46. Information and Computing Sciences


Title46. Information and Computing Sciences
ParentANZSRC Field of Research

Latest research outputs

Sort by Date Title
Multicast based dual amplify and forward relay scheme for 2 hop networks
Adnan, Muhammad, She, Haoqiu, Wang, Yafeng, Yang, Dacheng and Xiang, Wei. 2009. "Multicast based dual amplify and forward relay scheme for 2 hop networks." Velásquez, Carlos Eduardo (ed.) LATINCOM 2009: 1st IEEE Latin-American Conference on Communications. Medellin, Colombia 10 - 11 Sep 2009 Piscataway, NJ. United States.

Paper

Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66

Paper

Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136

Paper

Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132

Article

Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance
Kimmins, Lindy and Stagg, Adrian. 2009. "Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance." Martin, Brian and Percy, Alisa (ed.) 4APCEI: Educational Integrity: Creating an Inclusive Approach. Wollongong, Australia 28 - 30 Sep 2009 Wollongong, Australia.

Paper

Authentic learning across international borders: a cross institutional online project for pre-service teachers
Redmond, Petrea and Lock, Jennifer V.. 2009. "Authentic learning across international borders: a cross institutional online project for pre-service teachers." Maddux, Cleborne D. (ed.) Research highlights in technology and teacher education 2009. Chesapeake, VA. United States. Society for Information Technology & Teacher Education (SITE). pp. 265-273

Edited book (chapter)

Creating an eResearch desktop for the Humanities
Dickinson, Duncan and Sefton, Peter. 2009. "Creating an eResearch desktop for the Humanities." eResearch Australasia 2009. Sydney, Australia

Presentation

Machine-independent audit trail analysis - a tool for continuous audit assurance
Best, Peter J.. 2004. "Machine-independent audit trail analysis - a tool for continuous audit assurance." Intelligent Systems in Accounting, Finance and Management. 12 (2), pp. 85-102. https://doi.org/10.1002/isaf.243

Article

Contextual factors associated with information systems in a virtual supply chain
Scott, Albert H. S. and Mula, Joseph M.. 2009. "Contextual factors associated with information systems in a virtual supply chain." Peng, Jie, Al-Hakim, Latif and Chen, Guoqing (ed.) COINFO 2009: 4th International Conference on Cooperation and Promotion of Information Resources in Science and Technology. Beijing, China 21 - 23 Nov 2009 China. https://doi.org/10.1109/COINFO.2009.76

Paper

Individual correlates of organizational commitment and knowledge sharing practices
Wong, Anthony, Tong, Canon and Mula, Joseph M.. 2009. "Individual correlates of organizational commitment and knowledge sharing practices." Beaumont, Nicholas (ed.) 23rd Australian and New Zealand Academy of Management Conference (ANZAM 2009). Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.

Paper

Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home
Soar, Jeffrey and Croll, Peter. 2007. "Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home." Toleman, Mark, Cater-Steel, Aileen and Roberts, Dave (ed.) 18th Australasian Conference on Information Systems (ACIS 2007). Toowoomba, Australia 05 - 07 Dec 2007 Toowoomba, Australia.

Paper

Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49

Paper

Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48

Paper

L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47

Paper

Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994

Paper

An information-driven framework for image mining
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "An information-driven framework for image mining." Mayr, Heinrich C., Lazansky, Jiri, Quirchmayr, Gerald and Vogel, Pavel (ed.) 12th International Conference on Database and Expert Systems Applications (DEXA'01). Munich, Germany 03 - 05 Sep 2001 Germany. Springer. https://doi.org/10.1007/3-540-44759-8_24

Paper

Building XML data warehouse based on frequent patterns in user queries
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2003. "Building XML data warehouse based on frequent patterns in user queries." Kambayahsi, Yahiko, Mohania, Mukesh K. and Wob, Wolfram (ed.) 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK'03). Prague, Czech Republic 03 - 05 Sep 2003 Germany. Springer. https://doi.org/10.1007/978-3-540-45228-7_11

Paper

On efficient and effective association rule mining from XML data
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert, Tjoa, A. Min and Liu, Han. 2004. "On efficient and effective association rule mining from XML data." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_48

Paper

PC-filter: a Robust filtering technique for duplicate record detection in large databases
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Liu, Han. 2004. "PC-filter: a Robust filtering technique for duplicate record detection in large databases." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_47

Paper

Special issue on computer-supported cooperative work: techniques and applications [Preface]
Yong, Jianming, Shen, Weiming and Yang, Yun. 2009. "Special issue on computer-supported cooperative work: techniques and applications [Preface]." Information Sciences. 179 (15), pp. 2513-2514. https://doi.org/10.1016/j.ins.2009.01.047

Notes or commentaries

CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09

Editorial

Gene specific co-regulation discovery: an improved approach
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "Gene specific co-regulation discovery: an improved approach." Allen, G., Nabrzyski, J., Seidel, E., van Albada, G. D., Dongarra, J. and Sloot, P. M. A. (ed.) 2009 International Conference on Computational Science (ICCS 2009): Compute. Discover. Innovate.. Baton Rouge, United States of America 25 - 27 May 2009 Germany. Springer.

