Follow

Theses from 2007

PDF

Alternative rehabilitation techniques and sustainable outcomes from mining using appropriate environmental management and mine closure planning in an arid region of Western Australia, Mark S. Hewitt

Link

How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward

PDF

Evolving Players for an Ancient Game: Hnefatafl, Philip Hingston

Opponent modelling, evolution, and the iterated prisoner's dilemma, Philip Hingston, D Dyer, L Barone, T French, and Graham Kendall

PDF

Experiments with Monte Carlo Othello, Philip Hingston and Martin Masek

Link

Risk Factors for Increased BTEX Exposure in Four Australian Cities, Andrea Hinwood, Clemencia Rodriguez, Tina Runnion, Drew Farrar, Frank Murray, Anthony Horton, Deborah Glass, Vicky Sheppeard, John Edwards, Lynnette Denison, Tom Whitworth, Chris Eiser, Max Bulsara, Rob Gillett, Jenny Powell, S Lawson, Ian Weeks, and Ian Galbally

Link

Movement patterns and habitat usage of Shark Bay dugongs [dataset], David K. Holley

PDF

A comparison of edge detection methods for segmentation of skin lesions in mobile-phone-quality images, Khanh Linh Hua

Link

Using Digital systems for deception and influence, W Hutchinson

Link

An Information-centric and Proactive Approach to Information Security teaching, William Hutchinson

Link

The Systemic Roots of Suicide Bombing, William Hutchinson

Link

Marine macrophytes directly enhance abundances of sandy beach fauna through provision of food and habitat, Rebecca Ince, Glenn Hyndes, Paul Lavery, and Mathew Vanderklift

Link

Bait Uptake and Caching by Red Foxes and Nontarget Species in Urban Reserves, Jennifer Jackson, Dorian Moro, Peter Mawson, Mark Lund, and Amanda Mellican

Link

Can SDV technology be utilised in a smartphone to prevent forensic analysis?, Peter James

Link

Securing VoIP: A framework to mitigate or manage risks, Peter James and Andrew Woodward

Data mining and genetic algorithm application in bioinformatics with microarray, Chao Ying Jiao and Dongguang Li

Link

A framework for the management of information security risks, Andrew Jones

PDF

The development of a south Texas health information gateway : negotiating the construction of information, Deborah J. Kaercher

PDF

Fine grained access control of ODF documents using XACML, Gautham Kasinath

PDF

Analysis of PKI as a Means of Securing ODF Documents, Gautham Kasinath and Leisa J. Armstrong

PDF

Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa J. Armstrong

Securing J2ME Mobile Application API Using XACML, Gautham Kasinath and Leisa J. Armstrong

Experiences and Methodologies Teaching Hands-On Cyberforensics Skills Online, Gary Kessler

Behavior of Nutrions in Sap of Eucalyptus camaldulensis in Arid Land of Western Australia, Toshinori Kojima, N. Saito, Y. Tanaka, Hiroyuki Hamano, S. Kato, K. Tahara, N. Takahashi, and Koichi Yamada

Link

Associative Data Mining for Alarm Groupings in Chemical Processes, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Link

A Model-Centric Approach for the Management of Model Evolution in Chemical Process Modelling, Chiou Peng Lam, Huaizhong Li, and Dong Xu

Link

Ant Colony Optimisation for Generation of Conformance Testing Sequences using a Characterising Set, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

PDF

Effect of leaf movement on epiphytic algal biomass of seagrass leaves, Paul Lavery, Tara Reid, Glenn Hyndes, and Beverley Van Elven

An Adaptive T-S type Rough-Fuzzy Inference System (ARFIS) for Pattern Classification, Chang Su Lee, Anthony Zaknich, and Thomas Braunl

Link

New species of Andersonia (Ericaceae) of conservation concern, Kristina L. Lemson

Reinforcement Learning of Competitive Skills with Soccer Agents, Jinsong Leng, Colin Fyfe, and Lakhmi Jain

Convergence Analysis on Approximate Reinforcement Learning, Jinsong Leng, Lakhmi Jain, and Colin Fyfe

PDF

Australian firearm identification system based on the ballistics images of projectile specimens, Dongguang Li

PDF

Firearm identification with hierarchical neural networks by analyzing the firing pin images retrieved from cartridge cases, Dongguang Li

PDF

Proceedings of the Sixth International Workshop for Applied PKC (IWAP2007), Dongguang Li

