46. Information and Computing Sciences
Title | 46. Information and Computing Sciences |
---|---|
Parent | ANZSRC Field of Research |
Latest research outputs
Sort by Date Title
Multicast based dual amplify and forward relay scheme for 2 hop networks
Adnan, Muhammad, She, Haoqiu, Wang, Yafeng, Yang, Dacheng and Xiang, Wei. 2009. "Multicast based dual amplify and forward relay scheme for 2 hop networks." Velásquez, Carlos Eduardo (ed.) LATINCOM 2009: 1st IEEE Latin-American Conference on Communications. Medellin, Colombia 10 - 11 Sep 2009 Piscataway, NJ. United States.Paper
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34Paper
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23Paper
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66Paper
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136Paper
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6Article
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132Article
Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance
Kimmins, Lindy and Stagg, Adrian. 2009. "Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance." Martin, Brian and Percy, Alisa (ed.) 4APCEI: Educational Integrity: Creating an Inclusive Approach. Wollongong, Australia 28 - 30 Sep 2009 Wollongong, Australia.Paper
Authentic learning across international borders: a cross institutional online project for pre-service teachers
Redmond, Petrea and Lock, Jennifer V.. 2009. "Authentic learning across international borders: a cross institutional online project for pre-service teachers." Maddux, Cleborne D. (ed.) Research highlights in technology and teacher education 2009. Chesapeake, VA. United States. Society for Information Technology & Teacher Education (SITE). pp. 265-273Edited book (chapter)
Creating an eResearch desktop for the Humanities
Dickinson, Duncan and Sefton, Peter. 2009. "Creating an eResearch desktop for the Humanities." eResearch Australasia 2009. Sydney, AustraliaPresentation
Machine-independent audit trail analysis - a tool for continuous audit assurance
Best, Peter J.. 2004. "Machine-independent audit trail analysis - a tool for continuous audit assurance." Intelligent Systems in Accounting, Finance and Management. 12 (2), pp. 85-102. https://doi.org/10.1002/isaf.243Article
Contextual factors associated with information systems in a virtual supply chain
Scott, Albert H. S. and Mula, Joseph M.. 2009. "Contextual factors associated with information systems in a virtual supply chain." Peng, Jie, Al-Hakim, Latif and Chen, Guoqing (ed.) COINFO 2009: 4th International Conference on Cooperation and Promotion of Information Resources in Science and Technology. Beijing, China 21 - 23 Nov 2009 China. https://doi.org/10.1109/COINFO.2009.76Paper
Individual correlates of organizational commitment and knowledge sharing practices
Wong, Anthony, Tong, Canon and Mula, Joseph M.. 2009. "Individual correlates of organizational commitment and knowledge sharing practices." Beaumont, Nicholas (ed.) 23rd Australian and New Zealand Academy of Management Conference (ANZAM 2009). Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.Paper
Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home
Soar, Jeffrey and Croll, Peter. 2007. "Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home." Toleman, Mark, Cater-Steel, Aileen and Roberts, Dave (ed.) 18th Australasian Conference on Information Systems (ACIS 2007). Toowoomba, Australia 05 - 07 Dec 2007 Toowoomba, Australia.Paper
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49Paper
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48Paper
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47Paper
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994Paper
An information-driven framework for image mining
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "An information-driven framework for image mining." Mayr, Heinrich C., Lazansky, Jiri, Quirchmayr, Gerald and Vogel, Pavel (ed.) 12th International Conference on Database and Expert Systems Applications (DEXA'01). Munich, Germany 03 - 05 Sep 2001 Germany. Springer. https://doi.org/10.1007/3-540-44759-8_24Paper
Building XML data warehouse based on frequent patterns in user queries
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2003. "Building XML data warehouse based on frequent patterns in user queries." Kambayahsi, Yahiko, Mohania, Mukesh K. and Wob, Wolfram (ed.) 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK'03). Prague, Czech Republic 03 - 05 Sep 2003 Germany. Springer. https://doi.org/10.1007/978-3-540-45228-7_11Paper
On efficient and effective association rule mining from XML data
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert, Tjoa, A. Min and Liu, Han. 2004. "On efficient and effective association rule mining from XML data." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_48Paper
PC-filter: a Robust filtering technique for duplicate record detection in large databases
