Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000)"
|Up a level|
- Subjects classification (32824)
- Australian and New Zealand Standard Research Classification (32824)
- INFORMATION AND COMPUTING SCIENCES (080000) (3626)
- DATA FORMAT (080400) (194)
- INFORMATION SYSTEMS (080600) (1276)
- INFORMATION AND COMPUTING SCIENCES (080000) (3626)
- Australian and New Zealand Standard Research Classification (32824)
Group by: Authors/Creators | Item Type
Number of items at this level: 237.
Foth, Marcus (Ed.) (2009) Handbook of Research on Urban Informatics: The Practice and Promise of the Real-Time City. Information Science Reference, IGI Global, Hershey, Pa.
Benatallah, Boualem, Dijkman, Remco, Dumas, Marlon, & Maamar, Zakaria (2005) Service Composition: Concepts, Techniques, Tools and Trends. In Stojanovic, Zoran & Dahanayake, Ajantha (Eds.) Service-Oriented Software System Engineering: Challenges and Practices. IDEA Group, Hershey, PA, pp. 48-66.
Bruce, Christine S., McMahon, Camille A., Hynd, John R., Roggenkamp, Michael G., Stoodley, Ian D., & Buckingham, Lawrence I. (2006) Ways of experiencing the act of learning to program: A phenomenographic study of introductory programming students at university. In Bruce, Christine S., Mohay, George M., Smith, Glenn P., Stoodley, Ian D., & Tweedale, Robyn (Eds.) Transforming IT education: Promoting a culture of excellence. Informing Science Press, United States, pp. 301-325.
Edwards, Sylvia L. & Partridge, Helen L. (2006) E-Learning & Learning Objects: Learning Information Searching in an E-Learning Environment. In Harman, K. & Koohang, Alex (Eds.) Learning Objects: Applications, Implications and Future Directions. Informing Science Press, pp. 95-143.
Gesche, Astrid H. (2006) Genetic testing and human genetic databases. In Betta, Michela (Ed.) The moral, social, and commercial imperatives of genetic testing and screening : the Australian case. Springer, The Netherlands, Dordrecht, pp. 71-93.
Gottschalk, Florian & La Rosa, Marcello (2010) Process configuration in YAWL. In ter Hofstede, Arthur H.M., Aalst, Wil M.P. van der, Adams, Michael, & Russell, Nicholas (Eds.) Modern Business Process Automation : YAWL and its Support Environment. Springer, London, pp. 313-382.
Hearn, Gregory N. & Foth, Marcus (2005) Action Research in the Design of New Media and ICT Systems. In Kwansah-Aidoo, Kwamena (Ed.) Topical Issues in Communications and Media Research. Nova Science, New York, NY, pp. 79-94.
Hou, Jun, Zhang, Jinglan, Nayak, Richi, & Bose, Aishwarya (2011) Semantics-based web service discovery using information retrieval techniques. In Comparative Evaluation of Focused Retrieval. Springer-Verlag Berlin Heidelberg, pp. 336-346.
Huang, Henry, Maire, Frederic D., & Keeratipranon, Narongdech (2007) Bearing-only Simultaneous Localization and Mapping for Vision-Based Mobile Robots. In Obinata, Goro & Dutta, Ashish (Eds.) Vision Systems-Applications. I-Tech Education and Publishing, Vienna, Austria, pp. 335-360.
Kee, Kirk, Cradduck, Lucy M., Blodgett, Bridgett, & Olwan, Rami (2011) Cyberinfrastructure inside out : definition and influences shaping its emergence, development, and implementation in the early 21st century. In Araya, Daniel, Breindl, Yana, & Houghton, Tessa J. (Eds.) Nexus : New Intersections in Internet Research. Peter Lang, New York, pp. 157-189.
La Rosa, Marcello, Dumas, Marlon, & ter Hofstede, Arthur H.M. (2008) Modelling Business Process Variability for Design-Time Configuration. In Cardoso, Jorge & van der Aalst, Wil M.P. (Eds.) Handbook of Research on Business Process Modeling. Information Science Reference (IGI Global). (In Press)
Maire, Frederic D., Sitte, Joaquin, & Keeratipranon, Narongdech (2007) Desktop Robot Soccer. In Lima, Pedro (Ed.) Robotic Soccer. I-Tech Education and Publishing, Vienna, Austria, pp. 193-202.
Nayak, Richi (2002) Data mining for web-enabled electronic business applications. In Murthy, V.K. & Shi, Nansi (Eds.) Architectural Issues of Web-Enabled Electronic Business. Idea Group Publishing (IGI Global), Hershey, PA, pp. 128-138.
Nayak, Richi (2005) Discovering Knowledge from XML Documents. In Wang, John (Ed.) Encyclopedia of Data Warehousing and Mining. Idea Group Reference (IGI Global), Hershey, PA.
Nayak, Richi & Nayak, Anurag (2002) Electronic Business Over Wireless Device: A Case Study. In Murthy, V.K. & Shi, Nan Si (Eds.) Architectural Issues of Web-Enabled Electronic Business. Idea Group Publishing (IGI Global), Hershey, PA.
Nayak, Richi & Seow, Lawrence (2004) Knowledge discovery in mobile business data. In Shi, Nan Si (Ed.) Mobile Commerce Applications. Idea Group Publishing (IGI Global), Hershey, PA.
Satchell, Christine (2009) From Social Butterfly to Urban Citizen: The Evolution of Mobile Phone Practice. In Foth, Marcus (Ed.) Handbook of research on urban informatics: the practice and promise of the real-time city. Information Science Reference, IGI Global, Hershey, PA, pp. 353-365.
Singh, Supriya & Satchell, Christine (2004) Trust, control and design: A study of computer scientists. In Linger, Henry, Fisher, Julie, Wojtkowski, Wita, Wojtkowski, W.Gregory, Zupancic, Joze, Vigo, Kitty, et al. (Eds.) Constructing the Infrastructure for the Knowledge Economy: Methods and Tools, Theory and Practice. Kluwer Academic/Plenum Publishers, New York.
Assareh, Hassan, Smith, Ian, & Mengersen, Kerrie (2011) Bayesian estimation of the time of a linear trend in risk-adjusted control charts. IAENG International Journal of Computer Science, 38(4), pp. 409-417.
Azad, Salahuddin, Song, Wei, & Tjondronegoro, Dian W. (2011) Measuring bitrate and quality trade-off in a fast region-of-interest based video coding. Lecture Notes in Computer Science, 6524, pp. 442-453.
Bandara, Wasana, Fernandez, Walter, & Rowlands, Bruce (2012) Qualitative methods in information systems research. Australasian Journal of Information Systems, 17(2), pp. 5-7.
Bandara, Wasana, Gable, Guy G., & Rosemann, Michael (2007) Critical success factors of business process modeling. .
Bandara, Wasana, Tan, Hui Min, Recker, Jan, Indulska, Marta, & Rosemann, Michael (2007) Bibliography of process modeling: An Emerging research field. .
Barros, Alistair P., Dumas, Marlon, & Bruza, Peter D. (2005) The Move to Web Service Ecosystems. BPTrends, 3(3).
Bruce, Christine S., Buckingham, Lawrence I., Hynd, John R., McMahon, Camille A., Roggenkamp, Michael G., & Stoodley, Ian D. (2004) Ways of experiencing the act of learning to program: A phenomenographic study of introductory programming students at university. Journal of Information Technology Education, 3, pp. 144-160.
Bruce, Christine S., Edwards, Sylvia L., & Lupton, Mandy (2006) Six Frames for Information literacy Education. Italics, 5(1).
Butler, Darren E., Bove, V. Michael, & Sridharan, Sridha (2005) Real-Time Adaptive Foreground/Background Segmentation. EURASIP Journal on Applied Signal Processing, 2005, pp. 2292-2304.
