4605. Data management and data science


Title4605. Data management and data science
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Estimation of monthly evaporative loss using relevance vector machine, extreme learning machine and multivariate adaptive regression spline models
Deo, Ravinesh C., Samui, Pijush and Kim, Dookie. 2016. "Estimation of monthly evaporative loss using relevance vector machine, extreme learning machine and multivariate adaptive regression spline models." Stochastic Environmental Research and Risk Assessment. 30 (6), pp. 1769-1784. https://doi.org/10.1007/s00477-015-1153-y

Article

The development and production of local, national and international state of children’s well-being report cards
Woolcock, Geoffrey. 2016. "The development and production of local, national and international state of children’s well-being report cards." Kee, Youngwha, Lee, Seung Jong and Phillips, Rhonda (ed.) Social Factors and Community Well-Being. Switzerland . Springer. pp. 57-69

Edited book (chapter)

Strategies for implementing open licensed resources: a review of case studies
Judith, Kate. 2014. "Strategies for implementing open licensed resources: a review of case studies." USQ Open Education Week 2014. Toowoomba, Australia 22 Oct 2014 Toowoomba, Australia.

Presentation

Innovative mental health solutions for regional well-being and resilience
March, Sonja, Ireland, Michael, Brownlow, Charlotte, Goh, Hong Eng, Antonio, Amy, Tehan, Gerry and Keppell, Mike. 2014. "Innovative mental health solutions for regional well-being and resilience." Keppell, Mike and Reushle, Shirley (ed.) 2nd Digital Rural Futures Conference 2014. Toowoomba, Australia 25 - 27 Jun 2014 Toowoomba, Australia.

Presentation

Exploring relationships between undergraduate students' use of eLearning system, library, and learning outcomes
Jara, Magdalena, Kelly, Nick, Montenegro, Maximilliano, Gonzalez, Carlos, Alarcon, Rosa, Saurina, Elvira, Peralta, Montserrat and Cano, Felipe. 2014. "Exploring relationships between undergraduate students' use of eLearning system, library, and learning outcomes." Rensing, Christoph, de Freitas, Sara, Ley, Tobias and Munoz-Merino, Pedro J. (ed.) 9th European Conference on Technology-Enhanced Learning (ECTEL 2014): Open Learning and Teaching in Educational Communities. Graz, Austria 16 - 19 Sep 2014 Switzerland. https://doi.org/10.1007/978-3-319-11200-8

Paper

A knowledge retrieval model using ontology mining and user profiling
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2008. "A knowledge retrieval model using ontology mining and user profiling." Integrated Computer Aided Engineering. 15 (4), pp. 313-329. https://doi.org/10.3233/ICA-2008-15404

Article

Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2014. "Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling." Transforming Government: People, Process and Policy. 8 (4), pp. 500-520. https://doi.org/10.1108/TG-03-2014-0007

Article

Ontology mining for personalized search
Li, Yuefeng and Tao, Xiaohui. 2009. "Ontology mining for personalized search." Cao, Longbing, Yu, Philip S., Zhang, Chengqi and Zhang, Huaifeng (ed.) Data mining for business applications. New York, NY. United States. Springer. pp. 63-78

Edited book (chapter)

Effective pattern taxonomy mining in text documents
Li, Yuefeng, Wu, Sheng-Tang and Tao, Xiaohui. 2008. "Effective pattern taxonomy mining in text documents." Shanahan, James G., Amer-Yahia, Sihem, Zhang, Yi and Kolcz, Alek (ed.) CIKM 2008: ACM 17th Conference on Information and Knowledge Management. Napa Valley, United States 26 - 30 Oct 2008 New York, NY. USA. https://doi.org/10.1145/1458082.1458360

Poster

An ontology-based framework for knowledge retrieval
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2008. "An ontology-based framework for knowledge retrieval." Jain, Lakhmi, Lingras, Pawan, Klusch, Matthias and Lu, Jie (ed.) 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2008). Sydney, Australia 09 - 12 Dec 2008 Los Alamitos, CA. USA. https://doi.org/10.1109/WIIAT.2008.226

Paper

The potential for ICT tools to promote public participation in fighting corruption
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Aryal, Sunil. 2014. "The potential for ICT tools to promote public participation in fighting corruption." Akrivopoulou, Christina M. and Garipidis, N. (ed.) Human rights and the impact of ICT in the public sphere: participation, democracy, and political autonomy. Hershey, PA. United States. IGI Global. pp. 175-191

Edited book (chapter)

An empirical evaluation of the potential of public e-procurement to reduce corruption
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2014. "An empirical evaluation of the potential of public e-procurement to reduce corruption." Australasian Journal of Information Systems. 18 (2), pp. 21-44.

