scispace - formally typeset
Search or ask a question
Author

Elizabeth Chang

Bio: Elizabeth Chang is an academic researcher from University of New South Wales. The author has contributed to research in topics: Ontology (information science) & Ontology-based data integration. The author has an hindex of 47, co-authored 716 publications receiving 11915 citations. Previous affiliations of Elizabeth Chang include Philips & Georgia Institute of Technology.


Papers
More filters
Proceedings ArticleDOI
20 Apr 2010
TL;DR: This paper first discusses two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing, then identifies several challenges from the Cloud computing adoption perspective.
Abstract: Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing We then identify several challenges from the Cloud computing adoption perspective. Last, we will highlight the Cloud interoperability issue that deserves substantial further research and development.

1,298 citations

Proceedings ArticleDOI
19 Dec 2005
TL;DR: This paper presents a detailed survey of existing and newly proposed steganographic and watermarking techniques and classify the techniques based on different domains in which data is embedded.
Abstract: Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. In this paper we present a detailed survey of existing and newly proposed steganographic and watermarking techniques. We classify the techniques based on different domains in which data is embedded. We limit the survey to images only.

574 citations

Journal ArticleDOI
TL;DR: A novel neural network (NN) training method that employs the hybrid exponential smoothing method and the Levenberg-Marquardt (LM) algorithm, which aims to improve the generalization capabilities of previously used methods for training NNs for short-term traffic flow forecasting.
Abstract: This paper proposes a novel neural network (NN) training method that employs the hybrid exponential smoothing method and the Levenberg-Marquardt (LM) algorithm, which aims to improve the generalization capabilities of previously used methods for training NNs for short-term traffic flow forecasting. The approach uses exponential smoothing to preprocess traffic flow data by removing the lumpiness from collected traffic flow data, before employing a variant of the LM algorithm to train the NN weights of an NN model. This approach aids NN training, as the preprocessed traffic flow data are more smooth and continuous than the original unprocessed traffic flow data. The proposed method was evaluated by forecasting short-term traffic flow conditions on the Mitchell freeway in Western Australia. With regard to the generalization capabilities for short-term traffic flow forecasting, the NN models developed using the proposed approach outperform those that are developed based on the alternative tested algorithms, which are particularly designed either for short-term traffic flow forecasting or for enhancing generalization capabilities of NNs.

366 citations

Proceedings ArticleDOI
13 Apr 2010
TL;DR: This paper presents the main criteria which should be considered at the stage of designing the SLA in cloud computing, and investigates the negotiation strategies between cloud provider and cloud consumer and proposes the method to maintain the trust and reliability between each of the parties involved in the negotiation process.
Abstract: Cloud computing has been a hot topic in the research community since 2007. In cloud computing, the online services are conducted to be pay-as-you-use. Service customers need not be in a long term contract with service providers. Service level agreements (SLAs) are agreements signed between a service provider and another party such as a service consumer, broker agent, or monitoring agent. Because cloud computing is a recent technology providing many services for critical business applications, reliable and flexible mechanisms to manage online contracts are very important. This paper presents the main criteria which should be considered at the stage of designing the SLA in cloud computing. Also, we investigate the negotiation strategies between cloud provider and cloud consumer and propose our method to maintain the trust and reliability between each of the parties involved in the negotiation process.

261 citations

Proceedings ArticleDOI
26 May 2009
TL;DR: This paper analyses commercially (and research prototypes) available wireless sensor nodes based on these parameters and outlines research directions in this area.
Abstract: Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. However these sensors operate under extreme energy constraints and are designed by keeping an application in mind. Designing a new wireless sensor node is extremely challenging task and involves assessing a number of different parameters required by the target application, which includes range, antenna type, target technology, components, memory, storage, power, life time, security, computational capability, communication technology, power, size, programming interface and applications. This paper analyses commercially (and research prototypes) available wireless sensor nodes based on these parameters and outlines research directions in this area.

251 citations


Cited by
More filters
01 Jan 2003

3,093 citations

Journal ArticleDOI
TL;DR: A novel deep-learning-based traffic flow prediction method is proposed, which considers the spatial and temporal correlations inherently and is applied for the first time that a deep architecture model is applied using autoencoders as building blocks to represent traffic flow features for prediction.
Abstract: Accurate and timely traffic flow information is important for the successful deployment of intelligent transportation systems. Over the last few years, traffic data have been exploding, and we have truly entered the era of big data for transportation. Existing traffic flow prediction methods mainly use shallow traffic prediction models and are still unsatisfying for many real-world applications. This situation inspires us to rethink the traffic flow prediction problem based on deep architecture models with big traffic data. In this paper, a novel deep-learning-based traffic flow prediction method is proposed, which considers the spatial and temporal correlations inherently. A stacked autoencoder model is used to learn generic traffic flow features, and it is trained in a greedy layerwise fashion. To the best of our knowledge, this is the first time that a deep architecture model is applied using autoencoders as building blocks to represent traffic flow features for prediction. Moreover, experiments demonstrate that the proposed method for traffic flow prediction has superior performance.

2,306 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations