4606. Distributed computing and systems software


Title4606. Distributed computing and systems software
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
A web 2.0/web3D hybrid platform for engaging students in e-learning environments
de Byl, Penny and Taylor, Janet. 2007. "A web 2.0/web3D hybrid platform for engaging students in e-learning environments." Turkish Online Journal of Distance Education. 8 (3), pp. 108-127.

Article

Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3

Article

Achieving secure service sharing over IP networks
Lai, David, Zhang, Zhongwei and Shen, Chong. 2006. "Achieving secure service sharing over IP networks." Li, Hong (ed.) ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006). New York, United States 28 - 29 Apr 2006 New York, USA.

Paper

Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks
Zhou, Hong and Zhang, Zhongwei. 2009. "Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks." Martini, Maria and Politis, Christos (ed.) 5th International ICST Mobile Multimedia Communications Conference (MobiMedia'09). London, United Kingdom 07 - 09 Sep 2009 Brussels, Belgium. https://doi.org/10.4108/ICST.MOBIMEDIA2009.7438

Paper

Adopting organisation learning theory in the classroom: advancing learning through the use of blogging and self-reflection
Hume, Margee. 2012. "Adopting organisation learning theory in the classroom: advancing learning through the use of blogging and self-reflection." International Journal of Learning and Change. 6 (1-2), pp. 49-65. https://doi.org/10.1504/IJLC.2012.045856

Article

Adoption and use of Web 2.0 technologies: a comparison of four adoption models as a case study of a state government eExtension project
James, David John. 2015. Adoption and use of Web 2.0 technologies: a comparison of four adoption models as a case study of a state government eExtension project. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Advanced Antenna Technologies in the Beyond IMT-Advanced Systems
Peng, Mugen, Wang, Cheng-Xiang, Gao, Feifei and Xiang, Wei. 2013. "Advanced Antenna Technologies in the Beyond IMT-Advanced Systems ." International Journal of Antennas and Propagation. 2013. https://doi.org/10.1155/2013/156831

Editorial

Advancements of outlier detection: a survey
Zhang, Ji. 2013. "Advancements of outlier detection: a survey." ICST Transactions on Scalable Information Systems. 13 (1), pp. 1-26. https://doi.org/10.4108/trans.sis.2013.01-03.e2

Article

Algorithms for core stability, core largeness, exactness, and extendability of flow games
Fang, Qizhi, Fleischer, Rudolf, Li, Jian and Sun, Xiaoxun. 2010. "Algorithms for core stability, core largeness, exactness, and extendability of flow games ." Frontiers of Mathematics in China. 5 (1), pp. 47-63. https://doi.org/10.1007/s11464-009-0048-y

Article

An Achilles heel: denial of service attacks on Australian critical information infrastructures
Christensen, Sharon, Caelli, William J., Duncan, William D. and Georgiades, Eugenia. 2010. "An Achilles heel: denial of service attacks on Australian critical information infrastructures." Information and Communications Technology Law. 19 (1), pp. 61-85. https://doi.org/10.1080/13600831003708059

Article

An active approach to multimedia network management
Zhang, Zhongwei and Lai, David. 2005. "An active approach to multimedia network management." Mastorakis, Nikos and Passadis, Kostas (ed.) 9th WSEAS International Conference on Communications. Athens, Greece 11 - 16 Jul 2005 Athens, Greece.

Paper

An adaptive anti-collision protocol for large-scale RFID tag identification
Zhang, Lijuan, Xiang, Wei and Tang, Xiaohu. 2014. "An adaptive anti-collision protocol for large-scale RFID tag identification." IEEE Wireless Communications Letters. 3 (6), pp. 601-604. https://doi.org/10.1109/LWC.2014.2359461

Article

An assessment of the contribution of volunteered geographic information during recent natural disasters
McDougall, Kevin. 2012. "An assessment of the contribution of volunteered geographic information during recent natural disasters." Rajabifard, Abbas and Coleman, David (ed.) Spatially enabling government, industry and citizens: research and development perspectives. Needham, MA, United States. GSDI Association Press. pp. 201-214

Edited book (chapter)

An effective integrated-RBFN Cartesian-grid discretization for the stream function-vorticity-temperature formulation in nonrectangular domains
Le-Cao, K., Mai-Duy, N. and Tran-Cong, T.. 2009. "An effective integrated-RBFN Cartesian-grid discretization for the stream function-vorticity-temperature formulation in nonrectangular domains." Numerical Heat Transfer Part B: Fundamentals. 55 (6), pp. 480-502. https://doi.org/10.1080/10407790902827470

Article

An efficient and secure itinerary-based data aggregation algorithm for WSNs
Wang, Taochun, Zhang, Ji, Luo, Yonglong, Zuo, Kaizhong and Ding, Xintao. 2017. "An efficient and secure itinerary-based data aggregation algorithm for WSNs." 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). Sydney, Australia 01 - 04 Aug 2017 United States. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268

Paper

An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
Sahi, Aqeel, Lai, David, Li, Yan and Diykh, Mohammed. 2017. "An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment ." IEEE Access. 5, pp. 6036-6048. https://doi.org/10.1109/ACCESS.2017.2688460

Article

An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)
Lane, Michael Steven and Shrestha, Anup. 2011. "An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)." Rotchanakitumnuai, Siriluck and Kaewkitipong, Laddawan (ed.) 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011). Bangkok, Thailand 28 Nov - 02 Dec 2011 Bangkok, Thailand.

