Mark Wallis

Mark Wallis
The University of Newcastle, Australia · School of Electrical Engineering and Computer Science

PhD CompSci

About

37
Publications
2,324
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
115
Citations
Citations since 2017
18 Research Items
72 Citations
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
20172018201920202021202220230510152025
Introduction
Conjoint Lecturer at the University of Newcastle with a PhD in Computer Science and an interest in Distributed Computing and Security.
Additional affiliations
July 2011 - December 2017
The University of Newcastle, Australia
Position
  • Lecturer
Description
  • Associate Lecturer involved in Enterprise Architecture, Computer Networks and Distributed Software, Operating Systems, Web Engineering and Software Project courses.
January 2007 - December 2018
The University of Newcastle, Australia
Position
  • Distributed Computing Research Group
Description
  • The DCRG investigates a wide range of computer science based areas including systems engineering, web services, cloud computing and health-applications for distributed systems.
Education
January 2008 - December 2015
January 2000 - December 2007

Publications

Publications (37)
Thesis
The modern day Internet has evolved over the past 50 years from a single-purpose research network to a massively connected network of peers hosting a major percentage of world-wide communications. This evolutionary process has created a network that is performing tasks which were never envisaged in its original design. While emerging overlays such...
Article
Full-text available
Current Internet trends have caused us to outgrow existing online data storage paradigms. This paper presents an extended model for distributed online data storage. The model addresses issues of data duplication, data freshness and data ownership, while facilitating two modes of data access -direct and indirect. Direct data access is implemented us...
Conference Paper
From an consumer perspective the Cloud is opaque. Online storage and the rise of web applications are changing the way users work. There continues though to be no distinction from a user experience point of view between accessing a Cloud-based application and accessing a web application deployed on a classic server. We propose a new paradigm for on...
Article
Autism is a neurodevelopmental condition with associated difficulties that present differently across individuals. One such difficulty is recognizing basic and complex facial expressions. Research has previously found that there are many evidence-based support programs available for building non-verbal communication skills. These programs are frequ...
Article
Full-text available
The Fourth Industrial Revolution (Industry 4.0), with the help of cyber-physical systems (CPS), the Internet of Things (IoT), and Artificial Intelligence (AI), is transforming the way industrial setups are designed. Recent literature has provided insight about large firms gaining benefits from Industry 4.0, but many of these benefits do not transla...
Article
Background Stroke events often result in long-term negative health outcomes. People who experience a first stroke event are 30%–40% more likely to experience a second stroke event within 5 years. An online secondary prevention programme for stroke survivors may help stroke survivors improve their health risk behaviours and lower their risk of a sec...
Conference Paper
The detection of software clones is gaining more attention due to the advantages it can bring to software mainte- nance. Clone detection helps in code optimization (code present in multiple locations can be updated and optimized once), bug detection (discovering bugs that are copied to various locations in the code), and analysis of re-used code in...
Chapter
Full-text available
For the concept of Industry 4.0 to come true, a mature amalgamation of allied technologies is obligatory, i.e. Internet of Things (IoT), Big Data analytics, Mobile Computing, Multi-Agent Systems (MAS) and Cloud Computing. With the emergence of the fourth industrial revolution, proliferation in the field of Cyber-Physical Systems (CPS) and Smart Fac...
Conference Paper
Industry 4.0 is revolutionising recent industrial setups. Literature has examined the idea of Smart Factory under the umbrella of Industry 4.0 extensively, but further research into the applicability of such frameworks for Small to Medium Size Enterprises (SMEs) is still required. To help address this issue, the Agent-Oriented Smart Factory (AOSF)...
Conference Paper
Clone detection is gaining more attention due to its advantages of software maintenance. Clone detection helps in code optimization (code present in multiple locations can be updated and optimized once), bug detection (discovering bugs that are copied to multiple locations in the code), and analysis of re-used code in software systems. Importantly,...
Conference Paper
Context: Nowadays most businesses in Australia maintain a website to advertise their products and services and some to also conduct online sales and payments. Many have an additional Facebook page or utilise other on-line tools and phone apps. Data is now considered to be one of the most valuable assets of companies, and many are using Cloud servic...
Article
In previous publications we have introduced the concept of using a component-based software engineering paradigm to build Internet-enabled applications. We have proposed that this design allows for greater flexibility in deployment, better utilisation of resources and a reduction in total application development effort. We have described a system a...
Article
Background Tobacco smoking can have negative health outcomes on recovery from surgery. Although it is recommended best practice to provide patients with advice to quit and follow-up support, provision of postdischarge support is rare. Developing an online smoking cessation program may help address this gap. Objectives This paper describes the devel...
Conference Paper
The modern web browser performs a multitude of tasks, which were never contemplated in its original design. This work investigates the roles and responsibilities of the various components that comprise the web browser, and a traditional web application. We review the web browser's role in the greater architecture and propose that a "Super Browser"...
Conference Paper
The rising popularity of Web 2.0 applications has seen an increase in the volume of user-generated content. Web Applications allow users to define policies that specify how they wish their content to be accessed. In large Web 2.0 applications these policies can become quite complex, with users having to make decisions such as ‘who can access my ima...
Conference Paper
Full-text available
The modern day Internet has evolved over the past 35 years from a single-purpose research network to a massively connected network of peers hosting a major percentage of world-wide communications. This evolutionary process has created a network that is performing tasks which were never in its original design. While emerging overlays such as peer-to...
Conference Paper
Full-text available
Vast quantities of information is now being stored online. Web applications currently rely on monolithic storage structures which place the sole responsibility of data storage, protection and maintenance on the web application provider. This research introduces the concept of a de-centralised ap-proach for information storage online. Distributed st...
Conference Paper
Cloud Computing allows us to abstract distributed, elastic IT resources behind an interface that promotes scalability and dynamic resource allocation. The boundary of this cloud sits outside the application and the hardware that hosts it. For the end user, a web application deployed on a cloud is presented no differently to a web application deploy...
Conference Paper
Modern operating systems offer a large array of features in their network subsystems that support fine-grained access control, monitoring and accounting. Such features allow a system administrator to account and filter outgoing network connections based on attributes such as the destination IP address and port number of the connection. With the inc...
Conference Paper
Full-text available
Continued growth in peer-to-peer (P2P) networking is introducing new challenges for network designers and administrators. P2P communication is no longer the sole domain of the home-based, technically savvy user. Instead, corporations are now starting to investigate the use of P2P communication as a valid technology for distributing data to a large...
Conference Paper
In the Web Services environment, traditional ACID transactions are not always sufficient to support the activities that businesses would like to process. While Web Services transactions standards do exist, it is still difficult for an end-user to combine services from loosely-coupled providers into a single action to be performed. We describe the u...
Article
In this paper we discuss how operating system design and implementation influence the methodology for computer forensics investigations, with the focus on forensic acquisition of memory. In theory the operating system could support such investigations both in terms of tools for analysis of data and by making the system data readily accessible for a...
Conference Paper
Full-text available
One of the largest threats to network security in Internet-connected corporate networks is attack via worms. Worms infiltrate the network and compromise security, consuming processor cycles and network bandwidth that would otherwise be available for corporate use. This research analyses a particular strain of network worm called the "Ethical worm",...

Network

Cited By