46. Information and Computing Sciences
Title | 46. Information and Computing Sciences |
---|---|
Parent | ANZSRC Field of Research |
Latest research outputs
Sort by Date Title
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166Poster
Internet software piracy in China: a user analysis of resistance to global software copyright enforcement
Lu, Jia and Weber, Ian. 2009. "Internet software piracy in China: a user analysis of resistance to global software copyright enforcement." Journal of International and Intercultural Communication. 2 (4), pp. 298-317. https://doi.org/10.1080/17513050903177300Article
Summer of Code 2009
Moffatt, Sam. 2009. "Summer of Code 2009." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.Presentation
Mechatronics and machine vision 2005
Billingsley, John (ed.) 2005. Mechatronics and machine vision 2005. Hertfordshire, England. Research Studies Press.Edited book
Non-layered human head model for EEG
Wen, Peng and Li, Yan. 2003. "Non-layered human head model for EEG." IEEE EMBS Asian-Pacific Conference on Biomedical Engineering (2003). Kyoto, Japan 20 - 22 Oct 2003 Piscataway, NJ, United States.Paper
A face recognition system on distributed evolutionary computing using on-line GA
Young, Nam Mi, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "A face recognition system on distributed evolutionary computing using on-line GA." Huang, D., Li, K. and Irwin, G.W. (ed.) Intelligent Control and Automation: International Conference on Intelligent Computing ( ICIC 2006) Kunming, China, August, 2006. Kunming,China Aug 2006 Berlin / Heidelberg. https://doi.org/10.1007/978-3-540-37258-5_2Paper
Real time face detection system based edge restoration and nested K-means at frontal view
Joo, Hyun Jea, Jang, Bong Won, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "Real time face detection system based edge restoration and nested K-means at frontal view." Wang, Lipo (ed.) 3rd International Conference on Fuzzy Systems and Knowledge Discovery . Xi'an, China 24 - 28 Sep 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11881599_148Paper
Adaptive context-aware filter fusion for face recognition on bad illumination
Young, Nam Mi, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "Adaptive context-aware filter fusion for face recognition on bad illumination." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) KES 2006: 10th International Conference on Knowlege-Based Intelligent Information and Engineering Systems . Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11892960_65Paper
Adaptive classifier selection on hierarchical context modeling for robust vision systems
Jin, SongGuo, Jung, Eun Sung, Bashar, Md. Rezaul, Nam, Mi Young and Rhee, Phill Kyu. 2006. "Adaptive classifier selection on hierarchical context modeling for robust vision systems." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11893011_16Paper
Development status of indigenous computational fluid dynamics software for arbitrary complex geometry
Ng, K. C., Yusoff, M. Z., Yusaf, T. F. and Hussein, I.. 2005. "Development status of indigenous computational fluid dynamics software for arbitrary complex geometry." Institution of Engineers, Malaysia. Journal. 66 (4), pp. 15-22.Article
Guided weapon danger area generation: implementing a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2006. "Guided weapon danger area generation: implementing a probabilistic approach." 24th AIAA Atmospheric Flight Mechanics Conference and Exhibit. Keystone, United States 21 - 24 Aug 2006 Reston, VA, United States .Paper
Guided weapon template generation: a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2005. "Guided weapon template generation: a probabilistic approach." Lindsay, P. A. (ed.) 2005 Systems Engineering/Test and Evaluation Conference (SETE 2005). Brisbane, Australia 07 - 09 Nov 2005 [Bruce, A.C.T.].Paper
Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131Paper
An ensemble learning algorithm for blind signal separation problem
Li, Yan and Wen, Peng. 2005. "An ensemble learning algorithm for blind signal separation problem." 2005 International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA 2005). Vienna, Austria 28 - 30 Nov 2005 Washington, DC, united States.Paper
Going for 100% digital teaching and learning environments: the agony and the ecstasy
Mula, Joseph M.. 2008. "Going for 100% digital teaching and learning environments: the agony and the ecstasy." 2008 Learning and Teaching Week Showcase. Toowoomba, Australia Feb 2008Presentation
Click go the students, click-click-click: how to give and gain students' feedback to dynamically modify delivery in the classroom to students' needs
Mula, Joseph M.. 2008. "Click go the students, click-click-click: how to give and gain students' feedback to dynamically modify delivery in the classroom to students' needs." 2008 Accounting and Finance Association of Australia and New Zealand Conference (2008 AFAANZ). Sydney, Australia 06 - 08 Jul 2008 Sydney,. Australia.Paper
Automated macadamia nut orchard yield monitoring
Dunn, Mark and Billingsley, John. 2005. "Automated macadamia nut orchard yield monitoring." Billingsley, John (ed.) 12th Annual Conference on Mechatronics and Machine Vision in Practice (M2VIP 2005). Manila, Philippines 29 Nov - 01 Dec 2005 Hertfordshire, England.Paper
Tsunami disaster of Sri Lanka, its uniqueness, affect, and some damage mitigation possibilities
Perera, L. Kithsiri. 2005. "Tsunami disaster of Sri Lanka, its uniqueness, affect, and some damage mitigation possibilities." Asian Journal of Geoinformatics. 5 (3), pp. 112-118.Article
The role of MODIS data in visualizing flood disaster information for mass media
Perera, L. Kithsiri and Pathirana, Assela. 2006. "The role of MODIS data in visualizing flood disaster information for mass media." Asian Journal of Geoinformatics. 6 (3).Article
A preliminary field evaluation of an automated vision-based plant geometry measurement system
McCarthy, Cheryl, Hancock, Nigel and Raine, Steven R.. 2007. "A preliminary field evaluation of an automated vision-based plant geometry measurement system." Prusinkiewicz, Przemyslaw, Hanan, Jim S. and Lane, Brendan (ed.) 5th International Workshop on Functional Structural Plant Models (FSPM07). Napier, New Zealand 04 - 09 Nov 2007Presentation
A context model for ubiquitous computing applications
Bashar, Md. Rezaul, Young, Nam Mi and Rhee, Phill Kyu. 2006. "A context model for ubiquitous computing applications." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11893011_15Paper
Adaptive feature representation for robust face recognition using context-aware approach
Nam, Mi Young, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2007. "Adaptive feature representation for robust face recognition using context-aware approach." Neurocomputing. 70 (4-6), pp. 648-656. https://doi.org/10.1016/j.neucom.2006.10.036Article
A computerised key for seed identification
Gupta, Madan, George, Doug and Basnet, Badri Bahadur. 2004. "A computerised key for seed identification." 27th International Seed Testing Association Congress (ISTA 2004). Budapest, Hungary 13 - 24 May 2004 Bassersdorf, Switzerland.Paper
A critical theory approach to information technology transfer to the developing world and a critique of maintained assumptions in the literature
Al-Mabrouk, Khalid and James, Kieran. 2009. "A critical theory approach to information technology transfer to the developing world and a critique of maintained assumptions in the literature." Cater-Steel, Aileen and Al-Hakim, Latif (ed.) Information systems research methods, epistemology, and applications. Hershey PA, USA. IGI Global. pp. 73-87Edited book (chapter)
Do IT professionals think differently?
