Browse by ANZSRC Socio-Economic Objective codes

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | F | G | H | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items at this level: 88.

A

Andrews, T.D., Whittle, B., Field, M.A., Balakishnan, B., Zhang, Y., Shao, Y., Cho, V., Kirk, M., Singh, M., Xia, Y., Hager, J., Winslade, S., Sjollema, G., Beutler, B., Enders, A., and Goodnow, C.C. (2012) Massively parallel sequencing of the mouse exome to accurately identify rare, induced mutations: an immediate source for thousands of new mouse models. Open Biology, 2 (5). 120061. pp. 1-16.

Alison, Justine, Croker, Felicity, White, Barbara, Stillman, Gloria, and Glaister, Sandra (1999) Medication Administration: interactive multimedia package for nurses. James Cook University, School of Nursing Sciences, Townsville, QLD, Australia.

B

Bermingham, Luke, and Lee, Ickjai (2019) Mining place-matching patterns from spatio-temporal trajectories using complex real-world places. Expert Systems with Applications, 122. pp. 334-350.

Bermingham, Luke, and Lee, Ickjai (2018) A probabilistic stop and move classifier for noisy GPS trajectories. Data Mining and Knowledge Discovery, 32 (6). pp. 1634-1662.

Brown, Simon, Blackwell, Leonard F., and Cooke, Delwyn G. (2017) Online fertility monitoring: some of the issues. International Journal of Open Information Technology, 5 (4). pp. 85-91.

Bajema, Nigel B., Trevathan, Jarrod, Bergmann, Niel W., Atkinson, Ian, Read, Wayne, Scarr, Adam, Lee, Yong Jin, and Johnstone, Ron (2011) Benefits of building wireless sensor networks on commodity hardware and software stacks. In: Proceedings of 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing. pp. 282-287. From: ISSNIP 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, SA, Australia.

Balingit, Rodel, Trevathan, Jarrod, and Read, Wayne (2009) Analysing bidding trends in online auctions. In: Proceedings of the 2009 Sixth International Conference on Information Technology: new generations. pp. 928-933. From: Sixth International Conference on Information Technology: new generations, 27-29 April 2009, Las Vegas, Nevada, USA.

Balingit, Rodel, Trevathan, Jarrod, Lee, Yong Jin, and Read, Wayne (2009) An application tool for collecting real auction data. In: Proceedings of the 2009 International Conference on Computer Engineering and Applications. pp. 5-11. From: 2009 International Conference on Computer Engineering and Applications , 6-8 June 2009, Manila, Philippines.

Balingit, Rodel, Trevathan, Jarrod, Yong, Jin Lee, and Read, Wayne (2009) A software tool for collecting data from online auctions. In: Proceedings of the Sixth International Conference on Information Technology. pp. 922-927. From: Sixth International Conference on Information Technology, 27-29 April 2009, Nevada, USA.

Breitkreutz, David, and Casey, Kate (2008) Clusterers: a comparison of partitioning and density-based algorithms and a discussion of optimisations. Report. UNSPECIFIED, Townsville, Australia. (Unpublished)

Bidwell, Nicola, Lemmon, Colin, Roturu, Mihai, and Lueg, Christopher (2007) Exploring terra incognita: wayfinding devices for games. In: Proceedings of the 4th Australasian Conference on Interactive Entertainment. pp. 1-8. From: 4th Australasian Conference on Interactive Entertainment, 3-5 December 2007, Melbourne, Australia.

C

Cai, Guochen, Lee, Kyungmi, and Lee, Ickjai (2018) Itinerary recommender system with semantic trajectory pattern mining from geo-tagged photos. Expert Systems with Applications, 94. pp. 32-40.

Cai, Guochen, Lee, Kyungmi, and Lee, Ickjai (2018) Mining mobility patterns from geotagged photos through semantic trajectory clustering. Cybernetics and Systems, 49 (4). pp. 234-256.

Cai, Guochen, Lee, Kyungmi, and Lee, Ickjai (2018) Mining semantic trajectory patterns from geo-tagged data. Journal of computer science and technology, 33 (4). pp. 849-862.

