Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > OTHER INFORMATION AND COMPUTING SCIENCES (089900) > Information and Computing Sciences not elsewhere classified (089999)"
|Up a level|
- Subjects classification (39113)
- Australian and New Zealand Standard Research Classification (39113)
Group by: Authors/Creators | Item Type
Number of items at this level: 91.
Asprey, Len & Middleton, Michael R. (2003) Integrative document and content management: Strategies for exploiting enterprise knowledge. Idea Group Publishing, Hershey, PA, USA, pp. 1-27.
Kraal, Ben J. (2008) Considering use and design of speech recognition systems : investigating users of complex socio-technical systems. Verlag VDM.
Middleton, Michael R. (2002) Information management: a consolidation of operations, analysis and strategy. Charles Sturt University Centre for Information Studies, Wagga Wagga, NSW, Australia, v-viii.
Nelson, Karen J. (2008) Information and knowledge management in business contexts : a multi-method study. VDM Verlag, Saarbruken Germany.
Reye, Jim & Wheeldon, Alan (2006) Planning Explanations. In Bruce, C, Mohay, G, Smith, G, Stoodley, I, & Tweedale, R (Eds.) Transforming IT Education: Promoting a Culture of Excellence. Informing Science Press, United States of America, California, pp. 223-241.
Willis, Jenny, Sahama, Tony, & Hargreaves, Megan (2010) Assessing performance and capability in work placements. In Jackson, Norman (Ed.) Learning to be Professional through a Higher Education e-book. University of Surrey, Guildford, Surrey, England, UK, pp. 1-15.
Alhaqbani, Bandar S., Josang, Audun, & Fidge, Colin J. (2009) A medical data reliability assessment model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), pp. 64-78.
Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243.
Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271.
Caelli, William, Gaskell, Gary, & Longley, Dennis (2005) High Trust Integrity Controls. Information Risk Management & Audit (IRMS) Journal, 15(3), pp. 5-8.
Choo, Kim (2005) Revisit of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. International Journal of Network Security, 1(3), pp. 154-159.
Costello, Craig & Lauter, Kristin (2012) Group law computations on Jacobians of hyperelliptic Curves. Lecture Notes in Computer Science, 7118, pp. 92-117.
Johnson, Daniel M. & Gardner, John (2009) Exploring mindlessness as an explanation for the media equation : a study of stereotyping in computer tutorials. Personal and Ubiquitous Computing, 13(2), pp. 151-163.
Koppi, Tony, Sheard, Judy, Naghdy, Fazel, Edwards, Sylvia, & Brookes, Wayne (2010) Towards a gender inclusive information and communications technology curriculum: a perspective from graduates in the workforce. Computer Science Education, 20(4), pp. 265-282.
Middleton, Michael R. (1999) De la gestión de la información a la gestión del conocimiento = From information management to knowledge management: some perspectives on development. El Profesional de la Informacion, 8(5), pp. 10-17.
Nepal, M.P., Staub-French, S., Pottinger, R., & Zhang, J. (2013) Ontology-based feature modeling for construction information extraction from a building information model. Journal of Computing in Civil Engineering, 27(5), pp. 555-569.
Nepal, Madhav Prasad, Staub-French, Sheryl, Pottinger, Rachel, & Webster, April (2012) Querying a building information model for construction-specific spatial information. Advanced Engineering Informatics, 26(4), pp. 904-923.
Notley, Tanya M. & Foth, Marcus (2008) Extending Australia's digital divide policy: an examination of the value of social inclusion and social capital policy frameworks. Australian Social Policy, 7.
Rozinat, Anne, Wynn, Moe T., van der Aalst, Wil M. P., ter Hofstede, Arthur H. M., & Fidge, Colin J. (2009) Workflow simulation for operational decision support. Data and Knowledge Engineering, 68(9), pp. 834-850.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware multicast protocol for emergency message dissemination in vehicular networks. International Journal of Vehicular Technology, 2012.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware rate-adaptive beaconing for efficient and scalable vehicular safety communication. International Journal of Communications, Network and System Sciences, 5(9), pp. 534-547.
