Browse by ANZSRC Socio-Economic Objective codes

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Number of items at this level: 326.

A

Abdulhassan Alshomali, Mohammad Azeez (2018) Open source software GitHub ecosystem: a SEM approach. PhD thesis, James Cook University.

Alshomali, Mohammad Azeez, Hamilton, John R., Holdsworth, Jason, and Tee, SingWhat (2017) GitHub: factors influencing project activity levels. In: Proceedings of the 17th International Conference on Electronic Business. pp. 116-124. From: ICEB 2017: 17th International Conference on Electronic Business, 4-8 December 2017, Dubai, United Arab Emirates.

Alshomali, Mohammad Azeez, Holdsworth, Jason, and Hamilton, John R. (2017) A preliminary exploration of the GitHub ecosystem: how to find important repositories. In: Proceedings of ISCA 2017. pp. 346-352. From: ISCA 2017: 1st Iraqi Scholars Conference in Australasia, 5-6 December 2017, Melbourne, VIC, Australia.

Abdulhassan, Mohammad Azeez, Holdsworth, Jason, and Hamilton, John (2016) Identifying ways of supporting software development in the open source community. In: Proceedings of the 20th International Conference on ISO & TQM. 5.3. From: 20 ICIT: 20th International Conference on ISO & TQM, 26-28 September 2016, Al Buraimi, Oman.

Adams, Austin S., and Foster, Jeremy J. (2013) Finding the right symbol: an annotated bibliography of graphical symbols standards. In: Ng, Annie W.Y., and Chan, Alan H.S. , (eds.) Signs and Symbols for Workplace and Public Use. Business Issues, Competition and Entrepreneurship . Nova Publishers, New York, USA, pp. 1-9.

Atkinson, Benedict (2007) The True History of Copyright: the Australian experience 1905-2005. Sydney University Press, Sydney, NSW, Australia.

A'Herran, Anne (2003) Extent and nature of portalling in Australian university websites. In: Proceedings of the 20th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE). pp. 17-25. From: ASCILITE 2003: Interact, integrate, impact, 7-10 December 2003, Adelaide, SA, Australia.

B

Belazi, Akram, Talha, Muhammad, Kharbech, Sofiane, and Xiang, Wei (2019) Novel medical image encryption scheme based on chaos a DNA encoding. IEEE Access, 7. pp. 36667-36681.

Bhati, Abhishek, Thu, Yein Tun, Woon, Sai Khun Htun, Lynn, Mon Mon, and Phuong, Le lan (2017) E-commerce usage and user perspectives in Myanmar: an exploratory study. Advanced Science Letters, 23 (1). pp. 519-523.

Bopi-Kerepa, George, Hamilton, John R., and Prideaux, Murray (2017) A historical perspective on decentralisation and service delivery for socio-economic development in Papua New Guinea. In: Proceedings of the 17th International Conference on Electronic Business. pp. 20-28. From: ICEB 2017: 17th International Conference on Electronic Business, 4-8 December 2017, Dubai, United Arab Emirates.

Bradshaw, Adrian, Cragg, Paul, and Pulakanam, Venkat (2013) Do IS consultants enhance IS competences in SMEs? Electronic Journal of Information Systems Evaluation, 16 (1). pp. 13-24.

Babacan, Hurriyet, Dale, Allan, Andrews, Peter, Beazley, Lyn, Horstman, Mark, Campbell, Andrew, Morris, Sheridan, Webb, Brad, Rowlands, Mary, Bowen, Luke, Callin, Rob, George, Melissa, and Miley, Damien (2012) Science engagement and tropical Australia: building a prosperous and sustainable future for the north. Report. Department of Industry, Innovation, Science, Research and Tertiary Education, Kingston, ACT.

Bradshaw, Adrian, Cragg, Paul, and Pulakanam, Venkat (2012) IS consultants and SMEs: a competence perspective. In: Proceedings of the European Conference on Information Management and Evaluation. pp. 25-33. From: ECIME 2012: 6th European Conference on Information Management and Evaluation, 13-14 September 2012, Cork, Ireland.

Bidwell, Nicola, Ladeira, Ilda, and Sigaji, Xolile (2008) Digital storytelling design learning from non-digital narratives: two case studies in South Africa. In: Proceedings of the Annual National Oral History Association of South Africa Conference (5) From: 5th Annual National Oral History Association of South Africa Conference, 7-10 October 2008, South Africa.

Bednarz, Tomasz, Fornalik, Elzbieta, Tagawa, Toshio, Ozoe, Hiroyuki, and Szmyd, Janusz S. (2006) Convection of paramagnetic fluid in a cube heated and cooled from side walls and placed below a superconducting magnet: comparison between experiment and numerical computations. Thermal Science and Engineering, 14 (4). pp. 107-114.

Bidwell, Nicola J., Poyner, Daryl, Irving, Jeremy, Putna, Levi, and Wold, Are (2005) "Make it through with another point of view": landmarks to wayfind in gameworld. In: Proceedings of the Second Australasian Conference on Interactive Entertainment 2005. pp. 19-26. From: Second Australasian Conference on Interactive Entertainment 2005, 23 - 25 November 2005, Sydney, NSW, Australia.

Bidwell, Nicola J., Axup, Jeff, and Viller, Stephen (2005) Usability of a mobile, group communication prototype while rendezvousing. In: Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems. pp. 24-31. From: 2005 International Symposium on Collaborative Technologies and Systems, 15 - 20 May 2005, Saint Louis, Missouri, USA.

Bidwell, Nicola J., and Graham, Connor (2005) Daisy-chaining & berry-picking: trajectories in "planned" & situated wayfinding. In: Proceedings of the INTERACT 2005 Conference. From: INTERACT 2005, 12-16 September 2005, Rome, Italy.

Bidwell, Nicola J., and Browning, David (2005) Probing trajectories in wayfinding wild places. In: The Appropriate Methods for Design in Complex and Sensitive Settings Workshop in conjunction with OzCHI 2005. From: Appropriate Methods for Design in Complex and Sensitive Settings Workshop in conjunction with OzCHI 2005, 21-25 November 2005, Canberra, ACT, Australia.

Bidwell, Nicola J., Lueg, Christopher, and Axup, Jeff (2005) The territory is the map: designing navigational aids. In: Proceedings of the 6th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction. pp. 91-100. From: 6th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction, 07 - 08 July 2005, Auckland, New Zealand.

Bruce, Christine, and McMahon, Camille (2002) Contemporary Developments in Teaching and Learning Introductory Programming: towards a research proposal. Report. QUT Publications and Printing, Brisbane, QLD, Australia.

C

Chawla, Shailey (2020) Goal oriented requirements engineering for blockchain based food supply chain. International Journal of Software Engineering and Computer Systems, 6 (2). pp. 94-103.

Carroll, Julie‐Anne, Sankupellay, Mangalam, Cornford, Michelle, and Bahir, Najmah (2016) 'Women on a Wiki': social constructivist analysis of the effectiveness of online collaborative spaces for reflective learning in women's health studies. In: Cvetkovic, Dragan, (ed.) Virtual Learning. InTechOpen, Rijeka, Croatia, pp. 87-99.

Cao, Feng-Feng, Yu, Qi-Yue, Xiang, Wei, and Meng, Wei-Xiao (2016) BER analysis of physical-layer network coding in the AWGN channel with burst pulses. IEEE Access, 4. pp. 9958-9968.

Cassidy, Leonie J., Hamilton, John, and Tee, SingWhat (2015) Generating first time visiting consumer website traffic: a live case study. In: Proceedings of the 25th Annual Council for Australasian University Tourism and Hospitality Education Conference. pp. 88-100. From: CAUTHE 2015: 25th Annual Council for Australasian University Tourism and Hospitality Education Conference: rising tides and sea changes, 2-5 February 2015, Gold Coast, QLD, Australia.

Cassidy, Leonie Jane (2015) Website benchmarking: a tropical tourism analysis. PhD thesis, James Cook University.

Cassidy, Leonie J., Hamilton, John R., and Tee, Singwhat (2014) Generating return vistor website traffic. In: Proceedings of the Fourteenth International Conference on Electronic Business and the First Global Conference on Internet and Information Systems (14) pp. 126-133. From: Fourteenth International Conference on Electronic Business and Fourteenth International Conference on Electronic Business and the First Global Conference on Internet and Information Systems, 8-12 December 2014, Taipei, Taiwan.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2014) Blind image watermarking based on chaotic maps. IT in Industry, 2 (2). pp. 44-50.

Cassidy, Leonie J., and Hamilton, John R. (2013) A comprehensive approach to capturing website quality measures. In: Proceedings of the 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference. pp. 280-289. From: 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, 9-13 July 2013, Bali, Indonesia.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite. pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-4 December 2013, Yogyakarta, Indonesia.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference. pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia.

Chakraborty, Ayon, and Chuan, Tan Kay (2013) An empirical analysis on Six Sigma implementation in service organisations. International Journal of Lean Six Sigma, 4 (2). pp. 141-170.

Corniaux, Christian L.F., and Ghodosi, Hossein (2013) An information-theoretically secure threshold distributed oblivious transfer protocol. In: Lecture Notes in Computer Science (7839) pp. 184-201. From: 15th International Conference on Information Security and Cryptology, 28-30 November 2012, Seoul, Korea.

Chakraborty, Ayon, and Tan, Kay Chuan (2012) Case study analysis of Six Sigma implementation in service organisations. Business Process Management Journal, 18 (6). pp. 992-1019.

Cahya Prihandoko, Antonius, Litow, Bruce, and Ghodosi, Hossein (2012) DRM's rights protection capability: a review. In: Proceedings of the First International Conference on Computational Science and Information Management (ICoCSIM) (1) ICoCSIM20. pp. 12-17. From: 2012 International Conference on Computational Science and Information Management (ICoCSIM), 3-5 December 2012, North Sumatera, Indonesia.

Chawla, Shailey, and Srivastava, Sangeeta (2012) Goal oriented requirement analysis for web applications. International Journal of Modeling and Optimization, 2 (3). pp. 192-196.

Chawla, Shailey, and Srivastava, Sangeeta (2012) Improving web requirements engineering with goals, aspects and scenarios. In: Proceedings of the 2012 Students Conference on Engineering and Systems. From: 2012 Students Conference on Engineering and Systems, 16-18 March 2012, Allahabad, India.

Corniaux, Christian L.F., and Ghodosi, Hossein (2012) T-out-of-n distributed oblivious transfer protocols in non-adaptive and adaptive settings. In: Information Security Practice and Experience Conference (ISPEC) 2012 (7232) pp. 123-143. From: 8th International Conference on Information Security Practice and Experience, 9-12 April, Hangzhou, China.

Cassidy, Leonie, and Hamilton, John (2011) Website benchmarking: evaluating scaled and dichotomous approaches. In: Proceedings of the 11th International Conference on Electronic Business. pp. 408-412. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Cassidy, Leonie, and Hamilton, John (2011) Website benchmarking: theoretical and measurement aspects. In: Proceedings of the 11th International Conference on Electronic Business. pp. 413-416. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Chuan, Tan Kay, Goudarzlou, Atarod, and Chakraborty, Ayon (2009) Bibliometric analysis of service science research: focus on contribution from Asia. In: Proceedings of the International Conference on Industrial Engineering and Engineering Management. pp. 1273-1276. From: 2009 IEEE Conference on International Engineering and Engineering Management, 8–11 December 2009, Hong Kong.

