4605. Data management and data science


Title4605. Data management and data science
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Towards scholarly HTML
Sefton, Peter. 2009. "Towards scholarly HTML." Serials Review. 35 (3), pp. 154-158. https://doi.org/10.1016/j.serrev.2009.05.001

Article

Situated approaches to information literacy for nurses: the view from a Canadian nurse
Yibbotson, Yvonne. 2006. "Situated approaches to information literacy for nurses: the view from a Canadian nurse." International Journal of Pedagogies and Learning. 2 (3), pp. 61-69. https://doi.org/10.5555/ijpl.2.3.61

Article

Re-discovering repository architecture: adding discovery as a key service
Sefton, Peter. 2008. "Re-discovering repository architecture: adding discovery as a key service ." New Review of Information Networking. 14 (2), pp. 84-101. https://doi.org/10.1080/13614570903359407

Article

Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.

Article

Extent of adoption of EDI by Singaporean SMEs: a survey of practices
Li, Ping and Mula, Joseph M.. 2009. "Extent of adoption of EDI by Singaporean SMEs: a survey of practices." Journal of Information Technology Management. XX (3), pp. 1-13.

Article

Data Governance in a University Context
Te'o, Togamau and Goder, M.L.. 2010. Data Governance in a University Context. Toowoomba, Australia. University of Southern Queensland.

Other

A new approach to multimedia information filtering based on its structure
Huang, Xiaodi and Yong, Jianming. 2004. "A new approach to multimedia information filtering based on its structure." Correia, N., Jorge, J., Chambel, T. and Pan, Z. (ed.) Mutimedia 2004 Eurographics Symposium. Nanjing, China 27 - 28 Oct 2004 New York, USA.

Paper

Using association rules to make rule-based classifiers robust
Hu, Hong and Li, Jiuyong. 2005. "Using association rules to make rule-based classifiers robust." Williams, Hugh E. and Dobbie, Gillian (ed.) ADC 2005: 16th Australasian Database Conference. Newcastle, Australia 31 Jan - 03 Feb 2005 Sydney, Australia.

Paper

The Fascinator: a lightweight, modular contribution to the Fedora-commons world
Sefton, Peter and Lucido, Oliver. 2009. "The Fascinator: a lightweight, modular contribution to the Fedora-commons world." Open Repositories 2009. Atlanta, United States 18 - 21 May 2009

Paper

The Fascinator, flexible repository services
Sefton, Peter. 2009. "The Fascinator, flexible repository services." Open Repositories 2009. Atlanta, United States 18 - 21 May 2009

Poster

ICE-theorem - end to end semantically aware eResearch infrastructure for theses
Sefton, Peter, Downing, Jim and Day, Nick. 2009. "ICE-theorem - end to end semantically aware eResearch infrastructure for theses." Open Repositories 2009. Atlanta, United States 18 - 21 May 2009

Paper

Preface [to Business web strategy: design, alignment and application]
Memmola, Massimo and Al-Hakim, Latif. 2009. "Preface [to Business web strategy: design, alignment and application]." Al-Hakim, Latif and Memmola, Massimo (ed.) Business web strategy: design, alignment and application. Hershey, PA. United States. IGI Global.

Edited book (chapter)

Improving efficiency and scalability of service network graph by re-routing service routes
Lai, David and Zhang, Zhongwei. 2009. "Improving efficiency and scalability of service network graph by re-routing service routes." Nguyen, Ngoc Thanh, Nguyen, Huynh Phan and Grzech, Adam (ed.) ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems. Dong Hoi, Vietnam 01 - 03 Apr 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ACIIDS.2009.31

Paper

Technology strategy and performance: a study of information technology service providers from selected Asian countries
Chadee, Doren and Pang, Billy. 2008. "Technology strategy and performance: a study of information technology service providers from selected Asian countries." Service Business: an international journal. 2 (2), pp. 109-126. https://doi.org/10.1007/s11628-007-0027-x

Article

Hyperlinked concept map enhancements for electronic study materials
Phythian, Mark and Das Gupta, Jishu. 2008. "Hyperlinked concept map enhancements for electronic study materials." Mann, Llewellyn, Thompson, Adam and Howard, Prue (ed.) 19th Annual Conference of the Australasian Association for Engineering Education (AAEE 2008). Yeppoon, Australia 07 - 10 Dec 2008 Canberra, Australia.

Paper

Combining web data mining techniques for web page access prediction
Khalil, Faten. 2008. Combining web data mining techniques for web page access prediction. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Building institutional repository infrastructure in regional Australia
Drury, Caroline. 2006. "Building institutional repository infrastructure in regional Australia." OCLC Systems and Services: international digital library perspectives. 23 (4), pp. 395-402. https://doi.org/10.1108/10650750710831538

Article

The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government Health and Social Services Access Card
Hart, Caroline. 2008. "The conjurer's new card trick and the illusion of privacy: a discussion of the privacy and transparency issues associated with the proposed Australian Government Health and Social Services Access Card." University of Tasmania Law Review. 25 (1), pp. 5-43.

Article

Nursing students' information literacy skills prior to and after information literacy instruction
Perrin, Cheryl, Hossain, Delwar and Cumming, Kaye. 2008. "Nursing students' information literacy skills prior to and after information literacy instruction ." Orr, Debbie, Danaher, Patrick Alan, Danaher, Geoff and Harreveld, R. E. (Bobby) (ed.) 5th International Lifelong Learning Conference: Reflecting on Successes and Framing Futures. Yeppoon, Australia 16 - 19 Jun 2008 Rockhampton, Australia.

