4699. Other information and computing sciences
Title | 4699. Other information and computing sciences |
---|---|
Parent | 46. Information and Computing Sciences |
Latest research outputs
Sort by Date Title
Psychological theories and their applicability in resolving issues with unauthorised computer access
Howard, Angela A. M.. 2011. Psychological theories and their applicability in resolving issues with unauthorised computer access. Masters Thesis Master of Business (Research). University of Southern Queensland.Masters Thesis
A comparative study of human teacher and computer teacher
Nooriafshar, Mehryar. 2010. "A comparative study of human teacher and computer teacher ." Desmond, Timothy (ed.) 2nd Asian Conference on Education: Internationalization or Globalization? (ACE2010). Osaka, Japan 02 - 05 Dec 2010 Osaka, Japan.Paper
Estimating gas concentration using a microcantilever-based electronic nose
Leis, John, Zhao, Weichang, Pinnaduwage, Lal A., Gehl, Anthony C., Allman, Steve L., Shepp, Allan and Mahmud, Ken K.. 2010. "Estimating gas concentration using a microcantilever-based electronic nose." Digital Signal Processing. 20 (4), pp. 1229-1237. https://doi.org/10.1016/j.dsp.2009.10.026Article
Implementing computer aided engineering in engineering courses
Toleman, Mark and Hall, David. 1987. "Implementing computer aided engineering in engineering courses." 18th CAE Computer Conference. Adelaide, Australia Aug 1987Paper
Building an open lab on information quality for future computer education
Su, Ying, Peng, Jie and Al-Hakim, Latif. 2009. "Building an open lab on information quality for future computer education." ICCSE 2009: International Conference on Computer Science and Education. Nanning, China 25 - 28 Jul 2009 USA. https://doi.org/10.1109/ICCSE.2009.5228252Paper
User experiences and a usability inspection of an electronic services environment for students
Toleman, Mark A. and Toleman, Jessica M.. 1998. "User experiences and a usability inspection of an electronic services environment for students." Calder, Paul and Thomas, Bruce (ed.) Australasian Computer-Human Interaction Conference (OzCHI 1998). Adelaide, Australia 30 Nov - 04 Dec 1998 Los Alamitos, CA. United States. https://doi.org/10.1109/OZCHI.1998.732200Paper
On the effectiveness of gene selection for microarray classification methods
Zhang, Zhongwei, Li, Jiuyong, Hu, Hong and Zhou, Hong. 2010. "On the effectiveness of gene selection for microarray classification methods." Nguyen, Ngoc Thanh, Le, Manh Thanh and Swiatek, Jerzy (ed.) 2nd Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010). Hue City, Vietnam 24 - 26 Mar 2010 Heidelberg, Germany. https://doi.org/10.1007/978-3-642-12101-2_31Paper
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.Paper
Photogrammetric-based security system
Ariff, Mohd Farid Mohd, Majid, Zulkepli, Chong, Albert K. and Setan, Halim. 2009. "Photogrammetric-based security system." Geoinformation Science Journal. 9 (1), pp. 62-69.Article
A photogrammetric application in virtual sport training
Chong, Albert K. and Croft, Hayden G.. 2009. "A photogrammetric application in virtual sport training." The Photogrammetric Record. 24 (125), pp. 51-65. https://doi.org/10.1111/j.1477-9730.2009.00517.xArticle
Summer of Code 2009
Moffatt, Sam. 2009. "Summer of Code 2009." JoomlaDay Bangkok 2009. Bangkok, Thailand 22 - 23 Aug 2009 Bangkok, Thailand.Presentation
A face recognition system on distributed evolutionary computing using on-line GA
Young, Nam Mi, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "A face recognition system on distributed evolutionary computing using on-line GA." Huang, D., Li, K. and Irwin, G.W. (ed.) Intelligent Control and Automation: International Conference on Intelligent Computing ( ICIC 2006) Kunming, China, August, 2006. Kunming,China Aug 2006 Berlin / Heidelberg. https://doi.org/10.1007/978-3-540-37258-5_2Paper
Real time face detection system based edge restoration and nested K-means at frontal view
Joo, Hyun Jea, Jang, Bong Won, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "Real time face detection system based edge restoration and nested K-means at frontal view." Wang, Lipo (ed.) 3rd International Conference on Fuzzy Systems and Knowledge Discovery . Xi'an, China 24 - 28 Sep 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11881599_148Paper
Adaptive context-aware filter fusion for face recognition on bad illumination
