Follow

Submissions from 2006

Data Security and wireless networks - mutually exclusive?, Andrew Woodward

Link

LIARS: Laptop Inspector and Recovery System, Andrew Woodward

PDF

A Comparison of Heuristics for Scheduling Spatial Clusters to Reduce I/O Cost in Spatial Join Processing, Jitian Xiao

PDF

Agent-based Similarity-aware Web Document Pre-fetching, Jitian Xiao

PDF

Clustering Spatial Data for Join Operations Using Match-based Partition, Jitian Xiao

Link

Reformulation of the Generation of Conformance Testing Sequences to the Asymmetric Travelling Salesman Problem, Jitian Xiao, Chiou Peng Lam, Huaizhong Li, and Jun Wang

PDF

Leading hackers down the garden path, Suen Yek

Submissions from 2005

PDF

Taxonomy of WRT54G(S) Hardware and Custom Firmware, Marwan Al-Zarouni

PDF

A discussion on developing online learning communities for student information professionals, Karen Anderson

Link

Teaching about electronic records in an online learning environment, Karen Anderson

Link

Shaping the landscape: Fire–grazer interactions in an African Savanna, S Archibald, W J. Bond, William Stock, and D H. Fairbanks

The Role of an Online Community to Support Overweight Adolescents: A Survey of Australian Healthcare Professionals. Research in Progress, Leisa Armstrong and Rachel J. Mahncke

PDF

A salt on the land: The osmolyte production and physiological responses of selected Myrtaceae species exposed to salt and water stress, Janelle Atkinson

Link

Application of a novel phytotoxicity assay for the detection of herbicides in Hervey Bay and the Great Sandy Straits, Susan Bengston-Nash, Kathryn Mcmahon, Geoff Eaglesham, and Joachin Muller

RFID-Evaluation of Tag Security Schemes, Christopher Bolan

The Growth of 802.11b and 802.11g Networks in the Perth CBD, Western Australia, Christopher Bolan

The introduction of RFID Security into computer security courses, Christopher Bolan

The Effect of Contractors on Project Success: What the Literature Doesn't Say, Sue Bolton and Donald Mcdermid

Stable isotope composition of faeces as an indicator of seasonal diet selection in wild herbivores in southern Africa, Susan Botha and William Stock

Network Analysis Methods and Tools for Sme C-Commerce, Mark Brogan

C-Commerce Innovation: Unravelling the effects of knowledge ties on embedded network structure, Mark Brogan and Leisa Armstrong

Link

Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks

PDF

An exploration of student performance, utilization, and attitude to the use of a controlled content sequencing web based learning environment, Justin A. Brown

PDF

Towards persistent resource identification with the uniform resource name, Luke Brown

PDF

The systematics of the reducta complex of the burrowing freshwater crayfish Engaewa Riek, Quinton Burnham

Link

Why 'A forest conscienceness'?, Michael C. Calver, Heidi Bigler-Cole, Geoffery Bolton, John Dargavel, Andrea Gaynor, Pierre Horwitz, Jenny Mills, and G Wardell-Johnson

PDF

AD2US: An Automated Approach to Generating Usage Scenarios from UML Activity Diagrams, Robert Chandler, Chiou Peng Lam, and Huaizhong Li

A Finite State Grammar Based Decoding Method, Chaiyaporn Chirathamjaree

A method for the inference of non-recursive finite-state grammars, Chaiyaporn Chirathamjaree

Link

An Apporach to Integrate Heterogeneous Data Sources, Chaiyaporn Chirathamjaree

An Inference Method for Non-Recursive Context-Free Grammars, Chaiyaporn Chirathamjaree

Link

The use of formal grammars in isolated word recognition, Chaiyaporn Chirathamjaree

PDF

Method for Real-Time Non-Intrusive Video-Based Eye-Gaze Tracking, Joanne Church

Link

Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell

User Authentication for Mobile Devices: A Composite Approach, Nathan Clarke and Steven Furnell

