Browse by ANZSRC Socio-Economic Objective codes

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 208.

Article

Gupta, H., Aye, K.T., Balakrishnan, R., Rajagopal, S., and Nguwi, Y.-Y. (2014) Formulating, implementing and evaluating ERP in small and medium scale industries. International Journal of Advances in Computer Science and Technology, 3 (6). pp. 386-389.

Tang, Chun Meng, and Chaw, Lee Yen (2013) Readiness for blended learning: understanding attitude of university students. International Journal of Cyber Society and Education, 6 (2). pp. 79-100.

Chakraborty, Ayon, and Chuan, Tan Kay (2013) An empirical analysis on Six Sigma implementation in service organisations. International Journal of Lean Six Sigma, 4 (2). pp. 141-170.

Phillips, Peter, and Lee, Ickjai (2012) Mining co-distribution patterns for large crime datasets. Expert Systems with Applications, 39 (14). pp. 11556-11563.

Lee, Ickjai, Torpelund-Bruin, Christopher, and Lee, Kyungmi (2012) Map segmentation for geospatial data mining through generalized higher-order Voronoi diagrams with sequential scan algorithms. Expert Systems with Applications, 39 (12). pp. 11135-11148.

Lee, Ickjai, and Torpelund-Bruin, Christopher (2012) Geographic knowledge discovery from Web Map segmentation through generalized Voronoi diagrams. Expert Systems with Applications, 39 (10). pp. 9376-9388.

Chakraborty, Ayon, and Tan, Kay Chuan (2012) Case study analysis of Six Sigma implementation in service organisations. Business Process Management Journal, 18 (6). pp. 992-1019.

Marthandan, Govindan, and Tang, Chun Meng (2012) Mining the literature in search of IT business value. Review of Business Information Systems, 16 (3). pp. 89-102.

Tynan, Elizabeth (2011) Maralinga and the journalists: covering the bomb tests over generations. LiNQ, 38 (Dec). pp. 131-145.

Lee, Ickjai, Torpelund-Bruin, Christopher, and Lee, Kyungmi (2011) Raster voronoi tessellation and its application to emergency modeling. Geo-spatial Information Science, 14 (4). pp. 235-245.

Trevathan, Jarrod, and Read, Wayne (2011) Disarming the bid sniper. Journal of Electronic Commerce Research, 12 (3). pp. 176-186.

Lee, Kyungmi (2011) Feature extraction schemes for ultrasonic non-destructive testing inspections. Advances in Information Sciences and Service Sciences, 3 (3). pp. 125-135.

Hamilton, John (2011) Rating the website: an objective approach. International Journal of Electronic Business, 9 (4). pp. 293-319.

Marsh, Tim (2011) Serious games continuum: between games for purpose and experiential environments for purpose. Journal of Entertainment Computing, 2 (2). pp. 61-68.

Tang, Chun Meng, and Marthandan, Govindan (2011) An analytical model to measure IS-enabled organizational effectiveness. International Journal of Enterprise Information Systems, 7 (2). pp. 50-65.

Nguwi, Yok-Yen, and Cho, Siu-Yeung (2010) An unsupervised self-organizing learning with support vector ranking for imbalanced datasets. Expert Systems and Application, 37 (12). pp. 8303-8312.

Seidl, Isaac A., Johnson, Andrew J., Mantel, Peta, and Aitken, Peter (2010) A strategy for real time improvement (RTI) in communication during the H1N1 emergency response. Australian Health Review, 34 (4). pp. 493-498.

Litow, B. (2010) On sums of roots of unity. Lecture Notes in Computer Science, 6198. pp. 420-425.

Lee, Kyungmi (2010) Exploration on feature extraction schemes and classifiers for shaft testing system. Journal of Computers, 5 (5). pp. 679-686.

Hamilton, John, and Tee, Singwhat (2010) Smart utilization of tertiary instructional modes. Computers & Education, 54 (4). pp. 1036-1053.

Marthandan, Govindan, and Tang, Chun Meng (2010) Information systems evaluation: an ongoing measure. International Journal of Business Information Systems, 6 (3). pp. 336-353.

Marthandan, Govindan, and Tang, Chun Meng (2010) Information technology evaluation: issues and challenges. Journal of Systems and Information Technology, 12 (1). pp. 37-55.

Hamilton, John, and Tee, Singwhat (2010) Teaching and learning: A SEM blended learning systems approach. Higher Education Research and Development (HERD), 29 (6). pp. 1-16. (Unpublished)

Marthandan, Govindan, and Tang, Chun Meng (2010) Thirst for business value of information systems. International Journal of Technology Diffusion, 1 (1). pp. 28-39.

Hamilton, John, and Tee, Singwhat (2010) Websites topology evaluation equation. E-Business Review, X (1). pp. 69-74.

Tan, Kay Chuan, Goudarzlou, Atarod, and Chakrabarty, Ayon (2010) A bibliometric analysis of service research from Asia. Managing Service Quality, 20 (1). pp. 89-101.

Hamilton, John, and Tee, Singwhat (2010) The value-expectations relationship: connecting customer-perceived value with the expectations of pharmacy-offered services. Information and Management, 47. pp. 1-18. (Unpublished)

McCabe, Alan, Trevathan, Jarrod, and Read, Wayne (2008) Neural network-based handwritten signature verification. Journal of Computers, 3 (8). pp. 9-22.

Litow, Bruce, and Konovalov, Dmitry (2008) Phenotype space and kinship assignment for the Simpson index. RAIRO - Theoretical Informatics and Applications, 42 (2). pp. 323-333.

Lemmon, Colin J., and Musumeci, Phillip (2008) Boundary mapping and boundary state routing (BSR) in ad hoc networks. IEEE Transactions on Mobile Computing, 7 (1). pp. 127-139.

Lee, Ickjai, and Phillips, Peter (2008) Urban crime analysis through areal categorized multivariate association mining. Applied Artificial Intelligence, 22 (5). pp. 483-499.

Trevathan, Jarrod, and Read, Wayne (2007) Investigating shill bidding behaviour involving colluding bidders. Journal of Computers, 2 (10). pp. 63-75.

Qiu, Ling, Li, Yingjiu, and Wu, Xintao (2007) Preserving privacy in association rule mining with bloom filters. Journal of Intelligent Information Systems, 29 (3). pp. 253-278.

McCabe, A., and Trevathan, J. (2007) A new approach to avoiding the local extrema trap. ANZIAM Journal, 48. pp. 474-493.

Curiac, Daniel-Ioan, Volosencu, Constantin, Doboli, Alex, Dranga, Octavian, and Bednarz, Tomasz (2007) Discovery of malicious nodes in wireless sensor networks using neural predictors. WSEAS Transactions on Computers Research, 2 (1). pp. 38-43.

