Follow

Submissions from 2003

The Role of Wireless Network Technology in Network Centric Warface, Susan Webb

Link

Regional differences in kelp-associated algal assemblages on temperate limestone reefs in south-western Australia, Thomas Wernberg, Gary A. Kendrick, and Julia C. Phillips

Link

Differences in recreationally targeted fishes between protected and fished areas of a coral reef marine park, Mark Westera, Paul Lavery, and Glenn Hyndes

PDF

Isolation and characterisation of a pax group III gene from the freshwater crayfish cherax destructor: Implications for the evolution of muscle regeneration, Robert B. White

PDF

A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli

An Efficient algorithm for scheduling spatial join operations in spatial databse systems, Jitian Xiao

Match Based SJP Cluster sequencing and scheduling in spatial databases, Jitian Xiao

A framework for the use of deception in Network Security, Suen Yek

Measuring the Effectiveness of deception in a wireless honeypot, Suen Yek

PDF

Variability in water use by phreatophytic Banksia woodland vegetation of the Swan Coastal Plain, Western Australia, Sandra Jane Zencich

Link

Digital Holography and its Applications, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Link

DSP - based Digital Control of Ultra-low Frequency Vibration Isolators, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Fully Digital Control of a Pre-Isolator for Gravitational Wave Detection, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Submissions from 2002

Link

Back to the Future: The Expanding Role of Strategic Communcations within the Bush Administration, Edwin Leigh Armistead

Link

Solid-phase microextraction in food analysis: With particular reference to wine, M C. Boyce and E E. Spickett

Link

A Security Evaluation Criteria, W J Brooks, M J. Warren, and W Hutchinson

Flexible Rules and Actions for Delivery of Online Courseware Learning Materials, Justin Brown

A Case for Games in Software Engineering, Craig William Caulfield and Stanislaw Maj

Link

An XML, DTD for Subject Related Resources, Robert Chandler and Karen Anderson

Link

A Model Architecture to Combat Security Issues in Mobile Commerce, Chaiyaporn Chirathamjaree and Rajagopal Gururajan

Link

Mobile Commerce: A Model to Address New Financial Transaction Security Concerns, Chaiyaporn Chirathamjaree and Rajagopal Gururajan

RISS-ECU InNovative Technologies for University Teaching, Chaiyaporn Chirathamjaree and Rajagopal Gururajan

A Mediated Data Model for Heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai

PDF

The Mediated Integration Arcitecture for heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai

An Investigation into the Community Information Database System in the Northeast of Thailand: Community Empowerment through Community Learning Centres, Chaiyaporn Chirathamjaree and C Wongchachom

PDF

Teachers, teams and technology: Investigating a team approach for supporting teachers' uptake of ICT, Barnard D. Clarkson

Link

Out in the wide world with a new 'piece of paper': a survey of graduates of Edith Cowan University's Batchelor of Science (Library Technology), Judith Clayden

Link

Voting in the New Millenium: eVoting Holds the Promise to Expand Citizen Choice, Vincent Cordonnier and Anthony Craig Watson

Dynamic Landscape Generation using Page Management, Maurice Danaher

An approach to real-time plant generation, Maurice Danaher and Warren Creemers

Object Segmentation Using Colour for Security Applications on Mobile Devices, Maurice Danaher and Lesley Hopkins

Creating a University Website with VRML, Maurice Danaher and Choon-Sig Lee

Mobile Home Security with GPRS, Maurice Danaher and D Nguyen

From Sword to Software: The Evolution of Weapons of Conflict, John Davey

Link

Dominating the attacker: Use of intelligence and counterintelligence in cyberwarfare, John Davey and Helen Armstrong

PDF

Cutting Hacking: Breaking from Tradition, Rick Duley and Stanislaw P. Maj

Link

Influence of Groundwater Depth on the Seasonal Sources of Water Accessed by Banksia Tree Species on a Shallow, Sandy Coastal Aquifer, Raymond Froend, Sandra Zencich, Jeffrey Turner, and Vit Gailitis

Link

Avifauna of Mount Tomah botanic gardens and Upper Stockyard Gully in the Blue Mountains, New South Wales, G. R. Fulton

Link

Pneumaticity of the dorsal foramen and dorsal sulcus of the sternum in Austalasian Passeriformes, Graham Russell Fulton and W E Boles

A Neural System for MCDF Operations: Design and Testing, Wanwu Guo and Anthony Watson

Link

A Neural System Design for CDF Operations, Wanwu Guo and Anthony Craig Watson

Link

Modification of Conjugate Directional Filtering: from CDF to MCDF, Wanwu Guo and Anthony Craig Watson

Link

Improving the Effectiveness of Deceptive Honeynets Through an Empirical Learning Approach, Nirbhay Gupta

Using Finite State Automata for Sequence Mining, Philip Hingston

PDF

Evolving Crushers, Philip Hingston, Luigi Barone, and Ronald While

A Dynamic Communication Algorithm for Digital Halftoning, Philip Hingston and Lyndon While

Designing Crushers with a Multi-Objective Evolutionary Algorithm, Philip Hingston, Ronald While, and Luigi Barone

Link

Located Toxicology: The Need for Alternative Methodologies to Address Toxicological Significance, Pierre Horwitz and Pam Nichols

Link

Challenges in Undergraduate Computer Security Education, Christopher Hu

Link

Concepts in information warfare, W Hutchinson

Link

From Information Security to Information Warfare: A paradigm shift, William Hutchinson

Network Theory - The Demise of Systems Thinking?, William Hutchinson

The User Abuse of Logic in Contemporary Western Perception Management, William Hutchinson