Paper

An energy efficient TCP DoS attacks mitigation method in cloud computing
Sahi, Aqeel, Lai, David and Li, Yan. 2017. "An energy efficient TCP DoS attacks mitigation method in cloud computing." Al-Jumaily, Adel Ali, Barifcani, Ahmed and Al-Jumaily, Ahmed (ed.) 1st MoHESR and HCED Iraqi Scholars Conference in Australasia 2017 (ISCA 2017). Melbourne, Australia 05 - 06 Dec 2017 Melbourne, Australia.

Paper

An evaluation of NoSQL databases for EHR systems
Ercan, Mehmet Zahid and Lane, Michael. 2014. "An evaluation of NoSQL databases for EHR systems." Tan, Felix and Bunker, Deborah (ed.) 25th Australasian Conference on Information Systems (ACIS 2014). Auckland, New Zealand 08 - 10 Dec 2014 Auckland, New Zealand.

Paper

An evaluation of the performance of a NoSQL document database in a simulation of a large scale Electronic Health Record (EHR) system
Ercan, Mehmet Zahid. 2017. An evaluation of the performance of a NoSQL document database in a simulation of a large scale Electronic Health Record (EHR) system. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/5c09b7aff0cc4

PhD Thesis

An exploratory investigation of usage of digital stethoscope by clinicians in telehealth setting through Information Systems success model
Soroush, Layla. 2011. An exploratory investigation of usage of digital stethoscope by clinicians in telehealth setting through Information Systems success model. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

An exploratory qualitative study to determine factors influencing the adoption of mobile learning for tertiary education
Gururajan, Raj, McDonald, Jacquelin, Gururajan, Vijaya and Genrich, Rohan. 2007. "An exploratory qualitative study to determine factors influencing the adoption of mobile learning for tertiary education." International Journal of Technology, Knowledge and Society. 2 (6), pp. 33-40.

Article

An exploratory study of mobile learning for tertiary education: a discussion with students
Hafeez-Baig, Abdul, Gururajan, Raj and Gururajan, Vijaya. 2006. "An exploratory study of mobile learning for tertiary education: a discussion with students." International Journal of Pedagogies and Learning. 2 (1), pp. 76-88.

Article

An exploratory study to identify the determinants of the wireless handheld devices in higher education: a case of USQ
Hafeez-Baig, Abdul. 2007. "An exploratory study to identify the determinants of the wireless handheld devices in higher education: a case of USQ." Montgomerie, Craig and Seale, Jane (ed.) ED-MEDIA 2007: World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007. Vancouver, Canada 25 - 29 Jun 2007 Chesapeake, VA, United States.

Paper

An extended bilevel programming model and its Kth-best algorithm for dynamic decision making in emergency situations
Zhou, Hong, Lu, Jie and Zhang, GuangQuan. 2014. "An extended bilevel programming model and its Kth-best algorithm for dynamic decision making in emergency situations." IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making (MCDM) (2014). Orlando, United States 09 - 12 Dec 2014 Piscataway, NJ. USA. https://doi.org/10.1109/MCDM.2014.7007194

Paper

An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks
Lai, David and Zhang, Zhongwei. 2005. "An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks." WSEAS Transactions on Communications. 4 (8), pp. 537-547.

Article

An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control
Chen, Fulong, Luo, Yonglong, Zhang, Ji, Zhu, Junru, Zhang, Ziyang, Zhao, Chuanxin and Wang, Taochun. 2018. "An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control." World Wide Web. 21 (1), pp. 33-57. https://doi.org/10.1007/s11280-017-0455-z

Article

An innovative outlier detection method using localized thresholds
Zhang, Ji, Cao, Jie and Zhu, Xiaodong. 2012. "An innovative outlier detection method using localized thresholds." Data and Knowledge Engineering. https://doi.org/10.1007/978-3-642-34679-8-7

Article

An intelligent scheme of secure routing for mobile ad hoc networks
Zhang, Zhongwei. 2009. "An intelligent scheme of secure routing for mobile ad hoc networks." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813739

Poster

Analysis of unitary distributed spatial-temporal precoding in MIMO relay systems
Long, Hang, Xiang, Wei, Zhang, Yueying, Wang, Jing and Wu, Bin. 2012. "Analysis of unitary distributed spatial-temporal precoding in MIMO relay systems." Liu, Xingang, Yang, Laurence T., Chen, Min and Lai, Chin-Feng (ed.) 12th IEEE International Conference on Computer and Information Technology (CIT 2012). Chengdu, China 27 - 29 Oct 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/CIT.2012.67

Paper

Antraff traffic analysis software user manual, June 21, 2016
Addie, Ronald. 2016. Antraff traffic analysis software user manual, June 21, 2016. Toowoomba, Australia. University of Southern Queensland.

