Multivariate Algorithmics: Meeting the Challenge of Real World computational complexity. This Project will result in better methods for designing the algorithms that all computer applications depend on. Algorithms are the instruction sets that tell computers how to process information. Some information processing tasks are intrinsically difficult, even for computers working at enormous speeds. This Project will deliver new mathematical approaches to overcome these difficulties. More efficient al ....Multivariate Algorithmics: Meeting the Challenge of Real World computational complexity. This Project will result in better methods for designing the algorithms that all computer applications depend on. Algorithms are the instruction sets that tell computers how to process information. Some information processing tasks are intrinsically difficult, even for computers working at enormous speeds. This Project will deliver new mathematical approaches to overcome these difficulties. More efficient algorithmic approaches for difficult problems enable advances in all areas of computer applications such as medical diagnosis and health prediction, national security, communications efficiency, industrial productivity and all fields of science and engineering.Read moreRead less
Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, t ....Mathematics of Cryptography. The Australian economy and society requires fast, reliable, and secure communication. Current first-generation security solutions are not capable of supporting the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined. Thus developing new mathematically solid tools in this area is an important and urgent tasks. In addition, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Cryptography, Computer Security and E-Commerce.Read moreRead less
Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algor ....Algorithmics for Interactive 2.5D Graph Drawing. Technological advances have provided a data deluge over the past few years, and consequently have led to many large and complex network models in many domains. This includes terrorrist networks and biological networks, software engineering structures, and webgraphs. Visualisation is an effective tool in helping humans to understand such networks. This project aims to provide a new direction in network visualisation, using 2.5 dimensions. The algorithms developed in the project will help security analysts to detect abnormal behavious such as money laundering, help biologists understand protein-protein interaction networks, and help engineers to understand large software systems.Read moreRead less