4605. Data management and data science


Title4605. Data management and data science
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Mining world knowledge for analysis of search engine content
King, John D., Li, Yuefeng, Tao, Xiaohui and Nayak, Richi. 2007. "Mining world knowledge for analysis of search engine content." Web Intelligence. 5 (3), pp. 233-253.

Article

Automatically acquiring training sets for web information gathering
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2006. "Automatically acquiring training sets for web information gathering." Liu, Jiming and Wah, Benjamin W. (ed.) 2006 IEEE/WIC/ACM International Conference on Web Intelligence. Hong Kong, China 18 - 22 Dec 2006 Piscataway, NJ. United States. https://doi.org/10.1109/WI.2006.49

Paper

Ontology mining for semantic interpretation of user information needs
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2007. "Ontology mining for semantic interpretation of user information needs." Zhang, Zili and Siekmann, Jorg (ed.) 2nd International Conference on Knowledge Science, Engineering, and Management (KSEM 2007). Melbourne, Australia 28 - 30 Nov 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-76719-0_32

Paper

A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback
Tao, Xiaohui and Li, Yuefeng. 2009. "A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback." Wen, Peng, Li, Yuefeng, Polkowski, Lech and Yao, Yiyu (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_83

Paper

Concept-Based, Personalized Web Information Gathering: A Survey
Tao, Xiaohui and Li, Yuefeng. 2009. "Concept-Based, Personalized Web Information Gathering: A Survey." 3rd International Conference on Knowledge Science, Engineering, and Management (KSEM 2009). Vienna, Austria 25 - 27 Nov 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-10488-6_23

Paper

The adoption of business-to-business systems by small and medium enterprises in Amman and the perceptions of its influence on performance and efficiency
Al-Bakri, Anas A.. 2010. The adoption of business-to-business systems by small and medium enterprises in Amman and the perceptions of its influence on performance and efficiency. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14

Paper

A transaction model for XML databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2004. "A transaction model for XML databases." World Wide Web. 7 (1), pp. 29-57. https://doi.org/10.1023/B:WWWJ.0000015864.75561.98

Article

Seed identification using a computerised database
Gupta, Madan, George, Doug and Basnet, Badri Bahadur. 2005. "Seed identification using a computerised database." Seed Science and Technology. 33 (3), pp. 647-654. https://doi.org/10.15258/sst.2005.33.3.12

Article

A commit scheduler for XML databases
Dekeyser, Stijn and Hidders, Jan. 2003. "A commit scheduler for XML databases." Xiaofang, Zhou, Zhang, Yanchun and Orlowska, Maria E. (ed.) 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications. Xian, China 23 - 25 Apr 2003 China. Springer. https://doi.org/10.1007/3-540-36901-5_8

Paper

Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories
Sefton, Peter and Watson, Kate. 2009. "Suggestions for Asian/Australasian regional cooperation based on a critical evaluation of collaboration and standardisation across Australian institutional repositories." DRF 2009: Open Access Repositories Now and In the Future: From the Global and Asia-Pacific Points of View. Tokyo, Japan 03 - 04 Dec 2009 Tokyo, Japan.

Poster

Embedding metadata and other semantics in word processing documents
Sefton, Peter, Barnes, Ian, Ward, Ron and Downing, Jim. 2009. "Embedding metadata and other semantics in word processing documents." DDC 2008: Radical Sharing: Transforming Science? . Edinburgh, Scotland 01 - 03 Dec 2008 Edinburgh, Scotland.

Paper

A study of the nature and extent of Atlantic Canadian small and medium business e-commerce usage leading to the development and testing of a model to explain future adoption intentions
Mombourquette, Peter. 2008. A study of the nature and extent of Atlantic Canadian small and medium business e-commerce usage leading to the development and testing of a model to explain future adoption intentions. Doctorate other than PhD Doctor of Business Administation. University of Southern Queensland.

Doctorate other than PhD

An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects
Cochrane, Sandra, Goh, Steven and Ku, Harry. 2009. "An investigation into the application of research strategies in the final-year undergraduate engineering and surveying projects." Kestell, Colin, Grainger, Steven and Cheung, John (ed.) 20th Annual Conference for the Australasian Association of Engineering Education (AAEE 2009). Adelaide, Australia 06 - 09 Dec 2009 Adelaide, Australia.

Paper

Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34

Paper

Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23

Paper

Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66

Paper

Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance
Kimmins, Lindy and Stagg, Adrian. 2009. "Creating confidence: developing academic skills and information literacy behaviours to support the precepts of tertiary academic performance." Martin, Brian and Percy, Alisa (ed.) 4APCEI: Educational Integrity: Creating an Inclusive Approach. Wollongong, Australia 28 - 30 Sep 2009 Wollongong, Australia.