Cao, Jiannong, Chawla, Shailey, Wang, Yuqi, and Wu, Hanqing (2017) Programming platforms for big data analysis. In: Zomaya, Albert Y., and Sakr, Sherif, (eds.) Handbook of Big Data Technologies. Springer, Cham, Switzerland, pp. 65-99.

Chawla, Shailey, Srivastava, Sangeeta, and Bedi, Punam (2015) Improving the quality of web applications with web specific goal driven requirements engineering. International Journal of System Assurance Engineering and Management, 8 (Supplement 1). pp. 65-77.

Chawla, Shailey, Srivastava, Sangeeta, and Bedi, Punam (2014) Evaluation of web-specific goal oriented requirements language models with quantitative reasoning. Software Engineering Notes, 39 (2).

Chawla, Shailey, Srivastava, Sangeeta, and Malhotra, Deepak (2014) Goal based requirements analysis using WebURN. International Journal of Computer Information Systems and Industrial Management Applications, 6. pp. 248-256.

Chawla, Shailey, and Srivastava, Sangeeta (2012) A goal based methodology for web specific requirements engineering. In: Proceedings of the 2012 World Congress on Information and Communication Technologies. pp. 173-178. From: 2012 World Congress on Information and Communication Technologies, 30 October - 2 November 2012, Trivandrum, India.

Chawla, Shailey, and Srivastava, Sangeeta (2012) A requirements analysis approach for web engineering. In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (117) pp. 154-159. From: SPIT 2012: 2nd International Joint Conference on Advances in Information Technology and Communication, 20-21 September 2012, Dubai, United Arab Emirates.

Chawla, Shailey, and Srivastava, Sangeeta (2011) GOREWEB framework for goal oriented requirements engineering of web applications. In: Communications in Computer and Information Sciencce (168) pp. 229-241. From: IC3 2011: 4th International Conference on Contemporary Computing, 8-10 August 2011, Noida, India.

Cantacessi, Cinzia, Jex, Aaron R., Hall, Ross S., Young, Neil D., Campbell, Bronwyn E., Joachim, Anja, Nolan, Matthew J., Abubucker, Sahar, Sternberg, Paul W., Ranganatha, Shoba, Mitreva , Makedonka, and Gasser, Robin B. (2010) A practical, bioinformatic workflow system for large datasets generated by next-generation sequencing. Nucleic Acids Research, 38 (17). e171. pp. 1-12.

D

Diederich, Joachim, and Dillon, Denise (2009) Sentiment recognition by rule extraction from support vector machines. In: Proceedings of the Annual International Conference on Computer Games, Multimedia and Allied Technologies. pp. 75-82. From: CGAT 2009: Annual International Conference on Computer Games, Multimedia and Allied Technologies, 11-12 May 2009, Singapore.

F

Field, Matthew A., Cho, Vicky, Andrews, T. Daniel, and Goodnow, Chris C. (2015) Reliably detecting clinically important variants requires both combined variant calls and optimized filtering strategies. PLoS ONE, 10 (11). e0143199. pp. 1-19.

Field, Matthew A., Cho, Vicky, Cook, Matthew C., Enders, Anselm, Vinuesa, Carola G., Whittle, Belinda, Andrews, T. Daniel, and Goodnow, Chris C. (2015) Reducing the search space for causal genetic variants with VASP. Bioinformatics, 31 (14). pp. 2377-2379.

G

Gesing, S., Wilkins-Diehr, N., Barker, Michelle, and Pierantoni, G. (2016) Science gateway workshops 2015 special issue conference publications. Journal of Grid Computing, 14 (4). pp. 495-498.

H

Holdsworth, Jason, and Lui, Siu Man (2011) Student behaviors and evaluations of collaborative learning game. In: Proceedings of ECGBL 2011 5th European Conference on Games Based Learning. pp. 268-274. From: ECGBL 2011: 5th European Conference on Games Based Learning, 20 - 21 October 2011, Athens, Greece.

K

Konovalov, Dmitry A., Hillcoat, Suzanne, Williams, Genevieve, Birtles, R. Alastair, Gardiner, Naomi, and Curnock, Matthew I. (2018) Individual minke whale recognition using deep learning convolutional neural networks. Journal of Geoscience and Environment Protection, 6 (5). 84616. pp. 25-36.

