46. Information and Computing Sciences
| Title | 46. Information and Computing Sciences |
|---|---|
| Parent | ANZSRC Field of Research |
Latest research outputs
Sort by Date Title
3D photogrammetric analysis of the load-bearing foot
Chong, Albert, Newsham-West, Richard and Milburn, Peter. 2009. "3D photogrammetric analysis of the load-bearing foot." 22nd Congress of the International Society of Biomechanics. Cape Town, South Africa 05 - 09 Jul 2009 Cape Town, South Africa .Paper
An architecture for a distributed digital library from the desktop up: the fascinator
Sefton, Peter and Dickinson, Duncan. 2010. "An architecture for a distributed digital library from the desktop up: the fascinator." Hunter, Jane (ed.) JCDL 2010: Digital Libraries - 10 years past, 10 years forward, a 2020 Vision. Gold Coast, Australia 21 - 25 Jun 2010 New York, NY, USA . https://doi.org/10.1145/1816123.1816194Poster
Securing your Joomla! site
Moffatt, Sam. 2009. "Securing your Joomla! site." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.Presentation
A photogrammetric application in virtual sport training
Chong, Albert K. and Croft, Hayden G.. 2009. "A photogrammetric application in virtual sport training." The Photogrammetric Record. 24 (125), pp. 51-65. https://doi.org/10.1111/j.1477-9730.2009.00517.xArticle
itSMF Australia 2009 Conference: summary report of ITSM standards and frameworks survey
Cater-Steel, Aileen, Tan, Wui-Gee and Toleman, Mark. 2009. itSMF Australia 2009 Conference: summary report of ITSM standards and frameworks survey. Toowoomba, Australia. University of Southern Queensland.Technical report
International outsourcing research: overview of the research landscape
Chadee, Doren and Raman, Revti. 2009. "International outsourcing research: overview of the research landscape." 2009 Australia and New Zealand International Business Academy Conference: The Future of Asia-Pacific Business: Beyond the Crisis (ANZIBA 2009). Brisbane, Australia 16 - 18 Apr 2009 Australia.Paper
The moderating effect of switching costs on the customer satisfaction-retention link: retail internet banking service in Hong Kong
Wong, Chi-Bo and Mula, Joseph M.. 2009. "The moderating effect of switching costs on the customer satisfaction-retention link: retail internet banking service in Hong Kong." IBIMA Business Review. 2 (3), pp. 20-28.Article
Using clickers to support information literacy skills development and instruction in first-year business students
Stagg, Adrian and Lane, Michael. 2010. "Using clickers to support information literacy skills development and instruction in first-year business students." Journal of Information Technology Education: Research. 9, pp. 197-215.Article
Distributed web-based critiquing of electronically submitted assessment
Baillie-de Byl, Penny. 2003. "Distributed web-based critiquing of electronically submitted assessment." Zhou, Wanlei, Nicholson, Paul, Corbitt, Brian and Fong, Joseph (ed.) ICWL 2003: 2nd International Conference: Advances in Web-Based Learning. Melbourne, Australia 18 - 20 Aug 2003 Berlin, Germany. https://doi.org/10.1007/978-3-540-45200-3_42Paper
Throughput and fairness of multiple TCP connections in wireless networks
Zhou, Hong, Leis, John W., Hoang, Doan and Nhan, Phuong. 2004. "Throughput and fairness of multiple TCP connections in wireless networks." Wysocki, Beata J. and Wysocki, Tadeusz A. (ed.) 3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP2004). Adelaide, South Australia 20 - 22 Dec 2004 Tarrawanna, N.S.W., Australia .Paper
A general purpose inverse kinematics algorithm for all manipulators
Cubero, Samuel Nacion. 2004. "A general purpose inverse kinematics algorithm for all manipulators." Billingsley, John (ed.) 11th Annual Conference on Mechatronics and Machine Vision in Practice. Macau, China 28 Nov - 03 Dec 2004 Hertfordshire, England.Paper
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166Poster
Internet software piracy in China: a user analysis of resistance to global software copyright enforcement
Lu, Jia and Weber, Ian. 2009. "Internet software piracy in China: a user analysis of resistance to global software copyright enforcement." Journal of International and Intercultural Communication. 2 (4), pp. 298-317. https://doi.org/10.1080/17513050903177300Article