Link

User perception of the security & privacy concerns of RFID technology, F Li, N L. Clarke, and C Bolan

Link

Realising B2B e-commerce benefits: the link with IT maturity, evaluation practices, and B2BEC adoption readiness, Chad Lin, Yu-An Huang, and Janice Burn

Link

Issues and recommendations in evaluating and managing the benefits of public sector IS/IT outsourcing, Chad Lin, G Pervan, and Donald Mcdermid

Link

Stem cell and kinase activity-independent pathway in resistance of leukaemia to BCR-ABL kinase inhibitors, Shaoguang Li and Dongguang Li

Link

Monitoring Wetlands in a Salinizing Landscape: Case Studies from the Wheatbelt Region of Western Australia, M N. Lyons, Stuart Halse, N Gibson, D J. Cale, J A. Lane, C D. Walker, D A. Mickle, and Raymond Froend

Link

Varying foraging strategies of Labridae in seagrass habitats: Herbivory in temperate seagrass meadows?, Lachlan D. MacArthur and Glenn A. Hyndes

PDF

Effects of experimental reduction of light availability on the seagrass Amphibolis griffithii, P Mackey, CJ Collier, and Paul Lavery

PDF

An Investigation Into the Application of Data Mining Techniques to Characterize Agricultural Soil Profiles, Rowan J. Maddern

Link

The issues in securing electronic health information in transit, Rachel Mahncke and Patricia Williams

Link

State model diagrams - A systems tool for teaching network technologies and network management, S P. Maj, B Tran, and D Veal

Network Technology Education: A novel pedagogical model for novices and practicing professionals, Stanislaw Maj and Bao Tran

PDF

State Model Diagrams as a Pedagogical Tool - An International Evaluation, Stanislaw Maj and David Veal

PDF

Use of online tools to aid group work, Martin Masek

Link

Distribution and reproductive biology of the sandbar shark, Carcharhinus plumbeus (Nardo), in Western Australian waters, Rory Brian Mcauley, C. A. Simpfendorfer, Glenn A. Hyndes, and R. C.J. Lenanton

Link

Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry, Danny Ng and Andrew Woodward

Link

Network security devices and protocols using state model diagrams, C. Nuangjamnong, D. Veal, and S. P. Maj

Link

Detritivores as indicators of landscape stress and soil degradation, M. Paoletti, G. Osler, Adrianne Kinnear, D. Black, L. Thomson, A. Tsitsilas, D. Sharley, S. Judd, P. Neville, and A. D'Inca

PDF

Heat Shock Protein 90: A Potential Therapeutic Target in Leukemic Progenitor and Stem Cells Harboring Mutant BCR-ABL Resistant to Kinase Inhibitors, C Peng, Dongguang Li, and L Shaoguang

Link

The relationship between outdoor air quality and respiratory symptoms in young children, Clemencia Rodriguez, Russell Tonkin, J Heyworth, M Kusel, N De Klerk, P Sly, P Franklin, T Runnion, A Blockley, L Landau, and Andrea Hinwood

Link

A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head, PM Rodwell, Steven Furnell, and PL Reynolds

Link

An implementation of the method of aperture meridians for the ISO/CIE standard general sky, Geoffrey Roy, R. Kittler, and S. Darula

Link

An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah

Link

Intrusion Detection System (IDS) techniques and responses for mobile wireless networks, Krishnun Sansurooah

Link

Beyond chip monks and paper tigers: Towards a new culture of archival format specialists, Joanna Sassoon

Link

Sharing our story. An archaeology of archival thought, Joanna Sassoon

Link

Keeping up to date with history: Indigenous people and the recordkeeping professions, Joanna Sassoon, Kirsten Thorpe, and Anne Wright

Link

Cryptic diversity in Engaeus Erichson, Geocharax Clark and Gramastacus Riek (Decapoda:Parastacidae) revealed by mitochondrial 16S rDNA sequences, Mark B. Schultz, Sarah A. Smith, Alastair MM Richardson, Pierre Horwitz, Keith A. Crandall, and Christopher M. Austin

PDF

The systemic nature of critical infrastructure protection using a medium sized company as the case study, Jeffery Sewell

PDF

The value of oil mallee plantations and revegetated farm land in the southern wheatbelt region of Western Australia for the conservation of the Western Pygmy Possum (Cercartetus concinnus), Marie Short

Link

Considerations for the design of exergames, Jeffrey Ronald Sinclair, Philip Hingston, and Martin Masek