Young, Nam Mi, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2006. "Adaptive context-aware filter fusion for face recognition on bad illumination." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) KES 2006: 10th International Conference on Knowlege-Based Intelligent Information and Engineering Systems . Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11892960_65Paper
Adaptive classifier selection on hierarchical context modeling for robust vision systems
Jin, SongGuo, Jung, Eun Sung, Bashar, Md. Rezaul, Nam, Mi Young and Rhee, Phill Kyu. 2006. "Adaptive classifier selection on hierarchical context modeling for robust vision systems." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Berlin / Heidelberg, Germany. https://doi.org/10.1007/11893011_16Paper
Methods for the blind signal separation problem
Li, Yan, Wen, Peng and Powers, David. 2003. "Methods for the blind signal separation problem." ICNNSP 2003: International Conference on Neural Networks and Signal Processing. Nanjing, China 14 - 17 Dec 2003 Piscataway, NJ. United States. https://doi.org/10.1109/ICNNSP.2003.1281131Paper
An ensemble learning algorithm for blind signal separation problem
Li, Yan and Wen, Peng. 2005. "An ensemble learning algorithm for blind signal separation problem." 2005 International Conference on Computational Intelligence for Modelling, Control and Automation (CIMCA 2005). Vienna, Austria 28 - 30 Nov 2005 Washington, DC, united States.Paper
Click go the students, click-click-click: how to give and gain students' feedback to dynamically modify delivery in the classroom to students' needs
Mula, Joseph M.. 2008. "Click go the students, click-click-click: how to give and gain students' feedback to dynamically modify delivery in the classroom to students' needs." 2008 Accounting and Finance Association of Australia and New Zealand Conference (2008 AFAANZ). Sydney, Australia 06 - 08 Jul 2008 Sydney,. Australia.Paper
Adaptive feature representation for robust face recognition using context-aware approach
Nam, Mi Young, Bashar, Md. Rezaul and Rhee, Phill Kyu. 2007. "Adaptive feature representation for robust face recognition using context-aware approach." Neurocomputing. 70 (4-6), pp. 648-656. https://doi.org/10.1016/j.neucom.2006.10.036Article
A critical theory approach to information technology transfer to the developing world and a critique of maintained assumptions in the literature
Al-Mabrouk, Khalid and James, Kieran. 2009. "A critical theory approach to information technology transfer to the developing world and a critique of maintained assumptions in the literature." Cater-Steel, Aileen and Al-Hakim, Latif (ed.) Information systems research methods, epistemology, and applications. Hershey PA, USA. IGI Global. pp. 73-87Edited book (chapter)
Web-based hospital information system for managing operating theatre waiting list
Al-Hakim, Latif. 2006. "Web-based hospital information system for managing operating theatre waiting list." International Journal of Healthcare Technology and Management. 7 (3-4), pp. 266-282. https://doi.org/10.1504/IJHTM.2006.008436Article
Important considerations for craniofacial mapping using laser scanners
Majid, Zulkepli, Chong, Albert K. and Setan, Halim. 2007. "Important considerations for craniofacial mapping using laser scanners." The Photogrammetric Record. 22 (120), pp. 290-308. https://doi.org/10.1111/j.1477-9730.2007.00449.xArticle
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.Paper
Rice crop mapping using radar imagery: comparison of classification accuracy of different Envisat ASAR modes and classifiers
Lam-Dao, Nguyen, Apan, Armando, Le-Toan, Thuy, Bouvet, Alexandre, Young, Frank and Le-Van, Trung. 2009. "Rice crop mapping using radar imagery: comparison of classification accuracy of different Envisat ASAR modes and classifiers." Ostendorf, Bertram, Baldock, Penny, Bruce, David, Burdett, Michael and Corcoran, Paul (ed.) 2009 Surveying and Spatial Sciences Institute Biennial International Conference (SSC 2009): Spatial Diversity. Adelaide, Australia 28 Sep - 02 Oct 2009 Adelaide, Australia.Paper
Rough sets and knowledge technology: proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 2009. Rough sets and knowledge technology: proceedings of the 4th International Conference on Rough Sets and Knowledge Technology . Berlin / Heidelberg, Germany. Springer.Edited book
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782Article
Evaluation of the performance of DEM interpolation algorithms for LiDAR data
Liu, Xiaoye, Zhang, Zhenyu and Peterson, Jim. 2009. "Evaluation of the performance of DEM interpolation algorithms for LiDAR data." Ostendorf, Bertram, Baldock, Penny, Bruce, David, Burdett, Michael and Corcoran, Paul (ed.) 2009 Surveying and Spatial Sciences Institute Biennial International Conference (SSC 2009): Spatial Diversity. Adelaide, Australia 28 Sep - 02 Oct 2009 Adelaide, Australia.Paper
