46. Information and Computing Sciences
Title | 46. Information and Computing Sciences |
---|---|
Parent | ANZSRC Field of Research |
Latest research outputs
Sort by Date Title
Weight estimation using image analysis and statistical modelling: a preliminary study
Kollis, K., Phang, C. S., Banhazi, Thomas and Searle, Stephen J.. 2007. "Weight estimation using image analysis and statistical modelling: a preliminary study ." Applied Engineering in Agriculture. 23 (1), pp. 91-96.Article
Learning innovation for the twenty-first century
Salmon, Gilly. 2010. "Learning innovation for the twenty-first century ." Ehlers, Ulf-Daniel and Schneckenberg, Dirk (ed.) Changing cultures in higher education: moving ahead to future learning . Berlin, Germany. Springer. pp. 27-41Edited book (chapter)
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment
Hafeez-Baig, Abdul, Gururajan, Raj, Heng Sheng, Tasi and Sankaran, Prema. 2010. "Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.89Paper
The enablers and implementation model for mobile KMS in Australian healthcare
Tsai, Heng-Sheng and Gururajan, Raj. 2010. "The enablers and implementation model for mobile KMS in Australian healthcare." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.22Paper
iwork, irest, iplay: exploring youth online behaviour
Hume, Margee and Sullivan Mort, Gillian. 2009. iwork, irest, iplay: exploring youth online behaviour. Koln, Germany. Lambert Academic Publishing.Authored book
Building a mobile website
MacAlpine, Ken. 2011. "Building a mobile website." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.Presentation
Mapping a library
MacAlpine, Ken. 2011. "Mapping a library." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.Poster

Integrating mobile into existing applications
Moffatt, Sam. 2011. "Integrating mobile into existing applications." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.Presentation
Developing a five-stage model of learning in Second Life
Salmon, Gilly, Nie, Ming and Edirisingha, Palitha. 2010. "Developing a five-stage model of learning in Second Life." Educational Research. 52 (2), pp. 169-182. https://doi.org/10.1080/00131881.2010.482744Article
The power of problem-based learning in developing critical thinking skills: preparing students for tomorrow's digital futures in today's classrooms
Kek, Megan Yih Chyn A. and Huijser, Henk. 2011. "The power of problem-based learning in developing critical thinking skills: preparing students for tomorrow's digital futures in today's classrooms." Higher Education Research and Development. 30 (3), pp. 329-341. https://doi.org/10.1080/07294360.2010.501074Article
The role of IT service management in green IT
Cater-Steel, Aileen and Tan, Wui-Gee. 2010. "The role of IT service management in green IT." Australasian Journal of Information Systems. 17 (1), pp. 107-125.Article
Cooperative education in USQ networking programs with leading industry organisation and service to South-East Queensland regional IT professional
Li, Yan. 2010. "Cooperative education in USQ networking programs with leading industry organisation and service to South-East Queensland regional IT professional." Cater-Steel, Aileen and Cater, Emily (ed.) Women in engineering, science and technology: education and career challenges. Hershey, PA, United States. IGI Global. pp. 227-231Edited book (chapter)
Council community directories as a source of information about local health services in rural Australia
Eley, Rob and Hossain, Delwar. 2010. "Council community directories as a source of information about local health services in rural Australia." Journal of Community Informatics. 6 (2), pp. 1-11. https://doi.org/10.15353/joci.v6i2.2553Article
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21Paper
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111Paper
itSMF Australia 2010 Conference: summary report of ITSM standards and frameworks survey
Cater-Steel, Aileen, Tan, Wui-Gee and Toleman, Mark. 2011. itSMF Australia 2010 Conference: summary report of ITSM standards and frameworks survey. Toowoomba, Australia. University of Southern Queensland.Technical report
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007Article
Security and privacy in RFID systems: [special issue of International Journal of Security and Networks]
Wang, Hua and Jia, Xiaohua (ed.) 2010. Security and privacy in RFID systems: [special issue of International Journal of Security and Networks]. United Kingdom. Inderscience Publishers.Edited book
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239Edited book (chapter)
An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation
Nguyen-Ky, T., Leis, J. and Xiang, W.. 2010. "An improved new error estimation algorithm for optimal filter lengths for stereophonic acoustic echo cancellation." Computers and Electrical Engineering. 36 (4), pp. 664-675. https://doi.org/10.1016/jcompeleceng.2008.11.012Article
Internet access in selected aged care services in rural and regional Queensland
Soar, Jeffrey. 2010. "Internet access in selected aged care services in rural and regional Queensland." Hansen, D. P., Schaper, L. K. and Rowlands, D. (ed.) 18th Annual Health Informatics Conference: Informing the Business of Healthcare (HIC 2010). Melbourne, Australia 24 - 26 Aug 2010 Melbourne, Australia.Paper
Statistical inference
Khan, Shahjahan. 2010. "Statistical inference." Gaber, Mohamed Medhat (ed.) Scientific data mining and knowledge discovery: principles and foundations. Berlin, Germany. Springer. pp. 53-76Edited book (chapter)
Examining client perceptions of partnership quality and its dimensions in an IT outsourcing relationship
Lane, Michael S. and Lum, Weng Haan. 2010. "Examining client perceptions of partnership quality and its dimensions in an IT outsourcing relationship." Australasian Journal of Information Systems. 17 (1), pp. 47-76.Article
Cloud computing model focuses on mobile medical workstation for rural area
Su, Ying, Yin, Ling and Al-Hakim, Latif. 2010. "Cloud computing model focuses on mobile medical workstation for rural area." 2010 ISEC International Colloquium on Computing, Communication, Control, and Management. Yangzhou, China 20 - 22 Aug 2010 USA.Paper
A Cartesian-grid integrated-RBF Galerkin technique
Ho-Minh, D., Mai-Duy, N. and Tran-Cong, T.. 2010. "A Cartesian-grid integrated-RBF Galerkin technique." Sarler, Bozidar and Atluri, Satya N. (ed.) Recent studies in meshless and other novel computational methods. Duluth, GA. USA. Tech Science Press. pp. 87-102Edited book (chapter)
Towards a 100% digital teaching and learning environment: an action learning approach to creating a framework for a virtual classroom
Mula, Joseph M.. 2010. "Towards a 100% digital teaching and learning environment: an action learning approach to creating a framework for a virtual classroom." ED-MEDIA 2010: World Conference on Educational Multimedia, Hypermedia and Telecommunications 2010. Toronto, Canada 28 Jun - 02 Jul 2010 Chesapeake, VA, United States.Paper
A framework for a cyber classroom: towards a human-centric virtual classroom
Mula, Joseph M.. 2010. "A framework for a cyber classroom: towards a human-centric virtual classroom." 2010 International Conference on Internet Studies (NETs2010). Taipei, Taiwan 25 - 27 Nov 2010 Taiwan.Paper
Come the revolution: pre-service teachers' access to, attitudes toward, and skills with ICT
Albion, Peter R.. 2011. "Come the revolution: pre-service teachers' access to, attitudes toward, and skills with ICT." Koehler, Matthew and Mishra, Punya (ed.) 22nd International Conference of the Society for Information Technology and Teacher Education (SITE 2011). Nashville, United States 07 - 11 Mar 2011 Chesapeake, VA, United States.Paper
What properly validated surveys can tell us about successful implementation of small business information systems
Armstrong, Bruce, Fogarty, Gerard J. and Dingsdag, Don. 2011. "What properly validated surveys can tell us about successful implementation of small business information systems." IBS Journal of Business & Research. 2, pp. 1-19.Article
Applied machine vision in agriculture at the NCEA
McCarthy, Cheryl and Billingsley, John. 2009. "Applied machine vision in agriculture at the NCEA." Banhazi, T. M. and Saunders, C. (ed.) SEAg 2009: Agricultural Technologies In a Changing Climate. Brisbane, Australia 13 - 16 Sep 2009 Brisbane, Australia.Paper
B-spline mutual information independent component analysis
Walters-Williams, Janett and Li, Yan. 2010. "B-spline mutual information independent component analysis." International Journal of Computer Science and Network Security. 10 (7), pp. 129-141.Article
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13Paper
Comparison of extended and unscented Kalman filters applied to EEG signals
Walters-Williams, Janett and Li, Yan. 2010. "Comparison of extended and unscented Kalman filters applied to EEG signals." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558873Paper
IT service personnel: changing the culture from technology to service
Cater-Steel, Aileen. 2011. "IT service personnel: changing the culture from technology to service." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA. United States. IGI Global. pp. 183-192Edited book (chapter)
Night-time surveillance system for forensic 3D mapping
Chong, Albert K., Ariff, M. Farid M., Setan, Halim and Majid, Zulkepli. 2010. "Night-time surveillance system for forensic 3D mapping." Tan, Zheng-Hua, Wan, Yi, Xiang, Tao and Song, Yibin (ed.) CISP 2010: 3rd International Congress on Image and Signal Processing . Yantai, China 16 - 18 Oct 2010 Piscataway, NJ. United States. https://doi.org/10.1109/CISP.2010.5647674Paper
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.Article
An averaged model of dispersion of pollutant in a channel: logarithmic flow
Strunin, Dmitry V.. 2010. "An averaged model of dispersion of pollutant in a channel: logarithmic flow." Hangos, K. (ed.) 29th IASTED International Conference on Modelling, Identification and Control (MIC 2010). Innsbruck, Austria 15 - 17 Feb 2010 Calgary, Canada.Paper
An Exploratory Study to Understand the Drivers and Inhibitors for the Successful Adoption of Wireless Technology in Australian Healthcare Systems
Hafeez-Baig, Abdul and Gururajan, Raj. 2010. "An Exploratory Study to Understand the Drivers and Inhibitors for the Successful Adoption of Wireless Technology in Australian Healthcare Systems." Pease, Wayne, Cooper, Malcolm and Gururajan, Raj (ed.) Biomedical Knowledge Management: Infrastructures and Processes for E-Health Systems. Hershey, PA, USA. Medical Information Science Reference (IGI Global). pp. 267-278Edited book (chapter)
Privacy-preserving protocols for string matching
Luo, Yonglong, Shi, Lei, Zhang, Caiyun and Zhang, Ji. 2010. "Privacy-preserving protocols for string matching." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.24Paper
An efficient and effective duplication detection method in large database applications
Zhang, Ji. 2010. "An efficient and effective duplication detection method in large database applications." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.78Paper