Chakraborty, A., and Tan, K.C. (2008) Case study analysis of Six Sigma in Singapore service organizations. In: Proceedings of the International Conference on Service Systems and Service Management . pp. 128-133. From: Fifth International Conference on Service Systems and Service Management , 30 June – 2 July 2008, Melbourne, Australia.

Chakraborty, A., and Tan, K.C. (2007) A survey on Six Sigma implementation in Singapore service industries. In: Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management. pp. 1428-1432. From: 2007 IEEE International Conference on Industrial Engineering and Engineering Management, 2-5 December 2007, Singapore.

Curiac, Daniel-Ioan, Banias, Ovidiu, Dragan, Florin, Volosencu, Constantin, and Dranga, Octavian (2007) Malicious node detection in wireless sensor networks using an autoregression technique. In: Proceedings of the Third International Conference on Networking and Services 2007. From: Third International Conference on Networking and Services ICNS 2007, 19-25 June 2007, Athens, Greece.

Curiac, Daniel-Ioan, Volosencu, Constantin, Doboli, Alex, Dranga, Octavian, and Bednarz, Tomasz (2007) Discovery of malicious nodes in wireless sensor networks using neural predictors. WSEAS Transactions on Computers Research, 2 (1). pp. 38-43.

Curiac, Daniel, Volosencu, Constantin, Doboli, Alex, Dranga, Octavian, and Bednarz, Tomasz (2007) Neural network based approach for malicious node detection in wireless sensor networks. In: Proceedings of the WSEAS International Conference on Circuits, Systems, Signal and Telecommunications. pp. 8-13. From: 2007 WSEAS International Conference on Circuits, Systems, Signal and Telecommunications, 17-19 January 2007, Gold Coast, QLD, Australia..

Curiac, Daniel-Ioan, Iercan, Daniel, Dranga, Octavian, Dragan, Florin, and Banias, Ovidiu (2007) Chaos-based cryptography: end of the road? In: Proceedings of International Conference on Emerging Security Information, Systems and Technologies. pp. 71-76. From: SECURWARE 2007 International Conference on Emerging Security Information, Systems and Technologies, 14-20 October 2007, Valencia, Spain.

Chakrabarty, Ayon, and Tan, Kay Chuan (2007) The current state of six sigma application in services. Managing Service Quality, 17 (2). pp. 194-208.

Chakraborty, Ayon, and Tan, Kay Chuan (2006) The extent of Six Sigma methodologies usage in services. In: Proceedings of the International Association for the Management of Technology (IAMOT) EuroMOT Conference. pp. 1-8. From: International Association for the Management of Technology (IAMOT) EuroMOT Conference 2006, 10 – 12 September 2006, Birmingham, UK. (Unpublished)

Chakraborty, A., and Tan, K.C. (2006) Applying Six-Sigma in the service industry: a review and case study in call center services. In: Proceedings of the IEEE International Conference on Management of Innovation and Technology (2) pp. 728-732. From: 2006 IEEE International Conference on Management of Innovation and Technology, 21-23 June 2006, Singapore.

Cokley, John (2002) Editorial technology upgrades at Queensland Newspapers Pty. Ltd., 1985-2002. Australian Journalism Review, 24 (2). pp. 101-115.

Ceremuga, Janina, Leong, Kenneth, and Grabovickic, Robert (1996) Characterisation of high temperature superconducting films using a sapphire resonator and fitting procedures for calculations of the Q-Factor. In: Proceedings of the 11th International Microwave Conference MIKON 96. From: 11th International Microwave Conference MICON 96, 27-30 May 1996, Warsaw, Poland.

D

Das, Abhijit, Suwanwiwat, Hemmaphan, Pal, Umapada, and Blumenstein, Michael (2020) ICFHR 2020 Competition on Short answer ASsessment and Thai student SIGnature and Name COMponents Recognition and Verification (SASIGCOM 2020). In: Proceedings of the 17th International Conference on Frontiers in Handwriting Recognition. pp. 222-227. From: ICFHR 2020: 17th International Conference on Frontiers in Handwriting Recognition, 8-10 September 2020, Dortmund, Germany.

Darwen, Paul J. (2019) Cost-effective prediction in medicine and marketing: only the difference between Bayesian model averaging and the single best-fit model. In: Proceedings of the IEEE 31st International Conference on Tools for Artificial Intelligence. pp. 1274-1279. From: ICTAI 2019: IEEE 31st International Conference on Tools for Artificial Intelligence, 4-6 November 2019, Portland, OR, USA.

Desti, Kannaiah (2018) Global Innovative Research Dimensions: Proceedings of the 7th International Multidisciplinary Conference. Global Innovative Research Dimensions, 2 . Bookrix, Munich, Germany.

Das, Abhijit, Suwanwiwat, Hemmaphan, Ferrer, Miguel A., Pal, Umapada, and Blumenstein, Michael (2018) Thai automatic signature verification system employing textural features. IET Biometrics, 7 (6). pp. 615-627.

Dey, Arindam, Jarvis, Graeme, Sandor, Christian, and Reitmayr, Gerhard (2012) Tablet versus phone: depth perception in handheld augmented reality. In: Proceedings of the IEEE International Synposium on Mixed and Augmented Reality (ISMAR). pp. 187-196. From: 2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), 5-8 November 2012, Atlanta, GA, USA.

Duce, Stephanie, and Janowicz, Krzysztof (2010) Microtheories for SDI - Accounting for diversity of local conceptualizations at a global level. Lecture Notes in Computer Science, 5892. pp. 175-187.

Duce, Stephanie (2009) Towards an ontology for reef islands. Lecture Notes in Computer Science, 5892. pp. 175-187.

Duan, Mei (2004) Splitting behaviour analysis of steel cladding systems. Key Engineering Materials, 274-276. pp. 151-156.

Duan, Mei, and Loughran, Jeffrey G. (2004) A constitutive modelling analysis for deformation of prepared sugar cane. Key Engineering Materials, 274-276. pp. 271-276.

E

Eddy, (2006) GIS in disaster management: a case study of tsunami risk mapping in Bali, Indonesia. Masters (Research) thesis, James Cook University.

Estivill-Castro, Vladimir, and Lee, Ickjai (2004) Clustering with obstacles for Geographical Data Mining. ISPRS Journal of Photogrammetry and Remote Sensing, 59 (1-2). pp. 21-34.

F

Fraser, Neil (2017) Strategy development and big data analytics. In: Geng, Hwaiyu, (ed.) Internet of Things and Data Analytics Handbook. John Wiley & Sons, New York, NY, USA, pp. 347-364.

G

Gurtner, Yetta (2018) Understanding the use of social media in the disaster context - a tropical cyclone Debbie case study. In: [Presented at the Australian and New Zealand Disaster Management Conference]. From: Australian and New Zealand Disaster and Emergency Management Conference 2018, 21-22 May 2018, Gold Coast, QLD, Australia.

Glassen, Thomas J., Oertzen, Timo von, and Konovalov, Dmitry A. (2018) Finding the mean in a partition distribution. BMC Bioinformatics, 19. 375.

Gupta, H., Aye, K.T., Balakrishnan, R., Rajagopal, S., and Nguwi, Y.-Y. (2014) Formulating, implementing and evaluating ERP in small and medium scale industries. International Journal of Advances in Computer Science and Technology, 3 (6). pp. 386-389.

Ghodosi, Hossein, and Pieprzyk, Josef (2009) Multi-Party computation with omnipresent adversary. In: Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (5443) pp. 180-195. From: 12th International Conference on Practice and Theory in Public Key Cryptography, 18 - 20 March 2009, Irvine, CA, USA.

Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.

Gigan, Gilles, and Atkinson, Ian (2007) Sensor abstraction layer: a unique software interface to effectively manage sensor networks. In: Proceedings of the 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference. pp. 479-484. From: 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 3-6 December 2007, Melbourne, Australia.

Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC. pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC. pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

Ghodosi, Hossein (2006) An efficient public key cryptosystem secure against chosen ciphertext attack. In: Proceedings of the Second International Conference on Information Systems Security (4332) pp. 303-314. From: ICISS 2006 Second International Conference on Information Systems Security, 19-21 December 2006, Kolkata, India.

Ghodosi, Hossein, and Pieprzyk, Josef (2006) An ideal and robust threshold RSA. In: Proceedings of Progress in Cryptology - VIETCRYPT 2006 (4341) pp. 312-321. From: VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, 25-28 September 2006, Hanoi, Vietnam.

Guy, Ben, Bidwell, Nicola J., and Musumeci, Phillip (2005) GamePlan TM : serious gaming for place making. In: Proceedings of the Second Australasian Conference on Interactive Entertainment 2005. From: Second Australasian Conference on Interactive Entertainment 2005, 23-25 November 2005, Sydney, NSW, Australia.

Gaskett, Chris, Ude, Aleš, and Cheng, Gordon (2005) Hand-eye coordination through endpoint closed-loop and learned endpoint open-loop visual servo control. International Journal of Humanoid Robotics, 2 (2). pp. 203-224.

Ghodosi, Hossein, and Pieprzyk, Josef (2004) A modification to the authentication of Concast Communication. In: Proceedings of the Conference Cryptographic Algorithms and their Uses. From: Cryptopgraphic Algorithms and their Uses: CAU2004, 5-6 July 2004, Surfers Paradise, QLD, Australia.

Ghodosi, H., and Pieprzyk, J. (2000) Cheating Prevention in Secret Sharing. In: Lecture Notes in Computer Science (1841) pp. 328-341. From: 5th Australasian Conference ACISP 2000, 10 - 12 July 2000, Brisbane, Qld.

H

Hay, Rachel, and Eagle, Lynne (2021) Marketing Social Change: fixing bush internet in rural, regional, and remote Australia. In: Hay, Rachel, Eagle, Lynne, and Bhati, Abhishek, (eds.) Broadening Cultural Horizons in Social Marketing: comparing case studies from Asia-Pacific. Springer, Singapore, pp. 281-293.

Huo, Shuwei, Zhou, Yuan, Xiang, Wei, and Kung, Sun-Yuan (2019) Semisupervised learning based on a novel iterative optimization model for saliency detection. IEEE Transactions on Neural Networks and Learning Systems, 30 (1). pp. 225-241.

Hamilton, John, and Tee, SingWhat (2018) BRI: Mining business big data qualities. In: Proceedings of the 22nd International Conference on ISO & TQM. 4-5. From: 22 ICIT: 22nd International Conference on ISO & TQM, 2-4 April 2018, Beijing, China.

Hamilton, John R., and Tee, SingWhat (2018) Big data values deliverance: OSS model. In: Proceedings of the 18th International Conference on Electronic Business. pp. 154-162. From: ICEB 2018: 18th International Conference on Electronic Business, 2-6 December 2018, Guilin, China.

