Submissions from 2007
The Effect of an Exercise Intervention on Physical and Cognitive Function, Emotional Health and Quality of Life Among Older Adults with Dementia in Bangkok, Sirikul Karuncharernpanit
Analysis of PKI as a means of securing ODF documents, Gautham Kasinath and Leisa Armstrong
Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa Armstrong
Analysis of PKI as a Means of Securing ODF Documents, Gautham Kasinath and Leisa J. Armstrong
Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa J. Armstrong
Securing J2ME Mobile Application API Using XACML, Gautham Kasinath and Leisa J. Armstrong
Always the optimist?, Eric Kordt and Craig Standing
Reliability of time-to-exhaustion versus time-trial running tests in runners, Paul B. Laursen, Graeme T. Francis, Chris Abbiss, Michael J. Newton, and Kazunori Nosaka
Effect of leaf movement on epiphytic algal biomass of seagrass leaves, Paul Lavery, Tara Reid, Glenn Hyndes, and Beverley Van Elven
Knowledge mapping readiness, Joseph Lee and Dieter Fink
Tracing USB Device artefacts on Windows XP operating system for forensic purpose, Victor Chileshe Luo
Varying foraging strategies of Labridae in seagrass habitats: Herbivory in temperate seagrass meadows?, Lachlan D. MacArthur and Glenn A. Hyndes
Distribution and reproductive biology of the sandbar shark, Carcharhinus plumbeus (Nardo), in Western Australian waters, Rory Brian Mcauley, C. A. Simpfendorfer, Glenn A. Hyndes, and R. C.J. Lenanton
Molecular Markers of Circulating Melanoma Cells, Sandra Medic, Robert L. Pearce, Peter J. Heenan, and Melanie Ziman
Working in a cross-cultural setting, Peter Milnes, Clare Fenwick, Keith Truscott, and Winsome St John
Attenuation of muscle damage by preconditioning with muscle hyperthermia 1-day prior to eccentric exercise, Kazunori Nosaka, Makii Mishan Muthalib, A Lavender, and Paul B. Laursen
Network Security Devices and Protocols Using State Model Diagrams, C. Nuangjamnong, D. Veal, and S. P. Maj
On diverse routing for Shared Risk Link Groups (SRLGs) in Optical Mesh Networks, Quoc Viet Phung, Daryoush Habibi, and Hoang Nguyen
A Novel Beam Deflection Method for Wide Angle Laser Scanning, Kaveh Sahba, Kamal Alameh, and Clifton Smith
Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, and Clifton Smith
Cylindrical quasi-cavity waveguide for static wide angle pattern projection, Kaveh Sahba, Kamal Alameh, Clifton Smith, and Arie Paap
Photonics-based spectral reflectance sensor for plant discrimination, Kaveh Sahba, Sreten Askraba, and Kamal Alameh
An approach in identifying and tracing back spoofed IP packets to their sources, Krishnun Sansurooah
An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah
An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah
Intrusion Detection System (IDS) techniques and responses for mobile wireless networks, Krishnun Sansurooah
Managing Analysis, David Shaw
The Effect of Accentuated Eccentric Load on Jump Kinetics in High-Performance Volleyball Players, Jeremy Sheppard, Robert U. Newton, and Michael Mcguigan
Considerations for the design of exergames, Jeffrey Ronald Sinclair, Philip Hingston, and Martin Masek
The Phantasm of ATM Withdrawal, Nattakant Utakrit
Defunking Dewey: Taking fiction out of the equation, Robyn Valli and Barbara Combes
Electoral violence in mid nineteenth-century England and Wales, Justin Wasserman and Edwin Jaggard
The Effect of Classical Music on Painting Quality and Classroom Behaviour for Students with Severe Intellectual Disabilities in Special Schools, Russell F. Waugh and Jane V. Riddoch
Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb
Exposure assessment: a case study, Hayden Wing and Jacques Oosthuizen
