scispace - formally typeset
W

Wayne Read

Researcher at James Cook University

Publications -  97
Citations -  1134

Wayne Read is an academic researcher from James Cook University. The author has contributed to research in topics: Common value auction & Boundary value problem. The author has an hindex of 18, co-authored 96 publications receiving 1070 citations.

Papers
More filters

A software architecture for continuous double auctions

TL;DR: The model is presented as an abstraction of the online share trading process, and the major software components, address web site navigation and object-oriented software design, and an online CDA database schema is presented.
Journal ArticleDOI

A Critical Reappraisal of the Average Degree of Consolidation

TL;DR: In this paper, an exact method for estimating the consolidation settlement of a clay stratum using the mass flux per unit area out of the drainage boundaries is proposed, and the traditional and exact methods for calculating the average degree of consolidation are identical.
Journal ArticleDOI

An intelligent agent system for managing heterogeneous sensors in dispersed and disparate wireless sensor network

TL;DR: An intelligent agent is presented, which provides automatic semantic-based registration/configuration in a large-scale sensor observation system and makes a 'smart' decision on which system function to use by integrating a semantic representation of sensor network data including middleware and web service specifications and applying logical rules to the knowledge-base.
Journal ArticleDOI

Series solutions for seepage in three dimensional aquifers

TL;DR: In this article, the authors present a series method that can be used to provide three dimensional solutions for saturated seepage problems in real-time, in which the aquifer lies on a horizontal aquiclude and can have arbitrary soil surface geometry.

Cryptographic online auction schemes

TL;DR: It is shown that most schemes that have been proposed for conducting private and secure auctions are currently not practical and there are conflicting perspectives regarding security requirements.