Summer of Code 2009
Moffatt, Sam. 2009. "Summer of Code 2009." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.Presentation
Mechatronics and machine vision 2005
Billingsley, John (ed.) 2005. Mechatronics and machine vision 2005. Hertfordshire, England. Research Studies Press.Edited book
Non-layered human head model for EEG
Wen, Peng and Li, Yan. 2003. "Non-layered human head model for EEG." IEEE EMBS Asian-Pacific Conference on Biomedical Engineering (2003). Kyoto, Japan 20 - 22 Oct 2003 Piscataway, NJ, United States.Paper
A face recognition system on distributed evolutionary computing using on-line GA
Young, Nam Mi, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "A face recognition system on distributed evolutionary computing using on-line GA." Huang, D., Li, K. and Irwin, G.W. (ed.) Intelligent Control and Automation: International Conference on Intelligent Computing ( ICIC 2006) Kunming, China, August, 2006. Kunming,China Aug 2006 Berlin / Heidelberg. https://doi.org/10.1007/978-3-540-37258-5_2Paper
Real time face detection system based edge restoration and nested K-means at frontal view
Joo, Hyun Jea, Jang, Bong Won, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "Real time face detection system based edge restoration and nested K-means at frontal view." Wang, Lipo (ed.) 3rd International Conference on Fuzzy Systems and Knowledge Discovery . Xi'an, China 24 - 28 Sep 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11881599_148Paper
Adaptive context-aware filter fusion for face recognition on bad illumination
Young, Nam Mi, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "Adaptive context-aware filter fusion for face recognition on bad illumination." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) KES 2006: 10th International Conference on Knowlege-Based Intelligent Information and Engineering Systems . Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11892960_65Paper
Adaptive classifier selection on hierarchical context modeling for robust vision systems
Jin, SongGuo, Jung, Eun Sung, Bashar, Md. Rezaul, Nam, Mi Young and Rhee, Phill Kyu. 2006. "Adaptive classifier selection on hierarchical context modeling for robust vision systems." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11893011_16Paper
Development status of indigenous computational fluid dynamics software for arbitrary complex geometry
Ng, K. C., Yusoff, M. Z., Yusaf, T. F. and Hussein, I.. 2005. "Development status of indigenous computational fluid dynamics software for arbitrary complex geometry." Institution of Engineers, Malaysia. Journal. 66 (4), pp. 15-22.Article
Guided weapon danger area generation: implementing a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2006. "Guided weapon danger area generation: implementing a probabilistic approach." 24th AIAA Atmospheric Flight Mechanics Conference and Exhibit. Keystone, United States 21 - 24 Aug 2006 Reston, VA, United States .Paper
Guided weapon template generation: a probabilistic approach
Fletcher, Duncan, Wilson, Shaun, Jokic, Michael D. and Vuletich, Ivan. 2005. "Guided weapon template generation: a probabilistic approach." Lindsay, P. A. (ed.) 2005 Systems Engineering/Test and Evaluation Conference (SETE 2005). Brisbane, Australia 07 - 09 Nov 2005 [Bruce, A.C.T.].Paper
Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131Paper
An ensemble learning algorithm for blind signal separation problem
Li, Yan and Wen, Peng. 2005. "An ensemble learning algorithm for blind signal separation problem." 2005 International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA 2005). Vienna, Austria 28 - 30 Nov 2005 Washington, DC, united States.Paper
Going for 100% digital teaching and learning environments: the agony and the ecstasy
Mula, Joseph M.. 2008. "Going for 100% digital teaching and learning environments: the agony and the ecstasy." 2008 Learning and Teaching Week Showcase. Toowoomba, Australia Feb 2008Presentation
Click go the students, click-click-click: how to give and gain students' feedback to dynamically modify delivery in the classroom to students' needs