Xu, Hongjiang and Al-Hakim, Latif. 2003. "Do IT professionals think differently?" Khosrow-Pour, Mehdi (ed.) 2003 Information Resources Management Association International Conference (IRMA 2003). Philadelphia, United States of America 18 - 21 May 2003 Hershey, PA, USA.Paper
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.Paper
IS audit issues with enterprise management systems
Green, Peter F. and Best, Peter J.. 2003. "IS audit issues with enterprise management systems." 2003 Accounting and Finance Association of Australia and New Zealand Conference (2003 AFAANZ) . Brisbane, Australia 06 - 08 Jul 2003 Melbourne, Australia.Paper
Detecting tsunami damage from satellite data in Sri Lanka
Perera, Kithsiri and Herath, Srikantha. 2005. "Detecting tsunami damage from satellite data in Sri Lanka." Asian Journal of Geoinformatics. 5 (2), pp. 38-44.Article
Chinese government and software copyright: manipulating the boundaries between public and private
Lu, Jia and Weber, Ian. 2008. "Chinese government and software copyright: manipulating the boundaries between public and private ." International Journal of Communication. 2, pp. 81-99.Article
Internet and self-regulation in China: the cultural logic of controlled commodification
Weber, Ian and Lu, Jia. 2007. "Internet and self-regulation in China: the cultural logic of controlled commodification." Media Culture and Society. 29 (5), pp. 772-789. https://doi.org/10.1177/0163443707080536Article
State, power and mobile communication: a case study of China
Lu, Jia and Weber, Ian. 2007. "State, power and mobile communication: a case study of China." New Media and Society. 9 (6), pp. 925-944. https://doi.org/10.1177/1461444807082640Article
Iterative source-channel decoding for robust image transmission
Xiang, Wei, Pietrobon, Steven S. and Barbulescu, Sorin Adrian. 2003. "Iterative source-channel decoding for robust image transmission." Kennedy, Rodney Andrew and Grant, Alex J. (ed.) 4th Australian Communications Theory Workshop (AusCTW 2003). Melbourne, Australia 05 - 07 Feb 2003 Canberra, ACT .Paper
Web-based hospital information system for managing operating theatre waiting list
Al-Hakim, Latif. 2006. "Web-based hospital information system for managing operating theatre waiting list." International Journal of Healthcare Technology and Management. 7 (3-4), pp. 266-282. https://doi.org/10.1504/IJHTM.2006.008436Article
Using choice modelling to establish the supply of riparian services and the potential for a water quality trading scheme in Central Queensland
Windle, Jill, Rolfe, John, Whitten, Stuart, Alam, Khorshed and Street, Deborah. 2005. "Using choice modelling to establish the supply of riparian services and the potential for a water quality trading scheme in Central Queensland." 49th Annual Conference of the Australian Agricultural and Resource Economics Society (AARES 2005). Coffs Harbour, Australia 09 - 11 Feb 2005 Australia.Other
New developments in medical photogrammetry
Chong, Albert K.. 2009. "New developments in medical photogrammetry." Geoinformation Science Journal. 9 (1), pp. 41-50.Article
Examining the factors that predict use of internet communications technology tools by first-year psychology students
Burton, Lorelle J. and Johnson, Ann M.. 2006. "Examining the factors that predict use of internet communications technology tools by first-year psychology students." Katsikitis, Mary (ed.) Psychology Bridging the Tasman: Science, Culture and Practice 2006. Auckland, New Zealand 26 - 30 Sep 2006 Melbourne, Australia.Paper
Modelling information flow for surgery management process
Al-Hakim, Latif. 2008. "Modelling information flow for surgery management process." International Journal of Information Quality. 2 (1), pp. 60-74. https://doi.org/10.1504/IJIQ.2008.019563Article
Simulation of interactive cutting tool for craniofacial osteotomy planning
Rana, Mohammad Azam, Setan, Halim, Majid, Zulkepli and Chong, Albert K.. 2007. "Simulation of interactive cutting tool for craniofacial osteotomy planning." Banissi, E. (ed.) CGIV 2007: 4th International Conference on Computer Graphics, Imaging and Visualisation. Bangkok, Thailand 13 - 16 Aug 2007 Washington, DC. https://doi.org/10.1109/CGIV.2007.77Paper
Calibrating Minolta VIVID 910 3D laser scanner for medical mapping
Majid, Zulkepli, Chong, Albert and Setan, Halim. 2006. "Calibrating Minolta VIVID 910 3D laser scanner for medical mapping." New Zealand Surveyor.Article
Coordinate systems integration for development of Malaysian craniofacial database
Rajion, Zainul, Suwardhi, Deni, Setan, Halim, Chong, Albert K., Majid, Zulkepli, Ahmad, Anuar B., Samsudin, Abdul Rani, Izhar, Ab. Aziz and Harun, Wan Ab. Rahman Wan. 2005. "Coordinate systems integration for development of Malaysian craniofacial database." 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS 2005). Shanghai, China 01 - 04 Sep 2005 Piscataway, NJ. United States.Paper