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Liu, Han. 2004. "PC-filter: a Robust filtering technique for duplicate record detection in large databases." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_47Paper
Special issue on computer-supported cooperative work: techniques and applications [Preface]
Yong, Jianming, Shen, Weiming and Yang, Yun. 2009. "Special issue on computer-supported cooperative work: techniques and applications [Preface]." Information Sciences. 179 (15), pp. 2513-2514. https://doi.org/10.1016/j.ins.2009.01.047Notes or commentaries
CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09Editorial
Gene specific co-regulation discovery: an improved approach
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "Gene specific co-regulation discovery: an improved approach." Allen, G., Nabrzyski, J., Seidel, E., van Albada, G. D., Dongarra, J. and Sloot, P. M. A. (ed.) 2009 International Conference on Computational Science (ICCS 2009): Compute. Discover. Innovate.. Baton Rouge, United States of America 25 - 27 May 2009 Germany. Springer.Paper
Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53Paper
Identifying major contributing sources to odour annoyance using a non-specific gas sensor array
Sohn, Jae Ho, Pioggia, Giovanni, Craig, Ian P., Stuetz, Richard M. and Atzeni, Michael G.. 2009. "Identifying major contributing sources to odour annoyance using a non-specific gas sensor array." Biosystems Engineering. 102 (3), pp. 305-312. https://doi.org/10.1016/j.biosystemseng.2008.12.010Article
The impact of push/pull factors in information technology-facilitated knowledge transfer
Gururajan, Vijaya and Fink, Dieter. 2003. "The impact of push/pull factors in information technology-facilitated knowledge transfer." Brown, Alan (ed.) 17th Australian and New Zealand Academy of Management Conference (ANZAM 2003). Fremantle, Australia 02 - 05 Dec 2003 Australia.Paper
Crossing the great divide: a first step toward bridging the gap between academia and industry
Darroch, Fiona and Toleman, Mark. 2004. "Crossing the great divide: a first step toward bridging the gap between academia and industry." 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.Paper
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39Paper
Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715Paper
The role of trust and dependency on e-procurement adoption: an empirical analysis
Abdullah, Nik Ab Halim Nik and Al-Hakim, Latif. 2008. "The role of trust and dependency on e-procurement adoption: an empirical analysis." Hoque, Mohammad Ziaul (ed.) 9th International Business Research Conference. Melbourne, Australia 24 - 26 Nov 2008 Melbourne, Australia.Paper
Simulation of the middle miocene climate optimum
You, Y., Huber, M., Muller, R. D., Poulsen, C. J. and Ribbe, J.. 2009. "Simulation of the middle miocene climate optimum." Geophysical Research Letters. 36 (4), p. L04702. https://doi.org/10.1029/2008GL036571Article
The ontological evaluation of the requirements model when shifting from a traditional to a component-based paradigm in information systems re-engineering
Valverde, Raul. 2008. The ontological evaluation of the requirements model when shifting from a traditional to a component-based paradigm in information systems re-engineering. Doctorate other than PhD Doctor of Business Administation. University of Southern Queensland.Doctorate other than PhD
Teaching programming strategies explicitly to novice programmers
de Raadt, Michael. 2008. Teaching programming strategies explicitly to novice programmers. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Tension control of a winding machine for rectangular coils
Wen, Peng, Stapleton, Cary and Li, Yan. 2008. "Tension control of a winding machine for rectangular coils." Wen, Changyun and Pham, Thuong Cat (ed.) 10th International Conference on Control, Automation, Robotics and Vision (ICARCV 2008). Hanoi, Vietnam 17 - 20 Dec 2008 United States. https://doi.org/10.1109/ICARCV.2008.4795843Paper
Time management, improved patient expectations and added value contributing to the perceived acceptance of using wireless hand held devices in the Indian healthcare
Hafeez-Baig, Abdul and Gururajan, Raj. 2008. "Time management, improved patient expectations and added value contributing to the perceived acceptance of using wireless hand held devices in the Indian healthcare." Mills, Annette and Huff, Sid (ed.) 19th Australasian Conference on Information Systems (ACIS 2008). Christchurch, New Zealand 03 - 05 Dec 2008 Christchurch, New Zealand.Paper
Can Chinese and Indian IT service providers cooperate to compete?
Chadee, Doren and Raman, Revti. 2007. "Can Chinese and Indian IT service providers cooperate to compete?" Parry, Ken (ed.) 21st Australian and New Zealand Academy of Management Conference (ANZAM 2007). Sydney, Australia 04 - 07 Dec 2007Paper
Drivers for wireless technology acceptance in Indian healthcare
Gururajan, Raj. 2009. "Drivers for wireless technology acceptance in Indian healthcare." International Journal of Healthcare Delivery Reform Initiatives. 1 (1), pp. 48-62.Article