Paper

Creating an eResearch desktop for the Humanities
Dickinson, Duncan and Sefton, Peter. 2009. "Creating an eResearch desktop for the Humanities." eResearch Australasia 2009. Sydney, Australia

Presentation

Individual correlates of organizational commitment and knowledge sharing practices
Wong, Anthony, Tong, Canon and Mula, Joseph M.. 2009. "Individual correlates of organizational commitment and knowledge sharing practices." Beaumont, Nicholas (ed.) 23rd Australian and New Zealand Academy of Management Conference (ANZAM 2009). Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.

Paper

CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09

Editorial

Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53

Paper

Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39

Paper

The role of trust and dependency on e-procurement adoption: an empirical analysis
Abdullah, Nik Ab Halim Nik and Al-Hakim, Latif. 2008. "The role of trust and dependency on e-procurement adoption: an empirical analysis." Hoque, Mohammad Ziaul (ed.) 9th International Business Research Conference. Melbourne, Australia 24 - 26 Nov 2008 Melbourne, Australia.

Paper

ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707

Paper

(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650

Paper

Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29

Paper

OpenCourseWare, global access and the right to education: real access or marketing ploy?
Huijser, Henk, Bedford, Tas and Bull, David. 2008. "OpenCourseWare, global access and the right to education: real access or marketing ploy?" International Review of Research in Open and Distance Learning. 9 (1), pp. 1-13. https://doi.org/10.19173/irrodl.v9i1.446

Article

Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29

Paper

New data integration workflow design for e-learning
Xi, Shengtian and Yong, Jianming. 2007. "New data integration workflow design for e-learning." Lecture Notes in Computer Science (Book series). 4402, pp. 699-707. https://doi.org/10.1007/978-3-540-72863-4_71

Article

A fast algorithm for finding correlation clusters in noise data
Li, Jiuyong, Huang, Xiaodi, Selke, Clinton and Yong, Jianming. 2007. "A fast algorithm for finding correlation clusters in noise data." Zhou, Zhi-Hua, Li, Hang and Yang, Qiang (ed.) 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). Nanjing, China 22 - 25 May 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-71701-0_68

Paper

The web portal as a collaborative tool
Rowe, Michelle and Pease, Wayne. 2007. "The web portal as a collaborative tool." Tatnall, Arthur (ed.) Encyclopedia of portal technologies and applications. Hershey, PA. United States. IGI Global. pp. 1138-1143

Edited book (chapter)

A system employing peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Y.. 2007. "A system employing peer review and enhanced computer assisted assessment of querying skills." Informatics in Education. 6 (1), pp. 163-178.

Article

Y-generation students fail with Google
Genrich, Rohan, Roberts, Dave and Grist, Shelly. 2006. "Y-generation students fail with Google." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Adelaide, Australia.

Paper

Stakeholder power in e-business adoption with games theory perspective
Roberts, Barbara. 2006. "Stakeholder power in e-business adoption with games theory perspective." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Australia.

Paper

Is the internet good for our environment?
Parsons, David. 2006. "Is the internet good for our environment? " Electroline.

Article

e-Commerce and small business in regional Australia
Pease, Wayne and Rowe, Michelle. 2006. "e-Commerce and small business in regional Australia." Marshall, Stewart, Taylor, Wal and Yu, Xinghuo (ed.) Encyclopedia of developing regional communities with information and communication technology. Hershey, PA, United States. IGI Global. pp. 227-232

Edited book (chapter)

ICT and regional development in Australia
Pease, Wayne, Rowe, Michelle and Wright, Lauretta. 2006. "ICT and regional development in Australia." Marshall, Stewart, Taylor, Wal and Yu, Xinghuo (ed.) Encyclopedia of developing regional communities with information and communication technology. United States. IGI Global. pp. 348-352

Edited book (chapter)

E-business processes and factors of influence: one model does not fit all
Roberts, Barbara and Toleman, Mark. 2006. "E-business processes and factors of influence: one model does not fit all." 10th Pacific Asia Conference on Information Systems (PACIS 2006). Kuala Lumpur, Malaysia 06 - 09 Jul 2006 China.

Paper

An analysis of the major issues for successful information technology transfer in Arab countries
Al-Mabrouk, Khalid and Soar, Jeffrey. 2009. "An analysis of the major issues for successful information technology transfer in Arab countries." Journal of Enterprise Information Management. 22 (5), pp. 504-522. https://doi.org/10.1108/17410390910993518

Article