School of Information Technology and Electrical Engineering Publications

Browse Results (7278 results found)

Subscribe to the RSS feed for this result setSubscribe to the RSS feed for this result set

Page 116 of 146

Result Pages:    « first ‹ previous  106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125  next › last »

Refine

  Abstract Views File Downloads Thomson Reuters Web of Science Citation Count Scopus Citation Count Altmetric Score
Balakrishnan, Janaki, Atputharajah, A. and Ekanayake, J. B. (2008). Review of the Effects of Transformer Configuration on Distributed Generator Interconnection. In: IEEE Region 10 Colloquium and Third International Conference on Industrial and Information Systems. IEEE Region 10 Colloquium/3rd International Conference on Industrial and Information Systems, Kharagpur, India, (625-630). 8 - 10 Dec 2008. doi:10.1109/ICIINFS.2008.4798445 313   0 0
Saha, T. K. (2003) Review of time-domain polarization measurements for assessing insulation condition in aged transformers. IEEE Transactions On Power Delivery, 18 4: 1293-1301. doi:10.1109/TPWRD.2003.817741 86   20 Cited 39 times in Scopus39 0
Hasan, Kazi Nazmul, Saha, Tapan Kumar, Eghbal, Mehdi and Chattopadhyay, Deb (2013) Review of transmission schemes and case studies for renewable power integration into the remote grid. Renewable & Sustainable Energy Reviews, 18 568-582. doi:10.1016/j.rser.2012.10.045 50   5 Cited 5 times in Scopus5 0
Billington, David, Antoniou, Grigoris, Governatori, Guido and Maher, Michael J. (1999). Revising Nonmonotonic Belief Sets: The Case of Defeasible Logic. In: Wolfram Burgard, Thomas Christaller and Armin B. Cremers, Lecture notes in computer science: Proceedings of the 23 Annual Conference on Artificial Intelligence. KI-99 : advances in artificial intelligence : 23rd Annual German Conference on Artificial Intelligence, Bonn, Germany, (101-112). 13-15 September, 1999. 177 841 10
Zhong, Mingyang, Hu, Peizhao and Indulska, Jadwiga (2014). Revisited: bandwidth estimation methods for mobile networks. In: 2014 IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Sydney, Australia, (). 16-19 June 2014. doi:10.1109/WoWMoM.2014.6918916 37 6 Cited 0 times in Scopus0 0
Modi, Nilesh and Saha, Tapan K. (2012). Revisiting damping performance of the Queensland network under wind power penetration. In: 2012 IEEE Power and Energy Society General Meeting. 2012 IEEE Power and Energy Society General Meeting, San Diego, United States, (1-8). 22–26 July 2012. doi:10.1109/PESGM.2012.6344747 129 6 0 Cited 0 times in Scopus0 0
Derakhshan, Roozbeh, Orlowska, Maria E. and Li, Xue (2007). RFID data management: Challenges and opportunities. In: D. W. Engels, IEEE International Conference on RFID 2007. IEEE International Conference on RFID 2007, Grapevine, Texas, USA, (175-182). 26-28 March 2007. 271 3 1
Mo, John, P. T., Sheng, Quan, Z., Li, Xue and Zeadally, Sherali (2009) RFID infrastructure design: A case study of two Australian RFID projects. IEEE Internet Computing, 13 1: 14-21. doi:10.1109/MIC.2009.18 68 2 10 Cited 23 times in Scopus23 0
Fujita, Hiroyuki, Zheng, Tsinghua, Yang, Xiaoyu, Finnerty, Matthew J. and Handa, Shinya (2013) RF surface receive array coils: the art of an LC circuit. Journal of Magnetic Resonance Imaging, 38 1: 12-25. doi:10.1002/jmri.24159 21   0 Cited 0 times in Scopus0 0
