School of Information Technology and Electrical Engineering Publications

Browse Results (7246 results found)

Subscribe to the RSS feed for this result setSubscribe to the RSS feed for this result set

Page 116 of 145

Result Pages:    « first ‹ previous  106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125  next › last »

Refine

  Abstract Views File Downloads Thomson Reuters Web of Science Citation Count Scopus Citation Count Altmetric Score
Shan, Ting, Bigdeli, Abbas, Lovell, Brian C. and Chen, Shaokang (2008). Robust face recognition technique for a real-time embedded face recognition system. In Brijesh Verma and Michael Blumenstein (Ed.), Pattern recognition technologies and applications : Recent advances (pp. 188-211) Hershey, PA, U.S.A.: Information Science Reference. 487  
Sharma, R., Aldeen, M. and Crusca, F. (2005). Robust fault detection in the load-frequency control of interconnected power systems. In: Proceedings of AUPEC 2005 Australian Universities Power Engineering Conference , Conference Proceedings. Australasian Universities Power Engineering Conference (AUPEC), Hobart, Australia, (1-6). 25-28 September 2005. 60 63
Sanderson, C. and Bengio, S. (2003). Robust Features for Frontal Face Authentication in Difficult Image Conditions. In: Lecture Notes in Computer Science 2688. Audio-and video-based biometric person authentication : 4th International Conference, AVBPA 2003, Guildford, UK, (495-504). June 2003. doi:10.1007/3-540-44887-X_59 30   1 0
Reddy, Vikas, Sanderson, Conrad and Lovell, Brian C. (2010). Robust foreground object segmentation via adaptive region-based background modelling. In: Proceedings. 2010 20th International Conference on Pattern Recognition (ICPR). 2010 20th International Conference on Pattern Recognition (ICPR 2010), Istanbul, Turkey, (3939-3942). 23-26 August 2010. doi:10.1109/ICPR.2010.958 107 1 Cited 4 times in Scopus4 0
Lehmann, Stefan, Clarkson, I. Vaughan L., Bradley, Andrew P., Williams, John and Kootsookos, Peter J. (2005). Robust Fundamental Matrix Determination without Correspondences. In: Brian C. Lovell and Anthony J. Maeder, Proceedings of the APRS Workshop on Digital Image Computing, Pattern Recognition and Imaging for Medical Applications. APRS Workshop on Digital Image Computing (WDIC2005), Griffith University, Southbank, Brisbane Australia, (97-102). 21 February, 2005. 1588 482
Song, Jingkuan, Yang, Yi, Li, Xuelong, Huang, Zi and Yang, Yang (2014) Robust hashing with local models for approximate similarity search. IEEE Transactions on Cybernetics, 44 7: 1225-1236. doi:10.1109/TCYB.2013.2289351 25   0 Cited 0 times in Scopus0 0
Zhang, Xiaohong, Wang, Honxing, Hong, Mingjian, Xu, Ling, Yang, Dan and Lovell, Brian C. (2009) Robust image corner detection based on scale evolution difference of planar curves. Pattern Recognition Letters, 30 4: 449-455. doi:10.1016/j.patrec.2008.11.002 65 2 18 Cited 31 times in Scopus31 0
Yin, Wei, Hu, Peizhao, Indulska, Jadwiga I and Portmann, Marius (2012). Robust MAC-layer rate control mechanism for 802.11 wireless networks. In: Tom Pfeifer, Anura Jayasumana and Damla Turgut, Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). 37th Annual IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, FL, United States, (419-427). 22-25 October 2012. doi:10.1109/LCN.2012.6423656 67 6 1 Cited 2 times in Scopus2 0
