Browse by Socio-Economic Objective (ANZSRC 2008)

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Number of items at this level: 348.

Shrestha, Anup and Cater-Steel, Aileen and Tan, Wui-Gee and Toleman, Mark (2014) Software-mediated process assessment for IT service capability management. In: 22nd European Conference on Information Systems (ECIS 2014): Digital Work, Digital Life , 9-11 Jun 2014, Tel Aviv, Israel.

Gao, Pan and Peng, Qiang and Xiang, Wei (2014) Error-resilient multi-view video coding using Wyner-Ziv techniques [ARTICLEFIRST]. Multimedia Tools and Applications. ISSN 1380-7501 (In Press)

Shrestha, Anup and Cater-Steel, Aileen and Toleman, Mark and Tan, Wui-Gee (2014) Building a software tool for transparent and efficient process assessments in IT service management. In: 9th International Conference on Design Science Research in Information Systems and Technologies (DESRIST 2014): Advancing the Impact of Design Science: Moving from Theory to Practice , 22-23 May 2014, Miami, FL. United States.

Mason, Andrew (2014) Social media as surveillance, by Daniel Trottier [Review]. Sociological Research Online, 19 (1). ISSN 1061-0154

Hou, Yonghong and Wang, Pichao and Xiang, Wei and Gao, Zhimin and Hou, Chunping (2014) A novel rate control algorithm for video coding based on fuzzy-PID controller [ARTICLEFIRST]. Signal, Image and Video Processing . pp. 1-10. ISSN 1863-1703 (In Press)

Zhao, Chuanxin and Luo, Yonglong and Chen, Fulong and Zhang, Ji and Wang, Ruchuan (2014) Energy effective congestion control for multicast with network coding in wireless ad hoc network. Mathematical Problems in Engineering. pp. 1-12. ISSN 1024-123X

Al-Taie, Moyassar and Lane, Michael and Cater-Steel, Aileen (2014) The relationship between organisational strategic IT vision and CIO roles: one size does not fit all. Australasian Journal of Information Systems, 18 (2). pp. 59-89. ISSN 1449-8618

Wang, Guangyuan and Wang, Hua and Tao, Xiaohui and Zhang, Ji and Zhang, Jinhua (2013) Minimising k-dominating set in arbitrary network graphs. In: 9th International Conference on Advanced Data Mining and Applications (ADMA 2013), 14-16 Dec 2013, Hangzhou, China.

Swann, Jennie and Albion, Peter (2013) Caring dialogue: a step toward realising the dream of online learning communities. In: 30th Australasian Society for Computers in Learning in Tertiary Education Conference (ASCILITE 2013): Electric Dreams, 1-4 Dec 2013, Sydney, Australia.

Reushle, Shirley and Antonio, Amy (2013) Looking back to look forward: creating and sustaining peer connections through digital communities. In: 30th Australasian Society for Computers in Learning in Tertiary Education Conference (ASCILITE 2013): Electric Dreams, 1-4 Dec 2013, Sydney, Australia.

Song, Helena S. Y. and Murphy, Angela and Farley, Helen (2013) Mobile devices for learning in Malaysia: then and now. In: 30th Australasian Society for Computers in Learning in Tertiary Education Conference (ASCILITE 2013): Electric Dreams, 1-4 Dec 2013, Sydney, Australia.

Murphy, Angela and Farley, Helen and Koronios, Andy (2013) Understanding the use of smart mobile technologies for learning in higher education. In: 30th Australasian Society for Computers in Learning in Tertiary Education Conference (ASCILITE 2013): Electric Dreams, 1-4 Dec 2013, Sydney, Australia.

Hafeez-Baig, Abdul and Gururajan, Raj (2013) An empirical study to determine factors that motivate and limit the implementation of ICT in healthcare environments. In: 24th Australasian Conference on Information Systems (ACIS 2013): Information Systems: Transforming the Future, 4-6 Dec 2013, Melbourne, Australia.

Al-Taie, Moyassar and Lane, Michael S. and Cater-Steel, Aileen (2013) The CIO role expectations instrument: validation and model testing. In: 24th Australasian Conference on Information Systems (ACIS 2013): Information Systems: Transforming the Future, 4-6 Dec 2013, Melbourne, Australia.

Maiti, Ananda and Kist, Alexander A. and Maxwell, Andrew D. (2013) Estimation of round trip time in distributed real time system architectures. In: 2013 Australasian Telecommunication Networks and Applications Conference (ATNAC 2013), 20-22 Nov 2013, Christchurch, New Zealand.

Alsabawy, Ahmed Younis and Cater-Steel, Aileen and Soar, Jeffrey (2013) IT infrastructure services as a requirement for e-learning system success. Computers and Education, 69. pp. 431-451. ISSN 0360-1315

Alsgaer, Salmah F. A. and Tao, Xiaohui and Zhang, Ji and Wang, Hua and Guo, Zhi (2013) Telemedicine and telemonitoring in healthcare. In: International Conference on Brain and Health Informatics (BHI 2013) , 29-31 Oct 2013, Maebashi, Japan.

Gao, Pan and Xiang, Wei and Billingsley, John and Zhang, Yongbing (2013) Error-resilient multi-view video coding for next generation 3-D video broadcasting. In: 4th International Conference on Information and Communication Technology Convergence (ICTC 2013): Future Creative Convergence Technologies for New ICT Ecosystems, 14-16 Oct 2013, Jeju Island, South Korea.

Huang, Faliang and Zhang, Shichao and Zhu, Xiaofeng (2013) Discovering network community based on multi-objective optimization. Journal of Software, 24 (9). pp. 2062-2077. ISSN 1000-9825

Zhou, Guangping and Shrestha, Anup (2013) Efficient intrusion detection scheme based on SVM. Journal of Networks, 8 (9). pp. 2128-2134. ISSN 1796-2056

Khan, Shahjahan (2013) Growth of statistics enhanced by computer and internet. In: 1st International Conference on Information, Operations Management and Statistics (ICIOMS 2013), 1-3 Sep 2013, Kuala Lumpur, Malaysia.

Kist, Alexander A. and Maiti, Ananda and Maxwell, Andrew D. and Orwin, Lindy (2013) Performance evaluation of network architectures for collaborative real-time learning systems. In: 2nd IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE 2013), 26-29 Aug 2013, Kuta, Indonesia.

Yong, Jianming and Shen, Weiming and James, Anne (2013) Collaborative computing technologies and systems. Journal of Systems and Software, 86 (7). pp. 1725-1726. ISSN 0164-1212

Salim, Omar Hazim and Nasir, Ali A. and Mehrpouyan, Hani and Xiang, Wei (2013) Phase noise and carrier frequency offset in OFDM systems: joint estimation and hybrid Cramer-Rao lower bound. In: 14th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2013), 16-19 Jun 2013, Darmstadt, Germany.

Alam, Khorshed and Shahiduzzaman, Md (2013) Community preferences for digital futures: regional perspectives. Project Report. University of Southern Queensland, Toowoomba, Australia.

Farley, Helen and Martin, Neil (2013) Looking at the future: mobile accessibility and other new technologies. In: Intranet Change, 28 May 2013, Brisbane, Australia.

Li, Jiuyong and Liu, Jixue and Toivonen, Hannu and Yong, Jianming (2013) Effective pruning for the discovery of conditional functional dependencies. The Computer Journal, 56 (3). pp. 378-392. ISSN 0010-4620

Zhang, Ji (2013) Advancements of outlier detection: a survey. ICST Transactions on Scalable Information Systems, 13 (1). pp. 1-26.

Tao, Xiaohui and Li, Yuefeng and Zhang, Ji (2013) Mapping semantic knowledge for unsupervised text categorisation. In: 24th Australasian Database Conference, Feb, 2013, Adelaide, Australia.

Ariff, Mohd Farid Mohd and Chong, Albert K. and Majid, Zulkepli and Setan, Halim (2013) Geometric and radiometric characteristics of a prototype surveillance system. Measurement, 46 (1). pp. 610-620. ISSN 0263-2241

Abbas, Mohd Azwan and Setan, Halim and Majid, Zulkepli and Chong, Albert K. and Luh, Lau Chong and Ariff, Mohd Farid Mohd and Idris, Khairulnizam M. (2013) Improvement in accuracy for three-dimensional sensor (Faro Photon 120 scanner). International Journal of Computer Science Issues, 10 (1-3). pp. 176-182. ISSN 1694-0784

Dekeyser, Stijn and Watson, Richard (2013) Metadata manipulation interface design. In: 14th Australasian User Interface Conference (AUIC 2013): User Interfaces 2013, 29 Jan-1 Feb 2013, Adelaide, Australia.

Tao, Xiaohui and Zhou, Xujuan and Lau, Cher Han and Li, Yuefeng (2013) Personalised information gathering and recommender systems: techniques and trends. ICST Transactions on Scalable Information Systems, 13 (1-3). e4.

Hafeez-Baig, Abdul and Gururajan, Raj (2013) Phenomena of adoption of wireless handheld devices: a case of healthcare setting. In: Cases on the diffusion and adoption of sustainable development practices. IGI Publishing (IGI Global), Hershey, PA. United States, pp. 20-43. ISBN 978-1-4666-2842-7

Machin, Tony (2013) Metadata in organisational surveys. In: Advances in organisational research methods and analysis, Australian ed. Chamber & Row, New York, United States, pp. 74-85. ISBN 978-0-9896787-0-4

Zhu, Guohun and Li, Yan and Wen, Peng Paul (2012) An efficient visibility graph similarity algorithm and its application for sleep stages classification. In: 2012 International Conference on Brain Informatics (BI 2012), 4-7 Dec 2012, Macao.

Tao, Xiaohui and Li, Yuefeng and Liu, Bin and Shen, Yan (2012) Semantic labelling for document feature patterns using ontological subjects. In: IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012), 4-7 Dec 2012, Macau, China.

Poepjes, Robert and Lane, Michael (2012) An information security awareness capability model (ISACM). In: 10th Australian Information Security Management Conference (SECAU 2012), 3-5 Dec 2012, Perth, Western Australia.

Lane, Michael (2012) Does the android permission system provide adequate information privacy protection for end-users of mobile apps? In: 10th Australian Information Security Management Conference (SECAU 2012), 3-5 Dec 2012, Perth, Western Australia.

Kerr, Don and Burgess, Kevin J. and Houghton, Luke and Murray, Peter A. (2012) Improving training in enterprise resource planning systems implementation through communities of practice. International Journal of Learning and Change, 6 (3/4). pp. 207-222. ISSN 1740-2875

Shen, Yan and Li, Yuefeng and Xu, Yue and Tao, Xiaohui (2012) Matching relevance features with ontological concepts. In: 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology (WPRS 2012), 4-7 Dec 2012, Macau, China.

