Publications in 2009

Edited Book

  1. WRI World Congress on Software Engineering, Dat Tran and Shang-Ming Zhou (Eds), May 2009. ISBN: 978-0-7695-3570-8. Published by IEEE Computer Society's Conference Publishing Services (CPS). 

Journal

  1. Tich Phuoc Tran, Longbing Cao, Dat Tran and Cuong Duc Nguyen (2009), Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting, International Journal of Computer Science and Information Security, Oct. 2009, vol. 6, no. 1, pp. 83-91. [PDF

Book Chapters

  1. Tran, D.T. and Pham, T.D. (2009), Recent advances in cell classification for cancer research and drug discovery. Chapter 9 in Computational Biology: Issues and Applications in Oncology, Pham (Ed). ISBN: 978-1-4419-0810-0, Springer Verlag, pp. 205-226.
  2. Tran, D., Ma, W., Sharma, D., Bui, L., and Le, T. (2009), A Generic Framework for Soft Subspace Pattern Recognition. Chapter 14 in Theory and Novel Applications of Machine Learning, Er and Zhou (Eds), IN-TECH, ISBN 978-953-7619-55-4, pp. 197-208.
  3. Tran, T.P., He, Z., Tran, D., Dam, D.T. (2009), Spam Recognition using Linear Regression and Radial Basis Function Neural Network. Chapter in Pattern Recognition, IN-TECH, ISBN 978-953-7619-X-X, pp. 513-531.

Conference Proceedings

  1. Tuan Hoang, Dat Tran, Dharmendra Sharma, Trung Le, and Bac H. Le (2009) Priority Watermarking-Based Face-Fingerprint Authentication System . Proceedings of the 2009 International Conference on Information and Multimedia Technology, Jeju, Korea, pp. 235-238
  2. Tran, D., Ma, W., Sharma, D. (2009) Fuzzy Subspace Hidden Markov Models for Pattern Recognition, IEEE-RIVF International Conference on Computing and Communication Technologies, Danang, Vietnam, pp. 1-6.
  3. Ma, W., Tran, D., Sharma, D. (2009) A novel spam email detection system based on negative selection. Proceedings of International Conference on Computer Sciences and Convergence Information Technology, Korea, pp. 987-992.
  4. Sulaiman, R., D., Sharma, Ma, W., Tran, D. (2009) A Multi-agent Security Architecture (MAITS), International Conference on Network and System Security NSS 2009, Australia
  5. Uraiwan Inyeam, Phayung Meesad, Choochart Haruechaiyasak and Dat Tran (2009) Ontology-Based Terrorism Event Extraction. The 1st International Conference on Information Science and Engineering (ICISE2009), Nanjing, China, pp. 912-915
  6. D. Burnham, E. Ambikairajah, J. Arciuli, M. Bennamoun, C.T. Best, S. Bird, A.R. Butcher, S. Cassidy, G. Chetty, F.M. Cox, A. Cutler, R. Dale, J.R. Epps, J.M. Fletcher, R. Goecke, D.B. Grayden, J.T. Hajek, J.C. Ingram, S. Ishihara, N. Kemp, Y. Kinoshita, T. Kuratate, T.W. Lewis, D.E. Loakes, M. Onslow, D.M. Powers, P. Rose, R. Togneri, D. Tran, M. Wagner. A Blueprint for a Comprehensive Australian English Auditory-Visual Speech Corpus. Selected Proceedings of the 2008 HSCNet Workshop on Designing the Australian National Corpus, Cascadilla Proceedings Project, Sommerville, MA, July 2009, pp. 96-107.