Information seeking behaviour of Electronic Document and Records Management Systems (EDRMS) users: implications for records management practices, Pauline Singh, Jane E. Klobas, and Karen Anderson

Link

Information Seeking Behaviour of Electronic Records Management Systems (ERMS) Users: Implications for Records Management Practices, Pauline Singh, Jane E. Klobas, and Karen Anderson

PDF

Using machine learning techniques to create AI controlled players for video games, Bhuman Soni

Link

Field survival and growth of clonal, micropropagated Eucalyptus marginata selected for resistance to Phytophthora cinnamomi, M. Stukely, C. Crane, J. McComb, and Ian J. Bennett

Link

Food web analysis in two permanently open temperate estuaries: consequences of saltmarsh loss?, CJ Svensson, Glenn Hyndes, and Paul Lavery

Link

ADSL router forensics part 1: An introduction to a new source of electronic evidence, Patryk Szewczyk

Link

An examination of the Asus WL-HDD 2.5 as a nepenthes malware collector, Patryk Szewczyk

PDF

Success? The impact of involving customers in E-commerce development, Julian Terry and Craig Standing

Link

Alien macroalgae in Denmark - a broad-scale national perspective, Mads S. Thomsen, Thomas Wernberg, Peter Stææhr, Dorte Krause-Jensen, Nils Risgaard-Petersen, and Brian R. Silliman

PDF

An investigation of network management methods, Bao Tran

Link

A New Taxonomy for Comparing Intrusion Detection Systems, CJ Tucker, Steven Furnell, BV Ghita, and PJ Brooke

Link

Bathymetric segregation of sea urchins on reefs of the Canarian Archipelago: Role of flow-induced forces, Fernando Tuya, J. Cisneros-Aguirre, L. Ortega-Borges, and R. J. Haroun

PDF

The use of the internet as a bibliotherapeutic tool for parents with children with disabilities or special needs : an exploratory study, Lynsey Uridge

Link

Food web interactions along seagrass–coral reef boundaries: Effects of piscivore reductions on cross-habitat energy exchange, J. F. Valentine, K. L. Heck Jr., D. Blackmon, M. E. Goecker, J. Christian, R. M. Kroutil, K. D. Kirsch, B. J. Peterson, M. Beck, and Mathew A. Vanderklift

Link

Honeypot Technologies and Their Applicability as a Strategic Internal Countermeasure, Craig Valli

PDF

IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems, Craig Valli

Link

Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward

Link

An overview of ADSL homed nepenthes honeypots in Western Australia, Craig Valli and Aaron Wooten

Defunking Dewey: Taking fiction out of the equation, Robyn Valli and Barbara Combes

Link

Proximity to reef influences density of small predatory fishes, while type of seagrass influences intensity of their predation on crabs, Mathew A. Vanderklift, Jason How, Thomas Wernberg, Lachlan D. MacArthur, K. L. Heck Jr., and J. F. Valentine

PDF

A GUI for the Deaf-Blind: An additional concepts paper, David Veal

Improving security for vision impaired ATM access via dynamic patterns, David Veal

PDF

IT Devices and Energy Consumption, David Veal

PDF

Some problems in Network and Data Centre Management, David Veal and Gurpreet Kohli

State model diagrams and home security system control , David Veal and Stanislaw Maj

Link

A Bipartite Graph Matching Approach to Generate Optimal Test Sequences for Protocol Conformance Testing, Jun Wang, Huaizhong Li, Jitian Xiao, and Chiou Peng Lam

Link

Vulnerability of seagrasses in the Great Barrier Reef to climate change, M Waycott, C Collier, Kathryn Mcmahon, P Ralph, Len McKenzie, J Udy, and A Grech

Link

Description of grinding patches found on granite bedrock near Cue, in central Western Australia, and a discussion of their significance, R. Esmee Webb

Link

A holistic perspective on models for medical information security, Patricia Williams

PDF

Information Governance: A Model for Security in Medical Practice, Patricia Williams

Link

Medical data security: Are you informed or afraid?, Patricia Williams

Link

Medical insecurity: when one size does not fit all, Patricia Williams

The effects of IT on information culture in general medical practice, Patricia Williams

PDF

An investigation into information security in general medical practice, Patricia A. Williams

PDF

Do Current Erasure Programs Remove Evidence of BitTorrent Activity?, Andrew Woodward and Craig Valli