Hamilton, John (2018) Tracking Big Data: real-time qualities for OBOR businesses. In: Proceedings of the 22nd International Conference on ISO & TQM. 6-1. From: 22 ICIT: 22nd International Conference on ISO & TQM, 2-4 April 2018, Beijing, China.

Hamilton, John R., Holdsworth, Jason, Tee, SingWhat, and Alshomali, Mohammad Azeez (2018) A four (4) stage approach towards speeding GitHub OSS development. In: Proceedings of the 18th International Conference on Electronic Business. pp. 28-35. From: ICEB 2018: 18th International Conference on Electronic Business, 2-6 December 2018, Guilin, China.

Hamilton, John R., Holdsworth, Jason, Tee, SingWhat, and Alshomali, Mohammad Azeez (2017) Analysing big data projects using Github and JavaScript repositories. In: Proceedings of the 17th International Conference on Electronic Business. pp. 47-52. From: ICEB 2017: 17th International Conference on Electronic Business, 4-8 December 2017, Dubai, United Arab Emirates.

Hamilton, John (2017) Digital age corporate leader approaches in OBOR. In: Proceedings of the 21st International Conference on ISO & TQM. From: 21 ICIT: 21st International Conference on ISO & TQM, 14-16 April 2017, Beijing, China.

Hamilton, John, Tee, Singwhat, and Hamilton, Daynah (2016) Canterbury resident commentary of correct disposal of recyclables wastes. In: Proceedings of the 20th International Conference on ISO & TQM. 4.5. From: 20 ICIT: 20th International Conference on ISO & TQM, 26-28 September 2016, Al Buraimi, Oman.

Hamilton, John, Tee, Singwhat, and Hamilton, Daynah (2016) Local resident knowledge regarding correct disposal of recyclables wastes. In: Proceedings of the 20th International Conference on ISO & TQM. 5.4. From: 20 ICIT: 20th International Conference on ISO & TQM, 26-28 September 2016, Al Buraimi, Oman.

Hamilton, John (2016) New technologies disruptors: creating 2025's qualities opportunities. In: Proceedings of the 20th International Conference on ISO & TQM. 1.3. From: 20 ICIT: 20th International Conference on ISO & TQM, 26-28 September 2016, Al Buraimi, Oman.

Hamilton, John R., Tee, Singwhat, and Prideaux, Murray C. (2015) Inbound event tourism attendees: a group qualities-values approach at destination. TQM Journal, 27 (2). pp. 197-212.

Hamilton, John (2014) Researching quality: tomorrow's online business technovation clouds. In: Proceedings of the 18th International Conference on International Organsiation for Standardisation and Total Quality Management. 5.1K. pp. 1-10. From: 18-ICIT: 18th International Conference on International Organsiation for Standardisation and Total Quality Management, 21-23 April 2014, Kuching, Malaysia.

Hamilton, John, Lemmon, Colin, Lui, Carrie, and Tee, Singwhat (2014) Value deliverance in virtual world environments. In: Proceedings of the 43rd Annual Meeting of Western Decision Sciences Institute. 71. From: 43rd Annual Meeting of Western Decision Sciences Institute, 1-4 April 2014, Napa, CA, USA.

Hamilton, John, Liu, Tian Jie Freddy, and Tee, Singwhat (2013) Consumer engagement perspectives at the business social network site. In: Proceedings of the 24th Australasian Conference on Information Systems. 31. From: 24th Australasian Conference on Information Systems, 4-6 December 2013, Melbourne, VIC, Australia.

Hamilton, John R., and Tee, Singwhat (2013) Understanding social network site consumer engagements. In: Proceedings of the 24th Australasian Conference on Information Systems. 402. From: 24th Australasian Conference on Information Systems, 4-6 December 2013, Melbourne, VIC, Australia.

Hamilton, John, and Tee, Singwhat (2013) Social network site value deliverance feedback loops. In: Proceedings of The Thirteen International Conference on Electronic Business. pp. 108-110. From: 13th International Conference on Electronic Business, 1-4 December 2013, Singapore.

Hamilton, John, and Tee, Singwhat (2013) Gauging consumer engagements at the business social network site. In: Proceedings of the17th International Conference on ISO and TQM. 5.4. pp. 1-7. From: 17th International Conference on ISO and TQM, 23-25 August 2013, Sydney, NSW, Australia.

Hamilton, John, and Tee, Singwhat (2013) The cone of learning: transitioning across learning systems. In: Proceedings of the17th International Conference on ISO and TQM. 6.3. pp. 1-6. From: 17th International Conference on ISO and TQM, 23-25 August 2013, Sydney, NSW, Australia.

Hamilton, John R., Prideaux, Murray C., and Tee, Singwhat (2013) Linking car racing attendee expectations and values with trust, satisfaction and loyalty outcomes. In: Proceedings of the 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference. pp. 875-888. From: 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, 9-13 July 2013, Bali, Indonesia.

Hamilton, John, Lemmon, Colin, and Lui, Carrie (2012) Delivering real-time business solutions via multiple digitally gamed engagements under competing dynamic scenarios. In: Proceedings of the 12th Annual Hawaii International Conference On Business. pp. 269-272. From: 12th Annual Hawaii International Conference On Business, 24-27 May 2012, Honolulu, Hawaii.

Hamilton, John, Prideaux, Murray, and Tee, Singwhat (2011) Monitoring customer groups: a sports event satisfaction study. In: Proceedings of the 11th International Conference on Electronic Business. pp. 50-53. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Hamilton, John, and Tee, Singwhat (2011) The business customer alignment index. In: Proceedings of the 11th International Conference on Electronic Business. pp. 45-49. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailand.

Hamilton, John, and Tee, Singwhat (2011) The iPad: a tablet toolkit supporting blended and flexible learning. In: Proceedings of the 11th International Conference on Electronic Business. pp. 93-97. From: 11th International Conference on Electronic Business, 29 November- 2 December 2011, Bangkok, Thailnad.

Hamilton, John (2011) Rating the website: an objective approach. International Journal of Electronic Business, 9 (4). pp. 293-319.

Hamilton, John, and Tee, Singwhat (2010) Smart utilization of tertiary instructional modes. Computers & Education, 54 (4). pp. 1036-1053.

Hamilton, John, and Tee, Singwhat (2010) Teaching and learning: A SEM blended learning systems approach. Higher Education Research and Development (HERD), 29 (6). pp. 1-16. (Unpublished)

Hamilton, John, and Tee, Singwhat (2010) Websites topology evaluation equation. E-Business Review, X (1). pp. 69-74.

Hardy, Dianna, Morgan, Matthew, Atkinson, Ian, McGinty, Sue, Cadet-James, Yvonne, Hannan, Agnes, and James, Robert (2008) Enabling lightweight video annotation and presentation for cultural heritage. In: Proceedings of eResearch Australasia 2008. pp. 1-9. From: eResearch Australasia 2008, 28 September - 3 October 2008, Melbourne, VIC. Australia.

Hardy, Dianna, Bidwell, Nicola, Cadet-James, Yvonne, and Atkinson, Ian (2007) Domesticating design by a disenfranchised community. In: Proceedings of the International Workshop on Social Interaction and Mundane Technologies. pp. 1-4. From: SIMTech Workshop 2008 International Workshop on Social Interaction and Mundane Technologies, 26-27 November 2007, Melbourne, VIC, Australia.

Huddlestone-Holmes, Cameron, Gigan, Gilles, Woods, Graham, Ruxton, Adam, Atkinson, Ian, and Kininmonth, Stuart (2007) Infrastructure for a sensor network on Davies Reef, Great Barrier Reef. In: Proceedings of the 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing Conference. pp. 675-679. From: 2007 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 3-6 December 2007, Melbourne, Australia.

Holdsworth, Jason (2004) Graph traversal and graph transformation. Theoretical Computer Science, 321 (2). pp. 215-231.

Hamilton, John, and Selen, Willem (2002) Integrating web site design features for 'one-on-one' marketing: a QFD framework. In: Change Management : proceedings of the 7th International Conference on ISO 9000 and TQM. pp. 93-94. From: 7th International Conference on ISO 9000 and TQM, 2-4 April 2002, Melbourne, VIC.

Hamilton, John R. (2002) 4th generation innovation approach to IT education: integration of supply chain, knowledge management and business intelligence with the learning organization. In: Proceedings of the 2nd Annual Hawaii International Conference on Business. pp. 1-12. From: Hawaii International Conference on Business, 7-10 January 2002, Honolulu, Hawaii.

J

Jiang, Zhuhan, de Vel, Olivier, and Litow, Bruce (2003) Unification and extension of weighted finite automata applicable to image compression. Theoretical Computer Science, 302 (1-3). pp. 275-294.

Jacob, Mohan V., Mazierska, Janina, Leong, Kenneth, and Krupka, Jerzy (2002) Microwave properties of low-loss polymers at cryogenic temperatures. IEEE Transactions on Microwave Theory and Techniques, 50 (2). pp. 474-480.

Jiang, Zhuhan, Litow, Bruce, and de Vel, Oliver (2001) An inference implementation based on extended weighted finite automata. In: Australian Computer Science Communications (23) pp. 100-108. From: 24th Australasian Computer Science Conference ACSC 2001, 29 January - 2 February 2001, Gold Coast, Queensland.

K

Kim, Gia, and Lui, Carrie (2011) Visual stress of blinking cues and density of multiple graphs in dual tasks. In: Proceedings of the 7th International Conference on Information Processing and Management. pp. 7-12. From: ICIPM 2011 7th International Conference on Information Processing and Management, 29 November- 1 December 2011, Jeju Island, Korea.

Kim, Gia, and Lui, Siu Man (2010) Impacts of multiple color nominal coding on usefulness of graph reading tasks. In: Proceeding of the Fifth International Conference on Computer Sciences and Convergence Information Technology. pp. 457-463. From: ICCIT 2010 5th International Conference on Computer Sciences and Convergence Information Technology, 30 November - 2 December 2010, Seoul, Korea.

Kim, Gia (2010) The effect of color combination and attention on usability of graph reading tasks. In: Proceeding of the Fifth International Conference on Computer Sciences and Convergence Information Technology. pp. 464-471. From: ICCIT 2010 5th International Conference on Computer Sciences and Convergence Information Technology, 30 November - 2 December 2010, Seoul, Korea.

Ku, Kim (2006) Enhance the Baldwin effect by strengthening the correlation between genetic operators and learning methods. In: Proceedings of IEEE Congress on Evolutionary Computation 2006. pp. 3302-3308. From: CEC 2006 IEEE Congress on Evolutionary Computation 2006, 16-21 July 2006, Vancouver, BC, Canada.

Konovalov, Dmitry, Bajema, Nigel, and Litow, Bruce (2005) Modified Simpson O(n3) algorithm for the full sibship reconstruction problem. Bioinformatics, 21 (20). pp. 3912-3917.

Konovalov, Dmitry A., Litow, Bruce, and Bajema, Nigel (2005) Partition-distance via the assignment problem. Bioinformatics, 21 (10). pp. 2463-2468.