Chen, Carla, Schwender, Holger, Keith, Jonathan, Nunkesser, Robin, Mengersen, Kerrie, & Macrossan, Paula (2011) Methods for identifying SNP interactions: A review on variations of logic regression, Random Forest and bayesian logistic regression. IEEE - ACM Transactions on Computational Biology and Bioinformatics, 8(6), pp. 1580-1591.
Choo, Kim-Kwang R., Boyd, Colin, Hitchcock, Yvonne, & Maitland, Greg M. (2005) On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. Lecture Notes in Computer Science, 3352, pp. 352-367.
Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Lecture Notes in Computer Science, 3788/2005, pp. 585-604.
Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2006) The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications, 29(15), pp. 2788-2797.
Conforti, Raffaele, Fortino, Giancarlo, La Rosa, Marcello, & ter Hofstede, Arthur (2011) History-aware, real-time risk detection in business processes. Lecture Notes in Computer Science [On the Move to Meaningful Internet Systems: OTM 2011 - Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2011 Proceedings, Part I], 7044, pp. 100-118.
Cooney, Dominic P., Dumas, Marlon, & Roe, Paul (2006) GPSL: A Programming Language for Service Implementation. Lecture Notes in Computer Science, 3922, pp. 3-17.
Das Gupta, Jishu, Howard, Srecko, & Howard, Angela (2006) Traffic behaviour of VoIP in a simulated access network. Proceedings of World Academy of Science, Engineering and Technology (PWASET), 18, pp. 189-194.
Davari, Pooya, Zare, Firuz, Ghosh, Arindam, & Akiyama, Hidenori (2012) High-voltage modular power supply using parallel and series configurations of flyback converter for pulsed power applications. IEEE Transactions on Plasma Science.
Ding, Kan & Dhanasekar, Manicka (2007) Flexural behaviour of bonded-bolted butt joints due to bolt looseness. Advances in Engineering Software: including computing systems in engineering, 38(8-9), pp. 598-606.
Dumas, Marlon, Milliner, Stephen W., & Fjellheim, Tore (2005) Middleware support for mobile applications. International Journal of Pervasive Computing and Communications, 1(2).
Ekanayake, Chathura, La Rosa, Marcello, ter Hofstede, Arthur, & Fauvet, Marie-Christine (2011) Fragment-based version management for repositories of business process models. Lecture Notes in Computer Science [On the Move to Meaningful Internet Systems: OTM 2011 - Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2011 Proceedings, Part I], 7044, pp. 20-37.
Flew, Terry, Leisten, Susanna H., & Hearn, Gregory N. (2005) Alternative intellectual property systems for the digital age. Media International Australia Incorporating Culture and Policy: Quarterly Journal of Media Research and Resources, pp. 87-98.
Gajanayake, Randike, Sahama, Tony R., Iannella, Renato, & Lane, Bill (2013) Designing an information accountability framework for eHealth. e-Health Technical Committee Newsletter, 2(2).
Gambini, Mauro, La Rosa, Marcello, Migliorini, Sara, & ter Hofstede, Arthur (2011) Automated error correction of business process models. Lecture Notes in Computer Science : Business Process Management: Proceedings of the 9th International Conference, BPM 2011, pp. 148-165.
Gillard, Laurent, Sitbon, Laurianne, Blaudez, Eric, Bellot, Patrice, & El-Beze, Marc (2007) Relevance measures for question answering, The LIA at QA@CLEF-2006. Lecture Notes in Computer Science, 4730, pp. 440-449.
Gottschalk, Florian, van der Aalst, Wil M.P., Jansen-Vullers, Monique H., & La Rosa, Marcello (2007) Configurable Workflow Models. .
Gottschalk, Florian, van der Aalst, Wil M.P., Jansen-Vullers, Monique H., & La Rosa, Marcello (2008) Configurable Workflow Models. International Journal of Cooperative Information Systems (IJCIS), 17(2).
Hassanpour, Hamid, Mesbah, Mostefa, & Boashash, Boualem (2004) Time-Frequency Feature Extraction of Newborne EEG Seizure using SVD-Based Techniques. EURASIP Journal on Applied Signal Processing, pp. 2544-2554.
Hearn, Gregory N., Rooney, David J., & Mandeville, Thomas (2003) Phenomenological turbulence and innovation in knowledge systems. Prometheus, 21(2), pp. 231-246.
Hughes, Hilary E., Middleton, Michael R., Edwards, Sylvia L., Bruce, Christine S., & McAllister, Lynn M. (2005) Information literacy research in Australia 2000-2005. Bulletin des Bibliotheques de France, 50(6), pp. 45-55.
Jiang, H., Liu, F., Turner, I., & Burrage, K. (2012) Analytical solutions for the multi-term time-fractional diffusion-wave/diffusion equations in a finite domain. Computers & Mathematics with Applications, 64(10), pp. 3377-3388.
Kok, Jonathan, Gonzalez, Luis F., & Kelson, Neil A. (2013) FPGA implementation of an evolutionary algorithm for autonomous unmanned aerial vehicle on-board path planning. IEEE Transactions on Evolutionary Computation, 17(2), pp. 272-281.
Kyburz, Penelope & Wiles, Janet (2005) Combining influence maps and cellular automata for reactive game agents. Lecture Notes in Computer Science, 3578, pp. 524-531.
La Rosa, Marcello & Dumas, Marlon (2008) Configurable Process Models: How To Adopt Standard Practices In Your How Way? BPTrends Newsletter.
La Rosa, Marcello, Dumas, Marlon, & ter Hofstede, Arthur H.M. (2008) Modelling Business Process Variability. .
La Rosa, Marcello, Gottschalk, Florian, Dumas, Marlon, & van der Aalst, Wil M.P. (2007) Linking Domain Models and Process Models for Reference Model Configuration. Business Process Management Workshops (LNCS), 4928, pp. 417-430.
La Rosa, Marcello, Lux, Johannes W., Seidel, Stefan, Dumas, Marlon, & ter Hofstede, Arthur H.M. (2006) Questionnaire-driven Configuration of Reference Process Models. .
La Rosa, Marcello, Wohed, Petia, Mendling, Jan, ter Hofstede, Arthur, Reijers, Hajo, & van der Aalst, Wil (2011) Managing process model complexity via abstract syntax modifications. IEEE Transactions on Industrial Informatics, 7(4), pp. 614-629.
La Rosa, Marcello, ter Hoftstede, Arthur H.M., Rosemann, Michael, & Shortland, Katherine (2008) Bringing Process to Post Production. .
La Rosa, Marcello, van der Aalst, Wil M., Dumas, Marlon, ter Hofstede, Arthur H.M., & Gottschalk, Florian (2006) Generating Interactive Questionnaires From Configuration Models. .
La Rosa, Marcello, van der Aalst, Wil M.P., Dumas, Marlon, & ter Hofstede, Arthur H.M. (2008) Questionnaire-based Variability Modeling for System Configuration. Software and Systems Modeling, 8(2), pp. 251-274.
La Rosa, Marcello, van der Aalst, Wil M.P., Dumas, Marlon, & ter Hofstede, Arthur H.M. (2007) Variability Modeling for Questionnaire-based System Configuration. .
Lee, Dong-Seop, Gonzalez, Luis F., Srinivas, K., & Periaux, Jacques (2008) Robust evolutionary algorithms for UAV/UCAV aerodynamic and RCS design optimisation. Computers & Fluids, 37(5), pp. 547-564.
Lesmono, Dharma, Tonkes, Elliot, & Burrage, Kevin (2009) Opportunistic timing and manipulation in Australian Federal Elections. European Journal of Operational Research, 192(2), pp. 677-691.
Li, Yuefeng & Zhong, Ning (2004) Web Mining Model and Its Applications for Information Gathering. Knowledge-Based Systems, 17(5-6), pp. 207-217.