Eight years of computing education papers at NACCQ
Sheard, Judy, Carbone, Angela, de Raadt, Michael, Hamilton, Margaret, Lister, Raymond and Thompson, Errol. 2008. "Eight years of computing education papers at NACCQ." Mann, Samuel and Lopez, Mike (ed.) Conference of the National Advisory Committee on Computing Qualifications (NACCQ 2008). Auckland, New Zealand 04 - 07 Jul 2008 Hamilton, New Zealand.Paper
Information systems audit and control issues with enterprise management systems: qualitative evidence
Green, Peter F., Best, Peter J., Indulska, Marta and Rowlands, Terry. 2005. "Information systems audit and control issues with enterprise management systems: qualitative evidence." Australian Accounting Review. 15 (3), pp. 68-77.Article
Classifying computing education papers: process and results
Carbone, Angela, de Raadt, Michael, Lister, Raymond, Hamilton, Margaret and Sheard, Judy. 2008. "Classifying computing education papers: process and results ." Caspersen, Michael (ed.) 4th International Computing Education Research Workshop (ICER 2008) . Sydney, Australia 06 - 07 Sep 2008 New York, NY. United States. https://doi.org/10.1145/1404520.1404536Paper
Experiences in wireless application development in a healthcare setting
Gururajan, Raj and Vuori, Timo. 2003. "Experiences in wireless application development in a healthcare setting." Knight, S., Croft, L. and Lachowicz, E. (ed.) 4th International We-B Conference 2003: Working With e-Business. Perth, Australia 24 - 25 Nov 2003 Joondalup, Western Australia.Paper
Barriers to uptake of wireless healthcare applications - a review
Gururajan, Raj, Last, J. and Rai, S.. 2003. "Barriers to uptake of wireless healthcare applications - a review." 3rd International Conference on Electronic Business: Business Paradigms: Strategic Transformation and Partnership (ICEB 2003) . Singapore 09 - 13 Dec 2003 Singapore.Paper
Legal and regulatory issues of implementation of electronic signatures
Gururajan, Raj and Hafeez-Baig, Abdul. 2004. "Legal and regulatory issues of implementation of electronic signatures." 2004 AusCERT: Computer Security: Are we there yet?. Gold Coast, Australia 23 - 27 May 2004 Brisbane, Australia.Paper
Emergence of new legal and regulatory mechanisms for the internet workforce
Gururajan, Raj. 2004. "Emergence of new legal and regulatory mechanisms for the internet workforce." Internet Business Review . 1, pp. 1-15.Article
Lessons learned in developing a wireless system for a healthcare industry
Gururajan, Raj and Vuori, Timo. 2003. "Lessons learned in developing a wireless system for a healthcare industry." 2003 ITS Asia-Australasia Regional Conference. Perth, Australia 22 - 24 Jun 2003Paper
Mobile healthcare applications: global developments to facilitate secure wireless applications
Vuori, Timo and Gururajan, Raj. 2003. "Mobile healthcare applications: global developments to facilitate secure wireless applications." 2003 ITS Asia-Australasia Regional Conference. Perth, Australia 22 - 24 Jun 2003 Calgary, Alberta, Canada .Paper
Lessons for SMEs in implementing wireless technology solutions
Gururajan, Raj. 2004. "Lessons for SMEs in implementing wireless technology solutions." 3rd International Conference on SMEs in a Global Economy. Kuala Lumpur, Malaysia 06 - 07 Jul 2004 Wollongong, Australia.Paper
Semi-bipartite graph visualization for gene ontology networks
Xu, Kai, Williams, Rohan, Hong, Seok-Hee, Liu, Qing and Zhang, Ji. 2010. "Semi-bipartite graph visualization for gene ontology networks." Eppstein, D. and Gansner, E. R. (ed.) GD 2009: 17th International Symposium on Graph Drawing. Chicago, United States 22 - 25 Sep 2009 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-11805-0_24Paper
FlowRecommender: a workflow recommendation technique for process provenance
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "FlowRecommender: a workflow recommendation technique for process provenance." Kennedy, Paul J., Ong, Kok-Leong and Christen, Peter (ed.) 8th Australasian Data Mining Conference (AusDM 2009): Data Mining and Analytics. Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.Paper
Understanding and enlivening AQM workings using computer simualtion
Shen, Chong, Zhang, Zhongwei and Lai, David. 2006. "Understanding and enlivening AQM workings using computer simualtion." Li, Hong (ed.) ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006). New York, United States 28 - 29 Apr 2006 New York, USA.Paper