Wang, Guangyuan and Wang, Hua and Tao, Xiaohui and Zhang, Ji (2012) A self-stabilizing algorithm for finding a minimal K-dominating set in general networks. In: 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012), 21-23 Nov 2012, Fujian, China.

Zhang, Ji and Cao, Jie and Zhu, Xiaodong (2012) An innovative outlier detection method using localized thresholds. In: 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012), 21-23 Nov 2012, Fujian, China .

Xiang, Yang and Pathan, Mukaddim and Tao, Xiaohui and Wang, Hua, eds. (2012) Data and knowledge engineering: Third International Conference, ICDKE 2012 Wuyishan, Fujian, China, November 21-23, 2012 Proceedings. Lecture Notes in Computer Science, v. 7696, 7696 . Springer-Verlag, Berlin, Germany. ISBN 978-3-642-34678-1

Hafeez-Baig, Abdul and Gururajan, Raj (2012) Does information and communication technology (ICT) facilitate knowledge management activities in the 21st century? Journal of Software, 7 (11). pp. 2437-2442. ISSN 1796-217X

Wang, Hua and Jia, Xiaohua (2012) Guest editorial. Journal of Software, 7 (11). pp. 2387-2388. ISSN 1796-217X

Xiang, Yang and Pathan, Mukaddim and Tao, Xiaohui and Wang, Hua, eds. (2012) Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings. Lecture Notes in Computer Science, v. 7646, 7646 . Springer-Verlag, Heidelberg, Germany. ISBN 978-3-642-34882-2

Kabir, Md Enamul and Wang, Hua (2012) Microdata protection method through microaggregation: a systematic approach. Journal of Software, 7 (11). pp. 2415-2422. ISSN 1796-217X

Lau, Cher Han and Tao, Xiaohui and Tjondronegoro, Dian and Li, Yuefeng (2012) Retrieving information from microblog using pattern mining and relevance feedback. In: 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012), 21-23 Nov 2012, Fujian, China.

Han, Weili and Cao, Ye and Bertino, Elisa and Yong, Jianming (2012) Using automated individual white-list to protect web digital identities. Expert Systems with Applications, 39 (15). pp. 11861-11869. ISSN 0957-4174

Sileh, Ibrahim Khalil and Xiang, Wei (2012) Distributed space-frequency coding for OFDM-based hybrid relay selection. In: 12th International Symposium on Communications and Information Technologies (ISCIT 2012), 2-5 Oct 2012, Gold Coast, Australia.

Sileh, Ibrahim Khalil and Xiang, Wei and Alajel, Khalid Mohamed (2012) Outage probability of unequal block-based OFDM amplify-and-forward relay protocol over wideband channels. In: 12th International Symposium on Communications and Information Technologies (ISCIT 2012), 2-5 Oct 2012, Gold Coast, Australia.

Long, Hang and Kim, Kyeong Jin and Xiang, Wei and Wang, Jing and Liu, Yuanan and Wang, Wenbo (2012) Precoder distribution and adaptive codebook in wideband precoding. ETRI Journal, 34 (5). pp. 655-665. ISSN 1225-6463

Neupane, Arjun and Soar, Jeffrey and Vaidya, Kishor (2012) The potential of e-procurement technology for reducing corruption. International Journal of Information Technology and Management, 11 (4). pp. 273-287. ISSN 1461-4111

Zhang, Wenping and Lau, Raymond and Tao, Xiaohui (2012) Mining contextual knowledge for context-aware recommender systems. In: 6th International Workshop on Service-Oriented Knowledge Management and Business Intelligence (SOKMBI 2012), 9-11 Sep 2012, Hangzhou, China.

Zhang, Zhongwei and Zhou, Hong (2012) Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment. In: 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012), 8-10 Aug 2012, Kyoto, Japan.

Harris, Bruce and McDougall, Kevin and Barry, Michael (2012) Comparison of multi-scale digital elevation models for defining waterways and catchments over large areas. ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 1-2. pp. 75-80.

McDougall, K. and Temple-Watts, P. (2012) The use of LiDAR and volunteered geographic information to map flood extents and inundation. ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 1-4. pp. 251-256.

Palendeng, Mario E. and Zhang, Qing and Pang, Chaoyi and Li, Yan (2012) EEG data compression to monitor DoA in telemedicine. In: HIC 2012: 20th Australian National Health Informatics Conference: Health Informatics: Building a Healthcare Future Through Trusted Information , 30 Jul-2 Aug 2012, Sydney, Australia.

Sun, Lili and Wang, Hua (2012) A purpose-based access control in native XML databases. Concurrency and Computation: Practice and Experience, 24 (10). pp. 1154-1166. ISSN 1532-0626

Hume, Margee and Sullivan Mort, Gillian (2012) I learning: the role of the internet and interactive services in youth social learning, school and wellbeing. International Journal of Organisational Behaviour, 17 (3). pp. 61-81.

Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2012) On the identity anonymization of high-dimensional rating data. Concurrency and Computation: Practice and Experience, 24 (10). pp. 1108-1122. ISSN 1532-0626

Gacenga, Francis and Cater-Steel, Aileen and Toleman, Mark and Tan, Wui-Gee (2012) Alleviating design silence in design science research: a proposal of a design method. In: 11th European Conference on Research Methods in Business and Management, 28-29 June 2012, Bolton.

Wang, Peishun and Soar, Jeffrey (2012) A model for security and privacy in e-health. In: 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud, 23-25 Nov 2012, Nanjing, China.

Ramesh Kumar, Nandini and Xiang, Wei and Wang, Yafeng (2012) Two-symbol FPGA architecture for fast arithmetic encoding in JPEG 2000. Journal of Signal Processing Systems, 69 (2). pp. 213-224. ISSN 1939-8018

Zhang, Ji and Cao, Jie and Zhu, Xiaodong (2012) Detecting global outliers from large distributed databases. In: 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012), 29-31 May 2012, Chongqing; China.

Walters-Williams, Janett and Li, Yan (2012) BMICA-independent component analysis based on B-spline mutual information estimator. Signal and Image Processing, 3 (2). pp. 33-52. ISSN 2229-3922

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2012) Satisfying privacy requirements before data anonymization. The Computer Journal, 55 (4). pp. 422-437. ISSN 0010-4620

Su, Ying and Soar, Jeffrey and Talburt, John and Jadad, Alejandro R. (2012) Consumer-centred ehealth: challenges and opportunities for China. Advanced Science Letters, 7. pp. 257-260. ISSN 1936-6612

Farley, Helen and Ellis, Allan (2012) Encke Virtual University collaboration. In: Follow The Sun 2012: Online Learning Futures Festival (SUN 2012): Futures for Knowledge, 27-30 Mar 2012, Leicester, United Kingdom.

Scott, Albert H. S. (2012) A review of virtuality and collaborative networks. In: 2012 International Conference on Information and Computer Applications (ICICA 2012), 17-18 Feb 2012, Hong Kong.

Lai, David and Venkatakrishnan, Vijayakrishnan and Li, Yan (2012) Distance education platform for effective learning in computer networking courses. In: 2012 International Conference on Applied and Theoretical Information Systems Research (ATISR 2012) , 10-12 Feb 2012, Taipei, Taiwan.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2012) An approximate microaggregation approach for microdata protection. Expert Systems with Applications, 39 (2). pp. 2211-2219. ISSN 0957-4174

Moffatt, Sam (2012) Designing effective mobile web presence. In: 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move, 11-13 May 2011, Brisbane, Australia.

Li, Mao and Li, Yan and Wen, Peng (Paul) (2012) Tumor-induced effects on PO2 distribution in a normal tissue. In: 2012 IEEE-EMBS International Conference on Biomedical and Health Informatics: Global Grand Challenge of Health Informatics (BHI 2012), 2-7 Jan 2012, Hong Kong and Shenzhen, China.

Alsabawy, Ahmed Younis and Cater-Steel, Aileen and Soar, Jeffrey (2012) A model to measure e-learning systems success. In: Measuring organizational information systems success: new technologies and practices. Business Science Reference (IGI Global), Hershey, PA, USA, pp. 293-317. ISBN 978-1-4666-0170-3

Liu, Fei and Xiang, Wei and Zhao, Hui and Zheng, Kan and Long, Hang (2012) A novel scheduling scheme for finite buffer service in time-varying channels. In: 14th IEEE International Conference on Communication Technology (ICCT 2012), 9-11 Nov 2012, Chengdu; China.

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2012) A role-involved purpose-based access control model. Information Systems Frontiers, 14 (3). pp. 809-822. ISSN 1387-3326

Wang, Lijuan and Shen, Jun and Yong, Jianming (2012) A survey on bio-inspired algorithms for web service composition. In: CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design, 23-25 May 2012, Wuhan, China.

Hume, Margee (2012) Adopting organisation learning theory in the classroom: advancing learning through the use of blogging and self-reflection. International Journal of Learning and Change, 6 (1-2). pp. 49-65. ISSN 1740-2875

Hossain Masud, Md. Anwar and Yong, Jianming and Huang, Xiaodi (2012) Cloud computing for higher education: a roadmap. In: CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design, 23-25 May 2012, Wuhan, China.

Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Ding, Xiaofeng and Wang, Hua (2012) Data privacy against composition attack. In: DASFAA 2012: 17th International Conference on Database Systems for Advanced Applications, 15-18 Apr 2012, Busan, South Korea.

Rofiq, Ainur (2012) Impact of cyber fraud and trust of e-commerce system on purchasing intentions: analysing planned behaviour in Indonesian business. [Thesis (PhD/Research)] (Unpublished)

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2012) Multi-level delegations with trust management in access control systems. Journal of Intelligent Information Systems. ISSN 0925-9902 (In Press)

Sun, Lili and Wang, Hua and Yong, Jianming and Wu, Guoxin (2012) Semantic access control for cloud computing based on e-healthcare. In: CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design, 23-25 May 2012, Wuhan, China.

Li, Mao and Li, Yan and Wen, Peng (Paul) (2012) Simulation study of pO2 distribution in induced tumour masses and normal tissues within a microcirculation environment. Computer Methods in Biomechanics and Biomedical Engineering, 17 (4). pp. 334-343. ISSN 1025-5842

Jäntti, Marko and Cater-Steel, Aileen and Shrestha, Anup (2012) Towards an improved IT service desk system and processes: a case study. International Journal on Advances in Systems and Measurements, 5 (3 & 4). pp. 203-215.