L

Lv, Zhihan, Ota, Kaoru, Lloret, Jaime, Xiang, Wei, and Bellavista, Paolo (2019) Complexity problems handled by big data technology. Complexity, 2019. 9090528.

Liu, Zian, Chen, Chao, Liu, Shigang, Liu, Dongxi, and Wang, Yu (2019) Exploit in smart devices: a case study. In: Communications in Computer and Information Science (1095) pp. 152-164. From: SocialSec 2019: 5th International Symposium on Security and Privacy in Social Networks and Big Data, 14-17 July 2019, Copenhagen, Denmark.

Lang, Yue, Wang, Qing, Yang, Yang, Hou, Chunping, Huang, Danyang, and Xiang, Wei (2019) Unsupervised domain adaptation for micro-doppler human motion classification via feature fusion. IEEE Geoscience and Remote Sensing Letters, 16 (3). pp. 392-396.

Lemberget, Tove, Meade, Clair, Morton, Stephanie, Gibbons, Anna, and Ferguson, Kathryn (2017) Keeping an institutional repository relevant. In: Posters from the Open Respositories Conference. 260. From: OR2017: Open Repositories Conference, 27-30 June 2017, Brisbane, QLD, Australia.

Lee, Ickjai, Torpelund-Bruin, Christopher, and Lee, Kyungmi (2012) Map segmentation for geospatial data mining through generalized higher-order Voronoi diagrams with sequential scan algorithms. Expert Systems with Applications, 39 (12). pp. 11135-11148.

Lee, Ickjai, and Torpelund-Bruin, Christopher (2012) Geographic knowledge discovery from Web Map segmentation through generalized Voronoi diagrams. Expert Systems with Applications, 39 (10). pp. 9376-9388.

Lee, Ickjai, Torpelund-Bruin, Christopher, and Lee, Kyungmi (2011) Raster voronoi tessellation and its application to emergency modeling. Geo-spatial Information Science, 14 (4). pp. 235-245.

Lee, Kyungmi (2011) Feature extraction schemes for ultrasonic non-destructive testing inspections. Advances in Information Sciences and Service Sciences, 3 (3). pp. 125-135.

Lee, Yong Jin, Trevathan, Jarrod, Atkinson, Ian, Read, Wayne, Myers, Trina, and Johnstone, Ron (2011) The evolution of the SEMAT sensor network management system. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing. pp. 229-234. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Lui, Siu Man, and Wendy, Hui (2010) Effects of smiling and gender on trust toward a recommendation agent. In: Proceedings of 2010 International Conference on Cyberworlds. pp. 398-405. From: 2010 International Conference on Cyberworlds, 20-22 October 2010, Singapore.

Litow, B. (2010) On sums of roots of unity. Lecture Notes in Computer Science, 6198. pp. 420-425.

Lee, Kyungmi (2010) Exploration on feature extraction schemes and classifiers for shaft testing system. Journal of Computers, 5 (5). pp. 679-686.

Litow, Bruce, and Konovalov, Dmitry (2008) Phenotype space and kinship assignment for the Simpson index. RAIRO - Theoretical Informatics and Applications, 42 (2). pp. 323-333.

Lemmon, Colin J., and Musumeci, Phillip (2008) Boundary mapping and boundary state routing (BSR) in ad hoc networks. IEEE Transactions on Mobile Computing, 7 (1). pp. 127-139.

Lee, Ickjai, and Breitkreutz, David J. (2008) Hybrid voronoi areal representation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (2) pp. 299-302. From: 2008 International Workshop on Geoscience and Remote Sensing, 21 - 22 December 2008, Shanghai, China.

Lee, Ickjai, and Torpelund-Bruin, Christopher (2008) Multiplicatively-Weighted Order-k Minkowski-metric Voronoi Models for disaster decision support systems. In: Proceedings of 2008 ISI 2008 International Conference. pp. 236-238. From: 2008 International Workshop on Geoscience and Remote Sensing, 17-20 June 2008, Taipei, Taiwan.

Lee, Ickjai, Torpelund-Bruin, Christopher J., and Lee, Kyungmi (2008) Raster image districting and its application to geoinformation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (2) pp. 303-307. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December 2008, Shanghai, China.

Lee, Ickjai, and Phillips, Peter (2008) Urban crime analysis through areal categorized multivariate association mining. Applied Artificial Intelligence, 22 (5). pp. 483-499.

Lemmon, Colin, and Musumeci, Phillip (2007) Cooperative behaviour of location aware nodes in ad-hoc networks. In: Proceedings of Inaugural IEE-IES International Digital Ecosystems and Technologies Conference. pp. 512-515. From: Inaugural IEE-IES International Digital Ecosystems and Technologies Conference, 21-23 February 2007, Cairns, Australia.

Lee, Ickjai, Pershouse, Reece, and Lee, Kyungmi (2007) Geospatial cluster tessellation through the complete order-k Voronoi diagrams. In: Lecture Notes in Computer Science (Proceedings of the Conference on Spatial Information Theory 2007) (4736) pp. 321-336. From: Conference on Spatial Information Theory 2007, 19-23 September 2007, Melbourne, Victoria, Australia.

Lee, Ickjai, and Lee, Kyungmi (2007) Higher order Voronoi diagrams for concept boundaries and tessellations. In: Proceedings of 6th IEEE/ACIS International Conference on Computer and Information Science. pp. 513-518. From: ICES 2007 6th IEEE/ACIS International Conference on Computer and Information Science, 11-13 July 2007, Melbourne, Australia.

Lee, Ickjai, and Lee, Kyungmi (2007) Higher order Voronoi diagrams for disaster and emergency management. In: Proceedings of the ISSNIP/ISPRS Joint International Workshop on Distributed Geoinformatics and Sensing, Ubiquity, and Mobility. From: ISSNIP/ISPRS Joint International Workshop on Distributed Geoinformatics and Sensing, Ubiquity and Mobility, 19 September 2007, Melbourne, VIC, Australia.

Lee, Ickjai, Pershouse, Reece, Phillips, Peter, and Christensen, Chris (2007) What-if emergency management system: a generalized Vironoi diagram approach. In: Lecture Notes in Computer Science (Proceedings of the Pacific Asia Workshop PAISI 2007) (4430) pp. 58-69. From: Intelligence & Security Informatics - Pacific Asia Workshop PAISI 2007, 11-12 April 2007, Chengdu, China.

Lui, Carrie Siu Man Lui, and Hui, Wendy (2007) A comparative study of web content accessibility of public and private organizations in Australia. In: Proceedings of the 8th IBIMA Conference on Information Management in the Networked Economy. pp. 574-582. From: 8th IBIMA Conference on Information Management in the Networked Economy, 20-22 June 2007, Dublin, Ireland.

Lee, Ickjai, and Portier, Bayani (2007) An empirical study of knowledge representation and learning within conceptual spaces for intelligent agents. In: Proceedings of 6th IEEE/ACIS International Conference on Computer and Information Science. pp. 463-468. From: ICES 2007 6th IEEE/ACIS International Conference on Computer and Information Science, 11-13 July 2007, Melbourne, Australia.

Lee, Ickjai, and Estivill-Castro, Vladimir (2006) Fast cluster polygonization and its applications in data-rich environments. Geoinformatica, 10 (4). pp. 399-422.

Lemmon, Colin (2006) Experimental design, modeling and testing of geographic routing protocols. In: Proceedings of SimTecT 2006 Conference. From: SimTecT 2006 Simulation Conference: challenges and opportunities for a complex and networked world, 29 May - 1 June 2006, Melbourne, VIC, Australia.

Lee, Ickjai, and Ghodosi, Hossein (2006) Privacy and security enhanced offline oblivious transfer for massive data distribution. In: Proceedings of the Intelligence and Security Informatics: International Workshop, WISI 2006 (3917) pp. 159-160. From: WISI 2006 International Workshop, 9 April 2006, Singapore.

Lee, Ickjai (2005) Data mining coupled conceptual spaces for intelligent agents in data-rich environments. In: Proceedings of the 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005 (3684) pp. 42-48. From: 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005, 14-16 September 2005, Melbourne, VIC, Australia.

Li, Ming, Chi, Nguyen, and Hoang, Doan (2005) Edge-aware resource discovery and price-based admission control over differentiated service networks. In: Proceedings of the First International Workshop on Network Architecture and Service Models. pp. 111-117. From: NASM 2005 First International Workshop on Network Architecture and Service Models, 22-24 November 2005, Shanghai, China.

Lee, Ickjai (2005) Geospatial clustering in data-rich environments: features and issues. In: Proceedings of the 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005 (3684) pp. 336-342. From: 9th International Knowledge-Based Intelligent Information and Engineering Systems Conference 2005, 14-16 September 2005, Melbourne, VIC, Australia.

Lee, Ickjai, and Yang, Jianhua (2005) Hybrid agglomerative clustering for large databases: an efficient interactivity approach. In: Proceedings of the 18th Australian Joint Conference on Artifical Intelligence (3809) pp. 938-941. From: 18th Australian Joint Conference on Artifical Intelligence, 5-9 December 2005, Sydney, NSW.

Lee, Ickjai (2005) Representing properties in conceptual spaces towards effective learning within intelligent agents. In: Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation 2005 (2) From: International Conference on Computational Intelligence for Modelling, Control and Automation 2005, 28-30 November 2005, Vienna, Austria.

Lueg, Christopher, and Bidwell, Nicola (2005) Smart guiding: egocentric way-finding information for attracting and guiding tourists. In: Proceedings of the 15th International Research Convention of the Council for Australian University Tourism and Hospitality Education. From: 15th International Research Convention of the Council for Australian University Tourism and Hospitality Education, 1 - 5 February 2005, Alice Springs, NT, Australia.

Lee, Ickjai, and Yang, Jianhua (2005) Voronoi-based topological information for combining partitioning and hierarchical clustering. In: Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation 2005 (2) From: International Conference on Computational Intelligence for Modelling Control & Automation 2005, 28-30 November 2005, Vienna, Austria.

Litow, B., and Deo, N. (2004) Graph compression and the zeros of polynomials. Information Processing Letters, 92 (1). pp. 39-44.

Litow, Bruce, Deo, Narsingh, and Cami, Aurel (2004) Compression of vertex transitive graphs. Congressus Numerantium, 167. pp. 161-173.

Lee, Ickjai (2004) Efficient management of concepts and properties in conceptual spaces using data mining techniques. In: Proceedings of International Conference on Computational Intelligence for Modelling Control & Automation 2004. pp. 492-499. From: International Conference on Computational Intelligence for Modelling Control & Automation 2004, 12-14 July 2004, Gold Coast, QLD, Australia.

Lee, Ickjai (2004) Frequency-incorporated interdependency rules mining in spatiotemporal databases. Lecture Notes in Artificial Intelligence, 3213. pp. 196-202.

Lee, Ickjai (2004) Hybrid soft categorisation in conceptual spaces. In: Proceedings of Fourth International Conference on Hybrid Intelligent Systems. pp. 74-79. From: Fourth International Conference on Hybrid Intelligent Systems, 5 - 8 December 2004, Kitakyushu, Japan.

