46. Information and Computing Sciences


Title46. Information and Computing Sciences
ParentANZSRC Field of Research

Latest research outputs

Sort by Date Title
Weight estimation using image analysis and statistical modelling: a preliminary study
Kollis, K., Phang, C. S., Banhazi, Thomas and Searle, Stephen J.. 2007. "Weight estimation using image analysis and statistical modelling: a preliminary study ." Applied Engineering in Agriculture. 23 (1), pp. 91-96.

Article

Learning innovation for the twenty-first century
Salmon, Gilly. 2010. "Learning innovation for the twenty-first century ." Ehlers, Ulf-Daniel and Schneckenberg, Dirk (ed.) Changing cultures in higher education: moving ahead to future learning . Berlin, Germany. Springer. pp. 27-41

Edited book (chapter)

Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment
Hafeez-Baig, Abdul, Gururajan, Raj, Heng Sheng, Tasi and Sankaran, Prema. 2010. "Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.89

Paper

The enablers and implementation model for mobile KMS in Australian healthcare
Tsai, Heng-Sheng and Gururajan, Raj. 2010. "The enablers and implementation model for mobile KMS in Australian healthcare." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.22

Paper

iwork, irest, iplay: exploring youth online behaviour
Hume, Margee and Sullivan Mort, Gillian. 2009. iwork, irest, iplay: exploring youth online behaviour. Koln, Germany. Lambert Academic Publishing.

Authored book

Building a mobile website
MacAlpine, Ken. 2011. "Building a mobile website." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Presentation

Mapping a library
MacAlpine, Ken. 2011. "Mapping a library." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Poster

Integrating mobile into existing applications
Moffatt, Sam. 2011. "Integrating mobile into existing applications." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Presentation

Developing a five-stage model of learning in Second Life
Salmon, Gilly, Nie, Ming and Edirisingha, Palitha. 2010. "Developing a five-stage model of learning in Second Life." Educational Research. 52 (2), pp. 169-182. https://doi.org/10.1080/00131881.2010.482744

Article

The power of problem-based learning in developing critical thinking skills: preparing students for tomorrow's digital futures in today's classrooms
Kek, Megan Yih Chyn A. and Huijser, Henk. 2011. "The power of problem-based learning in developing critical thinking skills: preparing students for tomorrow's digital futures in today's classrooms." Higher Education Research and Development. 30 (3), pp. 329-341. https://doi.org/10.1080/07294360.2010.501074

Article

The role of IT service management in green IT
Cater-Steel, Aileen and Tan, Wui-Gee. 2010. "The role of IT service management in green IT." Australasian Journal of Information Systems. 17 (1), pp. 107-125.

Article

Cooperative education in USQ networking programs with leading industry organisation and service to South-East Queensland regional IT professional
Li, Yan. 2010. "Cooperative education in USQ networking programs with leading industry organisation and service to South-East Queensland regional IT professional." Cater-Steel, Aileen and Cater, Emily (ed.) Women in engineering, science and technology: education and career challenges. Hershey, PA, United States. IGI Global. pp. 227-231

Edited book (chapter)

Council community directories as a source of information about local health services in rural Australia
Eley, Rob and Hossain, Delwar. 2010. "Council community directories as a source of information about local health services in rural Australia." Journal of Community Informatics. 6 (2), pp. 1-11. https://doi.org/10.15353/joci.v6i2.2553

Article

Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21

Paper

A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111

Paper

itSMF Australia 2010 Conference: summary report of ITSM standards and frameworks survey
Cater-Steel, Aileen, Tan, Wui-Gee and Toleman, Mark. 2011. itSMF Australia 2010 Conference: summary report of ITSM standards and frameworks survey. Toowoomba, Australia. University of Southern Queensland.

Technical report

A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007

Article

Security and privacy in RFID systems: [special issue of International Journal of Security and Networks]
Wang, Hua and Jia, Xiaohua (ed.) 2010. Security and privacy in RFID systems: [special issue of International Journal of Security and Networks]. United Kingdom. Inderscience Publishers.

Edited book

Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239

Edited book (chapter)

An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation
Nguyen-Ky, T., Leis, J. and Xiang, W.. 2010. "An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation." Computers and Electrical Engineering. 36 (4), pp. 664-675. https://doi.org/10.1016/jcompeleceng.2008.11.012

Article

Internet access in selected aged care services in rural and regional Queensland
Soar, Jeffrey. 2010. "Internet access in selected aged care services in rural and regional Queensland." Hansen, D. P., Schaper, L. K. and Rowlands, D. (ed.) 18th Annual Health Informatics Conference: Informing the Business of Healthcare (HIC 2010). Melbourne, Australia 24 - 26 Aug 2010 Melbourne, Australia.

Paper

Statistical inference
Khan, Shahjahan. 2010. "Statistical inference." Gaber, Mohamed Medhat (ed.) Scientific data mining and knowledge discovery: principles and foundations. Berlin, Germany. Springer. pp. 53-76

Edited book (chapter)

Examining client perceptions of partnership quality and its dimensions in an IT outsourcing relationship
Lane, Michael S. and Lum, Weng Haan. 2010. "Examining client perceptions of partnership quality and its dimensions in an IT outsourcing relationship." Australasian Journal of Information Systems. 17 (1), pp. 47-76.

