Submissions from 2007
Identifying Criteria which Influence the Effectiveness of Public Profiles in Online Learning Environments, Gregory Baatard
Reportal - Assessing an Online Collaborative Document Authoring Environment, Gregory Baatard
Light-emitting diode-compatible probes for indirect detection of anions in CE, Peter Balding, Mary Boyce, MC Breadmore, and M Macka
Managing digital forensic knowledge an applied approach, David P. Biros, Mark Weiser, and John Whitfield
A single channel attack on 915MHz radio frequency identification systems, Christopher Bolan
KILL features of RFID tags in a medical environment: Boon or burden?, Christopher Bolan
Radio Frequency Identification: a review of low cost tag security proposals, Christopher Bolan
Determination of additives and organic contaminants in food by CE and CEC, Mary Boyce
Use of the WFG Toolkit and PISA for Comparison of MOEAs, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, and Philip Hingston
Forensic Analysis Avoidance Techniques of Malware, Murray Brand
Knowledge networking for innovation: Social network analysis (SNA) and heuristics for knowledge diffusion, Mark Brogan
Network engineering for C-Commerce innovation: the role of trust, Mark Brogan and Leisa Armstrong
Theory, classroom practice and ICT: Exploring the connections, Christopher Brook and Barnard Clarkson
Evolution of a database security course: Using non-enterprise teaching tools, Justin Brown
Teaching XML and XSLT in an Introduction to Markup Languages: Course and Content Design, Justin Brown
The Western Australian regional forest agreement: Economic rationalism and the normalisation of political closure, Martin Brueckner
Retrospective analysis of epiphyte assemblages in relation to seagrass loss in a eutrophic coastal embayment, ML Cambridge, JR How, Paul Lavery, and MA Vanderklift
Dealing with Concurrent Regions during Scenario Generation from Activity Diagrams, Robert Chandler, Chiou Peng Lam, and Huaizhong Li
Mediation-based Data Integration System, Chaiyaporn Chirathamjaree
The Use of Context-free Grammars in Isolated Word Recognition, Chaiyaporn Chirathamjaree
Advanced User Authentication for Mobile Devices, NL Clarke and Steven Furnell
Authenticating mobile phone users using keystroke analysis, NL Clarke and Steven Furnell
Morphological, growth and meadow characteristics of the seagrass Posidonia sinuosa along a depth-related gradient of light availability, CJ Collier, Paul Lavery, RJ Masini, and PJ Ralph
The importance of human factors when assessing outsourcing security risks, Carl Colwill and Andy Jones
The search for information and the Net Generation, Barbara Combes
Information Dichotomy Article Schools Version, Barbara Combes and Robyn Valli
The future of learning objects in educational programs, Barbara Combes and Robyn Valli
Negative interactions: The influence of predators and herbivores on prey and ecological systems, S Connell and Mathew Vanderklift
The role of different types of detached macrophytes in the food and habitat choice of a surf-zone inhabiting amphipod, Karen R. Crawley and Glenn A. Hyndes
Variation among diets in discrimination of delta13C and delta15N in the amphipod Allorchestes compressa, Karen R. Crawley, Glenn A. Hyndes, and Mathew A. Vanderklift
The use of detached kelp (Ecklonia radiata) by seagrass-associated mesograzers in temperate South-Western Australia, Christopher Doropoulos
Transformation Methodology for UML 2.0 Activity Diagram into Colored Petri Nets, Usman Farooq, Chiou Peng Lam, and Huaizhong Li
Improving decision making : The case for internal intelligence functions, Charlene Kaye Farr
Assessing nitrogen fixation in mixed- and single-species plantations of Eucalyptus globulus and Acacia mearnsii, DI Forrester, M Schortemeyer, William Stock, J. Bauhus, PK Khanna, and AL Cowie
Anisohydric but Isohydrodynamic: Seasonally Constant Plant Water Potential Gradient Explained by a Stomatal Control Mechanism Incorporating Variable Plant Hydraulic Conductance, Peter Franks, Paul Drake, and Raymond Froend
An Assessment of Website Password Practices, Steven Furnell
Making Security Usable: Are Things Improving?, Steven Furnell
Assessing the Security Perceptions of Personal Internet Users, Steven Furnell, P Bryant, and AD Phippen
A study of the parallelisation of multiobjective evolutionary algorithms in a cluster environment, Sadeesha Gamhewa
Excerpta Botanica - a valuable bibliographical source for vegetation science, David Goodall
Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Susan Kennedy
Technological Barriers to Successful eLearning in Computer Science, Yuwanuch Gulatee and Barbara Combes
Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James
A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nicholas Cope
Network security – Is IP telephony helping the cause?, Paul Hansen and Andrew Woodward
How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward
Evolving Players for an Ancient Game: Hnefatafl, Philip Hingston
Opponent modelling, evolution, and the iterated prisoner's dilemma, Philip Hingston, D Dyer, L Barone, T French, and Graham Kendall
Experiments with Monte Carlo Othello, Philip Hingston and Martin Masek
Risk Factors for Increased BTEX Exposure in Four Australian Cities, Andrea Hinwood, Clemencia Rodriguez, Tina Runnion, Drew Farrar, Frank Murray, Anthony Horton, Deborah Glass, Vicky Sheppeard, John Edwards, Lynnette Denison, Tom Whitworth, Chris Eiser, Max Bulsara, Rob Gillett, Jenny Powell, S Lawson, Ian Weeks, and Ian Galbally