Wang, Hua and Zou, Lei and Huang, Guangyan and He, Jing, eds. (2012) Web technologies and applications. Lecture Notes in Computer Science, v. 7234, 7234 . Springer-Verlag, Berlin, Germany. ISBN 978-3-642-29425-9

Hafeez-Baig, Abdul and Gururajan, Raj (2011) An exploratory study to investigate the effectiveness of PDAs in healthcare: a case of Queensland nurses. In: ACIS 2011: 22nd Australasian Conference on Information Systems: Identifying the Information Systems Discipline, 29 Nov-2 Dec 2011, Sydney, Australia.

Ramesh Kumar, Nandini and Xiang, Wei and Soar, Jeffrey (2011) A novel image compressive sensing method based on complex measurements. In: DICTA 2011: International Conference on Digital Image Computing: Techniques and Application, 6-8 Dec 2011 , Noosa, Australia.

Shen, Yan and Li, Yuefeng and Xu, Yue and Iannella, Renato and Algarni, Abdulmohsen and Tao, Xiaohui (2011) An ontology-based mining approach for user search intent discovery. In: ADCS 2011: 16th Australasian Document Computing Symposium, 2 Dec 2011, Canberra, Australia.

Wang, Guanyuan and Wang, Hua and Tao, Xiaohui and Zhang, Ji (2011) Positive influence dominating set in e-learning social networks. In: ICWL 2011: 10th International Conference on Web-Based Learning , 8-10 Dec 2011, Hong Kong.

Lane, Michael Steven and Shrestha, Anup (2011) An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities). In: 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011), 28 Nov - 2 Dec 2011, Bangkok, Thailand.

Sun, Lili and Wang, Hua (2011) Access control and authorization for protecting disseminative information in E-learning workflow. Concurrency and Computation: Practice and Experience, 23 (16). pp. 2034-2042. ISSN 1532-0626

Zhou, Yuan and Hou, Chunping and Xiang, Wei and Wu, Feng (2011) Channel distortion modeling for multi-view video transmission over packet-switched networks. IEEE Transactions on Circuits and Systems for Video Technology, 21 (11). pp. 1679-1692. ISSN 1051-8215

Gacenga, F. and Cater-Steel, A. and Tan, W. and Toleman, M. (2011) IT service management: towards a contigency theory of performance measurement. University of Southern Queensland, Toowoomba, Australia.

Al-Hakim, Latif (2011) Lean thinking for healthcare services: how far does information quality affect the emergency services? In: COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing , 11-13 Nov 2011, Hangzhou, China.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Pei, Jian (2011) Publishing anonymous survey rating data. Data Mining and Knowledge Discovery , 23 (3). pp. 379-406. ISSN 1384-5810

Vaidya, Kishor and Campbell, John and Soar, Jeffrey and Gardner, Scott (2011) Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement. In: Inter-organizational information systems and business management: theories for researchers. IGI Publishing (IGI Global), Hershey, PA. United States, pp. 18-32. ISBN 9781609607685

Dekeyser, Stijn and Hidders, Jan (2011) Guaranteeing correctness for collaboration on documents using an optimal locking protocol. International Journal of Distributed Systems and Technologies, 2 (4). pp. 17-29. ISSN 1947-3532

Jia, Tingbai and Tao, Xiaohui (2011) A cross-media framework for personalized learning systems. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.

Liu, Qing and Zhang, Ji and Forbes, James and Xu, Kai and Nair, Dinesh (2011) A process provenance service system for scientific data analysis and sharing. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.

Sun, Lili and Wang, Hua (2011) A purpose based usage access control model for e-healthcare services. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.

Moffatt, Sam (2011) Building a distributed authenticating CDN. In: 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011), 6-8 Sep 2011, Milan, Italy.

Gao, Rui and Zhou, Hong and Su, Gang (2011) Structure of wireless sensors network based on TinyOS. In: 2011 International Conference on Control, Automation and Systems Engineering (CASE 2011), 30-31 Jul 2011, Singapore.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2011) Injecting purpose and trust into data anonymisation. Computers and Security, 30 (5). pp. 332-345. ISSN 0167-4048

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun and Zhang, Ji (2011) Privacy-aware access control with trust management in web service. World Wide Web, 14 (4). pp. 407-430. ISSN 1386-145X

Ahmed, Waqas and Aslam, Muhammad Ahtisham and Shen, Jun and Yong, Jianming (2011) A light weight approach for ontology generation and change synchronization between ontologies and source relational databases. In: CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design, 8-10 Jun 2011, Lausanne, Switzerland.

Yong, Jianming and Tiwari, Sanjib and Huang, Xiaodi and Jin, Qun (2011) Constructing robust digital identity infrastructure for future networked society. In: CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design, 8-10 Jun 2011, Lausanne, Switzerland.

Al-Hakim, Latif (2011) Critical factors impacting knowledge sharing among R&D organisations. In: 2011 ICSTI Public Conference, 7-8 June 2011, Beijing, China.

Zhang, Ji and Gao, Qigang and Wang, Hai and Wang, Hua (2011) Detecting anomalies from high-dimensional wireless network data streams: a case study. Soft Computing: A Fusion of Foundations, Methodologies and Applications, 15 (6). pp. 1195-1215. ISSN 1432-7643

Wang, Gengkun and Xiang, Wei and Yuan, Jinhong and Huang, Tao (2011) Outage analysis of non-regenerative analog network coding for two-way multi-hop networks. IEEE Communications Letters, 15 (6). pp. 662-664. ISSN 1089-7798

Qin, Yongrui and Wang, Hua and Sun, Lili (2011) Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments. In: 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011), 22-25 Mar 2011, Biopolis, Singapore.

Siuly, and Li, Yan and Wu, Jinglong and Yang, Jingjing (2011) Developing a logistic regression model with cross-correlation for motor imagery signal recognition. In: 2011 IEEE/ICME International Conference on Complex Medical Engineering (CME 2011), 22-25 May 2011, Harbin, China.

Tao, Xiaohui and Li, Yuefeng and Zhong, Ning (2011) A personalized ontology model for web information gathering. IEEE Transactions on Knowledge and Data Engineering, 23 (4). pp. 496-511. ISSN 1041-4347

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) A conditional purpose-based access control model with dynamic roles. Expert Systems with Applications, 38 (3). pp. 1482-1489. ISSN 0957-4174

Xu, Kai and Yu, Qi and Liu, Qing and Zhang, Ji and Bouguettaya, Athman (2011) Web service management system for bioinformatics research: a case study. Service Oriented Computing and Applications, 5 (1). pp. 1-15. ISSN 1863-2386

Kabir, Md Enamul and Wang, Hua (2011) Microdata protection method through microaggregation: a median-based approach. Information Security Journal: A Global Perspective, 20 (1). pp. 1-8. ISSN 1939-3555

Dinh, Michael and Tan, Timothy and Bein, Kendall and Hayman, Jon and Wong, Yuk Kuen and Dinh, David (2011) Emergency department knowledge management in the age of Web 2.0: evaluation of a new concept. Emergency Medicine Australasia, 23 (1). pp. 46-53. ISSN 1742-6731

Lu, Yanping and Liu, Hong and Li, Shaozi and Yong, Jianming (2011) New trends in information technology in education [Guest editorial preface]. International Journal of Distance Education Technologies , 9 (1). i-iv. ISSN 1539-3100

Xiang, Wei and Zhu, Ce and Siew, Chee Kheong and Xu, Yuanyuan and Liu, Minglei (2011) 2-D scalable multiple description coding for robust H.264/SVC video communications. In: Streaming media architectures, techniques, and applications: recent advances. IGI Global, Hershey, PA. United States, pp. 39-57. ISBN 978-1-61692-831-5

Hafeez-Baig, Abdul and Gururajan, Raj (2011) Clinicians perceptions towards wireless handheld devices: an Australian case study. In: COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing, 11-13 Nov 2011, Hangzhou, China.

Zhou, Xiaokang and Chen, Hong and Jin, Qun and Yong, Jianming (2011) Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone. In: ICUIMC 2011: 5th International Conference on Ubiquitous Information Management and Communication , 21-23 Feb 2011, Seoul, Korea.

Tjondronegoro, Dian and Tao, Xiaohui and Sasongko, Johannes and Lau, Cher Han (2011) Multi-modal summarization of key events and top players in sports tournament videos. In: WACV 2011: IEEE Workshop on Applications of Computer Vision , 5-7 Jan 2011, Kona, HI, USA.

Stair, Ralph and Moisiadis, Frank and Genrich, Rohan and Reynolds, George (2011) Principles of information systems, 2nd ed. Cengage Learning Australia, Melbourne, Australia. ISBN 9780170188456

Sun, Lili and Wang, Hua and Tao, Xiaohui and Zhang, Yanchun and Yang, Jing (2011) Privacy preserving access control policy and algorithms for conflicting problems. In: TrustCom 2011: 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 16-18 Nov 2011, Changsha, China.

Basnet, Badri Bahadur and Brodie, Lyn and Worden, John (2010) Enhanced feedback - does peer assessment achieve this goal? In: AaeE 2010: Past, Present, Future - the 'Keys' to Engineering Education Research and Practice, 5-8 Dec 2010, Sydney, Australia.

Nooriafshar, Mehryar (2010) A comparative study of human teacher and computer teacher. In: 2nd Asian Conference on Education: Internationalization or Globalization? (ACE2010), 2-5 Dec 2010, Osaka, Japan.

Duncan, A. R. (2010) Federating access to small-aperture telescopes. In: 6th IEEE International Conference on e–Science Workshops, 7-10 Dec 2010, Brisbane, Australia.

Fu, Jinlin and Hou, Chunping and Xiang, Wei and Yan, Lei and Hou, Yonghong (2010) Generalised spatial modulation with multiple active transmit antennas. In: GC 2010: IEEE Globecom Workshops , 5-10 Dec 2010, Miami, FL, USA.

Zhou, Yuan and Hou, Chunping and Xiang, Wei (2010) Modeling of transmission distortion for multi-view video in packet lossy networks. In: GLOBECOM 2010: IEEE Global Telecommunications Conference, 6-10 Dec 2010, Miami, FL, USA.

Zhang, Ji (2010) An efficient and effective duplication detection method in large database applications. In: NSS 2010: 4th International Conference on Network and System Security, 1-3 Sep 2010, Melbourne, Australia.

Ally, Mustafa and Toleman, Mark and Cater-Steel, Aileen (2010) Traditional and alternative internet payment systems: the merchant perspective. In: 5th International Conference on Qualitative Research in IT & IT in Qualitative Research: The Traditions and Innovations of Qualitative Approaches in ICT Research (QualIT 2010), 29-30 Nov 2010, Brisbane, Australia.

