46. Information and Computing Sciences


Title46. Information and Computing Sciences
ParentANZSRC Field of Research

Latest research outputs

Sort by Date Title
Minimum packet drop sequences based networked control system model with embedded Markov chain
Wen, Peng and Li, Yan. 2009. "Minimum packet drop sequences based networked control system model with embedded Markov chain." Simulation Modelling Practice and Theory. 17 (10), pp. 1635-1641. https://doi.org/10.1016/j.simpat.2009.07.003

Article

Agricultural robotics
Billingsley, John, Oetomo, Denny and Reid, John. 2009. "Agricultural robotics." IEEE Robotics and Automation magazine. 16 (4), pp. 16, cont-19. https://doi.org/10.1109/MRA.2009.934829

Article

PID controller evaluation with missing samples in a networked control system using spline interpolation method
Ghude, Sarang and Wen, Paul. 2009. "PID controller evaluation with missing samples in a networked control system using spline interpolation method." Chan, Lee Soon (ed.) International Conference on Computer and Automation Engineering (ICCAE 2009). Bangkok, Thailand 08 - 10 Mar 2009 United States. https://doi.org/10.1109/ICCAE.2009.76

Paper

An analysis of information security in selected Australian organisations
Darragh, Warren J.. 2009. An analysis of information security in selected Australian organisations. Masters Thesis Master of Information Technology (Research). University of Southern Queensland.

Masters Thesis

An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects
Cochrane, Sandra, Goh, Steven and Ku, Harry. 2009. "An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects." Kestell, Colin, Grainger, Steven and Cheung, John (ed.) 20th Annual Conference for the Australasian Association of Engineering Education (AAEE 2009). Adelaide, Australia 06 - 09 Dec 2009 Adelaide, Australia.

Paper

Forward error correction-based 2-D layered multiple description coding for error-resilient H.264 SVC video transmission
Xiang, Wei, Zhu, Ce, Siew, Chee Kheong, Xu, Yuanyuan and Liu, Minglei. 2009. "Forward error correction-based 2-D layered multiple description coding for error-resilient H.264 SVC video transmission." IEEE Transactions on Circuits and Systems for Video Technology. 19 (12), pp. 1730-1738. https://doi.org/10.1109/TCSVT.2009.2022787

Article

Using institutionalism as a lens to examine ITIL adoption and diffusion
Cater-Steel, Aileen, Tan, Wui-Gee and Toleman, Mark. 2009. "Using institutionalism as a lens to examine ITIL adoption and diffusion." Scheepers, Helana and Davern, Michael (ed.) 20th Australasian Conference on Information Systems (ACIS 2009). Melbourne, Australia 02 - 04 Dec 2009 Melbourne, Australia.

Paper

A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Xiang, Wei, Desai, Bhavin, Wen, Paul, Wang, Yafeng and Peng, Tianshu. 2009. "A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition." Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_33

Paper

Multicast based dual amplify and forward relay scheme for 2 hop networks
Adnan, Muhammad, She, Haoqiu, Wang, Yafeng, Yang, Dacheng and Xiang, Wei. 2009. "Multicast based dual amplify and forward relay scheme for 2 hop networks." Velásquez, Carlos Eduardo (ed.) LATINCOM 2009: 1st IEEE Latin-American Conference on Communications. Medellin, Colombia 10 - 11 Sep 2009 Piscataway, NJ. United States.

Paper

Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66

Paper

Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136

Paper

Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132

Article

Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance
Kimmins, Lindy and Stagg, Adrian. 2009. "Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance." Martin, Brian and Percy, Alisa (ed.) 4APCEI: Educational Integrity: Creating an Inclusive Approach. Wollongong, Australia 28 - 30 Sep 2009 Wollongong, Australia.

Paper

Authentic learning across international borders: a cross institutional online project for pre-service teachers
Redmond, Petrea and Lock, Jennifer V.. 2009. "Authentic learning across international borders: a cross institutional online project for pre-service teachers." Maddux, Cleborne D. (ed.) Research highlights in technology and teacher education 2009. Chesapeake, VA. United States. Society for Information Technology & Teacher Education (SITE). pp. 265-273

Edited book (chapter)

Creating an eResearch desktop for the Humanities
Dickinson, Duncan and Sefton, Peter. 2009. "Creating an eResearch desktop for the Humanities." eResearch Australasia 2009. Sydney, Australia