Mula, Joseph M.. 2008. "Click go the students, click-click-click: how to give and gain students' feedback to dynamically modify delivery in the classroom to students' needs." 2008 Accounting and Finance Association of Australia and New Zealand Conference (2008 AFAANZ). Sydney, Australia 06 - 08 Jul 2008 Sydney,. Australia.Paper
Automated macadamia nut orchard yield monitoring
Dunn, Mark and Billingsley, John. 2005. "Automated macadamia nut orchard yield monitoring." Billingsley, John (ed.) 12th Annual Conference on Mechatronics and Machine Vision in Practice (M2VIP 2005). Manila, Philippines 29 Nov - 01 Dec 2005 Hertfordshire, England.Paper
Tsunami disaster of Sri Lanka, its uniqueness, affect, and some damage mitigation possibilities
Perera, L. Kithsiri. 2005. "Tsunami disaster of Sri Lanka, its uniqueness, affect, and some damage mitigation possibilities." Asian Journal of Geoinformatics. 5 (3), pp. 112-118.Article
The role of MODIS data in visualizing flood disaster information for mass media
Perera, L. Kithsiri and Pathirana, Assela. 2006. "The role of MODIS data in visualizing flood disaster information for mass media." Asian Journal of Geoinformatics. 6 (3).Article
A preliminary field evaluation of an automated vision-based plant geometry measurement system
McCarthy, Cheryl, Hancock, Nigel and Raine, Steven R.. 2007. "A preliminary field evaluation of an automated vision-based plant geometry measurement system." Prusinkiewicz, Przemyslaw, Hanan, Jim S. and Lane, Brendan (ed.) 5th International Workshop on Functional Structural Plant Models (FSPM07). Napier, New Zealand 04 - 09 Nov 2007Presentation
A context model for ubiquitous computing applications
Bashar, Md. Rezaul, Young, Nam Mi and Rhee, Phill Kyu. 2006. "A context model for ubiquitous computing applications." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11893011_15Paper
Adaptive feature representation for robust face recognition using context-aware approach
Nam, Mi Young, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2007. "Adaptive feature representation for robust face recognition using context-aware approach." Neurocomputing. 70 (4-6), pp. 648-656. https://doi.org/10.1016/j.neucom.2006.10.036Article
A computerised key for seed identification
Gupta, Madan, George, Doug and Basnet, Badri Bahadur. 2004. "A computerised key for seed identification." 27th International Seed Testing Association Congress (ISTA 2004). Budapest, Hungary 13 - 24 May 2004 Bassersdorf, Switzerland.Paper
A critical theory approach to information technology transfer to the developing world and a critique of maintained assumptions in the literature
Al-Mabrouk, Khalid and James, Kieran. 2009. "A critical theory approach to information technology transfer to the developing world and a critique of maintained assumptions in the literature." Cater-Steel, Aileen and Al-Hakim, Latif (ed.) Information systems research methods, epistemology, and applications. Hershey PA, USA. IGI Global. pp. 73-87Edited book (chapter)
Do IT professionals think differently?
Xu, Hongjiang and Al-Hakim, Latif. 2003. "Do IT professionals think differently?" Khosrow-Pour, Mehdi (ed.) 2003 Information Resources Management Association International Conference (IRMA 2003). Philadelphia, United States of America 18 - 21 May 2003 Hershey, PA, USA.Paper
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.Paper
IS audit issues with enterprise management systems
Green, Peter F. and Best, Peter J.. 2003. "IS audit issues with enterprise management systems." 2003 Accounting and Finance Association of Australia and New Zealand Conference (2003 AFAANZ) . Brisbane, Australia 06 - 08 Jul 2003 Melbourne, Australia.Paper
Detecting tsunami damage from satellite data in Sri Lanka
Perera, Kithsiri and Herath, Srikantha. 2005. "Detecting tsunami damage from satellite data in Sri Lanka." Asian Journal of Geoinformatics. 5 (2), pp. 38-44.Article
Chinese government and software copyright: manipulating the boundaries between public and private
Lu, Jia and Weber, Ian. 2008. "Chinese government and software copyright: manipulating the boundaries between public and private ." International Journal of Communication. 2, pp. 81-99.Article