Van Der Vyver, Glen and Lane, Michael S. and Koronios, Andy (2010) Facilitators and inhibitors for the adoption of agile methods. In: Systems analysis and design: people, processes, and projects. Advances in Management Information Systems (18). M. E. Sharpe Inc., New York, USA, pp. 31-50. ISBN 978-0-7656-2353-9

Tao, Xiaohui and Li, Yuefeng and Zhong, Ning (2010) A knowledge-based model using ontologies for personalized web information gathering. Web Intelligence and Agent Systems: an International Journal, 8 (3). pp. 235-254. ISSN 1570-1263

Grist, Shelly and Toleman, Mark (2010) A proposal for a LCA community knowledge management system. In: 7th International Conference on Life Cycle Assessment in the Agri-Food Sector (LCA Food 2010), 22-24 Sep 2010, Bari, Italy.

Sun, Lili and Wang, Hua and Jururajin, Raj and Sriprakash, Sri (2010) A purpose based access control in XML databases system. In: NSS 2010: 4th International Conference on Network and System Security, 1-3 Sep 2010, Melbourne, Australia.

Ran, Jie and Wang, Yafeng and Li, Chang and Yang, Dacheng and Xiang, Wei (2010) Joint power allocation and best-relay positioning for incremental selection amplify-and-forward relaying. In: 2010 IEEE Vehicular Technology Conference (VTC 2010-Fall), 6-9 Sept 2010, Ottawa, Canada.

Wang, Gengkun and Xiang, Wei and Leis, John and Wang, Yafeng (2010) Design of a wireless portable vibration acquisition and analysis instrument. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), 25-27 Jun 2010, Beijing, China.

Li, Yan (2010) Cooperative education in USQ networking programs with leading industry organisation and service to South-East Queensland regional IT professional. In: Women in engineering, science and technology: education and career challenges. Engineering Science Reference (IGI Global), Hershey, PA, United States, pp. 227-231. ISBN 978-1-61520-657-5

Walters-Williams, Janett and Li, Yan (2010) B-spline mutual information independent component analysis. International Journal of Computer Science and Network Security, 10 (7). pp. 129-141. ISSN 1738-7906

Walters-Williams, Janett and Li, Yan (2010) Comparison of extended and unscented Kalman filters applied to EEG signals. In: 2010 IEEE/ICME International Conference on Complex Medical Engineering (CME 2010), 13-15 July 2010, Gold Coast, Australia.

Wang, Yafeng and Yang, Hao and Yang, Dacheng and Xiang, Wei (2010) Iterative decision feedback equalizer with cyclic detection for DFT-S OFDM system. Computers and Electrical Engineering, 36 (4). pp. 789-801. ISSN 0045-7906

Hodgson, Leeanne and Lane, Michael S. (2010) What are the key job functions and critical competencies required for the role of the CIO in achieving superior organizational performance? In: InSITE 2010: Informing Science and Information Technology Education Joint Conference, 19-25 Jun 2010, Cassino, Italy.

Soar, Jeffrey and Eley, Rob (2010) Changing ICT for client/patient management and clinical information in residential and community aged care services in regional Australia: structured interviews with service managers. In: ICOST 2010: 8th International Conference on Smart Homes and Health Telematics: Aging Friendly Technology for Health and Independence , 22-24 Jun 2010, Seoul, South Korea.

D'Costa-Alphonso, Marise-Marie and Lane, Michael (2010) The adoption of single sign-on and multifactor authentication in organisations: a critical evaluation using TOE framework. Issues in Informing Science and Information Technology, 7. pp. 161-190. ISSN 1547-5840

Li, Chang and Wang, Yafeng and Xiang, Wei and Yang, Dacheng (2010) Performance of user cooperation and clustering scheme in cellular networks. In: 2010 IEEE International Conference on Communications: Communications: Accelerating Growth and Development (ICC 2010), 23-27 May 2010, Capetown, South Africa.

Ramesh Kumar, Nandini and Xiang, Wei and Wang, Yafeng (2010) An FPGA-based fast two-symbol processing architecture for JPEG 2000 arithmetic coding. In: ICASSP 2010: 35th International Conference on Acoustics, Speech, and Signal Processing, 14-19 Mar 2010, Dallas, TX. USA.

Sun, L. (2010) Security and privacy on low-cost radio frequency identification systems. International Journal of Security and Networks , 5 (2/3). pp. 128-134. ISSN 1747-8405

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2010) A role-involved conditional purpose-based access control model. In: E-Government and E-Services Conference (EGES) at the 2010 IFIP World Computer Conference (WCC 2010), 20-23 Sep 2010, Brisbane, Australia.

Cater-Steel, Aileen and Toleman, Mark (2010) IT service management standards: education challenges. In: New applications in IT standards: developments and progress. IGI Publishing (IGI Global), Hershey, PA. United States, pp. 225-241. ISBN 978-1-60566-946-5

Sun, Xiaoxun and Wang, Hua (2010) Towards identify anonymization in large survey rating data. In: NSS 2010: 4th International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.

Fang, Qizhi and Fleischer, Rudolf and Li, Jian and Sun, Xiaoxun (2010) Algorithms for core stability, core largeness, exactness, and extendability of flow games. Frontiers of Mathematics in China , 5 (1). pp. 47-63. ISSN 1673-3452

Obiedat, Esam and Xiang, Wei and Leis, John W. and Cao, Lei (2010) Soft incremental redundancy for distributed turbo product codes. In: CCNC 2010: 7th IEEE Consumer Communications and Networking Conference, 9-12 Jan 2010, Las Vegas, NV. United States.

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa and Chi, Yunxiang (2010) Systematic clustering method for l-diversity model. In: ADC 2010: 21st Australasian Conference on Database Technologies, 18-22 Jan 2010, Brisbane, Australia.

Ma, Guangzhi and Lu, Yansheng and Wen, Peng and Song, Engmin (2010) A novel attribute reduction algorithm based on peer-to-peer technique and rough set theory. In: 2010 IEEE/ICME International Conference on Complex Medical Engineering (CME 2010), 13-15 July 2010, Gold Coast, Australia.

Kabir, Md Enamul and Wang, Hua and Zhang, Yanchun (2010) A pairwise-systematic microaggregation for statistical disclosure control. In: ICDM 2010: 10th IEEE International Conference on Data Mining , 14-17 Dec 2010, Sydney, Australia.

Patel, Keyurkumar J. and Anand, S. Vijay and Kumar, Suman (2010) A robust QoS framework on Android for effective media delivery to DLNA enabled home gateway in smart home environment. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS 2010), 25-27 Jun 2010, Beijing, China.

Sefton, Peter and Dickinson, Duncan (2010) An architecture for a distributed digital library from the desktop up: the fascinator. In: JCDL 2010: Digital Libraries - 10 years past, 10 years forward, a 2020 Vision, 21-25 Jun 2010, Gold Coast, Australia.

Wong, Yuk Kuen (2010) Behaviour approach for evaluating team performance in software review: an empirical study. International Journal of Internet and Enterprise Management , 6 (3). pp. 266-276. ISSN 1476-1300

Singh, Bikash C. and Rahman, M. Mahbubur and Godder, Tapan K. and Abu, L. and Bashar, Md. R. (2010) Channel based simulation and analysis of IEEE802.16(WiMAX) -2004/WMAN-OFDM physical layer for BWA to support telemedicine. In: 2010 IEEE/ICME International Conference on Complex Medical Engineering (CME 2010), 13-15 July 2010, Gold Coast, Australia.

Karki, Sudarshan and Thompson, Rod and McDougall, Kevin (2010) Data validation in a 3D cadastre. In: Developments in 3D geo-information sciences. Lecture Notes in Geoinformation and Cartography . Springer-Verlag, Heidelberg, Germany, pp. 92-122. ISBN 978-3-642-04790-9

Valverde, Raul and Toleman, Mark and Cater-Steel, Aileen (2010) Design science: a case study in information systems re-engineering. In: Strategic information systems: concepts, methodologies, tools, and applications. IGI Publishing (IGI Global), Hershey, PA. United States, pp. 490-503. ISBN 978-1-60566-677-8

Lehane, Pat (2010) Designing interactions for the collective user experience. In: OZCHI 2010: Design - Interaction - Participation, 22-26 Nov 2010, Brisbane, Australia.

Yong, Jianming and Bertino, Elisa (2010) Digital identity enrolment and assurance support for VeryIDX. In: CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design , 14-16 Apr 2010, Shanghai, China.

Zhang, Ji and Dekeyser, Stijn and Wang, Hua and Shu, Yanfeng (2010) DISTRO: a system for detecting global outliers from distributed data streams with privacy protection. In: DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications , 1-4 Apr 2010, Tsukuba, Japan.

Lane, Michael S. and Lum, Weng Haan (2010) Examining client perceptions of partnership quality and its dimensions in an IT outsourcing relationship. Australasian Journal of Information Systems, 17 (1). pp. 47-76. ISSN 1449-8618

Addie, R. G. and Colman, Alan (2010) Five criteria for web-services security architecture. In: NSS 2010: 4th International Conference on Network and System Security, 1-3 Sep 2010, Melbourne, Australia.

Soar, Jeffrey and Symonds, Judith (2010) Human interface considerations for ambient assisted living systems. eJournal of Health Informatics, 5 (2). pp. 1-7.

Fryer, Maggie and Cater-Steel, Aileen (2010) Information systems at the University of Southern Queensland (USQ). In: Business driven information systems. McGraw-Hill Australia, Sydney, Australia, pp. 239-241. ISBN 9780070277274

Su, Ying and Al-Hakim, Latif (2010) Intelligent control model for checking data quality in hospital process management. In: 2nd International Conference on Industrial Mechatronics and Automation (ICIMA 2010) , 30-31 May 2010, Wuhan, China.

Zhang, Ji and Shu, Yanfeng and Wang, Hua (2010) On memory and I/O efficient duplication detection for multiple self-clean data sources. In: DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications , 1-4 Apr 2010, Tsukuba, Japan.

Adnan, M. and Iqbal, M. and Wang, Y. and Yang, D. and Xiang, Wei (2010) Physical layer multicasting over 2-hop network using dual amplify and forward relay. In: 2nd International Conference on Future Computer and Communication (ICFCC 2010), 21-24 May 2010, Wuhan, China.