Willadsen, K. and Wiles, J. (2007) Robustness and state-space structure of boolean gene regulatory models. Journal of Theoretical Biology, 249 4: 749-765. doi:10.1016/j.jtbi.2007.09.004 55 1 21 Cited 27 times in Scopus27 0
Lindsay, Peter, Ramsay, Colin, Vilaplana, Miguel, Leones, Javier Lopez, Casado, Enrique and Parks, Paul (2009). Robustness of idle-throttle continuous descent approach trajectories against modified timing requirements. In: 9th AIAA Aviation technology, Integration and Operations Conference (ATIO '09). 9th AIAA Aviation technology, Integration and Operations Conference (ATIO '09), South Carolina, USA, (1-24). 21-23 September 2009. 71   Cited 0 times in Scopus0
Bigdeli, Abbas, Postula, Adam, Lovell, Brian C. and Norouznezhad, Ehsan (2010). Robust object tracking using local oriented energy features and its hardware/software implementation. In: 11th International Conference on Control Automation Robotics & Vision (ICARCV), 2010. 11th International Conference on Control Automation Robotics & Vision (ICARCV), 2010, Singapore, (2060-2066). 7 - 10 December 2010. doi:10.1109/ICARCV.2010.5707853 143 3 4 Cited 5 times in Scopus5 0
Nuske, Stephen, Roberts, Jonathan and Wyeth, Gordon (2009) Robust outdoor visual localization using a three-dimensional-edge map. Journal of Field Robotics, 26 9: 728-756. doi:10.1002/rob.20306 9   7 Cited 15 times in Scopus15 0
van Rest, Oskar, Wachsmuth, Guido, Steel, Jim R. H., Suss,Jorn Guy and Visser, Eelco (2013). Robust Real-Time Synchronization between Textual and Graphical Editors. In: Keith Duddy and Gerti Kappel, Theory and Practice of Model Transformations - 6th International Conference, ICMT 2013, Proceedings. 6th International Conference on Theory and Practice of Model Transformations, ICMT 2013, Budapest, Hungary, (92-107). 18-19 June 2013. doi:10.1007/978-3-642-38883-5_11 43   Cited 2 times in Scopus2 0
Shen, Fumin, Yang, Wankou, Li, Hanxi, Zhang, Hanwang and Shen, Heng Tao (2014) Robust regression based face recognition with fast outlier removal. Multimedia Tools and Applications, . doi:10.1007/s11042-014-2340-4 18   Cited 0 times in Scopus0 0
Yang, Yang, Zha, Zheng-Jun, Shen, Heng Tao and Chua, Tat-Seng (2013). Robust semantic video indexing by harvesting web images. In: Shipeng Li, Abdulmotaleb El Saddik, Meng Wang, Tao Mei, Nicu Sebe, Shuicheng Yan, Richang Hong and Cathal Gurrin, Advances in Multimedia Modeling - 19th International Conference, MMM 2013, Proceedings. 19th International Conference on Multimedia Modeling (MMM 2013), Huangshan, China, (70-80). 7 - 9 January 2013. doi:10.1007/978-3-642-35725-1_7 40   Cited 1 times in Scopus1 0
Hossain, M. J., Pota, H. R., Ugrinovskii, V. and Ramos, Rodrigo A. (2009). Robust STATCOM control for the enhancement of fault ride-through capability of fixed speed wind generators. In: 2009 IEEE Control Applications, (CCA) & Intelligent Control, (ISIC). 3rd IEEE Multi-conference on Systems and Control (MSC 2009), Saint Petersburg, Russia, (1505-1510). 8-10 July 2009. doi:10.1109/CCA.2009.5281072 43 84 6 Cited 6 times in Scopus6 0
Hossain, M. J., Pota, H. R. and Ramos, R. A. (2011) Robust STATCOM control for the stabilisation of fixed-speed wind turbines during low voltages. Renewable Energy, 36 11: 2897-2905. doi:10.1016/j.renene.2011.04.010 40 3 9 Cited 10 times in Scopus10 0
