4605. Data management and data science
Title | 4605. Data management and data science |
---|---|
Parent | 46. Information and Computing Sciences |
Latest research outputs
Sort by Date Title
Estimation of monthly evaporative loss using relevance vector machine, extreme learning machine and multivariate adaptive regression spline models
Deo, Ravinesh C., Samui, Pijush and Kim, Dookie. 2016. "Estimation of monthly evaporative loss using relevance vector machine, extreme learning machine and multivariate adaptive regression spline models." Stochastic Environmental Research and Risk Assessment. 30 (6), pp. 1769-1784. https://doi.org/10.1007/s00477-015-1153-yArticle
The development and production of local, national and international state of children’s well-being report cards
Woolcock, Geoffrey. 2016. "The development and production of local, national and international state of children’s well-being report cards." Kee, Youngwha, Lee, Seung Jong and Phillips, Rhonda (ed.) Social Factors and Community Well-Being. Switzerland . Springer. pp. 57-69Edited book (chapter)
Strategies for implementing open licensed resources: a review of case studies
Judith, Kate. 2014. "Strategies for implementing open licensed resources: a review of case studies." USQ Open Education Week 2014. Toowoomba, Australia 22 Oct 2014 Toowoomba, Australia.Presentation
Innovative mental health solutions for regional well-being and resilience
March, Sonja, Ireland, Michael, Brownlow, Charlotte, Goh, Hong Eng, Antonio, Amy, Tehan, Gerry and Keppell, Mike. 2014. "Innovative mental health solutions for regional well-being and resilience." Keppell, Mike and Reushle, Shirley (ed.) 2nd Digital Rural Futures Conference 2014. Toowoomba, Australia 25 - 27 Jun 2014 Toowoomba, Australia.Presentation
Exploring relationships between undergraduate students' use of eLearning system, library, and learning outcomes
Jara, Magdalena, Kelly, Nick, Montenegro, Maximilliano, Gonzalez, Carlos, Alarcon, Rosa, Saurina, Elvira, Peralta, Montserrat and Cano, Felipe. 2014. "Exploring relationships between undergraduate students' use of eLearning system, library, and learning outcomes." Rensing, Christoph, de Freitas, Sara, Ley, Tobias and Munoz-Merino, Pedro J. (ed.) 9th European Conference on Technology-Enhanced Learning (ECTEL 2014): Open Learning and Teaching in Educational Communities. Graz, Austria 16 - 19 Sep 2014 Switzerland. https://doi.org/10.1007/978-3-319-11200-8Paper
A knowledge retrieval model using ontology mining and user profiling
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2008. "A knowledge retrieval model using ontology mining and user profiling." Integrated Computer Aided Engineering. 15 (4), pp. 313-329. https://doi.org/10.3233/ICA-2008-15404Article
Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2014. "Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling." Transforming Government: People, Process and Policy. 8 (4), pp. 500-520. https://doi.org/10.1108/TG-03-2014-0007Article
Ontology mining for personalized search
Li, Yuefeng and Tao, Xiaohui. 2009. "Ontology mining for personalized search." Cao, Longbing, Yu, Philip S., Zhang, Chengqi and Zhang, Huaifeng (ed.) Data mining for business applications. New York, NY. United States. Springer. pp. 63-78Edited book (chapter)
Effective pattern taxonomy mining in text documents
Li, Yuefeng, Wu, Sheng-Tang and Tao, Xiaohui. 2008. "Effective pattern taxonomy mining in text documents." Shanahan, James G., Amer-Yahia, Sihem, Zhang, Yi and Kolcz, Alek (ed.) CIKM 2008: ACM 17th Conference on Information and Knowledge Management. Napa Valley, United States 26 - 30 Oct 2008 New York, NY. USA. https://doi.org/10.1145/1458082.1458360Poster
An ontology-based framework for knowledge retrieval
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2008. "An ontology-based framework for knowledge retrieval." Jain, Lakhmi, Lingras, Pawan, Klusch, Matthias and Lu, Jie (ed.) 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2008). Sydney, Australia 09 - 12 Dec 2008 Los Alamitos, CA. USA. https://doi.org/10.1109/WIIAT.2008.226Paper
The potential for ICT tools to promote public participation in fighting corruption
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Aryal, Sunil. 2014. "The potential for ICT tools to promote public participation in fighting corruption." Akrivopoulou, Christina M. and Garipidis, N. (ed.) Human rights and the impact of ICT in the public sphere: participation, democracy, and political autonomy. Hershey, PA. United States. IGI Global. pp. 175-191Edited book (chapter)
An empirical evaluation of the potential of public e-procurement to reduce corruption
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2014. "An empirical evaluation of the potential of public e-procurement to reduce corruption." Australasian Journal of Information Systems. 18 (2), pp. 21-44.Article
The potential of public e-procurement technology to reduce corruption in public procurement
Neupane, Arjun. 2014. The potential of public e-procurement technology to reduce corruption in public procurement. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
The implementation of online information and communication technology (ICT) on remote construction projects
Weippert, A., Kajewski, S. L. and Tilley, P. A.. 2003. "The implementation of online information and communication technology (ICT) on remote construction projects." Logistics Information Management. 16 (5), pp. 327-340. https://doi.org/10.1108/09576050310499327Article
Internet-based information and communication systems on remote construction projects: a case study analysis
Weippert, A., Kajewski, S. L. and Tilley, P. A.. 2002. "Internet-based information and communication systems on remote construction projects: a case study analysis." Construction Innovation: information, process, management. 2 (2), pp. 103-116. https://doi.org/10.1191/1471417502ci031Article
Transnational intellectual engagement via cocoon communities: inter-university videoconferencing for local and international students
Singh, Michael, Harreveld, R. E. (Bobby) and Danaher, P. A.. 2013. "Transnational intellectual engagement via cocoon communities: inter-university videoconferencing for local and international students." Korpela, Mari and Dervin, Fred (ed.) Cocoon communities: togetherness in the 21st century. Newcastle upon Tyne, United Kingdom. Cambridge Scholars Publishing. pp. 59-80Edited book (chapter)