Baig, Muzammil M. and Li, Jiuyong and Liu, Jixue and Wang, Hua and Wang, Junhu (2010) Privacy protection for genomic data: current techniques and challenges. In: Advances in intelligent information systems. Studies in Computational Intelligence (265). Springer-Verlag, Berlin, Germany, pp. 175-193. ISBN 978-3-642-05182-1

Luo, Yonglong and Shi, Lei and Zhang, Caiyun and Zhang, Ji (2010) Privacy-preserving protocols for string matching. In: 4th International Conference on Network and System Security (NSS 2010), 1-3 Sep 2010, Melbourne, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2010) Satisfying privacy requirements: one step before anonymization. In: PAKDD 2010: 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining , 21-24 Jun 2010, Hyderabad, India.

Xu, Kai and Williams, Rohan and Hong, Seok-Hee and Liu, Qing and Zhang, Ji (2010) Semi-bipartite graph visualization for gene ontology networks. In: GD 2009: 17th International Symposium on Graph Drawing , 22-25 Sep 2009, Chicago, United States.

Chen, Chen and Weili, Han and Yong, Jianming (2010) Specify and enforce the policies of quantified risk adaptive access control. In: CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design , 14-16 Apr 2010, Shanghai, China.

Li, Min and Wang, Hua (2010) Specifying usage control model with object constraint language. In: NSS 2010: 4th International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.

Tsai, Heng-Sheng and Gururajan, Raj (2010) The enablers and implementation model for mobile KMS in Australian healthcare. In: NSS 2010: 4th International Conference on Network and System Security , 1-3 Sep 2010, Melbourne, Australia.

Su, Ying and Al-Hakim, Latif (2010) Using computer simulation in operating room management: impacts of information quality on process performance. In: WMSVM 2010: 2nd International Conference on Modeling, Simulation and Visualization Methods, 15-16 May 2010, Sanya, China.

Tan, Wui-Gee and Cater-Steel, Aileen and Toleman, Mark (2009) Implementing IT service management: a case study focussing on critical success factors. Journal of Computer Information Systems, 50 (2). pp. 1-12. ISSN 0887-4417

Sefton, Peter and Watson, Kate (2009) Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories. In: DRF 2009: Open Access Repositories Now and In the Future: From the Global and Asia-Pacific Points of View, 3-4 Dec 2009, Tokyo, Japan.

Wen, Peng and Li, Yan (2009) Minimum packet drop sequences based networked control system model with embedded Markov chain. Simulation Modelling Practice and Theory, 17 (10). pp. 1635-1641. ISSN 1569-190X

Patel, Keyurkumar J. and Lee, Andrew Y. J. (2009) Realistic simulation of a wireless signal propagation in an urban environment. International Journal of Simulation: Systems, Science and Technology, 10 (6). pp. 1-5. ISSN 1473-8031

Phythian, Mark and Taylor, Jim and Reushle, Shirley and Harris, Glenn and Kist, Alexander and Ayers, Ron (2009) Work in progress: a novel method of creating an academic content repository. In: 39th ASEE/IEEE Frontiers in Education Conference (FIE 2009): Imagining and Engineering Future CSET Education, 18-21 Oct 2009, San Antonio, TX, United States.

Sefton, Peter (2009) Towards scholarly HTML. Serials Review, 35 (3). pp. 154-158. ISSN 0098-7913

Gurney, Tiana and Hafeez-Baig, Abdul and Gururajan, Raj (2009) Trialling wireless handheld devices in a clinical setting: a Queensland case study. In: CISTM 2009: 7th Annual Conference on Information Science, Technology and Management , 13-15 Jul 2009, Gurgaon, India.

Wang, Hua and Cao, Jinli and Zhang, Yanchun (2009) Delegating revocations and authorizations in collaborative business environments. Information Systems Frontiers, 11 (3). pp. 293-305. ISSN 1387-3326

Deng, Xiaotie and Fang, Qizhi and Sun, Xiaoxun (2009) Finding nucleolus of flow game. Journal of Combinatorial Optimization , 18 (1). pp. 64-86. ISSN 1382-6905

Sun, Lili and Li, Yan (2009) Using usage control to access XML databases. International Journal of Information Systems in the Service Sector, 1 (3). pp. 32-44. ISSN 1935-5688

McDougall, Kevin and Rajabifard, Abbas and Williamson, Ian (2009) Local government and SDI - understanding their capacity to share data. In: Spatial data infrastructure convergence: research, emerging trends, and critical assessment. Netherlands Geodetic Commission, Delft, The Netherlands, pp. 205-218. ISBN 978-90-6132-310-5

Farley, Helen (2009) Reusable learning designs and Second Life: issues and strategies. In: ED-MEDIA 2009: World Conference on Educational Multimedia, Hypermedia and Telecommunications 2009, 22-26 Jun 2009, Honolulu, Hawaii.

Wen, Peng and Li, Yuefeng and Polkowski, Lech and Yao, Yiyu and Tsumoto, Shusaku and Wang, Guoyin, eds. (2009) Rough sets and knowledge technology: proceedings of the 4th International Conference on Rough Sets and Knowledge Technology. Lecture Notes in Artificial Intelligence, 5589 . Springer-Verlag, Berlin / Heidelberg, Germany. ISBN 978-3-642-02961-5

McDougall, Kevin (2009) The potential of citizen volunteered spatial information for building SDI. In: GSDI 11 World Conference: Spatial Data Infrastructure Convergence: Building SDI Bridges to Address Global Challenges, 15-19 June 2009, Rotterdam, The Netherlands. (Unpublished)

Salmon, Gilly (2009) The future for (second) life and learning. British Journal of Educational Technology, 40 (3). pp. 526-538. ISSN 0007-1013

Zou, Weibao and Li, Yan and Tang, Arthur (2009) Effects of the number of hidden nodes used in a structured-based neural network on the reliability of image classification. Neural Computing and Applications, 18 (3). pp. 249-260. ISSN 0941-0643

Leis, John W. and Snook, Chris (2009) A zero-cost, real-time, Windows signal laboratory. International Journal of Electrical Engineering Education, 46 (1). pp. 1-10. ISSN 0020-7209

Li, Min and Wang, Hua and Plank, Ashley (2009) Privacy-aware access control with generalization boundaries. In: 32nd Australasian Computer Science Conference (ACSC 2009), 19-23 Jan 2009, Wellington, New Zealand.

Kummer, Tyge-F. and Bick, Markus and Gururajan, Raj (2009) Acceptance problems of ambient intelligence and mobile technologies in hospitals in India and Germany. In: ECIS 2009: 17th European Conference on Information Systems , 8-10 Jun 2009, Verona, Italy.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Ross, David (2009) Achieving p-sensitive k-anonymity via anatomy. In: ICEBE 2009: IEEE International Conference on e-Business Engineering , 21-23 Oct 2009, Macau, China.

Al-Mabrouk, Khalid and Soar, Jeffrey (2009) An analysis of the major issues for successful information technology transfer in Arab countries. Journal of Enterprise Information Management, 22 (5). pp. 504-522. ISSN 1741-0398

Lai, Ivan Ka-Wai and Mula, Joseph M. (2009) An analysis-form of soft systems methodology for information systems maintenance. In: Information systems research methods, epistemology, and applications. Information Science Reference (IGI Global), Hershey PA, USA, pp. 197-209. ISBN 978-1-60566-040-0

Khalil, Faten and Li, Jiuyong and Wang, Hua (2009) An integrated model for next page access prediction. International Journal of Knowledge and Web Intelligence, 1 (1/2). pp. 48-80. ISSN 1755-8255

Zhang, Zhongwei (2009) An intelligent scheme of secure routing for mobile ad hoc networks. In: ICSPCS 2008: 2nd International Conference on Signal Processing and Communication Systems , 15-17 Dec 2008, Gold Coast, Australia.

Sun, Lili and Wang, Hua and Yong, Jianming (2009) Authorization algorithms for permission-role assignments. Journal of Universal Computer Science, 15 (9). pp. 1782-1796. ISSN 0948-695X

Al-Hakim, Latif and Memmola, Massimo, eds. (2009) Business web strategy: design, alignment, and application. Information Science Reference (IGI Global), Hershey, PA, USA. ISBN 978-160566024-0

Siuly, and Li, Yan and Wen, Peng (2009) Classification of EEG signals using sampling techniques and least square support vector machines. In: RSKT 2009: 4th International Conference on Rough Sets and Knowledge Technology , 14-16 Jul 2009, Gold Coast, Australia.

Zhang, Ji and Gao, Qigang and Wang, Hai and Liu, Qing and Xu, Kai (2009) Detecting projected outliers in high-dimensional data streams. In: DEXA 2009: 20th International Conference on Database and Expert Systems Applications, 31 Aug- 4Sep 2009, Linz, Austria.

Yong, Jianming (2009) Digital identity control mechanism for e-learning. In: ITME 2009: IEEE International Symposium on IT in Medicine and Education, 14-16 Aug 2009, Jinan, China.

Braithwaite, Stephen and Addie, Ron (2009) ECOOSE: an echo cancellation object oriented simulation environment. In: 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems and Workshops, 2-6 Mar 2009, Rome, Italy.

Cater-Steel, Aileen and Toleman, Mark (2009) Education for IT service management standards. In: Selected readings on information technology management: contemporary issues. Information Science Reference (IGI Global), Hershey PA, USA, pp. 293-306. ISBN 978-1-60566-092-9

Bashar, Md. Rezaul and Li, Yan and Wen, Peng (2009) EEG analysis on skull conductivity perturbations using realistic head model. In: RSKT 2009: 4th International Conference on Rough Set and Knowledge Technology , 14-16 Jul 2009, Gold Coast, Australia.

Sefton, Peter and Barnes, Ian and Ward, Ron and Downing, Jim (2009) Embedding metadata and other semantics in word processing documents. In: DDC 2008: Radical Sharing: Transforming Science? , 1-3 Dec 2008, Edinburgh, Scotland.

Hafeez-Baig, Abdul and Gururajan, Raj (2009) Exploratory study to understand the phenomena of adoption of wireless handheld devices in the Australian healthcare system. Journal of Systems and Information Technology, 11 (1). pp. 43-56. ISSN 1328-7265

Sun, Xiaoxun and Wang, Hua and Sun, Lili (2009) Extended K-anonymity models against attribute disclosure. In: NSS 2009: 3rd International Conference on Network and System Security, 19-21 Oct 2009, Gold Coast, Australia.

Wong, Yuk Kuen (2009) Information communication technology tools for software review and verification. In: Encyclopedia of information communication technology. IGI Publishing (IGI Global), pp. 429-435. ISBN 9781599048451

Wong, Yuk Kuen and Thite, Mohan (2009) Information security and privacy in HRIS. In: Human resource information systems: basics, applications, and future directions. Sage Publications, New Delhi, India, pp. 395-407. ISBN 978-1-4129-4455-7

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2009) Injecting purpose and trust into data anonymisation. In: CIKM 2009: 18th ACM International Conference on Information and Knowledge Management , 2-6 Nov 2009, Hong Kong, China.

