Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DISTRIBUTED COMPUTING (080500) > Web Technologies (excl. Web Search) (080505)"
|Up a level|
- Subjects classification (43178)
- Australian and New Zealand Standard Research Classification (43178)
Group by: Authors/Creators | Item Type
Number of items at this level: 28.
Ai, Lifeng, Tang, Maolin, & Fidge, Colin J. (2011) Partitioning composite web services for decentralized execution using a genetic algorithm. Future Generation Computer Systems, 27(2), pp. 157-172.
Ansell, Peter D. (2011) Model and prototype for querying multiple linked scientific datasets. Future Generation Computer Systems, 27(3), pp. 329-333.
Hogan, Jim, Sumitomo, Jiro, Roe, Paul, & Newell, Felicity (2010) Biomashups: the new world of exploratory bioinformatics? Concurrency and Computation: Practice and Experience, 23(11), pp. 1169-1178.
Lau, Raymond Y.K., Liao, S.Y., Kwok, Ron Chi Wai, Xu, Kaiquan, Xia, Yunqing, & Li, Yuefeng (2011) Text mining and probabilistic language modeling for online review spam detecting. ACM Transactions on Management Information Systems, 2(4), pp. 1-30.
Pipanmaekaporn, Luepol & Li, Yuefeng (2011) Mining a data reasoning model for personalized text classification. IEEE Intelligent Informatics Bulletin, 12(1), pp. 17-24.
Abdullah, Noraswaliza, Xu, Yue, & Geva, Shlomo (2011) Integrating collaborative filtering and search-based techniques for personalized online product recommendation. In Spiliopoulou, Myra, Wang, Haixun, Cook, Diane, Pei, Jian, Wang, Wei, Zaiane, Osmar, et al. (Eds.) Proceedings of the 4th Workshop on Data Mining Case Studies (IEEE ICDM2011), IEEE Computer Society Conference Publications, Marriott Pinnacle Downtown, Vancouver, pp. 711-718.
Ai, Lifeng, Tang, Maolin, & Fidge, Colin J. (2010) QoS-oriented sesource allocation and scheduling of multiple composite web services in a hybrid cloud using a random-key genetic algorithm. In 17th International Conference on Neural Information Processing (ICONIP 2010), 22-25 November 2010, Sydney. (In Press)
Algarni, Abdullah, Xu, Yue, Chan, Taizan, & Tian, Yu-Chu (2013) Toward understanding social engineering. In The Proceedings of the 8th International Conference on Legal, Security and Privacy Issues in IT Law, (Critical Analysis and Legal Reasoning), The International Association of IT Lawyers (IAITL), Bangkok, Thailand, pp. 279-300.
Ansell, Peter-Daniel, Hogan, Jim, & Roe, Paul (2010) Customisable Query Resolution in Biology and Medicine. In Maeder, A & Hansen, D (Eds.) Proceedings of 4th Australasian Workshop on Health Informatics and Knowledge Management, 18-21 January 2010, Australia.
Bhuiyan, Touhid , Xu, Yue, & Josang, Audun (2009) State-of-the-Art Review on Opinion Mining from Online Customers’ Feedback. In Proceedings of the 9th Asia-Pacific Complex Systems Conference, Chuo University, Chuo University, Tokyo, pp. 385-390.
Black, Alofi Shane & Sahama, Tony (2014) eHealth-as-a-Service (eHaaS) : the industrialisation of health informatics, a practical approach. In Proceedings of the 16th International Conference on E-health Networking, Application and Services (Healthcom), IEEE, Natal, Brazil, pp. 555-559.
Chen, Lin & Nayak, Richi (2009) Expertise analysis in a question answer portal for author ranking. In 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 9-12 December 2008, Sydney, Australia.
Duddy, Keith R., Henderson, Michael S., Metke-Jimenez, Alejandro, & Steel, Jim (2010) Design of a model-generated repository as a service for USDL. In http://www.iiwas.org/conferences/iiwas2010/fullPapers.php, ACM, IUFM University Cergy-Pontoise, Paris.
Gao, Yang, Xu, Yue, & Li, Yuefeng (2014) A topic based document relevance ranking model. In 23rd International World Wide Web Conference, 7-11 April 2014, Seoul, Korea.
Giesen, Florian, Kohlar, Florian, & Stebila, Douglas (2013) On the security of TLS renegotiation. In Gligor, V. & Yung, M. (Eds.) Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), ACM, Berlin Congress Centre, Berlin.
Kelley, Timothy, Camp, L. Jean, Lien, Suzanne, & Stebila, Douglas (2012) Self-identified experts lost on the interwebs. In Bishop, Matt & Shannon, Greg (Eds.) Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results (LASER 2012), ACM, Arlington, Virginia, pp. 47-54.
Kinley, Khamsum (2009) Enhancing the use of Internet and Web services for quality learning : an action research. In ATEA 2009 Conference Proceedings, The Charles Sturt University, Charles Sturt University, NSW.
Marrington, Andrew, Branagan, Mark, & Smith, Jason (2007) Forensic challenges in service oriented architectures. In 2007 Research Network for a Secure Australia : Security Technology Conference, 28 September 2007, Melbourne University, Melbourne, Victoria.
Metke-Jimenez, Alejandro, Raymond, Kerry, & MacColl, Ian (2010) Ontologies derived from Wikipedia : a framework for comparison. In Filipe, Joaquim Filipe & Dietz, Jan L. G. (Eds.) Proceedings of the International Conference on Knowledge Engineering and Ontology Development (KEOD 2010), SciTePress, Valencia, Spain, pp. 382-387.
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen, & Tao, Xiaohui (2011) An ontology-based mining approach for user search intent discovery. In Cunningham, Sally Jo, Scholer, Falk, & Thomas, Paul (Eds.) ADCS 2011 : Proceedings of the Sixteenth Australasian Document Computing Symposium, Australian National University, Canberra, pp. 39-46.
Soon, Chien Jon & Roe, Paul (2008) Annotation Architecture for Mobile Collaborative Mapping. In 6th International Conference on Advances in Mobile Computing and Multimedia (MOMM2008), 24-26 November 2008, Linz, Austria.
Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Tang, Maolin & Ai, Lifeng (2010) A hybrid genetic algorithm for the optimal constrained web service selection problem in web service composition. In Tang, Maolin (Ed.) Proceeding of the 2010 World Congress on Computational Intelligence, IEEE, Centre de Convencions Internacional de Barcelona, Barcelona.
Wang, Lei & Roe, Paul (2009) Rich collaboration on the move: Talk to your mobile audio wiki. In Al-Begain, K, Balakrishna, C, & Casado, A (Eds.) Proceedings of the 3rd International Conference on Next Generation Mobile Applications, Services, and Technologies, 16 - 18 September, 2009, Wales, Cardiff.
Yaakub, Mohd Ridzwan, Li, Yuefeng, & Feng, Yanming (2011) Integration of opinion into customer analysis model. In Guerrero, Juan (Ed.) Proceedings of the 2011 IEEE International Conference on e-Business Engineering, IEEE Computer Society Conference Publishing Services, China, pp. 90-95.
Polson, Debra (2008) Inventing future schools. In Handheld Learning 2008, 13-15 October 2008, The Brewery, London.
Polson, Debra (2006) SCOOT game event : families as partners in learning. In X Media Lab 2006. Games In Learning , December 6 - 8, 2006, Singapore. (Unpublished)