Submissions from 2008
Translating Theory Into Practice: Using Action Research to Introduce a Coordinated Approach to Emotional Care, Anne Williams, Sky Dawson, and Linda Kristjanson
A Practical Application of CMM to Medical Security Capability, Patricia Williams
Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams
How addressing implementation issues can assist in medical information security governance, Patricia Williams
In a "trusting" environment, everyone is responsible for information security, Patricia Williams
Is There an Ideal Forensic Process?, Patricia Williams
When trust defies common security sense, Patricia Williams
Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew
Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli
Outcomes of Students' Participation in University Based Courses, Phillip John Williams
The Digital Capture of Student Performance, Phillip John Williams
Using DEPTH as a Framework for the Determination of Teacher Professional Development, Phillip John Williams
Problem based learning: application to technology education in three countries, Phillip John Williams, Juan Iglesias, and Moshe Barak
Breast cancer surveillance in women with intellectual disabilities, Diane Willis, Catriona Kennedy, Lynn Kilbride, Daniel Satge, and Sheena G. Sullivan
Nutrient requirements of in vitro cultured Halophila ovalis and Posidoniq coriacea: nitrogen source, Julia G. Wilson and Ian J. Bennett
Eight weeks of ballistic exercise improves power independently of changes in strength and muscle fiber type expression, Jason Winchester, Jeffrey McBride, Margaret Maher, Richard Mikat, Brian Allen, Dennis Kline, and Michae R. McGuigan
Using NEAT for Continuous Adaptation and Teamwork Formation in Pacman, Markus Wittkamp, Luigi Barone, and Philip Hingston
The third generation ACD model : a semiparametric approach, Pipat Wongsaart, Jiti Gao, and David E. Allen
What Artefacts do Current BitTorrent Clients Leave Behind? , Andrew Woodward
Forensic implications of using the firewire memory exploit with Microsoft Windows XP, Andrew Woodward and Peter Hannay
Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis, Andrew Woodward and Craig Valli
The Gold Medal Fitness Program: A model for teacher change, Jan Wright, Deslea Konza, Doug Hearne, and Tony Okely
Opto-VLSI based Broadband Reconfigurable Optical Add-Drop Multiplexer, Feng Xiao, Budi Juswardy, and Kamal Alameh
Opto-VLSI-Based Reconfigurable Microwave Photonic Transversal Filter With Positive And Negative Coefficients, Feng Xiao, Budi Juswardy, and Kamal Alameh
Tunable True-Time Delay Unit Based on Opto-VLSI processing, Feng Xiao, Budi Juswardy, and Kamal Alameh
Novel broadband reconfigurable optical add-drop multiplexer employing custom fiber arrays and Opto-VLSI processors, Feng Xiao, Budi Juswardy, Kamal Alameh, and Yong Tak Lee
Mining evolving web sessions and clustering dynamic web documents for similarity-aware web content management, Jitian Xiao
A Type of Variation of Hamilton Path Problem with Applications, Jitian Xiao and Jun Wang
Transmission electron microscope characterisation of molar-incisor-hypomineralisation, Zonghan Xie, Nicky Kilpatrick, Michael Swain, Paul Munroe, and Mark Hoffman
On the critical parameters that regulate the deformation behaviour of tooth enamel, Zonghan Xie, Michael Swain, Paul Munroe, and Mark Hoffman
The motivation to become an expert athlete: How coaches can promote long-term commitment, B. W. Young and Nikola Medic
Self-restraint Admission Control for Ad-hoc WLANs, Hushairi Zen, Daryoush Habibi, and Iftekhar Ahmad
Node Admission Control For Multimedia Traffic In Ad-Hoc WLANs, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad, and Alexander Rassau
Optimized WLAN MAC Protocol for Multimedia Applications, Hushairi Zen, Daryoush Habibi, Alexander Rassau, and Iftekhar Ahmad
Converging Voice, Video and Data in WLAN with QoS Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, and Iftekhar Ahmad