Wong, Yuk Kuen and Hsu, C. J. (2009) Online trust in mobile commerce. In: Encyclopedia of information communication technology. IGI Publishing (IGI Global), pp. 647-655. ISBN 9781599048451

Li, Min and Sun, Xiaoxun and Wang, Hua and Zhang, Yanchun (2009) Optimal privacy-aware path in hippocratic databases. In: DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications, 21-23 Apr 2009, Brisbane, Australia.

Cater-Steel, Aileen and Al-Hakim, Latif (2009) Preface [to Information systems research methods, epistemology, and applications]. In: Information systems research methods, epistemology, and applications. Information Science Reference (IGI Global), Hershey PA, USA, xviii-xxiv. ISBN 978-1-60566-040-0

Boonyathan, Patcharee and Al-Hakim, Latif (2009) Procedure for modeling and improving E-SCM processes. In: Electronic business: concepts, methodologies, tools, and applications. IGI Publishing (IGI Global), Hershey, PA. United States, pp. 482-503. ISBN 9781605660561

Hafeez-Baig, Abdul and Gururajan, Raj and Mula, Joseph M. and Lin, Meng-Kuan (2009) Study to investigate the determinants for the use of wireless technology in healthcare setting: a case of Pakistan. In: COINFO 2009: Managing Virtual Organisations and Information in the Era of Globalisation, 21-23 Nov 2009, Beijing, China.

Buckby, Sherrena and Best, Peter and Stewart, Jenny (2009) The current state of information technology governance literature. In: Information technology governance and service management: frameworks and adaptations. Information Science Reference (IGI Global), Hershey, PA. USA, pp. 1-43. ISBN 978-1-60566-008-0; eISBN 978-1-60566-009-7

Li, Min and Wang, Hua and Ross, David (2009) Trust-based access control for privacy protection in collaborative environment. In: ICEBE 2009: IEEE International Conference on e-Business Engineering, 21-23 Oct 2009, Macau, China.

Lock, Jennifer V. and Redmond, Petrea (2009) Working collaboratively on the digital global frontier. In: Handbook of research on electronic collaboration and organizational synergy, vol. 1. Information Science Reference (IGI Global), Hershey PA, USA, pp. 177-191. ISBN 978-1-60566-106-3

Teng, Lanzhi and Wen, Peng and Xiang, Wei (2008) Model-based networked control system stability based on packet drop distributions. In: ICARCV 2008: 10th International Conference on Control, Automation, Robotics and Vision, 17-20 Dec 2008, Hanoi, Vietnam.

Tao, Xiaohui and Li, Yuefeng and Nayak, Richi (2008) A knowledge retrieval model using ontology mining and user profiling. Integrated Computer Aided Engineering, 15 (4). pp. 313-329. ISSN 1069-2509

Li, Shaozi and Pan, Wei and Yong, Jianming (2008) Proceedings of the IEEE international symposium on IT in medicine and education (ITME 2008). In: IEEE International Symposium on IT in Medicine and Education (ITME 2008) , 12-14 Dec 2008, Xiamen, China.

Sefton, Peter (2008) Re-discovering repository architecture: adding discovery as a key service. New Review of Information Networking, 14 (2). pp. 84-101. ISSN 1361-4576

Wang, Hua and Zhang, Yanchun and Cao, Jinli (2008) Access control management for ubiquitous computing. Future Generation Computer Systems: The International Journal of Grid Computing: Theory, Methods and Applications, 24 (8). pp. 870-878. ISSN 0167-739X

Rallabandi, Venkateswara Rao and Rallabandi, V. P. Subramanyam (2008) Rotation-invariant texture retrieval using wavelet-based hidden Markov trees. Signal Processing, 88 (10). pp. 2593-2598. ISSN 0165-1684

Reushle, Shirley and Loch, Birgit (2008) Conducting a trial of web conferencing software: why, how, and perceptions from the coalface. Turkish Online Journal of Distance Education, 9 (3). pp. 19-28. ISSN 1302-6488

Wang, Hua and Yong, Jianming and Li, Jiuyong and Peng, Min (2008) Authorization approaches for advanced permission-role assignments. In: CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design , 16-18 Apr 2008, Xi'an China.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) On the complexity of restricted k-anonymity problem. In: APWeb 2008: 10th Asia-Pacific Web Conference, 26-28 Apr 2008, Shenyang, China.

Yong, Jianming and Li, Jiuyong and Wang, Hua (2008) Portable devices of security and privacy preservation for e-learning. In: CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design , 16-18 Apr 2008, Xi'an, China.

Li, Min and Wang, Hua (2008) Protecting information sharing in distributed collaborative environment. In: APWeb 2008: 10th Asia Pacific Web Conference Workshop , 26-28 Apr 2008, Shenyang, China.

Sun, Lili and Li, Yan (2008) XML and web services security. In: CSCWD 2008: 12th International Conference on Computer Supported Cooporative Work in Design, 16-18 Apr 2008, Xi'an, China.

Dekeyser, Stijn and Watson, Richard and Motroen, Lasse (2008) A model, schema, and interface for metadata file systems. In: 31st Australasian Computer Science Conference (ACSC 2008), 22-25 Jan 2008, Wollongong, Australia.

Sun, Xiaoxun and Li, Min and Wang, Hua and Plank, Ashley (2008) An efficient hash-based algorithm for minimal k-anonymity. In: ACSC 2008: 31st Australasian Computer Science Conference, 22-25 Jan 2008, Wollongong, Australia.

Li, Min and Wang, Hua (2008) ABDM: an extended flexible delegation model in RBAC. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

Li, Min and Wang, Hua and Plank, Ashley and Yong, Jianming (2008) Advanced permission-role relationship in role-based access control. In: ACISP 2008:13th Australasian Conference on Information Security and Privacy , 7-9 Jul 2008, Wollongong, Australia.

Addie, R. G. and Yevdokimov, Oleksiy (2008) Asymptotically accurate flow completion time distributions under fair queueing. In: Australasian Telecommunication Networks and Applications Conference (ATNAC 2007): Next Generation Networks: Enabling Closer International Cooperation, 2-5 Dec 2007, Christchurch, New Zealand.

Gururajan, Raj and Gururajan, Vijaya and Hafeez-Baig, Abdul (2008) Clinical factors and technological barriers as determinants for the intention to use wireless handheld technology in healthcare environment: an Indian case study. In: ECIS 2008: Information Systems in an Innovative Knowledge-based Society, 9-11 Jun 2008, Galway, Ireland.

Chan, Auc Fai and Leis, John (2008) Comparison of weighted average and median filters for wireless retransmission timeout estimation. In: ICSPCS 2008: 2nd International Conference on Signal Processing and Communication Systems, 15-17 Dec 2008, Gold Coast, Australia.

Wang, Hua and Cao, Jinli (2008) Delegating revocations and authorizations. In: BPM 2007: 5th International Conference on Business Process Management, 24-28 Sep 2007, Brisbane, Australia.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Truta, Traian Marius (2008) Enhanced p-sensitive k-anonymity models for privacy preserving data publishing. Transactions on Data Privacy, 1 (2). pp. 53-66. ISSN 1888-5063

Sefton, Peter (2008) eResearch for Word users? In: eResearch Australasia 2008, 28 Sep-3 Oct 2008, Melbourne, Australia.

Kist, Alexander A. and Lloyd-Smith, Bill (2008) Internet pooling: routing for load distribution in access networks. In: ATNAC 2007: Next Generation Networks: Enabling Closer International Cooperation, 2-5 Dec 2007, Christchurch, New Zealand.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) L-diversity based dynamic update for large time-evolving microdata. In: AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence , 1-5 Dec 2008, Auckland, New Zealand.

Kist, Alexander A. (2008) Note on remote laboratory access: a networking perspective. In: ICSPCS 2007: 1st International Conference on Signal Processing and Communication Systems (ICSPCS '2007), 17-19 Dec 2007, Gold Coast, Australia.

Sun, Xiaoxun and Wang, Hua and Truta, Traian Marius and Li, Jiuyong and Li, Ping (2008) (p+, α)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology, 8-11 Jul 2008, Sydney, Australia.

Sun, Lili and Wang, Hua and Li, Yan (2008) Protecting disseminative information in e-learning. In: ICWL 2007: 6th International Conference on Web-Based Learning , 15-17 Aug 2007, Edinburgh, Scotland.

Wang, Hua and Li, Qing (2008) Secure and efficient information sharing in multi-university e-learning environments. In: ICWL 2007: 6th International Conference on Web-Based Learning , 15-17 Aug 2007, Edinburgh, United Kingdom.

Zhang, Ji and Gao, Qigang and Wang, Hai (2008) SPOT: a system for detecting projected outliers from high-dimensional data streams. In: 24th IEEE International Conference on Data Engineering (ICDE 2008) , 7-12 Apr 2008, Cancun, Mexico .

Cater-Steel, Aileen and Toleman, Mark (2008) The impact of national culture on software engineering practices. International Journal of Technology, Policy and Management, 8 (1). pp. 76-90. ISSN 1468-4322

Armstrong, Bruce and Fogarty, Gerard J. and Dingsdag, Don (2007) Scales measuring characteristics of small businesses information systems. In: ACIS 2007: 18th Australasian Conference on Information Systems:The 3 Rs: Research, Relevance and Rigour - Coming of Age, 5-7 Dec 2007, Toowoomba, Australia.

Tan, Wui-Gee, ed. (2007) Proceedings of the 18th Australasian conference on information systems doctoral consortium (ACIS 2007). University of Southern Queensland, Toowoomba, Australia.

Gururajan, Raj (2007) Factors influencing the intention to use wireless technology in health care: a study in India. Journal of Telemedicine and Telecare, 13 (Supple). pp. 40-41. ISSN 1357-633X

Gururajan, Raj and Hafeez-Baig, Abdul and Kerr, Don (2007) Reactions and perceptions of healthcare professional towards wireless devices in healthcare environment in the developing world: a case of Pakistan. In: ACIS 2007: 18th Australasian Conference on Information Systems:The 3 Rs: Research, Relevance and Rigour - Coming of Age, 5-7 Dec 2007, Toowoomba, Australia.

Sparling, Lynn and Cater-Steel, Aileen and Toleman, Mark (2007) SME adoption of e-Commerce in the Central Okanagan region of Canada. In: ACIS 2007: 18th Australasian Conference on Information Systems:The 3 Rs: Research, Relevance and Rigour - Coming of Age, 5-7 Dec 2007, Toowoomba, Australia.