Kouzani, Abbas Z., Adams, Scott, Oliver, Russell, Nguwi, Yok Yen, Hemsley, Bronwyn, and Balandin, Susan (2016) 3D printing of a pavlova. In: Proceedings of TENCON 2016: 2016 international IEEE region 10 conference. pp. 2283-2287. From: TENCON 2016: 2016 international IEEE region 10 conference, 22-25 November 2016, Singapore.

Kim, Gia, and Lui, Siu Man (2011) Impacts of luminance contrast on effectiveness of multiple line graphs. Journal of Communications and Information Sciences, 2 (2). pp. 97-107.

Ku, H., Fulcher, R., and Xiang, W. (2011) Using computer software packages to enhance the teaching of Engineering Management Science: part 1-critical path networks. Computer Applications in Engineering Education, 19 (1). pp. 26-39.

Konovalov, Dmitry A., and Heg, Dik (2008) A Maximum-Likelihood relatedness estimator allowing for negative relatedness values. Molecular Ecology Resources, 8 (2). pp. 256-263.

Konovalov, Dmitry A., and Heg, Dik (2008) Estimation of population allele frequencies from small samples containing multiple generations. In: Proceedings of 6th Asia-Pacific Bioinformatics Conference. pp. 321-331. From: 6th Asia-Pacific Bioinformatics Conference, 14-17 January 2008, Kyoto, Japan.

L

Liu, Sisi, and Lee, Ickjai (2018) Discovering sentiment sequence within email data through trajectory representation. Expert Systems with Applications, 99. pp. 1-11.

Liu, Sisi, and Lee, Ickjai (2018) Email sSentiment analysis through k-Means labeling and support vector machine classification. Cybernetics and Systems, 49 (3). pp. 181-199.

Liu, Sisi, and Lee, Ickjai (2018) Sentiment classification with medical word embeddings and sequence representation for drug reviews. In: Lecture Notes in Computer Science (11148) pp. 75-86. From: HIS 2018: 7th International Conference on Health Information Science, 5-7 October 2018, Cairns, QLD, Australia.

Lee, Ickjai, Qu, Yang, and Lee, Kyungmi (2012) Mining qualitative patterns in spatial cluster analysis. Expert Systems with Applications, 39 (2). pp. 1753-1762.

Lui, Siu Man, and Hui, Wendy (2011) The effects of knowledge on security technology adoption: results from a quasi-experiment. In: Proceeding of the 5th International Conference on New Trends in Information Science and Service Science. pp. 328-333. From: NISS 2011 5th International Conference on New Trends in Information Science and Service Science, 24-26 October 2011, Macao, China.

Long, Stephen M., Tran, Tran T., Adams, Peter, Darwen, Paul, and Smythe, Mark L. (2011) Conformational searching using a population-based incremental learning algorithm. Journal of Computational Chemistry, 32 (8). pp. 1541-1549.

Laing, David (2009) An investigation into the structure of Chinese remainder representation. PhD thesis, James Cook University.

Lee, Ickjai, and Breitkreutz, David J. (2008) Hybrid voronoi areal representation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (2) pp. 299-302. From: 2008 International Workshop on Geoscience and Remote Sensing, 21 - 22 December 2008, Shanghai, China.

Lee, Ickjai, and Torpelund-Bruin, Christopher (2008) Multiplicatively-Weighted Order-k Minkowski-metric Voronoi Models for disaster decision support systems. In: Proceedings of 2008 ISI 2008 International Conference. pp. 236-238. From: 2008 International Workshop on Geoscience and Remote Sensing, 17-20 June 2008, Taipei, Taiwan.

Lee, Ickjai, Torpelund-Bruin, Christopher J., and Lee, Kyungmi (2008) Raster image districting and its application to geoinformation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (2) pp. 303-307. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December 2008, Shanghai, China.

Lee, Ickjai, and Phillips, Peter (2008) Urban crime analysis through areal categorized multivariate association mining. Applied Artificial Intelligence, 22 (5). pp. 483-499.

Lee, Ickjai, and Estivill-Castro, Vladimir (2006) Fast cluster polygonization and its applications in data-rich environments. Geoinformatica, 10 (4). pp. 399-422.

