QUT ePrints

Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > OTHER INFORMATION AND COMPUTING SCIENCES (089900) > Information and Computing Sciences not elsewhere classified (089999)"

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Number of items at this level: 92.

Book

Asprey, Len & Middleton, Michael R. (2003) Integrative document and content management: Strategies for exploiting enterprise knowledge. Idea Group Publishing, Hershey, PA, USA, pp. 1-27.

Middleton, Michael R. (2002) Information management: a consolidation of operations, analysis and strategy. Charles Sturt University Centre for Information Studies, Wagga Wagga, NSW, Australia, v-viii.
Number of full-text downloads 939

Nelson, Karen J. (2008) Information and knowledge management in business contexts : a multi-method study. VDM Verlag, Saarbruken Germany.

Book Chapter

Reye, Jim & Wheeldon, Alan (2006) Planning Explanations. In Bruce, C, Mohay, G, Smith, G, Stoodley, I, & Tweedale, R (Eds.) Transforming IT Education: Promoting a Culture of Excellence. Informing Science Press, United States of America, California, pp. 223-241.

Willis, Jenny, Sahama, Tony, & Hargreaves, Megan (2010) Assessing performance and capability in work placements. In Jackson, Norman (Ed.) Learning to be Professional through a Higher Education e-book. University of Surrey, Guildford, Surrey, England, UK, pp. 1-15.
Number of full-text downloads 63

Journal Article

Alhaqbani, Bandar S., Josang, Audun, & Fidge, Colin J. (2009) A medical data reliability assessment model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), pp. 64-78.
Number of full-text downloads 120
Number of citations in Scopus 3

Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243.
Number of full-text downloads 107
Number of citations in Scopus 22
Number of citations in Web of Science® 25

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 146
Number of citations in Scopus 3

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Number of full-text downloads 45
Number of citations in Scopus 1

Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Caelli, William, Gaskell, Gary, & Longley, Dennis (2005) High Trust Integrity Controls. Information Risk Management & Audit (IRMS) Journal, 15(3), pp. 5-8.

Choo, Kim (2005) Revisit of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. International Journal of Network Security, 1(3), pp. 154-159.
Number of citations in Scopus 15

Costello, Craig & Lauter, Kristin (2012) Group law computations on Jacobians of hyperelliptic Curves. Lecture Notes in Computer Science, 7118, pp. 92-117.
Number of full-text downloads 65
Number of citations in Scopus 3

Johnson, Daniel M. & Gardner, John (2009) Exploring mindlessness as an explanation for the media equation : a study of stereotyping in computer tutorials. Personal and Ubiquitous Computing, 13(2), pp. 151-163.
Number of full-text downloads 105
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Koppi, Tony, Sheard, Judy, Naghdy, Fazel, Edwards, Sylvia, & Brookes, Wayne (2010) Towards a gender inclusive information and communications technology curriculum: a perspective from graduates in the workforce. Computer Science Education, 20(4), pp. 265-282.
Number of citations in Scopus 1

Nepal, M.P., Staub-French, S., Pottinger, R., & Zhang, J. (2013) Ontology-based feature modeling for construction information extraction from a building information model. Journal of Computing in Civil Engineering, 27(5), pp. 555-569.
Number of full-text downloads 204
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Nepal, Madhav Prasad, Staub-French, Sheryl, Pottinger, Rachel, & Webster, April (2012) Querying a building information model for construction-specific spatial information. Advanced Engineering Informatics, 26(4), pp. 904-923.
Number of full-text downloads 96
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Rozinat, Anne, Wynn, Moe T., van der Aalst, Wil M. P., ter Hofstede, Arthur H. M., & Fidge, Colin J. (2009) Workflow simulation for operational decision support. Data and Knowledge Engineering, 68(9), pp. 834-850.
Number of citations in Scopus 58
Number of citations in Web of Science® 25

Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware multicast protocol for emergency message dissemination in vehicular networks. International Journal of Vehicular Technology, 2012.
Number of full-text downloads 68

Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware rate-adaptive beaconing for efficient and scalable vehicular safety communication. International Journal of Communications, Network and System Sciences, 5(9), pp. 534-547.
Number of full-text downloads 123

Truskinger, Anthony, Newmarch, Ian, Cottman-Fields, Mark, Wimmer, Jason, Towsey, Michael, Zhang, Jinglan, et al. (2013) Reconciling folksonomic tagging with taxa for bioacoustic annotations. Web Information Systems Engineering – WISE 2013 : Lecture Notes in Computer Science, 8180, pp. 292-305.

