Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer Software not elsewhere classified (080399)"
|Up a level|
- Subjects classification (38616)
- Australian and New Zealand Standard Research Classification (38616)
Group by: Authors/Creators | Item Type
Number of items at this level: 60.
Fitzgerald, Brian F. & Bassett, Graham (Eds.) (2003) Legal Issues for Free and Open Source Software. Essays in Technology Policy and Law, 1. QUT School of Law, Brisbane.
Bancroft, Peter & Roe, Paul (2006) Program Annotations: Feedback for Students Learning to Program. In Tolhurst, D & Mann, S (Eds.) Proceedings of the Eighth Australasian Computing Education Conference (ACE2006), Australian Computer Society Inc, Hobart, Australia, pp. 19-24.
Branagan, Mark, Caelli, Bill, Kwok, Lam For, & Longley, Dennis (2008) Feasibility of automated information security compliance auditing. In Jajodia, S, Samarati, P, & Cimato, S (Eds.) Proceedings of the IFIP TC11 23rd International Information Security Conference, 7-10 September, 2008, Milano, Italy.
Brereton, Margot, Bidwell, Nicola, Donovan, Jared, Campbell, Brett, & Buur, Jacob (2003) Work at hand : an exploration of gesture in the context of work and everyday life to inform the design of gestural input devices. In Biddle, Robert & Thomas, Bruce (Eds.) Australian User Interface Conference, Conferences in Research and Practice in Information Technology, 4 - 7 February 2003, Adelaide, South Australia.
Brereton, Margot, Donovan, Jared, & Viller, Stephen (2003) Talking about watching : using the video card game and wiki-web technology to engage IT students in developing observational skills. In Greening, Tony & Lister, Raymond (Eds.) Fifth Australasian Computing Education Conference, Conferences in Research and Practice in Information Technology, 4 - 7 February 2003, Adelaide, South Australia,.
Bruce, Christine S., Christie, Ruth J., & Stoodley, Ian D. (2004) Masters Students’ Experiences of Learning to Program: An Empirical Model. In QualIT, 24-26th November 2004, Griffith University, Brisbane.
Bruce, Christine S. & McMahon, Camille A. (2002) Contemporary developments in teaching and learning introductory programming: Towards a research proposal. Faculty of Information Technology, QUT Teaching & Learning Report.
Campbell, Brett & Brereton, Margot (2004) Maintaining human agency in the design on context-aware systems : Design games in a dental surgery. In Hyland, P & Vrazalic, L (Eds.) The 2004 Conference for the Computer-Human Interaction Special Interest Group (OZCHI), 22 - 24 November 2004, Australia, New South Wales, Wollongong.
Campbell, Brett, Cederman-Haysom, Tim, Donovan, Jared, & Brereton, Margot (2003) Springboards into design : exploring multiple representations of interaction in a dental surgery. In Viller, Stephen & Wyeth, Peta (Eds.) 2003 Australasian Computer Human Interaction Conference, 26 - 28 November 2003, Brisbane, Queensland,.
Chappell, Timothy & Geva, Shlomo (2011) Overview of the INEX 2010 focused relevance feedback track. In Proceedings of INEX 2011, Springer, Vucht, The Nederlands. (In Press)
Conforti, Raffaele, Dumas, Marlon, García-Bañuelos, Luciano, & La Rosa, Marcello (2014) Beyond tasks and gateways: discovering BPMN models with subprocesses, boundary events and activity markers. In Business Process Management Conference, 7-11 September 2014, Haifa, Israel.
Cooney, Dominic, Dumas Menjivar, Marlon, & Roe, Paul (2005) Programming and Compiling Web Services in GPSL. In Benatallah, B, Casati, F, & Traverso, P (Eds.) Service-Oriented Computing - ICSOC 2005 Proceedings, 12 December - 15 December 2005, The Netherlands, Amsterdam.