Article

Cloud computing model focuses on mobile medical workstation for rural area
Su, Ying, Yin, Ling and Al-Hakim, Latif. 2010. "Cloud computing model focuses on mobile medical workstation for rural area." 2010 ISEC International Colloquium on Computing, Communication, Control, and Management. Yangzhou, China 20 - 22 Aug 2010 USA.

Paper

A Cartesian-grid integrated-RBF Galerkin technique
Ho-Minh, D., Mai-Duy, N. and Tran-Cong, T.. 2010. "A Cartesian-grid integrated-RBF Galerkin technique." Sarler, Bozidar and Atluri, Satya N. (ed.) Recent studies in meshless and other novel computational methods. Duluth, GA. USA. Tech Science Press. pp. 87-102

Edited book (chapter)

Towards a 100% digital teaching and learning environment: an action learning approach to creating a framework for a virtual classroom
Mula, Joseph M.. 2010. "Towards a 100% digital teaching and learning environment: an action learning approach to creating a framework for a virtual classroom." ED-MEDIA 2010: World Conference on Educational Multimedia, Hypermedia and Telecommunications 2010. Toronto, Canada 28 Jun - 02 Jul 2010 Chesapeake, VA, United States.

Paper

A framework for a cyber classroom: towards a human-centric virtual classroom
Mula, Joseph M.. 2010. "A framework for a cyber classroom: towards a human-centric virtual classroom." 2010 International Conference on Internet Studies (NETs2010). Taipei, Taiwan 25 - 27 Nov 2010 Taiwan.

Paper

Come the revolution: pre-service teachers' access to, attitudes toward, and skills with ICT
Albion, Peter R.. 2011. "Come the revolution: pre-service teachers' access to, attitudes toward, and skills with ICT." Koehler, Matthew and Mishra, Punya (ed.) 22nd International Conference of the Society for Information Technology and Teacher Education (SITE 2011). Nashville, United States 07 - 11 Mar 2011 Chesapeake, VA, United States.

Paper

What properly validated surveys can tell us about successful implementation of small business information systems
Armstrong, Bruce, Fogarty, Gerard J. and Dingsdag, Don. 2011. "What properly validated surveys can tell us about successful implementation of small business information systems." IBS Journal of Business & Research. 2, pp. 1-19.

Article

Applied machine vision in agriculture at the NCEA
McCarthy, Cheryl and Billingsley, John. 2009. "Applied machine vision in agriculture at the NCEA." Banhazi, T. M. and Saunders, C. (ed.) SEAg 2009: Agricultural Technologies In a Changing Climate. Brisbane, Australia 13 - 16 Sep 2009 Brisbane, Australia.

Paper

B-spline mutual information independent component analysis
Walters-Williams, Janett and Li, Yan. 2010. "B-spline mutual information independent component analysis." International Journal of Computer Science and Network Security. 10 (7), pp. 129-141.

Article

Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13

Paper

Comparison of extended and unscented Kalman filters applied to EEG signals
Walters-Williams, Janett and Li, Yan. 2010. "Comparison of extended and unscented Kalman filters applied to EEG signals." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558873

Paper

IT service personnel: changing the culture from technology to service
Cater-Steel, Aileen. 2011. "IT service personnel: changing the culture from technology to service." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA. United States. IGI Global. pp. 183-192

Edited book (chapter)

Night-time surveillance system for forensic 3D mapping
Chong, Albert K., Ariff, M. Farid M., Setan, Halim and Majid, Zulkepli. 2010. "Night-time surveillance system for forensic 3D mapping." Tan, Zheng-Hua, Wan, Yi, Xiang, Tao and Song, Yibin (ed.) CISP 2010: 3rd International Congress on Image and Signal Processing . Yantai, China 16 - 18 Oct 2010 Piscataway, NJ. United States. https://doi.org/10.1109/CISP.2010.5647674

Paper

A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.

Article

An averaged model of dispersion of pollutant in a channel: logarithmic flow
Strunin, Dmitry V.. 2010. "An averaged model of dispersion of pollutant in a channel: logarithmic flow." Hangos, K. (ed.) 29th IASTED International Conference on Modelling, Identification and Control (MIC 2010). Innsbruck, Austria 15 - 17 Feb 2010 Calgary, Canada.

Paper

An Exploratory Study to Understand the Drivers and Inhibitors for the Successful Adoption of Wireless Technology in Australian Healthcare Systems
Hafeez-Baig, Abdul and Gururajan, Raj. 2010. "An Exploratory Study to Understand the Drivers and Inhibitors for the Successful Adoption of Wireless Technology in Australian Healthcare Systems." Pease, Wayne, Cooper, Malcolm and Gururajan, Raj (ed.) Biomedical Knowledge Management: Infrastructures and Processes for E-Health Systems. Hershey, PA, USA. Medical Information Science Reference (IGI Global). pp. 267-278

Edited book (chapter)

Privacy-preserving protocols for string matching
Luo, Yonglong, Shi, Lei, Zhang, Caiyun and Zhang, Ji. 2010. "Privacy-preserving protocols for string matching." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.24

Paper

An efficient and effective duplication detection method in large database applications
Zhang, Ji. 2010. "An efficient and effective duplication detection method in large database applications." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.78

Paper