Wong, Andy & Kozan, Erhan (2010) Optimization of container process at seaport terminals. Journal of the Operational Research Society, 61(4), pp. 658-665.
Number of full-text downloads 827
Number of citations in Scopus 10
Number of citations in Web of Science® 7

Conference Paper

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Number of full-text downloads 53

Alkaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Alan N. (2010) Money laundering and FATF compliance by the international community. In Berleur, Jacques, Hercheui, Magda David, & Hilty, Lorenz M (Eds.) IFIP Advances in Information and Communication Technology, Springer Verlag, Brisbane, Australia, pp. 86-97.
Number of full-text downloads 811

Alkaabi, Ali, Mohay, George M., McCullagh, Adrian J., & Chantler, Alan N. (2010) Dealing with the problem of cybercrime. In Baggili, Ibrahim (Ed.) Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, ICST, Abu Dhabi.
Number of full-text downloads 791

Alsaleh, Slah, Nayak, Richi, Xu, Yue, & Chen, Lin (2011) Improving matching process in social network using implicit and explicit user information. In Du, Xiaoyong, Wenfei, Fan, & Jianmin, Wang (Eds.) Proceedings of the Asia-Pacific Web Conference (APWeb 2011) Lecture Notes in Computer Science, Springer Computer Science , Beijing,China, pp. 313-320.
Number of full-text downloads 335
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Alseadoon, Ibrahim, Chan, Taizan, Foo, Ernest, & Gonzalez Nieto, Juan M. (2012) Who is more susceptible to phishing emails? : a Saudi Arabian study. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems 2012, Deakin University, Deakin University, Geelong, Victoria.

Bannon, David, Chhabra, Rajesh, Coddington, Paul, Cox, Daniel, Crawford, Frank, Francis, Rhys, et al. (2006) Experiences with a grid gateway architecture using virtual machines. In First International Workshop on Virtualization Technology in Distributed Computing, 17 November, Tampa, Florida.
Number of full-text downloads 290

Bhatia, Sajal, Kush, Nishchal, Djamaludin, Chris, Akande, Ayodeji, & Foo, Ernest (2014) Practical Modbus flooding attack and detection. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 57-65.
Number of full-text downloads 113

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 189
Number of citations in Scopus 3
Number of citations in Web of Science® 6

Branagan, Mark, Caelli, William, & Longley, Dennis (2005) Security Modelling for Risk Assessment. In Mendis, P, Lai, J, & Dawson, E (Eds.) Rcent Advances in Counter-Terrorism Technology and Infrastructure Protection, July 2005, Australia, Canberra.

Branagan, Mark, Dawson, Robert, & Longley, Dennis (2006) Security Risk Analysis for Complex Systems. In Venter, H, Eloff, J, Labuschagne, L, & Eloff, M (Eds.) Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5 - 7 July 2006, South Africa, Johannesburg.

Branagan, Mark & Longley, Dennis (2005) Developing Threat Networks for Risk Analysis of Information Systems. In Ventor, H, Eloff, J, & Labuschagne, L (Eds.) ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, South Africa, Sandton.

Brown, Hugh D. (2006) A Digital Business Model for Independent Musicians. In Association of Internet Researchers Doctoral Colloquium, 27 September 2006, Brisbane. (Unpublished)
Number of full-text downloads 2,032

Bruce, Christine S. (2004) Information Literacy as a Catalyst for Educational Change. A Background Paper. In Danaher, Patrick A. (Ed.) "Lifelong Learning: Whose responsibility and what is your contribution?", the 3rd International Lifelong Learning Conference, 13-16 June 2004, Yeppoon, Queensland.
Number of full-text downloads 11,628

Burdon, Mark, Low, Rouhshi, & Reid, Jason F. (2010) If it's encrypted it's secure! The viability of US state-based encryption exemptions. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on technology and society : Social Implications of Emerging Technologies, IEEE, University of Wollongong, New South Wales, pp. 96-102.
Number of full-text downloads 81

Chen, Lin & Nayak, Richi (2011) Social network analysis of an online dating network. In Proceedings of 5th International Conference on Communities & Technologies (C&T 2011), ACM, State Library of Queensland, Brisbane, QLD, pp. 41-49.
Number of full-text downloads 561
Number of citations in Scopus 1

Chen, Lin, Nayak, Richi, Kutty, Sangeetha, & Xu, Yue (2013) Users segmentations for recommendation. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, ACM, Coimbra, Portugal.
Number of full-text downloads 83
Number of citations in Scopus 1