Providing QoS for Symmetrical Voice/Video Traffic in Wireless Networks, Justin Wyatt, Daryoush Habibi, Iftekhar Ahmad, and Hushairi Zen
A Segregation Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad, and Justin Wyatt
Adaptive Segregation-Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, and Justin Wyatt
Submissions from 2006
Dynamic pacing strategies during the cycle phase of an ironman triathlon, Chris Abbiss, Marc Quod, David Martin, Kevin Netto, Kazunori Nosaka, Hamilton Lee, Rob Suriano, David Bishop, and Paul Laursen
Mobile Handset Forensic Evidence: a challenge for Law Enforcement, Marwan Al-Zarouni
Mobile handset forensic evidence: a challenge for law enforcement, Marwan Al-Zarouni
The Reality of Risks from Consented use of USB Devices, Marwan Al-Zarouni
Security risk assessment: Group approach to a consensual outcome, Ben Beard and David J. Brooks
Managing Information Security Complexity, Murray Brand
Modelling layer 2 and layer 3 device bandwidth using B-Node theory, Steven Cikara, Stanislaw Maj, and David Thomas Shaw
Literacy and recent history of diarrhoea are predictive of plasmodium falciparum parasitaemia in Kenyan adults, Rodney Coldren, Trish Prosser, Fredrick Ogolla, and Victor Ofula
Influence of different volumes and types of detached macrophytes on fish community structure in surf zones of sandy beaches, Karen Crawley, Glenn Hyndes, and Susanne Ayvazian
The effects of biotechnology education on Australian high school students' understandings and attitudes about biotechnology processes, Vaille Dawson and Christina Soames
From Systems to Network? Developments in the state records authority of New South Wales regional repositories, Wayne Andrew Doubleday
Pollution minimisation practices in the Australian mining and mineral processing industries, Catherine Driussi and Janis Jansz
Technological options for waste minimisation in the mining industry, Catherine Driussi and Janis Jansz
Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model, Ivana Elpez and Dieter Fink
A model of information security governance for e-business, Dieter Fink, Tobias Huegle, and Martin Dortschy
In search of community in Western Australia: A qualitative study of adults conceptualisations of their communities, Andria Green, Lynne Cohen, and Julie Ann Pooley
Identifying the Challenges in Teaching Computer Science Topics Online, Yuwanuch Gulatee and Barbara Combes
A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward
Security Issues of IEEE 802.16 (WiMAX), Jamshed Hasan
The framing of ATSIC Chairman Geoff Clark in the Australian, Lauren Heinritz and Beate Josephi
Gender Differences in Performance of Script Analysis by Older Adults, Edward Helmes, J Bush, Donna Pike, and Deirdre Drake
The influences of lawfulness attitudes on consumers' willingness to purchase counterfeit goods, Anas Hidayat and Katherine Mizerski
Phonological and syntactic processing and the role of working memory in reading comprehension among secondary school students, John Vincent Holsgrove and Alison Garton
Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime, Fahmid Imitaz
Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime, Fahmid Imtiaz
Honeypots: How do you know when you are inside one?, Simon Innes and Craig Valli
Honeypots: How do you know when you are inside one?, Simon Innes and Craig Valli
Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward
Core temperature and hydration status during an Ironman triathlon, Paul B. Laursen, Rob Suriano, Marc Quod, Hamilton Lee, Chris Abbiss, Kazunori Nosaka, David Martin, and David Bishop
Efficient p-Cycle Design by Heuristic p-Cycle Selection and Refinement for Servivable WDM Mesh Networks, Kungmang Lo, Daryoush Habibi, Quoc Viet Phung, Alexander Rassau, and Hoang N. Nguyen