Craik, Andrew J. (2008) Operational Semantics for Object Ownership and Runtime Reasoning about Inherent Parallelism. (Unpublished)
Craik, Andrew J. & Kelly, Wayne A. (2008) Reasoning about Inherent Parallelism in Object-Oriented Programs using Ownership Types. In ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science, ACM, pp. 27-36.
Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Dawson, Edward, Peng, Kun, & Yao, Minna (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In Boyd, C & Gonzalez-Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Donovan, Jared & Brereton, Margot (2005) Movements in gesture interfaces. In Larssen, Astrid, Robertson, Toni, Brereton, Margot, Loke, Lian, & Edwards, Jenny (Eds.) Critical Computing 2005 - Between Sense and Sensibility, the Fourth Decennial Aarhus Conference. Proceedings of the Worskshop : Approaches to Movement- Based Interaction, 21 August 2005, Denmark, Aarhus.
Drogemuller, Robin M. (2006) DesignSpec. [Design/Architectural Work]
Fidge, Colin J. & Cook, Phil (2005) Model Checking Interrupt-Dependent Software. In 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 15-17 December, Taiwan.
FitzGerald, John D. & Mackinnon, Ian D.R. (1977) Petpak—a computing package for the petrologist. Computers and Geosciences, 3(4), pp. 637-638.
Goonasekera, Nuwan A., Caelli, William J., & Sahama, Tony R. (2009) 50 Years of Isolation. In IEEE Computer Society, IEEE Computer Society Conference Publishing Services (CPS), Brisbane, Australia, pp. 54-60.
Gottschalk, Florian, van der Aalst, Wil M.P., Jansen-Vullers, Monique H., & La Rosa, Marcello (2008) Configurable Workflow Models. International Journal of Cooperative Information Systems (IJCIS), 17(2).
Gui, Li & Tian, Yu-Chu (2011) A conditional retransmission enabled transport protocol for real-time networked control systems. In Pfeifer, Tom, Jayasumana, Anura, & Aschenbruck, Nils (Eds.) Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN 2011), IEEE , Hilton Hotel, Bonn, pp. 235-238.
Hearnden, David, Lawley, Michael, & Raymond, Kerry (2006) Incremental model transformation for the evolution of model-driven systems. In Nierstrasz, Oscar, Whittle, Jon, Harel, David, & Reggio, Gianna (Eds.) 9th International Conference, MoDELS 2006, October 1-6, 2006, Genova, Italy.
Heyer, Clint, Brereton, Margot, & Viller, Stephen (2008) Cross-channel mobile social software : an empirical study. In Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI 08 CHI 08, Association for Computing Machinery, Florence, Italy, pp. 1525-1534.
Hogan, James, Smith, Glenn, & Thomas, Richard (2006) RWSP: Industry-Based Projects and Modern Software Engineering Practice for Large Classes. In Bruce, C, Mohay, G, Smith, G, Stoodley, I, & Tweedale, R (Eds.) Transforming IT Education: Promoting a Culture of Excellence. Informing Science Press, United States of America, California, pp. 163-177.
Huitfeldt, Bronwyn & Middleton, Michael R. (2001) The assessment of software quality from the user perspective: Evaluation of a GIS implementation. Journal of End User Computing, 13(1), pp. 3-11.
Hunter, Jane & Koopman, Bevan (2003) Software tools for Indigenous knowledge management. In Proceedings of 11th Museums and the Web Conference, Archives and Museum Informatics, Charlotte, North Carolina.
Iskander, D. Robert (2006) A parametric approach to measuring limbus corneae from digital images. IEEE Transactions on Biomedical Engineering, 53(6), pp. 1134-1140.
Karunarathna, Madhushika M. E., Tian, Yu-Chu, Fidge, Colin, & Hayward, Ross (2013) Algorithm clustering for multi-algorithm processor design. In Proceedings of the 2013 IEEE 31st International Conference on Computer Design (ICCD), IEEE, Asheville, NC, USA, pp. 451-454.