Baharin, Hanif, Rintel, Sean and Viller, Stephen (2013). Rhythms of the domestic soundscape: Ethnomethodological soundwalks for phatic technology design. In: Paula Kotze, Gary Marsden, Gitte Lindgaard, Janet Wesson and Marco Winckler, Human-Computer Interaction, INTERACT 2013 - 14th IFIP TC 13 International Conference, Proceedings. 14th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2013, Cape Town, South Africa, (463-470). 2 - 6 September 2013. doi:10.1007/978-3-642-40498-6_36 30   Cited 0 times in Scopus0 0
Hunter, Jane (2002). Rights Markup Extensions for the Protection of Indigenous Knowledge. In: Global Communities Track, World Wide Web Conference 2002, Honolulu, Hawaii, (). May, 2002. 286 393
Yue, Mingliang, Peng, Zhiyong, Zheng, Kai and Peng, Yuwei (2014). Rights protection for trajectory streams. In: Database Systems for Advanced Applications - 19th International Conference, DASFAA 2014, Proceedings. 19th International Conference on Database Systems for Advanced Applications, DASFAA 2014, Bali, Indonesia, (407-421). 21 - 24 April 2014. doi:10.1007/978-3-319-05813-9_27 25   Cited 0 times in Scopus0 0
Liu, Nianjun, Crozier, Stuart, Wilson, Stephen, Liu, Feng, Appleton, Ben, Trakic, Adnan, Wei, Qing, Strugnell, Wendy, Slaughter, Richard and Riley, Robyn (2005). Right ventricle extraction by low level and model-based algorithm. In: Y.T. Zhang, Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference. 27th Annual IEEE Engineering in Medicine and Biology Society, Shanghai, China, (677-680). 1-4 September 2005. doi:10.1109/IEMBS.2005.1616745 67   1 Cited 0 times in Scopus0 0
Tan, B.J, Lu, Z., Xu, Z., Song, J., Dong, Z. Y., Cai, H.W and Feng, Z.X. (2005). Risk hedging in electricity generation planning. In: K.J. Tseng and J.B.X. Devotta, Proceedings of the 7th International Power Engineering Conference. 7th International Power Engineering Conference, Singapore, (1-6). 29 November - 2 December, 2005. 104  
Li, Peng, Chen, Ling, Li, Xue and Wen, Junhao (2013). RNRank: Network-based ranking on relational tuples. In: Longbing Cao, Hiroshi Motoda, Jaideep Srivastava, Ee-Peng Lim, Irwin King, Philip S. Yu, Wolfgang Nejdl, Guandong Xu, Gang Li and Ya Zhang, Behavior and Social Computing International Workshop on Behavior and Social Informatics, BSI 2013 and International Workshop on Behavior and Social Informatics and Computing, BSIC 2013. 2013 International Workshop on Behavior and Social Informatics and Computing, BSIC 2013, Beijing, Peoples R China, (139-150). 3 - 9 August 2013. doi:10.1007/978-3-319-04048-6_13 26   Cited 0 times in Scopus0 0
Wyeth, P. and Wyeth, G. F. (2008). Robot building for preschoolers. In: U. Visser, F. Ribeiro, T. Ohashi and F. Dellaert, RoboCup 2007: Robot Soccer World Cup XI. 11th RoboCup International Symposium, Atlanta, Georgia, U.S.A., (124-135). 9-10 July 2007. doi:10.1007/978-3-540-68847-1_11 72   Cited 0 times in Scopus0 0
Robotics: Science and Systems X (2014) . Edited by Dieter Fox, Lydia E. Kavraki and Hanna Kurniawati. Robotics Science and Systems online proceedings, 12-16 July 2014, Berkeley, CA United States. 15  
Hoermann, Stefan and Borges, Paulo Vinicius Koerich (2011). Robot localization using 3D-models and an off-board monocular camera. In: Proceedings of the IEEE International Conference on Computer Vision. 2011 IEEE International Conference on Computer Vision Workshops, ICCV Workshops 2011, Barcelona, Spain, (1006-1013). 6-13 November 2011. doi:10.1109/ICCVW.2011.6130361 51   0 Cited 2 times in Scopus2 0