Tee, Sing What, Bowen, Paul L., Doyle, Peta, and Rohde, Fiona H. (2007) Factors influencing organizations to improve data quality in their information systems. Accounting and Finance, 47 (2). pp. 335-355.

Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.

Chakrabarty, Ayon, and Tan, Kay Chuan (2007) The current state of six sigma application in services. Managing Service Quality, 17 (2). pp. 194-208.

Lee, Ickjai, and Estivill-Castro, Vladimir (2006) Fast cluster polygonization and its applications in data-rich environments. Geoinformatica, 10 (4). pp. 399-422.

Podger, David, and Canyon, Deon (2006) Printing a tree from a page loaded browse. Clarion Magazine, 8 (11). - .

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

Bednarz, Tomasz, Fornalik, Elzbieta, Tagawa, Toshio, Ozoe, Hiroyuki, and Szmyd, Janusz S. (2006) Convection of paramagnetic fluid in a cube heated and cooled from side walls and placed below a superconducting magnet: comparison between experiment and numerical computations. Thermal Science and Engineering, 14 (4). pp. 107-114.

Konovalov, Dmitry, Bajema, Nigel, and Litow, Bruce (2005) Modified Simpson O(n3) algorithm for the full sibship reconstruction problem. Bioinformatics, 21 (20). pp. 3912-3917.

Gaskett, Chris, Ude, Aleš, and Cheng, Gordon (2005) Hand-eye coordination through endpoint closed-loop and learned endpoint open-loop visual servo control. International Journal of Humanoid Robotics, 2 (2). pp. 203-224.

Trevathan, Jarrod (2005) Security, anonymity and trust in electronic auctions. Crossroads, 11 (3). pp. 3-9.

Simpson, Lindsay (2005) Countering the spin: how journalism education can combat the culture of silence. Australian Studies in Journalism, 15. pp. 119-132.

Pham, Tuan D., Beck, Dominik, and Crane, Denis I. (2005) Fuzzy clustering of stochastic models for molecular phylogenetics. WSEAS Transactions on Biology and Biomedicine, 2 (1). pp. 87-91.

Tran, Dat T., and Pham, Tuan D. (2005) Fuzzy estimation of priors in speaker recognition. WSEAS Transactions on Circuits and Systems, 4 (4). pp. 369-373.

Pham, Tuan D., Beck, Dominik, and Crane, Denis (2005) Hidden Markov models for unaligned DNA sequence comparison. WSEAS Transactions on Biology and Biomedicine, 2 (1). pp. 64-69.

Pham, Tuan D. (2005) Integration of fuzzy and geostatistical models for estimating missing multivariate observations. WSEAS Transactions on Systems, 4 (4). pp. 233-237.

Tran, Dat T., and Pham, Tuan D. (2005) Markov and fuzzy models for written language verification. WSEAS Transactions on Systems, 4 (4). pp. 268-272.

Konovalov, Dmitry A., Litow, Bruce, and Bajema, Nigel (2005) Partition-distance via the assignment problem. Bioinformatics, 21 (10). pp. 2463-2468.

Simpson , Lindsay (2005) The impact of digital technology on journalism education. Australian Studies in Journalism, 14. pp. 114-123.

Litow, B., and Deo, N. (2004) Graph compression and the zeros of polynomials. Information Processing Letters, 92 (1). pp. 39-44.

Estivill-Castro, Vladimir, and Lee, Ickjai (2004) Clustering with obstacles for Geographical Data Mining. ISPRS Journal of Photogrammetry and Remote Sensing, 59 (1-2). pp. 21-34.

Litow, Bruce, Deo, Narsingh, and Cami, Aurel (2004) Compression of vertex transitive graphs. Congressus Numerantium, 167. pp. 161-173.

Lee, Ickjai (2004) Frequency-incorporated interdependency rules mining in spatiotemporal databases. Lecture Notes in Artificial Intelligence, 3213. pp. 196-202.

Holdsworth, Jason (2004) Graph traversal and graph transformation. Theoretical Computer Science, 321 (2). pp. 215-231.

Duan, Mei (2004) Splitting behaviour analysis of steel cladding systems. Key Engineering Materials, 274-276. pp. 151-156.

Duan, Mei, and Loughran, Jeffrey G. (2004) A constitutive modelling analysis for deformation of prepared sugar cane. Key Engineering Materials, 274-276. pp. 271-276.

Litow, B. (2003) A note on commutative multivariate rational series. Information Processing Letters, 87 (6). pp. 283-285.

Jiang, Zhuhan, de Vel, Olivier, and Litow, Bruce (2003) Unification and extension of weighted finite automata applicable to image compression. Theoretical Computer Science, 302 (1-3). pp. 275-294.

Litow, B. (2003) Inequality of finite behaviors of rational weight finite automata is in R. Information Processing Letters, 87 (3). pp. 139-145.

Cokley, John (2002) Editorial technology upgrades at Queensland Newspapers Pty. Ltd., 1985-2002. Australian Journalism Review, 24 (2). pp. 101-115.

Jacob, Mohan V., Mazierska, Janina, Leong, Kenneth, and Krupka, Jerzy (2002) Microwave properties of low-loss polymers at cryogenic temperatures. IEEE Transactions on Microwave Theory and Techniques, 50 (2). pp. 474-480.

Maskell, Douglas L., and Woods, Graham S. (2002) The discrete-time quadrature subsample estimation of delay. IEEE Transactions on Instrumentation and Measurement, 51 (1). pp. 133-137.

Litow, Bruce (2001) Computing a context-free grammar-generating series. Information and Computation, 169 (2). pp. 174-185.

Sutcliffe, Geoff (2000) The CADE-16 ATP system competition. Journal of Automated Reasoning, 24 (3). pp. 371-396.

Litow, B., and Deo, Narsingh (2000) Forbidden pairs combinatorics. Australasian Journal of Combinatorics, 22. pp. 91-99.

Litow, B. (2000) On Hadamard square roots of unity. Theoretical Computer Science, 237 (1-2). pp. 447-454.

Litow, Bruce, and Stephenson, Peter (2000) Why step when you can run? Iterative line digitization algorithms based on hierarchies of runs. IEEE Computer Graphics and Applications, 20 (6). pp. 76-84.

Maskell, Doug L., and Woods, Graham S. (2000) A frequency modulated envelope delay FSCW radar for multiple-target applications. IEEE Transactions on Instrumentation and Measurement, 49 (4). pp. 710-715.

Van Gils, Mark, Jansen, H., Neiminen, K., Summers, R., and Weller, P.R. (1997) Using artificial neural networks for classifying ICU patient states. IEEE Engineering in Medicine and Biology Magazine, 16 (6). pp. 41-47.