Li, Qing, Ichim, Ionut, Loughran, Jeff, Li, Wei, Swain, Michael, and Kieser, Jules (2006) Numerical simulation of crack formation in all ceramic dental bridge. Key Engineering Materials, 312. pp. 293-298.

Lee, Ickjai, and Ghodosi, Hossein (2006) Privacy and security enhanced offline oblivious transfer for massive data distribution. In: Proceedings of the Intelligence and Security Informatics: International Workshop, WISI 2006 (3917) pp. 159-160. From: WISI 2006 International Workshop, 9 April 2006, Singapore.

Li, Wei, Swain, Michael V., Li, Qing, and Steven, Grant P. (2005) Towards automated 3D finite element modeling of direct fiber reinforced composite dental bridge. Journal of Biomedical Materials Research. Part B: applied biomaterials, 74B (1). pp. 520-528.

Li, W., Swain, M.V., Li, Q., Ironside, J., and Steven, G.P. (2004) Fibre reinforced composite dental bridge. Part I: experimental investigation. Biomaterials, 25 (20). pp. 4987-4993.

Li, W., Swain, M.V., Li, Q., Ironside, J., and Steven, G.P. (2004) Fibre reinforced composite dental bridge. Part II: numerical investigation. Biomaterials, 25 (20). pp. 4995-5001.

Lee, Ickjai (2003) Fast qualitative reasoning about categories in conceptual spaces. In: Proceedings of Third International Conference on Hybrid Intelligent System (HIS 2003) Frontiers in Artificial Intelligence and Applications (104) From: Third International Conference on Hybrid Intelligent System (HIS 2003), 14-17 December 2003, Melbourne, VIC, Australia.

M

McArdle, Eugene, Holdsworth, Jason, and Lee, Ickjai (2013) Assessing the usability of students object-oriented language with first-year IT students: a case study. In: Proceedings of the 25th Australian Computer-Human Interaction Conference. pp. 181-188. From: 25th Australian Computer-Human Interaction Conference: augmentation, application, innovation, collaboration, 25-29 November 2013, Adelaide, SA, Australia.

Madden, Dianna, Cadet-James, Yvonne, Watkin-Lui, Felecia, and Atkinson, Ian (2012) Healing through ICT: enhancing wellbeing in an Aboriginal community. Journal of Tropical Psychology, 2. e6. pp. 1-9.

McCabe, Alan, and Trevathan, Jarrod (2009) Handwritten signature verification using complementary statistical models. Journal of Computers, 4 (7). pp. 670-680.

N

Nguwi, Yok-Yen (2014) Facial emotion ranking under imbalanced conditions. International Journal of Advances in Computer Science and Technology, 3 (5). 7. pp. 340-348.

O

Ong, Jing Chang, Chaw, Lee Yen, and Tang, Chun Meng (2015) The role and impact of business process management in enterprise system implementation. In: Proceedings of the International Conference on Internet Studies. p. 1. From: NETs 2015: International Conference on Internet Studies, 18-19 July 2015, Tokyo, Japan.

P

Phillips, Peter, and Lee, Ickjai (2008) Multivariate areal aggregated crime analysis through cross correlation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application. pp. 1-4. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December, 2008, Shanghai, China.

Phillips, Peter, and Lee, Ickjai (2006) Mining positive associations of urban criminal activities using hierarchical crime hot spots. In: Proceedings of the Intelligence and Security Informatics International Workshop, WISI 2006 (3917) pp. 127-132. From: WISI 2006 Intelligence and Security Informatics International Workshop, 9 April 2006, Singapore.

Podger, David, and Canyon, Deon (2003) Creating a designer interface in Clarion (Part 3). Clarion Magazine, 5. pp. 1-7.

Podger, David, and Canyon, Deon (2003) Creating a designer interface in Clarion (Part 1). Clarion Magazine, 5. pp. 1-4.

Podger, David, and Canyon, Deon (2003) Creating a designer interface in Clarion (Part 2). Clarion Magazine, 5. pp. 1-6.

R

Rehn, Adam James (2016) Input-centric profiling and prediction for computational offloading of mobile applications. PhD thesis, James Cook University.