Litow, B. (2003) A note on commutative multivariate rational series. Information Processing Letters, 87 (6). pp. 283-285.

Lee, Kyungmi, and Estivill-Castro, Vladimir (2003) Classification of ultrasonic shaft inspection data using discrete wavelet transform. In: Proceedings of the (AIA 2003) Artificial Intelligence and Applications Conference. pp. 673-678. From: (AIA 2003) Artificial Intelligence and Applications Conferences, 8-10 September, 2003, Benalmádena, Spain.

Lee, Kyungmi, and Estivill-Castro, Vladimir (2003) Feature extraction techniques for ultrasonic shaft signal classification. In: Proceedings of Third International Conference on Hybrid Intelligent System (HIS 2003) Frontiers in Artificial Intelligence and Applications (104) pp. 479-488. From: Third International Conference on Hybrid Intelligent System (HIS 2003), 14-17 December 2003, Melbourne, VIC, Australia.

Litow, B. (2003) Inequality of finite behaviors of rational weight finite automata is in R. Information Processing Letters, 87 (3). pp. 139-145.

Litow, Bruce (2001) Computing a context-free grammar-generating series. Information and Computation, 169 (2). pp. 174-185.

Litow, B., and Deo, Narsingh (2000) Forbidden pairs combinatorics. Australasian Journal of Combinatorics, 22. pp. 91-99.

Litow, B. (2000) On Hadamard square roots of unity. Theoretical Computer Science, 237 (1-2). pp. 447-454.

Leong, Kenneth Tak Ming (2000) Precise measurements of surface resistance of high temperature superconducting thin films using a novel method of Q-factor computations for sapphire dielectric resonators in the transmission mode. PhD thesis, James Cook University.

Litow, Bruce, and Stephenson, Peter (2000) Why step when you can run? Iterative line digitization algorithms based on hierarchies of runs. IEEE Computer Graphics and Applications, 20 (6). pp. 76-84.

Leong, Kenneth, and Mazierska, Janina (1998) Accounting for lossy coupling in measurements of Q-factors of transmission mode dielectric resonators. In: Proceedings of the 1998 Asia-Pacific Microwave Conference, APMC 98. pp. 209-212. From: APMC 1998: Beyond the Wireless Multimedia Society, 8-11 December 1998, Yokohama, Japan.

M

M'Balla-Ndi Oelgemoeller, Marie, and Obijiofor, Levi (2020) Media freedom in Melanesia: the challenges of researching the impact of national security legislation. Pacific Journalism Review, 26 (1). pp. 75-85.

Mohamed, Mohamed Nazir Riad (2017) Influence of virtual world end-user motives on social capital. PhD thesis, James Cook University.

Marthandan, Govindan, and Tang, Chun Meng (2012) Information systems for organizational effectiveness model: a rationale alignment. In: Belkhamza, Zakariya, and Wafa, Syed Azizi, (eds.) Measuring Organizational Information Systems Success: new technologies and practices. IGI Global, Hershy, PA, USA, pp. 39-61.

Marthandan, Govindan, and Tang, Chun Meng (2012) Mining the literature in search of IT business value. Review of Business Information Systems, 16 (3). pp. 89-102.

Marsh, Tim, Xuejin, Chuang, Nickole, Li Zhiqiang, Osterweil, Scot, Klopfer, Eric, and Haas, Jason (2011) Fun and learning: the power of narrative. In: Proceedings of the 6th International Conference on Foundations of Digital Games. pp. 23-29. From: FDG 2011 6th International Conference on Foundations of Digital Games, 28 June - 1 July 2011, Bordeaux, France.

Marsh, Tim (2011) Serious games continuum: between games for purpose and experiential environments for purpose. Journal of Entertainment Computing, 2 (2). 3. pp. 61-68.

Marthandan, Govindan, and Tang, Chun Meng (2010) Information systems evaluation: an ongoing measure. International Journal of Business Information Systems, 6 (3). pp. 336-353.

Marthandan, Govindan, and Tang, Chun Meng (2010) Information technology evaluation: issues and challenges. Journal of Systems and Information Technology, 12 (1). pp. 37-55.

Marthandan, Govindan, and Tang, Chun Meng (2010) Thirst for business value of information systems. International Journal of Technology Diffusion, 1 (1). pp. 28-39.

McCabe, Alan, Trevathan, Jarrod, and Read, Wayne (2008) Neural network-based handwritten signature verification. Journal of Computers, 3 (8). pp. 9-22.

McCabe, Alan, and Trevathan, Jarrod (2008) Artificial Intelligence in sports prediction. In: Proceedings of the 5th International Conference on Information Technology. pp. 1194-1197. From: 5th International Conference on Information Technology: New Generations, 7-9 April 2008, Las Vegas, USA.

McCabe, Alan, and Trevathan, Jarrod (2008) Markov model-based handwritten signature verification. In: Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (2) pp. 173-179. From: 5th International Conference on Embedded and Ubiquitous Computing, 17-20 December 2008, Shanghai, China.

McCabe, Alan, and Trevathan, Jarrod (2008) Performance evaluation of handwritten signature verification techniques. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008. pp. 151-160. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

McCabe, A., and Trevathan, J. (2007) A new approach to avoiding the local extrema trap. ANZIAM Journal, 48. pp. 474-493.

McCabe, Alan, and Trevathan, Jarrod (2007) Implementation and analysis of a handwritten signature verification technique. In: Proceedings of the Second International Conference on Security and Cryptography (3) pp. 48-58. From: Secrypt 2007 International Conference on Security and Cryptography, 28-31 July 2007, Barcelona, Spain.

McCabe, Alan, and Trevathan, Jarrod (2007) Pre-processing of on-line signals in noisy environments. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4) pp. 933-936. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Maskell, Douglas L., and Woods, Graham S. (2003) An adaptive subsample delay estimator using a quadrature demodulator. In: Proceedings of the Joint 4th International Conference on Information Communications and Signal Processing, 2003 and 4th Pacific Rim Conference on Multimedia (3) 2B4.6. pp. 1-4. From: Joint ACICS-PCM 2003, 15-18 December 2003, Singapore.

McMahon, Camille, and Bruce, Christine (2002) Information literacy needs of local staff in cross-cultural development projects. Journal of International Development, 14 (1). pp. 113-127.

Maskell, Douglas L., and Woods, Graham S. (2002) The discrete-time quadrature subsample estimation of delay. IEEE Transactions on Instrumentation and Measurement, 51 (1). pp. 133-137.

Maskell, Doug L., and Woods, Graham S. (2000) A frequency modulated envelope delay FSCW radar for multiple-target applications. IEEE Transactions on Instrumentation and Measurement, 49 (4). pp. 710-715.

N

Nguwi, Yok-Yen, and Loh, Pek Ru (2017) Comparative study of feature selection and classification for problematic mobile phone use (PMPU). Journal of Technology in Behavioral Science, 2 (3-4). pp. 121-128.

Nazir, Mohamed, Hamilton, John R., and Tee, SingWhat (2017) Real money trading in virtual worlds. In: Proceedings of the 17th International Conference on Electronic Business. pp. 202-207. From: ICEB 2017: 17th International Conference on Electronic Business, 4-8 December 2017, Dubai, United Arab Emirates.

Nazir, Mohamed, Hamilton, John, and Tee, Singwhat (2017) Sectioning social capital in virtual world platforms. In: Proceedings of the 22nd Asia Pacific Decision Sciences Institute Conference. pp. 194-200. From: APDSI 2017: 22nd Asia Pacific Decision Sciences Institute Conference: technology convergence, innovation & design sciences, 21-25 July 2017, Seoul, Korea.

Nguwi, Yok-Yen, Kouzani, Abbas Z., Kumar, Jayanth J., and Driscoll, Don (2016) Automatic detection of lizards. In: Proceedings of the International Conference on Advanced Mechatronic Systems. pp. 300-305. From: ICAMechS 2016: International Conference on Advanced Mechatronic Systems, 30 November - 3 December 2016, Melbourne, VIC, Australia.

Nazir, Mohamed, Hamilton, John, and Tee, Singwhat (2016) Virtual world as a new media for business and marketing. In: Proceedings of the 20th International Conference on ISO & TQM. 5.5. pp. 218-232. From: 20 ICIT: 20th International Conference on ISO & TQM, 26-28 September 2016, Al Buraimi, Oman.

Nazir, Mohamed, and Lui, Carrie Siu Man (2016) A brief history of virtual economy. Journal of Virtual Worlds Research, 9 (1). pp. 1-26.

Nguwi, Y.Y., and Lim, W.J. (2015) Number plate recognition in noisy image. In: Proceedings of the 8th International Conference on Image and Signal Processing. pp. 476-480. From: CISP 2015: 8th International Conference on Image and Signal Processing, 14-16 October 2015, Shenyang, China.

Ngerng, Miang Hong, Tang, Chun Meng, and Toh, Kian Kok (2012) An analytic hierarchy process (AHP) model to anticipate student preference for social networking sites. In: Proceedings of the 2nd International Conference on Applied and Theoretical Information Systems Research. From: ATISR 2012: 2nd International Conference on Applied and Theoretical Information Systems Research, 27-29 December 2012, Taipei, Taiwan.

Nguwi, Yok-Yen, and Cho, Siu-Yeung (2010) An unsupervised self-organizing learning with support vector ranking for imbalanced datasets. Expert Systems and Application, 37 (12). pp. 8303-8312.

O

Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.

P

Powell, L., Lim, H.S., Brown, I., Huang, T., Munksgaard, N., Randall, M, Holdsworth, J., and Cook, H. (2020) Innovation through collaboration: improving urban water management for a reef council. Water e-journal, 5 (3).

Prince, Kylie Ann (2018) Digital leadership: transitioning into the digital age. PhD thesis, James Cook University.

Prihandoko, Antonius Cahya, Ghodosi, Hossein, and Litow, Bruce (2017) White-box implementation to advantage DRM. International Journal on Advanced Science, Engineering and Information Technology, 7 (2). pp. 460-467.

Prince, Kylie A. (2017) Industrie 4.0 and leadership. In: Proceedings of the 17th International Conference on Electronic Business. pp. 132-139. From: ICEB 2017: 17th International Conference on Electronic Business, 4-8 December 2017, Dubai, United Arab Emirates.

Prince, Kylie, Hamilton, John, and Tee, SingWhat (2016) Collective affective identity: a socio emotional engagement tool for inter-generational integration. In: Proceedings of the 20th International Conference on ISO & TQM. 3.5. From: 20 ICIT: 20th International Conference on ISO & TQM, 26-28 September 2016, Al Buraimi, Oman.

Prihandoko, Antonius Cahya, Ghodosi, Hossein, and Litow, Bruce (2016) Scenarios for securing content delivery in the DRM environment. INFORMAL: Informatics Journal, 1 (1). pp. 32-38.

Phillips, Peter, and Lee, Ickjai (2012) Mining co-distribution patterns for large crime datasets. Expert Systems with Applications, 39 (14). pp. 11556-11563.