Keays, Roger & Rakotonirainy, Andry (2003) Context-oriented programming. In 3rd ACM international workshop on Data engineering for wireless and mobile access, 19 September 2003, San Diego, USA.
Law, Ching Loon, Zhang, Jinglan, & Roe, Paul (2012) Using mobile technology and augmented reality to increase data reliability for environmental assessment. In Proceedings of the 24th Australian Computer-Human Interaction Conference, ACM, Melbourne, VIC, pp. 327-330.
Lawley, Michael J. & Raymond, Kerry (2007) Implementing a Practical Declarative Logic-Based Model Transformation Engine. In 22nd Annual ACM Symposium on Applied Computing 2007, March 11 - 15, 2007, Seoul, Korea.
Lefevre, Laurent & Roe, Paul (2006) Improving the Flexibility of Active Grids through Web Services. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW 2006), 16-19 January, 2006, Australia, Tasmania, Hobart.
Lermer, Karl, Fidge, Colin J., & Hayes, Ian (2005) A theory for execution-time derivation in real-time programs. Theoretical Computer Science, 346(1), pp. 3-27.
Low Choy, Samantha, James, Allan, & Mengersen, Kerrie (2009) Expert elicitation and its interface with technology : a review with a view to designing Elicitator. In Expert elicitation and its interface with technology: a review with a view to designing Elicitator, Modelling and Simulation Society of Australia and New Zealand Inc., Cairns, Queensland.
Low Choy, Samantha, James, Allan, Murray, Justine, & Mengersen, Kerrie (2011) Elicitator : a user-friendly, interactive tool to support scenario-based elicitation of expert knowledge. In Ajith, H., Perera, C., Drew, A., & Johnson, C.J. (Eds.) Expert Knowledge and Its Application in Landscape Ecology. Springer, New York, pp. 39-67.
Malik, Husnain, Rakotonirainy, Andry, Larue, Gregoire, & Maire, Frederic D. (2011) How consistent are drivers in their driving? A driver training perspective. In 17th International Conference on Urban Transport and Environment, 6 - 8 June 2011, Pisa, Italy.
Mohay, George (2006) From Computer Forensics to Digital Forensics. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.
Moores, Matthew T. & Leggett, Kevin (2005) Integrating XSL-FO with Enterprise Reporting. In 11th Australasian World Wide Web Conference, 2nd to 6th July 2005, Royal Pines Resort, Gold Coast, Australia.
Purba, Budi, Harris, Richard, O'Shea, Peter J., & Saidi, Aryanto (1997) A performance analysis of a cellular SDMA system with an adaptive array. In TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications, 2-4 December 1997.
Rakotonirainy, Andry (2003) How to Program Pervasive Systems. In 14th International Workshop on Database and Expert Systems Applications, 1-5 September 2003, Prague, Czech Republic.
Redding, Guy M., Dumas, Marlon, ter Hofstede, Arthur H.M., & Iordachescu, Adrian (2008) Generating business process models from object behavior models. Information Systems Management, 25(4), pp. 319-331.
Redding, Guy M., Dumas, Marlon, ter Hofstede, Arthur H.M., & Iordachescu, Adrian (2008) Transforming object-oriented to process-oriented models. Lecture Notes in Computer Science, Volume 49, pp. 132-143.
Richards, Mark A., Dunn, Tim L., & Pham, Binh (2007) Developing a motion-based input model for mobile devices. In Jacko, Julie (Ed.) Proceedings of the HCI International 2007 : Human-Computer Interaction. Interaction Platforms and Techniques, 22-27 July 2007, Beijing, China.
Schatz, Bradley, Mohay, George, & Clark, Andrew (2005) Generalising event correlation across multiple domains. Journal of Information Warfare, 4(1), pp. 69-79.