Truskinger, Anthony, Newmarch, Ian, Cottman-Fields, Mark, Wimmer, Jason, Towsey, Michael, Zhang, Jinglan, et al. (2013) Reconciling folksonomic tagging with taxa for bioacoustic annotations. Web Information Systems Engineering – WISE 2013 : Lecture Notes in Computer Science, 8180, pp. 292-305.
Wong, Andy & Kozan, Erhan (2010) Optimization of container process at seaport terminals. Journal of the Operational Research Society, 61(4), pp. 658-665.
Alhamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Alkaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Alan N. (2010) Money laundering and FATF compliance by the international community. In Berleur, Jacques, Hercheui, Magda David, & Hilty, Lorenz M (Eds.) IFIP Advances in Information and Communication Technology, Springer Verlag, Brisbane, Australia, pp. 86-97.
Alkaabi, Ali, Mohay, George M., McCullagh, Adrian J., & Chantler, Alan N. (2010) Dealing with the problem of cybercrime. In Baggili, Ibrahim (Ed.) Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, ICST, Abu Dhabi.
Alsaleh, Slah, Nayak, Richi, Xu, Yue, & Chen, Lin (2011) Improving matching process in social network using implicit and explicit user information. In Du, Xiaoyong, Wenfei, Fan, & Jianmin, Wang (Eds.) Proceedings of the Asia-Pacific Web Conference (APWeb 2011) Lecture Notes in Computer Science, Springer Computer Science , Beijing,China, pp. 313-320.
Alseadoon, Ibrahim, Chan, Taizan, Foo, Ernest, & Gonzalez Nieto, Juan M. (2012) Who is more susceptible to phishing emails? : a Saudi Arabian study. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems 2012, Deakin University, Deakin University, Geelong, Victoria.
Bannon, David, Chhabra, Rajesh, Coddington, Paul, Cox, Daniel, Crawford, Frank, Francis, Rhys, et al. (2006) Experiences with a grid gateway architecture using virtual machines. In First International Workshop on Virtualization Technology in Distributed Computing, 17 November, Tampa, Florida.
Bhatia, Sajal, Kush, Nishchal, Djamaludin, Chris, Akande, Ayodeji, & Foo, Ernest (2014) Practical Modbus flooding attack and detection. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 57-65.
Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Branagan, Mark, Caelli, William, & Longley, Dennis (2005) Security Modelling for Risk Assessment. In Mendis, P, Lai, J, & Dawson, E (Eds.) Rcent Advances in Counter-Terrorism Technology and Infrastructure Protection, July 2005, Australia, Canberra.
Branagan, Mark, Dawson, Robert, & Longley, Dennis (2006) Security Risk Analysis for Complex Systems. In Venter, H, Eloff, J, Labuschagne, L, & Eloff, M (Eds.) Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5 - 7 July 2006, South Africa, Johannesburg.
Branagan, Mark & Longley, Dennis (2005) Developing Threat Networks for Risk Analysis of Information Systems. In Ventor, H, Eloff, J, & Labuschagne, L (Eds.) ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, South Africa, Sandton.
Brown, Hugh D. (2006) A Digital Business Model for Independent Musicians. In Association of Internet Researchers Doctoral Colloquium, 27 September 2006, Brisbane. (Unpublished)
Bruce, Christine S. (2004) Information Literacy as a Catalyst for Educational Change. A Background Paper. In Danaher, Patrick A. (Ed.) "Lifelong Learning: Whose responsibility and what is your contribution?", the 3rd International Lifelong Learning Conference, 13-16 June 2004, Yeppoon, Queensland.
Burdon, Mark, Low, Rouhshi, & Reid, Jason F. (2010) If it's encrypted it's secure! The viability of US state-based encryption exemptions. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on technology and society : Social Implications of Emerging Technologies, IEEE, University of Wollongong, New South Wales, pp. 96-102.
Chen, Lin & Nayak, Richi (2011) Social network analysis of an online dating network. In Proceedings of 5th International Conference on Communities & Technologies (C&T 2011), ACM, State Library of Queensland, Brisbane, QLD, pp. 41-49.
Chen, Lin, Nayak, Richi, Kutty, Sangeetha, & Xu, Yue (2013) Users segmentations for recommendation. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, ACM, Coimbra, Portugal.
