4605. Data management and data science


Title4605. Data management and data science
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Evaluating the anti-corruption capabilities of public e-procurement in a developing country
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2012. "Evaluating the anti-corruption capabilities of public e-procurement in a developing country." The Electronic Journal of Information Systems in Developing Countries. 55 (2), pp. 1-17.

Article

Assessing the effectiveness of the different levels of instructional strategies (DLIST) for online learning by undergraduate students at the University of Southern Queensland (USQ), Australia
Jabar, Syaril Izwann. 2012. "Assessing the effectiveness of the different levels of instructional strategies (DLIST) for online learning by undergraduate students at the University of Southern Queensland (USQ), Australia." 2nd Malaysian Postgraduate Conference (MPC 2012). Gold Coast, Australia 07 - 09 Jul 2012 Sydney, Australia.

Paper

Effective pruning for the discovery of conditional functional dependencies
Li, Jiuyong, Liu, Jixue, Toivonen, Hannu and Yong, Jianming. 2013. "Effective pruning for the discovery of conditional functional dependencies." The Computer Journal. 56 (3), pp. 378-392. https://doi.org/10.1093/comjnl/bxs082

Article

Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24

Paper

Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705

Paper

A light weight approach for ontology generation and change synchronization between ontologies and source relational databases
Ahmed, Waqas, Aslam, Muhammad Ahtisham, Shen, Jun and Yong, Jianming. 2011. "A light weight approach for ontology generation and change synchronization between ontologies and source relational databases." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel and Yong, Jianming (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960076

Paper

An ontology-based mining approach for user search intent discovery
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen and Tao, Xiaohui. 2011. "An ontology-based mining approach for user search intent discovery." Cunningham, Sally Jo, Scholer, Falk and Thomas, Paul (ed.) 16th Australasian Document Computing Symposium (ADCS 2011). Canberra, Australia 02 Dec 2011 Melbourne, Australia.

Paper

A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057

Article

Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929

Paper

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005

Article

New trends in information technology in education
Lu, Yanping, Liu, Hong, Li, Shaozi and Yong, Jianming. 2011. "New trends in information technology in education ." International Journal of Distance Education Technologies. 9 (1), pp. i-iv.

Editorial

A personalized ontology model for web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2011. "A personalized ontology model for web information gathering." IEEE Transactions on Knowledge and Data Engineering. 23 (4), pp. 496-511. https://doi.org/10.1109/TKDE.2010.145

Article

Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement
Vaidya, Kishor, Campbell, John, Soar, Jeffrey and Gardner, Scott. 2011. "Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement." Vaidya, Kishor (ed.) Inter-organizational information systems and business management: theories for researchers. Hershey, PA. United States. IGI Global. pp. 18-32

Edited book (chapter)

Designing effective mobile web presence
Moffatt, Sam. 2012. "Designing effective mobile web presence." Ally, Mohamed and Needham, Gill (ed.) 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 London, United Kingdom.

Paper

Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685

Paper

Research skills development through collaborative virtual learning environments
Stagg, Adrian and Kimmins, Lindy. 2012. "Research skills development through collaborative virtual learning environments." Reference Services Review: reference and instructional services for libraries in the digital age. 40 (1), pp. 61-74. https://doi.org/10.1108/00907321211203630

Article

Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8

Article

Mining world knowledge for analysis of search engine content
King, John D., Li, Yuefeng, Tao, Xiaohui and Nayak, Richi. 2007. "Mining world knowledge for analysis of search engine content." Web Intelligence. 5 (3), pp. 233-253.

Article

Automatically acquiring training sets for web information gathering
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2006. "Automatically acquiring training sets for web information gathering." Liu, Jiming and Wah, Benjamin W. (ed.) 2006 IEEE/WIC/ACM International Conference on Web Intelligence. Hong Kong, China 18 - 22 Dec 2006 Piscataway, NJ. United States. https://doi.org/10.1109/WI.2006.49

Paper

Ontology mining for semantic interpretation of user information needs
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2007. "Ontology mining for semantic interpretation of user information needs." Zhang, Zili and Siekmann, Jorg (ed.) 2nd International Conference on Knowledge Science, Engineering, and Management (KSEM 2007). Melbourne, Australia 28 - 30 Nov 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-76719-0_32