Liu, F., Zhuang, P., & Burrage, K. (2012) Numerical methods and analysis for a class of fractional advection dispersion models. Computers and Mathematics with Applications, 64(10), pp. 2990-3007.
McCowan, Iain & Sridharan, Sridha (2001) Multi-Channel Sub-Band Speech Recognition. EURASIP Journal on Applied Signal Processing, 2001, pp. 45-52.
Mendling, Jan, La Rosa, Marcello, & ter Hofstede, Arthur H.M. (2008) Correctness of Business Process Models with Roles and Objects. .
Mendling, Jan, La Rosa, Marcello, & ter Hofstede, Arthur H.M. (2008) Soundness of EPC Process Models with Objects and Roles. .
Nayak, Richi & Sharma, Jaydev (2000) A Hybrid Neural Network and Simulated Annealing Approach to the Unit Commitment Problem. Computers and Electrical Engineering, 26(6), pp. 461-477.
Nguyen Thanh, Kien, Fookes, Clinton, Sridharan, Sridha, & Denman, Simon (2011) Quality-driven super-resolution for less constrained iris recognition at a distance and on the move. IEEE Transactions on Information Forensics and Security, 6(4), pp. 1248-1258.
Nyeem, Hussain, Wageeh, Boles, & Boyd, Colin (2012) A review of medical image watermarking requirements for teleradiology. Journal of Digital Imaging. (In Press)
Ouyang, Chun, Dumas, Marlon, ter Hofstede, Arthur H.M., & van der Aalst, Wil M.P. (2007) Pattern-based translation of BPMN process models to BPEL web services. International Journal of Web Services Research (JWSR), 5(1), pp. 42-62.
Ozmutlu, Seda, Spink, Amanda H., & Ozmutlu, H. Cenk (2004) A day in the life of web searching: an exploratory study. Information Processing and Management, 40(2), pp. 319-345.
Rittenbruch, Markus, Viller, Stephen, & Mansfield, Tim (2007) Announcing activity: design and evaluation of an intentionally enriched awareness service. Human - Computer Interaction, 22(1/2), pp. 137-171.
Russo, Angelina & Watkins, Jerry J. (2006) Establishing and Maintaining Cultural e-Communities. WSEAS Transactions on Advances in Engineering Education, 3(1), pp. 27-33.
Sadik, Amin Z., Hussain, Zahir M., & O'Shea, Peter J. (2007) A Multiplierless DC-Blocker for Single-Bit Sigma-Delta Modulated Signals. EURASIP Journal on Advances in Signal Processing, 2007.
Sitte, Joaquin & Winzer, Petra (2011) Demand-compliant design. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 41(3), pp. 434-448.
Starrs, D. Bruno (2010) Reverbing : The "Red vs. Blue" machinima as anti-war film. Continuum : Journal of Media & Cultural Studies, 24(2), pp. 267-279.
Steel, James, Duddy, Keith, & Drogemuller, Robin (2011) A transformation workbench for building information models. Lecture Notes in Computer Science: Theory and Practice of Model Transformations: 4th International Conference Proceedings, pp. 93-107.
Steel, Jim & Drogemuller, Robin (2011) Domain-specific model transformation in building quantity take-off. Lecture Notes in Computer Science: Model Driven Engineering Languages and Systems: Proceedings of the 14th International Conference, MODELS 2011, pp. 198-212.
Streit, Alexander T., Pham, Binh L., & Brown, Ross A. (2005) Visualization Support for Managing Large Business Process Specifications. Lecture Notes in Computer Science, 3649, pp. 206-219.
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y.K., & Wang, Hua (2012) Unsupervised multi-label text classification using a world knowledge ontology. Lecture Notes in Computer Science, 7301 LNAI(Part 1), pp. 480-492.
Teague, Donna M. & Roe, Paul (2007) Learning to Program: Going Pair-Shaped. ITALICS, 6(4).
Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Simpson, Leonie R., & Dawson, Edward (2012) State convergence and keyspace reduction of the mixer stream cipher. Journal of Discrete Mathematical Sciences and Cryptography, 15, pp. 89-104.
Tian, Yu-Chu, Han, Qing-Long, Tade, Moses O., & Levy, David (2006) Reducing control latency and jitter in real-time control. Asian Journal of Control, 8(1), pp. 72-75.
Tjondronegoro, Dian & Chen, Yi-Ping (2010) Knowledge-discounted event detection in sports video. IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans, 40(5), pp. 1009-1024.
Wohed, Petia, van der Aalst, Wil M.P., Dumas, Marlon, ter Hofstede, Arthur H.M., & Russell, Nick (2006) On the Suitability of BPMN for Business Process Modelling. Lecture Notes in Computer Science, 4102/2006, pp. 161-176.
Xu, Yue & Li, Yuefeng (2007) Mining Non-redundant Association Rules based on Concise Bases. International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 21(4), pp. 659-675.
Yang, Bo-Suk, Lim, Dong Soo, & Tan, Andy C. C. (2005) VIBEX: An expert system for vibration fault diagnosis of rotating machinery using decision tree and decision table. Expert Systems with Applications, 28(4), pp. 735-742.
Yang, Haofan, Zhang, Jinglan, & Roe, Paul (2012) Reputation modelling in Citizen Science for environmental acoustic data analysis. Social Network Analysis and Mining.
Zeng, Liangzhao, Benatallah, Boualem, Ngu, Anne, Dumas, Marlon, Kalagnanam, Jayant, & Chang, Henry (2004) QoS-aware Middleware for Web Services Composition. IEEE Transactions on Software Engineering, 30(5), pp. 311-327.
Zhang, Jinglan, Pham, Binh L., & Chen, Yi-Ping Phoebe (2004) A fuzzy shape database to support conceptual design. Control and Cybernetics, 33(1), pp. 141-172.
Zhou, Erzhong, Zhong, Ning, & Li, Yuefeng (2013) Extracting news blog hot topics based on the W2T methodology. World Wide Web, March.
Zhou, Erzhong, Zhong, Ning, & Li, Yuefeng (2011) Hot topic detection in professional blogs. Lecture Notes in Computer Science [Active Media Technology: Proceedings of the 7th International Conference on Active Media Technology, AMT 2011], pp. 141-152.
van Hee, Kees, La Rosa, Marcello, Liu, Zheng, & Sidorova, Natalia (2011) Discovering characteristics of stochastic collections of process models. Lecture Notes in Computer Science [Business Process Management: Proceedings of the 9th International Conference, BPM 2011], pp. 298-312.
van der Aalst, Wil M., Dumas, Marlon, Gottschalk, Florian, ter Hofstede, Arthur H.M., La Rosa, Marcello, & Mendling, Jan (2008) Preserving correctness during business process model configuration. Formal Aspects of Computing, 22(3-4), pp. 459-482.
Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.
Anantharajah, Kaneswaran, Denman, Simon, Sridharan, Sridha, Fookes, Clinton B., & Tjondronegoro, Dian W. (2012) Quality based frame selection for video face recognition. In Proceedings of 6th International Conference on Signal Processing and Communication Systems (ICSPCS'2012), IEEE Xplore, Gold Coast, Qld.
Arora, Atul & Bandara, Wasana (2006) IT Service Desk Process Improvement - A Narrative Style Case Study. In Lee, H & Tan, B (Eds.) Proceedings of the Tenth Pacific-Asia Conference on Information Systems, 6-9 July 2006, Malaysia, Kuala Lumpur.
Au, Manix & Maire, Frederic D. (2004) Automatic State Construction using Decision Tree for Reinforcement Learning Agents. In Mohammadian, Masoud (Ed.) International Conference on Computational Intelligence for Modelling Control and Automation - CIMCA'2004, 12 - 14 July 2004, Sheraton Mirage Hotel, Gold Coast, Australia.