Movement patterns and habitat usage of Shark Bay dugongs [dataset], David K. Holley
A comparison of edge detection methods for segmentation of skin lesions in mobile-phone-quality images, Khanh Linh Hua
Using Digital systems for deception and influence, W Hutchinson
An Information-centric and Proactive Approach to Information Security teaching, William Hutchinson
The Systemic Roots of Suicide Bombing, William Hutchinson
Marine macrophytes directly enhance abundances of sandy beach fauna through provision of food and habitat, Rebecca Ince, Glenn Hyndes, Paul Lavery, and Mathew Vanderklift
Bait Uptake and Caching by Red Foxes and Nontarget Species in Urban Reserves, Jennifer Jackson, Dorian Moro, Peter Mawson, Mark Lund, and Amanda Mellican
Can SDV technology be utilised in a smartphone to prevent forensic analysis?, Peter James
Securing VoIP: A framework to mitigate or manage risks, Peter James and Andrew Woodward
Data mining and genetic algorithm application in bioinformatics with microarray, Chao Ying Jiao and Dongguang Li
A framework for the management of information security risks, Andrew Jones
The development of a south Texas health information gateway : negotiating the construction of information, Deborah J. Kaercher
Fine grained access control of ODF documents using XACML, Gautham Kasinath
Analysis of PKI as a Means of Securing ODF Documents, Gautham Kasinath and Leisa J. Armstrong
Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa J. Armstrong
Securing J2ME Mobile Application API Using XACML, Gautham Kasinath and Leisa J. Armstrong
Experiences and Methodologies Teaching Hands-On Cyberforensics Skills Online, Gary Kessler
Behavior of Nutrions in Sap of Eucalyptus camaldulensis in Arid Land of Western Australia, Toshinori Kojima, N. Saito, Y. Tanaka, Hiroyuki Hamano, S. Kato, K. Tahara, N. Takahashi, and Koichi Yamada
Associative Data Mining for Alarm Groupings in Chemical Processes, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li
A Model-Centric Approach for the Management of Model Evolution in Chemical Process Modelling, Chiou Peng Lam, Huaizhong Li, and Dong Xu
Ant Colony Optimisation for Generation of Conformance Testing Sequences using a Characterising Set, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li
Effect of leaf movement on epiphytic algal biomass of seagrass leaves, Paul Lavery, Tara Reid, Glenn Hyndes, and Beverley Van Elven
An Adaptive T-S type Rough-Fuzzy Inference System (ARFIS) for Pattern Classification, Chang Su Lee, Anthony Zaknich, and Thomas Braunl
New species of Andersonia (Ericaceae) of conservation concern, Kristina L. Lemson
Reinforcement Learning of Competitive Skills with Soccer Agents, Jinsong Leng, Colin Fyfe, and Lakhmi Jain
Convergence Analysis on Approximate Reinforcement Learning, Jinsong Leng, Lakhmi Jain, and Colin Fyfe
Australian firearm identification system based on the ballistics images of projectile specimens, Dongguang Li
Firearm identification with hierarchical neural networks by analyzing the firing pin images retrieved from cartridge cases, Dongguang Li
Proceedings of the Sixth International Workshop for Applied PKC (IWAP2007), Dongguang Li
User perception of the security & privacy concerns of RFID technology, F Li, N L. Clarke, and C Bolan
Realising B2B e-commerce benefits: the link with IT maturity, evaluation practices, and B2BEC adoption readiness, Chad Lin, Yu-An Huang, and Janice Burn
Issues and recommendations in evaluating and managing the benefits of public sector IS/IT outsourcing, Chad Lin, G Pervan, and Donald Mcdermid
Stem cell and kinase activity-independent pathway in resistance of leukaemia to BCR-ABL kinase inhibitors, Shaoguang Li and Dongguang Li
Monitoring Wetlands in a Salinizing Landscape: Case Studies from the Wheatbelt Region of Western Australia, M N. Lyons, Stuart Halse, N Gibson, D J. Cale, J A. Lane, C D. Walker, D A. Mickle, and Raymond Froend
Varying foraging strategies of Labridae in seagrass habitats: Herbivory in temperate seagrass meadows?, Lachlan D. MacArthur and Glenn A. Hyndes
Effects of experimental reduction of light availability on the seagrass Amphibolis griffithii, P Mackey, CJ Collier, and Paul Lavery
An Investigation Into the Application of Data Mining Techniques to Characterize Agricultural Soil Profiles, Rowan J. Maddern
The issues in securing electronic health information in transit, Rachel Mahncke and Patricia Williams
State model diagrams - A systems tool for teaching network technologies and network management, S P. Maj, B Tran, and D Veal
Network Technology Education: A novel pedagogical model for novices and practicing professionals, Stanislaw Maj and Bao Tran
State Model Diagrams as a Pedagogical Tool - An International Evaluation, Stanislaw Maj and David Veal
Use of online tools to aid group work, Martin Masek
Distribution and reproductive biology of the sandbar shark, Carcharhinus plumbeus (Nardo), in Western Australian waters, Rory Brian Mcauley, C. A. Simpfendorfer, Glenn A. Hyndes, and R. C.J. Lenanton
Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry, Danny Ng and Andrew Woodward
Network security devices and protocols using state model diagrams, C. Nuangjamnong, D. Veal, and S. P. Maj
Detritivores as indicators of landscape stress and soil degradation, M. Paoletti, G. Osler, Adrianne Kinnear, D. Black, L. Thomson, A. Tsitsilas, D. Sharley, S. Judd, P. Neville, and A. D'Inca