Chen, Wei Cher and Shuley, Nicholas V. Z. (2012) Robust target identification in white gaussian noise using canonical correlation analysis. Ieee Transactions On Antennas And Propagation, 60 7: 3533-3537. doi:10.1109/TAP.2012.2196939 29   2 Cited 3 times in Scopus3 0
Chen, Wei Cher and Shuley, Nicholas V. Z. (2014) Robust target identification using a modified generalized likelihood ratio test. IEEE Transactions on Antennas and Propagation, 62 1: 264-273. doi:10.1109/TAP.2013.2287019 16   2 Cited 3 times in Scopus3 0
Cao, Xiaochun, Wei, Xingxing, Han, Yahong, Yang, Yi and Lin, Dongdai (2013). Robust tensor clustering with non-greedy maximization. In: IJCAI 2013 - Proceedings of the 23rd International Joint Conference on Artificial Intelligence. 23rd International Joint Conference on Artificial Intelligence, IJCAI 2013, Beijing, China, (1254-1259). 3-9 August 2013. 26 4 Cited 0 times in Scopus0
Abramson, David, Bethwaite, Blair, Enticott, Colin, Garic, Slavisa, Peachey, Tom, Michailova, Anushka, Amirriazi, Saleh and Chitters, Ramya (2009). Robust workflows for science and engineering. In: Ioan Raicu, Ian Foster and Yong Zhao, Proceedings of the 2nd ACM Workshop on Many-Task Computing on Grids and Supercomputers. 2nd ACM Workshop on Many-Task Computing on Grids and Supercomputers 2009, MTAGS '09, Portland, OR, United States, (). 16 November 2009. doi:10.1145/1646468.1646469 20   Cited 0 times in Scopus0 0
Bradley, Andrew P. (2013) ROC curve equivalence using the Kolmogorov-Smirnov test. Pattern Recognition Letters, 34 5: 470-475. doi:10.1016/j.patrec.2012.12.021 234   2 Cited 2 times in Scopus2 0
Bradley, Andrew P (1996) ROC curves and the chi2 test. Pattern Recognition Letters, 17 3: 287-294. doi:10.1016/0167-8655(95)00121-2 429 555 14 Cited 18 times in Scopus18 0
Ball, David, Kliese, Russell, Windels, Francois, Nolan, Christopher, Stratton, Peter, Sah, Panjkaj and Wiles, Janet (2014) Rodent scope: A user-configurable digital wireless telemetry system for freely behaving animals. PLoS One, 9 2: e89949.1-e89949.10. doi:10.1371/journal.pone.0089949 56   2 Cited 2 times in Scopus2 1
Shuley, N. and Longstaff, D. (2004) Role of polarisation in automatic target recognition using resonance descriptions. Electronics Letters, 40 4: 268-270. doi:10.1049/el:20040170 51   7 Cited 15 times in Scopus15 0
Emami, Ali, Dadgostar, Farhad, Bigdeli, Abbas and Lovell, Brian C. (2012). Role of spatiotemporal oriented energy features for robust visual tracking in video surveillance. In: Proceedings, 2012 IEEE Ninth International Conference on Advanced Video and Signal-Based Surveillance : AVSS 2012. 9th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS), Beijing, Peoples R China, (349-354). 18-21 September 2012. doi:10.1109/AVSS.2012.64 86   1 Cited 1 times in Scopus1 0
Wyeld, T. G. (2005). Role Play in 3D Virtual Environments. In: Beryl Plimmer and Robert Amor, CHINZ 2005 - Making CHI Natural. CHINZ 2005, The University of Auckland, Auckland, New Zealand, (61-66). 7-8 July 2005. 162  
Sode-Yome, Arthit, Pothiratana, Vichai and Mithulananthan, Nadarajah (2004). Roles of small power prodcucers as part of peak serving scheme. In: POWER-GEN Asia 2004, Bangkok, Thailand, (). October 5-7, 2004. 34  
Sode-Yome, Arthit, Pothiratana, Vichai and Mithulananthan, Nadarajah (2004). Roles of small power producers as part of peak serving scheme. In: POWER-GEN Asia, Bankok, Thailand, (). October 5-7, 2004. 66  