Bandara, Wasana, Chong, Sandy, Indulska, Marta, Rosemann, Michael, & Sadiq, Shazia (2006) Major Issues in Business Process Management: An Australian Perspective. In Spencer, S & Jenkins, A (Eds.) Proceedings of the 17th Australasian Conference on Information Systems, 6 - 8 December 2006, Australia, South Australia, Adelaide.
Boulaire, Fanny A., Utting, Mark, Drogemuller, Robin, Ledwich, Gerard, & Ziari, Iman (2012) A hybrid simulation framework to assess the impact of renewable generators on a distribution network. In Proceedings of the 2012 Winter Simulation Conference, Berlin, Germany.
Boyd, Colin A., Choo, Kim-Kwang R., & Mathuria, Anish (2006) An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys. In Batten, L. & Safavi-Naini, R. (Eds.) 11th Australasian Conference. on. Information Security and Privacy - ACISP 2006, 3 - 5 July 2006, Melbourne, Australia.
Bradford, Lindsay W., Milliner, Stephen W., & Dumas, Marlon (2005) Experience Using a Coordination-Based Architecture for Adaptive Web Content Provision. In 7th International Conference on Coordination Models and Languages (COORDINATION 2005), April 20-23, 2005, Namur, Belgium.
Bradford, Lindsay W., Milliner, Stephen W., & Dumas, Marlon (2004) Scaling Dynamic Web Content Provision using Elapsed-time-based Content Degradation. In Zhou, X. (Ed.) 5th International Conference on Web Information Systems Engineering (WISE), November 22-24, 2004, Brisbane, Australia.
Bradford, Lindsay W., Milliner, Stephen W., & Dumas, Marlon (2003) Varying Resource Consumption to Achieve Scalable Web Services. In 4th VLDB Workshop on Technologies for E-Services (VLDB-TES), 8 September 2003, Berlin, Germany.
Brooks, Chad A. & Krishnaswamy, Shonali (2004) Resource Monitoring to Support Mobile Agents in Pervasive Computing. In Intelligent Agents, Web Technology and Internet Commerce, 12-14 July 2004, Gold Coast, Australia.
Brown, Jaimee, Dawson, Edward P., & Gonzalez Nieto, Juan M. (2004) Implementation of the GBD cryptosystem. In Cryptographic Algorithms and their Uses, 5-6 July 2004, Gold Coast, 5-6 July 2004.
Brown, Ross A., Pham, Binh L., Aidman, Eugene, & Maeder, Anthony J. (2000) Efficient Image Rendering Using a Fuzzy Logic Model of Visual Attention. In Advances in Intelligent Systems: Theory and Applications (AISTA), 2000, Canberra, Australia.
Brown, Ross A., Pham, Binh L., & Maeder, Anthony J. (2001) A fuzzy logic model of visual importance for efficient image synthesis. In Proceedings of the 10th IEEE International Conference on Fuzzy Systems, 2001, IEEE, Melbourne, VIC, pp. 1400-1403.
Brown, Ross A., Pham, Binh L., & Maeder, Anthony J. (1999) A fuzzy mdel for scene decomposition based on preattentive visual features. In Rogowitz, Bernice E, Watson, Thomas J, & Pappas, Thrasyvoulos N. (Eds.) Human Vision and Electronic Imaging IV, 25-28 Jan 1999, San Jose, USA.
Bruno, Giorgio & La Rosa, Marcello (2006) From Collaboration Models to BPEL Processes Through Service Models. In Bussler, C. (Ed.) Workshop on Web Service Choreography and Orchestration for Business Process Management 2005, 5 September 2005, Nancy, France.
Caldwell, Glenda, Bilandzic, Mark, & Foth, Marcus (2012) Towards visualising people’s ecology of hybrid personal learning environments. In Brynskov, Martin (Ed.) Proceedings of the Media Architecture Biennale 2012, Association for Computing Machinery (ACM), Aarhus, Denmark, pp. 13-22.
Campbell, Alexander B., Pham, Binh L., & Tian, Yu-Chu (2004) Mining Ecological Data with Cellular Automata. In Cellular Automata for Research and Industry 2004, 25-27 October, 2004, University of Amsterdam, Science Park Amsterdam, The Netherlands.
Chakraborty, Subrata, Fidge, Colin J., Ma, Lin, & Sun, Yong (2011) M-ary trees for combinatorial asset management decision problems. In 6th World Congress on Engineering Asset Management (WCEAM 2011), 3-5 October 2011, Duke Energy Center, Cincinatti, Ohio. (In Press)
Cheng, Michael F., Pham, Binh L., & Tjondronegoro, Dian W. (2006) Tracking and Video Surveillance Activity Analysis. In 4th international conference on Computer graphics and interactive techniques in Australasia and Southeast Asia, Nov 29 - Dec 02 2006, Kuala Lumpur, Malaysia.
Choo, Kim-Kwang R., Boyd, Colin A., Hitchcock, Yvonne, & Maitland, Greg M. (2005) Complementing Computational Protocol Analysis with Formal Specifications. In Dimitrakos, Theo & Martinelli, Fabio (Eds.) IFIP TC1 WG1.7 Second International Workshop on Formal Aspects in Security and Trust - FAST 2004, 26 - 27 August, Toulouse, France.
Choo, Kim-Kwang R. & Hitchcock, Yvonne (2005) Security Requirement for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In Boyd, Colin & Gonzalez-Nieto, Juan Manuel (Eds.) 10th Australasian Conference on Information Security and Privacy - ACISP 2005, 4-6 July 2005, Brisbane, Australia.
Cifuentes, Cristina & Fitzgerald, Anne M. (1998) Introducing a legal strand in the computer science curriculum. In 3rd Australasian Conference on Computer Science Education (ACSE '98), 8-10 July 1998, Brisbane, QLD.
Das Gupta, Jishu, Addie, Ron, Braithwaite, Stephen, & Leis, John (2006) Aggregate flows: for efficient management of large flows in the internet. In 5th Workshop on the Internet, Telecommunications and Signal Processing (WITSP'06), 11th-13th December 2006, Hobart, Australia.
Das Gupta, Jishu, Ziri-Castro, Karla I., & Suzuki, Hajime (2007) Capacity analysis of MIMO-OFDM broadband channels in populated indoor environments. In 7th International Symposium on Communications and Information Technologies, 17-19 October 2007, Australia.
Das Gupta, Jishu, Ziri-Castro, Karla I., & Suzuki, Hajime (2007) Correlation analysis on MIMO-OFDM channels in populated time varying indoor environment. In 10th Australian Symposium on Antennas, 14-15 February 2007, Sydney, Australia.
Das Gupta, Jishu, Ziri-Castro, Karla I., & Suzuki, Hajime (2007) Dynamic range analysis on MIMO-OFDM broadband channels in a populated time-varying indoor environment. In 2007 Australian Telecommunication Networks and Applications Conference (ATNAC), 2-5 December 2007, Christchurch, New Zealand.
Das Gupta, Jishu, Ziri-Castro, Karla I., & Suzuki, Hajime (2006) Time variation characteristics of MIMO-OFDM broadband channels in populated indoor environments. In 2006 Australian Telecommunications, Networks and Applications Conference (ATNAC), 4-6 December 2006, Melbourne, Australia.
Davies, Islay G., Green, Peter F., Milton, Simon, & Rosemann, Michael (2003) Using Meta Models for the Comparison of Ontologies. In Evaluation of Modeling Methods in Systems Analysis and Design Workshop - EMMSAD'03, 16-17 June 2003, Klagenfurt/Velden, Austria.
Davies, Islay G., Green, Peter F., Rosemann, Michael, & Gallo, Stan (2004) Conceptual Modelling – What and Why in Current Practice. In 23rd International Conference on Conceptual Modelling (ER’04), 8-12 Nov 2004, Shanghai, China.