Book Chapter

Adams, Austin S., and Foster, Jeremy J. (2013) Finding the right symbol: an annotated bibliography of graphical symbols standards. In: Ng, Annie W.Y., and Chan, Alan H.S. , (eds.) Signs and Symbols for Workplace and Public Use. Business Issues, Competition and Entrepreneurship . Nova Publishers, New York, USA, pp. 1-9.

Ramanujam, Rohit (2012) Competitive Intelligence: the impact of management consulting on service businesses. In: Badri, Toppur N., and Gupta, Jatinder N.D., (eds.) Enhancing Competitiveness using Decision Sciences. Enhancing Competitiveness Using Decision Sciences, 1 . Macmillan Publishers India, New Delhi, India, pp. 283-289.

Trevathan, Jarrod, and Read, Wayne (2009) Detecting shill bidding in online English auctions. In: Gupta, Manish, and Sharman, Raj, (eds.) Handbook of Research on Social and Organizational Liabilities in Information Security. Information Science Reference, Hershey, PA, USA, pp. 446-470.

Trevathan, Jarrod , McCabe, Alan, and Read, Wayne (2008) Bidding agents that perpetrate auction fraud. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunications Networks: communications in computer and information science. Communications in Computer and Information Science, 23 . Springer , Berlin, Germany, pp. 57-71.

Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.

Trevathan, Jarrod, and Read, Wayne (2008) Secure online English auctions. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunication Networks: third international conference, ICETE 2006, Setubal, Portugal, August 2006, selected papers. Communications in Computer and Information Science, 9 . Springer , New York, USA, pp. 113-133.

Report

Babacan, Hurriyet, Dale, Allan, Andrews, Peter, Beazley, Lyn, Horstman, Mark, Campbell, Andrew, Morris, Sheridan, Webb, Brad, Rowlands, Mary, Bowen, Luke, Callin, Rob, George, Melissa, and Miley, Damien (2012) Science engagement and tropical Australia: building a prosperous and sustainable future for the north. Report. Department of Industry, Innovation, Science, Research and Tertiary Education, Kingston, ACT.

Conference Item

Hamilton, John, Liu, Tian Jie Freddy, and Tee, Singwhat (2013) Consumer engagement perspectives at the business social network site. In: Proceedings of the 24th Australasian Conference on Information Systems. From: 24th Australasian Conference on Information Systems, 4-6 December 2013, Melbourne, VIC, Australia.

Hamilton, John R., and Tee, Singwhat (2013) Understanding social network site consumer engagements. In: Proceedings of the 24th Australasian Conference on Information Systems. From: 24th Australasian Conference on Information Systems, 4-6 December 2013, Melbourne, VIC, Australia.

Hamilton, John, and Tee, Singwhat (2013) Social network site value deliverance feedback loops. In: Proceedings of The Thirteen International Conference on Electronic Business, pp. 108-110. From: 13th International Conference on Electronic Business, 1-4 December 2013, Singapore.

Hamilton, John, and Tee, Singwhat (2013) Gauging consumer engagements at the business social network site. In: Proceedings of the17th International Conference on ISO and TQM, pp. 1-7. From: 17th International Conference on ISO and TQM, 23-25 August 2013, Sydney, NSW, Australia.

Hamilton, John, and Tee, Singwhat (2013) The cone of learning: transitioning across learning systems. In: Proceedings of the17th International Conference on ISO and TQM, pp. 1-6. From: 17th International Conference on ISO and TQM, 23-25 August 2013, Sydney, NSW, Australia.

Hamilton, John R., Prideaux, Murray C., and Tee, Singwhat (2013) Linking car racing attendee expectations and values with trust, satisfaction and loyalty outcomes. In: Proceedings of the 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, pp. 875-888. From: 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, 9-13 July 2013, Bali, Indonesia.

Cassidy, Leonie J., and Hamilton, John R. (2013) A comprehensive approach to capturing website quality measures. In: Proceedings of the 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, pp. 280-289. From: 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, 9-13 July 2013, Bali, Indonesia.

Sukresna, I Made, Hamilton, John, and Tee, Singwhat (2013) The impact of market orientation on Indonesian manufacturer-distributor relationships. In: Proceedings of the 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, pp. 783-795. From: 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, 9-13 July 2013, Bali, Indonesia.

Wyatt, Lucy R., Atwater, Dan, Mantovanelli, Allessandra, Prytz, Arnstein, and Rehder, Sven (2013) The Australian Coastal Ocean Radar Network data availability and quality. In: Proceedings of the International Radar Symposium (2), pp. 405-410. From: IRS 2013: International Radar Symposium, 9-21 June 2013, Dresden, Germany.

Weir, Peter, Sandor, Christian, Swoboda, Matt, Nguyen, Thanh, Eck, Ulrich , Reitmayr, Gerhard, and Dey, Arindam (2013) BurnAR: involuntary Heat Sensations in Augmented Reality. In: Proceedings of the IEEE Virtual Reality Conference 2013, pp. 43-46. From: Proceedings of the IEEE Virtual Reality Conference 2013, 16-20 March 2013, Orlando, Florida, USA.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference, pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia.

Corniaux, Christian L.F., and Ghodosi, Hossein (2013) An information-theoretically secure threshold distributed oblivious transfer protocol. In: Lecture Notes in Computer Science (7839), pp. 184-201. From: 15th International Conference on Information Security and Cryptology, 28-30 November 2012, Seoul, Korea.

Dey, Arindam, Jarvis, Graeme, Sandor, Christian, and Reitmayr, Gerhard (2012) Tablet versus phone: depth perception in handheld augmented reality. In: Proceedings of the IEEE International Synposium on Mixed and Augmented Reality (ISMAR), pp. 187-196. From: 2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), 5-8 November 2012, Atlanta, GA, USA.

Hamilton, John, Lemmon, Colin, and Lui, Carrie (2012) Delivering real-time business solutions via multiple digitally gamed engagements under competing dynamic scenarios. In: Proceedings of the 12th Annual Hawaii International Conference On Business, pp. 269-272. From: 12th Annual Hawaii International Conference On Business, 24-27 May 2012, Honolulu, Hawaii.

Ramanujam, Rohit (2012) Management consulting: delivering service value within services businesses. In: UNSPECIFIED (1), pp. 1-26. From: APUGSM 2012 Advancements in Business, Economics and Innovation Management Research, 20-21 January 2012, Beppu, Japan.

Cahya Prihandoko, Antonius, Litow, Bruce, and Ghodosi, Hossein (2012) DRM's rights protection capability: a review. In: Proceedings of the First International Conference on Computational Science and Information Management (ICoCSIM) (1), pp. 12-17. From: 2012 International Conference on Computational Science and Information Management (ICoCSIM), 3-5 December 2012, North Sumatera, Indonesia.