Improving the IEEE802.15.4 Re-Association Process in Mobile Sensor Networks, Kartinah Zen and Daryoush Habibi
Improving Mobile Sensor Connectivity Time in the IEEE 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, and Iftekhar Ahmad
Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, and Iftekhar Ahmad
Whither a currency union in greater China?, Zhaoyong Zhang and Kiyotaka Sato
Is Greater China a currency union? A tale of the Chinese trio, Zhaoyong Zhang, Kiyotaka Sato, and Michael McAleer
Randomized controlled trial of the effects of calcium with or without vitamin D on bone structure and bone-related chemistry in elderly women with vitamin D insufficiency, K. Zhu, D. Bruce, N. Austin, Amanda Devine, P. R. Ebeling, and R. L. Prince
Effects of calcium and vitamin D supplementation on hip bone mineral density and calcium-related analytes in elderly ambulatory Australian women: A five-year randomized controlled trial, K Zhu, Amanda Devine, I M. Dick, S G. Wilson, and R L. Prince
The effects of high potassium consumption on bone mineral density in a prospective cohort study of elderly postmenopausal women, K Zhu, Amanda Devine, and RL Prince
Nursing Students' Perceptions of Desirable Leadership Qualities in Nurse Preceptors: A Descriptive Survey, Melanie Zilembo and Leanne Monterosso
Towards a Conceptual Framework for Preceptorship in the Clinical Education of Undergraduate Nursing Students, Melanie Zilembo and Leanne Monterosso
A Preliminary Investigation of Decision Tree Models for Classification Accuracy Rates and Extracting Interpretable Rules in the Credit Scoring Task: A Case of the German Data Set, Jozef Zurada and Chiou Peng Lam
Submissions from 2007
Is part of the mystery surrounding fatigue complicated by context?, Chris Abbiss and Paul Laursen
Hyperthermic-induced hyperventilation and associated respiratory alkalosis in humans, Chris Abbiss, Kazunori Nosaka, and Paul Laursen
The Effect of Light Intensity on Seed Production and Quality in a Number of Australian Wild Oat (Avena fatua L.) Lines, Steve W. Adkins and Leisa Armstrong
Preemption-aware instantaneous request call routing for networks with book-ahead reservation, Iftekhar Ahmad and Joarder Kamruzzaman
Rerouting Technique for Faster Restoration of Preempted Calls, Iftekhar Ahmad, Joarder Kamruzzaman, and Daryoush Habibi
Learning Platforms For Renewable Energy Awareness: Hydrogen Powered Vehicles, Yasir Al-Abdeli, Vishy Karri, Frank Bullen, Phuong Nguyen, John McCullough, and Steven Avery
The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams
Experimental demonstration of a reconfigurable time-spreading/wavelength-hopping OCDMA, Muhsen Aljada and Kamal Alameh
Passive and active optical bit-pattern recognition structures for multiwavelength optical packet switching networks, Muhsen Aljada and Kamal Alameh
Performance Evaluation of Passive and Active Optical Pattern Recognition Structures: A Comparison Study, Muhsen Aljada and Kamal Alameh
Wavelength-encoded OCDMA system using Opto-VLSI processors, Muhsen Aljada and Kamal Alameh
Experimental Demonstration of a Dynamic 10Gbit/s WDM Header/Label Recognition Structure, Muhsen Aljada, Kamal Alameh, Byeong Ha Lee, Yong Tak Lee, Kiegon Im, and Se-Jong Baik
Opto-VLSI-Based reconfigurable free space optical interconnects architecture, Muhsen Aljada, Kamal Alameh, Yong Lee, and I-S Chung
Experimental demonstration of a tunable laser using an SOA and an Opto-VLSI Processor, Muhsen Aljada, Rong Zheng, Kamal Alameh, and Yong Lee
Apology in civil law: A psycho-legal perspective, Alfred Allan
Apology in court, Alfred Allan
The impact of undisclosed versus disclosed limit orders: Evidence from inter-day returns, signalling, information effects on the ASX, David E. Allen, Alexander S. Cheng, and Wenling Joey Yang
Thoughts on VaR and CVaR, David E. Allen and Robert J. Powell
The Performance of Seasoned Equity Issues in a Risk-Adjusted Environment, David E. Allen and V Soucik