Chen, Lin, Nayak, Richi, & Xu, Yue (2011) A recommendation method for online dating networks based on social relations and demographic information. In Proceedings of The 2011 International Conference on Advances in Social Networks Analysis and Mining, IEEE, Kaohsiung, Taiwan, pp. 407-411.
Corpuz, Maria (2011) Enterprise information security policy assessment : an extended framework for metrics development utilising the goal-question-metric approach. In Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, pp. 269-274.
Corpuz, Maria (2011) The enterprise information security policy as a strategic business policy within the corporate strategic plan (extended abstract). In Callaos, Nagib & Chu, Hsing-Wei (Eds.) Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, USA, pp. 275-279.
Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Docherty, Michael, Sutton, Peter, Brereton, Margot, & Kaplan, Simon (2001) An innovative design and studio-based CS degree. In SIGCSE ’01 : Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education, ACM, Charlotte, North Carolina, pp. 233-237.
Edmond, David & O'Sullivan, Justin (2005) RFT: A Useful Model for Dynamic Web Processes. In Verma, K, Sheth, A, Zaremba, M, & Bussler, C (Eds.) Proceedings of the International Workshop on Dynamic Web Processes(DWP 2005), 12 December 2005, Amsterdam, Netherlands.
Edwards, Sylvia L., O'Shea, Peter J., & Thomas, Richard Neil (2011) Contextualising learning for a real-world university: how an inverted curriculum in the first year can help better student retention. In Thomas, Jason (Ed.) Proceedings of the 14th Pacific Rim First Year in Higher Education Conference 2011: Designing for Student Success, Colourwise Reproductions, Esplanade Hotel, Fremantle, WA, pp. 1-5.
Foth, Marcus & Podkalicka, Aneta M. (2007) Communication Policies for Urban Village Connections: Beyond Access? In Papandrea, Franco & Armstrong, Mark (Eds.) Communications Policy & Research Forum (CPRF), Sep 24-25, Sydney.
Godat, Meredith M. & Whiteley-Degraaf, Kate M. (2003) Critical thinking: From the online environment to the multicultural classroom. In OLT 2003 Excellence: making the connections, 5th November, 2003, Brisbane Convention & Exhibition Centre. (Unpublished)
Johnson, Daniel M., Sutton, Peter, & Harris, Neil (2001) Extreme programming requires extremely effective communication: Teaching effective communication skills to students in an IT degree. In 18th Annual Conference of the Australian Society for Computers in Learning in Tertiary Education, 2001, Melbourne.
Kaplan, Simon, Fitzpatrick, Geraldine, & Docherty, Michael (2000) Stepping into cooperative buildings. In Williams, A.D. (Ed.) Proceedings of the First Australasian User Interface Conference (AUIC 2000), IEEE Computer Society, Australia National University, Canberra, pp. 33-40.
Kraal, Ben J., Dugdale, Anni, & Wagner, Michael (2004) An ethnography of speech recognition. In OZCHI 2004, 21-24 November 2004, Wollongong, New South Wales.
Kraal, Ben J., Wagner, Michael, & Collings, Penny (2002) Improving the user interface of dictation software. In Bow, Catherine (Ed.) The Ninth Australian International Conference on Speech Science and Technology, 3-5 December 2002, Melbourne, Vic.
Kush, Nishchal, Branagan, Mark, Foo, Ernest, & Ahmed, Ejaz (2014) Poisoned GOOSE : exploiting the GOOSE protocol. In Parampali, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland University of Technology, Auckland, pp. 17-22.
Low, Rouhshi, Burdon, Mark, Christensen, Sharon A., Duncan, William D., Barnes, Paul H., & Foo, Ernest (2010) Protecting the protectors : legal liabilities from the use of Web 2.0 for Australian disaster response. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on Technology and Society : Social Implications of Emerging Technologies, ISTAS 2010 Program Committee, University of Wollongong, New South Wales, pp. 411-418.
McAllister, Lynn M., Hall, Helen M., Partridge, Helen L., & Hallam, Gillian C. (2006) Developing a lifelong learning community: the West End connect project. In Orr, D., Nouwens, F., Macpherson, C., Harreveld, R. E., & Danaher, P. A. (Eds.) Lifelong learning: partners, pathways and pedagogoies. 4th International Lifelong Learning Conference, 13-16 June 2006, Yeppoon, Central Queensland, Australia.