Corniaux, Christian L.F., and Ghodosi, Hossein (2012) T-out-of-n distributed oblivious transfer protocols in non-adaptive and adaptive settings. In: Information Security Practice and Experience Conference (ISPEC) 2012 (7232), pp. 123-143. From: 8th International Conference on Information Security Practice and Experience , 9-12 April, Hangzhou, China.

Hamilton, John, Prideaux, Murray, and Tee, Singwhat (2011) Monitoring customer groups: a sports event satisfaction study. In: Proceedings of the 11th International Conference on Electronic Business, pp. 50-53. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Cassidy, Leonie, and Hamilton, John (2011) Website benchmarking: evaluating scaled and dichotomous approaches. In: Proceedings of the 11th International Conference on Electronic Business, pp. 408-412. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Cassidy, Leonie, and Hamilton, John (2011) Website benchmarking: theoretical and measurement aspects. In: Proceedings of the 11th International Conference on Electronic Business, pp. 413-416. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Hamilton, John, and Tee, Singwhat (2011) The business customer alignment index. In: Proceedings of the 11th International Conference on Electronic Business, pp. 45-49. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Hamilton, John, and Tee, Singwhat (2011) The iPad: a tablet toolkit supporting blended and flexible learning. In: Proceedings of the 11th International Conference on Electronic Business, pp. 93-97. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailnad.

Trevathan, Jarrod, Ghodosi, Hossein, and Myers, Trina (2011) Efficient batch authentication for hierarchical wireless sensor networks. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 217-222. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Marsh, Tim, Xuejin, Chuang, Nickole, Li Zhiqiang, Osterweil, Scot, Klopfer, Eric, and Haas, Jason (2011) Fun and learning: the power of narrative. In: Proceedings of the 6th International Conference on Foundations of Digital Games, pp. 23-29. From: FDG 2011 6th International Conference on Foundations of Digital Games, 28 June - 1 July 2011, Bordeaux, France.

Rana, Rajib, Bergmann, Neil, and Trevathan, Jarrod (2011) Towards plug-and-play functionality in low-cost sensor network. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 265-270. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Kim, Gia, and Lui, Carrie (2011) Visual stress of blinking cues and density of multiple graphs in dual tasks. In: Proceedings of the 7th International Conference on Information Processing and Management, pp. 7-12. From: ICIPM 2011 7th International Conference on Information Processing and Management, 29 November- 1 December 2011, Jeju Island, Korea.

Lee, Yong Jin, Trevathan, Jarrod, Atkinson, Ian, Read, Wayne, Myers, Trina, and Johnstone, Ron (2011) The evolution of the SEMAT sensor network management system. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 229-234. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Lui, Siu Man, and Wendy, Hui (2010) Effects of smiling and gender on trust toward a recommendation agent. In: Proceedings of 2010 International Conference on Cyberworlds, pp. 398-405. From: 2010 International Conference on Cyberworlds, 20-22 October 2010, Singapore.

Trevathan, Jarrod, Atkinson, Ian, Read, Wayne, Johnstone, Ron, Bajema, Nigel, and McGeachin, James (2010) Establishing low cost aquatic monitoring networks for developing countries. In: Proceedings of Wireless Communications and Information Technology in Developing Countries Conference (327), pp. 39-50. From: Wireless Communications and Information Technology in Developing Countries Conference, 20 - 23 September 2010, Brisbane, QLD, Australia.

Trevathan, Jarrod, Atkinson, Ian, Read, Wayne, Johnstone, Ron, Chiffings, Tony, Bajema, Nigel, Lee, Yong Jin, and Scarr, Adam (2010) Overcoming the technical problems associated with effective coastal monitoring systems. In: Papers from Coast to Coast 2010 Actions for Change, p. 55. From: Coast to Coast 2010 Actions for Change, 20 - 24 September 2010, Adelaide, SA, Australia.

Kim, Gia, and Lui, Siu Man (2010) Impacts of multiple color nominal coding on usefulness of graph reading tasks. In: Proceeding of the Fifth International Conference on Computer Sciences and Convergence Information Technology, pp. 457-463. From: ICCIT 2010 5th International Conference on Computer Sciences and Convergence Information Technology, 30 November - 2 December 2010, Seoul, Korea.

Song, Insu, and Diederich, Joachim (2010) Intention extraction from text messages. In: Lecture Notes in Computer Science (6443), pp. 330-337. From: ICONIP 2010 17th International Conference on Neural Information Processing, 22-25 November 2010, Sydney, NSW, Australia.

Kim, Gia (2010) The effect of color combination and attention on usability of graph reading tasks. In: Proceeding of the Fifth International Conference on Computer Sciences and Convergence Information Technology, pp. 464-471. From: ICCIT 2010 5th International Conference on Computer Sciences and Convergence Information Technology, 30 November - 2 December 2010, Seoul, Korea.

Chuan, Tan Kay, Goudarzlou, Atarod, and Chakraborty, Ayon (2009) Bibliometric analysis of service science research: focus on contribution from Asia. In: Proceedings of the International Conference on Industrial Engineering and Engineering Management, pp. 1273-1276. From: 2009 IEEE Conference on International Engineering and Engineering Management, 8–11 December 2009, Hong Kong.

Ghodosi, Hossein, and Pieprzyk, Josef (2009) Multi-Party computation with omnipresent adversary. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (5443), pp. 180-195. From: 12th International Conference on Practice and Theory in Public Key Cryptography, 18 - 20 March 2009, Irvine, CA, USA.

Hardy, Dianna, Morgan, Matthew, Atkinson, Ian, McGinty, Sue, Cadet-James, Yvonne, Hannan, Agnes, and James, Robert (2008) Enabling lightweight video annotation and presentation for cultural heritage. In: Proceedings of eResearch Australasia 2008, pp. 1-9. From: eResearch Australasia 2008, 28 September - 3 October 2008 , Melbourne, VIC. Australia.

Chakraborty, A., and Tan, K.C. (2008) Case study analysis of Six Sigma in Singapore service organizations. In: Proceedings of the International Conference on Service Systems and Service Management , pp. 128-133. From: Fifth International Conference on Service Systems and Service Management , 30 June – 2 July 2008, Melbourne, Australia.

McCabe, Alan, and Trevathan, Jarrod (2008) Artificial Intelligence in sports prediction. In: Proceedings of the 5th International Conference on Information Technology, pp. 1194-1197. From: 5th International Conference on Information Technology: New Generations, 7-9 April 2008, Las Vegas, USA.

Trevathan, Jarrod, and Read, Wayne (2008) Cryptographic online auction schemes. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008, pp. 193-203. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

Bidwell, Nicola, Ladeira, Ilda, and Sigaji, Xolile (2008) Digital storytelling design learning from non-digital narratives: two case studies in South Africa. In: Proceedings of the Annual National Oral History Association of South Africa Conference (5). From: 5th Annual National Oral History Association of South Africa Conference, 7-10 October 2008, South Africa.

