Breadcrumb Links:

2008 Publications

Journal Articles (26)

Tier A* (6)

Q.-L. Han, "A new delay-dependent absolute stability criterion for a class of nonlinear neutral systems," Automatica, vol. 44, no. 1, pp. 272-277, January 2008.
X.-M. Zhang and Q.-L. Han, "Robust filtering for a class of uncertain linear Systems with time-varying delay," Automatica, vol. 44, no. 1, pp. 157-166, January 2008.
X. Jiang, Q.-L. Han, S. Liu, and A. Xue, "A new stabilization criterion for networked control systems," IEEE Transactions on Automatic Control, vol. 53, no. 4, pp. 1025-1032, May 2008.
X. Jiang and Q.-L. Han, "On designing fuzzy controllers for a class of nonlinear networked systems," IEEE Transactions on Fuzzy Systems, vol. 16, no. 4, pp. 1050-1060, August 2008.
X. Jiang and Q.-L. Han, "New stability criteria for linear systems with interval time-varying delay," Automatica, vol. 44, no. 10, pp. 2680-2685, October 2008
G. Shanks, E. Tansley, J. Nuredini, D. Tobin, and R. Weber, "Representing part-whole relations in conceptual modeling: an empirical evaluation," MIS Quarterly, vol. 32, pp. 553-573, Sept 2008.

Tier A (5)

Q.-L. Han, A. Xue, S. Liu, and X. Yu, "Robust absolute stability criteria for uncertain Lur'e systems of neutral type," International Journal of Robust and Nonlinear Control, vol. 18, no. 3, pp. 278-295, February 2008.
X.-M. Zhang and Q.-L. Han, "A new finite sum inequality approach to delay-dependent control of discrete-time linear systems with time-varying delay," International Journal of Robust and Nonlinear Control, vol. 18, no. 6, pp. 630-647, April 2008.
J. Sun, Q.-L. Han, and X. Jiang, "Impulsive control of time-delay systems using delayed impulse and its application to impulsive master-slave synchronization," Physics Letters A, vol. 372, no. 42, pp. 6375-6380, October 2008.
X. Fan and B. Verma, "Selection and fusion of facial features for face recognition," Expert Systems with Applications, doi:10.1016/j.eswa.2008.08.052, 07 August 2008.
Z. W. Li and Y. Xiang, "Checkpointing schemes for grid workflow systems," Concurrency and Computation: Practice and Experience (Wiley), vol. 20, no. 15, pp. 1773-1790, 2008.

Tier B (3)

W. Li, "DynaQoS©-RDF: a best effort for QoS-assurance of dynamic reconfiguration of dataflow systems," Journal of Software Maintenance and Evolution: Research and Practice, doi: 10.1002/smr.397, 2008.
Y. Xiang, "Managing email overload with an automatic nonparametric Clustering System," The Journal of Supercomputing, http://dx.doi.org/10.1007/s11227-008-0216-y, 2008.
Daley JW and Shepherd RK "Utilization of F1 information in estimating QTL effect in F2 crosses between outbred lines" Journal of Animal Breeding and Genetics, Vol. 125, pp. 35-44. 2008.

Tier C (6)

B. Verma, "Novel Network Architecture and Learning Algorithm for the Classification of Mass Abnormalities in Digitized Mammograms," Artificial Intelligence in Medicine, vol. 42, no. 1, pp. 67-79, 2008.
A. Chiou, "A game AI production shell framework: generating AI opponents for geomorphic-isometric strategy games via modeling of expert player intuition," Australian Journal of Intelligent Information Processing Systems, vol. 9, no.4, Feb 2008.
M. Li, B. Verma, X. Fan and K. Tickle, "RBF neural networks for solving the inverse problem of backscattering spectra," Neural Computing & Applications, vol.17, no. 4, pp. 391-397, 2008.
Z. W. Li, Q. Chen, and Y. Xiang, "A Cross-Authentication Model for Heterogeneous Domains in Active Networks," International Journal of Computer Systems Science and Engineering (CRL), vol. 23, no. 3, pp. 167-182, 2008.
M. Li, W. Guo, B. Verma, K. Tickle, and J. O'Connor, "Intelligent methods for solving inverse problems of backscattering spectra with noise: a comparison between neural networks and simulated annealing," Neural Computing and Applications, doi: 10.1007/s00521-008-0219-x, 2008.
Balsys, R.J., Suffern, K.G., Jones, H. "Point Based Rendering of Non-Manifold Surfaces" Computer Graphics Forum. Vol. 27, No. 1, pp 63-72, 2008.