McArthur, Robert, Broom, Bradley, Middleton, Michael R., & Willie, Sylvia (1995) Experiences with Internet client software in a university IT Faculty. In AusWeb95 The First Australian WorldWideWeb Conference, April 1995, Ballina, New South Wales.
Nykvist, Shaun S. & Masters, Jennifer E. (2006) Learning Informally with Digital Media: The Fifth Dimension. In Australian Computers in Education Conference, 2nd-4th October, 2006, Cairns.
Pham, Binh L. & Smith, Robert (2007) A Metadata Augmentation for Semantic and Context-Based Retrieval of Digital Cultural Objects. In 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, 3-5 December 2007, Glenelg, South Australia.
Rehan, Syed & Bandara, Wasana (2012) ICT to enhance the triangle of life : the soil, the seed, and the life-giver farmer. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems, Deakin University, Geelong, Victoria, pp. 1-10.
Reid, Jason F. & Looi, Mark H. (2000) Making Sense of Smart Card Security Certifications. In Domingo-Ferrer, Joseph, Chan, David, & Watson, Anthony (Eds.) Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), September 20-22, 2000, Bristol, United Kingdom.
Satchell, Christine & Dourish, Paul (2009) Beyond the user : use and non-use in HCI. In OZCHI 2009 : Design: Open 24/7 : 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group (CHISIG) of the Human Factors and Ergonomics Society of Australia (HFESA), 23-27 November 2009, The University of Melbourne, Melbourne.
Schramm, Amy J. & Rakotonirainy, Andry (2008) An analysis of cyclists crashes to identify ITS-based intervention. In 15th World Congress On ITS, 16-20 November 2008, Jacob K. Javits Convention Center, New York.
Seidel, Stefan & Recker, Jan C. (2012) Implementing green business processes : the importance of functional affordances of information systems. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems 2012, Deakin University, Deakin University, Geelong, VIC, pp. 1-10.
Song, Wei & Tjondronegoro, Dian W. (2010) A survey on usage of mobile video in Australia. In Proceedings of the 22nd Annual Conference of the Australian Computer-Human Interaction, ACM Digital Library, Queensland University of Technology, Brisbane, pp. 5-8.
Song, Wei, Tjondronegoro, Dian W., & Azad, Salahuddin (2010) User-centered video quality assessment for scalable video coding of H.264/AVC standard. In Boll, Susnne, Tian, Qi, Zhang, Zili, & Chen, Yi-Ping Phoebe (Eds.) Advances in Multimedia Modeling, Springer Netherlands, Chong Qing, China, pp. 55-65.
Song, Wei, Tjondronegoro, Dian W., & Docherty, Michael (2011) Quality delivery of mobile video : in-depth understanding of user requirements. In OzCHI 2011 : Design, Culture and Interaction, 28 November - 2 December 2011, Australian National University, Canberra. (In Press)
Song, Wei, Tjondronegoro, Dian W., Wang, Shu-Hsien, & Docherty, Michael (2010) Impact of zooming and enhancing Region of Interests for optimizing user experience on mobile sports video. In Proceedings of ACM Multimedia 2010 International Conference, ACM Digital Library, Firenze, Italy, pp. 321-330.
Suriadi, Suriadi, Foo, Ernest, & Du, Rong (2008) Layered identity infrastructure model for identity meta systems. In Sixth Australasian Information Security Conference (AISC 2008), 22 - 25 January 2008, Wollongong, Australia.
Symonds, Michael, Zuccon, Guido, Koopman, Bevan, & Bruza, Peter D. (2013) QUT_Para at TREC 2012 Web Track : word associations for retrieving web documents. In NIST Special Publication 500-298 : The Twenty First Text Retrieval Conference Proceedings (TREC 2012), NIST, Gaithersburg, Maryland .
Symonds, Michael, Zuccon, Guido, Koopman, Bevan, Bruza, Peter D., & Nguyen, Anthony (2012) Semantic judgement of medical concepts : combining syntagmatic and paradigmatic information with the tensor encoding model. In Australasian Language Technology Association Workshop (ALTA 2012), 4-6 December 2012, University of Otago, Dunedin.
Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. In Proceedings of International Cryptology Conference 2010, Hotel Equatorial Melaka, Melaka.
