This collection houses research from the Faculty of Computing and Mathematical Sciences at the University of Waikato.

  • Reduced MHD in Astrophysical Applications: Two-dimensional or Three-dimensional?

    Oughton, Sean; Matthaeus, William H.; Dmitruk, Pablo (American Astronomical Society, 2017-04-10)
    Originally proposed as an efficient approach to computation of nonlinear dynamics in tokamak fusion research devices, reduced magnetohydrodynamics (RMHD) has subsequently found application in studies of coronal heating, ...
  • Bi-level document image compression using layout information

    Inglis, Stuart J.; Witten, Ian H. (IEEE, 1996)
    Most bi-level images stored on computers today comprise scanned text, and are stored using generic bi-level image technology based either on classical run-length coding, such as the CCITT Group 4 method, or on modern schemes ...
  • Foreword: Special issue for the Journal Track of the 8th Asian Conference on Machine Learning (ACML 2016)

    Durrant, Robert J.; Kim, Kee-Eung; Holmes, Geoffrey; Marsland, Stephen; Sugiyama, Masashi; Zhou, Zhi-Hua (Springer, 2017)
    We, the guest editors, welcome you to this special issue of Machine Learning comprising papers accepted to the journal track of the 8th Asian conference on machine learning (ACML 2016), held at the University of Waikato, ...
  • Combining models for interactive system modelling

    Bowen, Judy; Reeves, Steve (Springer International Publishing, 2017)
    Our approach for modelling interactive systems has been to develop models for the interface and interaction which are lightweight but with an underlying formal semantics. Combined with traditional formal methods to describe ...
  • On the Distances between Latin Squares and the Smallest Defining Set Size

    Cavenagh, Nicholas; Ramadurai, Reshma (Wiley, 2017-04-01)
    In this note, we show that for each Latin square L of order n≥2 , there exists a Latin square L’≠L of order n such that L and L’ differ in at most 8√n cells. Equivalently, each Latin square of order n contains a Latin ...
  • Static techniques for reducing memory usage in the C implementation of Whiley programs

    Weng, Min-Hsien; Pfahringer, Bernhard; Utting, Mark (ACM, 2017)
    Languages that use call-by-value semantics, such as Whiley, can make program verification easier. But effcient implementation becomes harder, due to the overhead of copying and garbage collection. This paper describes how ...
  • Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks

    Liu, Lan; Ko, Ryan K.L.; Ren, Guangming; Xu, Xiaoping (Hindawi, 2017)
    As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled ...
  • Sunspot and Starspot lifetimes in a turbulent erosion model

    Litvinenko, Yuri E.; Wheatland, M.S. (2017)
    Quantitative models of sunspot and starspot decay predict the timescale of magnetic diffusion and may yield important constraints in stellar dynamo models. Motivated by recent measurements of starspot lifetimes, we investigate ...
  • Analytical description of nonlinear acoustic waves in the solar chromosphere

    Litvinenko, Yuri E.; Chae, Jongchul (2017)
    Vertical propagation of acoustic waves of finite amplitude in an isothermal, gravitationally stratified atmosphere is considered. Methods. Methods of nonlinear acoustics are used to derive a dispersive solution, which is ...
  • Introduction: Special Issue of Selected Papers from ACML 2015

    Holmes, Geoffrey; Liu, Tie-Yan; Li, Hang; King, Irwin; Sugiyama, Masashi; Zhou, Zhi-Hua (2017)
    We are delighted to present this special issue of Machine Learning Journal with selected papers from the Seventh Asian Conference on Machine Learning (ACML 2015) held in Hong Kong, from 20 to 22 November 2015. ACML aims ...
  • Using loops observed in Traceroute to infer the ability to Spoof

    Lone, Qasim; Luckie, Matthew John; Korczyński, Maciej; van Eeten, Michel (Springer, 2017)
    Despite source IP address spoofing being a known vulnerability for at least 25 years, and despite many efforts to shed light on the problem, spoofing remains a popular attack method for redirection, amplification, and ...
  • Bôcher and Abstract Contractions of 2nd Order Quadratic Algebras

    Escobar Ruiz, Mauricio A.; Kalnins, Ernest G.; Miller, W., Jr.; Subag, Eyal (Institute of Mathematics of NAS of Ukraine, 2017)
    Quadratic algebras are generalizations of Lie algebras which include the symmetry algebras of 2nd order superintegrable systems in 2 dimensions as special cases. The superintegrable systems are exactly solvable physical ...
  • Computing Mod with a Variable Lookup Table

    Will, Mark A.; Ko, Ryan K.L. (Springer Nature Singapore Pte Ltd, 2016)
    Encryption algorithms are designed to be difficult to break without knowledge of the secrets or keys. To achieve this, the algorithms require the keys to be large, with some having a recommend size of 2048-bits or more. ...
  • Bound analysis for Whiley programs

    Weng, Min-Hsien; Utting, Mark; Pfahringer, Bernhard (Elsevier, 2015)
    The Whiley compiler can generate naive C code, but the code is inefficient because it uses infinite integers and dynamic array sizes. Our project goal is to build up a compiler that can translate Whiley programs into ...
  • On dynamic feature weighting for feature drifting data streams

    Barddal, Jean Paul; Gomes, Heitor Murilo; Enembreck, Fabricio; Pfahringer, Bernhard; Bifet, Albert (Springer, 2016)
    The ubiquity of data streams has been encouraging the development of new incremental and adaptive learning algorithms. Data stream learners must be fast, memory-bounded, but mainly, tailored to adapt to possible changes ...
  • Aesthetic local search of wind farm layouts

    Mayo, Michael; Daoud, Maisa (MDPI, 2017)
    The visual impact of wind farm layouts has seen little consideration in the literature on the wind farm layout optimisation problem to date. Most existing algorithms focus on optimising layouts for power or the cost of ...
  • Privacy preserving computation by fragmenting individual bits and distributing gates

    Will, Mark A.; Ko, Ryan K.L.; Witten, Ian H. (IEEE Computer Society, 2016)
    Solutions that allow the computation of arbitrary operations over data securely in the cloud are currently impractical. The holy grail of cryptography, fully homomorphic encryption, still requires minutes to compute a ...
  • How usable is a smartphone with a Māori-language interface?

    Mato, Paora James; Keegan, Te Taka Adrian Gregory; Naera, Leilani (2016)
    Major languages dominate contemporary technologies. For Mäori, there is opportunity to engage with some technologies using their language and to participate within Mäori- language communities in various digital media. A ...
  • The data privacy matrix project: towards a global alignment of data privacy laws

    Scoon, Craig; Ko, Ryan K.L. (IEEE Computer Society, 2016)
    Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited ...
  • He Matapihi Mā Mua, Mō Muri: The Ethics, Processes, and Procedures Associated with the Digitization of Indigenous Knowledge—The Pei Jones Collection

    Whaanga, Hēmi; Bainbridge, David; Anderson, Michela; Scrivener, Korii; Cader, Papitha; Roa, Tom; Keegan, Te Taka Adrian Gregory (2015)
    The digital era has transformed how people live their lives and interact with the world and knowledge systems around them. In Aotearoa/New Zealand a range of initiatives incorporating Indigenous knowledge have been implemented ...

View more