Paper

An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.

Paper

Integrating web and database marketing: Australian study of direct marketing firms
Lane, Michael S. and Cavaye, Angele. 2000. "Integrating web and database marketing: Australian study of direct marketing firms." Journal of Research and Practice in Information Technology. 32 (3/4), pp. 168-184.

Article

Lessons in implementing a learning management system in a university: the academic user perspective
Darroch, Fiona and Toleman, Mark. 2008. "Lessons in implementing a learning management system in a university: the academic user perspective." Clarke, Steve (ed.) End-user computing: concepts, methodologies, tools and applications. Hershey, PA. IGI Global. pp. 1291-1303

Edited book (chapter)

Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.

Paper

Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.

Paper

Replacing lost or stolen e-passports
Yong, Jianming and Bertino, Elisa. 2007. "Replacing lost or stolen e-passports." Computer. 40 (10), pp. 89-91. https://doi.org/10.1109/MC.2007.360

Article

The information management risk construct: identifying the potential impact of information quality on corporate risk
Pullen, Troy and Maguire, Heather. 2007. "The information management risk construct: identifying the potential impact of information quality on corporate risk." International Journal of Information Quality. 1 (4), pp. 412-443.

Article

Enforcing secure access control in integrated systems over the internet
Yong, Jianming, Lane, Michael S., Toleman, Mark and Yang, Yun. 2003. "Enforcing secure access control in integrated systems over the internet." 1st Australian Information Security Management Conference. Perth, Western Australia 24 Nov 2003 Perth, Western Australia.

Paper

XML schema in XML documents with usage control
Sun, Lili and Li, Yan. 2007. "XML schema in XML documents with usage control." International Journal of Computer Science and Network Security. 7 (10), pp. 170-177.

Article

A protocol for untraceable electronic cash
Wang, Hua and Zhang, Yanchun. 2000. "A protocol for untraceable electronic cash." Lu, Hongjun and Zhou, Aoying (ed.) 1st Web-Age Information Management International Conference (WAIM 2000). Shanghai, China 21 - 23 Jun 2000 Berlin, Germany. https://doi.org/10.1007/3-540-45151-X_18

Paper

A boolean algebra approach for class hierarchy normalization
Zhang, Yanchun and Xiao, Jitian. 1997. "A boolean algebra approach for class hierarchy normalization." Topor, R. and Tanaka, K. (ed.) 5th International Conference on Database Systems for Advanced Applications. Melbourne, Australia 01 - 04 Apr 1997 Singapore. https://doi.org/10.1142/9789812819536_0032

Paper

An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194

Article

A model, schema, and interface for metadata file systems
Dekeyser, Stijn, Watson, Richard and Motroen, Lasse. 2008. "A model, schema, and interface for metadata file systems." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Wollongong, Australia.

Paper

Business-to-business communication and the requirements for an ontology for the Australian timber and wood products industry
Blake, Jacqueline. 2006. Business-to-business communication and the requirements for an ontology for the Australian timber and wood products industry. Masters Thesis Master of Information Technology. University of Southern Queensland.

Masters Thesis

An agent-based decentralised process management framework for web service composition
Yan, Jun, Pidgeon, Phillip, Krishna, Aneesh and Yong, Jianming. 2007. "An agent-based decentralised process management framework for web service composition." Li, Jianzhong (ed.) Infoscale 2007: 2nd International Conference on Scalable Information Systems. Suzhou, China 06 - 08 Jun 2007 New York, USA.

Paper

Internet-based e-learning workflow process
Yong, Jianming. 2006. "Internet-based e-learning workflow process." Lecture Notes in Computer Science (Book series). 3865, pp. 516-524. https://doi.org/10.1007/11686699_52

Article

Aggregate flows: for efficient management of large flows in the internet
Addie, Ron, Braithwaite, Stephen, Das Gupta, Jishu and Leis, John W.. 2006. "Aggregate flows: for efficient management of large flows in the internet." WITSP 2006: 5th Workshop on the Internet, Telecommunications and Signal Processing. Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.

Paper

Improving health and public safety through knowledge management
Soar, Jeffrey. 2004. "Improving health and public safety through knowledge management." Thailand International Conference on Knowledge Management (2004). Bangkok, Thailand 24 - 25 Nov 2004 Bangkok.

Paper

DTD level authorization in XML documents with usage control
Sun, Lili and Li, Yan. 2006. "DTD level authorization in XML documents with usage control." International Journal of Computer Science and Network Security. 6 (11), pp. 244-250.

Article

Assessing and assuring trust in e-Commerce systems
Zhang, Zhongwei and Wang, Zhen. 2006. "Assessing and assuring trust in e-Commerce systems." Mohammadian, Masoud (ed.) 2006 International Conference on Intelligent Agents, Web Technologies & Internet Commerce (IAWTIC'06). Sydney, Australia 29 Nov - 01 Dec 2006 Piscataway, NJ, USA.

Paper

Evaluation of business networks in the AusIndustry business network program
Sweeting, Barbara. 2005. Evaluation of business networks in the AusIndustry business network program. Masters Thesis Master of Business (Research). University of Southern Queensland.

Masters Thesis