Browse by Socio-Economic Objective (ANZSRC 2008)

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Number of items at this level: 12.

Wang, Gengkun and Xiang, Wei and Yuan, Jinhong (2014) Generalized wireless network coding schemes for multihop two-way relay channels. IEEE Transactions on Wireless Communications, 13 (9). pp. 5132-5147. ISSN 1536-1276

Gururajan, Raj and Hafeez-Baig, Abdul and Sturgess, Julie and Clark, Kevin and Gururajan, Vijaya and Moller, Susan (2013) An exploratory study to identify factors that influence the use of electronic patient boards in Queensland Health. International Journal of Management & Information Technology, 7 (2). pp. 1033-1041.

Shrestha, Anup and Cater-Steel, Aileen and Toleman, Mark and Tan, Wui-Gee (2013) A decision support tool to define scope in IT service management process assessment and improvement. In: 8th International Conference on Design Science at the Intersection of Physical and Virtual Design (DESRIST 2013), 11-12 Jun 2013, Helsinki, Finland.

Shrestha, Anup (2012) Social ITSM - challenges and benefits. At Your Service, 2 (3). pp. 3-7.

Zhang, Zhongwei and Zhou, Hong (2011) A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains. In: 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011), 6-8 Jul 2011, Sydney, Australia.

Sun, Zhe and Shen, Jun and Yong, Jianming (2011) DeDu: building a deduplication storage system over cloud computing. In: CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design, 8-10 Jun 2011, Lausanne, Switzerland.

Kabir, Md Enamul and Wang, Hua and Bertino, Elisa (2011) Efficient systematic clustering method for k-anonymization. Acta Informatica, 48 (1). pp. 51-66. ISSN 0001-5903

Sefton, Peter and Downing, Jim and Day, Nick (2010) ICE-theorem - end to end semantically aware eResearch infrastructure for theses. Journal of Digital Information, 11 (1). pp. 1-19.

Xiang, Wei and Desai, Bhavin and Wen, Paul and Wang, Yafeng and Peng, Tianshu (2009) A prototype biometric security authentication system based upon fingerprint recognition. In: 4th International Conference on Rough Set and Knowledge Technology (RSKT 2009) , 14-16 Jul 2009, Gold Coast, Australia.

McPhail, Janelle and Fogarty, Gerard and Walker, Rhett H. (2003) Understanding older consumers' usage of self-service technologies: test of two models. In: ANZMAC 2003: Celebration of Ehrenberg and Bass: Marketing Discoveries, Knowledge and Contribution, 1-3 Dec 2003, Adelaide, Australia.

Toleman, Mark A. and Welsh, Jim (1996) Can design choices for language-based editors be analysed with keystroke-level models? In: Annual Ergonomics Society of Australia CHISIG Conference (HCI 1996): Human-Computer Interaction, 21-23 Aug 1996, London, United Kingdom.

Toleman, Mark A. and Welsh, Jim (1994) Issues in the design of experiments for studying user interaction with software development tools. In: 2nd Computer Human Interaction Special Interest Group of the Ergonomics Society of Australia, CHISIG (Queensland) Symposium (QCHI 1994), 15 Jul 1994, Gold Coast, Australia.

This list was generated on Tue Jun 27 03:40:54 2017 AEST.