A Hybrid p-Cycle Search Algorithm for Protection in WDM Mesh Networks, Kungmang Lo, Daryoush Habibi, Alexander Rassau, Quoc Viet Phung, Hoang Nguyen, and Byung Kang
Validated age and growth of the sandbar shark, Carcharhinus plumbeus (Nardo 1827) in the waters off Western Australia, Rory Brian Mcauley, Colin Simpfendorfer, Glenn Hyndes, Richard Allison, Justin Chidlow, Stephen Newman, and Rod C Lenanton
An in silico investigation into the discovery of novel cis-acting elements within the intronic regions of human PAX7, Maika G. Mitchell and Melanie Ziman
Loss of Heterozygosity Analysis at selected Single Nucleotide Polymorphism Sites in the Intronic Regions of PAX7 via In Silico biology and Microsatelite Analysis, Marika Mitchell, Diane Tabarini, and Melanie Ziman
Enhancing the forensic ICQ logfile extraction tool, Kim Morfitt
Structural Analysis of the Log Files of the ICQ Client Version 2003b, Kim Morfitt
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli
Joint optimization in capacity design of networks with p-cycle using the fundamental cycle set, Hoang Nguyen, Daryoush Habibi, Viet Q Phung, Stefan Lachowicz, Kungmang Lo, and Byung Kang
General Practitioners' Attitudes to Palliative Care: a Western Australian Rural Perspective, Moira O'Connor and Richelle Lee-Steere
Tackling Talk Through Action Learning, Rhonda Oliver, Yvonne Haig, and Samantha Vanderford
Issues in E-Learning: A Thai case study, Penporn Pagram and Jeremy Pagram
Nearshore sea temperature variability off Rottnest Island (Western Australia) derived from satellite data, Alan Pearce, Fabienne Faskel, and Glenn Hyndes
A segmentation method for shared protection in WDM networks, Quoc Viet Phung, Daryoush Habibi, Hoang Nguyen, and Kungmeng Lo
Non-contact Laser Spectroscopy for Plant Discrimination in Terrestrial Crop Spraying, Kaveh Sahba, Sreten Askraba, and Kamal Alameh
An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah
Taxonomy of computer forensics methodologies and procedures for digital evidence seizure, Krishnun Sansurooah
Improving community water conservation behaviour in Chachoengsao, Thailand, Kuakul Sathapornvajana, Lynne Cohen, Neil Drew, and Julie Ann Pooley
Improving Community Water Conservation Behaviour in Chachoengsao, Thailand, Kuakul Sathapornvajana, Lynne Cohen, Neil Drew, and Julie Ann Pooley
Electronic records management criteria and information Security, Alison Shaw and David Thomas Shaw
Mediated identification, David Thomas Shaw
An information operation model and classification scheme, David Thomas Shaw and Steven Cikara
Mediated Identification, D T. Shaw
An Information Operation Model and Classification Scheme, D T. Shaw and S Cikara
An Evaluation of a New Test of Reactive Agility and its Relationship to Sprint Speed and Change of Direction Speed, Jeremy Sheppard, Warren B. Young, Timothy Doyle, T A. Sheppard, and Robert U. Newton
Child Care For Infants and Toddlers: Where in The World Are We Going?, Margaret Sims, Andrew Guilfoyle, and Trevor Parry (Afl)
What is it about digital media games that engrosses young boys? A study in the sub-culture of Yu-Gi-Oh and its potential for improving educational outcomes, Kim Tomlinson-Baillie and Terence De Jong
Fatigue in Frail Elderly People, Christine Toye, Kate White, and Karen Rooksby
Belguim's intelligence community: new challenges and opportunities, Maarten Vanhorenbeeck
Computers can be your EFL friends if you ask them nicely, Vijittra Vonganusith and Jan Gray
Telemedicine and the Digital Door Doctor, Darren Webb and Patricia A. Williams
Forensics analysis of the contents of Nokia mobile phones, Brendan Williamson, Paul Apeldoorn, Ben Cheam, and Meaghan Mcdonald
Investigating the Accuracy of Wired and Wireless TCP/IP Fingerprinting on Honeyd, Suen Yek