Phillips, Peter, and Lee, Ickjai (2008) Multivariate areal aggregated crime analysis through cross correlation. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application. pp. 1-4. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December, 2008, Shanghai, China.

Phillips, Peter, and Lee, Ickjai (2007) Areal aggregated crime reasoning through density tracing. In: Proceedings ICDM Workshops 2007 - Seventh IEEE International Conference on Data Mining - Workshops. pp. 649-654. From: Seventh IEEE International Conference on Data Minining, 28-31 October 2007, Omaha, Nebraska, USA.

Pieprzyk, Josef, Ghodosi, Hossein, and Dawson, Ed (2007) Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007,. In: Proceedings of 12th Australasian Conference, ACISP 2007 (4586) pp. 1-11. From: 12th Australasian Conference, ACISP 2007, 2 - 4 July, 2007, Townsville, QLD, Australia.

Podger, David, and Canyon, Deon (2006) Printing a tree from a page loaded browse. Clarion Magazine, 8 (11). - .

Phillips, Peter, and Lee, Ickjai (2006) Mining positive associations of urban criminal activities using hierarchical crime hot spots. In: Proceedings of the Intelligence and Security Informatics International Workshop, WISI 2006 (3917) pp. 127-132. From: WISI 2006 Intelligence and Security Informatics International Workshop, 9 April 2006, Singapore.

Pham, Tuan D., Beck, Dominik, and Crane, Denis I. (2005) Fuzzy clustering of stochastic models for molecular phylogenetics. WSEAS Transactions on Biology and Biomedicine, 2 (1). pp. 87-91.

Pham, Tuan D., Beck, Dominik, and Crane, Denis (2005) Hidden Markov models for unaligned DNA sequence comparison. WSEAS Transactions on Biology and Biomedicine, 2 (1). pp. 64-69.

Pham, Tuan D., Tran, Dat T., Brown, Marianne, and Kennedy, R. Lee (2005) Image segmentation of retinal vessels by fuzzy models. In: Proceedings of the 2005 International Symposium on Intelligent Signal Processing and Communication Systems. pp. 541-544. From: 2005 International Symposium on Intelligent Signal Processing and Communication Systems, 13 - 16 December 2005, Hong Kong.

Pham, Tuan D. (2005) Integration of fuzzy and geostatistical models for estimating missing multivariate observations. WSEAS Transactions on Systems, 4 (4). pp. 233-237.

Pham, Tuan D., and Crane, Denis I. (2005) Segmentation of neuronal-cell images from stained fields and monomodal histograms. In: Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine & Biology Society 2005 (6) pp. 6289-6292. From: 27th Annual International Conference of the IEEE Engineering in Medicine & Biology Society 2005, 1-4 September 2005, Shanghai, China.

Pham, Tuan D., Tran, Dat T., Zhou, Xiaobo., and Wong, Stephen T.C. (2005) An automated procedure for cell-phase imaging identification. In: Proceedings of the 18th Australian Joint Conference on Artificial Intelligence. pp. 52-59. From: 18th Australian Joint Conference on Artificial Intelligence, 5-9 December 2005, Sydney, NSW, Australia.

Pham, Tuan D., and Byung-Sub, Shim (2005) A cepstral distortion measure for protein comparison and identification. In: Proceedings of the 2005 International Conference on Machine Learning and Cybernetics (9) pp. 5609-5614. From: 2005 International Conference on Machine Learning and Cybernetics, 18-21 August 2005, Guangzhou, China.

Pham, Tuan D. (2005) An optimally weighted fuzzy k-nn algorithm. In: Proceedings of the 3rd International Conference on Advances in Pattern Recognition 2005 (3686) pp. 239-247. From: 3rd International Conference on Advances in Pattern Recognition 2005, 22-25 August 2005, Bath, United Kingdom.

Pham, Huan, Lavery, Bill, and Nguyen, Hoang Nam (2001) WLL link layer protocol for QoS support of multi-service internet. In: Lecture Notes in Computer Science (2093) pp. 37-44. From: First International Conference on Networking, July 9-13 2001, Colmar, France.

Q

Qiu, Ling, Li, Yingjiu, and Wu, Xintao (2007) Preserving privacy in association rule mining with bloom filters. Journal of Intelligent Information Systems, 29 (3). pp. 253-278.

Qiu, Ling, Ong, Kok-Leong, and Lui, Carrie (2006) Safely delegating data mining tasks. In: Proceedings of the 5th Australasian Data Mining Conference (61) pp. 1-7. From: Fifth Australasian Data Mining Conference (AusDM2006), 29-30 November 2006, Sydney, NSW, Australia.

Qiu, Ling, Li, Yingjiu, and Wu, Xintao (2006) An approach to outsourcing data mining tasks while protecting business intelligence and customer privacy. In: Proceedings of Sixth IEEE International Conference on Data Mining - Workshops. pp. 551-558. From: ICDMW'06 Sixth IEEE International Conference on Data Mining - Workshops, 18-22 December 2006, Hong Kong.

R

Russo, Kerry, Eagle, Lynne, Emtage, Nick, and Low, David (2018) Mind the Divide: digital fluency and disadvantage. In: Proceedings of the Australian & New Zealand Marketing Academy Conference. pp. 485-488. From: ANZMAC 2018: Australian & New Zealand Marketing Academy Conference, 3-5 December 2018, Adelaide, SA, Australia.

Rana, Md M., Xiang, Wei, Wang, Eric, and Li, Xuehua (2018) Monitoring the smart grid incorporating turbines and vehicles. IEEE Access, 6. pp. 45485-45492.

Rehn, Adam, Holdsworth, Jason, Hamilton, John, and Tee, Singwhat (2018) An input-centric performance model for computational offloading of mobile applications. Journal of Systems and Software, 138. pp. 1-18.

Ramanujam, Rohit, Hamilton, John, and Tee, SingWhat (2016) Management consulting: delivering competitive business value within information technology firms in India. In: Proceedings of the 20th International Conference on ISO & TQM (1) 4.3. From: 20 ICIT: 20th International Conference on ISO & TQM, 26-28 September 2016, Al Buraimi, Oman.

Rehn, Adam, Hamilton, John, and Holdsworth, Jason (2014) Towards an adaptive OS noise mitigation technique for microbenchmarking on mobile platforms. In: Proceedings of the Fourteenth International Conference on Electronic Business and the First Global Conference on Internet and Information Systems. pp. 263-269. From: Fourteenth International Conference on Electronic Business and Fourteenth International Conference on Electronic Business and the First Global Conference on Internet and Information Systems, 8-12 December 2014, Taipei, Taiwan.

Rehn, Adam, Holdsworth, Jason, and Hamilton, John (2014) A model for an automated evaluation framework for design science artifacts targeting mobile platforms. Journal of Management Systems, 24 (2). pp. 1-21.

Rehn, Adam, Holdsworth, Jason, and Hamilton, John (2014) Adaptive OS noise mitigation for microbenchmarking on mobile platforms. Journal of Management Systems, 24 (4). pp. 1-17.

Ramanujam, Rohit (2012) Management consulting: delivering service value within services businesses. In: UNSPECIFIED (1) 2B1. pp. 1-26. From: APUGSM 2012 Advancements in Business, Economics and Innovation Management Research, 20-21 January 2012, Beppu, Japan.

Ramanujam, Rohit (2012) Competitive Intelligence: the impact of management consulting on service businesses. In: Badri, Toppur N., and Gupta, Jatinder N.D., (eds.) Enhancing Competitiveness using Decision Sciences. Enhancing Competitiveness Using Decision Sciences, 1 . Macmillan Publishers India, New Delhi, India, pp. 283-289.

Rana, Rajib, Bergmann, Neil, and Trevathan, Jarrod (2011) Towards plug-and-play functionality in low-cost sensor network. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing. pp. 265-270. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

S

Suwanwiwat, Hemmaphan, Das, Abhijit, Saqib, Muhammad, and Pal, Umapada (2021) Benchmarked multi-script Thai scene text dataset and its multi-class detection solution. Multimedia Tools and Applications, 80. pp. 11843-11863.

Sravanath, K. Reddy Sai, Sundarum, N., and Desti, Kannaiah (2019) PEST analysis of present Indian telecom sector. International Journal of Innovative Technology and Exploring Engineering, 9 (2). pp. 4938-4942.

Sankupellay, M., Middleby, K., Liddell, M.J., McKeown, A., and Westcott, D. (2018) Detection of flying-foxes using automated audio recorders. In: Proceedings of the 2018 Ecoacoustics Congress. p. 29. From: 2018 Ecoacoustics Congress, 24-28 June 2018, Brisbane, QLD, Australia.

Suwanwiwat, Hemmaphan, Das, Abhijit, Ferrer, Miguel, Pal, Umapada, and Blumenstein, Michael (2018) An investigation of discrete Hidden Markov Models on handwritten short answer assessment system. In: Proceedings of the International Conference on Pattern Recognition and Artificial Intelligence. pp. 144-149. From: ICPRAI 2018: International Conference on Pattern Recognition and Artificial Intelligence, May 14-17 2018, Montréal, Canada.

Suwanwiwat, Hemmaphan, Das, Abhijit, Pal, Umapada, and Blumenstein, Michael (2018) ICFHR 2018 competition on Thai student signatures and name components recognition and verification (TSNCRV2018). In: Proceedings of the 16th International Conference on Frontiers in Handwriting Recognition. pp. 500-505. From: ICFHR 2018: 16th International Conference on Frontiers in Handwriting Recognition, 5-8 August 2018, Niagara Falls, NY, USA.

Stoodley, Ian, Sayyad Abdi, Elham, Bruce, Christine, and Hughes, Hilary (2018) Learning experiences in a giant interactive environment: insights from The Cube. Journal of Further and Higher Education, 42 (3). pp. 402-414.

Shi, Jun, Liu, Xiaoping, Fang, Xiaojie, Sha, Xuejun, Xiang, Wei, and Zhang, Qinyu (2018) Linear canonical matched filter: theory, design, and applications. IEEE Transactions on Signal Processing, 66 (24). pp. 6404-6417.

Suwanwiwat, Hemmaphan, Das, Abhijit, Ferrer, Miguel, Pal, Umapada, and Blumenstein, Michael (2017) An automatic student verification system utilising off-line Thai name components. In: Proceedings of the International Conference on Digital Image Computing. pp. 826-831. From: DICTA 2017: International Conference on Digital Image Computing: Techniques and Applications, 29 November - 1 December 2017, Sydney, NSW, Australia.

Salim, Omar H., Nasir, Ali A., Mehrpouyan, Hani, and Xiang, Wei (2017) Multi-relay communications in the presence of phase noise and carrier frequency offsets. IEEE Transactions on Communications, 65 (1). pp. 79-94.

Somerville, Mary M., and Bruce, Christine S. (2017) From transaction to transformation: organizational learning and knowledge creation experience within informed systems. In: Forster, Marc, (ed.) Information Literacy in the Workplace. Facet Publishing, London, UK, pp. 41-55.