Milford, Michael J. Robot Navigation from Nature: Simultaneous Localisation, Mapping and Path Planning Based on Hippocampal Models. Berlin, Germany: Springer, 2008. 66   28
Schulz, Ruth, Glover, Arren, Wyeth, Gordon and Wiles, Janet (2010). Robots, communication, and language: An overview of the Lingodroid project. In: Gordon Wyeth and Ben Upcroft, Proceedings of the Australasian Conference on Robotics and Automation (ACRA 2010). Australasian Conference on Robotics and Automation 2010 (ACRA 2010), Brisbane, Australia, (). 1-3 December 2010. 72 4 Cited 0 times in Scopus0
Chen, Shaokang, Lovell, Brian C. and Shan, Ting (2009) Robust adapted principal component analysis for face recognition. International Journal of Pattern Recognition and Artificial Intelligence, 23 3: 491-520. doi:10.1142/S0218001409007284 113 3 3 Cited 3 times in Scopus3 0
Wyeth, G. F. and Brown, B. C. (2000). Robust adaptive vision for robot soccer. In J. Billingsley (Ed.), Mechatronics and Machine Vision in Practice (pp. 41-48) Baldock, England: Research Studies Press. 32  
Khan, S., Pirzada, A.A. and Portmann, M. (2007). Robust communications using wireless mesh networks for safeguarding water infrastructures. In: Mendis, P., Lai, J., Dawson, E. and Abbass, H., Proceedings of the 2007 RNSA Security Technology Conference. Recent Advances in Security Technology (RNSA) 2007, Melbourne, Australia, (21-32). 28 September, 2007. 83  
Hossain M. J., Saha T. K., Mithulananthan, N. and Pota H. R. (2012) Robust control strategy for PV system integration in distribution systems. Applied Energy, 99 355-362. doi:10.1016/j.apenergy.2012.05.027 102   12 Cited 15 times in Scopus15 0
Yang, Yang, Yang, Yi, Huang, Zi, Liu, Jianjun and Ma, Zhigang (2012). Robust cross-media transfer for visual event detection. In: MM '12: Proceedings of the 20th ACM International Conference on Multimedia. 20th ACM International Conference on Multimedia (MM'12), Nara, Japan, (1045-1048). 29 October - 2 November 2012. doi:10.1145/2393347.2396379 50 1 Cited 2 times in Scopus2 0
Aldeen, M. and Sharma, R. (2007) Robust detection of faults in frequency control loops. IEEE Transactions on Power Systems, 22 1: 413-422. doi:10.1109/TPWRS.2006.883682 50 1 11 Cited 16 times in Scopus16 0
Chandra, Shekhar S., Normand, Nicolas, Kingston, Andrew, Guedon, Jeanpierre and Svalbe, Imants (2014) Robust digital image reconstruction via the discrete Fourier slice theorem. IEEE Signal Processing Letters, 21 6: 682-686. doi:10.1109/LSP.2014.2313341 27 1 0 Cited 0 times in Scopus0 0
Lovell, Brian C. and Chen, Shaokang (2008). Robust Face recognition for Data Mining. In John Wang (Ed.), Data Warehousing and Mining: Concepts, Methodologies, Tools and Applications (pp. 3621-3629) Hershey, PA: Information Science Reference. 532  
Lovell, Brian C. and Chen, Shaokang (2005). Robust Face Recognition for Data Mining. In Wang, John (Ed.), Encyclopedia of Data Warehousing and Mining (pp. 965-972) Hershey, USA: Idea Group. 1340 1210
Lovell, Brian C. and Chen, Shaokang (2005). Robust Face Recognition for Data Mining. In: APRS Workshop on Digital Image Computing, , Griffith University, Southbank, Brisbane:The University of Queensland. 216 161
Shan, Ting, Bigdeli, Abbas, Lovell, Brian C. and Chen, Shaokang (2008). Robust face recognition technique for a real-time embedded face recognition system. In Brijesh Verma and Michael Blumenstein (Ed.), Pattern recognition technologies and applications : Recent advances (pp. 188-211) Hershey, PA, U.S.A.: Information Science Reference. 485  