Rajesh, Harsha Mittemari, and Song, Insu (2016) E-commerce websites/blogs - hassles and predicaments. In: Proceedings of the 6th International Conference on Communication and Network Security. pp. 56-61. From: ICCNS 2016: 6th International Conference on Communication and Network Security, 26-29 November 2016, Singapore.

Rahimiazghadi, Mostafa, Moradi, Saber, Fasnacht, Daniel B., Ozdas, Mehmet Sirin, and Indiveri, Giacomo (2015) Programmable spike-timing-dependent plasticity learning circuits in neuromorphic VLSI architectures. ACM Journal on Emerging Technologies in Computing Systems, 12 (2). pp. 1-17.

Robertson, Gordon, Schein, Jacqueline, Chiu, Readman, Corbett, Richard, Field, Matthew, Jackman, Shaun D., Mungall, Karen, Lee, Sam, Okada, Hisanaga Mark, Qian, Jenny Q., Griffith, Malachi, Raymond, Anthony, Thiessen, Nina, Cezard, Timothee, Butterfield, Yaron S., Newsome, Richard, Chan, Simon K., She, Rong, Varhol, Richard, Kamoh, Baljit, Prabhu, Anna-Liisa, Tam, Angela, Zhao, YongJun, Moore, Richard A., Hirst, Martin, Marra, Marco A,, Jones, Steven J.M., Hoodless, Pamela A., and Birol, Inanc (2010) De novo assembly and analysis of RNA-seq data. Nature Methods, 7 (11). pp. 909-912.

S

Siuly, Siuly, Lee, Ickjai, Huang, Zhisheng, Zhou, Rui, Wang, Hua, and Xiang, Wei (2018) Health Information Science: 7th International Conference, HIS 2018, Cairns, QLD, Australia, October 5–7, 2018, Proceedings. In: Lecture Notes in Computer Science (11148) From: HIS 2018: 7th International Conference on Health Information Science, 5-7 October 2018, Cairns, QLD, Australia.

Shatte, Adrian, Holdsworth, Jason, and Lee, Ickjai (2016) Untangling the edits: user attribution in collaborative report writing for emergency management. In: Computational Science and it's Applications: ICCSA 2016 (V) pp. 319-330. From: ICCSA 2016: International Conference on Computational Science and Its Applications, 4-7 July 2016, Beijing, China.

Shatte, Adrian, Holdsworth, Jason, and Lee, Ickjai (2016) Web-based collaborative document writing for emergency management. In: Proceedings of the Hawaii International Conference on System Sciences. pp. 217-226. From: HICCS-49: Hawaii International Conference on System Sciences, 5-8 January 2016, Kauai, Hawaii.

Sithira, V., and Nguwi, Yok-Yen (2014) A study on the adolescent online security issues. International Journal of Multidisciplinary and Current Research, 2. pp. 596-601.

Suwanwiwat, Hemmaphan, Nguyen, Vu, Blumenstein, Michael, and Pal, Umapada (2014) Off-line handwritten bilingual name recognition for student identification in an automated assessment system. In: Proceedings of the 14th International Conference on Frontiers in Handwriting Recognition. pp. 271-276. From: ICFHR 2014: 14th International Conference on Frontiers in Handwriting Recognition, 1-4 September 2014, Hersonisson, Greece.

Shah, Ripan, Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2009) A proactive approach to preventing phishing attacks using a Pshark. In: Proceedings of the Sixth International Conference on Information Technology. pp. 915-921. From: Sixth International Conference on Information Technology, 27-29 April 2009, Nevada, USA.

T

Trevathan, Jarrod, Read, Wayne, Lee, Yong Jin, and Atkinson, Ian (2011) Targeting the strategies of a bid sniper. In: Proceedings of the 44th Hawaii International Conference on System Sciences. pp. 1-10. From: HICSS 2011 44th Hawaii International Conference on System Sciences, 4-7 January 2011, Kauai, HI, USA.

Trevathan, Jarrod, Atkinson, Ian M., Read, Wayne W., Sim, Nigel, and Christensen, Chris (2011) A system for managing data provenance in In Silico Experiments. In: Conferences in Research and Practice in Information Technology (115) pp. 65-74. From: ADC 2011 22nd Australasian Database Conference, January 17 - 20 2011, Perth, WA, Australia.