The ultimate support package: educated library technicians in schools, Judith Clayden

Multiple Intelligences in Secondary Schools, Brenda Clover

Link

Storybook: Creating a personalised learning environment for children isolated by severe learning disabilities, Michael Collins and Joanne Church

PDF

StoryBook: Extending a personalised interactive learning environment to children with severe learning disabilities, Michael Collins and Sundrakanthi Singh

Link

Computers, ICTs and Online Curriculum: A Role for the Teacher Librarian, Barbara Combes

PDF

From smorgasbord to satisfying meal: An holistic approach to information literacy and lifelong learning, Barbara Combes

Link

The copy-and-paste culture of the Net Generation: Strategies for dealing with plagiarism, Barbara Combes

Influence of phenolics on micropropogation of Eucalyptus Marginata, Anetta Cutler-Staniek, Ian Bennett, and Mary Boyce

PDF

Seeking information superiority: Strategies for business in the commercial application of information operations, Martin Dart

Link

A range extension for Lerista lineopunctulata and a second record of Lerista lineata, near Yalgorup, Western Australia, Robert Davis and M. Bamford

Link

Embryonic Survival and Egg Numbers in Small and Large Populations of the Frog Heleioporus albopunctatus in Western Australia, Robert Davis and J Roberts

Link

Population genetic structure of the western spotted frog, Heleioporus albopunctatus (Anura: Myobatrachidae), in a fragmented landscape in south-western Australia, Robert Davis and J. Roberts

Link

A protection profiles approach to risk analysis for small and medium enterprises, Vassilis Dimopoulos and Steven Furnell

Link

Issues of Australian IT: Security Outsourcing, Sneza Dojkovski, Matthew Warren, and William Hutchinson

Link

An investigation into the paradox of organisational flexibility versus security: A research project overview, Rosanna Fanciulli

A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments, Klaus Fischer, Udo Bleimann, Woldemar Fuhrmann, and Steven Furnell

Link

Why users cannot use security, Steven Furnell

Considering the role of academic qualifications for IT security professionals, Steven Furnell, Vasilis Katos, and Nathan Clarke

TCP performance estimation using neural networks modelling, Bogdan Ghita, Steven Furnell, Benn Lines, and Emmanuel Ifeachor

Link

Human health and forested ecosystems: Exploring historical transitions of diseases and perceptions, Marisa Gilles and Pierre Horwitz

Link

A regression algorithm for rock magnetic data mining, Wanwu Guo

Link

A statistical reasoning scheme for geochemical data mining and automatic anomaly identification and classification, Wanwu Guo

Link

A Sufficient Criterion for Reliability Analysis on Statistical Results of Vector Datasets, Wanwu Guo

Data Mining Alogrithm for Rock Magnetic Data Analysis, Wanwu Guo

Link

Phytochemical changes in leaves of subtropical grasses and fynbos shrubs at elevated atmospheric CO2 concentrations, Dawood Hattas, William Stock, Wilfred Mabusela, and Ivan Green

Link

Cluster roots of Leucadendron laureolum (Proteaceae) and Lupinus albus (Fabaceae) take up glycine intact: An adaptive strategy to low mineral nitrogen in soils?, Heidi-Jayne Hawkins, Gabrielle Wolf, and William Stock

Link

Exploring Student's Abilities to Use Two Different Styles of Structural Representation in Organic Chemistry, Janette Head, Robert Bucat, Mauro Mocerino, and David Treagust

Link

Using games and simulation to teach AI, Philip Hingston and Barbara Coombes

PDF

Enumerating Knight's Tours using an Ant Colony Algorithm, Philip Hingston and Graham Kendall

Link

Potential health impacts associated with peat smoke: a review, Andrea Hinwood and Clemencia Rodriguez

