Developing Minimum Message Length and Support Vector Machine methods to predict user behaviour. Predicting and modelling customer behaviour enables considerable savings in the telecommunications industry and elsewhere. The resulting predictive models facilitate identifying novice users, identifying fraud, responding to users' needs, guiding and advising users, and forwarding useful information.
We consider two cutting-edge data mining approaches, Minimum Message Length (developed and led by ....Developing Minimum Message Length and Support Vector Machine methods to predict user behaviour. Predicting and modelling customer behaviour enables considerable savings in the telecommunications industry and elsewhere. The resulting predictive models facilitate identifying novice users, identifying fraud, responding to users' needs, guiding and advising users, and forwarding useful information.
We consider two cutting-edge data mining approaches, Minimum Message Length (developed and led by Monash) and Support Vector Machines, in order to create efficient tailor-made software.
Our software will respond to specific groups of users, and their changes over time, rather than just the average user. Moreover, it will integrate the functionalities of existing individual data mining software.Read moreRead less
EPOS: Efficient Processing of Moving Object Streams in Data Management Systems. Advanced moving object data management systems are becoming a core technology for a large variety of applications such as traffic management and inventory tracking. These applications play a ubiquitous, critical role in our daily lives. In the same way as the first prototype of a relational database paved the way for successive relational database management systems, we envision that EPOS will form the foundation for ....EPOS: Efficient Processing of Moving Object Streams in Data Management Systems. Advanced moving object data management systems are becoming a core technology for a large variety of applications such as traffic management and inventory tracking. These applications play a ubiquitous, critical role in our daily lives. In the same way as the first prototype of a relational database paved the way for successive relational database management systems, we envision that EPOS will form the foundation for a new generation of moving object databases. EPOS is designed to process a large number of concurrently running continuous monitoring queries on a massive set of moving objects with frequent updates. Read moreRead less
Driving Large Scale Live Internet Broadcasting of Streaming Video. Recent experience of Internet service providers has seen a booming market demand for live Internet broadcasting services. Live broadcasting of high-profile events, such as the Live Earth concerts in July 2007 by MSN, has drawn a global audience of the order of millions of viewers across the Internet. The technology developed in this project will drastically reduce Internet bandwidth consumption for provisioning such large-scale I ....Driving Large Scale Live Internet Broadcasting of Streaming Video. Recent experience of Internet service providers has seen a booming market demand for live Internet broadcasting services. Live broadcasting of high-profile events, such as the Live Earth concerts in July 2007 by MSN, has drawn a global audience of the order of millions of viewers across the Internet. The technology developed in this project will drastically reduce Internet bandwidth consumption for provisioning such large-scale Internet broadcasting services while meeting user satisfaction with guaranteed Quality of Service. It is crucial for Australia to invest in this frontier technology since Australian service providers rely on expensive Internet infrastructure to communicate with major data hubs in other continents.Read moreRead less
Auditory spatial perception during head movements. Orienting to stimuli frequently involves eye and head movements. This improves localisation, yet brings attendant problems (eg, blurring). These problems are well understood in vision, but not in audition, despite evidence for common neural mechanisms. We will examine auditory (and visual) localisation during head movements, showing head movements produce auditory suppression and spatial distortions (analogous to visual saccadic effects). This w ....Auditory spatial perception during head movements. Orienting to stimuli frequently involves eye and head movements. This improves localisation, yet brings attendant problems (eg, blurring). These problems are well understood in vision, but not in audition, despite evidence for common neural mechanisms. We will examine auditory (and visual) localisation during head movements, showing head movements produce auditory suppression and spatial distortions (analogous to visual saccadic effects). This will demonstrate the malleability of auditory spatial perception and the impoverished sensitivity of audition during head and self-motion. Knowledge of these distortions will inform applications such as cockpit design, where orienting to auditory signals is common, and other human/computer interfaces.
Read moreRead less
Data Mining by Clustering in Very Large Relational Databases. Many commercial and governmental entities possess very large relational data that cannot be feasibly analyzed by today's computers, e.g., gene expression data, product usage databases and telecommunication call records. The clustering tools developed in this project will have a significant benefit on many business processes that involve clustering this type of data, such as fraud detection and market segmentation.
Congestion Control for the Future Internet. Australia relies very much on its telecommunications infrastructure due to its geographic dispersion. Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Australia industries and rural communities) and at lower cost. This project will put Australia on the internati ....Congestion Control for the Future Internet. Australia relies very much on its telecommunications infrastructure due to its geographic dispersion. Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Australia industries and rural communities) and at lower cost. This project will put Australia on the international stage as an leading contributor to Internet technology. We will provide training for PhD students and the management of postdoctoral fellows in the important area of Internet traffic engineering and control.
Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic ....Algebraic Models of Stream Ciphers. The project investigates communication security in the mobile environment where both confidentiality and authenticity are of a prime concern. Stream ciphers are a natural choice in mobile environments as they provide an efficient cryptographic protection using a limited computing resources. We treat stream ciphers as algebraic objects whose properties fully determine their cryptographic strength. We first analyse existing stream ciphers showing their algebraic properties and later we derive a design methodology for provably secure stream ciphers. The project leads to new secure and efficient designs for stream ciphers that are the preferred cryptographic tools used in Australian industry.Read moreRead less
Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach ....Algebraic Analysis of Cryptosystems. This project studies an (new) algebraic approach to cryptanalysis of modern block ciphers. The approach works for all cryptosystems that use either small S-boxes, or their algebraic structure can be described by a system of overdefined quadratic equations. The cryptosystems that are potentially breakable using this approach are Rijndael and Serpent - the two top finalists of the Advanced Encryption Standard contest. The project also explores how this approach can be applied to design new and more powerful factoring algorithms. The project has an explosive potential to redefine the theory and practice of modern cryptography.Read moreRead less
A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switc ....A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switched information networks.Read moreRead less