Number of items at this level: 65.
Casey, Eoghan & Schatz, Bradley
Conducting digital investigations.
Casey, E (Ed.) Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet.
Academic Press (Elsevier), United States of America, pp. 187-225.
Hogan, James, Smith, Glenn, & Thomas, Richard
RWSP: Industry-Based Projects and Modern Software Engineering Practice for Large Classes.
Bruce, C, Mohay, G, Smith, G, Stoodley, I, & Tweedale, R (Eds.) Transforming IT Education: Promoting a Culture of Excellence.
Informing Science Press, United States of America, California, pp. 163-177.
Low Choy, Samantha, James, Allan, Murray, Justine, & Mengersen, Kerrie
Elicitator : a user-friendly, interactive tool to support scenario-based elicitation of expert knowledge.
Ajith, H., Perera, C., Drew, A., & Johnson, C.J. (Eds.) Expert Knowledge and Its Application in Landscape Ecology.
Springer, New York, pp. 39-67.
Gottschalk, Florian, van der Aalst, Wil M.P., Jansen-Vullers, Monique H., & La Rosa, Marcello
Configurable Workflow Models.
International Journal of Cooperative Information Systems (IJCIS), 17(2).
Stephens, Alex J., Huygens, Flavia, Inman-Bamber, John, Price, Erin P., Nimmo, Graeme R., Schooneveldt, Jacqueline, et al.
Methicillin-Resistance Staphylococcus Aureus Genotyping using a Small Set of Polymorphisms.
Journal of Medical Microbiology, 55(1), pp. 43-51.
Wynn, M.T., Verbeek, H.M.W., van der Aalst, W.M., ter Hofstede, A.H.M., & Edmond, D.
Business process verification - finally a reality!
Business Process Management Journal, 15(1), pp. 74-92.
Branagan, Mark, Caelli, Bill, Kwok, Lam For, & Longley, Dennis
Feasibility of automated information security compliance auditing. In
Jajodia, S, Samarati, P, & Cimato, S (Eds.)
Proceedings of the IFIP TC11 23rd International Information Security Conference, 7-10 September, 2008, Milano, Italy.
Brereton, Margot, Bidwell, Nicola, Donovan, Jared, Campbell, Brett, & Buur, Jacob
Work at hand : an exploration of gesture in the context of work and everyday life to inform the design of gestural input devices. In
Biddle, Robert & Thomas, Bruce (Eds.)
Australian User Interface Conference, Conferences in Research and Practice in Information Technology, 4 - 7 February 2003, Adelaide, South Australia.
Brereton, Margot, Donovan, Jared, & Viller, Stephen
Talking about watching : using the video card game and wiki-web technology to engage IT students in developing observational skills. In
Greening, Tony & Lister, Raymond (Eds.)
Fifth Australasian Computing Education Conference, Conferences in Research and Practice in Information Technology, 4 - 7 February 2003, Adelaide, South Australia,.
Campbell, Brett, Cederman-Haysom, Tim, Donovan, Jared, & Brereton, Margot
Springboards into design : exploring multiple representations of interaction in a dental surgery. In
Viller, Stephen & Wyeth, Peta (Eds.)
2003 Australasian Computer Human Interaction Conference, 26 - 28 November 2003, Brisbane, Queensland,.
Conforti, Raffaele, Dumas, Marlon, García-Bañuelos, Luciano, & La Rosa, Marcello
Beyond tasks and gateways: discovering BPMN models with subprocesses, boundary events and activity markers. In
Business Process Management: 12th International Conference, BPM 2014, Proceedings [Lecture Notes in Computer Science, Volume 8659], Haifa, Israel, pp. 101-117.
Cooney, Dominic, Dumas Menjivar, Marlon, & Roe, Paul
Programming and Compiling Web Services in GPSL. In
Benatallah, B, Casati, F, & Traverso, P (Eds.)
Service-Oriented Computing - ICSOC 2005 Proceedings, 12 December - 15 December 2005, The Netherlands, Amsterdam.
Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun
A Novel Method to Maintain Privacy in Mobile Agent Applications. In
Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.)
Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Dawson, Edward, Peng, Kun, & Yao, Minna
Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In
Boyd, C & Gonzalez-Nieto, J (Eds.)
Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Donovan, Jared & Brereton, Margot
Movements in gesture interfaces. In
Larssen, Astrid, Robertson, Toni, Brereton, Margot, Loke, Lian, & Edwards, Jenny (Eds.)