Torpelund-Bruin, Christopher, and Lee, Ickjai (2008) Generalized Voronoi diagrams with obstacles for use in geospatial market analysis and strategy decisions. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application, pp. 287-290. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December, 2008, Shanghai, China.

Torpelund-Bruin, Christopher, and Lee, Ickjai (2008) Geographic knowledge discovery from geo-referenced Web 2.0. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (3), pp. 291-294. From: 2008 International Workshop on Geoscience and Remote Sensing, 21 - 22 December 2008, Shanghai, China.

Lee, Ickjai, and Breitkreutz, David J. (2008) Hybrid voronoi areal representation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (2), pp. 299-302. From: 2008 International Workshop on Geoscience and Remote Sensing, 21 - 22 December 2008, Shanghai, China.

McCabe, Alan, and Trevathan, Jarrod (2008) Markov model-based handwritten signature verification. In: Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (2), pp. 173-179. From: 5th International Conference on Embedded and Ubiquitous Computing, 17-20 December 2008, Shanghai, China.

Lee, Ickjai, and Torpelund-Bruin, Christopher (2008) Multiplicatively-Weighted Order-k Minkowski-metric Voronoi Models for disaster decision support systems. In: Proceedings of 2008 ISI 2008 International Conference, pp. 236-238. From: 2008 International Workshop on Geoscience and Remote Sensing, 17-20 June 2008, Taipei, Taiwan.

Phillips, Peter, and Lee, Ickjai (2008) Multivariate areal aggregated crime analysis through cross correlation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application, pp. 1-4. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December, 2008, Shanghai, China.

McCabe, Alan, and Trevathan, Jarrod (2008) Performance evaluation of handwritten signature verification techniques. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008, pp. 151-160. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

Lee, Ickjai, Torpelund-Bruin, Christopher J., and Lee, Kyungmi (2008) Raster image districting and its application to geoinformation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (2), pp. 303-307. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December 2008, Shanghai, China.

Chakraborty, A., and Tan, K.C. (2007) A survey on Six Sigma implementation in Singapore service industries. In: Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, pp. 1428-1432. From: 2007 IEEE International Conference on Industrial Engineering and Engineering Management, 2-5 December 2007, Singapore.

Hardy, Dianna, Bidwell, Nicola, Cadet-James, Yvonne, and Atkinson, Ian (2007) Domesticating design by a disenfranchised community. In: Proceedings of the International Workshop on Social Interaction and Mundane Technologies, pp. 1-4. From: SIMTech Workshop 2008 International Workshop on Social Interaction and Mundane Technologies, 26-27 November 2007, Melbourne, VIC, Australia.

Trevathan, Jarrod, and Read, Wayne (2007) An adaptive shill bidding agent. In: Proceedings of the International Conference on e-Business 2007 (1), pp. 5-14. From: International Conference on E- Business 2007, 28-31 July 2007, Barcelona, Spain.

Curiac, Daniel-Ioan, Banias, Ovidiu, Dragan, Florin, Volosencu, Constantin, and Dranga, Octavian (2007) Malicious node detection in wireless sensor networks using an autoregression technique. In: Proceedings of the Third International Conference on Networking and Services 2007. From: Third International Conference on Networking and Services ICNS 2007, 19-25 June 2007, Athens, Greece.

Curiac, Daniel, Volosencu, Constantin, Doboli, Alex, Dranga, Octavian, and Bednarz, Tomasz (2007) Neural network based approach for malicious node detection in wireless sensor networks. In: Proceedings of the WSEAS International Conference on Circuits, Systems, Signal and Telecommunications, pp. 8-13. From: 2007 WSEAS International Conference on Circuits, Systems, Signal and Telecommunications, 17-19 January 2007, Gold Coast, QLD, Australia..

Phillips, Peter, and Lee, Ickjai (2007) Areal aggregated crime reasoning through density tracing. In: Proceedings ICDM Workshops 2007 - Seventh IEEE International Conference on Data Mining - Workshops, pp. 649-654. From: Seventh IEEE International Conference on Data Minining, 28-31 October 2007, Omaha, Nebraska, USA.

Curiac, Daniel-Ioan, Iercan, Daniel, Dranga, Octavian, Dragan, Florin, and Banias, Ovidiu (2007) Chaos-based cryptography: end of the road? In: Proceedings of International Conference on Emerging Security Information, Systems and Technologies, pp. 71-76. From: SECURWARE 2007 International Conference on Emerging Security Information, Systems and Technologies, 14-20 October 2007, Valencia, Spain.

Lemmon, Colin, and Musumeci, Phillip (2007) Cooperative behaviour of location aware nodes in ad-hoc networks. In: Proceedings of Inaugural IEE-IES International Digital Ecosystems and Technologies Conference, pp. 512-515. From: Inaugural IEE-IES International Digital Ecosystems and Technologies Conference, 21-23 February 2007, Cairns, Australia.

Trevathan, Jarrod, and Read, Wayne (2007) Detecting collusive shill bidding. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 799-808. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Lee, Ickjai, Pershouse, Reece, and Lee, Kyungmi (2007) Geospatial cluster tessellation through the complete order-k Voronoi diagrams. In: Lecture Notes in Computer Science (Proceedings of the Conference on Spatial Information Theory 2007) (4736), pp. 321-336. From: Conference on Spatial Information Theory 2007, 19-23 September 2007, Melbourne, Victoria, Australia.

Lee, Ickjai, and Lee, Kyungmi (2007) Higher order Voronoi diagrams for concept boundaries and tessellations. In: Proceedings of 6th IEEE/ACIS International Conference on Computer and Information Science, pp. 513-518. From: ICES 2007 6th IEEE/ACIS International Conference on Computer and Information Science, 11-13 July 2007, Melbourne, Australia.

Lee, Ickjai, and Lee, Kyungmi (2007) Higher order Voronoi diagrams for disaster and emergency management. In: Proceedings of the ISSNIP/ISPRS Joint International Workshop on Distributed Geoinformatics and Sensing, Ubiquity, and Mobility. From: ISSNIP/ISPRS Joint International Workshop on Distributed Geoinformatics and Sensing, Ubiquity and Mobility, 19 September 2007, Melbourne, VIC, Australia.

Yang, Jianhua, and Lee, Ickjai (2007) Hybrid clustering for large sequential data. In: Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition 2007, pp. 76-81. From: AIPR-07 - International Conference on Artificial Intelligence and Pattern Recognition, 9-12 July 2007, Orlando, Florida, USA.