Trevathan, Jarrod, McCabe, Alan, and Read, Wayne (2009) Online payments using handwritten signature verification. In: Proceedings of the 2009 Sixth International Conference on Information Technology: new generations. pp. 901-907. From: 2009 Sixth International Conference on Information Technology: new generations, 27-29 April 2009, Las Vegas, Nevada, USA.

Torpelund-Bruin, Christopher, and Lee, Ickjai (2008) Generalized Voronoi diagrams with obstacles for use in geospatial market analysis and strategy decisions. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application. pp. 287-290. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December, 2008, Shanghai, China.

Torpelund-Bruin, Christopher, and Lee, Ickjai (2008) Geographic knowledge discovery from geo-referenced Web 2.0. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (3) pp. 291-294. From: 2008 International Workshop on Geoscience and Remote Sensing, 21 - 22 December 2008, Shanghai, China.

Trevathan, Jarrod, Read, Wayne, and Goel, Rajni (2008) Online auction deception using a shill bidding agent. Journal of Scientific and Practical Computing, 2 (2). pp. 23-38.

Trevathan, Jarrod, and Read, Wayne (2008) Variable quantity market clearing algorithms. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-business and Telecommunications Networks. Communications in Computer and Information Science, 9 (1). Springer, Berlin, Germany, pp. 28-39.

Trevathan, Jarrod (2007) Are you the victim of online auction fraud? Australasian Science, 5. pp. 23-25.

V

Vivienne, Sonja, Potter, Martin, and Thomas, Pradip (2014) Free and Open Source Software (FOSS) as a tool for digital citizenship: preliminary surveys in India and Australia. In: Proceedings of the Australian and New Zealand Communication Association Annual Conference (2014) pp. 1-21. From: ANZCA 2014: Australian and New Zealand Communication Association Annual Conference, 8-11 July 2014, Melbourne, VIC, Australia.

W

Wang, Ye, Lee, Kyungmi, and Lee, Ickjai (2018) DNA-chart visual tool for topological higher order information from spatio-temporal trajectory dataset. Expert Systems with Applications, 108. pp. 28-35.

Wang, Ye (2017) Visual analytics of dynamic higher order information. PhD thesis, James Cook University.

Wyatt, Mathew J., Sim, Nigel G.D., Hardy, Dianna L., and Atkinson, Ian M. (2007) Your SRB: a cross platform interface for SRB and digital libraries. In: Proceedings of the fifth Australasian Symposium on ACSW Frontiers. ACM International Conference Proceeding Series; Vol. 249. (68) pp. 79-85. From: Fifth Australasian Symposium on ACSW Frontiers, 30 Jan-02 Feb, Ballarat, VIC, Australia.

Y

Yang, Jianhua, and Lee, Ickjai (2006) Hybrid O(n√n) clustering for sequential web usage mining. In: AI 2006: Advances in Artificial Intelligence (4304) pp. 1022-1026. From: 19th Australian Joint Conference on Artificial Intelligence, 4-8 December 2006, Hobart, TAS, Australia.

Z

Zhang, Dongzhi, Lee, Kyungmi, and Lee, Ickjai (2019) Mining hierarchical semantic periodic patterns from GPS-collected spatio-temporal trajectories. Expert Systems with Applications, 122. pp. 85-101.

Zhang, Dongzhi (2018) Periodic pattern mining from spatio-temporal trajectory data. PhD thesis, James Cook University.

Zhang, Dongzhi, Lee, Kyungmi, and Lee, Ickjai (2018) Hierarchical trajectory clustering for spatio-temporal periodic pattern mining. Expert Systems with Applications, 92. pp. 1-11.

Zhang, Dongzhi, Lee, Kyungmi, and Lee, Ickjai (2018) Mining medical periodic patterns from spatio-temporal trajectories. In: Lecture Notes in Computer Science (11148) pp. 123-133. From: HIS 2018: 7th International Conference on Health Information Science, 5-7 October 2018, Cairns, QLD, Australia.

This list was generated on Thu May 23 22:55:43 2019 AEST.