46. Information and Computing Sciences
| Title | 46. Information and Computing Sciences |
|---|---|
| Parent | ANZSRC Field of Research |
Latest research outputs
Sort by Date Title
Minimum packet drop sequences based networked control system model with embedded Markov chain
Wen, Peng and Li, Yan. 2009. "Minimum packet drop sequences based networked control system model with embedded Markov chain." Simulation Modelling Practice and Theory. 17 (10), pp. 1635-1641. https://doi.org/10.1016/j.simpat.2009.07.003Article
Agricultural robotics
Billingsley, John, Oetomo, Denny and Reid, John. 2009. "Agricultural robotics." IEEE Robotics and Automation magazine. 16 (4), pp. 16, cont-19. https://doi.org/10.1109/MRA.2009.934829Article
PID controller evaluation with missing samples in a networked control system using spline interpolation method
Ghude, Sarang and Wen, Paul. 2009. "PID controller evaluation with missing samples in a networked control system using spline interpolation method." Chan, Lee Soon (ed.) International Conference on Computer and Automation Engineering (ICCAE 2009). Bangkok, Thailand 08 - 10 Mar 2009 United States. https://doi.org/10.1109/ICCAE.2009.76Paper
An analysis of information security in selected Australian organisations
Darragh, Warren J.. 2009. An analysis of information security in selected Australian organisations. Masters Thesis Master of Information Technology (Research). University of Southern Queensland.Masters Thesis
An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects
Cochrane, Sandra, Goh, Steven and Ku, Harry. 2009. "An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects." Kestell, Colin, Grainger, Steven and Cheung, John (ed.) 20th Annual Conference for the Australasian Association of Engineering Education (AAEE 2009). Adelaide, Australia 06 - 09 Dec 2009 Adelaide, Australia.Paper
Forward error correction-based 2-D layered multiple description coding for error-resilient H.264 SVC video transmission
Xiang, Wei, Zhu, Ce, Siew, Chee Kheong, Xu, Yuanyuan and Liu, Minglei. 2009. "Forward error correction-based 2-D layered multiple description coding for error-resilient H.264 SVC video transmission." IEEE Transactions on Circuits and Systems for Video Technology. 19 (12), pp. 1730-1738. https://doi.org/10.1109/TCSVT.2009.2022787Article
Using institutionalism as a lens to examine ITIL adoption and diffusion
Cater-Steel, Aileen, Tan, Wui-Gee and Toleman, Mark. 2009. "Using institutionalism as a lens to examine ITIL adoption and diffusion." Scheepers, Helana and Davern, Michael (ed.) 20th Australasian Conference on Information Systems (ACIS 2009). Melbourne, Australia 02 - 04 Dec 2009 Melbourne, Australia.Paper
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Xiang, Wei, Desai, Bhavin, Wen, Paul, Wang, Yafeng and Peng, Tianshu. 2009. "A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition." Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_33Paper
Multicast based dual amplify and forward relay scheme for 2 hop networks
Adnan, Muhammad, She, Haoqiu, Wang, Yafeng, Yang, Dacheng and Xiang, Wei. 2009. "Multicast based dual amplify and forward relay scheme for 2 hop networks." Velásquez, Carlos Eduardo (ed.) LATINCOM 2009: 1st IEEE Latin-American Conference on Communications. Medellin, Colombia 10 - 11 Sep 2009 Piscataway, NJ. United States.Paper
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34Paper
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23Paper
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66Paper
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136Paper
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6Article
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132Article
Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance
Kimmins, Lindy and Stagg, Adrian. 2009. "Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance." Martin, Brian and Percy, Alisa (ed.) 4APCEI: Educational Integrity: Creating an Inclusive Approach. Wollongong, Australia 28 - 30 Sep 2009 Wollongong, Australia.Paper
Authentic learning across international borders: a cross institutional online project for pre-service teachers
Redmond, Petrea and Lock, Jennifer V.. 2009. "Authentic learning across international borders: a cross institutional online project for pre-service teachers." Maddux, Cleborne D. (ed.) Research highlights in technology and teacher education 2009. Chesapeake, VA. United States. Society for Information Technology & Teacher Education (SITE). pp. 265-273Edited book (chapter)
Creating an eResearch desktop for the Humanities
Dickinson, Duncan and Sefton, Peter. 2009. "Creating an eResearch desktop for the Humanities." eResearch Australasia 2009. Sydney, AustraliaPresentation
Machine-independent audit trail analysis - a tool for continuous audit assurance
Best, Peter J.. 2004. "Machine-independent audit trail analysis - a tool for continuous audit assurance." Intelligent Systems in Accounting, Finance and Management. 12 (2), pp. 85-102. https://doi.org/10.1002/isaf.243Article
Contextual factors associated with information systems in a virtual supply chain