Sharma, R., Aldeen, M. and Crusca, F. (2005). Robust fault detection in the load-frequency control of interconnected power systems. In: Proceedings of AUPEC 2005 Australian Universities Power Engineering Conference , Conference Proceedings. Australasian Universities Power Engineering Conference (AUPEC), Hobart, Australia, (1-6). 25-28 September 2005. 56 59
Sanderson, C. and Bengio, S. (2003). Robust Features for Frontal Face Authentication in Difficult Image Conditions. In: Lecture Notes in Computer Science 2688. Audio-and video-based biometric person authentication : 4th International Conference, AVBPA 2003, Guildford, UK, (495-504). June 2003. doi:10.1007/3-540-44887-X_59 30   1 0
Reddy, Vikas, Sanderson, Conrad and Lovell, Brian C. (2010). Robust foreground object segmentation via adaptive region-based background modelling. In: Proceedings. 2010 20th International Conference on Pattern Recognition (ICPR). 2010 20th International Conference on Pattern Recognition (ICPR 2010), Istanbul, Turkey, (3939-3942). 23-26 August 2010. doi:10.1109/ICPR.2010.958 106 1 Cited 4 times in Scopus4 0
Lehmann, Stefan, Clarkson, I. Vaughan L., Bradley, Andrew P., Williams, John and Kootsookos, Peter J. (2005). Robust Fundamental Matrix Determination without Correspondences. In: Brian C. Lovell and Anthony J. Maeder, Proceedings of the APRS Workshop on Digital Image Computing, Pattern Recognition and Imaging for Medical Applications. APRS Workshop on Digital Image Computing (WDIC2005), Griffith University, Southbank, Brisbane Australia, (97-102). 21 February, 2005. 1583 481
Song, Jingkuan, Yang, Yi, Li, Xuelong, Huang, Zi and Yang, Yang (2014) Robust hashing with local models for approximate similarity search. IEEE Transactions on Cybernetics, 44 7: 1225-1236. doi:10.1109/TCYB.2013.2289351 25   0 Cited 0 times in Scopus0 0
Zhang, Xiaohong, Wang, Honxing, Hong, Mingjian, Xu, Ling, Yang, Dan and Lovell, Brian C. (2009) Robust image corner detection based on scale evolution difference of planar curves. Pattern Recognition Letters, 30 4: 449-455. doi:10.1016/j.patrec.2008.11.002 67 2 18 Cited 31 times in Scopus31 0
Yin, Wei, Hu, Peizhao, Indulska, Jadwiga I and Portmann, Marius (2012). Robust MAC-layer rate control mechanism for 802.11 wireless networks. In: Tom Pfeifer, Anura Jayasumana and Damla Turgut, Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). 37th Annual IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, FL, United States, (419-427). 22-25 October 2012. doi:10.1109/LCN.2012.6423656 68 6 1 Cited 2 times in Scopus2 0
Willadsen, K. and Wiles, J. (2007) Robustness and state-space structure of boolean gene regulatory models. Journal of Theoretical Biology, 249 4: 749-765. doi:10.1016/j.jtbi.2007.09.004 56 1 21 Cited 27 times in Scopus27 0
Lindsay, Peter, Ramsay, Colin, Vilaplana, Miguel, Leones, Javier Lopez, Casado, Enrique and Parks, Paul (2009). Robustness of idle-throttle continuous descent approach trajectories against modified timing requirements. In: 9th AIAA Aviation technology, Integration and Operations Conference (ATIO '09). 9th AIAA Aviation technology, Integration and Operations Conference (ATIO '09), South Carolina, USA, (1-24). 21-23 September 2009. 74   Cited 0 times in Scopus0