Presentation

Machine-independent audit trail analysis - a tool for continuous audit assurance
Best, Peter J.. 2004. "Machine-independent audit trail analysis - a tool for continuous audit assurance." Intelligent Systems in Accounting, Finance and Management. 12 (2), pp. 85-102. https://doi.org/10.1002/isaf.243

Article

Contextual factors associated with information systems in a virtual supply chain
Scott, Albert H. S. and Mula, Joseph M.. 2009. "Contextual factors associated with information systems in a virtual supply chain." Peng, Jie, Al-Hakim, Latif and Chen, Guoqing (ed.) COINFO 2009: 4th International Conference on Cooperation and Promotion of Information Resources in Science and Technology. Beijing, China 21 - 23 Nov 2009 China. https://doi.org/10.1109/COINFO.2009.76

Paper

Individual correlates of organizational commitment and knowledge sharing practices
Wong, Anthony, Tong, Canon and Mula, Joseph M.. 2009. "Individual correlates of organizational commitment and knowledge sharing practices." Beaumont, Nicholas (ed.) 23rd Australian and New Zealand Academy of Management Conference (ANZAM 2009). Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.

Paper

Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home
Soar, Jeffrey and Croll, Peter. 2007. "Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home." Toleman, Mark, Cater-Steel, Aileen and Roberts, Dave (ed.) 18th Australasian Conference on Information Systems (ACIS 2007). Toowoomba, Australia 05 - 07 Dec 2007 Toowoomba, Australia.

Paper

Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49

Paper

Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48

Paper

L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47

Paper

Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994

Paper

An information-driven framework for image mining
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "An information-driven framework for image mining." Mayr, Heinrich C., Lazansky, Jiri, Quirchmayr, Gerald and Vogel, Pavel (ed.) 12th International Conference on Database and Expert Systems Applications (DEXA'01). Munich, Germany 03 - 05 Sep 2001 Germany. Springer. https://doi.org/10.1007/3-540-44759-8_24

Paper

Building XML data warehouse based on frequent patterns in user queries
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2003. "Building XML data warehouse based on frequent patterns in user queries." Kambayahsi, Yahiko, Mohania, Mukesh K. and Wob, Wolfram (ed.) 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK'03). Prague, Czech Republic 03 - 05 Sep 2003 Germany. Springer. https://doi.org/10.1007/978-3-540-45228-7_11

Paper

On efficient and effective association rule mining from XML data
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert, Tjoa, A. Min and Liu, Han. 2004. "On efficient and effective association rule mining from XML data." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_48

Paper

PC-filter: a Robust filtering technique for duplicate record detection in large databases
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Liu, Han. 2004. "PC-filter: a Robust filtering technique for duplicate record detection in large databases." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_47

Paper

Special issue on computer-supported cooperative work: techniques and applications [Preface]
Yong, Jianming, Shen, Weiming and Yang, Yun. 2009. "Special issue on computer-supported cooperative work: techniques and applications [Preface]." Information Sciences. 179 (15), pp. 2513-2514. https://doi.org/10.1016/j.ins.2009.01.047

Notes or commentaries

CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09

Editorial

Gene specific co-regulation discovery: an improved approach
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "Gene specific co-regulation discovery: an improved approach." Allen, G., Nabrzyski, J., Seidel, E., van Albada, G. D., Dongarra, J. and Sloot, P. M. A. (ed.) 2009 International Conference on Computational Science (ICCS 2009): Compute. Discover. Innovate.. Baton Rouge, United States of America 25 - 27 May 2009 Germany. Springer.

Paper

Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53

Paper

Identifying major contributing sources to odour annoyance using a non-specific gas sensor array
Sohn, Jae Ho, Pioggia, Giovanni, Craig, Ian P., Stuetz, Richard M. and Atzeni, Michael G.. 2009. "Identifying major contributing sources to odour annoyance using a non-specific gas sensor array." Biosystems Engineering. 102 (3), pp. 305-312. https://doi.org/10.1016/j.biosystemseng.2008.12.010

Article

The impact of push/pull factors in information technology-facilitated knowledge transfer
Gururajan, Vijaya and Fink, Dieter. 2003. "The impact of push/pull factors in information technology-facilitated knowledge transfer." Brown, Alan (ed.) 17th Australian and New Zealand Academy of Management Conference (ANZAM 2003). Fremantle, Australia 02 - 05 Dec 2003 Australia.

Paper

Crossing the great divide: a first step toward bridging the gap between academia and industry
Darroch, Fiona and Toleman, Mark. 2004. "Crossing the great divide: a first step toward bridging the gap between academia and industry." 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.

Paper

Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39

Paper

Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715

Paper