Trakic, Adnan, Eskandarnia, Neda, Li, Bing Keong, Weber, Ewald, Wang, Hua and Crozier, Stuart (2012) Rotational magnetic induction tomography. Measurement Science and Technology, 23 2: 025402.1-025402.12. doi:10.1088/0957-0233/23/2/025402 69   2 Cited 4 times in Scopus4 2
Mishra, Y., Dong, Z. Y., Bansal, R. and Mishra, S. (2009). Rough fuzzy control of SVC for power system stability enhancement. In Libao Shi and Zhao Yang Dong (Ed.), Computational Intelligence in Power Systems (pp. 31-51) Trivandrum, Kerala, India: Research Signpost. 299 13
Cribb, G. and McLeod, R. (1999) Round the world: Australian and South east Asian Engineering Resources. Ariadne, 19 (March 1999): . 38  
Guerin, Jonathan, Portmann, Marius and Pirzada, Asad (2007). Routing metrics for multi-radio wireless mesh networks. In: R. Harris and M. Milner, ATNAC 2007 Australasian Telecommunications, Networks and Applications Conference. 2007 Australasian Telecommunications, Networks and Applications Conference, Christchurch, New Zealand, (343-348). 2-5 December, 2007. doi:10.1109/ATNAC.2007.4665270 75 3 Cited 3 times in Scopus3 0
Ali, M., Dong, Z. Y., Li, X. and Zhang, P. (2006). RSA-Grid: A grid computing based framework for power system reliability and security analysis. In: Proceedings of the 2006 IEEE Power Engineering Society General Meeting. 2006 IEEE Power Engineering Society General Meeting, Montreal, Canada, (1709374.1-1709374.7). 18-22 June 2006. 116   Cited 0 times in Scopus0
Governatori, G., Padmanabhan, V. and Rotolo, A. (2006). Rule-Based Agents in Temporalised Defeasible Logic. In: Q. Yang and G. Webb, PRICAI 2006: Trends in Artificial Intelligence, Proceedings of the 9th Pacific Rim International Conference on Artificial Intelligence. Pacific Rim International Conference on Artificial Intelligence, PRICAI 2006, Guilin, Guanxi, China, (31-40). 7-11 August, 2006. doi:10.1007/11801603_6 125 695 5 Cited 2 times in Scopus2 0
Rule Based Signature Verification and Forgery Detection (2001) . National Conference on Document Analysis and Recognition, 2001, 13-14 July, 2001, Mandya, India. 658 3671
Barakat, Nahla and Bradley, Andrew P. (2010) Rule extraction from support vector machines: A review. Neurocomputing, 74 1-3: 178-190. doi:10.1016/j.neucom.2010.02.016 73 1 30 Cited 36 times in Scopus36 0
Barakat, Nahla H. and Bradley, Andrew P. (2007) Rule extraction from support vector machines: A sequential covering approach. IEEE Transactions on Knowledge and Data Engineering, 19 6: 729-741. doi:10.1109/TKDE.2007.1023 155 1 21 Cited 28 times in Scopus28 0
Barakat, N. and Bradley, A. P. (2006). Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve. In: Y. Tang, P. Wang, G. Lorette and D. S. Yeung, Proceedings, The 18th International Conference on Pattern Recognition. The 18th International Conference on Pattern Recognition (ICPR'06), Hong Kong, (812-815). 20-24 August, 2006. doi:10.1109/ICPR.2006.1021 293 865 4 Cited 12 times in Scopus12 0
Little, Suzanne and Hunter, Jane (2004). Rules-By-Example: A Novel Approach to Semantic Indexing and Querying of Images. In: S. McIlraith, D. Plexousakis and F. van Harmelen, Lecture Notes in Computer Science: The Semantic Web: ISWC 2004. Third International Semantic Web Conference, ISWC2004, Hiroshima, Japan, (534-548). November, 2004. doi:10.1007/b102467 416 287 4 0