Davies, Islay G., Rosemann, Michael, & Green, Peter (2004) Exploring proposed ontological issues of ARIS with different categories of modellers. In Australasian Conference on Information Systems, 1-3 Dec 2004, Hobart, Australia.
Djuana, Endang, Xu, Yue, & Li, Yuefeng (2012) Learning personalized tag ontology from user tagging information. In Zhao, Yanchang, Li, Jiuyong, Kennedy, Paul, & Christen, Peter (Eds.) Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Sydney, N. S. W. (In Press)
Djuana, Endang, Xu, Yue, Li, Yuefeng, & Cox, Clive (2012) Personalization in tag ontology learning for recommendation making. In Taniar, David, Pardede, Eric, Rahayu, Wenny, & Khalil, Ismail (Eds.) Proceedings of the 14th International Conference on Information Integration and Web-based Applications and Services, ACM Press (Association for Computing Machinery), Bali, Indonesia, pp. 368-377. (In Press)
Du, Rong, Foo, Ernest, Boyd, Colin A., & Choo, Kim-Kwang R. (2006) Formal analysis of secure contracting protocol for E-Tendering. In Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 16 - 19 Jan 2006, Hobart, Australia.
Duddy, Keith & Kiegeland, Joerg (2011) Beyond MOF constraints : multiple constraint set metamodelling for lifecycle management. In Schätz, Bernhard (Ed.) International Workshop on Models and Evolution, University of L'Aquilla, Wellington, New Zealand.
Dumas, Marlon, Wang, Kenneth W.S., & Spork, Murray L. (2006) Adapt or Perish: Algebra and Visual Notation for Service Interface Adaptation. In Dustdar, Schahram, Fiadeiro, Jose-Luis, & Sheth, Amit (Eds.) 4th International Conference on Business Process Management, 5-7 September 2006, Vienna, Austria.
Edwards, Sylvia L. (2004) Web-based information searching: understanding student experiences to enhance the development of this critical graduate attribute. In Appleton, K., Macpherson, C., & Orr, D. (Eds.) 3rd International Lifelong Learning Conference, 13th-16th June, Central Queensland University, Australia.
Edwards, Sylvia L. (2000) You Have Provided Me With A New Set Of Tools And Taught Me How To Use Them: Embedding Generic Skills within the IT Curriculum. In Refereed Conference Paper presented at Lifelong Learning Conference: Inaugural International Lifelong Learning Conference, 17-19 July, Yeppoon, Central Queensland, Australia.
Edwards, Sylvia L. & Bruce, Christine S. (2002) The assignment that triggered …change: Assessment and the relational learning model for generic capabilities. In Conference Paper presented at EARLI/SIGLearning communities and assessment cultures: connecting research with practice, 28-30 August 2002, Northumbria, UK.
Edwards, Sylvia L., Bruce, Christine S., & McAllister, Lynn M. (2004) Information Literacy Research: the consolidation of a theme. In Research Applications in Information and Library Studies, 20th September, QUT Brisbane, a pre- ALIA 2004 Conference Event.
Ekanayake, Chathura C., Mannhardt, Felix, Garcia-Banuelos, Luciano, La Rosa, Marcello, Dumas, Marlon, & ter Hofstede, Arthur H.M. (2012) Detecting approximate clones in process model repositories with Apromore. In Demo Track of the 10th International Conference on Business Process Mangement, 3-6 September 2012, Tallinn, Estonia.
Fauvet, Marie-Christine, Dumas, Marlon, & Benatallah, Boualem (2002) Collecting and Querying Distributed Traces of Composite Service Executions. In 1st Confederated International Conferences 'One the Move to Meaningful Internet Systems', DOA, CoopIS and ODBASE, 30 October - 1 November 2002, Irvine CA, USA.
Fjellheim, Tore, Milliner, Stephen W., Dumas, Marlon, & Elms, Kim (2004) The 3DMA Middleware for Mobile Applications. In Yang, Laurence Tianruo, Guo, Minyi, & Gao, Guang R. (Eds.) International Conference on Embedded and Ubiquitous Computing., August 25-27, 2004, Aizu-Wakamatsu City, Japan.
Gajanayake, Randike, Iannella, Renato, Lane, William B., & Sahama, Tony R. (2012) Accountable-eHealth systems : the next step forward for privacy. In Proceedings of the 1st Australian eHealth informatics and security conference, Edith Cowan University, Novotel Perth Langley, Perth, WA. (In Press)
Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2012) Privacy oriented access control for electronic health records. In Data Usage Management on the Web Workshop at the Worldwide Web Conference, ACM, Lyon Convention Centre, Lyon, France.
Gajanayake, Randike, Lane, William B., Iannella, Renato, & Sahama, Tony R. (2012) Legal issues related to Accountable-eHealth systems in Australia. In Williams, Trish & Valli, Craig (Eds.) Proceedings of the 1st Australian eHealth informatics and security conference, SRI, Security Research Institute, Edith Cowan University, Perth, Western Australia, Perth, Australia, pp. 16-21.
Gajanayake, Randike & Sahama, Tony (2013) Perceptions and attitudes of nursing students’ towards electronic health records. In Nursing Informatics Australia Conference 2013, 15 July 2013, Adelaide Convention Centre, Adelaide. (In Press)
Gajanayake, Randike, Sahama, Tony R., & Iannella, Renato (2013) eHealth in Australia and elsewhere : a comparison and lessons for the near future. In HIC 2013 : Health Informatics Conference 2013 : Digital Health Service Delivery - The Future Is Now!, 15 - 18 July, 2013, Adelaide, S. Aust.. (In Press)
Gajanayake, Randike, Sahama, Tony R., & Lane, William B. (2013) The Role of Human Factors when Evaluating Information Accountability for eHealth Systems. In Context Sensitive Health Informatics Conference, 18-19 August, 2013., Copenhagen, Denmark. (In Press)
Glickman, Mark & O'Shea, Peter J. (2005) Damping Estimation Of Electric Disturbances In Distributed Power Systems. In 7th IASTED International Conference on Signal and Image Processing, August 15-17, Honolulu, Hawaii, USA.
Gligorijevic, Barbara & Luck, Edwina (2012) Engaging social customers : influencing new marketing strategies for social media information sources. In Khachidze, Vasil, Wang, Tim, Sohail, Siddiqui, Liu, Vincent, Cappuccio, Sergio, & Lim, Alicia (Eds.) Engaging Social Customers : Influencing New Marketing Strategies for Social Media Information Sources : International Conference, iCETS 2012, Springerlink, Tianjin Tianyu Hotel, Tianjin, China, pp. 25-40.
Gluga, Richard, Kay, Judy, Lister, Raymond, Simon, Simply, Charleston, Michael, Harland, James, et al. (2013) A conceptual model for reflecting on expected learning vs. demonstrated student performance. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of the 15th Australasian Computing Education Conference (ACE2013), Australian Computer Society, Inc., Adelaide, SA.
Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2007) ID-based One-pass Authenticated Key Establishment. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia.
Gough, John (2005) Virtual Machines, Managed Code and Component Technology. In Australian Software Engineering Conference, March 30 - April 1 2005, Brisbane, Australia.
Guo, Hanwen, Brown, Ross A., & Rasmussen, Rune K. (2012) Virtual worlds as a model-view approach to the communication of business processes models. In CEUR Workshop Proceedings, University of Gdansk, Poland. (In Press)
Guo, Yunyong, Kuo, Mu-Hsing, & Sahama, Tony R. (2012) Cloud computing for healthcare research information sharing. In Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science, IEEE, The Grand Hotel Taipei, Taiwan, pp. 889-894.