Article

The potential of public e-procurement technology to reduce corruption in public procurement
Neupane, Arjun. 2014. The potential of public e-procurement technology to reduce corruption in public procurement. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

The implementation of online information and communication technology (ICT) on remote construction projects
Weippert, A., Kajewski, S. L. and Tilley, P. A.. 2003. "The implementation of online information and communication technology (ICT) on remote construction projects." Logistics Information Management. 16 (5), pp. 327-340. https://doi.org/10.1108/09576050310499327

Article

Internet-based information and communication systems on remote construction projects: a case study analysis
Weippert, A., Kajewski, S. L. and Tilley, P. A.. 2002. "Internet-based information and communication systems on remote construction projects: a case study analysis." Construction Innovation: information, process, management. 2 (2), pp. 103-116. https://doi.org/10.1191/1471417502ci031

Article

Transnational intellectual engagement via cocoon communities: inter-university videoconferencing for local and international students
Singh, Michael, Harreveld, R. E. (Bobby) and Danaher, P. A.. 2013. "Transnational intellectual engagement via cocoon communities: inter-university videoconferencing for local and international students." Korpela, Mari and Dervin, Fred (ed.) Cocoon communities: togetherness in the 21st century. Newcastle upon Tyne, United Kingdom. Cambridge Scholars Publishing. pp. 59-80

Edited book (chapter)

A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717

Article

Semantic labelling for document feature patterns using ontological subjects
Tao, Xiaohui, Li, Yuefeng, Liu, Bin and Shen, Yan. 2012. "Semantic labelling for document feature patterns using ontological subjects." Zhong, Ning and Gong, Zhiguo (ed.) 2012 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012). Macau, China 04 - 07 Dec 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2012.47

Paper

Social ITSM - challenges and benefits
Shrestha, Anup. 2012. "Social ITSM - challenges and benefits." At Your Service. 2 (3), pp. 3-7.

Article

Personalised information gathering and recommender systems: techniques and trends
Tao, Xiaohui, Zhou, Xujuan, Lau, Cher Han and Li, Yuefeng. 2013. "Personalised information gathering and recommender systems: techniques and trends." EAI Endorsed Transactions on Scalable Information Systems. 13 (1-3), pp. 1-17. https://doi.org/10.4108/trans.sis.2013.01-03.e4

Article

On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724

Article

Library research support in Queensland: a survey
Richardson, Joanna, Nolan-Brown, Therese, Loria, Pat and Bradbury, Stephanie. 2012. "Library research support in Queensland: a survey." Australian Academic and Research Libraries. 43 (4), pp. 258-277.

Article

Assessing the effectiveness of the different levels of instructional strategies (DLISt7) for online learning by undergraduate students from the University of Southern Queensland (USQ), Australia
Jabar, Syaril Izwann. 2013. Assessing the effectiveness of the different levels of instructional strategies (DLISt7) for online learning by undergraduate students from the University of Southern Queensland (USQ), Australia . PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Evaluating the anti-corruption capabilities of public e-procurement in a developing country
Neupane, Arjun, Soar, Jeffrey and Vaidya, Kishor. 2012. "Evaluating the anti-corruption capabilities of public e-procurement in a developing country." The Electronic Journal of Information Systems in Developing Countries. 55 (2), pp. 1-17.

Article

Assessing the effectiveness of the different levels of instructional strategies (DLIST) for online learning by undergraduate students at the University of Southern Queensland (USQ), Australia
Jabar, Syaril Izwann. 2012. "Assessing the effectiveness of the different levels of instructional strategies (DLIST) for online learning by undergraduate students at the University of Southern Queensland (USQ), Australia." 2nd Malaysian Postgraduate Conference (MPC 2012). Gold Coast, Australia 07 - 09 Jul 2012 Sydney, Australia.

Paper

Effective pruning for the discovery of conditional functional dependencies
Li, Jiuyong, Liu, Jixue, Toivonen, Hannu and Yong, Jianming. 2013. "Effective pruning for the discovery of conditional functional dependencies." The Computer Journal. 56 (3), pp. 378-392. https://doi.org/10.1093/comjnl/bxs082

Article

Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24

Paper

Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705

Paper

A light weight approach for ontology generation and change synchronization between ontologies and source relational databases
Ahmed, Waqas, Aslam, Muhammad Ahtisham, Shen, Jun and Yong, Jianming. 2011. "A light weight approach for ontology generation and change synchronization between ontologies and source relational databases." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel and Yong, Jianming (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960076

Paper

An ontology-based mining approach for user search intent discovery
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen and Tao, Xiaohui. 2011. "An ontology-based mining approach for user search intent discovery." Cunningham, Sally Jo, Scholer, Falk and Thomas, Paul (ed.) 16th Australasian Document Computing Symposium (ADCS 2011). Canberra, Australia 02 Dec 2011 Melbourne, Australia.

Paper

A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057

Article

Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929

Paper

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005

Article

New trends in information technology in education
Lu, Yanping, Liu, Hong, Li, Shaozi and Yong, Jianming. 2011. "New trends in information technology in education ." International Journal of Distance Education Technologies. 9 (1), pp. i-iv.

Editorial

A personalized ontology model for web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2011. "A personalized ontology model for web information gathering." IEEE Transactions on Knowledge and Data Engineering. 23 (4), pp. 496-511. https://doi.org/10.1109/TKDE.2010.145

Article

Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement
Vaidya, Kishor, Campbell, John, Soar, Jeffrey and Gardner, Scott. 2011. "Assimilation of inter-organizational information systems: insights from change resistance theory in context of public electronic procurement." Vaidya, Kishor (ed.) Inter-organizational information systems and business management: theories for researchers. Hershey, PA. United States. IGI Global. pp. 18-32

Edited book (chapter)

Designing effective mobile web presence
Moffatt, Sam. 2012. "Designing effective mobile web presence." Ally, Mohamed and Needham, Gill (ed.) 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 London, United Kingdom.

Paper

Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685

Paper

Research skills development through collaborative virtual learning environments
Stagg, Adrian and Kimmins, Lindy. 2012. "Research skills development through collaborative virtual learning environments." Reference Services Review: reference and instructional services for libraries in the digital age. 40 (1), pp. 61-74. https://doi.org/10.1108/00907321211203630

Article

Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8

Article