Manual/Instructions

Applications and performances of extended TTDDs in large-scale wireless sensor networks
Zhou, Hong, Jin, Lu, Zhang, Zhongwei, Ali, Hesham and Wang, Chulho. 2007. "Applications and performances of extended TTDDs in large-scale wireless sensor networks." Zhang, H., Olariu, S., Cao, Jiannong and Johnson, D. B. (ed.) 3rd International Conference of Mobile Ad-hoc and Sensor Networks. Beijing, China 12 - 14 Dec 2007 Berlin. https://doi.org/10.1007/978-3-540-77024-4

Paper

Applying Augmented Reality to New or Existing Remote Access Laboratories
Smith, Mark, Maiti, Ananda, Maxwell, Andrew and Kist, Alexander A.. 2019. "Applying Augmented Reality to New or Existing Remote Access Laboratories." Cardoso, Alberto and Restivo, Maria Teresa (ed.) 5th Experiment@International Conference (exp.at'19). Madeira, Portugal 12 - 14 Jun 2019 United States. https://doi.org/10.1109/EXPAT.2019.8876551

Paper

ascilite community mentoring program and collaborative community mentoring program: when I succeed, we succeed!
Reushle, Shirley. 2011. "ascilite community mentoring program and collaborative community mentoring program: when I succeed, we succeed!" Williams, Gary, Statham, Peta, Brown, Noel and Cleland, B. (ed.) 28th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2011). Hobart, Australia 04 - 07 Dec 2011 Gold Coast, Australia.

Other

Assessment issues and new technologies: ePortfolio possibilities
Finger, Glenn and Jamieson-Proctor, Romina. 2009. "Assessment issues and new technologies: ePortfolio possibilities." Wyatt-Smith, Claire M. and Cumming, Joy J. (ed.) Educational assessment in the 21st century: connecting theory and practice. Netherlands. Springer. pp. 63-81

Edited book (chapter)

Auction-Promoted Trading for Multiple Federated Learning Services in UAV-Aided Networks
Cheng, Zhipeng, Liwang, Minghui, Xia, Xiaoyu, Min, Minghui, Wang, Xianbin and Du, Xiaojiang. 2022. "Auction-Promoted Trading for Multiple Federated Learning Services in UAV-Aided Networks." IEEE Transactions on Vehicular Technology. 71 (10), pp. 10960 - 10974. https://doi.org/10.1109/TVT.2022.3184026

Article

Augmented and mixed reality features and tools for remote laboratory experiment
Smith, Mark, Maiti, Ananda, Maxwell, Andrew D. and Kist, Alexander A.. 2016. "Augmented and mixed reality features and tools for remote laboratory experiment." International Journal of Online Engineering. 12 (7), pp. 45-52. https://doi.org/10.3991/ijoe.v12i07.5851

Article

Authentic learning across international borders: a cross institutional online project for pre-service teachers
Redmond, Petrea and Lock, Jennifer V.. 2009. "Authentic learning across international borders: a cross institutional online project for pre-service teachers." Maddux, Cleborne D. (ed.) Research highlights in technology and teacher education 2009. Chesapeake, VA. United States. Society for Information Technology & Teacher Education (SITE). pp. 265-273

Edited book (chapter)

Autonomic and sense and respond logistics: the 'foxhole to factory to foxhole' continuum of combat service support
Hingst, Ray and Gunter, Greg. 2010. "Autonomic and sense and respond logistics: the 'foxhole to factory to foxhole' continuum of combat service support." Australian Army Journal. 7 (1), pp. 57-69.

Article

Autonomic and sense and respond logistics: the 'foxhole to factory to foxhole' continuum of combat service support
Hingst, Ray and Gunter, Greg. 2008. "Autonomic and sense and respond logistics: the 'foxhole to factory to foxhole' continuum of combat service support." Puri, Vinod and Filippidis, Despina (ed.) Land Warfare Conference (LWC 2008): Force Protection in the 21st Century - Deter, Detect, Disrupt and Defeat. Brisbane, Australia 27 - 31 Oct 2008 Canberra, Australia.

Paper