Sirikijpanichkul, Ackchai & Ferreira, Luis (2005) Multi-Objective Evaluation of Intermodal Freight Terminal Location Decisions. In The 27th Conference of Australian Institute of Transport Research (CAITR), 7-9 December 2005, Queensland University of Technology (QUT), Brisbane.
Stephens, Alex J., Huygens, Flavia, Inman-Bamber, John, Price, Erin P., Nimmo, Graeme R., Schooneveldt, Jacqueline, et al. (2006) Methicillin-Resistance Staphylococcus Aureus Genotyping using a Small Set of Polymorphisms. Journal of Medical Microbiology, 55(1), pp. 43-51.
Teague, Donna M., Poppleton, Annabel, Bancroft, Peter G., & Roe, Paul (2005) Online Feedback For Novice Programmers. In OLT 2005 Conference: Beyond Delivery, 27 September 2005, QUT Gardens Point, Brisbane.
Tian, Guo-Song, Tian, Yu-Chu, & Fidge, Colin (2014) Precise relative clock synchronization for distributed control using TSC registers. Journal of Network and Computer Applications, 44, pp. 63-71.
Tian, Yu-Chu & Gui, Li (2011) QoC Elastic Scheduling for Real-Time Control Systems. Real-Time Systems, 47(6), pp. 534-561.
Tian, Yu-Chu, Jiang, Xiefu, Levy, David, & Agrawala, Ashok (2011) Local adjustment and global adaptation of control periods for QoC management of control systems. IEEE Transactions on Control Systems Technology, 20(3), pp. 846-854.
Truong, Dinh, Roe, Paul, & Bancroft, Peter (2005) Automated Feedback for 'Fill in the Gap' Programming Exercises. In Young, A & Tolhurst, D (Eds.) Proceedings of the Seventh Australasian Computing Education Conference (ACE2005), Australian Computer Society, Newcastle, NSW, pp. 117-126.
Woo, Chaw-Seng, Du, Jiang, & Pham, Binh L. (2006) Geometric Invariant Domain for Image Watermarking. In Shi, Y.Q. & Jeon, B. (Eds.) International Workshop on Digital Watermarking 2006, 8-10 November 2006, South Korea.
Woo, Chaw-Seng, Du, Jiang, & Pham, Binh L. (2005) Geometrically Robust Digital Image Watermarking Using Scale Normalisation and Flowline Curvature. In Delp III, Edward, Wong, Ping, & Wendelborn, Andrew (Eds.) Security, Steganography and Watermarking of Multimedia Contents (SPIE2005), 16-20 January 2005, USA, California, San Jose.
Woo, Chaw-Seng, Du, Jiang, & Pham, Binh L. (2005) Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images. In Lovell, Brian C. & Maeder, Anthony J. (Eds.) APRS Workshop on Digital Image Computing (WDIC2005), Monday 21st February 2005, Brisbane, Southbank.
Wynn, M.T., Verbeek, H.M.W., van der Aalst, W.M., ter Hofstede, A.H.M., & Edmond, D. (2007) Business process verification - finally a reality! Business Process Management Journal, 15(1), pp. 74-92.
Xie, Gang, Guo, H. B., Tian, Yu-Chu, & Tang, Maolin (2012) A human-simulated immune evolutionary computation approach. In Huang, T. (Ed.) Lecture Notes in Computer Science, Springer, Doha, Qatar, pp. 92-99.
Yeh, Andy J. (2004) Two Turns Must Take Turns: Primary School Students’ Cognition about 3D Rotation in a Virtual Reality Learning Environment. In Yang, Wei-Chi, Chu, Sung-Chi, De Alwis, Tilak, & Ang, Keng-Cheng (Eds.) Asian Technology Conference in Mathematics (ATCM), 13-17 December, 2004, Singapore.
Yeh, Andy J. & Nason, Rodney A. (2004) Toward a Semiotic Framework for Using Technology in Mathematics Education: The Case of Learning 3D Geometry. In International Conference on Computers in Education, November 30th to December 3rd. 2004, Melbourne, Australia.