Chen, Lin, Nayak, Richi, & Xu, Yue (2011) A recommendation method for online dating networks based on social relations and demographic information. In Proceedings of The 2011 International Conference on Advances in Social Networks Analysis and Mining, IEEE, Kaohsiung, Taiwan, pp. 407-411.
Number of full-text downloads 108
Number of citations in Scopus 4

Corpuz, Maria (2011) Enterprise information security policy assessment : an extended framework for metrics development utilising the goal-question-metric approach. In Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, pp. 269-274.
Number of full-text downloads 587

Corpuz, Maria (2011) The enterprise information security policy as a strategic business policy within the corporate strategic plan (extended abstract). In Callaos, Nagib & Chu, Hsing-Wei (Eds.) Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, USA, pp. 275-279.
Number of full-text downloads 188

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Docherty, Michael, Sutton, Peter, Brereton, Margot, & Kaplan, Simon (2001) An innovative design and studio-based CS degree. In SIGCSE ’01 : Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education, ACM, Charlotte, North Carolina, pp. 233-237.
Number of full-text downloads 83
Number of citations in Scopus 16
Number of citations in Web of Science® 13

Edmond, David & O'Sullivan, Justin (2005) RFT: A Useful Model for Dynamic Web Processes. In Verma, K, Sheth, A, Zaremba, M, & Bussler, C (Eds.) Proceedings of the International Workshop on Dynamic Web Processes(DWP 2005), 12 December 2005, Amsterdam, Netherlands.

Edwards, Sylvia L., O'Shea, Peter J., & Thomas, Richard Neil (2011) Contextualising learning for a real-world university: how an inverted curriculum in the first year can help better student retention. In Thomas, Jason (Ed.) Proceedings of the 14th Pacific Rim First Year in Higher Education Conference 2011: Designing for Student Success, Colourwise Reproductions, Esplanade Hotel, Fremantle, WA, pp. 1-5.
Number of full-text downloads 103

Foth, Marcus & Podkalicka, Aneta M. (2007) Communication Policies for Urban Village Connections: Beyond Access? In Papandrea, Franco & Armstrong, Mark (Eds.) Communications Policy & Research Forum (CPRF), Sep 24-25, Sydney.
Number of full-text downloads 1,142

Godat, Meredith M. & Whiteley-Degraaf, Kate M. (2003) Critical thinking: From the online environment to the multicultural classroom. In OLT 2003 Excellence: making the connections, 5th November, 2003, Brisbane Convention & Exhibition Centre. (Unpublished)
Number of full-text downloads 628

Johnson, Daniel M., Sutton, Peter, & Harris, Neil (2001) Extreme programming requires extremely effective communication: Teaching effective communication skills to students in an IT degree. In 18th Annual Conference of the Australian Society for Computers in Learning in Tertiary Education, 2001, Melbourne.
Number of full-text downloads 346

Kaplan, Simon, Fitzpatrick, Geraldine, & Docherty, Michael (2000) Stepping into cooperative buildings. In Williams, A.D. (Ed.) Proceedings of the First Australasian User Interface Conference (AUIC 2000), IEEE Computer Society, Australia National University, Canberra, pp. 33-40.
Number of full-text downloads 41

Kraal, Ben J., Dugdale, Anni, & Wagner, Michael (2004) An ethnography of speech recognition. In OZCHI 2004, 21-24 November 2004, Wollongong, New South Wales.
Number of full-text downloads 70

Kraal, Ben J., Wagner, Michael, & Collings, Penny (2002) Improving the user interface of dictation software. In Bow, Catherine (Ed.) The Ninth Australian International Conference on Speech Science and Technology, 3-5 December 2002, Melbourne, Vic.

Kush, Nishchal, Branagan, Mark, Foo, Ernest, & Ahmed, Ejaz (2014) Poisoned GOOSE : exploiting the GOOSE protocol. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 17-22.
Number of full-text downloads 89

Low, Rouhshi, Burdon, Mark, Christensen, Sharon A., Duncan, William D., Barnes, Paul H., & Foo, Ernest (2010) Protecting the protectors : legal liabilities from the use of Web 2.0 for Australian disaster response. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on Technology and Society : Social Implications of Emerging Technologies, ISTAS 2010 Program Committee, University of Wollongong, New South Wales, pp. 411-418.
Number of full-text downloads 204

McAllister, Lynn M., Hall, Helen M., Partridge, Helen L., & Hallam, Gillian C. (2006) Developing a lifelong learning community: the West End connect project. In Orr, D., Nouwens, F., Macpherson, C., Harreveld, R. E., & Danaher, P. A. (Eds.) Lifelong learning: partners, pathways and pedagogoies. 4th International Lifelong Learning Conference, 13-16 June 2006, Yeppoon, Central Queensland, Australia.
Number of full-text downloads 429