Paper

Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53

Paper

Identifying major contributing sources to odour annoyance using a non-specific gas sensor array
Sohn, Jae Ho, Pioggia, Giovanni, Craig, Ian P., Stuetz, Richard M. and Atzeni, Michael G.. 2009. "Identifying major contributing sources to odour annoyance using a non-specific gas sensor array." Biosystems Engineering. 102 (3), pp. 305-312. https://doi.org/10.1016/j.biosystemseng.2008.12.010

Article

The impact of push/pull factors in information technology-facilitated knowledge transfer
Gururajan, Vijaya and Fink, Dieter. 2003. "The impact of push/pull factors in information technology-facilitated knowledge transfer." Brown, Alan (ed.) 17th Australian and New Zealand Academy of Management Conference (ANZAM 2003). Fremantle, Australia 02 - 05 Dec 2003 Australia.

Paper

Crossing the great divide: a first step toward bridging the gap between academia and industry
Darroch, Fiona and Toleman, Mark. 2004. "Crossing the great divide: a first step toward bridging the gap between academia and industry." 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.

Paper

Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39

Paper

Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715

Paper

The role of trust and dependency on e-procurement adoption: an empirical analysis
Abdullah, Nik Ab Halim Nik and Al-Hakim, Latif. 2008. "The role of trust and dependency on e-procurement adoption: an empirical analysis." Hoque, Mohammad Ziaul (ed.) 9th International Business Research Conference. Melbourne, Australia 24 - 26 Nov 2008 Melbourne, Australia.

Paper

Simulation of the middle miocene climate optimum
You, Y., Huber, M., Muller, R. D., Poulsen, C. J. and Ribbe, J.. 2009. "Simulation of the middle miocene climate optimum." Geophysical Research Letters. 36 (4), p. L04702. https://doi.org/10.1029/2008GL036571

Article

The ontological evaluation of the requirements model when shifting from a traditional to a component-based paradigm in information systems re-engineering
Valverde, Raul. 2008. The ontological evaluation of the requirements model when shifting from a traditional to a component-based paradigm in information systems re-engineering. Doctorate other than PhD Doctor of Business Administation. University of Southern Queensland.

Doctorate other than PhD

Teaching programming strategies explicitly to novice programmers
de Raadt, Michael. 2008. Teaching programming strategies explicitly to novice programmers. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Tension control of a winding machine for rectangular coils
Wen, Peng, Stapleton, Cary and Li, Yan. 2008. "Tension control of a winding machine for rectangular coils." Wen, Changyun and Pham, Thuong Cat (ed.) 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008). Hanoi, Vietnam 17 - 20 Dec 2008 United States. https://doi.org/10.1109/ICARCV.2008.4795843

Paper

Time management, improved patient expectations and added value contributing to the perceived acceptance of using wireless hand held devices in the Indian healthcare
Hafeez-Baig, Abdul and Gururajan, Raj. 2008. "Time management, improved patient expectations and added value contributing to the perceived acceptance of using wireless hand held devices in the Indian healthcare." Mills, Annette and Huff, Sid (ed.) 19th Australasian Conference on Information Systems (ACIS 2008). Christchurch, New Zealand 03 - 05 Dec 2008 Christchurch, New Zealand.

Paper

Can Chinese and Indian IT service providers cooperate to compete?
Chadee, Doren and Raman, Revti. 2007. "Can Chinese and Indian IT service providers cooperate to compete?" Parry, Ken (ed.) 21st Australian and New Zealand Academy of Management Conference (ANZAM 2007). Sydney, Australia 04 - 07 Dec 2007

Paper

Drivers for wireless technology acceptance in Indian healthcare
Gururajan, Raj. 2009. "Drivers for wireless technology acceptance in Indian healthcare." International Journal of Healthcare Delivery Reform Initiatives. 1 (1), pp. 48-62.

Article