Modelling interstate tourism demand in Australia: A cointegration approach, David Allen, Ghialy Yap, and Riaz Shareef
Consumption patterns among New Zealand winery visitors - an exploratory study, Abel Alonso, David A. Cohen, and Rick Fraser
Does age matter? How Age Influences the Winery Experience, Abel Duarte Alonso, Rick A Fraser, and David Cohen
Investigating differences between domestic and international winery visitors in New Zealand, Abel Alonso, Rick A. Fraser, and David A. Cohen
Behavioural reponses to the terrorism threat: Applications of the metric of fear, Anne Aly, Mark Balnaves, and Christopher Chalon
Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics, Marwan Al-Zarouni
A proof-of-concept project for utilizing U3 technology in incident response, Marwan Al-Zarouni and Haitham Al Hajri
Taxonomy of iPhone activation and SIM unlocking methods, Marwan Al-Zarouni and Haitham Al Hajri
The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams
Education and training for records professionals, Karen Anderson
Global Archive and Record-keeping research agendas: Encouraging participation and getting over the hurdles, Karen Anderson
Terminally-ill people living alone without a caregiver: an Australian national scoping study of palliative care needs, Samar Aoun, LJ Kristjanson, D Currow, K Skett, L Oldham, and P Yates
Stroke Stories: Conveying Emotive Experiences in Aphasia, Elizabeth Armstrong and Hanna Ulatowska
The Application of Data Mining Techniques to Characterize Agricultural Soil Profiles, Leisa Armstrong, D Diepeveen, and R Maddern
Data mining can empower grower's crop decision making, L. Armstrong, Y. Vaugh, and D. Diepeveen
Attributes of innovation and the implementation of managerial tools: An activity based management technique, D. Askarany, Malcolm Smith, and H. Yazdifar
Enhancing learning through innovative technology education in a course on "Surf Equipment, Design, Materials and Construction", Jaromir Audy
Fear of falling in older women: A longitudinal study of incidence, persistence, and predictors, N. Austin, Amanda Devine, I. Dick, R. Prince, and D. Bruce
Review of diabetes among Indigenous peoples, Australian Indigenous HealthInfoNet
Teaching PHP with security in mind, Greg Baatard
Capturing and Utilising Participation Awareness Data in a Groupware Environment, Gregory Baatard
Identifying Criteria which Influence the Effectiveness of Public Profiles in Online Learning Environments, Gregory Baatard
Reportal - Assessing an Online Collaborative Document Authoring Environment, Gregory Baatard
Applying persuasion principles did not increase questionnaire response: a randomised control trial of a fridge magnet gift, H Bailey, L Robertson, Nadine Henley, B Armstrong, J Attia, and E Milne
Cycle-length variants in periodized strength/power training, Daniel Baker
Change in Power Output Across a High-Repetition Set of Bench Throws and Jump Squats in Highly Trained Athletes, Daniel G. Baker and Robert U. Newton
Light-emitting diode-compatible probes for indirect detection of anions in CE, Peter Balding, Mary Boyce, MC Breadmore, and M Macka
Zones of privacy: A prototype information-sharing database based on Moor's theory of privacy, Mark Balnaves and Joseph Luca
Exploring and evaluating Structuration Theory as a framework for investigating formal and informal learning within organisations, Llandis Barratt-Pugh
Kennett and Court Compared: Leadership Styles and Industrial Relations Reform in Victoria and Western Australia in the 1990s, Stephen Barton and Peter van Onselen
Oxidative Stress in a Rat Model of Chronic Gliosis, Kristyn Bates, Ralph Martins, and Alan Harvey
Emotional Processing in Spontaneous Confabulatory Syndrome After an Acquired Brain Injury, Rodrigo Becerra and David Millichap
The economic role of the Jerusalem temple in Achaemenid Judah: Comparative perspectives, Peter Bedford
The Persian near east, Peter R. Bedford