Bigdeli, Abbas, Postula, Adam, Lovell, Brian C. and Norouznezhad, Ehsan (2010). Robust object tracking using local oriented energy features and its hardware/software implementation. In: 11th International Conference on Control Automation Robotics & Vision (ICARCV), 2010. 11th International Conference on Control Automation Robotics & Vision (ICARCV), 2010, Singapore, (2060-2066). 7 - 10 December 2010. doi:10.1109/ICARCV.2010.5707853 146 3 4 Cited 5 times in Scopus5 0
Nuske, Stephen, Roberts, Jonathan and Wyeth, Gordon (2009) Robust outdoor visual localization using a three-dimensional-edge map. Journal of Field Robotics, 26 9: 728-756. doi:10.1002/rob.20306 10   7 Cited 15 times in Scopus15 0
van Rest, Oskar, Wachsmuth, Guido, Steel, Jim R. H., Suss,Jorn Guy and Visser, Eelco (2013). Robust Real-Time Synchronization between Textual and Graphical Editors. In: Keith Duddy and Gerti Kappel, Theory and Practice of Model Transformations - 6th International Conference, ICMT 2013, Proceedings. 6th International Conference on Theory and Practice of Model Transformations, ICMT 2013, Budapest, Hungary, (92-107). 18-19 June 2013. doi:10.1007/978-3-642-38883-5_11 46   Cited 2 times in Scopus2 0
Shen, Fumin, Yang, Wankou, Li, Hanxi, Zhang, Hanwang and Shen, Heng Tao (2014) Robust regression based face recognition with fast outlier removal. Multimedia Tools and Applications, . doi:10.1007/s11042-014-2340-4 20   Cited 0 times in Scopus0 0
Yang, Yang, Zha, Zheng-Jun, Shen, Heng Tao and Chua, Tat-Seng (2013). Robust semantic video indexing by harvesting web images. In: Shipeng Li, Abdulmotaleb El Saddik, Meng Wang, Tao Mei, Nicu Sebe, Shuicheng Yan, Richang Hong and Cathal Gurrin, Advances in Multimedia Modeling - 19th International Conference, MMM 2013, Proceedings. 19th International Conference on Multimedia Modeling (MMM 2013), Huangshan, China, (70-80). 7 - 9 January 2013. doi:10.1007/978-3-642-35725-1_7 43   Cited 1 times in Scopus1 0
Hossain, M. J., Pota, H. R., Ugrinovskii, V. and Ramos, Rodrigo A. (2009). Robust STATCOM control for the enhancement of fault ride-through capability of fixed speed wind generators. In: 2009 IEEE Control Applications, (CCA) & Intelligent Control, (ISIC). 3rd IEEE Multi-conference on Systems and Control (MSC 2009), Saint Petersburg, Russia, (1505-1510). 8-10 July 2009. doi:10.1109/CCA.2009.5281072 46 79 6 Cited 6 times in Scopus6 0
Hossain, M. J., Pota, H. R. and Ramos, R. A. (2011) Robust STATCOM control for the stabilisation of fixed-speed wind turbines during low voltages. Renewable Energy, 36 11: 2897-2905. doi:10.1016/j.renene.2011.04.010 41 3 9 Cited 12 times in Scopus12 0
Chen, Wei Cher and Shuley, Nicholas V. Z. (2012) Robust target identification in white gaussian noise using canonical correlation analysis. Ieee Transactions On Antennas And Propagation, 60 7: 3533-3537. doi:10.1109/TAP.2012.2196939 32   2 Cited 3 times in Scopus3 0
Chen, Wei Cher and Shuley, Nicholas V. Z. (2014) Robust target identification using a modified generalized likelihood ratio test. IEEE Transactions on Antennas and Propagation, 62 1: 264-273. doi:10.1109/TAP.2013.2287019 16   2 Cited 3 times in Scopus3 0
Cao, Xiaochun, Wei, Xingxing, Han, Yahong, Yang, Yi and Lin, Dongdai (2013). Robust tensor clustering with non-greedy maximization. In: IJCAI 2013 - Proceedings of the 23rd International Joint Conference on Artificial Intelligence. 23rd International Joint Conference on Artificial Intelligence, IJCAI 2013, Beijing, China, (1254-1259). 3-9 August 2013. 27 4 Cited 0 times in Scopus0

Page 116 of 146

Result Pages:    « first ‹ previous  106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125  next › last »