Hearn, Gregory N., Simpson, Lynette E., Lennie, June, & Kimber, Megan P. (2004) ICTs and regional sustainability: A critique and a way forward. In Johanson, Graeme & Stillman, Larry (Eds.) Community Informatics Research Network Conference and Colloquium 2004: Sustainability and community technology, September 29 - October 1 2004, Prato, Italy.
Heidarkhan Tehrani, Ashkan, Singh, Sanjleena, Xiao, Yin, & Oloyede, Adekunle (2012) Anisotropy of articular cartilage reflects the ECM gradient architecture : Hough-Radon Transform Analysis. In Merrell , R. (Ed.) Proceedings of the IASTED International Symposia Imaging and Signal Processing in Health Care and Technology (ISPHT 2012), ACTA Press, Baltimore, pp. 64-70.
Hettel, Thomas, Flender, Christian, & Barros, Alistair P. (2008) Scaling choreography modelling for B2B value-chain analysis. In Dumas, Marlon, Reichery, Manfred, & Shan, Ming-Chien (Eds.) 6th International Conference on Business Process Management 2008, 1-4 September 2008, Milan, Italy.
Huang, Henry & Maire, Frederic D. (2004) A Localization System Solely Based on Vision for Autonomous Lawnmowers. In Mohammadian, Masoud (Ed.) International Conference on Computational Intelligence for Modelling Control and Automation - CIMCA'2004, 12 - 14 July 2004, Sheraton Mirage Hotel, Gold Coast, Australia.
Huang, Henry, Maire, Frederic D., & Keeratipranon, Narongdech (2007) An Improved Probability Density Function for Representing Landmark Positions in Bearing-only SLAM Systems. In 20th Australian Joint Conference on Artificial Intelligence (AI 2007), 2-6 December, 2007, Gold Coast, Queensland, Australia. (In Press)
Inchamnan, Wilawan, Wyeth, Peta, Johnson, Daniel, & Conroy, David (2012) A method for measuring the creative potential of computer games. In Herrlich, Marc, Malaka, Rainer, & Masuch, Maic (Eds.) Entertainment Computing - ICEC 2012, Springer Berlin Heidelberg, Bremen, Germany, pp. 270-283.
Kajewski, Stephen L. & Alwi, Sugiharto (2006) On-site Deployment of Mobile Computing Devices. In Martinez, Manuel & Scherer, Raimar (Eds.) eWork and eBusiness in Architecture, Engineering and Construction, 13-15 September 2006, Valencia, Spain.
Kanagasundaram, Ahilan, Dean, David B., Sridharan, Sridha, & Vogt, Robert J. (2012) PLDA based speaker verification with weighted LDA techniques. In The Speaker and Language Recognition Workshop (Odyssey 2012), ISCA, Singapore.
Kanagasundaram, Ahilan, Vogt, Robert J., Dean, David B., & Sridharan, Sridha (2012) PLDA based speaker recognition on short utterances. In The Speaker and Language Recognition Workshop (Odyssey 2012), ISCA, Singapore.
Kelegai, Limbie K. & Middleton, Michael R. (2001) Conquering the frontier: developing human resources for ICTs in Papua New Guinea. In Regional Initiative For Information and Communication Technology Strategies (RIFICTS) conference, July 24-26, 2001, Kuala Lumpur, Malaysia. (Unpublished)
Kinley, Khamsum, Tjondronegoro, Dian W., Partridge, Helen L., & Edwards, Sylvia L. (2012) Human–computer interaction : the impact of users’ cognitive styles on query reformulation behaviour during web searching. In Proceedings of Australasian Conference on Computer-Human Interaction (OZCHI 2012), Melbourne, Vic. (In Press)
Koppi, Tony, Edwards, Sylvia L., Sheard, Judy, Naghdy, Fazel, & Brookes, Wayne (2010) The case for ICT work-integrated learning from graduates in the workplace. In Clear, Tony & Hamer, John (Eds.) Proceedings of the Twelfth Australasian Computing Education Conference, Australian Computer Society Inc , Brisbane, pp. 107-116.
Koppi, Tony, Naghdy, Fazel, Chicharo, Joe, Sheard, Judy, Edwards, Sylvia L., & Wilson, David (2008) The crisis in ICT education : an academic perspective. In ASCILITE, Deakin University, Melbourne, VIC.
Koppi, Tony, Sheard, Judy, Naghdy, Fazel, Chicharo, Joe, Edwards, Sylvia L., Brookes, Wayne, et al. (2009) What our ICT graduates really need from us : a perspective from the workplace. In 09 Proceedings of the Eleventh Australasian Conference on Computing Education, Australian Computer Society, Inc, Wellington, New Zealand, pp. 101-110.
La Rosa, Marcello, Dumas, Marlon, ter Hofstede, Arthur H.M., Mendling, Jan, & Gottschalk, Florian (2008) Beyond Control-Flow: Extending Business Process Configuration to Roles and Objects. In Li, Qing, Spaccapietra, Stefano, & Yu, Eric (Eds.) Lecture Notes in Computer Science, Springer, Barcelona, Spain, pp. 199-215. (In Press)
La Rosa, Marcello & Mendling, Jan (2008) Domain-driven Process Adaptation in Emergency Scenarios. In Mecella, Massimo & Yang, Jian (Eds.) Business Process Management Workshops 2008, 1-4 September 2008, Milan, Italy. (In Press)
La Rosa, Marcello & Mendling, Jan (2008) Domain-driven Process Adaptation in Emergency Scenarios. In Mecella, Massimo & Yang, Jian (Eds.) 1st International Workshop on Process Management for Highly Dynamic and Pervasive Scenarios (PM4HDPS), 1 September 2008, Milan, Italy. (In Press)
La Rosa, Marcello, ter Hofstede, Arthur H.M., Rosemann, Michael, & Shortland, Katherine (2008) Bringing Process to Post Production. In International Conference "Creating Value: Between Commerce and Commons", 25-27 June 2008, Brisbane, Australia.
Law, Ching Loon, Zhang, Jinglan, & Roe, Paul (2012) Using mobile technology and augmented reality to increase data reliability for environmental assessment. In Proceedings of the 24th Australian Computer-Human Interaction Conference, ACM, Melbourne, VIC, pp. 327-330.
Lee, Justin A. & Sitte, Joaquin (2004) Designing a Morphogenetic System for Evolvable Hardware. In Webb, Geoffrey I. & Yu, Xinghuo (Eds.) AI 2004: Advances in Artificial Intelligence, LNAI 3339, Proceedings of the 17th Australian Joint Conference on Artificial Intelligence, December 8-11, 2004, Cairns, Australia.
Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW. (In Press)
Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. In The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Deakin University, Melbourne, VIC.
Li, Zhixu, Sharaf, Mohamed A., Sitbon, Laurianne, Sadiq, Shazia, Indulska, Marta, & Zhou, Xiaofang (2012) WebPut : Efficient web-based data imputation. In Wang, Sean X., Cruz, Isabel, Delis, Alex, & Huang, Guangyan (Eds.) 13th International Conference on Web Information Systems Engineering - WISE 2012, Springer Berlin Heidelberg, Paphos, Cyprus, pp. 243-256.
Liu, Vicky, Caelli, William J., Foo, Ernest, & Russell, Selwyn V. (2004) Visually Sealed and Digitally Signed Documents. In 27th Australasian Computer Science Conference, 19 - 23 January 2004, The University of Otago, Dunedin, New Zealand.
Lorensuhewa, Aruna, Pham, Binh L., & Geva, Shlomo (2002) Keyword-based Text Matching Approach for Design Style Recognition. In Zaiane, O. & Djeraba, C. (Eds.) First International Workshop on Knowledge Discovery in Multimedia and Complex Data (KDMCD'2002), 6 May 2002, Taipei, Taiwan.