Paper

A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback
Tao, Xiaohui and Li, Yuefeng. 2009. "A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback." Wen, Peng, Li, Yuefeng, Polkowski, Lech and Yao, Yiyu (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_83

Paper

Concept-Based, Personalized Web Information Gathering: A Survey
Tao, Xiaohui and Li, Yuefeng. 2009. "Concept-Based, Personalized Web Information Gathering: A Survey." 3rd International Conference on Knowledge Science, Engineering, and Management (KSEM 2009). Vienna, Austria 25 - 27 Nov 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-10488-6_23

Paper

The adoption of business-to-business systems by small and medium enterprises in Amman and the perceptions of its influence on performance and efficiency
Al-Bakri, Anas A.. 2010. The adoption of business-to-business systems by small and medium enterprises in Amman and the perceptions of its influence on performance and efficiency. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14

Paper

A transaction model for XML databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2004. "A transaction model for XML databases." World Wide Web. 7 (1), pp. 29-57. https://doi.org/10.1023/B:WWWJ.0000015864.75561.98

Article

Seed identification using a computerised database
Gupta, Madan, George, Doug and Basnet, Badri Bahadur. 2005. "Seed identification using a computerised database." Seed Science and Technology. 33 (3), pp. 647-654. https://doi.org/10.15258/sst.2005.33.3.12

Article

A commit scheduler for XML databases
Dekeyser, Stijn and Hidders, Jan. 2003. "A commit scheduler for XML databases." Xiaofang, Zhou, Zhang, Yanchun and Orlowska, Maria E. (ed.) 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications. Xian, China 23 - 25 Apr 2003 China. Springer. https://doi.org/10.1007/3-540-36901-5_8

Paper

Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories
Sefton, Peter and Watson, Kate. 2009. "Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories." DRF 2009: Open Access Repositories Now and In the Future: From the Global and Asia-Pacific Points of View. Tokyo, Japan 03 - 04 Dec 2009 Tokyo, Japan.

Poster

Embedding metadata and other semantics in word processing documents
Sefton, Peter, Barnes, Ian, Ward, Ron and Downing, Jim. 2009. "Embedding metadata and other semantics in word processing documents." DDC 2008: Radical Sharing: Transforming Science? . Edinburgh, Scotland 01 - 03 Dec 2008 Edinburgh, Scotland.

Paper

A study of the nature and extent of Atlantic Canadian small and medium business e-commerce usage leading to the development and testing of a model to explain future adoption intentions
Mombourquette, Peter. 2008. A study of the nature and extent of Atlantic Canadian small and medium business e-commerce usage leading to the development and testing of a model to explain future adoption intentions. Doctorate other than PhD Doctor of Business Administation. University of Southern Queensland.

Doctorate other than PhD

An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects
Cochrane, Sandra, Goh, Steven and Ku, Harry. 2009. "An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects." Kestell, Colin, Grainger, Steven and Cheung, John (ed.) 20th Annual Conference for the Australasian Association of Engineering Education (AAEE 2009). Adelaide, Australia 06 - 09 Dec 2009 Adelaide, Australia.

Paper

Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66

Paper

Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance
Kimmins, Lindy and Stagg, Adrian. 2009. "Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance." Martin, Brian and Percy, Alisa (ed.) 4APCEI: Educational Integrity: Creating an Inclusive Approach. Wollongong, Australia 28 - 30 Sep 2009 Wollongong, Australia.

Paper

Creating an eResearch desktop for the Humanities
Dickinson, Duncan and Sefton, Peter. 2009. "Creating an eResearch desktop for the Humanities." eResearch Australasia 2009. Sydney, Australia

Presentation

Individual correlates of organizational commitment and knowledge sharing practices
Wong, Anthony, Tong, Canon and Mula, Joseph M.. 2009. "Individual correlates of organizational commitment and knowledge sharing practices." Beaumont, Nicholas (ed.) 23rd Australian and New Zealand Academy of Management Conference (ANZAM 2009). Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.

Paper

CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09

Editorial

Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53

Paper

Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39

Paper