Gunasekera, Kutila, Loke, Seng Wai, Zaslavsky, Arkady and Krishnaswamy, Shonali (2009). Runtime Adaptation of Multiagent Systems for Ubiquitous Environments. In: Paolo Boldi, Giuseppe Vizzari, Gabriella Pasi and Ricardo Baeza-Yates, IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, 2009 : WI-IAT '09; proceedings; [including workshop papers]. Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09. IEEE/WIC/ACM International Joint Conferences, Milan, Italy, (486-490). 15-18 Septmeber 2009. doi:10.1109/WI-IAT.2009.199 15   3 Cited 3 times in Scopus3 0
Gunasekera, Kutila, Krishnaswamy, Shonali, Loke, Seng Wai and Zaslavsky, Arkady (2009). Runtime efficiency of adaptive mobile software agents in pervasive computing environments. In: Julie A. McCann, Proceedings of the 2009 international conference on Pervasive services. International Conference on Pervasive Services (ICPS 2009), London, England, UK, (123-131). 3-16 July 2009. doi:10.1145/1568199.1568218 30 1 2 Cited 3 times in Scopus3 0
Ramdas, T., Egan, G. K., Abramson, D. and Baldridge, K. K. (2008). Run-time thread sorting to expose data-level parallelism. In: International Conference on Application-Specific Systems, Architectures and Processors, 2008. ASAP08 - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors, Leuven, Belgium, (55-60). 2-4 July 2008. doi:10.1109/ASAP.2008.4580154 26   0 Cited 0 times in Scopus0 0
Hussey, Andrew and Atchison, Brenton (2000) Safe Architectural Design Principles. Technical Report no. 00-19, Software Verification Research Centre, School of Information Technology, The University of Queensland. 882 1588
Pirzada, Asad Amir, Portmann, Marius, Wishart, Ryan and Indulska, Jadwiga (2009) SafeMesh: A wireless mesh network routing protocol for incident area communications. Pervasive and Mobile Computing, 5 2: 201-221. doi:10.1016/j.pmcj.2008.11.005 83   Cited 14 times in Scopus14 0
Hussey, Andrew (1999) Safety analysis of the druide user-interface. Technical Report SSE 99-13, Division of Systems and Software Engineering Research, School of Information Technology and Electrical Engineering, The University of Queensland. 16 1
Lindsay, Peter A., Winter, Kirsten and Yatapanage, Nisansala (2010). Safety assessment using behavior trees and model checking. In: 2010 8th IEEE International Conference on Software Engineering and Formal Methods. Software Engineering and Formal Methods (SEFM 2010), Pisa, Italy, (181-190). 13-18 September 2010. doi:10.1109/SEFM.2010.23 62   Cited 2 times in Scopus2 0
Lindsay, P. A. and Smith, G. P. (2000). Safety assurance of Commercial-Off-The-Shelf software. In: A. Griffiths, Proceedings 5th Australian Workshop on Safety Critical Systems and Software. 5th Australian Workshop on Safety Critical Systems & Software, Melbourne, Australia, (43-51). 24 November, 2000. 43  
Lindsay, P. and Smith, G. (2000) Safety Assurance of Commercial-Off-The-Shelf Software. Technical Report no. 00-17, Software Verification Research Centre, School of Information Technology, The University of Queensland. 699 526
Hussey, A. P. and Michael, M. (1999). Safety-critical usability: Pattern-based reuse of successful design concepts. In: M. McNicol, Fourth Australian Workshop on Safety-Critical Systems and Software. Fourth Australian Workshop on Safety-Critical Systems and Software, Canberra, (19-35). 26 Nov, 1999. 57  

Page 116 of 145

Result Pages:    « first ‹ previous  106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125  next › last »