Li, Yan and Wen, Peng and Wang, Hu and Gong, Chunqiang (2007) Service-mining based on knowledge and customer databases. In: KSEM 2007: 2nd International Conference on Knowledge Science, Engineering and Management, 28-30 Nov 2007, Melbourne, Australia.

Sun, Lili and Li, Yan (2007) XML schema in XML documents with usage control. International Journal of Computer Science and Network Security, 7 (10). pp. 170-177. ISSN 1738-7906

Birch, Dawn and Volkov, Michael (2007) Assessment of online reflections: engaging english second language (ESL) students. Australasian Journal of Educational Technology, 23 (3). pp. 291-306. ISSN 1449-3098

King, John D. and Li, Yuefeng and Tao, Xiaohui and Nayak, Richi (2007) Mining world knowledge for analysis of search engine content. Web Intelligence and Agent Systems: an International Journal, 5 (3). pp. 233-253. ISSN 1570-1263

Addie, R. G. and Yevdokimov, Oleksiy and Braithwaite, Stephen and Millsom, David (2007) Protecting small flows from large ones for quality of service. In: 2nd International Conference on Digital Telecommunications (ICDT 2007), 1-6 Jul 2007, San Jose, CA. United States.

Cater-Steel, A. and McBride, Neil (2007) IT service management improvement - actor network perspective. In: 15th European Conference on Information Systems (ECIS 2007) , 7-9 Jun 2007, St Gallen, Switzerland.

Gururajan, Raj (2007) Drivers of wireless technology in healthcare: an Indian study. In: ECIS 2007: Relevant rigour - Rigorous relevance, 7-9 Jun 2007, St Gallen, Switzerland.

Al-Hakim, Latif (2007) E-innovation: information quality perspective. In: ISMOT 2007: Managing Total Innovation and Open Innovation in the 21st Century, 1-3 Jun 2007, Hangzhou, China.

Rowe, Michelle and Pease, Wayne (2007) The web portal as a collaborative tool. In: Encyclopedia of portal technologies and applications. IGI Publishing (IGI Global), Hershey, PA. United States, pp. 1138-1143. ISBN 978-1-59140-989-2

Bashar, M. Rezaul and Li, Yan and Rhee, Phill Kyu (2007) An approach of context ontology for robust face recognition against illumination variations. In: ICICT 2007: International Conference on Information and Communication Technology , 7-9 Mar 2007, Dhaka, Bangladesh.

Carbone, Angela and de Raadt, Michael and Kay, Judy and Lister, Raymond and Litchfield, Andrew and Raban, Richard and Roe, Paul and Santamaria, Daniel and Sheard, Judy and Shepherd, John and Solomon, Andrew and Thomas, Richard (2007) The Carrick vision and computing education: four case studies in multi-institutional collaboration. In: ACE 2007: 9th Australasian Computing Education Conference, 30 Jan-2 Feb 2007, Ballarat, Australia.

Yong, Jianming (2007) Digital identity design and privacy preservation for e-learning. In: CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design, 26-28 Apr 2007, Melbourne, Australia.

Al-Hakim, Latif (2007) IDEF3-based framework for web-based hospital information system. In: Web mobile based applications for healthcare management. Information Quality Management . IRM Press (IGI Global), Hershey, PA, USA, pp. 376-401. ISBN 1-59140-658-7

Al-Hakim, Latif (2007) Information quality function deployment. In: Challenges of managing information quality in service organizations. Information Quality Management . Idea Group Publishing (IGI Global), Hershey, PA, United States, pp. 26-50. ISBN 1-59904-420-X

Valverde, Raul and Toleman, Mark (2007) Ontological evaluation of business models: comparing traditional and component-based paradigms in information systems re-engineering. In: Ontologies: a handbook of principles, concepts and applications in information systems. Integrated Series in Information Systems . Springer, New York, NY. United States, pp. 49-77. ISBN 0-387-37019-6; eISBN 978-0387-37022-4

Hafeez-Baig, Abdul and Grist, Shelly and Gururajan, Raj (2007) Technology management, data management, improved outcomes, efficiency and software limitation influencing the use of wireless technology for healthcare in Pakistan. In: ICIS 2007: 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 Jul 2007, Melbourne, Australia.

Al-Hakim, Latif, ed. (2007) Web mobile-based applications for healthcare management. Information Quality Management . IRM Press (IGI Global), Hershey, PA, United States, x-xxiv. ISBN 1-59140-658-7

Roberts, Dave and Cater-Steel, Aileen and Toleman, Mark (2006) Factors influencing the decisions of SMEs to purchase software package upgrades. In: ACIS 2006: 17th Australasian Conference on Information Systems: Thought, Leadership in IS, 6-8 Dec 2006, Adelaide, Australia.

Cater-Steel, Aileen and Toleman, Mark and Tan, Wui-Gee (2006) Transforming IT service management - the ITIL impact. In: ACIS 2006: 17th Australasian Conference on Information Systems: Thought, Leadership in IS, 6-8 Dec 2006, Adelaide, South Australia.

Scott, Annette and Gururajan, Raj and Moloney, Clint and Gururajan, Vijaya (2006) A qualitative evaluation of the effectiveness of videoconferencing to support the training of orthopaedic registrars. Journal of Telemedicine and Telecare, 12 (Supple). pp. 69-70. ISSN 1357-633X

Parsons, David (2006) Is the internet good for our environment? Electroline.

Yong, Jianming and Bertino, Elisa and Toleman, Mark and Roberts, Dave (2006) Extended RBAC with role attributes. In: 10th Pacific Asia Conference on Information Systems (PACIS 2006), 6-9 Jul 2006, Kuala Lumpur, Malaysia.

Cater-Steel, Aileen and Toleman, Mark and Rout, Terry (2006) Process improvement for small firms: an evaluation of the RAPID assessment-based method. Information and Software Technology, 48 (5). pp. 323-334. ISSN 0950-5849

Dekeyser, Stijn and Hidders, Jan and Watson, Richard and Addie, Ron (2006) Peer-to-peer form based web information systems. In: ADC 2006: 17th Australasian Database Conference, 16-19 Jan 2006, Hobart, Australia.

Simon, and Cutts, Quintin and Fincher, Sally and Haden, Patricia and Robins, Anthony and Sutton, Ken and Baker, Bob and Box, Ilona and de Raadt, Michael and Hamer, John and Hamilton, Margaret and Lister, Raymond and Petre, Marian and Tolhurst, Denise and Tutty, Jodi (2006) The ability to articulate strategy as a predictor of programming skill. In: ACE 2006: 8th Australasian Conference on Computing Education, 16-19 Jan 2006, Hobart, Australia.

Bashar, Md. Rezaul and Young, Nam Mi and Rhee, Phill Kyu (2006) A context model for ubiquitous computing applications. In: KES 2006: 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, 9-11 Oct 2006, Bournemouth, United Kingdom.

Young, Nam Mi and Bashar, Md. Rezaul and Rhee, Phill Kyu (2006) A face recognition system on distributed evolutionary computing using on-line GA. In: Intelligent Control and Automation: International Conference on Intelligent Computing ( ICIC 2006) Kunming, China, August, 2006, August, 2006, Kunming,China.

Howard, Angela and Hafeez-Baig, Abdul and Howard, Srecko and Gururajan, Raj (2006) A framework for the adoption of wireless technology in healthcare: an Indian study. In: ACIS 2006: 17th Australasian Conference on Information Systems: Thought, Leadership in IS, 6-8 Dec 2006, Adelaide, Australia.

Jin, SongGuo and Jung, Eun Sung and Bashar, Md. Rezaul and Nam, Mi Young and Rhee, Phill Kyu (2006) Adaptive classifier selection on hierarchical context modeling for robust vision systems. In: 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006), 9-11 Oct 2006, Bournemouth, UK.

Young, Nam Mi and Bashar, Md. Rezaul and Rhee, Phill Kyu (2006) Adaptive context-aware filter fusion for face recognition on bad illumination. In: KES 2006: 10th International Conference on Knowlege-Based Intelligent Information and Engineering Systems , 9-11 Oct 2006, Bournemouth, United Kingdom.

Ayres, Dianne and Soar, Jeffrey and Conrick, Moya (2006) Health information systems. In: Informatics in healthcare: transforming healthcare with technology. Thomson Social Science Press, Melbourne, Australia, pp. 197-211. ISBN 0-17-012731-1

Braithwaite, Stephen (2006) Implementation of AQMs on Linux made easy. In: OSDC 2006: Open Source Developers' Conference, 6-8 Dec 2006, Melbourne, Australia.

Yong, Jianming (2006) Neighbourhood-trust dependency access control for WFMS. In: 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD2006), 3-5 May 2006, Nanjing, China.

Joo, Hyun Jea and Jang, Bong Won and Bashar, Md. Rezaul and Rhee, Phill Kyu (2006) Real time face detection system based edge restoration and nested K-means at frontal view. In: 3rd International Conference on Fuzzy Systems and Knowledge Discovery , 24-28 Sept 2006, Xi'an, China.

Soar, Jeffrey and Conrick, Moya (2006) Software management. In: Informatics in healthcare: transforming healthcare with technology. Thomson Social Science Press, Melbourne, Australia, pp. 212-221. ISBN 0-17-012731-1

Albion, Peter (2006) Technology leadership. In: 17th International Conference of the Society for Information Technology & Teacher Education (SITE 2006), 20-24 Mar 2005, Orlando, Florida.

Yong, Jianming and Yan, Jun and Huang, Xiaodi (2006) WSFS-based data integration for e-learning. In: 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD2006), 3-5 May 2006, Nanjing, China.

Dekeyser, Stijn (2005) A metadata collection technique for documents in WinFS. In: 10th Australasian Document Computing Symposium (ADCS 2005) , 12 Dec 2005, Sydney, Australia.

Loch, B. I. and Belward, J. A. and Hanan, J. S. (2005) Application of surface fitting techniques for the representation of leaf surfaces. In: MODSIM05: International Congress on Modelling and Simulation: Advances and Applications for Management and Decision Making, 12-15 Dec 2005, Melbourne, Australia.

Gururajan, Raj and Moloney, Clint and Soar, Jeffrey (2005) Challenges for implementing wireless hand-held technology in health care: views from selected Queensland nurses. Journal of Telemedicine and Telecare, 11 (Supple). pp. 37-38. ISSN 1357-633X

Addie, Ron and Li, Zhi and McNickle, Don (2005) Implementing shortest job first order of service in the internet. In: International Congress on Modelling and Simulation (MODSIM 2005): Advances and Applications for Management and Decision Making, 12-15 Dec 2005, Melbourne, Australia.