McArthur, Robert, Broom, Bradley, Middleton, Michael R., & Willie, Sylvia (1995) Experiences with Internet client software in a university IT Faculty. In AusWeb95 The First Australian WorldWideWeb Conference, April 1995, Ballina, New South Wales.
Number of full-text downloads 332

Nykvist, Shaun S. & Masters, Jennifer E. (2006) Learning Informally with Digital Media: The Fifth Dimension. In Australian Computers in Education Conference, 2nd-4th October, 2006, Cairns.
Number of full-text downloads 319

Pham, Binh L. & Smith, Robert (2007) A Metadata Augmentation for Semantic and Context-Based Retrieval of Digital Cultural Objects. In 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, 3-5 December 2007, Glenelg, South Australia.
Number of full-text downloads 187

Rehan, Syed & Bandara, Wasana (2012) ICT to enhance the triangle of life : the soil, the seed, and the life-giver farmer. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems, Deakin University, Geelong, Victoria, pp. 1-10.

Reid, Jason F. & Looi, Mark H. (2000) Making Sense of Smart Card Security Certifications. In Domingo-Ferrer, Joseph, Chan, David, & Watson, Anthony (Eds.) Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), September 20-22, 2000, Bristol, United Kingdom.
Number of full-text downloads 502

Satchell, Christine & Dourish, Paul (2009) Beyond the user : use and non-use in HCI. In OZCHI 2009 : Design: Open 24/7 : 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group (CHISIG) of the Human Factors and Ergonomics Society of Australia (HFESA), 23-27 November 2009, The University of Melbourne, Melbourne.
Number of full-text downloads 455
Number of citations in Scopus 22

Schramm, Amy J. & Rakotonirainy, Andry (2008) An analysis of cyclists crashes to identify ITS-based intervention. In 15th World Congress On ITS, 16-20 November 2008, Jacob K. Javits Convention Center, New York.
Number of full-text downloads 424

Seidel, Stefan & Recker, Jan C. (2012) Implementing green business processes : the importance of functional affordances of information systems. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems 2012, Deakin University, Deakin University, Geelong, VIC, pp. 1-10.

Song, Wei & Tjondronegoro, Dian W. (2010) A survey on usage of mobile video in Australia. In Proceedings of the 22nd Annual Conference of the Australian Computer-Human Interaction, ACM Digital Library, Queensland University of Technology, Brisbane, pp. 5-8.
Number of full-text downloads 126

Song, Wei, Tjondronegoro, Dian W., & Azad, Salahuddin (2010) User-centered video quality assessment for scalable video coding of H.264/AVC standard. In Boll, Susnne, Tian, Qi, Zhang, Zili, & Chen, Yi-Ping Phoebe (Eds.) Advances in Multimedia Modeling, Springer Netherlands, Chong Qing, China, pp. 55-65.

Song, Wei, Tjondronegoro, Dian W., & Docherty, Michael (2011) Quality delivery of mobile video : in-depth understanding of user requirements. In OzCHI 2011 : Design, Culture and Interaction, 28 November - 2 December 2011, Australian National University, Canberra. (In Press)
Number of full-text downloads 527

Song, Wei, Tjondronegoro, Dian W., & Himawan, Ivan (2014) Acceptability-based QoE management for user-centric mobile video delivery : a field study evaluation. In 22nd ACM International Conference on Multimedia, 3-7 November 2014, Lake Buena Vista, Orlando, Florida. (In Press)

Song, Wei, Tjondronegoro, Dian W., Wang, Shu-Hsien, & Docherty, Michael (2010) Impact of zooming and enhancing Region of Interests for optimizing user experience on mobile sports video. In Proceedings of ACM Multimedia 2010 International Conference, ACM Digital Library, Firenze, Italy, pp. 321-330.
Number of citations in Scopus 8

Suriadi, Suriadi, Foo, Ernest, & Du, Rong (2008) Layered identity infrastructure model for identity meta systems. In Sixth Australasian Information Security Conference (AISC 2008), 22 - 25 January 2008, Wollongong, Australia.
Number of full-text downloads 251

Symonds, Michael, Zuccon, Guido, Koopman, Bevan, & Bruza, Peter D. (2013) QUT_Para at TREC 2012 Web Track : word associations for retrieving web documents. In NIST Special Publication 500-298 : The Twenty First Text Retrieval Conference Proceedings (TREC 2012), NIST, Gaithersburg, Maryland .
Number of full-text downloads 80

Symonds, Michael, Zuccon, Guido, Koopman, Bevan, Bruza, Peter D., & Nguyen, Anthony (2012) Semantic judgement of medical concepts : combining syntagmatic and paradigmatic information with the tensor encoding model. In Australasian Language Technology Association Workshop (ALTA 2012), 4-6 December 2012, University of Otago, Dunedin.
Number of full-text downloads 62

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. In Proceedings of International Cryptology Conference 2010, Hotel Equatorial Melaka, Melaka.