Not Classified (6)

V. Korotkikh and G. Korotkikh, "On principles in engineering of distributed computing systems," Soft Computing Journal, vol. 12, no. 2, pp. 201-206, 2008.
V. Korotkikh and G. Korotkikh, "On a new type of information processing for efficient management of complex systems," Inter Journal of Complex Systems, 2008.
V. Korotkikh and G. Korotkikh, "On irreducible description of complex systems," Complexity Journal, Published online September 29, 2008.
Jarvis, D., Jarvis, J. and Rönnquist, R. "Using Agent Teams to Model Enterprise Behaviour", Multiagent and Grid Systems. Vol. 4, No. 4, pp. 351-358.
Jarvis, J., Jarvis, D., Rönnquist, R. and Jain, L. "A Flexible Plan Step Model for BDI Agents", Multiagent and Grid Systems. Vol. 4, No. 4, pp. 359-370.
Jarvis, D., Jarvis, J., Rönnquist, R. (2008), "Team Programming with GORITE", International Journal of Intelligent Defence Support Systems. Vol. 1, No. 1, pp. 75-89.

Conference Papers (38)

Q.-L. Han, "A delay decomposition approach to stability and control of linear time-delay systems - Part I: stability," Proceedings of the 7th World Congress on Intelligent Control and Automation - WCICA'08, Chongqing, China, 25-27 June 2008, pp. 284-288.
Q.-L. Han, "A delay decomposition approach to stability and control of linear time-delay systems - Part II: control," Proceedings of the 7th World Congress on Intelligent Control and Automation - WCICA'08, Chongqing, China, 25-27 June 2008, pp. 289-294.
Q.-L. Han, "A delay decomposition approach to stability of linear neutral systems," Proceedings of the 17th IFAC World Congress - IFAC WC'08, Seoul, Korea, 6-11 July 2008, pp. 2607-2612.
Q.-L. Han, X. Yu, Y. Feng, and G. Chen, "Effect of time-delay on the derivative feedback control of a 2-degree-of-freedom torsional bar with parameter perturbations," Proceedings of the 17th IFAC World Congress - IFAC WC'08, Seoul, Korea, 6-11 July 2008, pp. 8695-9700.
X. Yu, Q.-L. Han, X. Li, and C. Wang, "Time-delay effect on equivalent control based sliding mode control systems," Proceedings of the 10th International Workshop on Variable Structure Systems (VSS'08), 08-10 June 2008, pp. 13-17
X. Li, X. Yu, Q.-L. Han, and C. Wang, "Stability analysis of time-delayed single-input sliding mode control systems," Proceedings of IECON08, 11-13 November 2008.
M. M. Mazid, S. Ali, and K. S. Tickle, "Finding an unique association rule mining algorithm based on data characteristics," IEEE/ICECE 2008, Dhaka, Bangladesh, 20-28 December 2008.
B.Verma, H. Lee, and J. Zakos, "An automatic intelligent language classifier," 15th International Conference on Neural Information Processing (ICONIP'08), Auckland, New Zealand, 2008.
P. McLeod and B. Verma, "Impact of soft clustering on classification of suspicious areas in digital mammograms," Fourth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP-2008), Sydney, Australia, 2008.
Z. Hassan and B. Verma, "Parallel neural-based hybrid data mining ensemble," Fourth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP-2008), Sydney, Australia, 2008.
R. Dodd, R. Broadfoot, X. Yu, and A. Chiou, "Process models for a sugar mill crystallisation stage knowledge based supervisory support system," Proceedings of 2008 Innovative Production Machines and Systems Conference (I*PROMS) 4th Virtual International Conference, 1-14 July 2008.
R. Dodd, A. Chiou, X. Yu, and R. Broadfoot, "A smart supervisory control system framework for a sugar mill crystallisation stage," Proceedings of 2008 6th IEEE International Conference on Industrial Informatics, Daejeon, Korea, 13-16 July 2008.
A. Chiou and K. W. Wong, "Player adaptive entertainment computing (PAEC): mechanism to model user satisfaction by using neuro linguistic programming (NLP) techniques," Proceedings IEEE Symposium on Computational Intelligence and Games, Perth, WA, 15-18 December 2008.
W. L. Zhou and Y. Xiang, "Using multi-core to support security-related applications," Algorithms and Architectures for Parallel Processing, Lecture Notes in Computer Science (Springer), vol. 5022, pp. 316-317, 2008.
Y. Xiang and W. L. Zhou, "Using multi-core processors to support network security applications," 12th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2008), IEEE, pp. 213-218, 2008.
D.X. Tian and Y. Xiang, "A multi-core supported intrusion detection system," 2nd IFIP International Workshop on Network and System Security (NSS 2008), IEEE, pp. 50-55, 2008.
A. Chonka, W. L. Zhou, L. Ngo, and Y. Xiang, "Ubiquitous multicore (UM) methodology for multimedia," The 2008 International Symposium on Computer Science and its Applications (CSA 2008), IEEE, pp. 131-136, 2008.