PDF

Identity synthesis: Creating an identity from scratch, Lennon Hopkins

Link

Fire and wetland soils and sediments on the Swan Coastal Plain: An introduction, Pierre Horwitz and Ralph Douglas Smith

Link

Water quality responses to fire, with particular reference to organic-rich wetlands and the Swan Coastal Plain: A review, Pierre Horwitz and Beate Sommer

Link

Parasites, ecosystems and sustainability: An ecological and complex systems perspective, Pierre Horwitz and Bruce Wilcox

PDF

Designing Comminution Circuits with a Multi-Objective Evolutionary Algorithm, Simon Huband, Luigi Barone, Philip Hingston, Lyndon While, David Tuppurainen, and Richard Bearman

Link

A scalable multi-objective test problem toolkit, Simon Huband, Luigi Barone, Lyndon While, and Philip Hingston

An Information Centric approach to Information Security Teaching, William Hutchinson

PDF

Information security: A misnomer, William Hutchinson

Link

The 'Flexibility' of Official Information during Contemporary Conflict, William Hutchinson

The Relationship between Western Governments, Military and the Media during conflicts since 1980, William Hutchinson

Link

The 'Will' and information operations, William E. Hutchinson

Link

Does transported seagrass provide an important trophic link in unvegetated, nearshore areas?, Glenn Hyndes and Paul Lavery

Link

Secure deletion and the effectiveness of evidence elimination software, Simon Innes

Link

Turning a linksys WRT54G into more than just a wireless router, Simon Innes

PDF

Analysis of channel estimation error of OFDM systems in rayleigh fading, Bin Jiao, Jitian Xiao, and Jinlin Wang

PDF

Using process modelling to capture requirements for a digital library, Michael Johnstone

PDF

2D-barcode for mobile devices, Hiroko Kato

Link

Using human computer interaction principles to promote usable security, D Katsabas, S M. Furnell, and P S. Dowland

Link

Variations in the dietary compositions of morphologically diverse syngnathid fishes, Alan Kendrick and Glenn Hyndes

Link

A conceptual model as an aid to student understanding of network security, G Kohli, S P. Maj, G Murphy, and D Veal

PDF

An investigation into the use of B-Nodes and state models for computer network technology and education, Gurpreet Kohli

Link

The integration of state diagrams with competency-based assessment, G Kohli, D Veal, S P. Maj, and G Murphy

Link

A computer network laboratory based on the concept of virtual machines, Wojciech Kuczborski

Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset, Julien Lecomte, Nathan Clarke, and Steven Furnell

Link

Using Symbolic Execution to Guide Test Generation, Gareth Lee, John Morris, Kris Parker, Gary A. Bundell, and Chiou Peng Lam

Link

Using Anti-Ant-Like Agents to Generate Test Threads from the UML Diagrams, Huaizhong Li and Chiou Peng Lam

PDF

An Ant Colony Optimization Approach to Test Sequence Generation for State-Based Software Testing, Huaizhong Li and Chiou Peng Lam

Link

An Ecological Risk Assessment of Irrigation in the Ord River Catchment, a Highly Disturbed and Poorly Understood Area in the Wet-Dry Tropics of Australia, Mark Lund

PDF

Healthcare practitioners' perspectives on the use of e-health applications to support overweight and obese adolescents, Rachel J. Mahncke

Link

A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, Stanislaw Maj, Gurpreet Kohli, and Tony Fetherston

Making Assignments More Authentic, Donald Mcdermid

Link

Herbicide contamination and the potential impact to seagrass meadows in Hervey Bay, Queensland, Australia, Kathryn McMahon, Susan Bengston-Nash, Geoff Eaglesham, Joachin Muller, and Norm Duke

PDF

Multinomial Representation of Majority Logic Coding, John B. Moore and Keng T. Tan

PDF

After Conversation - A Forensic ICQ Logfile Extraction Tool, Kim Morfitt and Craig Valli

Effects of Steganography In The Business World: How Mobile Devices Can Make A Difference, Danny Ng