The Wireless Group focuses on wireless communications, localisation, imaging and sensing for applications from radio astronomy to telecommunications, and industrial safety to medicine.
Networked systems are in the heart of our digital society. We aim to enable people, data, processes, services and “things” to be connected to extract, transfer and exchange information.
Rising challenges in health care Rise in health care costs: From 68.7 billion in 2002-03 to 147.4 billion in 2012-13 (1.6 times higher) Rising popularity of wearable devices Wearable for health care One key solution to more affordable and proactive health care systems is through automatic and continuous human activity recognition (HAR). Recent advancements in […]
The Problems Where to place controls in order to minimize latency between routers and controllers while maximising their use? How to update set of rules without creating inconsistency in the forwarding plan? When is it same to remove un-used rules? How to hold the forwarding plan accountable and verify installed rules? Our approach: Introducing concept […]
Goal of the project Summary of the research project The Commonwealth Scientific and Industrial Research Organisation (CSIRO) – Australia’s national science agency – is conducting a research project about measuring network performances of the Internet. Whilst you are seeing this advertisement in your browser, it will take performance measurements of the delay between your browser and […]
Due to the proliferation of cloud computing many services that were traditionally accessible through secure centralized locations are being outsourced to the cloud. An outsourced service is in general tied to a set of rules or guidelines, which govern how the service is to process requests and output results. Often such rules as well as […]
Organisations and companies are increasingly collecting and using their customers’ personal data for their business purposes. However, the need to keep the customer data private and conform to privacy regulations raises a host of limitations. However data privacy can be seen not as a hindrance, but as a catalyst for new business opportunities. Privacy as […]
Passwords are susceptible to observation, i.e., someone watching a user, either directly or through a hidden camera, typing his/her password can successfully impersonate the user. An alternative to passwords that is secure against observation yet maintains usability is an important goal. The aim of this project is to develop such alternate authentication schemes. At present […]
Information about all aspects of our daily lives is increasingly being collected, including shopping preferences, transport and travel, communications and, of course our online activities like browsing history, social network profiles, etc. This data collection and use (e.g. for personalised offers), even if consented to as part of the provided services, brings a high level of risk: […]