Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on lang ....Expressiveness Comparison and Interchange Facilitation between Business Process Execution Languages. Developments in the area of business process management are currently hindered by the plethora of diverse business process execution languages. This project will develop techniques for dealing with interoperability issues induced by this language heterogeneity. The project combines theoretical research, grounded in concurrency theory and workflow patterns, with pragmatic research focusing on languages supported by commercial tools. The outcome will be a framework for comparing the expressiveness of process execution languages and defining mappings between them. This will place Australia at the forefront of developments in business process management systems: a crucial technology in today's global, dynamic, and heterogeneous environments.
Read moreRead less
Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process mo ....Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process models. This language will enable superior approaches to business process modelling and hence smarter use of information. This will place Australia at the forefront of developments in business process management: a crucial technology in today's global, dynamic and heterogeneous environments.Read moreRead less
Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering bus ....Diagnosis and prediction of business process deviances. This project aims to develop an innovative approach based on process execution semantics, to analyse event data logged by IT systems in order to diagnose and predict business process deviance. Anticipated outcomes include novel business intelligence algorithms producing deviance diagnostics, predictions and recommendations and exposing results via interactive visual analytics. The outcomes are expected to aid process workers in steering business operations towards consistent and compliant outcomes and higher performance, and assist analysts and auditors to explain deviant operations. This should significantly benefit industries such as healthcare, insurance, retail and the government where compliance and integrity management are imperative.Read moreRead less
Improved Businesss Decision-Making via Liquid Process Model Collections. This project aims to develop an innovative approach to create and update as necessary the large collection of business process models that represent a complex organisation, so that this collection captures the actual way in which the organisation performs its business processes. Deploying theoretical, conceptual and empirical research, this project aims to capitalise on the value hidden in large process data, as recorded in ....Improved Businesss Decision-Making via Liquid Process Model Collections. This project aims to develop an innovative approach to create and update as necessary the large collection of business process models that represent a complex organisation, so that this collection captures the actual way in which the organisation performs its business processes. Deploying theoretical, conceptual and empirical research, this project aims to capitalise on the value hidden in large process data, as recorded in event logs. The approach is intended to be implemented in an open-source technology to facilitate advanced investigations and predictions that can ultimately lead to better strategic decision-making. This technology also has the potential to become a research-enabling tool for the large research community in business process management.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Sonification for complex, mission-critical work environments. Human operators must often pay attention to an immediate task while monitoring background information, but intrusive alarms often capture operators' attention inappropriately. We investigate how continuous auditory information ("sonification") can provide low-level background information when all is normal, yet capture attention to abnormalities only when needed. The results of three experiments will determine the most effective combi ....Sonification for complex, mission-critical work environments. Human operators must often pay attention to an immediate task while monitoring background information, but intrusive alarms often capture operators' attention inappropriately. We investigate how continuous auditory information ("sonification") can provide low-level background information when all is normal, yet capture attention to abnormalities only when needed. The results of three experiments will determine the most effective combination of visual and auditory information delivery; how well sonification captures attention when needed; and whether sonification captures attention to deviations from expected changes. Our findings will help establish principles of attentional mapping that significantly extend current approaches to interactive systems design.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Legacy2Service: A Novel, Model-Driven Technique for Re-engineering On-Demand, Software Services out of Legacy Applications. The proliferation of software-as-a-service applications from "dotcom" players is raising expectations that other industries will make their critical desktop and mainframe software available as web-enabled software-as-a-service and mobile "apps". However, manually re-engineering legacy software is notoriously costly and frequently unsuccessful. This project will make it easi ....Legacy2Service: A Novel, Model-Driven Technique for Re-engineering On-Demand, Software Services out of Legacy Applications. The proliferation of software-as-a-service applications from "dotcom" players is raising expectations that other industries will make their critical desktop and mainframe software available as web-enabled software-as-a-service and mobile "apps". However, manually re-engineering legacy software is notoriously costly and frequently unsuccessful. This project will make it easier and quicker to turn stand-alone programs into online services by automating much of the process. Specifically, it will develop tools: for analysing program code to identify points to implement service interfaces; for displaying existing and new code dependencies visually; and, to help design and implement new software layers that link legacy services to the web.Read moreRead less
Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users ....Coordinated and Cooperative Load Sharing between Content Delivery Networks. Popular web services can experience severe downtimes as the result of heavy traffic. Enabling coordinated and cooperative content delivery between existing Content Delivery Networks (CDNs) will allow a CDN provider to rapidly 'scale-out' without investing in new infrastructure, to meet both flash crowds and anticipated increases in demand. Improved cost effectiveness, performance and locality for providers and end-users can be achieved by leveraging existing infrastructure provided by other CDNs, creating economies of scale that were previously impossible. This is crucial for uses on the so-called edges of the internet (e.g. Australia) that depend on a small number of expensive data links to the major data centres in Europe and the USA.Read moreRead less
Efficient Similarity Query Processing in High Dimensional Databases. This project studies a fundamental problem common to a wide range of applications. It contributes to smart use of information, which is vital to the modern knowledge-based economy, by providing an enabling technology to capitalise Australia's huge investment in data collection. Our research is right in the forefront of ICT research, leading the international effort of extending database technologies to support data management a ....Efficient Similarity Query Processing in High Dimensional Databases. This project studies a fundamental problem common to a wide range of applications. It contributes to smart use of information, which is vital to the modern knowledge-based economy, by providing an enabling technology to capitalise Australia's huge investment in data collection. Our research is right in the forefront of ICT research, leading the international effort of extending database technologies to support data management and query processing for very large and highly complex data.Read moreRead less