Maddern, William & Vidas, Stephen (2012) Towards robust night and day place recognition using visible and thermal imaging. In RSS 2012 : Beyond laser and vision : Alternative sensing techniques for robotic perception, University of Sydney.
Maire, Frederic, Singh, Rajendra, Sitte, Joaquin, & Tickle, Alan (2006) A Low Cost Controller Board for Teaching Robotics. In Murase, K, Sekiyama, K, Kubota, N, Naniwa, T, & Sitte, J (Eds.) Proceedings of the 3rd International Symposium on Autonomous Minirobots for Research and Edutainment, Springer, Fukui, Japan , pp. 231-236.
Maire, Frederic D., Wathne, Frank, & Lifchitz, Alain (2003) Reduction of Non Deterministic Automata for Hidden Markov Model Based Pattern Recognition Applications. In AI 2003: Advances in Artificial Intelligence: 16th Australian Conference on AI, Springer, Perth, Australia, pp. 466-476.
Nayak, Richi (2002) Intelligent Data Analysis: Issues and Challenges. In 6th World Multi Conferences on Systemics, Cybernetics and Informatics.
Nayak, Richi, Jain, Lakhmi, & Ting, B. (2001) Artificial neural networks in biomedical engineering: a review. In Asia-Pacific Conference on Advance Computation.
Nayak, Richi & Warren, David (2002) How Healthy Is Your Agency? Employing Data Mining in a Health Agency System. In 2002 International Conference on Mathematics and Engineering Techniques in Medicine and Biological Sciences.
Nayak, Richi, Witt, Rebecca, & Tonev, Anton (2002) Data mining and XML documents. In International Conference on Internet Computing, IC'2002, June 24-27, 2002, Las Vegas, Nevada.
Nayak, Richi & Xia, Fu Bo (2004) Automatic integration of heterogenous XML-schemas. In The Sixth International Conference on Information Integration and Web Based Applications & Services, September 27-29, Jakarta, Indonesia.
Nelson, Karen J., Kift, Sally M., & Harper, Wendy E. (2005) Any portal in a storm? Aligning online engagement patterns with the needs of transition students. In OLT 2005, Beyond Delivery, 27 September 2005, QUT, Brisbane, Queensland.
Partridge, Helen L. (2004) Developing a human perspective to the digital divide in the 'smart city'. In Partridge, Helen (Ed.) Australian Library and Information Association Biennial Conference, 21-24 September 2004, Gold Coast, Queensland, Australia.
Partridge, Helen L. & Hallam, Gillian C. (2003) Technology and the Human Dimension: Using Web-Based Technology to Develop and Record Generic Capabilities. A Library and Information Studies Case Study. In Informing Science and IT Education (InSITE) Annual Conference, June 24 -27 2003, Pori, Finland.
Partridge, Helen L., McAllister, Lynn, & Hallam, Gillian C. (2007) Community ICT projects: do they really work? Reflections from the West End Connect project one year on. In 4th Prato Community Informatics Research Network (CIRN) Conference 2007, Community Informatics--Prospects for Communities and Action, 5-7 November, Prato, Italy. (In Press)
Peacock, Judith A. (2006) THINK Systemically, ACT Strategically: Sustainable development of information literacy in the broader context of students' learning. In IATUL 2006: Embedding Libraries in Learning and Research, 22-25 May 2006, Faculdade de Engenharia Universidade do Porto, Portugal.
Pham, Binh L. & Brown, Ross A. (2003) Multi-agent Approach for Visualisation of Fuzzy Systems. In Part III, Computational Science - ICCS 2003, June 2 - 4, Melbourne, Australia.
Pham, Binh L. & Brown, Ross A. (2003) A multi-agent approach to visualisation of fuzzy systems. In International Conference on Computation Science (ICCS), 2-4 June 2003, Melbourne, Australia.
Prasad, Acklesh, Heales, Jon, & Green, Peter (2009) Information technology resources,complementaries and capabilities : towards a deeper understanding of leveraging business value from IT. In Proceedings of the 15th Americas Conference on Information Systems, AMCIS 2009, Association for Information Systems / AIS Electronic Library (AISeL), San Francisco, CA, pp. 1-9.
Rakotonirainy, Andry (2003) Human-Computer Interactions: Research Challenges for In-vehicle Technology. In 2003 Road Safety Research, Policing and Education Conference, 24-26 September 2003, Sydney, NSW.
Rakotonirainy, Andry & Lehman, Nicholas (2004) Augmenting a Museum Visitor's Tour with a Context Aware Framework. In Mostefaoui, Soraya, Maamar, Zakaria, & Rana, Omer (Eds.) 1st International Workshop on Ubiquitous Computing, 13-14 April 2004, Porto, Portugal.
Ring, Jared W., Cho, Kim-Kwang R., Foo, Ernest, & Looi, Mark H. (2006) A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. In Clark, Andrew, McPherson, Mark, & Mohay, George (Eds.) AusCERT Asia Pacific Information Technology Security Conference 2006, 23 May 2006, Gold Coast, Australia.
Rostamzadeh Bakhtiyari, Mohammad Adel (2013) Developing a simulator application to test the billing platform in telecom industry. In International Conference on Data Engineering (ICDE 2013), 8 April 2013, Sofitel Hotel, Brisbane, QLD.
Russo, Angelina & Watkins, Jerry J. (2005) Post-museum experiences: structured methods for audience engagement. In Thwaites, H. (Ed.) Eleventh International Conference on Virtual Systems and Multimedia, October 2005, Brussels.
Sheng, Quan, Benatallah, Boualem, Maamar, Zakaria, Dumas, Marlon, & Ngu, Anne (2004) Enabling Personalized Composition and Adaptive Provisioning of Web Services. In 16th International Conference on Advanced Information Systems Engineering, June 7-11 2004, Riga, Latvia.
Steketee, Chris, Brown, Jaimee, Gonzalez Nieto, Juan M., & Montague, Paul (2005) GBD Threshold Cryptography with an Application to RSA Key Recovery. In Boyd, Colin & Gonzalez Nieto, Juan M. (Eds.) 10th Australasian Conference on Information Security and Privacy, July 4-6, 2005, Brisbane, Australia.
Stoodley, Ian D. (2006) IT professionals' experience of ethical decision-making and its implications for IT education. In 3rd International Conference on Qualitative Research in IT & IT in Qualitative Research: Doctoral Consortium, November 27-29, 2006, Griffith University, Brisbane. (Unpublished)
Su, Wen-Poh, Pham, Binh L., & Wardhani, Aster W. (2005) High-level Control Posture of Story Characters Based on Personality and Emotion. In Pisan, Yusuf (Ed.) IE05', The Second Australasian Interactive entertainment conference, 23-25 November, Sydney.
Suriadi, Suriadi, Ashley, Paul, & Josang, Audun (2007) Future standardization areas in identity management systems. In 2nd PRIME Standardization Workshop, 14-15 June 2007, Zurich, Switzerland.
Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2007) A User-centric Federated Single Sign-on System. In Li, Keqiu, Xiang, Yang, Jin, Hai, Qu, Wenyu, & Cao, Zhiying (Eds.) IFIP International Conference on Network and Parallel Computing Workshops NPC 2007, 18-21 September 2007, Dalian, China.
Tacchi, Jo A. & Watkins, Jerry J. (2007) ‘Participatory Research and Creative Engagement with ICTs'. In ACM Sensys 2007 workshop "Sensing on Everyday Mobile Phones in Support of Participatory Research", 6 November, the Sensys Conference Hotel, the Swissotel Sydney.
Tang, Qiang & Choo, Kim-Kwang R. (2006) Secure Password-based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. In Zhou, Jianying & Yung, Moti (Eds.) 4th International Conference on Applied Cryptography and Network Security (ACNS'06), 6~9 June 2006, Singapore.
