or disaster. Risk is the potential that a decision will lead to a loss or an undesirable ...
  • Lin, H; Zhang, G (Springer Berlin Heidelberg, 2012-01)
    Customer Attrition is a function of customer transaction and service related characteristics and also a combination of cancellation and switching to a competitor. This paper first presents a risk prediction framework for ...
  • Wijesoma, WS; Kodagoda, KRS; Balasuriya, AP; Challa, S (IEEE Computer Society, 2003)
    Road detection and tracking is very useful in the synthesis of driver assistance and intelligent transportation systems. In this paper a methodology is proposed based on the extended Kalman filer for robust road curb ...
  • Mao, R; Mao, G (IEEE, 2013-01)