Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4699 Other information and computing sciences > 469999 Other information and computing sciences not elsewhere classified"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | F | G | H | K | M | T
Number of items at this level: 17.

A

Allana, Sonal, and Chawla, Shailey (2021) ChildShield: a rating system for assessing privacy and security of internet of toys. Telematics and Informatics, 56. 101477.

Ahn, Euijoon, Liu, Na, Parekh, Tej, Patel, Ronak, Baldacchino, Tanya, Mullavey, Tracy, Robinson, Amanda, and Kim, Jinman (2021) A mobile app and dashboard for early detection of infectious disease outbreaks: development study. JMIR Public Health and Surveillance, 7 (3). e14837.

Ahn, Euijoon, Kim, Jinman, Rahman, Khairunnessa, Baldacchino, Tanya, and Baird, Christine (2018) Development of a risk predictive scoring system to identify patients at risk of representation to emergency department: a retrospective population-based analysis in Australia. BMJ Open, 8. e021323.

Aghnout, Soraya, Karimi, Gholamreza, and Rahimiazghadi, Mostafa (2017) Modeling triplet spike-timing-dependent plasticity using memristive devices. Journal of Computational Electronics, 16 (2). pp. 401-410.

B

Brotánková, Jana, Urli, Tommaso, and Kilby, Philip (2016) Planning habitat restoration with genetic algorithms. In: Proceedings of the Genetic and Evolutionary Computation Conference. pp. 861-868. From: GECCO 16: Genetic and Evolutionary Computation Conference, 20-24 July 2016, Denver, CO, USA.

C

Cao, Jiannong, Chawla, Shailey, Wang, Yuqi, and Wu, Hanqing (2017) Programming platforms for big data analysis. In: Zomaya, Albert Y., and Sakr, Sherif, (eds.) Handbook of Big Data Technologies. Springer, Cham, Switzerland, pp. 65-99.

Carroll, Julie‐Anne, Sankupellay, Mangalam, Cornford, Michelle, and Bahir, Najmah (2016) 'Women on a Wiki': social constructivist analysis of the effectiveness of online collaborative spaces for reflective learning in women's health studies. In: Cvetkovic, Dragan, (ed.) Virtual Learning. InTechOpen, Rijeka, Croatia, pp. 87-99.

D

Dillon, Roberto, Chawla, Shailey, Hristova, Dayana, Gobl, Barbara, and Jovicic, Suzana (2020) Password policies vs. usability: when do users go "bananas"? In: Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing. pp. 148-153. From: TrustCom 2020: IEEE 19th International Conference on Trust, Security and Privacy in Computing, 29 December 2020 - 1 January 2021, Guangzhou, China.

Darwen, Paul J. (2018) Questioning the efficient markets hypothesis: big data evidence of non-random stock prices. In: Proceedings of the International Conference on Big Data Analysis. pp. 201-205. From: ICBDA 2018: IEEE 3rd International Conference on Big Data Analysis, 9-12 March 2018, Shanghai, China.

F

Fraser, Neil (2017) Strategy development and big data analytics. In: Geng, Hwaiyu, (ed.) Internet of Things and Data Analytics Handbook. John Wiley & Sons, New York, NY, USA, pp. 347-364.

G

Gomez, Miguel-Angel, Rivas, Fernando, Leicht, Anthony S., and Buldu, Javier M. (2020) Using network science to unveil badminton performance patterns. Chaos Solitons and Fractals, 135. 109834.

Gao, Pan, Xiang, Wei, and Liang, Dong (2019) Texture-distortion-constrained joint source-channel coding of multi-view video plus depth-based 3D video. IEEE Transactions on Circuits and Systems for Video Technology, 29 (11). pp. 3326-3340.

H

Hamilton, John (2020) The strategic change matrix and business sustainability across COVID-19. Sustainability, 12 (15). 6026.

K

Kuah, Adrian T.H., and Dillon, Roberto (2021) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, Florida, USA.

M

Mohring, Karl, Myers, Trina, and Atkinson, Ian (2018) Playing in traffic: an investigation of low-cost, non-invasive traffic sensors for street light luminaire deployments. International Journal of Grid and Utility Computing, 9 (4). pp. 333-344.

T

Teoh, T.T., Nguwi, Y.Y., Elovici, Yuval, Cheung, N.M., and Ng, W.L. (2017) Analyst intuition based Hidden Markov model on high speed, Temporal Cyber Security Big Data. In: Proceedings of the 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). pp. 2080-2083. From: 13th International Conference on Natural Computation, Fuzzy System and Knowledge Discovery (ICNC-FSKD 2017), 29-31 July 2017, Guilin, China.

Trevathan, Jarrod, Hamilton, Lee, and Read, Wayne (2016) Allocating sensor network resources using an auction-based protocol. Journal of Theoretical and Applied Electronic Commerce Research, 11 (2). pp. 41-63.

This list was generated on Sun May 22 22:59:53 2022 AEST.