Ryan, Charmaine and Rhodes, Debbie and Millett, Bruce (2005) Developing strategic capability through a knowledge network communication work space. In: actKM Sixth Annual Conference 2005, 26-27 Oct 2005, Canberra, Australia.

Rajion, Zainul and Suwardhi, Deni and Setan, Halim and Chong, Albert K. and Majid, Zulkepli and Ahmad, Anuar B. and Samsudin, Abdul Rani and Izhar, Ab. Aziz and Harun, Wan Ab. Rahman Wan (2005) Coordinate systems integration for development of Malaysian craniofacial database. In: 27th International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS), 1-4 Sept 2005, Shanghai, China.

Li, Zhi and Zhang, Zhongwei (2005) A coupled fuzzy logic control for routers' queue management over TCP/AQM networks. In: 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), 14-16 Sep 2005, Melbourne, Australia.

Firman, E. and Moore, K. (2005) All roads lead to Rome: channelling inter-campus, interlibrary and off-campus requests through a single user interface. In: ALIA National Library and Information Technicians Conference (neXt 2005), 6-9 Sep 2005, Sydney, Australia.

Blake, Jacqueline and Pease, Wayne (2005) An open standard for the exchange of information in the Australian timber sector. In: ITS 2005: ICT Networks - Building Blocks for Economic Development, 28-30 Aug 2005, Perth, Western Australia.

Gururajan, Raj and Murugesan, San and Soar, Jeffrey (2005) Introducing mobile technologies in support of healthcare. Cutter IT Journal, 18 (8). pp. 12-18. ISSN 1522-7383

Blake, Jacqueline and Pease, Wayne (2005) The e-readiness of the Australian timber and wood sector. In: ITS 2005: ICT Networks - Building Blocks for Economic Development, 28-30 Aug 2005, Perth, Western Australia.

Zhang, Zhongwei and Lai, David (2005) An active approach to multimedia network management. In: 9th WSEAS International Conference on Communications, 11-16 July 2005, Athens, Greece.

Wang, Hua and Sun, Lili and Zhang, Yanchun and Cao, Jinli (2005) Authorization algorithms for the mobility of user-role relationship. In: ACSC 2005: 28th Australasian Computer Science Conference, 28 Jan-3 Feb 2005, Newcastle, Australia.

Cater-Steel, Aileen and Toleman, Mark and Rout, Terry (2005) Addressing the challenges of replications of surveys in software engineering research. In: ISESE 2005: on Empirical Software Engineering, 17-18 Nov 2005, Noosa Heads, Australia.

McNickle, Don and Addie, Ron (2005) Comparing different approaches to the use of DiffServ in the internet. In: IEEE Annual International Region 10 Conference (TENCON 2005): , 21-24 Nov 2005, Melbourne, Australia.

Zhang, Ji and Liu, Han (2005) D-GridMST: clustering large distributed spatial databases. In: Classification and clustering for knowledge discovery. Studies in Computational Intelligence (4). Springer, Berlin, Germany, pp. 61-72. ISBN 978-3-540-26073-8

Basnet, Prajwal and Lane, Michael S. (2005) Informal control in open source projects: an empirical assessment. In: ACIS 2005: 16th Australasian Conference on Information Systems: Socialising IT - Thinking About The People, 30 Nov-2 Dec 2005, Manly, Australia.

Al-Hakim, Latif (2005) IT outsourcing: an assessment of relative failure factor complexity. In: IRMA 2005: Managing Modern Organisations With Information Technology, 15-18 May 2005, San Diego, USA.

Millett, Bruce and Te'o, Togamau and Rhodes, Debbie and Clarke, John and Carswell, Sandra (2005) SharePoint portal as a strategic management and planning tool: University of Southern Queensland (USQ) as a case study. In: AAIR 2005: Institutional Research, Innovation and Change in Universities of the 21st Century, 23-25 Nov 2005, Melbourne, Australia.

Cao, Jinli and Sun, Lili and Wang, Hua (2005) Towards secure XML document with usage control. In: 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005), 29 Mar-1 Apr 2005, Shanghai, China.

Hu, Hong and Li, Jiuyong (2005) Using association rules to make rule-based classifiers robust. In: ADC 2005: 16th Australasian Database Conference, 31 Jan-3 Feb 2005, Newcastle, Australia.

Gururajan, Raj and Murugesan, San (2005) Wireless solutions developed for the Australian healthcare: a review. In: International Conference on Mobile Business (ICMB 2005), 11-13 Jul 2005, Sydney, Australia.

Sun, Lili and Li, Yan (2005) XML undeniable signatures. In: International Conference on Intelligent Agents, Web Technologies & Internet Commerce, 28-30 Nov 2005, Vienna, Austria.

Gururajan, Raj (2004) A study of the use of hand-held devices in an emergency department. Journal of Telemedicine and Telecare, 10 (Supple). pp. 33-35. ISSN 1357-633X

Yong, Jianming and Yang, Yun (2004) Distributed internet-based e-commerce tools. WSEAS Transaction on Computers, 3 (3). pp. 619-625. ISSN 1109-2750

Yong, Jianming and Yang, Yun (2004) A framework of tool integration for internet-based e-commerce. In: GCC 2003: 2nd International Workshop on Grid and Cooperative Computing, 7-10 Dec 03, Shanghai, China.

Huang, Xiaodi and Yong, Jianming (2004) A new approach to multimedia information filtering based on its structure. In: Mutimedia 2004 Eurographics Symposium, 27-28 Oct 2004, Nanjing, China.

Hanan, Jim and Loch, Birgit and McAleer, Tim (2004) Processing laser scanner plant data to extract structural information. In: 4th International Workshop on Functional-Structural Plant Models (FSPM 2004), 7-11 Jun 2004, Montpellier, France.

Yong, Jianming and Yang, Yun and Yan, Jun (2003) Building ontology repositories for e-commerce systems. WSEAS Transactions on Systems, 2 (2). pp. 241-245. ISSN 1109-2777

Dekeyser, Stijn and Hidders, Jan (2003) A commit scheduler for XML databases. In: 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications , 23-25 Apr 2003, Xian, China.

Weippert, A. and Kajewski, S. L. and Tilley, P. A. (2003) The implementation of online information and communication technology (ICT) on remote construction projects. Logistics Information Management, 16 (5). pp. 327-340. ISSN 0957-6053

Xiang, Wei and Barbulescu, S. Adrian (2003) Turbo diversity scheme applied to JPEG image transmission. In: IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2002), 2002, Kaohsiung,Taiwan.

Weippert, A. and Kajewski, S. L. and Tilley, P. A. (2002) Internet-based information and communication systems on remote construction projects: a case study analysis. Construction Innovation: Information, Process, Management, 2 (2). pp. 103-116. ISSN 1471-4175

Bradbeer, Robin and Billingsley, John, eds. (2002) Mechatronics and machine vision 2002: current practice. Robotics and Mechatronics Series, 4 . Research Studies Press, Baldock, Hertfordshire, England. ISBN 0863802788; 9780863802782

Neame, Timothy D. and Zukerman, Moshe and Addie, Ronald G. (2001) A tradeoff between increased network speed and reduced effective bandwidths. In: IEEE International Conference on Communications (ICC 2001): Where Minds Meet, 11-14 Jun 2000, Helsinki, Finland.

Toleman, Mark and Carrington, David and Cook, Phil and Coyle, Andrew and MacDonald, Anthony and Welsh, Jim and Jones, Tim (2001) Generic description of a software document environment. In: 34th Annual Hawaii International Conference on System Sciences (HICSS34) , 3-6 Jan 2001, Maui, Hawaii.

Wang, Hua and Zhang, Yanchun (2000) A protocol for untraceable electronic cash. In: 1st Web-Age Information Management International Conference (WAIM 2000), 21-23 Jun 2000, Shanghai, China.

Ray, Penny and Lukose, Dickson and Toleman, Mark (2000) Agents with attitude. In: 6th International Conference on the Simulation of Adaptive Behaviour SAB 2000): From Animals to Animats 6 , 11-15 Sep 2000, Paris, France.

Baillie, Penny and Toleman, Mark and Lukose, Dickson (2000) Emotional intelligence for intuitive agents. In: International Conference on Artificial Intelligence in Science and Technology (AISAT 2000), 17-20 Dec 2000, Hobart, Australia.

Ray, Penny and Toleman, Mark and Lukose, Dickson (2000) Emotional intelligence for intuitive agents. In: 6th Pacific Rim International Conference on Artificial Intelligence (PRICAI 2000), 28 Aug-1 Sep 2000, Melbourne, Australia.

Ray, Penny and Lukose, Dickson and Toleman, Mark (2000) How to give an agent attitude. In: 1st Workshop on Agent-Based Simulation, 2-3 May 2000, Passau, Germany.

Li, Yan and Rad, A. B. and Wen, Peng (1999) An enhanced training algorithm for multilayer neural networks based on reference output of hidden layer. Neural Computing and Applications, 8. pp. 218-225. ISSN 0941-0643

Toleman, Mark A. and Toleman, Jessica M. (1998) User experiences and a usability inspection of an electronic services environment for students. In: Australasian Computer-Human Interaction Conference (OzCHI 1998), 30 Nov-4 Dec 1998, Adelaide, Australia.

Li, Yan and Rad, A. B. (1997) A cascading structure and training method for multilayer neural network. International Journal of Neural Systems, 8 (5/6). pp. 509-515. ISSN 0129-0657

Liu, Yaowei and Lai, Wei and Keong, Wong Kin (1997) Multi-level navigation for curriculum planning in intelligent tutoring systems. In: 1st IEEE International Conference on Intelligent Processing Systems (ICIPS 1997), 28-31 Oct 1997, Beijing, China.

Nooriafshar, Mehryar (1995) A heuristic approach to improving the design of nurse training schedules. European Journal of Operational Research, 81 (1). pp. 50-61. ISSN 0377-2217

Toleman, Mark A. and Welsh, Jim (1994) An evaluation of editing paradigms. In: Australasian Computer-Human Interaction Conference: Harmony Through Working Together (OzCHI 1994), 28 Nov-1 Dec 1994, Melbourne, Australia.

Toleman, Mark and Welsh, Jim (1991) Retrospective application of user interface guidelines: a case study of a language-based editor. In: Australasian Computer-Human Interaction Conference (OZCHI 1991): People Before Technology , 28-29 Nov 1991, Sydney, Australia.

Welsh, Jim and Toleman, Mark (1989) A case study in user interface design. In: Annual Ergonomics Society of Australia Conference (CHISIG 1989), 23-24 Nov 1989, Melbourne, Australia.

This list was generated on Wed Sep 17 02:41:46 2014 EST.