Suwanwiwat, Hemmaphan, Pal, Umpanda, and Blumenstein, Michael (2016) An automatic off-line short answer assessment system using novel hybrid features. In: Proceedings of the International Conference on Digital Image Computing: Techniques and Applications. pp. 757-764. From: DICTA 2016: International Conference on Digital Image Computing: Techniques and Applications, 30 November - 2 December 2016, Gold Coast, QLD, Australia.

Suwanwiwat, Hemmaphan, Pal, Umapada, and Blumenstein, Michael (2016) An investigation of novel combined features for a handwritten short answer assessment system. In: Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition. pp. 102-107. From: ICFHR 2016: 15th International Conference on Frontiers in Handwriting Recognition, 23-26 October 2016, Shenzhen, China.

Suwanwiwat, Hemmaphan, Blumenstein, Michael, and Pal, Umapada (2015) A complete automatic short answer assessment system with student identification. In: Proceedings of the 13th International Conference on Document Analysis and Recognition. pp. 611-615. From: ICDAR 2015: 13th International Conference on Document Analysis and Recognition, 23-26 August 2015, Nancy, France.

Sukresna, I Made, Hamilton, John, and Tee, Singwhat (2015) Marketing channel connectivities within the Indonesian manufacturing sector. Journal of Economics, Business and Management, 3 (10). 324. pp. 1004-1008.

Suwanwiwat, Hemmaphan, Blumenstein, Michael, and Pal, Umapada (2015) Short answer question examination using an automatic off-line handwriting recognition system and a novel combined feature. In: Proceedings of the International Joint Conference on Neural Networks. pp. 1-8. From: IJCNN 2015: International Joint Conference on Neural Networks, 12-17 July 2015, Killarney, Ireland.

Suwanwiwat, Hemmaphan, Nguyen, Vu, Blumenstein, Michael, and Pal, Umapada (2014) Off-line handwritten Thai name recognition for student identification in an automated assessment system. In: Proceedings of the International Joint Conference on Neural Networks. pp. 2347-2353. From: IJCNN 2014: International Joint Conference on Neural Networks, 6-11 July 2014, Beijing, China.

Sukresna, I Made, Hamilton, John, and Tee, Singwhat (2013) The impact of market orientation on Indonesian manufacturer-distributor relationships. In: Proceedings of the 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference. pp. 783-795. From: 12th International Decision Sciences Institute Conference and 18th Asia Pacific Decision Sciences Institute Conference, 9-13 July 2013, Bali, Indonesia.

Suwanwiwat, Hemmaphan, Nguyen, Vu, and Blumenstein, Michael (2013) Off-line restricted-set handwritten word recognition for student identification in a short answer question automated assessment system. In: Proceedings of the 12th International Conference on Hybrid Intelligent Systems. pp. 167-172. From: HIS 2012: 12th International Conference on Hybrid Intelligent Systems, 4-7 December 2012, Pune, India.

Seidl, Isaac A., Johnson, Andrew J., Mantel, Peta, and Aitken, Peter (2010) A strategy for real time improvement (RTI) in communication during the H1N1 emergency response. Australian Health Review, 34 (4). pp. 493-498.

Song, Insu, and Diederich, Joachim (2010) Intention extraction from text messages. In: Lecture Notes in Computer Science (6443) pp. 330-337. From: ICONIP 2010 17th International Conference on Neural Information Processing, 22-25 November 2010, Sydney, NSW, Australia.

Simpson, Lindsay (2005) Countering the spin: how journalism education can combat the culture of silence. Australian Studies in Journalism, 15. pp. 119-132.

Simpson , Lindsay (2005) The impact of digital technology on journalism education. Australian Studies in Journalism, 14. pp. 114-123.

Stephenson, Peter, and Litow, Bruce (2001) Making the DDA run: two-dimensional ray traversal using runs and runs of runs. In: Proceedings of the 24th Australian Computer Science Conference. pp. 177-183. From: ACSC 2001: 24th Australasian Computer Science Conference, 29 January - 2 February 2001, Gold Coast, QLD, Australia.

Sutcliffe, Geoff (2000) The CADE-16 ATP system competition. Journal of Automated Reasoning, 24 (3). pp. 371-396.

Sutcliffe, Geoff (2000) System Description: SystemOnTPTP. In: Proceedings of the 17th International Conference on Automated Deduction (1831) pp. 406-410. From: Automated Deduction - CADE 17, 17 - 20 July 2000, Pittsburgh, Pennsylvania, USA.

T

Teoh, T.T., Nguwi, Y.Y., Elovici, Yuval, Cheung, N.M., and Ng, W.L. (2017) Analyst intuition based Hidden Markov model on high speed, Temporal Cyber Security Big Data. In: Proceedings of the 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). pp. 2080-2083. From: 13th International Conference on Natural Computation, Fuzzy System and Knowledge Discovery (ICNC-FSKD 2017), 29-31 July 2017, Guilin, China.

Tang, Chun Meng, and Chaw, Lee Yen (2016) Warranting value of information and tourists' trust in online booking websites. In: [Presented at International Conference on Internet Studies]. From: NETs 2016: International Conference on Internet Studies, 22-24 July 2016, Osaka, Japan.

Trevathan, Jarrod, Hamilton, Lee, and Read, Wayne (2016) Allocating sensor network resources using an auction-based protocol. Journal of Theoretical and Applied Electronic Commerce Research, 11 (2). pp. 41-63.

Thomas, Bryce, Jurdak, Raja, Zhao, Kun, and Atkinson, Ian (2016) Diffusion in colocation contact networks: the impact of nodal spatiotemporal dynamics. PLoS ONE, 11 (8). e0152624. pp. 1-21.

Tan, L.-H., Cho, S.-Y., and Nguwi, Y.-Y. (2016) Simulating cortical maps for attention shift in autism. International Journal of Computer Networks and Communications, 8 (4). pp. 71-81.

Tang, Chun Meng, and Ngerng, Miang Hong (2015) How do students select social networking sites? An analytic hierarchy process (AHP) model. International Journal of Cyber Society and Education, 8 (2). pp. 81-98.

Tang, Chun Meng, and Chaw, Lee Yen (2013) Readiness for blended learning: understanding attitude of university students. International Journal of Cyber Society and Education, 6 (2). pp. 79-100.

Tynan, Elizabeth (2011) Maralinga and the journalists: covering the bomb tests over generations. LiNQ, 38 (Dec). pp. 131-145.

Trevathan, Jarrod, and Read, Wayne (2011) Disarming the bid sniper. Journal of Electronic Commerce Research, 12 (3). pp. 176-186.

Trevathan, Jarrod, Ghodosi, Hossein, and Myers, Trina (2011) Efficient batch authentication for hierarchical wireless sensor networks. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing. pp. 217-222. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Tang, Chun Meng, and Marthandan, Govindan (2011) An analytical model to measure IS-enabled organizational effectiveness. International Journal of Enterprise Information Systems, 7 (2). pp. 50-65.

Trevathan, Jarrod, Atkinson, Ian, Read, Wayne, Johnstone, Ron, Bajema, Nigel, and McGeachin, James (2010) Establishing low cost aquatic monitoring networks for developing countries. In: Proceedings of Wireless Communications and Information Technology in Developing Countries Conference (327) pp. 39-50. From: Wireless Communications and Information Technology in Developing Countries Conference, 20 - 23 September 2010, Brisbane, QLD, Australia.

Trevathan, Jarrod, Atkinson, Ian, Read, Wayne, Johnstone, Ron, Chiffings, Tony, Bajema, Nigel, Lee, Yong Jin, and Scarr, Adam (2010) Overcoming the technical problems associated with effective coastal monitoring systems. In: Papers from Coast to Coast 2010 Actions for Change. p. 55. From: Coast to Coast 2010 Actions for Change, 20 - 24 September 2010, Adelaide, SA, Australia.

Tan, Kay Chuan, Goudarzlou, Atarod, and Chakrabarty, Ayon (2010) A bibliometric analysis of service research from Asia. Managing Service Quality, 20 (1). pp. 89-101.

Trevathan, Jarrod, and Read, Wayne (2009) Detecting shill bidding in online English auctions. In: Gupta, Manish, and Sharman, Raj, (eds.) Handbook of Research on Social and Organizational Liabilities in Information Security. Information Science Reference, Hershey, PA, USA, pp. 446-470.

Tang, Chun Meng, and Hen, Kai Wah (2009) Perceived importance of information systems teaching: the business students' perspective. SEGi Review, 2 (2). 1. pp. 3-11.

Trevathan, Jarrod, McCabe, Alan, and Read, Wayne (2008) Bidding agents that perpetrate auction fraud. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunications Networks: communications in computer and information science. Communications in Computer and Information Science, 23 . Springer, Berlin, Germany, pp. 57-71.

Trevathan, Jarrod, and Read, Wayne (2008) Cryptographic online auction schemes. In: Proceedings of IASK International Conference E-Activity and Leading Technologies 2008. pp. 193-203. From: IASK International Conference E-Activity and Leading Technologies 2008, 3-5 December 2008, Madrid, Spain.

Torpelund-Bruin, Christopher, and Lee, Ickjai (2008) Generalized Voronoi diagrams with obstacles for use in geospatial market analysis and strategy decisions. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application. pp. 287-290. From: 2008 International Workshop on Geoscience and Remote Sensing, 21-22 December, 2008, Shanghai, China.

Torpelund-Bruin, Christopher, and Lee, Ickjai (2008) Geographic knowledge discovery from geo-referenced Web 2.0. In: Proceedings of 2008 International Symposium on Intelligent Information Technology Application (3) pp. 291-294. From: 2008 International Workshop on Geoscience and Remote Sensing, 21 - 22 December 2008, Shanghai, China.

Trevathan, Jarrod, and Read, Wayne (2008) Secure online English auctions. In: Filipe, Joaquim, and Obaidat, Mohammad S., (eds.) E-Business and Telecommunication Networks: third international conference, ICETE 2006, Setubal, Portugal, August 2006, selected papers. Communications in Computer and Information Science, 9 . Springer , New York, USA, pp. 113-133.

Trevathan, Jarrod, and Read, Wayne (2008) Shilled: fraud and security in online auctions. VDM Verlag Dr. Muller, Saarbrucken, Germany, pp. 1-168.

Trevathan, Jarrod, and Read, Wayne (2007) Investigating shill bidding behaviour involving colluding bidders. Journal of Computers, 2 (10). pp. 63-75.

Trevathan, Jarrod, and Read, Wayne (2007) An adaptive shill bidding agent. In: Proceedings of the International Conference on e-Business 2007 (1) pp. 5-14. From: International Conference on E- Business 2007, 28-31 July 2007, Barcelona, Spain.

Trevathan, Jarrod, and Read, Wayne (2007) Detecting collusive shill bidding. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4) pp. 799-808. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Tee, Sing What, Bowen, Paul L., Doyle, Peta, and Rohde, Fiona H. (2007) Factors influencing organizations to improve data quality in their information systems. Accounting and Finance, 47 (2). pp. 335-355.

Trevathan, J., and Read, W. (2007) Privacy and security concerns for online share trading. In: Proceedings of the IASK International Conference: E-Activity and Leading Technologies. pp. 239-246. From: IASK International Conference: E-Activity and Leading Technologies 2007, 3-6 December 2007, Porto, Portugal.