Tsvetinov, Petco E. (2003) Pre-Negotiations Over Services - A Framework for Evaluation. In Xiang, Yang & Chaib-draa, Brahim (Eds.) 16th Conference of the Canadian Society for Computational Studies of Intelligence AI2003, June 11-13 2003, Halifax, Canada.
Vidas, Stephen & Sridharan, Sridha (2012) Hand-held monocular SLAM in thermal-infrared. In 12th International Conference on Control, Automation, Robotics and Vision (ICARCV 2012), 5 - 7 December 2012, Guangzhou Baiyun International Convention Center, Guangzhou, China. (In Press)
Walker, Arron R., Pham, Binh L., & Moody, Miles P. (2005) Spatial Bayesian learning algorithms for geographic information retrieval. In 13th annual ACM international workshop on Geographic information systems, November 2005, Bremen, Germany.
Watkins, Jerry J. & Russo, Angelina (2005) Digital Cultural Communication: designing co-creative new media environments. In Candy, Linda (Ed.) Creativity and Cognition 2005, April 2005, London.
Watkins, Jerry J. & Russo, Angelina (2005) Extending site-specific audience experience via multi-platform communication design. In Hamza, H.M. (Ed.) Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA) 2005, August 2005, Honolulu.
Wohed, Petia, van der Aalst, Wil M.P., Dumas, Marlon, & ter Hofstede, Arthur H.M. (2003) Analysis of Web Services Composition Languages: The Case of BPEL4WS. In Proceedings of the 22nd International Conference on Conceptual Modelling (ER), Springer, Chicago IL, USA, pp. 200-215.
Wohed, Petia, van der Aalst, Wil M.P., Dumas, Marlon, ter Hofstede, Arthur H.M., & Russell, Nick (2005) Pattern-based Analysis of the Control-Flow Perspective of UML Activity Diagram. In 24th International Conference on Conceptual Modeling (ER), 24-28 October 2005, Klagenfurt, Austria.
Zaha, Johannes Maria, Dumas, Marlon, ter Hofstede, Arthur H.M., Barros, Alistair P., & Decker, Gero (2006) Service Interaction Modeling: Bridging Global and Local Views. In 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06).
Zakaria, Mohd Hafiz, Watson, Jason A., & Edwards, Sylvia L. (2009) The incorporation of web 2.0 into learning design : an implementation model from the perspectives of teachers and students. In Chova, L. Gomez, Belenguer, D. Marti, & Torres, I. Candel (Eds.) Proceedings of the International Conference on Education and New Learning Technologies 2009, International Association of Technology, Education and Development, Spain, Barcelona, pp. 3510-3521.
van der Aalst, Wil M.P., Aldred, Lachlan J., Dumas, Marlon, & ter Hofstede, Arthur H.M. (2004) Design and Implementation of the YAWL System. In 16th International Conference on Advanced Information Systems Engineering, June 7-11, June 7-11, 2004, Riga, Latvia,.
van der Aalst, Wil M.P., Dumas, Marlon, Gottschalk, Florian, ter Hofstede, Arthur H.M., La Rosa, Marcello, & Mendling, Jan (2008) Correctness-Preserving Configuration of Business Process Models. In Fundamental Approaches to Software Engineering (FASE 2008), 1-3 April 2008, Budapest, Hungary.
Callan, Paula A. (2012) Putting the Repository First: Implementing a Repository to RIS Workflow for QUT ePrints. In Open Repositories, 9th-13th July 2012, Edinburgh.
Cook, John (2012) Learning how to be responsive to public policy issues affecting SSSI members. In Queensland Surveying and Spatial Conference ; The future of surveying and spatial science is Open: Open collaboration open data open standards and open opportunities., 13-14 September2012, Brisbane Convention and Exhibition Centre. (Unpublished)
Hampson, Keith D. (1999) Sharing building construction research on the web. In Australasian Universities' Building Educators' Association (AUBEA) Australasian Conference, 13-16 July 1999, Fraser Island, QLD. (Unpublished)
Tsvetinov, Petco, Abercrombie, David F., & Do, Hung (2005) Individual versus group reasoning: A comparison study using a keypad support system. In Ascilite 2005, December 4-7, 2005, Queensland University of Technology, Brisbane.
Tsvetinov, Petco, Underwood, Alan D., & Chan, Taizan (2006) Dominance and ranking issues applying interval techniques in pre-negotiations for services. In Haddad, Hisham, Wainwright, Roger, & Liebrock, Lorie (Eds.) The 21st Annual ACM Symposium on Applied Computing, Apri 23-27, 2006, Dijon, France.
Alzaid, Hani, Abanmi, Suhail, Kanhere, Salil, & Chou, Chun Tung (2006) Detecting Wormhole Attacks in Wireless Sensor Networks. (Unpublished)
Besek, June M., LeFurgy, William, Muir, Adrienne, Atkinson, Benedict A., Carroll, Emma F., Coates, Jessica M., et al. (2008) International Study on the Impact of Copyright Law on Digital Preservation.
Decker, Gero, Kirov, Margarit, Zaha, Johannes Maria, & Dumas, Marlon (2006) Maestro for Let's Dance: An Environment for Modeling Service Interactions. (Unpublished)
Ekanayake, Chathura C., Dumas, Marlon, Garcia-Banuelos, Luciano, & La Rosa, Marcello (2005) Slice, mine and dice : complexity-aware automated discovery of business process models. (Submitted (not yet accepted for publication))
La Rosa, Marcello, Dumas, Marlon, ter Hofstede, Arthur H.M., Mendling, Jan, & Gottschalk, Florian (2007) Beyond Control-Flow: Extending Business Process Configuration to Resources and Objects. (Unpublished)
Suriadi, Suriadi, Wynn, Moe T., Ouyang, Chun, ter Hofstede, Arthur H.M., & van Dijk, Nienke (2012) Understanding process behaviours in a large insurance company in Australia : a case study.
Zaha, Johannes Maria, Barros, Alistair P., Dumas, Marlon, & ter Hofstede, Arthur H.M. (2006) Let's Dance: A Language for Service Behavior Modeling. (Unpublished)
Lux, Johannes W. (2006) Creating a Reference Model for the Creative Industries – Evaluation of Configurable Event Driven Process Chains in Practice. Queensland University of Technology.
Cain, Lara Anne (2003) Using a thimble to drink from a fire hydrant: information anxiety and the third sector. [Working Paper]
McGregor-Lowndes, Myles (1995) Select list of resources about the internet. [Working Paper]
Banks, Jasmine (2012) The Spartan-3E Tutorial 2 : Introduction to using the PicoBlaze Microcontroller Version 1.0. The Spartan-3E Tutorial 2: Introduction to using the PicoBlaze Microcontroller Version 1.0. (Unpublished)
Bruce, Christine S., Pham, Binh L., & Stoodley, Ian D. (2002) The Collective Consciousness of Information Technology Research: Ways of seeing Information Technology Research: Its Objects and Territories. (Unpublished)
Bruce, Christine S., Pham, Binh L., & Stoodley, Ian D. (2005) The collective consciousness of information technology research. Research students' ways of seeing information technology research: its objects and territories. (Unpublished)
Cobcroft, Rachel S. (2006) Literature Review into Mobile Learning in the University Context. (Unpublished)
Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Gauravaram, Praveen S., McNamara, Judith, & O'Shea, Kathryn L. (2007) Electronic Contract Administration – Legal and Security Issues Research Report.
Pappalardo, Kylie M., Fitzgerald, Anne M., Fitzgerald, Brian F., Kiel-Chisholm, Scott D., O'Brien, Damien, & Austin, Anthony (2007) A Guide to Developing Open Access Through Your Digital Repository.
Stoodley, Ian D. (2006) IT professionals' experience of ethics and its implications for IT education: Confirmation of candidature. (Unpublished)