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717Article
Semantic labelling for document feature patterns using ontological subjects
Tao, Xiaohui, Li, Yuefeng, Liu, Bin and Shen, Yan. 2012. "Semantic labelling for document feature patterns using ontological subjects." Zhong, Ning and Gong, Zhiguo (ed.) 2012 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012). Macau, China 04 - 07 Dec 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2012.47Paper
Social ITSM - challenges and benefits
Shrestha, Anup. 2012. "Social ITSM - challenges and benefits." At Your Service. 2 (3), pp. 3-7.Article
Personalised information gathering and recommender systems: techniques and trends
Tao, Xiaohui, Zhou, Xujuan, Lau, Cher Han and Li, Yuefeng. 2013. "Personalised information gathering and recommender systems: techniques and trends." EAI Endorsed Transactions on Scalable Information Systems. 13 (1-3), pp. 1-17. https://doi.org/10.4108/trans.sis.2013.01-03.e4Article
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724Article
Library research support in Queensland: a survey
Richardson, Joanna, Nolan-Brown, Therese, Loria, Pat and Bradbury, Stephanie. 2012. "Library research support in Queensland: a survey." Australian Academic and Research Libraries. 43 (4), pp. 258-277.Article
Assessing the effectiveness of the different levels of instructional strategies (DLISt7) for online learning by undergraduate students from the University of Southern Queensland (USQ), Australia
Jabar, Syaril Izwann. 2013. Assessing the effectiveness of the different levels of instructional strategies (DLISt7) for online learning by undergraduate students from the University of Southern Queensland (USQ), Australia . PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Evaluating the anti-corruption capabilities of public e-procurement in a developing country
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2012. "Evaluating the anti-corruption capabilities of public e-procurement in a developing country." The Electronic Journal of Information Systems in Developing Countries. 55 (2), pp. 1-17.Article
Assessing the effectiveness of the different levels of instructional strategies (DLIST) for online learning by undergraduate students at the University of Southern Queensland (USQ), Australia
Jabar, Syaril Izwann. 2012. "Assessing the effectiveness of the different levels of instructional strategies (DLIST) for online learning by undergraduate students at the University of Southern Queensland (USQ), Australia." 2nd Malaysian Postgraduate Conference (MPC 2012). Gold Coast, Australia 07 - 09 Jul 2012 Sydney, Australia.Paper
Effective pruning for the discovery of conditional functional dependencies
Li, Jiuyong, Liu, Jixue, Toivonen, Hannu and Yong, Jianming. 2013. "Effective pruning for the discovery of conditional functional dependencies." The Computer Journal. 56 (3), pp. 378-392. https://doi.org/10.1093/comjnl/bxs082Article
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24Paper
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705Paper
A light weight approach for ontology generation and change synchronization between ontologies and source relational databases
Ahmed, Waqas, Aslam, Muhammad Ahtisham, Shen, Jun and Yong, Jianming. 2011. "A light weight approach for ontology generation and change synchronization between ontologies and source relational databases." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel and Yong, Jianming (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960076Paper
An ontology-based mining approach for user search intent discovery
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen and Tao, Xiaohui. 2011. "An ontology-based mining approach for user search intent discovery." Cunningham, Sally Jo, Scholer, Falk and Thomas, Paul (ed.) 16th Australasian Document Computing Symposium (ADCS 2011). Canberra, Australia 02 Dec 2011 Melbourne, Australia.Paper
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057Article
Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929Paper
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005Article
New trends in information technology in education
Lu, Yanping, Liu, Hong, Li, Shaozi and Yong, Jianming. 2011. "New trends in information technology in education ." International Journal of Distance Education Technologies. 9 (1), pp. i-iv.Editorial
A personalized ontology model for web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2011. "A personalized ontology model for web information gathering." IEEE Transactions on Knowledge and Data Engineering. 23 (4), pp. 496-511. https://doi.org/10.1109/TKDE.2010.145Article
Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement
Vaidya, Kishor, Campbell, John, Soar, Jeffrey and Gardner, Scott. 2011. "Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement." Vaidya, Kishor (ed.) Inter-organizational information systems and business management: theories for researchers. Hershey, PA. United States. IGI Global. pp. 18-32Edited book (chapter)
Designing effective mobile web presence
Moffatt, Sam. 2012. "Designing effective mobile web presence." Ally, Mohamed and Needham, Gill (ed.) 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 London, United Kingdom.Paper
Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685Paper
Research skills development through collaborative virtual learning environments
Stagg, Adrian and Kimmins, Lindy. 2012. "Research skills development through collaborative virtual learning environments." Reference Services Review: reference and instructional services for libraries in the digital age. 40 (1), pp. 61-74. https://doi.org/10.1108/00907321211203630Article
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8Article
Navigation
460501. Data engineering and data science
460502. Data mining and knowledge discovery
460503. Data models, storage and indexing
460506. Graph, social and multimedia data
460507. Information extraction and fusion
460508. Information retrieval and web search
460509. Query processing and optimisation
460511. Stream and sensor data
460599. Data management and data science not elsewhere classified