A. Chonka, W. L. Zhou, and Y. Xiang, "Multi-core security defense system (MSDS)," The 2008 Australasian Telecommunications Networking and Application Conference (ATNAC 2008), IEEE, 2008.
A. Chonka, W. L. Zhou, and Y. Xiang, "Multi-core defense system (MSDS) for protecting computer infrastructure against DDoS attacks," The 2008 International Workshop on Programming Parallel Applications for Multi-cores (PPAM 2008), IEEE, 2008.
A. Chonka, W. L. Zhou, Y. Xiang, and J. Singh, "Detecting and tracing DDoS attacks by intelligent decision prototype (IDP)," IEEE Workshop on Web and Pervasive Security, IEEE, pp. 578-583, 2008.
A. Chonka, W. L. Zhou, and Y. Xiang, "Protecting web services with service oriented traceback architecture," IEEE 8th International Conference on Computer and Information Technology, IEEE, pp. 706-711, 2008.
A. Chonka, W. L. Zhou, K. Knapp, and Y. Xiang, "Protecting information systems from DDoS attack using multicore methodology," IEEE 8th International Conference on Computer and Information Technology, IEEE, pp. 270-275, 2008.
A. Chonka, W.L. Zhou, and Y. Xiang, "Protecting web services from DDoS attacks by SOTA", IEEE 5th International Conference on Information Technology and Applications, IEEE, 2008.
S. Ali, P. Ben, and K. Tickle, "Rule based base classifier selection for bagging algorithm," Proceeding of The 2008 International Conference on Data Mining (DMIN'08), pp. 26-29, USA, 2008.
G. M. Shafiullah, S. Simson, S., A. Thompson, P. Wolfs, and S. Ali, "Forecasting vertical acceleration of railway wagons - a comparative study," Proceeding of The 2008 International Conference on Data Mining (DMIN'08), pp. 137-143, USA, 2008.
M. M. Rahman, M. A. Nashiry, T. K. Godder, and S. Ali, "TCP performance over proactive and reactive routing protocols for mobile ad hoc," Proceeding of The 2008 International Conference on Wireless Networks (ICWN'08), pp. 155-161, USA, 2008.
G. M. Shafiullah, S. Simson, A. Thompson, P. Wolfs, and S. Ali, "Monitoring vertical acceleration of railway wagon using machine learning techniques," Proceeding of The 2008 International Conference on Machine Learning; Models, Technologies and Applications (MLMTA'08), USA, 2008.
L. D. Li, X. D. Li, and XH. Yu, "Power generation loading optimization using a multi--objective constraint-handling method via PSO algorithm," Proceeding of IEEE International Conference on Industrial Informatics (IEEE INDIN 2008), pp. 1632-1637, Daejeon, Korea, 13-16 July 2008.
L. D. Li, X. D. Li, and X.H. Yu, "A multi-objective constraint-handling method with PSO algorithm for constrained engineering optimization problems," Proceeding of IEEE Congress on Evolutionary Computation (IEEE CEC 2008), pp.1528-1535, Hong Kong, China, 1-6 June 2008.
X. Fan and Y. Xiang, "Accelerating the propagation of active worms by employing multiple target discovery techniques," The IFIP International Conference on Network and Parallel Computing (NPC 2008), pp. 150-161, Springer, 2008.
X. Fan and Y. Xiang, "Shortening the Slow Start Phase in the Propagation of Active Worms," The 2008 International Symposium on Computer Science and its Applications (CSA 2008), pp. 90-95, IEEE, 2008.
X. Fan and Y. Xiang, "Defending against the Propagation of Active Worms," The 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP 2008), IEEE, 2008.
H. Lee and B. Verma, "A novel multiple experts and fusion based segmentation algorithm for cursive handwriting recognition," Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference, pp. 2994-2999, 2008.
H. Lee and B. Verma, "Over-segmentation and validation strategy for off-line cursive handwriting recognition," The 4th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, 15-18 December 2008.
J. Zajaczkowski and B. Verma, "Hierachical fuzzy control for the inverted pendulum over the set of initial conditions," Proceedings of the SEAL 2008, Melbourne, Australia, 7-10 December 2008.
Harbinson, D., Balsys, R., Suffern, K.G. "Real-time Antialiasing of Edges and Contours of Point Rendered Implicit Surfaces", Proceedings of the International Conference on Computer Graphics, Imaging and Vision cgiv08, pp. 38-46, USM, Penang, Malaysia., 26-28th August, 2008.
Rönnquist, R and Jarvis, D. "Interoperability with Goal-Oriented Teams", Proceedings of the Agent-based Technologies and Applications for Enterprise Interoperability ATOP 2008 Workshop. Held at the 7th International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS 2008) Estoril, Portugal, May 2008.
S. A. Wasimi, "Impact on water resources of the MENA region due to climate change," The first international conference on water resources and climate change in the MENA region, Muscat, Oman, 2-4 November 2008.