Scott, Albert H. S. and Mula, Joseph M.. 2009. "Contextual factors associated with information systems in a virtual supply chain." Peng, Jie, Al-Hakim, Latif and Chen, Guoqing (ed.) COINFO 2009: 4th International Conference on Cooperation and Promotion of Information Resources in Science and Technology. Beijing, China 21 - 23 Nov 2009 China. https://doi.org/10.1109/COINFO.2009.76Paper
Individual correlates of organizational commitment and knowledge sharing practices
Wong, Anthony, Tong, Canon and Mula, Joseph M.. 2009. "Individual correlates of organizational commitment and knowledge sharing practices." Beaumont, Nicholas (ed.) 23rd Australian and New Zealand Academy of Management Conference (ANZAM 2009). Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.Paper
Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home
Soar, Jeffrey and Croll, Peter. 2007. "Assistive technologies for the frail elderly, chronic illness sufferers and people with disabilities - a case study of the development of a Smart Home." Toleman, Mark, Cater-Steel, Aileen and Roberts, Dave (ed.) 18th Australasian Conference on Information Systems (ACIS 2007). Toowoomba, Australia 05 - 07 Dec 2007 Toowoomba, Australia.Paper
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49Paper
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48Paper
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47Paper
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994Paper
An information-driven framework for image mining
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "An information-driven framework for image mining." Mayr, Heinrich C., Lazansky, Jiri, Quirchmayr, Gerald and Vogel, Pavel (ed.) 12th International Conference on Database and Expert Systems Applications (DEXA'01). Munich, Germany 03 - 05 Sep 2001 Germany. Springer. https://doi.org/10.1007/3-540-44759-8_24Paper
Building XML data warehouse based on frequent patterns in user queries
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2003. "Building XML data warehouse based on frequent patterns in user queries." Kambayahsi, Yahiko, Mohania, Mukesh K. and Wob, Wolfram (ed.) 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK'03). Prague, Czech Republic 03 - 05 Sep 2003 Germany. Springer. https://doi.org/10.1007/978-3-540-45228-7_11Paper
On efficient and effective association rule mining from XML data
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert, Tjoa, A. Min and Liu, Han. 2004. "On efficient and effective association rule mining from XML data." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_48Paper
PC-filter: a Robust filtering technique for duplicate record detection in large databases
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Liu, Han. 2004. "PC-filter: a Robust filtering technique for duplicate record detection in large databases." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_47Paper
Special issue on computer-supported cooperative work: techniques and applications [Preface]
Yong, Jianming, Shen, Weiming and Yang, Yun. 2009. "Special issue on computer-supported cooperative work: techniques and applications [Preface]." Information Sciences. 179 (15), pp. 2513-2514. https://doi.org/10.1016/j.ins.2009.01.047Notes or commentaries
CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09Editorial
Gene specific co-regulation discovery: an improved approach
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "Gene specific co-regulation discovery: an improved approach." Allen, G., Nabrzyski, J., Seidel, E., van Albada, G. D., Dongarra, J. and Sloot, P. M. A. (ed.) 2009 International Conference on Computational Science (ICCS 2009): Compute. Discover. Innovate.. Baton Rouge, United States of America 25 - 27 May 2009 Germany. Springer.Paper
Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53Paper
Identifying major contributing sources to odour annoyance using a non-specific gas sensor array
Sohn, Jae Ho, Pioggia, Giovanni, Craig, Ian P., Stuetz, Richard M. and Atzeni, Michael G.. 2009. "Identifying major contributing sources to odour annoyance using a non-specific gas sensor array." Biosystems Engineering. 102 (3), pp. 305-312. https://doi.org/10.1016/j.biosystemseng.2008.12.010Article
The impact of push/pull factors in information technology-facilitated knowledge transfer
Gururajan, Vijaya and Fink, Dieter. 2003. "The impact of push/pull factors in information technology-facilitated knowledge transfer." Brown, Alan (ed.) 17th Australian and New Zealand Academy of Management Conference (ANZAM 2003). Fremantle, Australia 02 - 05 Dec 2003 Australia.Paper
Crossing the great divide: a first step toward bridging the gap between academia and industry
Darroch, Fiona and Toleman, Mark. 2004. "Crossing the great divide: a first step toward bridging the gap between academia and industry." 15th Australasian Conference on Information Systems (ACIS 2004). Hobart, Australia 01 - 03 Dec 2004 Hobart, Australia.Paper
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39Paper
Non-linear echo cancellation - a Bayesian approach
Braithwaite, Stephen and Addie, Ron. 2009. "Non-linear echo cancellation - a Bayesian approach." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813715Paper