McCabe, Alan, and Trevathan, Jarrod (2007) Implementation and analysis of a handwritten signature verification technique. In: Proceedings of the Second International Conference on Security and Cryptography (3), pp. 48-58. From: Secrypt 2007 International Conference on Security and Cryptography, 28-31 July 2007, Barcelona, Spain.

Pieprzyk, Josef, Ghodosi, Hossein, and Dawson, Ed (2007) Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007,. In: Proceedings of 12th Australasian Conference, ACISP 2007 (4586), pp. 1-11. From: 12th Australasian Conference, ACISP 2007, 2 - 4 July, 2007, Townsville, QLD, Australia.

Huddlestone-Holmes, Cameron, Gigan, Gilles, Woods, Graham, Ruxton, Adam, Atkinson, Ian, and Kininmonth, Stuart (2007) Infrastructure for a sensor network on Davies Reef, Great Barrier Reef. In: Proceedings of the 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference, pp. 675-679. From: 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 3-6 December 2007, Melbourne, Australia.

Volosencu, Constantin, Curiac, Daniel-Ioan, Banias, Ovidiu, Doboli, Alex, and Dranga, Octavian (2007) Knowledge based system for reliable perimeter protection using sensor networks. In: Proceedings of the International Joint Conference on e-Business and Telecommunications 2007, pp. 51-56. From: WINYS 2007 - International Joint Conference on e-Business and Telecommunications, 28-31 July 2007, Barcelona, Spain.

Volosencu, Constantin, Curiac, Daniel-Ioan, Doboli, Alex, and Dranga, Octavian (2007) Malicious node detection in sensor network using autoregression based on neural network. In: Proceedings of the Management and Control of Production and Logistics 4th IFAC Conference, pp. 571-577. From: Fourth International Conference on Management and Control of Production and Logistics, 27-30 September 2007, Sibiu, Romania.

McCabe, Alan, and Trevathan, Jarrod (2007) Pre-processing of on-line signals in noisy environments. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 933-936. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Trevathan, J., and Read, W. (2007) Privacy and security concerns for online share trading. In: Proceedings of the IASK International Conference: E-Activity and Leading Technologies, pp. 239-246. From: IASK International Conference: E-Activity and Leading Technologies 2007, 3-6 December 2007, Porto, Portugal.

Gigan, Gilles, and Atkinson, Ian (2007) Sensor abstraction layer: a unique software interface to effectively manage sensor networks. In: Proceedings of the 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference, pp. 479-484. From: 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 3-6 December 2007, Melbourne, Australia.

Turner, J., and Bidwell, Nicola J. (2007) Through the looking glass: game worlds as representations and views from elsewhere. In: Proceedings of the Fourth Australasian Conference on Interactive Entertainment. From: Fourth Australasian Conference on Interactive Entertainment (IE 2007), 3-5 DEC 2007, Melbourne, VIC, Australia.

Lee, Ickjai, Pershouse, Reece, Phillips, Peter, and Christensen, Chris (2007) What-if emergency management system: a generalized Vironoi diagram approach. In: Lecture Notes in Computer Science (Proceedings of the Pacific Asia Workshop PAISI 2007) (4430), pp. 58-69. From: Intelligence & Security Informatics - Pacific Asia Workshop PAISI 2007, 11-12 April 2007, Chengdu, China.

Lui, Carrie Siu Man Lui, and Hui, Wendy (2007) A comparative study of web content accessibility of public and private organizations in Australia. In: Proceedings of the 8th IBIMA Conference on Information Management in the Networked Economy, pp. 574-582. From: 8th IBIMA Conference on Information Management in the Networked Economy, 20-22 June 2007, Dublin, Ireland.

Lee, Ickjai, and Portier, Bayani (2007) An empirical study of knowledge representation and learning within conceptual spaces for intelligent agents. In: Proceedings of 6th IEEE/ACIS International Conference on Computer and Information Science, pp. 463-468. From: ICES 2007 6th IEEE/ACIS International Conference on Computer and Information Science, 11-13 July 2007, Melbourne, Australia.

Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Trevathan, Jarrod, and Read, Wayne (2007) A simple shill bidding agent. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4), pp. 766-771. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Trevathan, Jarrod, and Read, Wayne (2007) A software architecture for Continuous Double Auctions. In: Proceedings of IADIS International Conference: Applied Computing 2007, pp. 328-338. From: IADIS International Conference: Applied Computing 2007, 18-20 February 2007, Salamanca, Spain.

Qiu, Ling, Ong, Kok-Leong, and Lui, Carrie (2006) Safely delegating data mining tasks. In: Proceedings of the 5th Australasian Data Mining Conference (61), pp. 1-7. From: Fifth Australasian Data Mining Conference (AusDM2006), 29-30 November 2006, Sydney, NSW, Australia.

Chakraborty, Ayon, and Tan, Kay Chuan (2006) The extent of Six Sigma methodologies usage in services. In: Proceedings of the International Association for the Management of Technology (IAMOT) EuroMOT Conference, pp. 1-8. From: International Association for the Management of Technology (IAMOT) EuroMOT Conference 2006, 10 – 12 September 2006, Birmingham, UK. (Unpublished)

Chakraborty, A., and Tan, K.C. (2006) Applying Six-Sigma in the service industry: a review and case study in call center services. In: Proceedings of the IEEE International Conference on Management of Innovation and Technology (2), pp. 728-732. From: 2006 IEEE International Conference on Management of Innovation and Technology, 21-23 June 2006, Singapore.

Tee, Sing What, Bowen, Paul L., Doyle, Peta, and Rohde, Fiona H. (2006) Data quality initiatives - striving for continuous improvements. In: Proceedings of the 1st Australasian Workshop on Information Quality, pp. 1-10. From: AusIQ 2006: 1st Australasian Workshop on Information Quality, 22-23 June 2006, Adelaide, SA, Australia.

Willis, Simon, and Kikkert, Cornelius J. (2006) Design of a long-range wireless sensor node. In: Proceedings of the 2006 IEEE Asia Pacific Conference on Circuits and Systems, pp. 151-154. From: 2006 IEEE Asia Pacific Conference on Circuits and Systems, 4-7 December 2006, Singapore.

Ku, Kim (2006) Enhance the Baldwin effect by strengthening the correlation between genetic operators and learning methods. In: Proceedings of IEEE Congress on Evolutionary Computation 2006, pp. 3302-3308. From: CEC 2006 IEEE Congress on Evolutionary Computation 2006, 16-21 July 2006, Vancouver, BC, Canada.

Lemmon, Colin (2006) Experimental design, modeling and testing of geographic routing protocols. In: Proceedings of SimTecT 2006 Conference . From: SimTecT 2006 Simulation Conference: challenges and opportunities for a complex and networked world, 29 May - 1 June 2006, Melbourne, VIC, Australia.