Books (2)

B. Verma and M. Blumenstein, Pattern Recognition Technologies and Applications: Recent Advances. New York, USA: Information Science Reference, 2008.
Jarvis, J., Jarvis, D., Rönnquist, R. and Jain, L., Holonic Execution: A BDI Approach, Springer, 2008.

Book Chapters (12)

D. Yue, Q.-L. Han, and J. Lam, Robust control and filtering of networked control systems, Chapter 5 (pp. 121-150) in Networked Control Systems: Theory and Applications (Eds: F-Y. Wang and D. Liu), Springer, 2008, XVIII, 344 (ISBN: 978-1-84800-214-2) http://www.springer.com/978-1-84800-214-2
V. Korotkikh, "Towards an irreducible theory of complex systems," Cooperative Networks: Control and Optimization, Edward Elgar Publishing, pp. 161-184, 2008, http://www.e-elgar-economics.com/Bookentry_contents.lasso?id=12824
G. Korotkikh and V.Korotkikh, "Complexity of a system as a key to its optimization," Cooperative Networks: Control and Optimization, Edward Elgar Publishing, pp. 185-200, 2008, http://www.e-elgar-economics.com/Bookentry_contents.lasso?id=12824
V. Korotkikh, "Kolmogorov Complexity," Encyclopedia of Optimization, second edition, Springer US, pp. 1790-1794, Published online September 13, 2008, http://www.springerlink.com/content/lu84215589105353/
V. Korotkikh, "Hilbert's Thirteenth Problem," Encyclopedia of Optimization, second edition, Springer US, pp. 1534-1538, Published online September 13, 2008, http://www.springerlink.com/content/v78up2714003tj6m/
V. Korotkikh, "Pontryagin Maximum Principle," Encyclopedia of Optimization, second edition, C. Floudas and P. Pardalos, (eds.), Springer US, pp. 2987-2990, Published online September 13, 2008, http://www.springerlink.com/content/qv6w745l4462g357/
Kinghorn BP, Banks R, Gondro C, Kremer VD, Meszaros S, Newman S, Shepherd RK, Vagg RD and van der Werf JHJ. "Strategies to exploit genetic variation while maintaining diversity" In: Adaptation and fitness in animal populations. Van der Werf JHJ, Frankham R, Graser HU and Gondro C (Eds). Berlin, Springer. 260pp. 2008.
B. Verma and M. Blumenstein, "Fusion of segmentation strategies for off-line cursive handwriting recognition," Pattern Recognition Technologies and Applications: Recent Advances, Information Science Reference, New York, USA, 2008.
Z. Hassan, Z. and B. Verma, "Hybrid data mining approach for medical applications," Handbook of Research on Modern Systems Analysis and Design Technologies and Applications, Information Science Reference, New York, USA, 2008.
Islam AHM R, R. Begum, and S. Ali, "Trends and prospects of telemedicine," Handbook of Research on Modern Systems Analysis and Design Technologies and Applications, pp.584-607. IGI Global, USA, 2008.
Xiang Fan, and Yang Xiang, "Accelerating Propagation of Active Worms by Employing Multiple Target Discovery Techniques", Network and Parallel Computing, Lecture Notes in Computer Science (Springer), vol. 5245, pp. 150-161, 2008.
Wanlei Zhou and Yang Xiang, "Using Multi-core to Support Security-related Applications", Algorithms and Architectures for Parallel Processing, Lecture Notes in Computer Science (Springer), vol. 5022, pp. 316-317, 2008.