4605. Data management and data science


Title4605. Data management and data science
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Critical factors impacting knowledge sharing among R&D organisations
Al-Hakim, Latif. 2011. "Critical factors impacting knowledge sharing among R&D organisations." 2011 ICSTI Public Conference. Beijing, China 07 - 08 Jun 2011 Irvine, CA, USA.

Paper

Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.

Paper

Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469

Edited book (chapter)

Piecemeal: a formal collaborative editing technique guaranteeing correctness
Dekeyser, Stijn and Hidders, Jan. 2010. "Piecemeal: a formal collaborative editing technique guaranteeing correctness." Bessis, Nik, Kommers, Piet and Isaias, Pedro (ed.) IADIS International Conference on Collaborative Technologies 2010 (IADIS 2010). Freiburg, Germany 26 - 31 Jul 2010 Germany.

Paper

Connecting users and items with weighted tags for personalized item recommendations
Liang, Huizhi, Xu, Yue, Li, Yuefeng, Nayak, Richi and Tao, Xiaohui. 2010. "Connecting users and items with weighted tags for personalized item recommendations." Chignell, Mark and Toms, Elaine (ed.) HT 2010: 21st ACM Conference on Hypertext and Hypermedia. Toronto, Canada 13 - 16 Jun 2010 New York, USA. https://doi.org/10.1145/1810617.1810628

Paper

Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Geva, Shlomo. 2010. "Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents." Huang, Xiangji Jimmy, King, Irwin, Raghavan, Vijay and Rueger, Stefan (ed.) 2010 IEEE/WIC/ACM International Conference on Web Intelligence. Toronto, Canada 31 Aug - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2010.76

Paper

A knowledge-based model using ontologies for personalized web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2010. "A knowledge-based model using ontologies for personalized web information gathering." Web Intelligence. 8 (3), pp. 235-254. https://doi.org/10.3233/WIA-2010-0189

Article

The enablers and implementation model for mobile KMS in Australian healthcare
Tsai, Heng-Sheng and Gururajan, Raj. 2010. "The enablers and implementation model for mobile KMS in Australian healthcare." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.22

Paper

Building a mobile website
MacAlpine, Ken. 2011. "Building a mobile website." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Presentation

Mapping a library
MacAlpine, Ken. 2011. "Mapping a library." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Poster

Integrating mobile into existing applications
Moffatt, Sam. 2011. "Integrating mobile into existing applications." 3rd International m-libraries Conference 2011: Mobile Technologies: Information on the Move. Brisbane, Australia 11 - 13 May 2011 Brisbane, Australia.

Presentation

A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007

Article

Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13

Paper

Modelling of staged routing for reduced carbon footprints of large server clusters
Kist, Alexander A.. 2011. "Modelling of staged routing for reduced carbon footprints of large server clusters." International Journal of Communication Networks and Distributed Systems. 6 (1), pp. 28-44. https://doi.org/10.1504/IJCNDS.2011.037326

Article

Repositories post 2010: embracing heterogeneity in AWE, the Academic Working Environment
Sefton, Peter and Dickinson, Duncan. 2010. "Repositories post 2010: embracing heterogeneity in AWE, the Academic Working Environment." 5th International Conference on Open Repositories. Madrid, Spain 06 - 09 Jul 2010

Paper

A proposal for a LCA community knowledge management system
Grist, Shelly and Toleman, Mark. 2010. "A proposal for a LCA community knowledge management system." Notarnicola, Bruno, Settanni, Ettore, Tassielli, Giuseppe and Giungato, Pasquale (ed.) 7th International Conference on Life Cycle Assessment in the Agri-Food Sector (LCA Food 2010). Bari, Italy 22 - 24 Sep 2010 Bari, Italy.

Poster

Adoption of e-commerce by Canadian SMEs: defining organizational, environmental and innovation characteristics
Sparling, Lynn, Cater-Steel, Aileen and Toleman, Mark. 2010. "Adoption of e-commerce by Canadian SMEs: defining organizational, environmental and innovation characteristics." Encyclopedia of e-business development and management in the global economy. Hershey, PA, United States. IGI Global. pp. 305-315

Edited book (chapter)

The influence of B2B e-commerce on SMEs' performance and efficiency: a review of the literature
Al-Bakri, Anas, Cater-Steel, Aileen and Soar, Jeffrey. 2010. "The influence of B2B e-commerce on SMEs' performance and efficiency: a review of the literature." International Journal of Liability and Scientific Enquiry. 3 (3), pp. 213-224. https://doi.org/10.1504/IJLSE.2010.033356

Article

Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.

Paper

Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.

Paper

Using clickers to support information literacy skills development and instruction in first-year business students
Stagg, Adrian and Lane, Michael. 2010. "Using clickers to support information literacy skills development and instruction in first-year business students." Journal of Information Technology Education: Research. 9, pp. 197-215.

