Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4699 Other information and computing sciences > 469999 Other information and computing sciences not elsewhere classified"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | C | D | F | G | H | K | M | T
Number of items at this level: 16.

A

Allana, Sonal, and Chawla, Shailey (2021) ChildShield: a rating system for assessing privacy and security of internet of toys. Telematics and Informatics. (In Press)

Aghnout, Soraya, Karimi, Gholamreza, and Rahimiazghadi, Mostafa (2017) Modeling triplet spike-timing-dependent plasticity using memristive devices. Journal of Computational Electronics, 16 (2). pp. 401-410.

B

Brotánková, Jana, Urli, Tommaso, and Kilby, Philip (2016) Planning habitat restoration with genetic algorithms. In: Proceedings of the Genetic and Evolutionary Computation Conference. pp. 861-868. From: GECCO 16: Genetic and Evolutionary Computation Conference, 20-24 July 2016, Denver, CO, USA.

C

Cao, Jiannong, Chawla, Shailey, Wang, Yuqi, and Wu, Hanqing (2017) Programming platforms for big data analysis. In: Zomaya, Albert Y., and Sakr, Sherif, (eds.) Handbook of Big Data Technologies. Springer, Cham, Switzerland, pp. 65-99.

Carroll, Julie‐Anne, Sankupellay, Mangalam, Cornford, Michelle, and Bahir, Najmah (2016) 'Women on a Wiki': social constructivist analysis of the effectiveness of online collaborative spaces for reflective learning in women's health studies. In: Cvetkovic, Dragan, (ed.) Virtual Learning. InTechOpen, Rijeka, Croatia, pp. 87-99.

D

Dillon, Roberto, Chawla, Shailey, Hristova, Dayana, Gobl, Barbara, and Jovicic, Suzana (2020) Password policies vs. usability: when do users go "bananas"? In: Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing. pp. 148-153. From: TrustCom 2020: IEEE 19th International Conference on Trust, Security and Privacy in Computing, 29 December 2020 - 1 January 2021, Guangzhou, China.

Darwen, Paul J. (2018) Questioning the efficient markets hypothesis: big data evidence of non-random stock prices. In: Proceedings of the International Conference on Big Data Analysis. pp. 201-205. From: ICBDA 2018: IEEE 3rd International Conference on Big Data Analysis, 9-12 March 2018, Shanghai, China.

F

Fraser, Neil (2017) Strategy development and big data analytics. In: Geng, Hwaiyu, (ed.) Internet of Things and Data Analytics Handbook. John Wiley & Sons, New York, NY, USA, pp. 347-364.

G

Gomez, Miguel-Angel, Rivas, Fernando, Leicht, Anthony S., and Buldu, Javier M. (2020) Using network science to unveil badminton performance patterns. Chaos Solitons and Fractals, 135. 109834.

Gao, Pan, Xiang, Wei, and Liang, Dong (2019) Texture-distortion-constrained joint source-channel coding of multi-view video plus depth-based 3D video. IEEE Transactions on Circuits and Systems for Video Technology, 29 (11). pp. 3326-3340.

H

Hamilton, John (2020) The strategic change matrix and business sustainability across COVID-19. Sustainability, 12 (15). 6026.

K

Kuah, Adrian T.H., and Dillon, Roberto (2021) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, Florida, USA.

M

Mohring, Karl, Myers, Trina, and Atkinson, Ian (2018) Playing in traffic: an investigation of low-cost, non-invasive traffic sensors for street light luminaire deployments. International Journal of Grid and Utility Computing, 9 (4). pp. 333-344.

T

Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awareness on information technology professionals' behavior. Computers & Security, 79. pp. 68-79.

Teoh, T.T., Nguwi, Y.Y., Elovici, Yuval, Cheung, N.M., and Ng, W.L. (2017) Analyst intuition based Hidden Markov model on high speed, Temporal Cyber Security Big Data. In: Proceedings of the 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). pp. 2080-2083. From: 13th International Conference on Natural Computation, Fuzzy System and Knowledge Discovery (ICNC-FSKD 2017), 29-31 July 2017, Guilin, China.

Trevathan, Jarrod, Hamilton, Lee, and Read, Wayne (2016) Allocating sensor network resources using an auction-based protocol. Journal of Theoretical and Applied Electronic Commerce Research, 11 (2). pp. 41-63.

This list was generated on Wed Sep 22 22:52:30 2021 AEST.