Thomas, Richard N. (1999) Group dynamics and software engineering. In Manns, Mary Lynn (Ed.) Object Oriented Programming Systems Languages and Applications : Educators' Symposium, 1-5 November 1999, Denver, Colorado.
Number of full-text downloads 147

Truskinger, Anthony Masters, Yang, Haofan, Wimmer, Jason, Zhang, Jinglan, Williamson, Ian, & Roe, Paul (2011) Large scale participatory acoustic sensor data analysis : tools and reputation models to enhance effectiveness. In Werner, Bob (Ed.) 7th IEEE International Conference on eScience, IEEE Computer Society, Stockholm City Conference Centre/Norra Latin, Stockholm. (In Press)
Number of full-text downloads 167
Number of citations in Scopus 1

White, Andrew, Tickle, Alan, & Clark, Andrew (2010) Overcoming reputation and proof-of-work systems in botnets. In Proceedings of the 4th International Conference on Network and System Security (NSS 2010), IEEE Computer Society, Melbourne.
Number of full-text downloads 197

Zanjani, Nastaran, Nykvist, Shaun S., & Geva, Shlomo (2012) Do students and lecturers actively use collaboration tools in learning management systems? In Proceedings of 20th International Conference on Computers in Education (ICCE 2012), Asia-Pacific Society for Computers in Education, Singapore, pp. 698-705.
Number of full-text downloads 129

Zhang, Meng & Bandara, Wasana (2012) State of multilevel research perspective in the information systems discipline. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems, Deakin University, Deakin University, Geelong, Victoria.
Number of full-text downloads 12

Conference Item

Baker, Janet & Nelms, Emma (2013) Would you like data with that? Library provision of financial datasets. In eResearch Australasia Conference 2013: Delivering eResearch for the Masses, 20-25 October 2013, Brisbane Convention and Exhibition Centre, Brisbane, QLD. (Unpublished)
Number of full-text downloads 71

Broadley, Philippa, Edussuriya, Gawri, McCafferty, Siobhann, & Woodman, Helen (2013) How much is that data in the window? Advertising your research data with QUT Library. In eResearch Australasia Conference 2013 : Delivering eResearch for the Masses, 20-25 October 2013, Brisbane Convention and Exhibition Centre, Brisbane, Australia. (Unpublished)
Number of full-text downloads 54

Prasolova, Nina, Bradbury, Stephanie J., & Jefferson, Osmat Azzam (2013) Library Research Support in developing, testing and promoting an open cyberinfrastructure. In eResearch Australasia Conference 2013 : Delivering eResearch for the Masses, 20-25 October 2013, Brisbane Convention and Exhibition Centre, Brisbane, Australia. (Unpublished)
Number of full-text downloads 33

Thomas, Richard N. (2010) Renewing undergraduate IT education. In HERDSA 2010 : Reshaping Higher Education, 6-9 July 2010, Hilton on the Park, Melbourne, VIC.
Number of full-text downloads 43

Warne, David, Young, Joseph A., & Kelson, Neil A. (2012) Visualisation of complex flows using texture-based techniques. In Computational Techniques and Applications Conference, 23 - 26 September, The Queensland University of Technology, Brisbane, Australia. (Unpublished)
Number of full-text downloads 70

Report

Besek, June M., LeFurgy, William, Muir, Adrienne, Atkinson, Benedict A., Carroll, Emma F., Coates, Jessica M., et al. (2008) International Study on the Impact of Copyright Law on Digital Preservation.
Number of full-text downloads 4,117

Kush, Nishchal, Clark, Andrew J., & Foo, Ernest (2010) Smart Grid Test Bed Design and Implementation. (Unpublished)
Number of full-text downloads 1,421

Thesis

Das Gupta, Jishu (2005) Performance issues for VOIP in Access Networks. University of Southern Queensland.
Number of full-text downloads 533

Kraal, Ben J. (2006) Considering design for automatic speech recognition in use. PhD thesis, University of Canberra.
Number of full-text downloads 451

Other

This list was generated on Sat Nov 1 09:33:38 2014 EST.