Turner, J., and Bidwell, Nicola J. (2007) Through the looking glass: game worlds as representations and views from elsewhere. In: Proceedings of the Fourth Australasian Conference on Interactive Entertainment. From: Fourth Australasian Conference on Interactive Entertainment (IE 2007), 3-5 DEC 2007, Melbourne, VIC, Australia.

Trevathan, Jarrod, and Read, Wayne (2007) A simple shill bidding agent. In: Proceedings of the Fourth International Conference on Information Technology: New Generations (4) pp. 766-771. From: ITNG 2007 4th International Conference on Information Technology : New Generations, 2-4 April 2007, Las Vegas, Nevada, USA.

Trevathan, Jarrod, and Read, Wayne (2007) A software architecture for Continuous Double Auctions. In: Proceedings of IADIS International Conference: Applied Computing 2007. pp. 328-338. From: IADIS International Conference: Applied Computing 2007, 18-20 February 2007, Salamanca, Spain.

Tee, Sing What, Bowen, Paul L., Doyle, Peta, and Rohde, Fiona H. (2006) Data quality initiatives - striving for continuous improvements. In: Proceedings of the 1st Australasian Workshop on Information Quality. pp. 1-10. From: AusIQ 2006: 1st Australasian Workshop on Information Quality, 22-23 June 2006, Adelaide, SA, Australia.

Trevathan, Jarrod, and Read, Wayne (2006) Randomised dynamic traitor tracing. In: Proceedings of the International Conference on Signal Processing and Multimedia Applications. pp. 323-331. From: SIGMAP 2006 International Conference on Signal Processing and Multimedia Applications, 7-10 August 2006, Setubal, Portugal.

Trevathan, Jarrod, and Read, Wayne (2006) Undesirable and fraudulent behaviour in online auctions. In: Proceedings of the International Conference on Security and Cryptography Secrypt 2006. pp. 450-458. From: Secrypt 2006 International Conference on Security and Cryptography, 7-10 August 2006, Setubal, Portugal.

Trevathan, Jarrod, Ghodosi, Hossien, and Read, Wayne (2006) An anonymous and secure continuous double auction scheme. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences. From: 39th Annual Hawaii International Conference on System Sciences, 4-7 January 2006, Kauai, Hawaii.

Trevathan, Jarrod, and McCabe, Alan (2005) Remote handwritten signature authentication. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I) pp. 335-339. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Trevathan, Jarrod (2005) Security, anonymity and trust in electronic auctions. Crossroads, 11 (3). pp. 3-9.

Tran, Dat, and Pham, Tuan (2005) Cell phase classification using Markov and Gaussian mixture models. In: Proceedings of the 2005 Asia-Pacific Workshop on Visual Information Processing. pp. 48-52. From: 2005 Asia Pacific Workshop on Visual Information Processing, 11-13 December 2005, Kowloon, Hong Kong.

Tran, Dat, Pham, Tuan, and Zhou, Xiaobo (2005) Cell phase identification using fuzzy Gaussian mixture models. In: Proceedings of the 2005 International Symposium on Intelligent Signal Processing and Communication Systems. pp. 465-468. From: 2005 International Symposium on Intelligent Signal Processing and Communication Systems, 13 - 16 December 2005, Hong Kong.

Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2005) Design issues for electronic auctions. In: Proceedings of the Second International Conference on e-Business and Telecommunication Networks (I) pp. 340-347. From: Second International Conference on e-Business and Telecommunication Networks, 3-7 October 2005, Reading, UK.

Tran, Dat T., and Pham, Tuan D. (2005) Fuzzy estimation of priors in speaker recognition. WSEAS Transactions on Circuits and Systems, 4 (4). pp. 369-373.

Tran, Dat T., and Pham, Tuan D. (2005) Markov and fuzzy models for written language verification. WSEAS Transactions on Systems, 4 (4). pp. 268-272.

Turnbull, P.G. (2002) Pictures of health, and Australian history web project. In: Burton, O.V., (ed.) Computing in the Social Sciences and Humanities. University of Illinois Press, Illinois, USA, pp. 1-20.

U

Urli, Tommaso, Brotánková, Jana, Kilby, Philip, and Van Hentenryck, Pascal (2016) Intelligent habitat restoration under uncertainty. In: Proceedings of the 30th AAAI Conference on Artificial Intelligence. pp. 3908-3914. From: AAAI-16: 30th AAAI Conference on Artificial Intelligence, 12-17 February 2016, Phoenix, AZ, USA.

Ude, Ales, Gaskett, Chris, and Cheng, Gordon (2006) Foveated vision systems with two cameras per eye. In: Proceedings of IEEE International Conference on Robotics and Automation 2006. pp. 3457-3462. From: ICRA 2006 IEEE International Conference on Robotics and Automation, 15-19 May 2006, Orlando, FL, USA.

Uko, Ndaeyo (2004) Romancing the Gun: the press as a promoter of military rule. Africa World Press, Trenton, New Jersey, U.S.A..

Ude, A., Gaskett, C., and Cheng, G. (2004) Support Vector Machines and Gabor Kernels for Object Recognition on a Humanoid with Active Foveated Vision. In: Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robot Systems (IROS 2004). pp. 1-6. From: IROS2004, 28 Sep-2 Oct 2004, Sendai, Japan.

V

Vadivel, V. Sithira, and Nguwi, Yok-Yen (2014) Investigating tertiary students' perceptions on internet security. IT in Industry, 2 (1). pp. 17-24.

Volosencu, Constantin, Curiac, Daniel-Ioan, Banias, Ovidiu, Doboli, Alex, and Dranga, Octavian (2007) Knowledge based system for reliable perimeter protection using sensor networks. In: Proceedings of the International Joint Conference on e-Business and Telecommunications 2007. pp. 51-56. From: WINYS 2007 - International Joint Conference on e-Business and Telecommunications, 28-31 July 2007, Barcelona, Spain.

Volosencu, Constantin, Curiac, Daniel-Ioan, Doboli, Alex, and Dranga, Octavian (2007) Malicious node detection in sensor network using autoregression based on neural network. In: Proceedings of the Management and Control of Production and Logistics 4th IFAC Conference. pp. 571-577. From: Fourth International Conference on Management and Control of Production and Logistics, 27-30 September 2007, Sibiu, Romania.

Van Gils, Mark, Jansen, H., Neiminen, K., Summers, R., and Weller, P.R. (1997) Using artificial neural networks for classifying ICU patient states. IEEE Engineering in Medicine and Biology Magazine, 16 (6). pp. 41-47.

W

Wang, Gengkun, Xiang, Wei, Pickering, Mark, and Chen, Chang Wen (2016) Light field multi-view video coding with two-directional parallel inter-view prediction. IEEE Transactions on Image Processing, 25 (11). pp. 5104-5117.

Wang, Gengkun, Xiang, Wei, and Pickering, Mark (2016) A cross-platform solution for light field based 3D telemedicine. Computer Methods and Programs in Biomedicine, 125. pp. 103-116.

Wyatt, Lucy R., Atwater, Dan, Mantovanelli, Allessandra, Prytz, Arnstein, and Rehder, Sven (2013) The Australian Coastal Ocean Radar Network data availability and quality. In: Proceedings of the International Radar Symposium (2) pp. 405-410. From: IRS 2013: International Radar Symposium, 9-21 June 2013, Dresden, Germany.

Weir, Peter, Sandor, Christian, Swoboda, Matt, Nguyen, Thanh, Eck, Ulrich , Reitmayr, Gerhard, and Dey, Arindam (2013) BurnAR: involuntary Heat Sensations in Augmented Reality. In: Proceedings of the IEEE Virtual Reality Conference 2013. pp. 43-46. From: Proceedings of the IEEE Virtual Reality Conference 2013, 16-20 March 2013, Orlando, Florida, USA.

Willis, Simon, and Kikkert, Cornelius J. (2006) Design of a long-range wireless sensor node. In: Proceedings of the 2006 IEEE Asia Pacific Conference on Circuits and Systems. pp. 151-154. From: 2006 IEEE Asia Pacific Conference on Circuits and Systems, 4-7 December 2006, Singapore.

X

Xie, Jie, Towsey, Michael, Yasumiba, Kiyomi, Zhang, Jonglan, and Roe, Paul (2015) Detection of anuran calling activity in long field recordings for bio-acoustic monitoring. In: Proceedings of the Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing. pp. 1-6. From: ISSNIP 2015: Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 7-9 April 2015, Singapore.

Xiang, Wei, Zhu, Ce, Siew, Chee Kheong, Xu, Yuanyuan, and Liu, Minglei (2009) Forward error correction-based 2-D layered multiple description coding for error-resilient H.264 SVC video transmission. IEEE Transactions on Circuits and Systems for Video Technology, 19 (12). pp. 1730-1738.

Y

Yinghong, Yang, Yan, Li, Lui, Siu Man (Carrie), Kinchin, Irina, Heyeres, Marion, and Tsey, Komla (2018) County development and sustainability in China: a systematic scoping of the literature. OIDA International Journal of Sustainable Development, 11 (2). pp. 19-26.

Yeo, S-Y., and Nguwi, Y-Y. (2016) Analysing JPEG coding with masking. International Journal of Multimedia and its Applications, 8 (1). pp. 45-54.

Yan, Weiqing, Hou, Chunping, Zhou, Yuan, and Xiang, Wei (2016) Content- and disparity-adaptive stereoscopic image retargeting. Journal of Modern Optics, 63 (3). pp. 207-218.

Yang, Jianhua, and Lee, Ickjai (2007) Hybrid clustering for large sequential data. In: Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition 2007. pp. 76-81. From: AIPR-07 - International Conference on Artificial Intelligence and Pattern Recognition, 9-12 July 2007, Orlando, Florida, USA.

Yang, Jianhua, and Lee, Ickjai (2006) Hybrid O(n√n) clustering for sequential web usage mining. In: AI 2006: Advances in Artificial Intelligence (4304) pp. 1022-1026. From: 19th Australian Joint Conference on Artificial Intelligence, 4-8 December 2006, Hobart, TAS, Australia.

Yang, Jianjua, and Lee, Ickjai (2004) Cluster validity through graph-based boundary analysis. In: Proceedings of the 2004 International Conference on Information and Knowledge Engineering. From: 2004 International Conference on Information and Knowledge Engineering, 21-24 June 2004, Nevada, USA.

Z

Zhou, Yuan, Huo, Shuwei, Xiang, Wei, Hou, Chunping, and Kung, Sun-Yuan (2019) Semi-supervised salient object detection using a linear feedback control system model. IEEE Transactions on Cybernetics, 49 (4). pp. 1173-1185.

Zhou, Yuan, Wu, Qiong, Yan, Kangming, Feng, Liyang, and Xiang, Wei (2019) Underwater image restoration using color-line model. IEEE Transactions on Circuits and Systems for Video Technology, 29 (3). pp. 907-911.

This list was generated on Mon Mar 18 22:50:45 2024 AEST.