Article

Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166

Poster

Internet and self-regulation in China: the cultural logic of controlled commodification
Weber, Ian and Lu, Jia. 2007. "Internet and self-regulation in China: the cultural logic of controlled commodification." Media Culture and Society. 29 (5), pp. 772-789. https://doi.org/10.1177/0163443707080536

Article

Towards scholarly HTML
Sefton, Peter. 2009. "Towards scholarly HTML." Serials Review. 35 (3), pp. 154-158. https://doi.org/10.1016/j.serrev.2009.05.001

Article

Situated approaches to information literacy for nurses: the view from a Canadian nurse
Yibbotson, Yvonne. 2006. "Situated approaches to information literacy for nurses: the view from a Canadian nurse." International Journal of Pedagogies and Learning. 2 (3), pp. 61-69. https://doi.org/10.5555/ijpl.2.3.61

Article

Re-discovering repository architecture: adding discovery as a key service
Sefton, Peter. 2008. "Re-discovering repository architecture: adding discovery as a key service ." New Review of Information Networking. 14 (2), pp. 84-101. https://doi.org/10.1080/13614570903359407

Article

Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.

Article

Extent of adoption of EDI by Singaporean SMEs: a survey of practices
Li, Ping and Mula, Joseph M.. 2009. "Extent of adoption of EDI by Singaporean SMEs: a survey of practices." Journal of Information Technology Management. XX (3), pp. 1-13.

Article

Data Governance in a University Context
Te'o, Togamau and Goder, M.L.. 2010. Data Governance in a University Context. Toowoomba, Australia. University of Southern Queensland.

Other

A new approach to multimedia information filtering based on its structure
Huang, Xiaodi and Yong, Jianming. 2004. "A new approach to multimedia information filtering based on its structure." Correia, N., Jorge, J., Chambel, T. and Pan, Z. (ed.) Mutimedia 2004 Eurographics Symposium. Nanjing, China 27 - 28 Oct 2004 New York, USA.

Paper

Using association rules to make rule-based classifiers robust
Hu, Hong and Li, Jiuyong. 2005. "Using association rules to make rule-based classifiers robust." Williams, Hugh E. and Dobbie, Gillian (ed.) ADC 2005: 16th Australasian Database Conference. Newcastle, Australia 31 Jan - 03 Feb 2005 Sydney, Australia.

Paper

The Fascinator: a lightweight, modular contribution to the Fedora-commons world
Sefton, Peter and Lucido, Oliver. 2009. "The Fascinator: a lightweight, modular contribution to the Fedora-commons world." Open Repositories 2009. Atlanta, United States 18 - 21 May 2009

Paper

The Fascinator, flexible repository services
Sefton, Peter. 2009. "The Fascinator, flexible repository services." Open Repositories 2009. Atlanta, United States 18 - 21 May 2009

Poster

ICE-theorem - end to end semantically aware eResearch infrastructure for theses
Sefton, Peter, Downing, Jim and Day, Nick. 2009. "ICE-theorem - end to end semantically aware eResearch infrastructure for theses." Open Repositories 2009. Atlanta, United States 18 - 21 May 2009

Paper

Preface [to Business web strategy: design, alignment and application]
Memmola, Massimo and Al-Hakim, Latif. 2009. "Preface [to Business web strategy: design, alignment and application]." Al-Hakim, Latif and Memmola, Massimo (ed.) Business web strategy: design, alignment and application. Hershey, PA. United States. IGI Global.

Edited book (chapter)

Improving efficiency and scalability of service network graph by re-routing service routes
Lai, David and Zhang, Zhongwei. 2009. "Improving efficiency and scalability of service network graph by re-routing service routes." Nguyen, Ngoc Thanh, Nguyen, Huynh Phan and Grzech, Adam (ed.) ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems. Dong Hoi, Vietnam 01 - 03 Apr 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ACIIDS.2009.31

Paper

Technology strategy and performance: a study of information technology service providers from selected Asian countries
Chadee, Doren and Pang, Billy. 2008. "Technology strategy and performance: a study of information technology service providers from selected Asian countries." Service Business: an international journal. 2 (2), pp. 109-126. https://doi.org/10.1007/s11628-007-0027-x

Article

Hyperlinked concept map enhancements for electronic study materials
Phythian, Mark and Das Gupta, Jishu. 2008. "Hyperlinked concept map enhancements for electronic study materials." Mann, Llewellyn, Thompson, Adam and Howard, Prue (ed.) 19th Annual Conference of the Australasian Association for Engineering Education (AAEE 2008). Yeppoon, Australia 07 - 10 Dec 2008 Canberra, Australia.

Paper

Combining web data mining techniques for web page access prediction
Khalil, Faten. 2008. Combining web data mining techniques for web page access prediction. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Building institutional repository infrastructure in regional Australia
Drury, Caroline. 2006. "Building institutional repository infrastructure in regional Australia." OCLC Systems and Services: international digital library perspectives. 23 (4), pp. 395-402. https://doi.org/10.1108/10650750710831538

Article