Thomas, Richard N. (1999) Group dynamics and software engineering. In Manns, Mary Lynn (Ed.) Object Oriented Programming Systems Languages and Applications : Educators' Symposium, 1-5 November 1999, Denver, Colorado.
Truskinger, Anthony Masters, Yang, Haofan, Wimmer, Jason, Zhang, Jinglan, Williamson, Ian, & Roe, Paul (2011) Large scale participatory acoustic sensor data analysis : tools and reputation models to enhance effectiveness. In Werner, Bob (Ed.) 7th IEEE International Conference on eScience, IEEE Computer Society, Stockholm City Conference Centre/Norra Latin, Stockholm. (In Press)
White, Andrew, Tickle, Alan, & Clark, Andrew (2010) Overcoming reputation and proof-of-work systems in botnets. In Proceedings of the 4th International Conference on Network and System Security (NSS 2010), IEEE Computer Society, Melbourne.
Zanjani, Nastaran, Nykvist, Shaun S., & Geva, Shlomo (2012) Do students and lecturers actively use collaboration tools in learning management systems? In Proceedings of 20th International Conference on Computers in Education (ICCE 2012), Asia-Pacific Society for Computers in Education, Singapore, pp. 698-705.
Zhang, Meng & Bandara, Wasana (2012) State of multilevel research perspective in the information systems discipline. In Lamp, John (Ed.) Proceedings of the 23rd Australasian Conference on Information Systems, Deakin University, Deakin University, Geelong, Victoria.
Baker, Janet & Nelms, Emma (2013) Would you like data with that? Library provision of financial datasets. In eResearch Australasia Conference 2013: Delivering eResearch for the Masses, 20-25 October 2013, Brisbane Convention and Exhibition Centre, Brisbane, QLD. (Unpublished)
Broadley, Philippa, Edussuriya, Gawri, McCafferty, Siobhann, & Woodman, Helen (2013) How much is that data in the window? Advertising your research data with QUT Library. In eResearch Australasia Conference 2013 : Delivering eResearch for the Masses, 20-25 October 2013, Brisbane Convention and Exhibition Centre, Brisbane, Australia. (Unpublished)
Prasolova, Nina, Bradbury, Stephanie J., & Jefferson, Osmat Azzam (2013) Library Research Support in developing, testing and promoting an open cyberinfrastructure. In eResearch Australasia Conference 2013 : Delivering eResearch for the Masses, 20-25 October 2013, Brisbane Convention and Exhibition Centre, Brisbane, Australia. (Unpublished)
Thomas, Richard N. (2010) Renewing undergraduate IT education. In HERDSA 2010 : Reshaping Higher Education, 6-9 July 2010, Hilton on the Park, Melbourne, VIC.
Warne, David, Young, Joseph A., & Kelson, Neil A. (2012) Visualisation of complex flows using texture-based techniques. In Computational Techniques and Applications Conference, 23 - 26 September, The Queensland University of Technology, Brisbane, Australia. (Unpublished)
Besek, June M., LeFurgy, William, Muir, Adrienne, Atkinson, Benedict A., Carroll, Emma F., Coates, Jessica M., et al. (2008) International Study on the Impact of Copyright Law on Digital Preservation.
Bruce, Christine S., Pham, Binh L., & Stoodley, Ian D. (2002) The collective consciousness of Information Technology research: The significance and value of research projects. A. The views of IT researchers. (Unpublished)
Bruce, Christine S., Pham, Binh L., & Stoodley, Ian D. (2002) The collective consciousness of Information Technology research: The significance and value of research projects. B. The views of IT industry professionals. (Unpublished)
Kush, Nishchal, Clark, Andrew J., & Foo, Ernest (2010) Smart Grid Test Bed Design and Implementation. (Unpublished)
Das Gupta, Jishu (2005) Performance issues for VOIP in Access Networks. University of Southern Queensland.
Kraal, Ben J. (2006) Considering design for automatic speech recognition in use. PhD thesis, University of Canberra.
Geneve, Anitza (2009) Towards an integrated framework of analysis : exploring ‘women's participation in the Australian digital content industry’. (Unpublished)
Middleton, Michael R. (2005) Exercises to 'Information management: A consolidation of operations, analysis and strategy'.