Critical Computing 2005 - Between Sense and Sensibility, the Fourth Decennial Aarhus Conference. Proceedings of the Worskshop : Approaches to Movement- Based Interaction, 21 August 2005, Denmark, Aarhus.
Goonasekera, Nuwan A., Caelli, William J., & Sahama, Tony R.
50 Years of Isolation. In
IEEE Computer Society, IEEE Computer Society Conference Publishing Services (CPS), Brisbane, Australia, pp. 54-60.
Gui, Li & Tian, Yu-Chu
A conditional retransmission enabled transport protocol for real-time networked control systems. In
Pfeifer, Tom, Jayasumana, Anura, & Aschenbruck, Nils (Eds.)
Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN 2011), IEEE , Hilton Hotel, Bonn, pp. 235-238.
Hearnden, David, Lawley, Michael, & Raymond, Kerry
Incremental model transformation for the evolution of model-driven systems. In
Nierstrasz, Oscar, Whittle, Jon, Harel, David, & Reggio, Gianna (Eds.)
9th International Conference, MoDELS 2006, October 1-6, 2006, Genova, Italy.
Heyer, Clint, Brereton, Margot, & Viller, Stephen
Cross-channel mobile social software : an empirical study. In
Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI 08 CHI 08, Association for Computing Machinery, Florence, Italy, pp. 1525-1534.
Karunarathna, Madhushika M. E., Tian, Yu-Chu, Fidge, Colin, & Hayward, Ross
Algorithm clustering for multi-algorithm processor design. In
Proceedings of the 2013 IEEE 31st International Conference on Computer Design (ICCD), IEEE, Asheville, NC, USA, pp. 451-454.
Keays, Roger & Rakotonirainy, Andry
Context-oriented programming. In
3rd ACM international workshop on Data engineering for wireless and mobile access, 19 September 2003, San Diego, USA.
Lefevre, Laurent & Roe, Paul
Improving the Flexibility of Active Grids through Web Services. In
Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.)
Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW 2006), 16-19 January, 2006, Australia, Tasmania, Hobart.
Malik, Husnain, Rakotonirainy, Andry, Larue, Gregoire, & Maire, Frederic D.
How consistent are drivers in their driving? A driver training perspective. In
17th International Conference on Urban Transport and Environment, 6 - 8 June 2011, Pisa, Italy.
How to Program Pervasive Systems. In
14th International Workshop on Database and Expert Systems Applications, 1-5 September 2003, Prague, Czech Republic.
Teague, Donna M., Poppleton, Annabel, Bancroft, Peter G., & Roe, Paul
Online Feedback For Novice Programmers. In
OLT 2005 Conference: Beyond Delivery, 27 September 2005, QUT Gardens Point, Brisbane.
Truong, Dinh, Roe, Paul, & Bancroft, Peter
Automated Feedback for 'Fill in the Gap' Programming Exercises. In
Young, A & Tolhurst, D (Eds.)
Proceedings of the Seventh Australasian Computing Education Conference (ACE2005), Australian Computer Society, Newcastle, NSW, pp. 117-126.
Woo, Chaw-Seng, Du, Jiang, & Pham, Binh L.
Geometrically Robust Digital Image Watermarking Using Scale Normalisation and Flowline Curvature. In
Delp III, Edward, Wong, Ping, & Wendelborn, Andrew (Eds.)
Security, Steganography and Watermarking of Multimedia Contents (SPIE2005), 16-20 January 2005, USA, California, San Jose.
Woo, Chaw-Seng, Du, Jiang, & Pham, Binh L.
Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images. In
Lovell, Brian C. & Maeder, Anthony J. (Eds.)
APRS Workshop on Digital Image Computing (WDIC2005), Monday 21st February 2005, Brisbane, Southbank.
Xie, Gang, Guo, H. B., Tian, Yu-Chu, & Tang, Maolin
A human-simulated immune evolutionary computation approach. In
Huang, T. (Ed.)
Lecture Notes in Computer Science, Springer, Doha, Qatar, pp. 92-99.
Two Turns Must Take Turns: Primary School Students’ Cognition about 3D Rotation in a Virtual Reality Learning Environment. In
Yang, Wei-Chi, Chu, Sung-Chi, De Alwis, Tilak, & Ang, Keng-Cheng (Eds.)
Asian Technology Conference in Mathematics (ATCM), 13-17 December, 2004, Singapore.
Zhang, Yi-Fan, Tian, Yu-Chu, Kelly, Wayne, & Fidge, Colin
A distributed computing framework for all-to-all comparison problems. In
IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, IEEE, Dallas, Texas, USA.
Drogemuller, Robin M.