Ude, Ales, Gaskett, Chris, and Cheng, Gordon (2006) Foveated vision systems with two cameras per eye. In: Proceedings of IEEE International Conference on Robotics and Automation 2006, pp. 3457-3462. From: ICRA 2006 IEEE International Conference on Robotics and Automation, 15-19 May 2006, Orlando, FL, USA.

Yang, Jianhua, and Lee, Ickjai (2006) Hybrid O(n√n) clustering for sequential web usage mining. In: AI 2006: Advances in Artificial Intelligence (4304), pp. 1022-1026. From: 19th Australian Joint Conference on Artificial Intelligence, 4-8 December 2006, Hobart, TAS, Australia.

Phillips, Peter, and Lee, Ickjai (2006) Mining positive associations of urban criminal activities using hierarchical crime hot spots. In: Proceedings of the Intelligence and Security Informatics International Workshop, WISI 2006 (3917), pp. 127-132. From: WISI 2006 Intelligence and Security Informatics International Workshop, 9 April 2006, Singapore.

Lee, Ickjai, and Ghodosi, Hossein (2006) Privacy and security enhanced offline oblivious transfer for massive data distribution. In: Proceedings of the Intelligence and Security Informatics: International Workshop, WISI 2006 (3917), pp. 159-160. From: WISI 2006 International Workshop, 9 April 2006, Singapore.

Trevathan, Jarrod, and Read, Wayne (2006) Randomised dynamic traitor tracing. In: Proceedings of the International Conference on Signal Processing and Multimedia Applications, pp. 323-331. From: SIGMAP 2006 International Conference on Signal Processing and Multimedia Applications, 7-10 August 2006, Setubal, Portugal.

Trevathan, Jarrod, and Read, Wayne (2006) Undesirable and fraudulent behaviour in online auctions. In: Proceedings of the International Conference on Security and Cryptography Secrypt 2006, pp. 450-458. From: Secrypt 2006 International Conference on Security and Cryptography, 7-10 August 2006, Setubal, Portugal.

Trevathan, Jarrod, Ghodosi, Hossien, and Read, Wayne (2006) An anonymous and secure continuous double auction scheme. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences. From: 39th Annual Hawaii International Conference on System Sciences, 4-7 January 2006, Kauai, Hawaii.

Qiu, Ling, Li, Yingjiu, and Wu, Xintao (2006) An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy. In: Proceedings of Sixth IEEE International Conference on Data Mining - Workshops, pp. 551-558. From: ICDMW'06 Sixth IEEE International Conference on Data Mining - Workshops, 18-22 December 2006, Hong Kong.

Ghodosi, Hossein (2006) An efficient public key cryptosystem secure against chosen ciphertext attack. In: Proceedings of the Second International Conference on Information Systems Security (4332), pp. 303-314. From: ICISS 2006 Second International Conference on Information Systems Security, 19-21 December 2006, Kolkata, India.

Ghodosi, Hossein, and Pieprzyk, Josef (2006) An ideal and robust threshold RSA. In: Proceedings of Progress in Cryptology - VIETCRYPT 2006 (4341), pp. 312-321. From: VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, 25-28 September 2006, Hanoi, Vietnam.

Guy, Ben, Bidwell, Nicola J., and Musumeci, Phillip (2005) GamePlan TM : serious gaming for place making. In: Proceedings of the Second Australasian Conference on Interactive Entertainment 2005 . From: Second Australasian Conference on Interactive Entertainment 2005, 23-25 November 2005, Sydney, NSW, Australia.

Bidwell, Nicola J., Poyner, Daryl, Irving, Jeremy, Putna, Levi, and Wold, Are (2005) "Make it through with another point of view": landmarks to wayfind in gameworld. In: Proceedings of the Second Australasian Conference on Interactive Entertainment 2005, pp. 19-26. From: Second Australasian Conference on Interactive Entertainment 2005, 23 - 25 November 2005, Sydney, NSW, Australia.

Trevathan, Jarrod, and McCabe, Alan (2005) Remote handwritten signature authentication. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I), pp. 335-339. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Bidwell, Nicola J., Axup, Jeff, and Viller, Stephen (2005) Usability of a mobile, group communication prototype while rendezvousing. In: Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, pp. 24-31. From: 2005 International Symposium on Collaborative Technologies and Systems, 15 - 20 May 2005, Saint Louis, Missouri, USA.

Tran, Dat, and Pham, Tuan (2005) Cell phase classification using Markov and Gaussian mixture models. In: Proceedings of the 2005 Asia-Pacific Workshop on Visual Information Processing, pp. 48-52. From: 2005 Asia Pacific Workshop on Visual Information Processing, 11-13 December 2005, Kowloon, Hong Kong .

Tran, Dat, Pham, Tuan, and Zhou, Xiaobo (2005) Cell phase identification using fuzzy Gaussian mixture models. In: Proceedings of the 2005 International Symposium on Intelligent Signal Processing and Communication Systems , pp. 465-468. From: 2005 International Symposium on Intelligent Signal Processing and Communication Systems, 13 - 16 December 2005, Hong Kong.

Bidwell, Nicola J., and Graham, Connor (2005) Daisy-chaining & berry-picking: trajectories in "planned" & situated wayfinding. In: Proceedings of the INTERACT 2005 Conference. From: INTERACT 2005, 12-16 September 2005, Rome, Italy.

Lee, Ickjai (2005) Data mining coupled conceptual spaces for intelligent agents in data-rich environments. In: Proceedings of the 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005 (3684), pp. 42-48. From: 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005, 14-16 September 2005, Melbourne, VIC, Australia.

Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2005) Design issues for electronic auctions. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I), pp. 340-347. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Li, Ming, Chi, Nguyen, and Hoang, Doan (2005) Edge-aware resource discovery and price-based admission control over differentiated service networks. In: Proceedings of the First International Workshop on Network Architecture and Service Models, pp. 111-117. From: NASM 2005 First International Workshop on Network Architecture and Service Models, 22-24 November 2005, Shanghai, China.

Lee, Ickjai (2005) Geospatial clustering in data-rich environments: features and issues. In: Proceedings of the 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005 (3684), pp. 336-342. From: 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005, 14-16 September 2005, Melbourne, VIC, Australia.

Lee, Ickjai, and Yang, Jianhua (2005) Hybrid agglomerative clustering for large databases: an efficient interactivity approach. In: Proceedings of the 18th Australian Joint Conference on Artifical Intelligence (3809), pp. 938-941. From: 18th Australian Joint Conference on Artifical Intelligence, 5-9 December 2005, Sydney, NSW.