Link

Aggression on the networks: An Australian viewpoint, William Hutchinson and Matthew Warren

Australian Hackers: An Ethical Perspective, William Hutchinson and Matthew Warren

Information Superiority and the Role of an Organisation's Network, William Hutchinson and Matthew Warren

Security Risk Analysis in E-Commerce, William Hutchinson and Matthew Warren

Link

Will new laws be effective in reducing web sponsorship of terrorist groups, William Hutchinson and Matthew Warren

Link

Truth, lies, reality and deception: An issue for e-commerce, W Hutchinson and M Warren

Modelling E-business Security Requirements: Developer and Client Expectations, Michael Johnstone, Donald Mcdermid, and John Venable

Link

Shared Use of Diagrams in requirements Elicitation; roles, expectations and behaviours, Michael Johnstone, Donald Mcdermid, and John Venable

PDF

Use of the d15N signatures of different functional forms of macroalgae and filter-feeders to reveal temporal and spatial patterns in sewage distribution, Mahvesh Khan, Paul Lavery, and A J Smit

Creating Opportunities from Challenges in On-line Introductory Biology, Annette Koenders

Link

Myofibrillar Protein Composition of Muscle Fibres from Regenerating and Pristine Claws of the freshwater Crayfish, Cherax Destructor, Annette Koenders, Lisa Cutler, Jan West, M Klemm, and Donald Mykles

Link

The Effects of Moult-induced atrophy on Claw Muscle of the Yabby, Cherax Destructor, Annette Koenders, Tina Lamey, and Jan West

Link

Ubiquitin and actin expression in claw muscles of land crab, Gecarcinus lateralis, and american lobster, Homarus americanus: Differential expression of ubiquitin in two slow muscle fiber types during molt-induced atrophy, Annette Koenders, Xiaoli Yu, Ernest S. Change, and Donald L. Mykles

Decomposition of Logic Networks Based on Partition Products, Wojciech Kuczborski

FPGA Implementation of Complex Boolean Functions, Wojciech Kuczborski

Highly Deployable Wireless Networks, Wojciech Kuczborski

The Application of Field Programmable Gate Arrays in Engineering Education, Wojciech Kuczborski

Invasion of Indigenous Vegetation in South-West by Leptospemum Laevigatum (Myrtaceae), Anya Lam and Eddie Van Etten

PDF

A Comparison of Spatial and Temporal Patterns in Epiphytic Macroagal Assemlages of the Seagrasses Amphibolis and Posidonia Coriacea, Paul Lavery and Mathew Vanderklift

Performing Firearm Identification Ballistic Database Operation Based on an Intranet, Dongguang Li and Bin Jiao

Link

A Global Optimisation Technique for Optical Thin Film Design, Dongguang Li and Anthony Craig Watson

Link

Cleavage Luminescence from Silicon, Dongguang Li and Anthony Craig Watson

Link

Optical Thin Film Optimization Design Using Genetic Algorithms, Dongguang Li and Anthony Craig Watson

B-Nodes: A bridge between the business model, information model and infrastructure model, Stanislaw Maj and Gurpreet Kohli

Modeling Global IT Structures Using B-Nodes, Stanislaw Maj and Gurpreet Kohli

So What's in a Use Case?, Donald Mcdermid

Using Strategic Choice to Make IS Decisions Quickly, Donald Mcdermid

A Framework on Evaluating and Managing the Benefits of IT, Donald Mcdermid, Chien Lin, and Graham Pervan

Link

Diets and predictions of feeding rate of house mice and Lakeland Downs short-tailed mice inhabiting an arid-zone island in Western Australia, D Moro and S D Bradshaw

Comparison of Baits and Bait Stations for the Selective Control of Wild House Mice on Thevenard Island, Western Australia, Dorian Moro

Link

An analysis of public key cryptosystems, Yousef Mubarak Bani Hammad

Link

Myofibrillar protein isoform expression is correlated with synaptic efficacy in slow fibres of the claw and leg opener muscles of crayfish and lobster, Donald L. Mykles, Scott Medler, Annette Koenders, and Robin Cooper

The Use of Local Systemic Action (LSA) to Develop Conceptual Models and to Solve Problem of Space Science and Technology Management in Indonesia, Sudibyo Sastrohardjono and William Hutchinson

Link

Measurement and observations inside a PC, Geoffrey I. Swan, David Veal, and S Paul Maj

Link

An Examination of Non-Business Usage of the World Wide Web in Two Western Australian Organisations, Craig Valli

The Misuse of the Internet at Work, Craig Valli

The New Homeland Defense, Craig Valli

The Proxy Bakers Dirty Dozen - An Analysis of Abusive Users of a WWW Cache, Craig Valli

PDF

With Speed the Hacker Cometh, Craig Valli

PDF

If You go Down the Internet Today - Deceptive Honeypots, Craig Valli and Suen Yek

Link

Patterns in fish assemblages 25 years after major seagrass loss, M A. Vanderklift and C A. Jacoby

Link

Cyberspace ethics and information warfare, Matthew Warren and William Hutchinson

Link

Application of Modified Conjugate Directional Filtering in Image Processing, Anthony Craig Watson and Wanwu Guo

Swarming in Information Warfare, Leigh Watson

Link

Wireless Insecurity - Current Issues with Securing Wlan's Utilising 802.11b Technology, Susan Gail Webb

Link

A Rich Storehouse for the Relief of Man's Estate: Education for Knowledge Management, Victoria Wilson, Philip Hingston, and Mark Brogan

PDF

Firewall or Folly - An Initial Investigation into the Effectiveness of Personal Firewalls in Securing Personal Computers from Attack, Jeshua Yee