Pham, Tuan D., Tran, Dat T., Brown, Marianne, and Kennedy, R. Lee (2005) Image segmentation of retinal vessels by fuzzy models. In: Proceedings of the 2005 International Symposium on Intelligent Signal Processing and Communication Systems, pp. 541-544. From: 2005 International Symposium on Intelligent Signal Processing and Communication Systems, 13 - 16 December 2005, Hong Kong.

Bidwell, Nicola J., and Browning, David (2005) Probing trajectories in wayfinding wild places. In: The Appropriate Methods for Design in Complex and Sensitive Settings Workshop in conjunction with OzCHI 2005. From: Appropriate Methods for Design in Complex and Sensitive Settings Workshop in conjunction with OzCHI 2005, 21-25 November 2005, Canberra, ACT, Australia.

Lee, Ickjai (2005) Representing properties in conceptual spaces towards effective learning within intelligent agents. In: Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation 2005 (2). From: International Conference on Computational Intelligence for Modelling, Control and Automation 2005, 28-30 November 2005, Vienna, Austria.

Pham, Tuan D., and Crane, Denis I. (2005) Segmentation of neuronal-cell images from stained fields and monomodal histograms. In: Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine & Biology Society 2005 (6), pp. 6289-6292. From: 27th Annual International Conference of the IEEE Engineering in Medicine & Biology Society 2005, 1-4 September 2005, Shanghai, China.

Lueg, Christopher, and Bidwell, Nicola (2005) Smart guiding: egocentric way-finding information for attracting and guiding tourists. In: Proceedings of the 15th International Research Convention of the Council for Australian University Tourism and Hospitality Education. From: 15th International Research Convention of the Council for Australian University Tourism and Hospitality Education, 1 - 5 February 2005, Alice Springs, NT, Australia.

Lee, Ickjai, and Yang, Jianhua (2005) Voronoi-based topological information for combining partitioning and hierarchical clustering. In: Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation 2005 (2). From: International Conference on Computational Intelligence for Modelling Control & Automation 2005, 28-30 November 2005, Vienna, Austria.

Pham, Tuan D., Tran, Dat T. , Zhou, Xiaobo., and Wong, Stephen T.C. (2005) An automated procedure for cell-phase imaging identification. In: Proceedings of the 18th Australian Joint Conference on Artificial Intelligence, pp. 52-59. From: 18th Australian Joint Conference on Artificial Intelligence, 5-9 December 2005, Sydney, NSW, Australia.

Pham, Tuan D., and Byung-Sub, Shim (2005) A cepstral distortion measure for protein comparison and identification. In: Proceedings of the 2005 International Conference on Machine Learning and Cybernetics (9), pp. 5609-5614. From: 2005 International Conference on Machine Learning and Cybernetics , 18-21 August 2005, Guangzhou, China.

Pham, Tuan D. (2005) An optimally weighted fuzzy k-nn algorithm. In: Proceedings of the 3rd International Conference on Advances in Pattern Recognition 2005 (3686), pp. 239-247. From: 3rd International Conference on Advances in Pattern Recognition 2005, 22-25 August 2005, Bath, United Kingdom.

Bidwell, Nicola J., Lueg, Christopher, and Axup, Jeff (2005) The territory is the map: designing navigational aids. In: Proceedings of the 6th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction, pp. 91-100. From: 6th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction, 07 - 08 July 2005, Auckland, New Zealand.

Yang, Jianjua, and Lee, Ickjai (2004) Cluster validity through graph-based boundary analysis. In: Proceedings of the 2004 International Conference on Information and Knowledge Engineering. From: 2004 International Conference on Information and Knowledge Engineering, 21-24 June 2004, Nevada, USA.

Lee, Ickjai (2004) Efficient management of concepts and properties in conceptual spaces using data mining techniques. In: Proceedings of International Conference on Computational Intelligence for Modelling Control & Automation 2004, pp. 492-499. From: International Conference on Computational Intelligence for Modelling Control & Automation 2004, 12-14 July 2004, Gold Coast, QLD, Australia.

Lee, Ickjai (2004) Hybrid soft categorisation in conceptual spaces. In: Proceedings of Fourth International Conference on Hybrid Intelligent Systems, pp. 74-79. From: Fourth International Conference on Hybrid Intelligent Systems, 5 - 8 December 2004, Kitakyushu, Japan.

Ghodosi, Hossein, and Pieprzyk, Josef (2004) A modification to the authentication of Concast Communication. In: Proceedings of the Conference Cryptographic Algorithms and their Uses. From: Cryptopgraphic Algorithms and their Uses: CAU2004, 5-6 July 2004, Surfers Paradise, QLD, Australia.

Lee, Kyungmi, and Estivill-Castro, Vladimir (2003) Classification of ultrasonic shaft inspection data using discrete wavelet transform. In: Proceedings of the (AIA 2003) Artificial Intelligence and Applications Conference, pp. 673-678. From: (AIA 2003) Artificial Intelligence and Applications Conferences, 8-10 September, 2003, Benalmádena, Spain.

Lee, Kyungmi, and Estivill-Castro, Vladimir (2003) Feature extraction techniques for ultrasonic shaft signal classification. In: Proceedings of Third International Conference on Hybrid Intelligent System (HIS 2003) Frontiers in Artificial Intelligence and Applications (104), pp. 479-488. From: Third International Conference on Hybrid Intelligent System (HIS 2003), 14-17 December 2003, Melbourne, VIC, Australia.

Hamilton, John, and Selen, Willem (2002) Integrating web site design features for 'one-on-one' marketing: a QFD framework. In: Change Management : proceedings of the 7th International Conference on ISO 9000 and TQM, pp. 93-94. From: 7th International Conference on ISO 9000 and TQM, 2-4 April 2002, Melbourne, VIC.

Hamilton, John R. (2002) 4th generation innovation approach to IT education: integration of supply chain, knowledge management and business intelligence with the learning organization. In: Proceedings of the 2nd Annual Hawaii International Conference on Business, pp. 1-12. From: Hawaii International Conference on Business, 7-10 January 2002, Honolulu, Hawaii.

Ghodosi, H., and Pieprzyk, J. (2000) Cheating Prevention in Secret Sharing. In: Lecture Notes in Computer Science (1841), pp. 328-341. From: 5th Australasian Conference ACISP 2000, 10 - 12 July 2000, Brisbane, Qld.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite, pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-5 December 2013, Yogyakarta, Indonesia. (In Press)

Book

Trevathan, Jarrod, and Read, Wayne (2008) Shilled: fraud and security in online auctions. VDM Verlag Dr. Muller, Saarbrucken, Germany, pp. 1-168.

Thesis

Eddy, (2006) GIS in disaster management: a case study of tsunami risk mapping in Bali, Indonesia. Masters (Research) thesis, James Cook University.

This list was generated on Sun Jul 13 19:27:59 2014 EST.